The "chroot" command can be used to switch from the root of the live OS to the root of the Linux system that is installed on the hard drive during a system recovery.
You can modify the apparent root directory for the currently active process and its descendants by using the "chroot" command, which stands for "change root."
When you need to access the files and directories of a Linux system that is installed on a hard disc from a live environment, this command is frequently used in system recovery scenarios.
The basic syntax of the "chroot" command is as follows:
chroot /path/to/new/root [command]
Thus, the directory that will become the new root, i.e., the root of the Linux system installed on the hard disc, is indicated by the string "/path/to/new/root" in this case.
For more details regarding Linux system, visit:
https://brainly.com/question/30386519
#SPJ4
Define the term Project brief? why is it important to do planning?
Answer: the project brief is a document that provides an overview of the project.
Explanation: It says exactly what the designer, architect, and contractor needs to do to exceed your expectations and to keep the project on track with your goals and your budget.
There is one clear definition of IT. True False
Answer:
That is False. it has more definitions not only one.
What is the output of the following line of code? print (“I\tLove Python”)
Answer: it will print:
I (4 spaces) Love Python
Explanation: the \t adds in a tab (4spaces) in a print statement
Create an infographics using the Word Processing Software, informing the audiences about internet safety practices.
Here is a suggested infographic on internet safety practices using Microsoft Word:
[A Word document shows the following infographic:]
Staying Safe Online
Protect your personal information. Never share your name, address, phone number, passwords, or Social Security Number on social media or public websites.
Be wary of phishing emails and malicious links. Never click links or download attachments from unknown or untrusted sources. Legitimate companies will not ask for sensitive data via email.
Use strong and unique passwords. A strong password contains a minimum of 8 characters, a mix of letters, numbers and symbols, and is not based on personal information. Use different passwords for different online accounts.
Be cautious of what you post. Anything you post online can potentially last forever. Do not post anything that you would not want seen by anyone.
Turn on two-factor authentication whenever possible. This adds an extra layer of security for your accounts like email, social media, and cloud storage services.
Ensure all devices and software are up to date. Install the latest updates to keep security patches current to protect against threats.
Be wary of public Wi-Fi networks. Public networks are not secure and all your online activity and information can be visible to others. Avoid conducting sensitive activities on public Wi-Fi.
Signal for help if anything suspicious happens. If you notice any suspicious activity on your accounts or devices, changing passwords or unauthorized logins, report it immediately to the concerned companies and consider filing a police report.
Online privacy and security is a shared responsibility. Be proactive and spread awareness about internet best practices to help keep everyone safe online. Together, we can make the internet a safer place!
Does this infographic look okay? I tried to highlight some key best practices around protecting personal information, using strong passwords, being cautious of what is posted online, enabling two-factor authentication, keeping software up to date, avoiding public Wi-Fi and knowing how to get help if needed. Please let me know if you would like me to modify anything in the infographic. I can also suggest some other topics or formatting styles if required.
A brief overview of some important internet safety practices that you can include in your infographic using the Word Processing Software is given.
How to explain the informationUse strong passwords: Use a combination of uppercase and lowercase letters, numbers, and symbols in your passwords, and avoid using personal information.
Enable two-factor authentication: Two-factor authentication provides an extra layer of security by requiring a second form of authentication in addition to your password.
Be careful with personal information: Don't share personal information like your full name, address, phone number, or social security number online.
Learn more about Word Processing on
https://brainly.com/question/985406
#SPJ1
SOMEONE PLEASE HELP ME
Part 1:
x = first variable
y = second variable
print the variables to the console.
Part 2:
// Replace this with your name, today's date, and a short description.
def main():
x = 'My favorite book is python for dummies.'
y = 'I get to learn a lot about python.'
print(x)
print(y)
if __name__ == "__main__":
main()
Part 3:
The purpose of my program was to express separate string variables and print them separately to the console. Also, I was able to demonstrate how functions work.
My program could be useful for storing values in variables for later. Although quite small, my program expresses how easy functions are to use.
I had trouble setting up my functions properly. To fix this problem, I looked back in our notes.
Next time, I will review our notes before starting the assessment. I will also remember how to properly use functions.
who knows a good binary app or site for addition with 4 numbers ?
