Which of the following are acceptable to share? Check all of the boxes that apply.
any file you own
files that you have permission to share
works that have a copyright
works that a Creative Commons license says you can use
O

Answers

Answer 1

Answer:

B. files that you have permission to share  

D. works that a Creative Commons license says you can use

Answer 2

Answer: B and D

Explanation: got it right on gunity


Related Questions

Games were first created as a way to just have fun; they had no real connection to life.
True
False

Answers

Answer:

true

Explanation:

size = input("Enter your shoe size: ") size = int(size) if size > 12: print(str(size) + " is too high.") elif size < 6: print(str(size) + " is too low.") else: print(str(size) + " is in stock.") What is the output from running the above code if the user enters ten?

Answers

Answer:

It will print that the shoe size is in stock when the user prints 10, too high when the user enters 12, and anything less than 6 would be too low. It's a python program describing how basic input data is interpreted.

A band from the 1970s has reunited. They want to revive their careers, but they do not have the funding they once did. An international tour is not financially possible. The band needs to build renewed interest in their music and make a profit.
Which of the following would be the best decision for this band?

A) Plan a small concert tour through the United States with limited performances in key cities.

B) Use a crowdfunding source to raise money for an international tour.

C) Plan a one-night reunion concert that will be broadcast live, online, and on cable, then sell recordings of the event.

D) Use social media to publicize a national tour and set up media interviews with key entertainment news publications.

Answers

A band from the 1970s has reunited. They want to revive their careers, but they do not have the funding they once did. An international tour is not financially possible. The band needs to build renewed interest in their music and make a profit.

Which of the following would be the best decision for this band? \\

-----------------------------------------------------------------------------------------------------

Correct Answer:

B) Plan a one-night reunion concert that will be broadcast live, online, and on cable, then sell recordings of the event.

Explanation:

I got the answer correct on EDG2020.

Why when i want to answer a profile that starts with a will put a link to "https://bitly.com/"

Why when i want to answer a profile that starts with a will put a link to "https://bitly.com/"

Answers

i don’t know i checked it and i think it’s a virus or something like that don’t click on link

Which reclusive writer announced two new novels to be published this fall, ending a 16-year hiatus?.

Answers

Harper Lee is the reclusive writer who announced two new novels to be published this fall, ending a 16-year hiatus.Harper Lee is an American novelist known for her critically acclaimed and Pulitzer Prize-winning novel To Kill a Mockingbird (1960).

She was born on April 28, 1926, in Monroeville, Alabama, and she died on February 19, 2016. Lee, who was known for her private nature and reclusive lifestyle, announced in February 2015 that a second novel, Go Set a Watchman, would be published in July 2015. The novel is set in the same fictional town as To Kill a Mockingbird, but 20 years later. Another novel, The Mockingbird Next Door: Life with Harper Lee, was also published in 2015 by Marja Mills, a journalist who lived next door to Lee in Monroeville.

It is worth noting that Harper Lee did not announce two new novels to be published in the fall of 2021 or any other year after 2015.

To know more about Prize-winning visit:

brainly.com/question/31551611

#SPJ11

How does segmenting your network increase network security?

Answers

Answer:

By segmenting networks, it becomes easier to protect the most sensitive data that you have on your internally-facing network assets. The creation of a layer of separation between servers containing sensitive data and everything outside of your network can do wonders to reduce your risk of data loss or theft.

Explanation:

PLEASE MARK ME AS BRAINLIEST

An _______________ is a sequence of instructions written to perform a specified task or series of tasks for a computer.

Answers

An app is a sequence of instructions written to perform a specified task for a computer. Today, most of these programs are installed as desktop apps or Windows Store apps.

What is the function of the app?

Any app's ability to be navigated by the user is its most crucial feature. In recent years, centered tabbed menus at the top or bottom of the screen have gained popularity. Users are able to operate them naturally, and the majority of menu options are always within reach of the thumb.

An app is a set of written instructions that a computer can use to carry out a certain operation. These days, the majority of these applications are downloaded as desktop apps or Windows Store apps.

What is this function about?

The relationship between a group of inputs and one output each serves as the foundation for the definition of a function.

Remember that a function is only a relationship between inputs in which each input is connected to a certain output.

To learn more about function refers to:

https://brainly.com/question/27863366

#SPJ4

What is the value of the variable moneyDue after these lines of code are executed?

