Write at least one paragraph per question.
Brand: What do the reviews say on the brand?
Features: What can it do? Why is this important to you?
Software: What type of software, if any, is included?
Storage: How much? Why is this right for you?
Cost: List five reasons why this item is a smart financial purchase. Why should you spend the money on this product?

Answers

Answer 1

Answer:

This guide provides everything you need to get started on inventory control. The easy-to-understand expert advice, guidance, formulas, methodologies, policy development and software guidance will help any business—large or small.

Included on this page:

Inventory control method comparisons

Advice on how to control inventory

Formulas to forecast inventory

Expert advice on optimizing, software and industry predictions.....Software, instructions that tell a computer what to do. Software comprises the entire set of programs, procedures, and routines associated with the operation of a computer system. ... A set of instructions that directs a computer's hardware to perform a task is called a program, or software program


Related Questions

with aid of diagram describe the segmentation memory allocation technique as applied in operating System ​

Answers

Note that the image or diagram that  describe the segmentation memory allocation technique as applied in operating System is attached.

What is ​segmentation memory allocation technique?

Segmentation is a memory management method used in operating systems that divides memory into variable size segments. Each component is known as a segment, and it can be assigned to a process. A table called a segment table stores information about each segment.

Segmentation is a memory management strategy that divides each task into numerous segments of varying length, one for each module that comprises elements that perform similar activities. Each segment corresponds to a separate logical address area in the program.

Learn mor about segmentation memory allocation technique:
https://brainly.com/question/31199513
#SPJ1

with aid of diagram describe the segmentation memory allocation technique as applied in operating System

Azure subscription storage1 virtual machines: service endpoint

Answers

Microsoft's cloud storage solution is the Azure Storage platform. Azure Storage offers huge scalability, security, and high availability.

What exactly is a storage service endpoint in Azure?

Endpoints give you the ability to limit access to your vital Azure service resources to just your virtual networks. Service Endpoints makes it possible for private IP addresses in the VNet to access an Azure service's endpoint without the use of a public VNet IP address.

What happens when a service endpoint for Azure storage is enabled?

With the use of virtual network service endpoints, you can completely block public internet access to these resources by securing Azure Storage accounts to your virtual networks. The best routing is provided by service endpoints, which always keep traffic going to Azure Storage on the backbone network of Azure.

To know more about Azure service visit:

https://brainly.com/question/30373354

#SPJ1

Database Management Systems are featured with:

Question 3 options:

The facility to easy editing, spelling check, auto pagination, lay out and printing reports


The ability to store large amount of data to facilitate easy update, sort and retrieval


The ability to calculate efficiently with the help of built-in functions and analyze


None of the above

Answers

Answer:

Answer: Database Management Systems are featured with:​ The ability to store a large amount of data to facilitate easy updates, short, and retrieval.

Explanation: I took the test

Which of the following is NOT a characteristic of malware?
a. Imprison
b. Diffusion
c. Deceive
d. Launch

Answers

Launch is not a characteristic of malware.

Assume a fully associative write-back cache with many cache entries that starts empty. Below is sequence of eight memory operations (The address is in square brackets):

Read Mem[300];

Write Mem[100];

Write Mem[100];

Read Mem[200];

Write Mem[200];

Read Mem[100];

Write Mem[100];

Write Mem[100];

Answers

Answer:

Please mark me the brainliest

We can use the following steps to simulate the given sequence of memory operations in a fully associative write-back cache:

Explanation:

1. Read Mem[300]:

  - The cache is empty, so we have a cache miss and bring the block containing Mem[300] into the cache.

  - The block is now in the cache.

 

2. Write Mem[100]:

  - The cache currently only contains a block for Mem[300], so we have a cache miss and bring the block containing Mem[100] into the cache.

  - The block is now in the cache.

  - The value of Mem[100] in the cache is updated with the new value.

 

3. Write Mem[100]:

  - The block containing Mem[100] is already in the cache, so we have a cache hit.

  - The value of Mem[100] in the cache is updated with the new value.

  - Note that this write operation is redundant, since the value of Mem[100] was already updated in step 2.

 

4. Read Mem[200]:

  - The block containing Mem[200] is not in the cache, so we have a cache miss and bring the block into the cache.

