Which of the following is part of a person's digital footprint? *
Comments and pictures posted
Search history and App use
Music choice and emails sent
All of the above

Answers

Answer 1
All of the above is the answer

Related Questions

What are some text effects found in WordArt gallery? Check all that apply

Bevel
Glitter
Reflection
Shadow
Shine
Soft edges

Answers

Depending on the version of Microsoft Word or Office, the text effects seen in the WordArt collection may change. Keep in mind that the text effects "Glitter" and "Shine" are not frequently used ones in the WordArt gallery.

What text effects can be seen in the WordArt gallery?

Each style in the WordArt exhibition was produced by combining several text effects found in Word. You can change the text effects or use different text effects after adding WordArt to the text. Glow, reflection, 3D, morphing, shadow, and bevel are a some of the effects.

What kinds of text effects are there?

Choose either text or WordArt. Go to Home > Text Effects. Click the desired effect. Point to Outline, Shadow, and Other for further options.

To know more about Microsoft visit:-

https://brainly.com/question/26695071

#SPJ1

Page orientation is determined in Microsoft Word from the __________ tab

Answers

Answer:

Page orientation is determined in Microsoft Word from the Page Layout tab.

Explanation:

The Page Layout Tab holds all the options that allow you to arrange your document pages just the way you want them. You can set margins, apply themes, control of page orientation and size, add sections and line breaks, display line numbers, and set paragraph indentation and lines.

Given the following instruction frequency and CPIs for a given program running on a current generation computer:


Instruction Type Instruction Frequency CPI

Simple ALU (ADD, SUB, ORR, AND, etc.) 0.3 2

Complex ALU (MUL, DIV, FP) 0.1 3

Memory operations (LDUR, STUR, etc.) 0.4 4

Control Flow (CBZ, CBNZ, B, BL, BR, etc.) 0.2 9


This machine has a frequency of 5GHz Imagine that as a computer designer, you can either (a) improve the memory performance by 1 cycle or (b) improve the branch performance (i.e., control flow instructions) by 1 cycle. How much speed up will we have for option (a) with respect to option (b)?

Answers

For option (a), improving memory performance by 1 cycle would reduce the CPI for memory operations from 4 to 3. Therefore, the speedup achieved would be 4/3.

To calculate the speedup, we need to consider the impact of improving memory performance and branch performance separately.

Option (a) improves memory performance by 1 cycle. This means that the CPI for memory operations (currently 4) would be reduced to 3. The instruction frequency for memory operations is 0.4.

For memory operations:

CPI_after = 3

Instruction_frequency = 0.4

Now, let's calculate the total CPU cycles required for memory operations before and after the improvement:

CPU_cycles_before = Instruction_frequency * CPI_before = 0.4 * 4 = 1.6

CPU_cycles_after = Instruction_frequency * CPI_after = 0.4 * 3 = 1.2

The speedup achieved for memory operations would be:

Speedup_a = CPU_cycles_before / CPU_cycles_after = 1.6 / 1.2 = 4/3

Option (b) improves branch performance by 1 cycle. This means that the CPI for control flow instructions (currently 9) would be reduced to 8. The instruction frequency for control flow is 0.2.

For control flow instructions:

CPI_after = 8

Instruction_frequency = 0.2

Similar to the calculation for memory operations, we can calculate the total CPU cycles required for control flow instructions before and after the improvement:

CPU_cycles_before = Instruction_frequency * CPI_before = 0.2 * 9 = 1.8

CPU_cycles_after = Instruction_frequency * CPI_after = 0.2 * 8 = 1.6

The speedup achieved for control flow instructions would be:

Speedup_b = CPU_cycles_before / CPU_cycles_after = 1.8 / 1.6 = 9/8

Comparing the two speedup values, we find that Speedup_a (memory improvement) is greater than Speedup_b (branch improvement). Therefore, option (a) would result in a higher speedup compared to option (b).

Learn more about  memory here: brainly.com/question/14829385

#SPJ11

50 POINTS!!!!!!!!!!!

Give at least two examples of how the transport layer is used.