>>> numSodas = 2
>>> costSodas = 1.50
>>> moneyDue = numSodas * costSodas

Answers

Answer:

3.0

Explanation:

To understand why there is a blank decimal, we have to understand that when you add multiply or subtract with a float (in python), the result will also be a decimal, even you use a blank decimal in the equation. A circumstance where the output would just plain 3, you would have to put in the following:

>>>int(moneyDue)

To insure it will output an int. However, it does not use that line of code, thus proving the answer is 3.0.

hope this helped :D

Answer:

3.0

Explanation:

edge

Drive
0101
0102
0103
0104
0105
0106
0107
0108
0109
0110
0111
0112
0113
0114
0115
0166
Sorting Minute
True
102
162
165
91
103
127
112
137
102
147
163
109
91
107
93
100
An Excel table can help
you organize your data in
preparation for using it
with charts and other
analysis tools.
Copyright © 2003-2022 International Academy of Science. All Rights Reserved.
False

Answers

Answer:

What

Explanation:

True

In a large IS organization, the professional who is responsible for maintaining the security and integrity of the organization's systems and data is the

Answers

The Information Security Officer (ISO) is the professional responsible for ensuring the security and integrity of an organization's information systems and data.

An information security officer (ISO) is an individual within an organization who is responsible for managing the security and integrity of the organization's information systems and data. The ISO is responsible for ensuring that the organization's data is protected from unauthorized access and that its information systems are secure from external and internal threats.

The ISO is typically a senior-level professional within an organization's information security team. They are responsible for overseeing the organization's information security program and for ensuring that the organization's security policies and procedures are followed.

To know more about ISO visit:-

https://brainly.com/question/14754171

#SPJ11

Display the total number of parking tickets.

Answers

OOGA BOOGA OOGA BOOGA OOGA BOOGA

Answer:

Explanation:

select * from customer where balance > (select avg(balance)

from customer) and credit_limit > (select avg(credit_limit) from customer);

which vpn type might feature the use of a clientless vpn solution? this task contains the radio buttons and checkboxes for options. press the enter key to select the option. option a site-to-site option b client-to-site option c client-to-client option d server-to-server

Answers

When users only wish to encrypt web traffic, they frequently utilize clientless SSL VPNs in kiosks, shared workstations, mobile devices, and other situations.

Client-based: The user uses a client to connect to the VPN terminating device (router, firewall, etc.). The Cisco AnyConnect Secure Mobility Client is a good illustration of a VPN client. End users can use an SSL-enabled Web browser to securely access corporate network resources from any location using a clientless SSL VPN. A Clientless SSL VPN gateway must first verify the user's identity before granting access to preconfigured network resources. A browser-based VPN called a clientless SSL VPN enables remote users to securely access corporate resources. They use HTTP over an SSL connection to access the resources from any location.

Learn more about browser here-

https://brainly.com/question/28504444

#SPJ4

In cell J9, use the CORREL function to test for a correlation between sales data and milestones reached.

Answers

To use the CORREL function to test for a correlation between sales data and milestones reached in cell J9, follow these steps:

1. Gather your sales data in a range of cells, for example A1:A10.
2. Gather your milestones data in another range of cells, for example B1:B10.
3. Click on cell J9 to make it the active cell.
4. Enter the CORREL function: =CORREL(A1:A10, B1:B10).
5. Press Enter.

In cell J9, the CORREL function will now calculate the correlation between the sales data in the range A1:A10 and the milestones reached in the range B1:B10. The resulting value will indicate the strength and direction of the correlation.

This will calculate the correlation coefficient between the two data sets, which will indicate the strength and direction of the relationship between sales and milestones reached. The result will be a value between -1 and 1, where -1 indicates a perfect negative correlation, 1 indicates a perfect positive correlation, and 0 indicates no correlation.

To know more about correlation function visit:

https://brainly.com/question/31546990

#SPJ11

To use the CORREL function to test for a correlation between sales data and milestones reached in cell J9, follow these : Gather your sales data in a range of cells, for example A1:A10.