  - The block is now in the cache.

 

5. Write Mem[200]:

  - The block containing Mem[200] is already in the cache, so we have a cache hit.

  - The value of Mem[200] in the cache is updated with the new value.

 

6. Read Mem[100]:

  - The block containing Mem[100] is already in the cache, so we have a cache hit.

  - The value of Mem[100] in the cache is not changed.

 

7. Write Mem[100]:

  - The block containing Mem[100] is already in the cache, so we have a cache hit.

  - The value of Mem[100] in the cache is updated with the new value.

 

8. Write Mem[100]:

  - The block containing Mem[100] is already in the cache, so we have a cache hit.

  - The value of Mem[100] in the cache is updated with the new value.

  - Note that this write operation is redundant, since the value of Mem[100] was already updated in step 7.

At the end of these operations, the cache contains blocks for Mem[200] and Mem[100], with the value of Mem[200] being the most recent value written to that address. The value of Mem[100] in the cache is the same as the value written in step 8.

Read and Answer the Question.


After several years of driving long-haul trucks, Joe Blanka

founded his own trucking company, Blanka Transport Inc.

(BTI), which specialized in less-than-truckload shipments in the

midwestern part of the United States. Joe developed a successful

method for scheduling BTI’s runs that met or exceeded the

delivery expectations of its customers. As a result, BTI shipments were growing at a rate between 15 and 20 percent per

year. The growth, however, was not evenly distributed across

BTI’s territory. On some routes, capacity was overloaded in one

direction and underloaded in the other.

Joe noticed that the imbalance problem was not stable

across time. In some months, capacity was short in one direction, and in other months, it was short in another direction. He

thought that one way of solving the problem would be through

marketing, by offering incentives to customers whose shipments

would improve load balance. Another approach to the problem

was to analyze and restructure the route–equipment combinations. He also thought that it might be possible to warehouse

some less-urgent shipments for short periods in order to help

the balance.

Joe’s son, the first member of the Blanka family to attend

college, was a senior in engineering school. He had just completed a course in project management, and after briefly describing some of the basic concepts to his father, he suggested that a

process improvement project might be a good way to deal with

the balance problem. He thought that the Marketing Manager

and the Route Manager could serve as project co-managers. He

also felt that some of the older, more experienced drivers might

be helpful. The objective of the project would be to decrease the

size of the route imbalances by 75 percent in 1 year.


Questions: Is this a proper approach to the problem? Is this a “project”; if

so, what are the three triple constraints? What, if any, helpful

suggestions would you make to Joe?

Answers

Yes, the process improvement project suggested by Joe's son is a proper approach to address the balance problem in the trucking company. It can help decrease the route imbalances by 75 percent in one year.

What are the constraints?

The three triple constraints in this project would be scope (reducing route imbalances), time (1 year), and resources (including the Marketing Manager, Route Manager, and experienced drivers).

Some helpful suggestions for Joe would be to consider implementing a combination of marketing incentives, route restructuring, and short-term warehousing to achieve better load balance.

Additionally, he should ensure effective communication and collaboration between the project co-managers and team members to maximize the project's success.

Read more about project development here:

https://brainly.com/question/27995740

#SPJ1

what are disadvantages of using computer for information processing​

Answers

The disadvantages of using a computer are too much sitting, eye strain, limited learning, and lots of distractions.

What is a computer?

Computers are electronic devices that are used for heavy arithmetic calculations. There are different types of computers for different purposes.

There are advantages of computers like you can get the information that you want, and they work heavy calculations in no time.

There are many disadvantages like loss of privacy, and there is distraction in the form of ads, and it also affects the eyes.

Therefore, computer use has a number of drawbacks, including excessive sitting, eye strain, limited learning, and numerous distractions.