Answers

Answer:

The transport layer is responsible for delivering data to the appropriate application process on the host computers. Some transport layer protocols, for example TCP, but not UDP, support virtual circuits, i.e. provide connection-oriented communication over an underlying packet-oriented datagram network.

Explanation:

Some transport layer protocols, for example TCP, but not UDP, support virtual circuits, i.e. provide connection-oriented communication over an underlying packet-oriented datagram network.

Answer:

1. The transport layer is responsible for delivering data to the appropriate application process on the host computers. and 2. Some transport layer protocols, for example TCP, but not UDP, support virtual circuits, i.e. provide connection-oriented communication over an underlying packet-oriented datagram network.

-CC

Which of the following is true about RISC CPU hardware?
Group of answer choices
it is more complicated and must run at slower clock speeds
all current CPUs are based on it
it typically uses a technique called pipelining
it cannot run in small devices like smartphones

Answers

RISC CPU hardware typically uses a technique called pipelining, but it is not true that all current CPUs are based on it or that it cannot run in small devices like smartphones.

RISC (Reduced Instruction Set Computer) CPU hardware is characterized by its simplified instruction set architecture, which aims to improve performance and efficiency. While it is true that RISC CPUs often utilize a technique called pipelining, which allows for the concurrent execution of multiple instructions, it is not true that all current CPUs are based on RISC architecture. In fact, there are different types of CPU architectures, including RISC and CISC (Complex Instruction Set Computer), with each having its own advantages and design considerations.

Regarding the claim that RISC CPUs cannot run in small devices like smartphones, this is false. RISC-based CPUs are commonly used in various devices, including smartphones and other mobile devices. In fact, many smartphone processors, such as those based on ARM architecture, utilize RISC principles for efficient and power-conscious operation. RISC CPUs are well-suited for mobile devices due to their ability to perform tasks quickly and efficiently while minimizing power consumption. Their design principles align well with the requirements of mobile computing, enabling smartphones to deliver high performance and extended battery life.

It's important to note that CPU architecture choices depend on various factors, including performance goals, power efficiency, and design trade-offs. While RISC CPUs have their advantages, they are not the exclusive choice for all computing devices, and different architectures may be more suitable depending on the specific requirements of the device or system.

Learn more about CISC : brainly.com/question/13266932

#SPJ4

Murphy communications has been running a vlan-managed network to connect different devices. you as a network analyst want to assign a name to the vlan network, but you are unable to do so. what kind of vlan is most likely being used in the organization?

Answers

The kind of VLAN likely to be used in this organization is  Default VLAN

VLAN stands for Virtual Local Area Network. Default VLAN

Following the switch's initial bootup, all switch ports join the default VLAN. The broadcast domain is shared by all of these ports because they participate in the default VLAN. As a result, any device on any port can communicate with devices on other switch ports.

Any untagged data packets will be tagged with the default VLAN tag on ports with a configured default VLAN. Also, before leaving these ports, incoming data packets with the default VLAN tag will be untagged.

Configuring all switches' ports to be associated with VLANs other than VLAN 1 is a security best practice. Usually, to do this, all open ports are given to a black hole VLAN that is not used for any network activities.

learn more about Default VLAN here: https://brainly.com/question/5789383

#SPJ4

the entity relationship model toward a unified view of data

Answers

The Entity-Relationship Model (ER Model) is a data model that is used to represent the conceptual schema of a system. It describes the entities, attributes, and relationships between entities in a system.

The ER Model is widely used in database design because it helps to provide a unified view of data in an organization. The ER Model consists of three components: Entities, attributes, and relationships. An entity is anything that is recognizable and unique within a system. An attribute is a characteristic of an entity. It describes a particular aspect of an entity that is of interest to the organization. Relationships describe the associations between entities. They provide a means of capturing the way in which entities relate to each other.