In cell J9, the CORREL function will now calculate the correlation between the sales data in the range A1:A10 and the milestones reached in the range B1:B10. The resulting value will indicate the strength and direction of the correlation. This will calculate the correlation coefficient between the two data sets, which will indicate the strength and direction of the relationship between sales and milestones reached. The result will be a value between -1 and 1, where -1 indicates a perfect negative correlation, 1 indicates a perfect positive correlation, and 0 indicates no correlation.

Learn more about correlation function visit:

https://brainly.in/question/40546464

#SPJ11

This term refers to an individual item in a list.a. elementb. binc. cubbyholed. slot

Answers

The term that refers to an individual item in a list is "element". In computer science, an element is a single item in a data structure or collection. It can be a number, a character, a string, or any other type of data that can be stored and manipulated within a program.

Elements are commonly used in programming languages such as Python, Java, and C++. They are often stored in arrays or lists, which are collections of elements that can be accessed and modified by the program. Elements can also be used in other data structures such as stacks, queues, and trees.
When working with elements, it is important to understand how to access and manipulate them. In an array or list, elements are typically accessed by their index, which is a number that corresponds to their position in the collection. For example, the first element in an array has an index of 0, the second element has an index of 1, and so on.

Overall, understanding elements is a fundamental concept in programming and computer science. By mastering this concept, programmers can effectively work with data structures and collections to create efficient and effective programs.

Learn more about data structures here:

https://brainly.com/question/12963740

#SPJ11

which of the following terms is used in secure coding: principles and practices to refer to the direct results of events?
a Events b Consequences c Impacts
d Goals

Answers

In secure coding principles and practices, the term "consequences" is used to refer to the direct results of events. Secure coding involves implementing measures to prevent unauthorized access, data theft, and other cyber threats.

It is crucial to consider the consequences of various events that could occur in the system and the impact they would have on the security of the application. By considering the consequences of an event, developers can identify potential vulnerabilities and design a system that is more secure. For instance, developers can consider the consequences of a successful SQL injection attack on the application and implement measures such as input validation to prevent such attacks. It is essential to have a thorough understanding of secure coding principles and practices to ensure the security of the application.

In conclusion, the term "consequences" is used in secure coding principles and practices to refer to the direct results of events, and it is important to consider these consequences when developing secure applications.

Learn more about principles here:

https://brainly.com/question/30388578

#SPJ11

What part of the computer is responsible for executing instructions to process information?.

Answers

Answer:

The computer does its primary work in a part of the machine we cannot see, a control center that converts data input to information output. This control center, called the central processing unit (CPU), is a highly complex, extensive set of electronic circuitry that executes stored program instructions.

Explanation:

Short: Central Processing Unit or CPU

what are the main functionalities in ip addresses. hint: there are two.

Answers

The two main functionalities of IP addresses are: Identification and Addressing and Routing.

Identification: IP addresses serve as unique identifiers for devices connected to a network. They enable devices to be identified and distinguished from each other on the internet or within a local network. IP addresses consist of a combination of numbers and are used to establish communication between devices.

Addressing and Routing: IP addresses are used for addressing and routing data packets across networks. When data is sent over the internet, it is divided into packets and each packet is assigned the source and destination IP addresses. Routers use these addresses to determine the appropriate path for the packets to reach their destination. IP addresses play a crucial role in ensuring that data is correctly routed and delivered to the intended recipient.

Know more about IP addresses here:

https://brainly.com/question/31026862

#SPJ11

On what basis computer can be classified into different categories?

Please answer these question and you will get 16 points​

Answers

Computers are classified into 4 different sizes:

- Mini Computers

- Micro Computers

- Super Computers

- Mainframe Computers

Micro Computers are small computers that are usually called PCs, or personal computers. They complete general purpose tasks and can be from $400 home computers to $15000 workstations. These are the most common types of computers, and most people have them in the forms of desktop computers to laptop computers. Even phones and tablets are considered micro computers because they meet the basic criteria of having local storage, a processor, a graphics coprocessor, and a compatible operating system.

Mini Computers are smaller than Micro Computers and are usually thin clients (which are computers that have a neural connection to a server / mainframe). They are usually employed by businesses becuase they are cheap and they have the processing power to tackle word processing, spreadsheet production, and presentation creation. Mainframe computers are in charge of providing this data at extremely high speeds through cloud networking, or through running an ethernet cable for speeds exceeding 50 GBps.

