Write any three different between system software and application software​

Answers

Answer 1

Answer:system software is used to operate computer hardware while application software is used to perform specific task

Explanation:

Answer 2
Difference between system software and application software :

1.) System software is used for operating computer hardware. On other hand Application software is used by user to perform specific task.

2.) Low level languages are used to write the system software. While high level languages are used to write the application software.

3.) System Software a general purpose software. While application software a specific purpose software.

4.) Without system software, system can’t run. While without application software system always runs.

5.) System software runs when system is turned on and stop when system is turned off. While application software runs as per the user’s request.

6.) System Software programming is complex than application software. Application software programming is simpler as comparison to system software.

HOPE IT HELPS

PLEASE MARK ME BRAINLIEST ☺️


Related Questions

upward communication flows from_ to_ a) superior to superior b)superior to subordinate c)subordinate to superior d)​

Answers

The term upward communication flows from option c) subordinate to superior.

What is the flow of upward communication?

Upward Communication is known to be the act oof information transmitting or flowing from the smallest  levels of a hierarchy to the highest levels

Note that This type of communication is said to be more popular in firms as traditional forms of communication. According to Ricky W. Griffin, “Upward communication is made up of messages that is given  from subordinates to superior.”

Upward Communication is the act of information passing from the lower levels that pertains to a hierarchy to that of the  upper levels. This type of communication is said to be used by  organizations in their workings.

Hence, The term upward communication flows from option c)subordinate to superior.

Learn more about communication from

https://brainly.com/question/26152499

#SPJ1

Which type of query enables a user to move, append, or update matching records in a table?
action query
select query
static query
parameter query

Answers

Answer:

the query that allows these things is called an action query

Answer:

The answer is A-action query just finshed the review on edg 2021

Explanation:

Discuss the decidability/undecidability of the following problem.
Given Turing Machine , state of and string ∈Σ∗, will input ever enter state ?
Formally, is there an such that (,⊢,0)→*(,,)?

Answers

Note that in the caseof the problem described, there is no algorithm that can determine with certainty whether   a given Turing machine, state, and input string will ever enter a specific state.

How is this so?

The problem of determining whether a given Turing machine, state, and string will ever enter a specific state is undecidable.

Alan Turing's   halting problem proves that thereis no algorithm that can always provide a correct answer for all inputs.

Due to the complex and unpredictable   behavior of Turing machines, it is impossible todetermine if a state will be reached in a general case.

Learn more about Turning Machine at:

https://brainly.com/question/31771123

#SPJ1

Build an NFA that accepts strings over the digits 0-9 which do not contain 777 anywhere in the string.

Answers

To construct NFA that will accept strings over the digits 0-9 which do not contain the sequence "777" anywhere in the string we need the specific implementation of the NFA which will depend on the notation or tool used to represent NFAs, such as state diagrams or transition tables.

To build an NFA (Non-Deterministic Finite Automaton) that accepts strings over the digits 0-9 without containing the sequence "777" anywhere in the string, we can follow these steps:

Start by creating the initial state of the NFA.

Add transitions from the initial state to a set of states labeled with each digit from 0 to 9. These transitions represent the possibility of encountering any digit at the beginning of the string.

From each digit state, add transitions to the corresponding digit state for the next character in the string. This allows the NFA to read and accept any digit in the string.

Add transitions from each digit state to a separate state labeled "7" when encountering the digit 7. These transitions represent the possibility of encountering the first digit of the sequence "777".

From the "7" state, add transitions to another state labeled "77" when encountering another digit 7. This accounts for the second digit of the sequence "777".

From the "77" state, add transitions to a final state when encountering a third digit 7. This represents the completion of the sequence "777". The final state signifies that the string should not be accepted.

Finally, add transitions from all states to themselves for any other digit (0-6, 8, 9). This allows the NFA to continue reading the string without any constraints.