The ER Model is particularly useful because it allows organizations to create a unified view of data. This means that data is consistent and integrated across all systems in the organization. It is also useful because it provides a graphical representation of the data, which can be easily understood by stakeholders. This makes it easier to communicate and share information about the data within the organization.

Learn more about Entity-Relationship Model: https://brainly.com/question/14424264

#SPJ11

help me and i'll mark brainliest

help me and i'll mark brainliest

Answers

Answer: Help you with what

Explanation: This is so random lol but i guess im getting brain points or sum like that

A number of technical mechanisms—digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media—have been used to deter or prevent the theft of software intellectual property.

Answers

Answer:

The given statement is "True".

Explanation:

Software property ownership seems to be computer programs or law-protected software whether, under a licensing, company name, proprietary information, or software commercialization.Collaborate, and operate for a deeper understanding or analysis of the important technological processes and trade-offs throughout collaborative consumption developing future as well as integrated frameworks.

.Which of the following is not one of the major categories (or sub-categories) into which network security threats can be placed?a. disruptionb. destructionc. controlled chaosd. intrusione. disaster

Answers

The category "controlled chaos" is not one of the major categories (or sub-categories) into which network security threats can be placed. Option C is answer.

The major categories of network security threats typically include disruption, destruction, intrusion, and disaster.

Disruption refers to threats that aim to interrupt or disrupt the normal functioning of a network or system, causing service outages or denial of service.

Destruction involves threats that intend to destroy or damage data, systems, or infrastructure, often resulting in data loss or system failure.

Intrusion refers to unauthorized access or entry into a network or system by malicious actors, who may steal information, compromise security, or perform malicious activities.

Disaster encompasses threats that arise from natural disasters or catastrophic events, such as fires, floods, or earthquakes, which can cause severe damage to network infrastructure.

Therefore, the correct option is c. controlled chaos.

You can learn more about controlled chaos at

https://brainly.com/question/10116003

#SPJ11

A(n) is done to evaluate a design’s feasibility, technical completeness, and compliance. A(n) is done between the detail design and the creation of prototypes.

Answers

The process being described is a design review.

What is a Design Review?

A design review is a systematic and formal evaluation of a design to determine its technical completeness, feasibility, compliance with requirements, and potential issues that may affect its performance.

This review is conducted by a team of experts who examine the design documentation, drawings, specifications, and other relevant materials to identify any potential problems before creating prototypes. A design review can help ensure that the final product meets the desired specifications and is successful in the market.

Read more about design review here:

https://brainly.com/question/14306961

#SPJ1

What is the error if I want to assign a value to that same index? i.e. var_str[5] = “r”

PLEASE QUICK

Answers

The program would not generate an error if the var_str list have up to 5 elements

How to determine the error?

The operation is given as:

Assign a value to that same index

This is represented as:

var_str[5] = "r"

The representations from the above code segment are

List = var_strIndex = 5Value = "r"

When a value is assigned to an index, the value at the index is updated to the new value, provided that the index exists in the list.

This means that the program would not generate an error if the var_str list have up to 5 elements

Read more about list at:

https://brainly.com/question/27094056

#SPJ1

open the downloaded laundryusurvey.xlsx file. on the q1 worksheet, in cell e2, enter a function that calculates how many students answered yes to the survey using the data in cell b2:b101.

Answers

By using the COUNTIF function, you can easily calculate how many students answered yes to the survey. The explanation provided above should help you understand how to perform this calculation on the q1 worksheet in the laundryusurvey.xlsx file.

To answer your question, you need to open the downloaded laundryusurvey.xlsx file and navigate to the q1 worksheet. Once you are on the q1 worksheet, locate cell E2, and enter a function that calculates how many students answered yes to the survey using the data in cell B2:B101.
To do this, you can use the COUNTIF function, which counts the number of cells in a range that meet a specific condition. In this case, the condition is "Yes," which is the answer students gave in response to the survey.
The formula should look like this: =COUNTIF(B2:B101,"Yes")
Once you have entered this formula into cell E2, it will automatically calculate the number of students who answered yes to the survey.