Super Computers are the fastest computer on the planet, and are usually lined up in rows that take up large rooms. These computers are usually stored like servers: on racks where they link up to other servers in order to quantify large amounts of data at extremely high speeds. These have lots of storage, but since storage isn't their primary use case, it isn't as much as a minframe computer, whose sole purpose is in fact storage and data networking.

Mainframe Computers are servers, and they hold data that is utilized by thin clients and and personnel at a business, or they are used to store massive amounts of data. Servers also act as a checkpoint, espeically networking / internet servers, where if you want to access a website, the website's servers need to access the search request for the specific URL and send you the output (the webpage). Mainframe computers do not have as much processing power as Super Computers, but they provide massive data storage options, which is their main purpose.

Answer:

computers can be classified into 4 types

mainframecomputer

minicomputer

supercomputer

microcomputer

The batteries on electric vehicles are recharged using electricity from either a wall socket or dedicated charging unit.

Answers

Answer:

true

Explanation:

If you want to notify the sender, you need to select the "Message contains sensitive content. " condition for this rule. Error details:

Answers

If you want to notify the sender, you need to select the "Message that contains sensitive content. The condition for this rule is to notify the sender and take action that requires the message that contains a data classification predicate.

What do you mean by Sensitive content?

Sensitive content may be defined as anything that may significantly provoke a sense of offense to a reader or user, particularly in relation to religion, race, gender, politics, sexuality, disability, or vulgar language.

According to the context of this question, the error details for this condition are provided to the sender in order to notify. This notification will definitely consist of all sorts of terms and conditions that are classified on the basis of data classification predicate.

Therefore, the condition for this rule is to notify the sender and take action that requires the message that contains a data classification predicate.

To learn more about Error details, refer to the link:

https://brainly.com/question/14056040

#SPJ1

10. The technology used to weave patterns into cloth inspired the future creation of computer data storage and retrieval

True or false?!

Answers

Your answer would be false

You supect that the power supply in your desktop PC is failing. You want to use a multimeter to test the power supply. Which multimeter setting should you use?

Answers

We should use the DC volts multimeter setting.

Most modern multimeters do polarity detection automatically. It is not necessary for the black lead to touch the negative terminal or the red information to touch the positive terminal while measuring dc voltage. Just be aware that a negative symbol will appear in the display if the probes hit the opposite terminals. Red leads should always touch a positive terminal on an analog multimeter, while black leads should always touch a negative terminal. Otherwise, the meter will sustain damage. According to the function that has been chosen on the dial, modern DMMs default to Autorange. Press the RANGE button several times until the appropriate range is selected to select a specific fixed measurement range.

Know more about Multimeter here:

https://brainly.com/question/30809641

#SPJ4

For the execution of a successful information strategy, staff synchronization _____. (Select all that apply.) relies on informed commander's guidance begins at the execution phase of operations requires cross-talk and cross-representation breaks down staff planning into clearly defined major subsets integrates products does not impact actions, words, and images

Answers

For the execution of a successful information strategy, staff synchronization relies on informed commander's guidance.

What is the above about?

A successful information strategy, staff synchronization is one that  depends on informed commander's guidance.

And as such, if one say that For the execution of a successful information strategy, staff synchronization relies on informed commander's guidance. it is a true statement.

Learn more about information strategy from

https://brainly.com/question/8368767

#SPJ1

Where in OuickBooks Online Payroll can you approve time tracked in QuickBooks Time before running payroll? Payroll center > Overview tab > Approve time Gear icon > Payroll settings > Time > Approve time Payroll center > Time tab > Approve time Payroll center > Compliance tab > Approve time

Answers

In QuickBooks Online Payroll, the place where you can approve time tracked in QuickBooks Time before running payroll is the "Payroll center > Time tab > Approve time."

This option can be found in the Payroll Center section. To approve employee hours, follow these simple steps: Click on the Gear icon on the top right corner of your QuickBooks account and choose Payroll Settings. In the Payroll Settings window, click on Time from the left menu bar.

Then, click on the Approve Time option. Under the Approve Time page, select the employee whose time you want to approve for payroll. You can view the employee's name, total hours worked, and the number of hours in each pay period for each pay rate. Once you have reviewed the employee's hours, select the Approve button to approve their time for the current pay period and repeat the process for each employee. QuickBooks Online Payroll makes it easy for you to manage your employees' hours and make sure that payroll is accurate and efficient.