Ensure that the final state is non-accepting to reject strings that contain the sequence "777" anywhere in the string.

In conclusion, the constructed NFA will accept strings over the digits 0-9 that do not contain the sequence "777" anywhere in the string. The specific implementation of the NFA will depend on the notation or tool used to represent NFAs, such as state diagrams or transition tables.

For more such questions on NFA, click on:

https://brainly.com/question/30846815

#SPJ8

briefly list four of the basic I/O interface standard? ​

Answers

Four of the basic I/O interface standard are PCI, SCSI, USB and ISA.

Standard I/O Interface

Input-Output Interface is used as an method which helps in transferring of information between the internal storage devices. A number of standards have been developed for I/O Interface.

There widely used bus standards are:

PCI (Peripheral Component Interconnect) SCSI (Small Computer System Interface), and USB (Universal Serial Bus). ISA (Industry Standard Architecture)

Find out more on Standard I/O Interface at: https://brainly.com/question/24347579

With suitable example, illustrate the use of #ifdef and #ifndef.

Answers

Partitions are used to divide storage spaces into manageable segments.

Fixed partitions have a predetermined size, and they are used to allocate storage space based on the needs of an application. Fixed partitions are commonly used in mainframe systems, where applications require predictable amounts of storage.

For example, consider an organization that uses a mainframe system to manage its payroll. In this scenario, the organization may use fixed partitions to allocate storage space to the payroll application, ensuring that it has access to a specific amount of storage space at all times.

On the other hand, dynamic partitions allow the operating system to allocate storage space based on the requirements of an application. With dynamic partitions, the size of the partition is not fixed, and it can grow or shrink based on the needs of an application.

For example, consider a personal computer that is used to store and manage different types of data. In this scenario, dynamic partitions are used to allocate storage space to different applications based on their storage requirements.

As new applications are installed, the operating system dynamically allocates storage space to ensure that each application has sufficient storage space to function properly.

To know more about Partitions visit:

brainly.com/question/31672497

#SPJ1

As you know computer system stores all types of data as stream of binary digits (0 and 1). This also includes the numbers having fractional values, where placement of radix point is also incorporated along with the binary representation of the value. There are different approaches available in the literature to store the numbers having fractional part. One such method, called Floating-point notation is discussed in your week 03 lessons. The floating point representation need to incorporate three things:
• Sign
• Mantissa
• Exponent

A. Encode the (negative) decimal fraction -9/2 to binary using the 8-bit floating-
point notation.
B. Determine the smallest (lowest) negative value which can be
incorporated/represented using the 8-bit floating point notation.
C. Determine the largest (highest) positive value which can be
incorporated/represented using the 8- bit floating point notation.

Answers

Answer:

A. Encode the (negative) decimal fraction -9/2 to binary using the 8-bit floating-point notation.

First, let's convert -9/2 to a decimal number: -9/2 = -4.5

Now, let's encode -4.5 using the 8-bit floating-point notation. We'll use the following format for 8-bit floating-point representation:

1 bit for the sign (S), 3 bits for the exponent (E), and 4 bits for the mantissa (M): SEEE MMMM

Sign bit: Since the number is negative, the sign bit is 1: 1

Mantissa and exponent: Convert -4.5 into binary and normalize it:

-4.5 in binary is -100.1. Normalize it to get the mantissa and exponent: -1.001 * 2^2

Mantissa (M): 001 (ignoring the leading 1 and taking the next 4 bits)

Exponent (E): To store the exponent (2) in 3 bits with a bias of 3, add the bias to the exponent: 2 + 3 = 5. Now, convert 5 to binary: 101

Now, put the sign, exponent, and mantissa together: 1101 0010

So, the 8-bit floating-point representation of -9/2 (-4.5) is 1101 0010.

B. Determine the smallest (lowest) negative value which can be incorporated/represented using the 8-bit floating-point notation.