To know more about worksheet visit:

brainly.com/question/13129393

#SPJ11

Exercise #3: Write a program that finds all students who score the highest and lowest average marks of the first two homework in CS (I). Your program should read the data from a file called " "

Answers

To find students with the highest and lowest average marks in the first two CS (I) homework, read data from a file, calculate averages, and print the corresponding student names using the provided Python code.

To write a program that finds all students who score the highest and lowest average marks of the first two homework in CS (I),

Read data from the file.First of all, the program should read data from a file. The file name is " ". Calculate the average of the first two homework for each student. Then the program should calculate the average of the first two homework for each student, and store it in a dictionary with the student's name as the key.Find the highest and lowest averages.After that, the program should find the highest and lowest averages and the corresponding student names.Print the names of the students who have the highest and lowest average marks.Finally, the program should print the names of the students who have the highest and lowest average marks.

Below is the Python code that can be used to find the students who score the highest and lowest average marks of the first two homework in CS (I):

```python#open the filefile = open('filename', 'r')#initialize a dictionary to store the average of first two homework marks for each studentdata = {}#iterate through each line of the filefor line in file:#split the line into a list of valuesvalues = line.strip().split()#get the student's name and the first two homework marksname = values[0]marks = [int(x) for x in values[1:3]]#calculate the average of the first two homework marksaverage = sum(marks)/len(marks)#store the average in the dictionarydata[name] = average#find the highest and lowest averageshighest = max(data.values())lowest = min(data.values())#find the students with the highest and lowest averageshighest_students = [name for name, average in data.items() if average == highest]lowest_students = [name for name, average in data.items() if average == lowest]#print the names of the studentsprint('Students with highest average:', ', '.join(highest_students))print('Students with lowest average:', ', '.join(lowest_students))```

Note: Replace the 'filename' with the actual name of the file that contains the data.

Learn more about Python code: brainly.com/question/26497128

#SPJ11

congress are smart becuase.....

Answers

Answer:

If we are talking about government then they are smart bc of there two house policies, both are equal yet super unique. They make sure each state has an equal voice in the senate.

Use python

You will write two functions in this challenge. First write a function called rec_dig_sum that takes in an integer and returns the recursive digit sum of that number.

Examples of recursive digit sums:

101 => 1+0+1 = 2

191 => 1+9+1 = 11 => 1+1 = 2

5697 => 5+6+9+7 = 27 => 2+7 = 9

Then use that function within another function called distr_of_rec_digit_sums, that returns a dictionary where the keys are recursive digit sums, and the values are the counts of those digit sums occurring between a low and high (inclusive) range of input numbers. Assume low and high are positive integers where high is greater than low, and neither low nor high are negative. Your function should return a dictionary, not just print it.

code

def rec_dig_sum(n):

'''

Returns the recursive digit sum of an integer.

Parameter

---------

n: int

Returns

-------

rec_dig_sum: int

the recursive digit sum of the input n

'''

pass

def distr_of_rec_digit_sums(low=0, high=1500):

'''

Returns a dictionary representing the counts

of recursive digit sums within a given range.

Parameters

----------

low: int

an integer, 0 or positive, representing

the lowest value in the range of integers

for which finding the recursive digit sum

high: int

a positive integer greater than low, the

inclusive upper bound for which finding

the recursive digit sum

Returns

-------

dict_of_rec_dig_sums: {int:int}

returns a dictionary where the keys are

the recursive digit sums and the values

are the counts of those digit sums occurring

'''

pass

Answers

Based on the fact that there  two functions in this challenge.the function called rec_dig_sum that takes in an integer and returns the recursive digit sum of that number is given in the document attached.

What is the functions about?

The  rec_dig_sum(n) function  is known to be one that tends to takes an integer n as a form of an input and it is one that often tends to calculates the amount of the  recursive digit sum of that said or given number.

Note that for it to be able to do this, it has to change the integer to a string in order to access individual digits. It is one that will then also uses a recursive method to be able to calculate the amount of digits.