To learn more about computers, refer to the link:

https://brainly.com/question/13805692

#SPJ9

1 punto
8.- Consiste en la transformación de
insumos o materias primas en
productos y servicios, por medio del
uso de recursos físicos, tecnológicos,
humanos, agrícolas, etc. Según su
entorno o contexto social. *
O a
a) Proyecto técnico
O b) Innovación tecnológica
O c) Proceso productivo
O d) Cambio técnico
Otros:​

Answers

Answer:

c Proceso productivo

Explanation:

b. Read in the data from the hours.csv file and call it “hours”. Make a histogram of the variable hours_studying. (Include the code to generate the histogram and the histogram itself in your lab report.) Comment on the symmetry or skew of the histogram.
c. Use the t.test() function that your used in lab to test the hypotheses to answer the question if this sample indicates a significant change in the number of hours spent studying. (Include your
R code and the output from t.test() in your lab report.)
i. What is the value of the test statistic?
ii. What is the p-value?
iii. Are the results significant at the α = 0. 05 level?
d. Write a conclusion for this test in APA format (as illustrated in lecture and lab).

Answers

After performing a one-sample t-test, it was determined that the test statistic held a value of t = 6.3775 (d.f.=63). The p-value calculated to be 1.128e-08, a figure insignificantly beneath the critical level of 0.05.

How to explain the Statistics

This establishes that the resulting data holds significance, as confirmed by the α=0.05 criterion given that the p-value is inferior toward the stated limit.

The average weekly study time for the students in question resulted in M = 14.18 hours; this signifies statistical variance when contrasted with sigma distribution variable values equating to SD = 5.10 (t(63) = 6.38, p < .001, 95% CI [12.95, 16.39]). Consequently, the null hypothesis cannot be sustained and must therefore be rejected.

Learn more about statistic on

https://brainly.com/question/15525560

#SPJ1

What is the keyboard shortcut for opening the Help Pane?
Ctrl+H
F9
F1
Shift+A

Answers

Answer:

In windows, the keyboard shortcut for opening the Help Pane is F1

What is block chain?

Answers

Answer:

Block Chain is a system of recording information that makes it difficult or impossible to change, hack, or cheat the system.

A blockchain is essentially a digital ledger of transactions that is duplicated and distributed across the entire network of computer systems on the blockchain.

Hope this helps.

x

Blockchain is a distributed database existing on multiple computers at the same time. It is constantly growing as new sets of recordings, or ‘blocks’, are added to it. Each block contains a timestamp and a link to the previous block, so they actually form a chain. The database is not managed by any particular body; instead, everyone in the network gets a copy of the whole database. Old blocks are preserved forever and new blocks are added to the ledger irreversibly, making it impossible to manipulate by faking documents, transactions, and other information. All blocks are encrypted in a special way, so everyone can have access to all the information but only a user who owns a special cryptographic key is able to add a new record to a particular chain.

Is it important to use varied methods when creating digital media presentations? Why or why not?


Yes, because no one method is capable of adequately delivering the information.

No, because using more than one method is confusing to the audience.

No, because the different methods are incompatible with each other.

Yes, because it makes the presentation more interesting for the audience.

Answers

The answer is yes becuase no one method is capable one becuase I took the test on edge

How does the variable scope influence the structure of an algorithm

Answers

You can only put global variables anywhere in the program while with local variables it can only be used within the function. You're only allowed to use local variables in different functions and not the same variable in the same function.

           Simple sketches, mockups, or wireframes are frequently used in the user-centered design process for some or all of the designs. Instead of producing the final product and then having to make expensive revisions if it doesn't match user needs, this results in a far faster and more affordable design process.

What exactly does computer programming entail?

       Scope is a key concept in programming. Where variables can be accessed or referenced is determined by the scope. Some variables in a program can be accessed from anywhere, whereas other variables may not be accessible from everywhere. We must first discuss blocks before going into greater detail concerning scope.

        An individual can write the program's processing stages in their own language using an algorithm, i.e., they can construct the program's flowchart using so-called code.

     An algorithm is just a series of steps used to carry out a certain activity. They serve as the foundation for programming and enable the operation and decision-making of devices like computers, cellphones, and webpages.

        User experience deals with the unique interaction consumers have with the goods they use, whereas user-centered design refers to the method or strategy used to build experiences. It refers to a concept rather than a method of interaction between a user and a product or service.

To Learn more About  user-centered design, Refer:

https://brainly.com/question/28721191

#SPJ2

The tag used for starting a new line is ________.​

Answers

Answer:

use the <br/> tag to start the content in a newline . The br tag is nothing but a break tag ,it breaks the line and starts in new line.