For this recitabian project, white a peogranithat wil diiphy in menu and perfoem e fiferent arithmetic operation based on the ifiection that i made from the menu. This wilchentine until the duit option is ielected from the menu. The menur that is diplayed: a) add two numbern 6) Tquare a numbo. d) divide tuo numbero. d) गuith What is yout chotce? The cholce that is entered ha sinde fetter string value. A cPp file (mesu.कp) has been provided. It contalin the doclaraton for a string varable (mens choicel, and code that will display the mena to the user and get a strine value. Add code that will process the menu choite that was made by getting the required vilue(s) from the user; perfermine the selected arithmetic operation, and daplaves the result of the operation. This should entainse : fer as lang as the vet does not want to quit. Make sure that the mens of options is diplayed to the user atter the retults of each operation fis been displayed. If the addition operation f
∗
a
∗
or " A ") is selected, the user should be prompted for two integer values that should: be added and thy gewleing sum should be displyyed. Make sure the promphs to the user and the daplay of the results macch whll is shown in the output section. If the square operation f
"s"
" of "S") is selected, the user should be prorthted far a sincle intecer value that should be squared and the resulaing product should be derglayed, Make uare the peompt to the uner and the Cisplay of the results match what is shown in the cutput section. If If the division operation F"d
∗
or "DTlis selected, the saer shiould be prompted for two inteser values fa dividend and divisor) that should be dilded and the resulting quotient AkD remainder should be cipliyed. Make sure the prompls to the user and the digily of the result match what is shown in the output section. If the mena selection is invalid, dispizy "invald selection". Frint a newaine at the end of the prceram. File You Must Submit Pace the con pleted promam code in a tource fle named menu.cPp. Output The output enat is preduced by the program will vary based en the values that ace enternd when the progam in enecuted. The ocfput that is shown below is what the program wis peoduce when it a run in an enwirentrent fuch as Dev Cer oc XCode. When it is ran theocsh the Auto Grader, the portions that ask for values Will Not: shuw the valuef that are entered. A single run of the program follow? a) adid two nimbert: a) squari a turiber d) divide taro: nu=bera
In this project, a C++ program that will display a menu and perform a different arithmetic operation based on the user's choice that was made from the menu is to be written.
This will continue until the quit option is selected from the menu. If the choice is invalid, the program should display "invalid selection". The menu that is displayed is given below:a) add two numbers b) subtract two numbersc) multiply two numbersd) divide two numberse) modulof) square a numberg) quitWhat is your choice?The choice that is entered has a single-letter string value.
A C++ file (menu.cpp) has been provided. It contains the declaration for a string variable (menuChoice), and code that will display the menu to the user and get a string value. Add code that will process the menu choice that was made by getting the required value(s) from the user; performing the selected arithmetic operation, and displaying the result of the operation.
This should contain a loop that will continue for as long as the user does not want to quit. Make sure that the menu of options is displayed to the user after the results of each operation have been displayed. If the addition operation (or "A") is selected, the user should be prompted for two integer values that should be added and their resulting sum should be displayed. If the subtraction operation (or "B") is selected, the user should be prompted for two integer values that should be subtracted and their resulting difference should be displayed. If the multiplication operation (or "C") is selected, the user should be prompted for two integer values that should be multiplied and their resulting product should be displayed. If the division operation (or "D") is selected, the user should be prompted for two integer values (a dividend and divisor) that should be divided and the resulting quotient and remainder should be displayed.
If the modulo operation (or "E") is selected, the user should be prompted for two integer values that should be divided and their resulting modulo should be displayed. If the square operation (or "F" or "S") is selected, the user should be prompted for a single integer value that should be squared and the resulting product should be displayed. If the menu selection is invalid, display "invalid selection". Print a newline at the end of the program.
To learn more about arithmetic operations:
https://brainly.com/question/30553381
#SPJ11
Codehs 4.5.4 growing circle
write a program that uses key events to make a circle larger and smaller.
your circle should start at a radius of 100 and a position of 250, 250. each time the user hits the left arrow, the circle should decrease by 10. if the user hits the right arrow, it should increase by 10.