To get the smallest negative value, we'll set the sign bit to 1 (negative), use the smallest possible exponent (excluding subnormal numbers), and the smallest mantissa:

Sign bit: 1

Exponent: Smallest exponent is 001 (biased by 3, so the actual exponent is -2)

Mantissa: Smallest mantissa is 0000

The 8-bit representation is 1001 0000. Converting this to decimal:

-1 * 2^{-2} * 1.0000 which is -0.25.

The smallest (lowest) negative value that can be represented using the 8-bit floating-point notation is -0.25.

C. Determine the largest (highest) positive value which can be incorporated/represented using the 8-bit floating-point notation.

To get the largest positive value, we'll set the sign bit to 0 (positive), use the largest possible exponent (excluding infinity), and the largest mantissa:

Sign bit: 0

Exponent: Largest exponent is 110 (biased by 3, so the actual exponent is 3)

Mantissa: Largest mantissa is 1111

The 8-bit representation is 0110 1111. Converting this to decimal:

1 * 2^3 * 1.1111 which is approximately 1 * 8 * 1.9375 = 15.5.

The largest (highest) positive value that can be represented using the 8-bit floating-point notation is 15.5.

Explanation:

How to code for a database?​

Answers

Answer: How to code for a database?​ A database is an organized collection of data, generally stored and accessed electronically from a computer system. Where databases are more complex they are often developed using formal design and modeling techniques.

WWW. Wikipedia.com

Explanation: When creating a database first you need to make a software program then you need to start planing on what to do ...

{ A database management program (DBMS) is a software package design designed to manipulate, define, retrieve, and manage data in database.

A DBMS generally manipulates the data itself, the the data format, field names, record structure and file structure.}

HoPe ThIs HeLpS YoU!!

Python (and most programming languages) start counting with 0.
True
False

Answers

True....................

Answer:

yes its true  :)

Explanation:

Please Help I'm Very Stressed, my school is holding a competition of making the best video game and the winner gets 1000$ and I really want 1000$, the problem is that I can't make any good games or don't have any ideas for anything the game has to have lore and a plot and characters and it's really stressing so please help me get a idea or something easy enough to make

Answers

Answer:

make a game like fun run

Explanation:

Answer:

u should make an competive game where people battle each other sorry if i cant spell good its cause im rushing

Explanation:

What is the final step in the diagnostic process

Answers

Answer:

Reaching a final diagnosis. consultation (referral to seek clarification if indicated) providing discharge instructions, monitoring, and follow-up. documenting these steps and the rationale for decisions made.

Sending referrals or consultations is the last step.

thenks and mark me brainliestt :))

In JAVA with comments: Consider an array of integers. Write the pseudocode for either the selection sort, insertion sort, or bubble sort algorithm. Include loop invariants in your pseudocode.

Answers

Here's a Java pseudocode implementation of the selection sort algorithm with comments and loop invariants:

```java

// Selection Sort Algorithm

public void selectionSort(int[] arr) {

   int n = arr.length;

   for (int i = 0; i < n - 1; i++) {

       int minIndex = i;

       // Loop invariant: arr[minIndex] is the minimum element in arr[i..n-1]

       for (int j = i + 1; j < n; j++) {

           if (arr[j] < arr[minIndex]) {

               minIndex = j;

           }

       }

       // Swap the minimum element with the first element

       int temp = arr[minIndex];

       arr[minIndex] = arr[i];

       arr[i] = temp;

   }

}

```The selection sort algorithm repeatedly selects the minimum element from the unsorted part of the array and swaps it with the first element of the unsorted part.

The outer loop (line 6) iterates from the first element to the second-to-last element, while the inner loop (line 9) searches for the minimum element.

The loop invariant in line 10 states that `arr[minIndex]` is always the minimum element in the unsorted part of the array. After each iteration of the outer loop, the invariant is maintained.

The swap operation in lines 14-16 exchanges the minimum element with the first element of the unsorted part, effectively expanding the sorted portion of the array.