Learn more about functions from

https://brainly.com/question/17043948

#SPJ4

Your employer has asked you to create a
presentation for a new product demonstration. You
are asked to include a slide that will show the
specs of your company's product stacked up
against specs of a competitor's product. Which
slide layout should you choose to
do this?
Otitle slide
O section header
Opicture with caption
O comparison

Answers

comparison bc you are showing your company’s products against other competitors products

1. Describe what the global codex is and what is the significance of having a code. Include the law that required employers to implement a code of conduct

Answers

A code of ethics is a set of guiding ideals meant to assist professionals in acting honorably and honestly at work.

A code of ethics statement may cover a variety of subjects, such as an organization's mission and core values, the standards of professionalism to which they are held, the best approach for professionals to manage difficulties, and other subjects. An "ethical code," also called a code of ethics, can address issues like business ethics, professional practice standards, and employee conduct policies. Often times, both businesses and trade associations ask their employees and members to follow by some sort of code of ethics. A transgression of the organization's code of ethics may result in termination or dismissal.

Learn more about code here-

https://brainly.com/question/17293834

#SPJ4

to help ensure that an html document renders well in many different web browsers

Answers

Answer:

Doctype Declaration

Explanation:

In order to make sure that it renders correctly in a wide range of browsers, a Doctype Declaration needs to be added to the top of the HTML code. This declaration basically makes sure that the web browser knows how the code was written so that it can correctly read it. This is used because many web browsers use different default settings for reading code and can sometimes not display code that was not designed specifically for that web browser unless otherwise specified.

Answer:

I think it is:

B. a doctype declaration

Explanation:

2. Which pattern microphone should Jennifer take to the press conference? Jennifer is a journalist with one of the leading newspapers in LA. She has been assigned the coverage of a press conference for the launch of a latest phone. She placed her microphone right in front of the speaker. Her boss had asked her to take a ______ microphone.​

Answers

Answer:

dynamic

Explanation:

1.
gear ratio:
gear ratio
2.
input:
input
3.
inverse:
inverse
4.
mechanism:
mechanism
5.
output:
output
6.
simple gear train:
simple gear train
7.
torque:
torque
Column B
a.a combination of two or more gears used to transmit motion between two rotating shafts or between a shaft and a slide
b.information fed into a system
c.the information produced by a computer or a system
d.the ratio of the speed of the driving member of a gear train to that of the driven member
e.opposite in position, direction, order, or effect
f.twisting force
g.the part of a machine which contains two or more pieces arranged so that the motion of one compels the motion of the others PLZ HELP WILL GIVE BRAINLIST

1.gear ratio:gear ratio2.input:input3.inverse:inverse4.mechanism:mechanism5.output:output6.simple gear

Answers

Answer:

1- D

2-B

3- E

4- G

5-C

6-A

7-F

Explanation:

I am not completely sure if this is right but I think most answers are right

What is the name of the item that supplies the exact or near exact voltage at the required wattage to all of the circuitry inside your computer?

Answers

Answer:

It's the power supply

Explanation:

The power supply is what essentially enables the computer to operate. It is able to do that by converting the incoming alternating current (AC) to direct current (DC) at the correct wattage rating that is required by the computer to function. The power supply is a metal box that is generally placed in the corner of the case.

which type of attack is wep extremely vulnerable to?

Answers

WEP is extremely vulnerable to a variety of attack types, including cracking, brute-force, IV (Initialization Vector) attack, and replay attack.

What is Initialization Vector?

An Initialization Vector (IV) is a random number used in cryptography that helps to ensure the uniqueness and randomness of data used in an encryption process. The IV is typically used as part of an encryption algorithm, where it is combined with a secret key to encrypt a message. The IV is unique for each encryption session, and must be unpredictable and non-repeating. A good IV should not be reused across multiple encryption sessions, and it should be kept secret from anyone who does not have access to the decryption key. Without a good IV, a cryptographic system can be vulnerable to attacks such as replay attacks, where an attacker can gain access to the system by repeating an encrypted message.