Sarah's Texas location has a server that is starting to give her trouble. It is needing to be restarted frequently and seems to be very slow. The server is on the replacement schedule and has just overheated, stopped and will not restart. What plan should direct the recovery for this single server

Answers

Answer:

Hello your question lacks the required options

A) Business impact analysis plan

B) Business continuity plan

C) Disaster recovery plan

D) Recovery point plan

answer : Disaster recovery plan ( c )

Explanation:

The Disaster recovery  plan is a comprehensive creation of a system/set procedures of recovery of the IT infrastructure from potential threats of a company. especially when the interruption is caused by a disaster, accident or an emergency.

The shutting down of the sever due to overheating and not able to restart for Business is an interruption in a critical business process and the plan to direct the recovery for this single server should be the " Disaster recovery plan"

What is the difference between popular art and high art?

Answers

Answer:

Explanation:  In contrast, popular art often follows proven formulas that have been shown to appeal to large groups

To connect to devices in another country, you would need to connect to a
WAN
MAN
LAN
PAN

Answers

Answer:

WAN

Explanation:

wide area network

Answer:

To connect to devices in another country, you would need to connect to a WAN

Explanation:

WAN stands for A wide area network which can connect to other countries and broad ranges.

A drop light that does not allow any electrical parts to come in contact with the outer casing of the device is called a:

Answers

Answer:

The right answer is "Double insulated light".

Explanation:

Double insulated led is mostly a sophisticated type of natural light that does not necessitate a terrestrial or planetary correlation. These illuminations could be based on these metals, are indicated in the electrical protection environmental standards that now the construction workers comply with, and therefore are readily accessible about every bedroom.

Which of the following best explains how data is typically assembled in packets for transmission over the Internet?a. Each packet contains data to be transmitted, along with metadata containing information used for routing the data. b.Each packet contains an encrypted version of the data to be transmitted, along with metadata containing the key needed to decrypt the data. c.Each packet contains only the metadata used to establish a direct connection so that the data can be transmitted. d.Each packet contains multiple data files bundled together, along with metadata describing how to categorize each data file

Answers

This statement best explains how data is typically assembled in packets for transmission over the Internet is a. Each packet contains data to be transmitted as well as metadata containing information used for data routing.

What is Packet in data transmission?

In data transmission, a packet is a unit of data that is transmitted over a network. It consists of a header, which contains information about the packet, such as the source and destination addresses, and a payload, which contains the actual data being transmitted.

Packets are used to ensure that data is transmitted efficiently and reliably, as they can be broken down and transmitted individually, and can be reassembled at the receiving end.

To learn more about Packet, visit: https://brainly.com/question/13818790?referrer=searchResults

#SPJ1

Most games have characters that perform actions on the screen. What are these characters called?
Floats
Sprites
Fairies
Or Pixels

Answers

Answer:pixels

Explanation:

its the correct

Which of the following items in the folder window allows users to view locations which have been visited before?

○ Refresh button
○ Search box
○ Previous locations arrow
○ Navigation pane​

Answers

Previous locations arrow

The correct option is the D. Navigation pane​ in the folder window allows users to view locations that have been visited before.

The navigation pane displays a list of the disks and folders on your computer as well as network resources like OneDrive. Your Quick Access view, which displays your Recent files and Frequent folders, is the first item by default in the navigation pane.

Which pane is known as the navigation pane?

The Places bar has been replaced by the Navigation Pane, which debuted with Microsoft Windows Vista. It is located on the left side of the Open File or Saves File window, as well as the File Explorer window. The disks, history, desktop, and downloads that were formerly displayed on the Places bar are now all listed in the Navigation Pane.

You can examine the information from two distinct locations since the Folder list divides the window into two panes or frames. All of the drives and folders on the PC are shown in the Navigation pane's file hierarchy, and the selected disk or folder is shown in the Right pane's content.

Thus, the ideal selection is D.

Learn more about the navigation pane here:

https://brainly.com/question/14966390

#SPJ2

How do I change the default interactive shell as zsh on a Mac?