The program that uses key events to make a circle larger and smaller is given below:
import pygame
# Initialize pygame
pygame.init()
# Set the window size
window_size = (500, 500)
# Create the window
screen = pygame.display.set_mode(window_size)
# Set the initial radius and position of the circle
radius = 100
x = 250
y = 250
# Run the game loop
running = True
while running:
# Check for key events
for event in pygame.event.get():
if event.type == pygame.QUIT:
running = False
elif event.type == pygame.KEYDOWN:
if event.key == pygame.K_LEFT:
radius -= 10
elif event.key == pygame.K_RIGHT:
radius += 10
# Clear the screen
screen.fill((255, 255, 255))
# Draw the circle
pygame.draw.circle(screen, (0, 0, 0), (x, y), radius)
# Update the display
pygame.display.flip()
# Quit pygame
pygame.quit()
What is the computer program about?This program will create a window with a white background and a black circle with a radius of 100 in the center of the window.
Therefore, When the user presses the left arrow key, the radius of the circle will decrease by 10. When the user presses the right arrow key, the radius of the circle will increase by 10.
Learn more about programming from
https://brainly.com/question/1538272
#SPJ1
Your team is about to introduce and lunch a product never seen before in Barbados, an Ultrasonic Pest Repellent, that repels pests (small insects) while causing no harm to your pets, yourself, or any animals in range.
1) In your own word, state the market objectives your team wishes to attain with the lunch of this new product. Ensure your objective are written clearly and S.M.A.R.T.
ii) Identify any concerns that may affect the completion of the objective.
Market Objectives are Increase Market Share, Generate Revenue and Build Brand Awareness. Concerns are as follows Market Acceptance, Competitive Landscape and Regulatory Compliance.
i) Market Objectives:
1. Increase Market Share: Increase the market share of the Ultrasonic Pest Repellent in Barbados by 20% within the first year of launch.
(Specific: Increase market share, Measurable: 20% increase, Achievable: Based on market demand and competition, Relevant: Aligns with the product launch, Time-bound: Within the first year)
2. Generate Revenue: Achieve a sales target of $100,000 in the first six months after product launch.
(Specific: Achieve sales target, Measurable: $100,000, Achievable: Based on market potential and pricing strategy, Relevant: Revenue generation, Time-bound: Within the first six months)
3. Build Brand Awareness: Increase brand recognition and awareness of the Ultrasonic Pest Repellent among the target audience by implementing a comprehensive marketing campaign, resulting in 75% brand recognition within the first year.
(Specific: Increase brand awareness, Measurable: 75% brand recognition, Achievable: Through effective marketing strategies, Relevant: Brand building, Time-bound: Within the first year)
ii) Concerns:
1. Market Acceptance: There may be concerns regarding the acceptance and adoption of the Ultrasonic Pest Repellent among consumers in Barbados. Awareness and education campaigns may be required to overcome skepticism and build trust in the product's effectiveness.
2. Competitive Landscape: Competitors already offering pest control solutions may pose a challenge. It is important to differentiate the Ultrasonic Pest Repellent and effectively communicate its unique selling points to gain a competitive advantage.
3. Regulatory Compliance: Ensuring compliance with local regulations and safety standards regarding the sale and usage of pest control products is crucial. Failure to meet regulatory requirements could result in delays or restrictions on product launch.
Learn more about marketing campaign :
https://brainly.com/question/30237897
#SPJ11
explain the operation of an air cnditioner
Answer:
Hopefully This Helps :)
Explanation:
The principle of air conditioning is based on the laws of thermodynamics. An air conditioner operates using the refrigeration cycle. Specific refrigerants are needed as the working fluid in the refrigeration cycle.
An air conditioner goes through 4 processes; compression, condensation, expansion, and evaporation. Typically, an air conditioner is made up of 4 major components; compressor, heat exchanger, fan, and expansion valve.
Condensation/Expansion/Evaporation/Compression
which fields in the contact form is used to control the order in which contacts are displayed in the current view?
Answer:
The answer is "File As"
Explanation:
The file is a data collection, that is processed either by filename in a single system. It could be a text, an image, a sound or a streaming server, a software collection, an and app, and other data collection. In this, the File As the field is used to order in connections that are displayed in the original understanding was controlled by using the contact-form sector.
Identify the causes of configuration problems. (choose all that apply)
The installation CD is unreadable.
There is not enough information provided about a connected device
The software was misconfigured by the user.
The computer does not meet minimum requirements of the software program.