This process continues until the entire array is sorted.

Remember, this pseudocode can be directly translated into Java code, replacing the comments with the appropriate syntax.

For more such questions on pseudocode,click on

https://brainly.com/question/24953880

#SPJ8

A _is a short descriptive label that you assign to webpages, photos,
videos, blog posts, email messages, and other digital content so that it is
easier to locate at a later time. It is also the name for part of a coding
element in HTML. *

Answers

Looks like you already answered your question? It’s the a tag ()

the point of (18 ,0) lies on​

Answers

This point lies on the x value

Answer and Explanation:

The point of (18 ,0) lies on​ the x-axis.

On a graph, this point is put 18 units to the right of the origin (0,0), moving its' x digit, and it doesn't move its' y digit, so it doesn't change up or down.

#teamtrees #WAP (Water And Plant)

2-3 Calculating the Body Mass Index (BMI). (Programming Exercise 2.14) Body Mass Index is a measure of health based on your weight. It can be calculated by taking your weight in kilograms and dividing by the square of your height in meters. Write a program that prompts the user to enter a weight in pounds and height in inches and displays the BMI. Note: One pound is 0.45359237 kilograms and one inch is 0.0254 meters. Hint: Convert the pounds entered into kilograms also convert the height in inches into meters Example: If you entered in pounds your weight as 95.5 and your height as 50 inches then the calculated BMI is 26.8573 FYI: BMI < 18.5 is underweight BMI >

Answers

Answer:

weight = float(input("Enter your weight in pounds: "))

height = float(input("Enter your height in inches: "))

weight = weight * 0.45359237

height = height * 0.0254

bmi = weight / (height * height)

print("Your BMI is: %.4f" % bmi)

Explanation:

*The code is written in Python.

Ask the user to enter weight in pounds and height in inches

Convert the weight into kilograms and height into meters using given conversion rates

Calculate the BMI using given formula

Print the BMI

The dealer’s cost of a car is 85% of the listed price. The dealer would accept any offer that is at least $500 over the dealer’s cost. Design an algorithm that prompts the user to input the list price of the car and print the least amount that the dealer would accept for the car. C++

Answers

Here is an algorithm in C++ that prompts the user to input the list price of the car and prints the least amount that the dealer would accept for the car:

#include <iostream>

using namespace std;

int main() {

   double list_price, dealer_cost, min_accepted_price;

   const double DEALER_COST_PERCENTAGE = 0.85;

   const double MIN_ACCEPTED_PRICE_OVER_COST = 500;

   cout << "Enter the list price of the car: ";

   cin >> list_price;

   dealer_cost = list_price * DEALER_COST_PERCENTAGE;

   min_accepted_price = dealer_cost + MIN_ACCEPTED_PRICE_OVER_COST;

   cout << "The least amount the dealer would accept for the car is: $" << min_accepted_price << endl;

   return 0;

}

The algorithm starts by including the library iostream and declaring the namespaces. Then it declares the variables that will be used in the program (list_price, dealer_cost, min_accepted_price) and the constants that will be used (DEALER_COST_PERCENTAGE and MIN_ACCEPTED_PRICE_OVER_COST). Then it prompts the user to enter the list price of the car. Next, it calculates the dealer's cost by multiplying the list price by the dealer cost percentage and the minimum amount the dealer would accept by adding the dealer's cost to the minimum accepted price over cost. Finally, it prints the least amount the dealer would accept for the car.

How did the cyber attack affect other industries aside from the energy grid

Answers

Answer:

Explanation:

Cyber attacks can have a wide-ranging impact on various industries beyond the energy grid, depending on the nature and severity of the attack. Some examples of industries that may be affected include:

1) Financial services: Cyber attacks on financial institutions, such as banks or credit card companies, can result in the theft of customer information or financial data. This can cause a loss of trust and damage the reputation of the affected institution, as well as lead to financial losses for both the institution and its customers.