Answers

Zsh (short for Z Shell) is a Unix shell and command-line interpreter that is designed to be an interactive login shell and command-line interface. It is an alternative to the more common Bash shell that is used by default on many Unix-based systems, including macOS.

What is zsh in mac?

changing  the default interactive-shell to zsh on your Mac, you need to repeat the given steps:

Install zsh: If you haven't installed zsh already, you can do so using Homebrew, a package manager for macOS.Now, Open the Terminal app and use the command given:

                                    brew install zsh

Verify the path to zsh: Once zsh is installed, you can verify the path to zsh by running the following command in Terminal:

                                    which zsh

Change the default shell: To change the default shell to zsh, you need to edit the /etc/shells file to include the path to the zsh binary. use command:                                    sudo nano /etc/shellsAdd zsh to /etc/shells: In the nano text editor, add the path to the zsh binary to the end of the file, on a new line. For example, if the path to zsh is /usr/local/bin/zsh, you would add the following line to the end of the file:

                                  /usr/local/bin/zsh

Save and exit: Once you have added the path to zsh to /etc/shells, save the file by pressing Ctrl+O, then exit nano by pressing Ctrl+X.

Change the default shell: To change the default shell to zsh, run the following command in Terminal:

                             chsh -s /usr/local/bin/zsh

             Replace /usr/local/bin/zsh with the path to the zsh binary that  

            you obtained in step 2.

Log out and log back in: Finally, log out of your macOS user account and log back in to apply the changes. You should now have zsh as your default interactive shell.

To know more about zsh shell, visit: https://brainly.com/question/30528402

#SPJ4

Write the letter from D'Artagnan's father that was stolen from D'Artagnan in Meung. Include information about how D'Artagnan's father knows M. de Treville, describe D'Artagnan to M. de Treville, and request what D'Artagnan's father would like M. de Treville to do for D'Artagnan. Minimum 4 sentences.

Answers

Answer:

D'Artagnan's father advises him to be guided by his courage and his wits, ... town, but finds that the gentleman has stolen his letter of introduction to M. de Treville. ... D'Artagnan is received into M. de Treville's private chamber. However, before the two can speak, de Treville calls in two of his musketeers, Aramis and Porthos.

Explanation:

An unordered list can use one of four different bullet options: disc, square, circle, or triangle.
TRUE OR FALSE

Answers

False. An unordered list can use different types of bullet options, but the specific options you mentioned (disc, square, circle, triangle) are not the only possible options. Unordered list bullet styles can vary depending on the specific implementation and the medium in which they are used (e.g. HTML, CSS, Word Processing software), but the common bullet styles are bullet point, circle and square.

Select the correct answer from each drop-down menu. What data types can you suggest for the given scenario? Adja is working in a program for the school grading system. She needs to use a(n) (First drop down) to store the name of the student and a(n) array of (Second drop down) to store all the grade of each subject of each student.
Options for the first drop down are- A. Integer, B.String, C.Character.
Options for the second drop down are- A.Floats, B.Character, C.String.

Answers

Based on the given scenarios, the data types that would be best suited for each is:

C. Character.A. Floats

What is a Data Type?

This refers to the particular type of data item that is used in order to define values that can be taken or used in a programming language.

Hence, it can be seen that based on the fact that Adja is working in a program for the school grading system, she would need to use a character to store the name of the student and a float to store all the grades of each subject of each student because they are in decimals.

With this in mind, one can see that the answers have been provided above.,

In lieu of this, the correct answer to the given question that have been given above are character and floats.

Read more about data types here:

https://brainly.com/question/179886

#SPJ1

Answer:

A- String

B- Character

what of the following calculations would evaluate to 12

Answers

Based on the above, the option that is a calculations that would evaluate to 12 is option a: 3 * ((6 + 2) /2).

What exactly are calculations in math?

The act of Performing basic math operations and facts, as well as counting as well as grouping objects.

Math calculation skills is one that is made up of the capacity to count, group, as well as the act to compute basic mathematical facts and procedures.

Note that:

3 * ((6 + 2) /2)

= 3 x ((8) /2)

= 3 x 4

=12

Therefore, based on the above, Based on the above, the option that is a calculations that would evaluate to 12 is option a: 3 * ((6 + 2) /2).