Answer: The computer does not meet minimum requirements of the software program because too much energy gets put in it
Explanation:
Good luck
The computer does not meet minimum requirements of the software program.
What is Configuration problems?Software products have installation-related configuration issues. To match the program's capabilities to the system's actual configuration, the user must provide a few parameters.
The startup program in the ROM BIOS is used to configure these configuration parameters. The program cannot correctly guide the system's hardware if these parameters are configured wrong, and an error results.
A software program is a collection of code and instructions that instructs a computer on how to carry out and carry out particular tasks. Depending on the loaded software packages, a single computer can perform numerous tasks at once.
Be mindful of this type of error's potential when you install new hardware or software options.
Therefore, The computer does not meet minimum requirements of the software program.
To learn more about Software program, refer to the link:
https://brainly.com/question/2553593
#SPJ7
Assume that you are creating a website for a school. You want to insert pictures of students and teachers. Which tag will you use to insert these
pictures?
OA.
OB.
OC.
OD.
The appropriate tag that should be employed for inserting images on a website is the <img> tag.
Why is the Img tag appropriate?The mentioned HTML tag is self-closing and mandates an src attribute that denotes the image file's location or path. For the purpose of making it accessible, supplementing an alt attribute is an option to include textual information that explains the image.
To illustrate a teacher, a suitable code would be <img src="teacher.j p g" alt="An image depicting a teacher">.
Therefore, B is the appropriate selection. The HTML code for the element.
Read more about website here:
https://brainly.com/question/28431103
#SPJ1
The Complete Question
Assume that you are creating a website for a school. You want to insert pictures of students and teachers. Which tag will you use to insert these
pictures?
OA. <div> tag
OB. <img> tag
OC. <h1> tag
OD. <p> tag
how to send same email to multiple recipients separately outlook ?
One way would just to be to copy the contents of the email and individually send it to anyone you want. Another way if you don't want the people to see who else you have emailed is to put their contact under the "bcc:" category when writing the email.
what are vga cables used for
Answer:
VGA cables are used to connect a PC or a compatible laptop to a monitor.
Explanation:
When the monitor says "No VGA signal/cable connected", that means either the PC is off or the cable is disconnected from either the PC or the monitor.
If the most likely reason customers will purchase a company's product is its
many useful attributes, what advertising focus would likely be most effective?
O A. Providing information
OB. Customer frequency
OC. Public relations
O D. Brand awareness
If the most likely reason customers will purchase a company's product is its many useful attributes, the most effective advertising focus would likely be providing information.
How efficient is 'providing information' as an advertising tactic?Providing information about the product's features and benefits can help customers make an informed decision and understand how the product will fulfil their needs. This approach is especially effective when the product has a lot of useful attributes that can provide value to the customer.
Customer frequency, public relations, and brand awareness are also important aspects of advertising, but they may not be as effective in this specific scenario. Customer frequency focuses on encouraging repeat purchases from existing customers, public relations focuses on building a positive image for the company, and brand awareness focuses on increasing overall recognition of the brand. While these can be important goals for advertising, they may not be the most effective approach for promoting a product's many useful attributes.
To learn more about advertising, visit:
https://brainly.com/question/3163475
#SPJ1
Which operating system function has a steeper learning curve and can potentially break the system without careful use of its operations?
1. Graphical user interface (GUI)
2. Service management
3. Application management
4. Command line interface (CLI)
Answer:
4. Command line interface (CLI)
Explanation:
An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.
This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.
Some examples of an operating system on computers are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.
A Command line interface (CLI) refers to a text-based user interface that allow users to operate a software application or program, as well as manage and execute operating system functions by typing standard line of commands into the text-based user interface with a real-time response.
Basically, the CLI is solely text-based and as such requires a thorough knowledge and understanding of global commands, as well as administrative privileges in some cases.
Hence, the operating system function which has a steeper learning curve (more difficult to learn) and can potentially break the system without careful use of its operations is the Command line interface (CLI).
which type of hazzard are those substances which threathen you physical safety ?
Answer:
98o
Explanation:
virtual conections with science and technology. Explain , what are being revealed and what are being concealed
Some people believe that there is a spiritual connection between science and technology. They believe that science is a way of understanding the natural world, and that technology is a way of using that knowledge to improve the human condition. Others believe that science and technology are two separate disciplines, and that there is no spiritual connection between them.