2) Healthcare: Cyber attacks on healthcare organizations can compromise sensitive patient data, such as medical histories or personal information. This can not only violate the privacy of patients but can also endanger their health if critical medical data is lost or altered.

3) Transportation: Cyber attacks on transportation systems, such as airlines or public transportation, can cause significant disruptions to travel schedules or lead to safety risks for passengers.

4) Retail: Cyber attacks on retail companies can result in the loss of customer data, such as credit card information or personal details. This can harm the reputation of the affected company and damage customer trust, leading to decreased sales and revenue.

5) Government: Cyber attacks on government organizations can compromise sensitive information, such as classified data or government secrets. This can result in a breach of national security and compromise the safety of citizens.

Overall, cyber attacks can have a significant impact on many different industries, highlighting the importance of effective cybersecurity measures to protect against such attacks.

Write a C# program to evaluate the football match result. It displays whether the first team won, or the second team won, or it was a tie. The numbers must be inputted by the user. [Sample screenshot attached for your reference].

Answers

using System;

namespace FootballMatchResult
{
class Program
{
static void Main(string[] args)
{
// Prompt the user to input the scores of the two teams
Console.WriteLine("Enter the score for team 1: ");
int team1Score = int.Parse(Console.ReadLine());
Console.WriteLine("Enter the score for team 2: ");
int team2Score = int.Parse(Console.ReadLine());

// Determine the result of the match based on the scores
if (team1Score > team2Score)
{
Console.WriteLine("Team 1 won the match!");
}
else if (team2Score > team1Score)
{
Console.WriteLine("Team 2 won the match!");
}
else
{
Console.WriteLine("The match was a tie.");
}
}
}
}




Please brainliest if it’s correct

what 80s Disney movie was called the movie that nearly killed Disney? P.S. look it up

Answers

Answer:

The black cauldron

Explanation:

it was the most expensive animated film of its time ever made

Answer: The Black Couldren.

Explanation:

Which of the following is not a term used as a synonym for module?
O a. procedure
O b. object
O c. subroutine
O d. method

Answers

C is correct I hope you get A

The cutting tool that has a zig zag edge is called a?

Answers

The cutting tool that has a zig zag edge is called “Pinking shears “

Sam is conducting research for a school project on the American Revolution. Which of the following kinds of software will help with research notes? music editing software word processing software presentation software spreadsheets

Answers

Answer:

Students analyze the techniques that make for good storytelling I think. :}

Explanation:

[] Hello ! []

Answer:

B. Word Processing Software

Explanation:

I hope it helped! :]

write a java program to accept the Age of 23 student and print

Answers

Converting from the US customary system to the metric system , 16 fluid ounces is approximately equal to a ) 1 gallon . b) 160 milliliters. c) 480 milliliters. d) 960 milliliters.

7 steps in infographic design​

Answers

Answer:

Step 1: Choose your topic and research your audience. Before looking at your data, think about a topic and an audience with whom it can resonate.  

Step 2: Take a look at your data and consolidate it.  

Step 3: Craft the copy.  

Step 4: Design!  

Step 5: Review, review, review.

Step 6: Publish and promote.  

Conclusion.

Explanation:

Process infographics are a specific type of infographic, designed to visualize, summarize and simplify processes. They're perfect for visualizing marketing strategies, new employee onboarding, customer journey maps, product guides, recipes and more.

Problem Deseription: The solar generation of a PV unit for two days as day-1 and day-2 are given for every 15 minutes interval. Use day-1 data to fit a regression model and then use day-2 data to predict the solar generation for every 15 -minutes using the regression model of day-1. Hint: The regression, linear or polynomial models, will have the following format: \[ P_{\text {solar }}(x)=f(x) \] where
P
sotar

(kW)
is the
y
-axis, and
x
is the solar irradiance,
f(x)
is either linear, as
a
0

+a
1

x
, or polynomial as
a
0

+a
1

x+a
2

x
2
+⋯+a
n

x
n

Answers

The output of the program is the predicted solar generation values for day-2. An example of how we can implement the required solution in Python has been attached below.