Learn more about math calculations from

https://brainly.com/question/25678139

#SPJ1

Q.

Which of the following calculations would evaluate to 12?

answer choices

3 * ((6 + 2) /2)

(3 * 6 + 2) /2

3 * 6 + 2 /2

(3 * 6) + 2 /2

The most plausible reason why changes in the price of cotton can cause shifts in the supply curve for tobacco is:

a.

when incomes rise, people consume more cotton and tobacco.

b.

firms can switch from growing tobacco to cotton and vice versa.

c.

cigarette smokers often wear cotton shirts.

d.

tobacco is an input in the production of cotton.

Answers

The most plausible reason why changes in the price of cotton can cause shifts in the supply curve for tobacco is: firms can switch from growing tobacco to cotton and vice versa.The correct answer is option B.

This option reflects the concept of resource allocation and production choices based on relative prices and profitability.

When the price of cotton increases, it becomes more profitable for farmers to allocate their resources towards cotton production. This can lead to a decrease in the supply of tobacco as some tobacco farmers may choose to switch to growing cotton instead.

Consequently, the supply curve for tobacco shifts to the left, representing a decrease in the quantity supplied at each price level.

On the other hand, if the price of cotton decreases, it becomes less profitable to produce cotton, and some cotton farmers may switch to growing tobacco instead.

This can result in an increase in the supply of tobacco, causing the supply curve to shift to the right, representing an increase in the quantity supplied at each price level.

Therefore, the changes in the price of cotton can have a direct impact on the supply of tobacco as firms have the flexibility to switch between the two crops based on relative profitability, leading to shifts in the supply curve for tobacco.

For more such questions tobacco,Click on

https://brainly.com/question/30006424

#SPJ8

When performing actions between your computer and one that is infected with a virus, which of the following offers No risk of your computer becoming infected?
A. Printing to the same printer as infected computer
B. Accepting email attachments sent from an infected computer
C. Sharing Word documents with an infected computer
D. Sharing removable disks with an infected computer

Answers

Answer:

d

Explanation:

The correct option is D: Sharing removable disks with an infected computer

Removable disks are disks that use to keep data as well transfer data or information from one computer to another computer.

With Removable disks a computer infected with a virus cannot infect another Computer as the what the user does is to simply insert  the USB port of the  Removable disks into the computer which inturn enable the transfer of data to the computer to take place .

Learn more about Removable disks here:

https://brainly.com/question/4327670

The principal object of a hash function is __________ .
a. data integrity
b. compression
c. collision resistance
d. mapping messages

Answers

Answer:

a. data integrity

Explanation:

In Computer science, a hash function can be defined as any function which is used to map data by accepting a block of data with variable length size or arbitrary size as input to produce a fixed size hash values or codes.

Generally, when a block of data (input) of arbitrary size is hashed, the resulting hash values or codes is usually smaller than the input data. Thus, hash functions are considered to be a compression of data and as a result, sometimes called compression functions. Basically, the block size of a hash function typically ranges from 128 bits to 512 bits.

Some of the properties of a hash function are;

1. Pre-image resistance: this makes it practically impossible to reverse a fixed-size hash values to its initial arbitrary size. This property helps to maintain and enhance data integrity by making it difficult or impossible for an attacker to find the input data from a hash value.

2. Second pre-image resistance: this property makes it near impossible or very difficult to determine or decode another input data from a given set of input and hash values. Also, this helps to enhance data integrity.

3. Collision resistance: this is to make possible for all hash values to have a unique value. This simply means that, with this property it would be difficult for different input data to have the same hash value. Thus, it helps to create integrity in data management.

Hence, with the aforementioned properties, the principal object of a hash function is data integrity.

Hash functions in the computer world includes;

1. Message Digest (MD): it is a 128 bit hash function and comprises of the following; MD2, MD4, MD5, and MD6.

2. Secure Hash Function (SHA): it comprises of the following; SHA-0, SHA-1,SHA-2, and SHA-3.

3. Whirlpool: it comprises of the following; Whirlpool-0, Whirlpool-T, and Whirlpool. It is primarily a 512 bit hash function.