To learn more about Initialization Vector
https://brainly.com/question/27737295
#SPJ4

write the method heading for a method called larger that accepts 2 integer arrays and returns the array with the larger number of elements.

Answers

Writing a function to compute the average of the even numbers in the array is required for this application.

The percentage function When given an array of integers as a parameter or argument, even prints the average of the even numbers. The code below implements the aforementioned functionality in Python, and the code's output is also included. In computer science, an array is a group of objects (values or variables). At least one array index or key is used to uniquely identify each element. Given its index tuple, a mathematical formula can determine each element's location in an array. The simplest basic type of data structure is a linear array, sometimes known as a one-dimensional array. Since a two-dimensional grid can theoretically be used to represent a matrix, two-dimensional arrays are occasionally referred to as "matrices."

Learn more about array here:

https://brainly.com/question/28945807

#SPJ4

What can designers use multimedia authoring tools for?

What can designers use multimedia authoring tools for?

Answers

Answer:

A. creating and editing video

A color mark is considered to be one of four types of marks
used to try to protect intellectual property.
Select one:
© True
© False

Answers

Answer: I believe the answer is false.

Explanation: look at the examples in the picture bellow and the picture bellow color mark is not considered to be four types of marks.

A color mark is considered to be one of four types of marksused to try to protect intellectual property.Select
A color mark is considered to be one of four types of marksused to try to protect intellectual property.Select

Distinguish between the savings and investment options.
Savings
Investments
mutual hd
money market
gold
certificate of deposit
account​

Answers

Answer:

Savings,                          Investments

\({}\)Certificate of deposit    Mutual fund

\({}\)Account                         Money Market

\({}\)                                        Gold

Explanation:

Savings is the term used to describe the proportion of ones income not spent or kept for spending at a much later date;

Saving methods includes saving money in deposit accounts, pension savings, and cash savings as well as reducing expenditures

Savings differs from investment in the sense that investments involves more risks than savings

Mutual fund

Mutual fund is a financial resource type involving the bringing together of funds gathered from several investors for investment

Money market

The money market involves buying and selling debt investments that are short terms

Gold

Gold investment is a way of diversifying risk through futures and derivatives and futures contracts

Certificate Deposit

Certificate deposit is a fixed term deposit form of savings that provides an interest on the deposit

Account

Savings and current account are meant for saving funds

When designing wireless networks, two concepts often conflict. What are they? (Choose two) a. Security and speed b. Range and reliability c. Compatibility and performance
d. Capacity and coverage

Answers

When designing wireless networks, two concepts that often conflict are: a. Security and speed d. Capacity and  coverage

The two concepts that often conflict when designing wireless networks are 1. Security and speed: The more secure a wireless network is, the slower its speed may become. This is because implementing security measures like encryption and authentication require additional processing time, which can reduce the overall speed of the network.2. Range and reliability: Wireless networks that have a greater range may not always be reliable, as signals may become weaker or experience interference over longer distances. On the other hand, networks that prioritize reliability may have a limited range due to the need for strong, consistent signals.

Learn more about wireless networks here;

https://brainly.com/question/31630650

#SPJ11

Some people worry that there won’t be enough jobs in the future because computers will be able to do everything better than people can. Do you think that will happen? Why or why not? pls explain

Answers

Answer: I think it will because there are cars that Drive by there self

Explanation:

Jason is working on a Microsoft Excel worksheet and he wants to create a Print Preview shortcut. His teacher asks him to access the Customization option to create the new shortcut. Which two tabs should Jason select to place the Print Preview shortcut on the worksheet toolbar?
A.
New Tab (Custom) and New Group (Custom)
B.