To solve this problem, we need to fit a regression model using the solar generation data from day-1 and then use that model to predict the solar generation for day-2.

First, we need to decide on the type of regression model to use. There are several options available, including linear regression and polynomial regression. In this case, we will use polynomial regression because it can model more complex relationships between solar generation and solar irradiance.

To fit a polynomial regression model, we need to use the solar generation data from day-1 to determine the coefficients of the polynomial equation. This can be done using a least squares optimization algorithm, which minimizes the sum of the squared errors between the observed solar generation values and the predicted values from the polynomial model.

Once we have determined the coefficients of the polynomial equation, we can use it to predict the solar generation for day-2. We simply need to plug the solar irradiance values from day-2 into the polynomial equation to calculate the predicted solar generation values.

An example of how we can implement this solution in Python has been attached below.

In this example, we used a polynomial regression model of degree 2 (a quadratic equation) to fit the solar generation data from day-1. We then used the fitted model to predict the solar generation for day-2 using the solar irradiance data from day-2. The output of the program is the predicted solar generation values for day-2.

To learn more about the Python Program click here:

brainly.com/question/15061326

#SPJ1

Problem Deseription: The solar generation of a PV unit for two days as day-1 and day-2 are given for

The following code appears in a sort function. Will this function sort in increasing order (smallest first) or decreasing order (largest first)? Explain your answer if (list[index] < list[index + 1]) { temp = list [index]; list[ index] = list [index +1]; list[index +1] = temp; }

Answers

A sort function sorts in an ascending or desceding order

The true statement is that the function would sort in decreasing order.

What is a sort function?

A sort function is a code segment that is used to reorder a list in ascending or descending order, when called or evoked

The order of the sort function

The code segment is given as:

if (list[index] < list[index + 1]) {

temp = list [index];

list[ index] = list [index +1];

list[index +1] = temp;

}

In the above code, we can see that the code compares a list element with the next element on the list, and the larger value comes to the front

This means that the sort function sorts in decreasing order

Read more about code segments at:

https://brainly.com/question/16397886

The _______ allows you to quickly access features such as formatting, charts, tables, and totals

Answers

Answer:

The Quick Analysis toolbar allows you to quickly access features such as formatting, charts, tables, and totals

Good films on stories?


What are good films on karma and what goes around comes around ​

Answers

Films that tell stories present a narrative that can be fictional or not, but whose central purpose is to engage and entertain the viewer, as in the film "Karma: What goes around, comes around.

What is the plot of the film?

This Korean film specifically was released in 2020, being the horror genre and tells the story of a teacher who finds her deceased father's diary, in the house where she lived in her childhood, and from there discovers secrets and mysteries involving such deaths. .

Therefore, cinematographic works aim to lead to emotion, reflection, personal expression, engagement and entertainment, being the analysis of what a good film is to be personal and based on the perspective of the spectator.

Find more about movies at:

https://brainly.com/question/25666614

#SPJ1

15 points....How do you get money at home by just playing a vidio game.

Answers

You could become a creator or make an account on twitch

Streaming or you tube!