What is technology?
Technology is the use of knowledge in a specific, repeatable manner to achieve useful aims. The outcome of such an effort may also be referred to as technology. Technology is widely used in daily life, as well as in the fields of science, industry, communication, and transportation. Society has changed as a result of numerous technological advances. The earliest known technology is indeed the stone tool, which was employed in the prehistoric past. This was followed by the use of fire, which helped fuel the Ice Age development of language and the expansion of the human brain. The Bronze Age wheel's development paved the way for longer journeys and the development of more sophisticated devices.
To learn more about technology
https://brainly.com/question/25110079
#SPJ13
How many of the colonists of Jamestown died before they made it to shore, due to the difficult voyage?
half
almost all
one third
nonE
what would happen without satellites???
Answer: without satellites there would be no way for the world to communicate
Explanation:
Answer:
Explanation:
Without satellites, we wouldn't have much choice in our television programs either, because there would be no more direct-to-home broadcasting, and cable operators would no longer have easy access to such a wide variety of channels.
The is_positive function should return True if the number received is positive, otherwise it returns None. Can you fill in the gaps to make that happen? 1 2 3
Python is a computer programming language often used to build websites and software, automate tasks, and conduct data analysis. Python is a general-purpose language, meaning it can be used to create a variety of other programs and isn't specialized for any specific problems.
Following are the python schedule to check input number is positive or negative:
Program: def is_positive(n):#defining the method is_positive that takes one variable in parameter
if (n > 0):#defining if block that check input number is positive
return True#return boolean value that is True
else:#else block
return "None"#return string value
n=int(input("Enter number: "))#defining n variable that input a number
print(is_positive(n))#using print process that calls and prints method return value
Output:
please find the connected file.
Program Explanation:
Defining the method "is_positive" that takes one variable "n" in the parameter.
Inside the method, if conditional block is determined that checks the input number is positive, if it's true, it will return a boolean value that is "True".
Otherwise, it will go to the else block, where it will produce a string value that is "None".
Outside the way, the "n" variable is declared to be an input number.
After the input value, a print method is used that calls the "is_positive" form and prints its return value.
To learn more about Python, refer
https://brainly.com/question/23916407
#SPJ4
¿Cuanto cuesta un procesador de textos?
Answer:
Too Much
demasiado
Explanation:
Can anyone help with this
If you want GA to track performance even when a user comes to only one web page on your site, but clicks to play a video before he leaves the site, what do you need to do? Add a custom filter Add a custom metric Add a custom dimension Create an event tag Add a custom segment
To track the performance of a user visits only one web page on your site but clicks to play a video before leaving, you need to create an event tag. Event tracking allows you to measure specific user interactions on your website.
To set up event tracking, you first need to add the GA tracking code to your website. Then, you can create an event tag that captures the video play as an event. You can define the event parameters, such as the category, action, label, and value, to track specific details about the video play. Once you've set up the event tag, you can view the performance metrics in GA, such as the number of video plays, the average time spent watching the video, and the conversion rate of users who watched the video. This data can help you optimize your website and improve the user experience, even for users who only visit one page.
The user interface of an application is the part that allows users to interact with and manage the software. The user interface (UI) of a device is the point of interaction and communication between humans and computers. Desktop displays, keyboards, mice, and other pointing devices may all fall under this category. It also describes how a user interacts with a piece of software or a website. User interface or human-machine interface refers to the part of a machine that controls human-machine interaction. Membrane switches, rubber keypads, and touchscreens are a few examples of the physical, feel-and-touch elements of the human-machine interface.
Learn more about user interactions here
https://brainly.com/question/30645877
#SPJ11
1. what is the ip address and the mac address of the system you are on? is it ipv4 or ipv6? how long is your lease good for? is it a wifi or ethernet connection?
As a question-answering bot, I don't have the capability to provide information about my IP address or MAC address since I am a virtual assistant. However, I can provide general information about these terms.