New File Tab (Custom) and New Tab (Custom)
C.
New Custom Group and New Command
D.
New Custom Tab and New Command

Jason is working on a Microsoft Excel worksheet and he wants to create a Print Preview shortcut. His

Answers

Answer:

it's definitely B I asked my brother

Other Questions
Please Real answers!Jamie is going to a job interview at a bank. She has been on the lake all day and is wearing a short summer dress. In order to be dressed appropriately for her job interview, what should Jamie do?A.) Jamie is dressed appropriately already so she can just go as she is.B.)Jamie needs to go home and get some high heels to go with the dress.C.)Jamie should change into a more modest dress so that she looks professional.D.) Jamie must purchase a business suit for her interview. The perimeter of a polygon is 96 ft.Write and solve an equation to find m. A hot air balloon has a altitude of 100 1/2 If you can buy four bulbs of elephant garlicfor $8 then how many can you buy with$72.50? ASAP!!! What are two reasons teachers should use a variety of teaching techniques? Find the indicated probability using the standard normal distribution. P(z>0.58) Click here to view page 1 of the standard normal table. Click here to view page 2 of the standard normal table. P(z>0.58)= (Round to four decimal places as needed.) A model is a formal description of a scientific hypothesis. Which of the following types of models provides the most precise description of a hypothesis? A. verbal B. graphical C. mathematical D. All of the above are equally precise Jobs, Inc. has recently started the manufacture of Tri-Robo, a three-wheeled robot that can scan a home for fires and gas leaks and then transmit this information to a smartphone. The cost structure to manufacture 20,800 Tri-Robo's is as follows. CostDirect materials ($50 per robot) $1,040,000Direct labor ($40 per robot) 832,000Variable overhead ($6 per robot) 124,800Allocated fixed overhead ($29 per robot) 600,000Total $2,596,800Jobs is approached by Tienh Inc., which offers to make Tri-Robo for $115 per unit or $2,392,000. Following are independent assumptionsAssume that none of the fixed overhead can be avoided. However, if the robots are purchased from Tienh Inc., Jobs can use the released productive resources to generate additional income of $375,000. (Enter negative amounts using either a negative sign preceding the number e.g. -45 or parentheses e.g. (45).) Make Buy Net IncomeIncrease(Decrease)Direct materials $ $ $Direct labor Variable overhead Fixed overhead Opportunity cost Purchase price Totals $ $ $Based on the above assumptions, indicate whether the offer should be accepted or rejected?The offer should be _____ which action is appropriate to enhance a child's self-esteem? After graduating from college in 2010, Art Major\'s starting salary is $45757.00. Suppose Art Major has a cost of living adjustment (COLA) clause, i.e. an escalator clause in his labor contract so that he will be able to maintain this same level of purchasing power in real terms in 2011 and 2012. Using the information in the table below, how much will Art Major be earning in 2011 and 2012 if his salary keeps up with inflation? Round your answers to the nearest dollar.Year 2010 101.57Year 2011 104.90Year 2012 108.04What is Art's Salary in 2011? 2012? Could someone please help me? I'm lost on how to solve this.here is the multiple-choice for the question:A) $21.83B) $21.65C) $22.37D) $22.08 DUE TODAY: How do your two selected body systems interact with one another under normal conditions on Earth to help the human body function efficiently? two selected body systems: immune system, lungs and respiratory system what are three basic types of tangible and intangible ownership-specific advantages? Write a system of equations to describe the situation below, solve using substitution, and fill in the blanks.Anthony plans to attend the Hancock County Fair and is trying to decide what would be a better deal. He can pay $39 for unlimited rides, or he can pay $12 for admission plus $1 per ride. If Anthony goes on a certain number of rides, the two options wind up costing him the same amount. What is that cost? How many rides is that? the ____ property of a requiredfieldvalidator object contains the message that reminds the user to complete all required fields. several companies realize that there is a market for software that helps libraries manage the lending of digital books. one small company develops a product and begins marketing it before any of its competitors. which strategy is this company using? identifying a niche in an established market identifying a new market exploiting a first-mover advantage Please help me!!!! I need it ASAP Please i just need help What blessing did God give Moses? In one week, a bakery made 1,244 trays of 26 chocolate chip cookies. The bakery also baked 694 trays of 19 sugar cookies. How many cookies did the bakery bake during the week?