I personally am starting to stream within the new few years but creating content and streaming can make you money by getting subs, bits, and more :)

Which data type is -7?
O string
O int
O float
O single

Answers

Answer:

It's an int... Choose B

Answer:

int

Explanation:

correct on edge

Other Questions
Unlike traditional television advertisements, Internet communications areGroup of answer choicesA. interactive.B. reactive.C. attractive.D. refractive. during which phase of database design might a designer choose to denormalize relations in order to improve performance? Which thesis statement would best fit a definition essay If 100. g of gold-198 decays to 6.25g in 25.3 days, what is the half-life of gold-198? The only people with Rh negative blood are people who have inherited two recessive alleles for this trait. But some people who are colorblind have inherited only one recessive allele for this trait. Explain why these traits are different in terms of how many recessive alleles are needed to produce the recessive phenotype. Hint: Think about the above problem and sex chromosomes versus autosomes. A cookle recipe calls for 5/4 of a cup of four and makes 3 dozen cookies . If Cassandra plans to make 12 dozen cookies, how many cups of four she need suppose a runner claims that her mile run time is less than 9 minutes, on average. several of her friends do not believe her, so the runner decides to do a hypothesis test, at a 5% significance level, to persuade them. she runs 7 time trials, collects the proper data, and works through the testing procedure:H0: =9; Ha: Last year, there were 43 scienceprojects submitted to the student sciencefair. This year, there was 52 submitted.Find the percent change. Round to thenearest tenth. Explain why mental health should be viewed like any other physical illness Mateo wants the words "its snowing!" to appear in the output box and typed print (its snowing). this didnt work. what needs to be added to the code?a. quotation marksb. a backslashc. a periodd. a functional code Rockslide - Frank Slide, Alberta, Canada. In 1903, limestone from Turtle Mountain slid downslope, engulfing part of the mining town of Frank Check and double-click the Problem 12 placemark to look south along the length of Turtle Mountain. Based on your analysis from this viewpoint, which of the following is one of the likely causes of the rockslide? a. the east limb of the Turtle Mountain anticline dips steeply to overturned here b. water from nearby Crowsnest Lake lubricated the slip surface c. major urban development on the west limb of the anticline created pressure on the east limb due to the weight of the buildings and water from their septic fields You want to buy a hooded sweatshirt for $40. The tax is 8%. How much will you pay in total? Before the antibiotic treatment: A sample of his urine was diluted following the scheme below. After 24 h incubation at 35C in a suitable agar medium,, 350 colonies were counted in plate 1 and 50 colonies in plate 2. Determine cfu bacteria/ml urine. One ml was used to plate in the plate count agar. b) One week after the antibiotic treatment: A sample of his urine was again analyzed. One ml of urine was added to 99ml water. Plating 1ml from this mixture gave 150 colonies. Determine cfu bacteria/ml urine. c) Based on the bacterial count before and after the antibiotic treatment, was the man responding to the antibiotic? why are the products in the philippines written in english even though tagalog is their original language and other countries are the product is only their own language writtenA. because the philippines was occupied by the united states in 1899B. because the philippines is a rich countryC. because they do not love their own language Example customer email: "Hey there, I ordered a beverage from one of your stores, and when I picked it up I was really disappointed. The drink wasn't chilled, and the glass was dirty. The staff there said they are unable to refund it and I need to contact you for a refund. Are you able to help." For this customer, we will provide them a free replacement drink on their rewards account. Please write out a complete email response as if you were writing to this customer directly. (Include Greeting and Closing) what is the slope of the line that passes through the points (-1,-2) and (14,4 The strongest way for an employee to develop self-efficacy is to: Question 30 options: develop a strong external locus of control develop a strong internal locus of control succeed at a challenging task pick easier tasks in order to become more successful develop a high degree of self-monitoring How does Kennedy mainly apply constitutional principles to support his ideas in the speech?He refers to the constitutional division of powers to emphasize the need for an effective President who helps balance the power of government.He refers to the constitutional division of powers to highlight the importance of communication between the President and members of Congress.He refers to the constitution to challenge the idea that strong Presidents are likely to become dictators without certain checks and balances.He refers to the constitution to underscore a President's responsibilities in domestic affairs, such as farming and education. Exercise 3 Draw one line under the complete subject in each sentence. Draw two lines under the correct form of the verb.Slick roads and fog (is, are) a major concern for travelers. Need help ASAP please and thank you