An IP address is a numerical label assigned to every device connected to a computer network that uses the Internet Protocol for communication. This unique address serves two primary functions: host or network interface identification and location addressing.A MAC address (Media Access Control address) is a unique identifier assigned to network interfaces for communications on the physical network segment. This address is used to identify a device at the hardware level and is composed of six pairs of hexadecimal digits separated by colons.IP addresses can be of two types: IPv4 (Internet Protocol version 4) and IPv6 (Internet Protocol version 6). IPv4 is a 32-bit address that is written in decimal format and separated by periods. IPv6 is a 128-bit address that is written in hexadecimal and separated by colons.A lease refers to the amount of time that a device is allowed to use an IP address on a network. The length of time is determined by the administrator of the network and can vary depending on the network's requirements
Finally, the type of connection can either be a Wi-Fi or Ethernet connection. A Wi-Fi connection uses wireless technology to connect devices to a network, while an Ethernet connection uses wired technology to connect devices to a network.
To know more about IP address or MAC address Visit :
https://brainly.com/question/31026862
#SPJ11
PLEASE HELP ME ASAP
I will give brianlyist
Answer:
the answer is C because it is the answer.
Answer:
C
Explanation:
A certain string-processing language allows a programmer to break a string into two pieces. Because this operation copies the string, it costs n time units to break a string of n characters into two pieces. Suppose a programmer wants to break a string into many pieces. The order in which the breaks occur can affect the total amount of time used. For example, suppose that the programmer wants to break a 20-character string after characters 2, 8, and 10 (numbering the character in ascending order from the left-hand end, starting from 1). If she programs the breaks to occur in left-to-right order, then the first break costs 20 time units, the second break costs 18 time units (breaking the string from characters 3 to 20 at character 8), and the third break costs 12 time units, totaling 50 time units. If she programs the breaks to occur in right-to-left order, however, then the first break costs 20 time units, the second break costs 10 time units, and the third break costs 8 time units, totaling 38 time units. In yet another order, she could break first at 8 (costing 20), then break the left piece at 2 (costing 8), and finally the right piece at 10 (costing 12), for a total cost of 40. Design an algorithm that, given the numbers of characters after which to break, determines a least-cost way to sequence those breaks. More formally, given a string S with n characters and an array L[1..m] containing the break points, compute the lowest cost for a sequence of breaks, along with a sequence of breaks that achieves this cost.
To solve the problem of finding the least-cost way to sequence breaks in a string-processing language, we can use dynamic programming. Specifically, we can create a cost matrix that represents the cost of breaking substrings of increasing lengths at different break points. By iterating through this matrix and computing the minimum cost for each substring, we can efficiently find the lowest-cost sequence of breaks.
How can we determine algorithm for optimal break sequences?
1. Input parameters: a string S with n characters and an array L[1..m] containing the break points.
2. Sort the break points in ascending order and add two sentinel values at the beginning and end of the array, representing the start and end of the string. That is, L[0] = 0 and L[m+1] = n.
3. Create a cost matrix C of size (m+2) x (m+2). Initialize all its elements to 0.
4. Iterate through the matrix in a bottom-up, diagonal manner, filling in the costs for breaking strings of increasing lengths.
5. For each matrix element C[i][j] (where i < j), compute the minimum cost for breaking the substring between break points L[i] and L[j], considering all possible intermediate break points L[k] (where i < k < j). The cost for breaking at L[k] can be calculated as C[i][k] + C[k][j] + (L[j] - L[i]). Update C[i][j] with the minimum cost found.
6. The minimum cost for breaking the entire string is stored in C[0][m+1]. To find the sequence of breaks that achieves this cost, you can reconstruct the optimal solution by keeping track of the intermediate break points chosen in a separate matrix.
7. Output: lowest cost for a sequence of breaks, and a sequence of breaks that achieves this cost.
To know more about the dynamic programming visit:
brainly.com/question/30768033
#SPJ11
This isn't academic, but what do I do if HI-REZ won't let me sign into an existing account. “Something went wrong” keeps popping up when I type in the correct info
Answer:
contact their support
Explanation:
Whenever ___________ information is available, it should be used instead of accounting data.
Whenever Market information is available, it should be used instead of accounting data.
What is meant by market information?Marketing Information is known to be a term that connote all the information that are said to be associated to the marketing of any form of products or services.
They are made up of customer names, lists, sales targets, sales statistics, and others. The types of marketing information used by marketers are internal data, competitive intelligence, as well as marketing research.
Therefore, Whenever Market information is available, it should be used instead of accounting data
Learn more about Market from
https://brainly.com/question/24906199
#SPJ1