Know more about QuickBooks Online Payroll here:

https://brainly.com/question/32139674

#SPJ11

Select the correct answer.
What needs to be defined throughout an animation sequence to define the start and end points of motion?

A frames
B. characters
C. key frames
D. movement

Answers

i think the answer is c

In what ways is the information provided by a line-item budget useful to the following:
Program manager
Department head
Central budget office
Elected officials
Citizens
How would one substantially address how this information is useful to each entity listed above.

Answers

A line-item budget provides useful information to program managers, department heads, central budget offices, elected officials, and citizens by offering a detailed breakdown of expenses, facilitating accountability, and enabling informed decision-making.

A line-item budget is a financial document that outlines specific expenditure categories and allocated amounts. It is useful to program managers as it allows them to track expenses and ensure that funds are allocated appropriately for their respective programs.

By providing a detailed breakdown of expenses, program managers can effectively manage their budgets, identify areas of overspending or underspending, and make necessary adjustments to optimize resource allocation.

For department heads, the information provided by a line-item budget is essential for monitoring and controlling departmental expenditures. It enables them to assess the financial health of their departments, identify cost-saving opportunities, and ensure compliance with budgetary guidelines.

With this information, department heads can make informed decisions regarding resource allocation, staffing, and program priorities.

Central budget offices rely on line-item budgets to consolidate and analyze financial data from various departments or programs. This information helps them establish a comprehensive overview of the organization's finances, identify trends, and develop long-term financial strategies.

Line-item budgets enable central budget offices to allocate funds strategically, align spending with organizational goals, and ensure efficient use of resources.

Elected officials, such as members of a legislative body or governing board, benefit from line-item budgets as they provide transparency and accountability. By reviewing the detailed breakdown of expenditures, elected officials can assess the effectiveness and efficiency of government programs or organizational initiatives. This information enables them to make informed decisions during budgetary discussions, prioritize funding for critical areas, and hold program managers and department heads accountable for their financial management.

Citizens also find value in the information provided by line-item budgets. It promotes transparency and allows them to understand how public funds are allocated and spent. By having access to a detailed breakdown of expenses, citizens can assess the priorities of their government or organization, hold elected officials accountable for budgetary decisions, and actively participate in discussions regarding resource allocation.

Overall, a line-item budget serves as a valuable tool for program managers, department heads, central budget offices, elected officials, and citizens. It offers a detailed breakdown of expenses, facilitates accountability, and enables informed decision-making, ultimately contributing to efficient resource allocation and effective financial management.

Learn more about line-item budget

brainly.com/question/32249432
#SPJ11

This is an image of the ...................... Topology. * If you get it right i will mark you brainlist ​

This is an image of the ...................... Topology. * If you get it right i will mark you brainlist

Answers

Answer:

Tree

Explanation:

What is a commerce platform?

Answers

Answer:

In basic terms, a commerce platform simply refers to technology that enables a transaction (the commerce bit). The platform part allows you to overlay that technology across various channels such as online and in-store.

Answer:

Explanation:

a commerce platform simply refers to technology that enables a transaction (the commerce bit). The platform part allows you to overlay that technology across various channels such as online and in-store.20 Feb 2017

I need an open response pleaseeeeeee

The format is "Describe‌ ‌the‌ ‌smart‌ ‌home‌ ‌devices‌ ‌impact‌ ‌of‌ ‌technology‌ ‌on education"

Answers

Answer:

Explanation:

Smart Home devices have had a large impact on education. It has allowed students of all ages to better understand the concept of interconnected devices and artificial intelligence. This alone has also opened up a new door of information by allowing for instant answers to question through such smart home devices as Alexa or Home. Which are artificial intelligence virtual assistants.

Please complete the following program according to the specification given. Partial credit will be given for incomplete answers, so provide as much of the answer as you can. Remember that all program segments are to be written in JAVA.

1.Write a method split() which takes an argument String s and prints each character of s with a comma(“,”) in between each character.


Example

split(“1234”) prints: “1,2,3,4”

split(“Hi, Mr. Programmer!”) prints “H,i,,, , M,r,., P,r,o,g,r,a,m,m,e,r,!”

split(“”) prints “”


static public void split(String s) {

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that write a method split() which takes an argument String s and prints each character of s with a comma(“,”) in between each character.