4. RACE Integrity Primitives Evaluation Message Digest (RIPEMD): it comprises of the following versions; RIPEMD, RIPEMD-128, and RIPEMD-160.

PLEASE FILL IN THE BLANK

With a bit depth of __ I can support 8 grayscale variations of black and white images.

Answers

Answer:   Thre correct answer is 3 bit

Explanation:

Using binary, a 3-bit value can support 8 variations in grayscale:

1   000

2   001

3   010

4   011

5   100

6   101

7   110

8   111

Other Questions
If a victim is found with poison inside their cells after death, what can a forensic scientist reasonably conclude?Active transport moved the toxin into the cells before death.OActive transport moved the toxin into the cells after death.O Passive transport moved the toxin out of cells before death.O Passive transport moved the toxin into cells after death. A problem-solving group meets to discuss what should be done to increase financial support of their group. Using the traditional (reflective) approach, what should be the first item of importance on their agenda 1. [15 marks] The Department of Engineering is contemplating the purchase of a top-of-the- line PCB drilling machine to be used in its laboratories. The price of the machine is $5,000. The depreciatio please help me i really need it Suppose the x-axis of a density graph represents someone's height in inches.If the area under the density curve from 60 inches to 70 inches is 0.55, whatis the probability of someone's height being anywhere from 60 inches to 70inches?O A. 65%O B. 55%O C. 70%O D. 60% in raisin in the sun how is beneatha and asagai relationship they have lot of choclate change in negative Charlie runs a book rental business. He currently charges $3 per book and rents out an average of 38 books a day.According to a study, for every 50C increase in rental price, the average business can expect to lose 4 rentals a day.Complete the equation that models this scenario, where b(x) is the revenue generated and x is the number of 50 price increases.b(x)= x + x+ [ What are the primary steps for developing a plan to lead a substance-free life? ceteris paribus, a firm will hire more workers the higher the wage rate. TRUE/FALSE Need Help ASAP 1. Why do you think telling stories through the use of allegory and fables are a powerful way to express an idea?2. Based on all of the information you have read so far, what theme or moral lesson do you predict the novel animal Farm will attempt to teach? Plz writte summary of this text look photo help plz You can improve your general health if you discontinue which ofthe following behaviors?a. inactivity, sun bathing, smoking, ignoring stressb. social outings, drug abuse, nutrition, smokingc. drinking alcohol, nutrition, sleeping, washing your handsd. activity, smoking, ignoring stress, sun bathing Directions: Read the passage and choose the multiple choice letter of the word that answers the example ofclaim, evidence, and reason. Thousands Stranded at Sea as they flee Myanmar.1 JAKARTA, Indonesia - In recent months, thousands of migrants have been abandoned at sea by their SoutheastAsian smugglers. Hundreds have reached land over the past two days. However, about 6,000 remain trapped atsea in crowded, wooden boats. Their food and clean water are running low, so some could be in real danger. help pleaseeeee!!! Point h is the circumcenter of triangle def. point h is the circumcenter of triangle d e f. lines are drawn from each point of the triangle to point h. lines are drawn from point h to each side of the triangle to form right angles and line segments h m, h n, and h l. which must be true? select two options. a(n) is the fundamental particle of matter, and any further breakdown of this would result in loss of the properties that are unique to its element. What is the slope of a line perpendicular to the line whose equation is10x+ 6y = -84. Fully reduce your answer. General Electric manufactures turbines and provides the following annual data. How many turbines were transferred to finished goods during the year? Beginning Work in Process (30% complete, $1,300) 220 units Ending inventory of work in Process (70% complete) 420 units Total units started during the year 3,400 units a. 3,392 uns.b. 3,400 units.c. 3.200 uniks.d. 3,848 units.Which is associated with process cost accounting but is not normally associated with job cost accounting?A. Determining cost of goods sold. B. Identifiable units of production.C. Use of Job Cost Sheet.D. Equivalent units of production. A horizontal beam of length 2L and uniform bending stiffness El is built-in at x=0. It is subjected to the downwards UDL t per unit length from x=0 to x=L, and the upwards load P at x=2L. From the fourth order differential equations for an elastic beam derive the appropriate expressions for the shear force, bending moment, slope and deflection and find the integration constants.