Writting the code:

import java.io.*;

public class Test

{

   public static void main(String args[])

   {

       String Str = new String("Geeks-for-Geeks");

       // Split above string in at-most two strings

       for (String val: Str.split("-", 2))

           System.out.println(val);

       System.out.println("");

 

       // Splits Str into all possible tokens

       for (String val: Str.split("-"))

           System.out.println(val);

   }

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Please complete the following program according to the specification given. Partial credit will be given
Other Questions
First, complete the sentence to show how the figure can be decomposed into triangles and rectangles with the fewest number of pieces.Then find the area of the divisions. Boeing is the world's second-largest commerclal plane-maker after its European rival Airbus. Founded in 1916 in Seattle by William Boeing the company earned $68.3 biltion in revenue in 2009 , split between its defense and commercial airplanes divisions. But when it came time to build the 787, Boeing turned away from its stable of engineers and mechanics to embrace a complex web of suppliers. For the furst time in its history, Boeing would outsource the wing design and manufacturing. The company had planned to make a first test flight of the Dreamliner around late August 2007 and first dellvery in May 2008 , But that target began to slip in 2007 when Boeing postponed the first test flight due to a shortage of bolts and flight control software. Discussion Question: If Boeing's management decided to keep all production in America, what do you think the effect would be on the company, its employees, and the communities that depend on it? Avisiting American executive finds that a foreign subsidiary in a less developed country has hired a 12 year old girt to wark on a factory ficor, in violation of the company's prohibliton on child labor. He telis the local manager to replace the child and tell her to go back to school. The local manager tells the American executive that the child is an orphan with no other means of support, and she will probably become a street child if she is denied work. What should the American executive do? Suppose that: =c0 +c1 =0 + =0T =T0 ( PM) d=Yi ( PM) s=M A. Find the IS curve and LM curve.B. Calculate the equilibrium interest rate and output. Which characteristics of Roman culture were most reflected in its architecture?A. desire for peace rather than warfareB. tolerance of many religions and customsC. strength, discipline, and powerD. modesty and living a simple life Simplify 5.5.5.5Im very confused Que quiere decir Irantzu Varela en su polmica frase " La forma en que follas es poltica" y que tendr que ver con la msica? How much would a box dropped from an airplane weigh if it had 175 N of air resistance acting on it when it reached its terminal velocity?Group of answer choicesA.350 NB.175 NC.Not enough information to tellD.87.5 N 4 (Somebody/take) my wallet while (1/not look). Pls help me I just need the math equation y=mx thing thx! Suppose that this year's money supply is $600 billion, nominal GDP is $15 trillion, and real GDP is $3 trillion. and the velocity of money is The price level is Suppose that velocity is constant and the economy's output of goods and services rises by 3 percent each year. Use this information to answer the questions that follow. If the Fed keeps the money supply constant, the price level will and nominal GDP will True or False: If the Fed wants to keep the price level stable instead, it should increase the money supply by 3% next year. True False %. (Hint: The quantity equation can If the Fed wants an inflation rate of 9 percent instead, it should the money supply by be rewritten as the following percentage change formula: (Percentage Change in M) + (Percentage Change in V)= (Percentage Change in P) + (Percentage Change in Y).) what is a radian measure of a 75 angle? How many hydrogen atoms are in CH4 spikes sports manufacturing company uses a job order costing system to account for its production of specialty golf accessories. on may 31 the company reported the following balances in its inventory accounts: $45,000 in raw materials, $25,000 in work in process, and $15,000 in finished goods. on may 31, the total of all open job order cost sheets would be What is the impact of Citizens United v. FEC (2010)? What is a Super Political Action Committee (PAC)? How can a Super PAC influence an election? What do Super PAC officials typically do in a political campaign? 250 word count Why GDP is not a good measure of progress? If you are willing to pay $21,293.00 today to receive a perpetuity with the first payment occurring next year then the payment must be Assume a 15.00% discount rate. Answer format: Currency: Round to: 2 decimal places. International accounting standards? are required for successful international trade make it easy for an international marketer to rely on global balance sheets and income statements all follow gaap regulations do not exist are supervised by a special agency of the united nations 28 cm45 cmWhat is the length of the hypotenuse? help with number one please A step in the selling process that concerned with identifying firms and people most likely to buy the sellers offerings is called?