you are an intune administrator in an it organization. you have 10 computers that run windows 10 pro. these computers are joined to microsoft azure active directory (ad) and enrolled in microsoft intune. you need to upgrade these computers to windows 10 enterprise. what should you configure in microsoft intune to accomplish this task?

Answers

Answer 1

Create a system configuration profile in Microsoft Intune for accomplish the above.

Which objectives does Microsoft pursue?

The largest producer of computer software in the world is Microsoft. It is a top supplier of cloud storage, games, workstations, and gaming gear, among other online services. With its headquartered in Redmond, Washington, Microsoft operates in more than 60 nations.

What kind of software does Microsoft produce?

Microsoft creates software for personal computers. The Microsoft Office line of professional programs and services, including Visible Basic IDE, microsoft Windows Vista and later Fullscreen Mode websites, and in fact the Windows operating system are some of Microsoft's best-known products.

To know more about Microsoft visit:

https://brainly.com/question/26695071

#SPJ4


Related Questions

If we use the square wave to transmit digital data (0s and 1s), what will be the data rate. Note data rate is the bits per second. (if two bits contain in one period) 2. Then, if we use the first three components to represent square wave, what is the bandwidth? (Refer to lecture) 3. Consider a noiseless channel with a bandwidth of 3000 Hz transmitting a signal with two signal levels. What can be the maximum bit rate?

Answers

The maximum bit rate

mention five internet services​

Answers

1 ) cable internet 2) DSL internet 3) sattalite internet4) mobile internet5) BSNL

please mark me as brainlist

answer(s)

communication services,

informational retrieval services,

web services,

world wide web,

& video conferencing.

In what file does the Mule project keep track of all of its dependencies?
mule-artifact.json
pom.xml
mule-app.properties
global.xml

Answers

The Mule project keeps track of its dependencies in the "pom.xml" file. The "mule-artifact.json" and "mule-app.properties" files have other purposes, and "global.xml" may not exist.

In a Mule project, the "pom.xml" file is used to manage and declare all the project's dependencies.

This file is an XML document that describes the project's configuration, including the list of required dependencies and their versions.

The "mule-artifact.json" file, on the other hand, is used to define the artifact properties, such as name, version, and type, of a Mule application or domain project.

The "mule-app.properties" file contains properties specific to the Mule application, such as runtime version and application name.

The "global.xml" file is not typically used to manage dependencies, but rather to define global configuration settings for a Mule runtime instance.

It can be used to set properties like thread pool sizes, JVM settings, and proxy configurations.

For more such questions on Mule:

https://brainly.com/question/30736908

#SPJ11

Munnabhai knows the four values of agile manifesto by heart. However, he was confused when a customer spoke with him highlighting agile characteristics of short development cycles or iterations. He could not recollect anything about short iterations in agile manifesto. What did he miss to learn about?

Answers

Answer:

When executing Agile Projects, an iteration, is a timebox (a fixed period of time when activity takes place) during which development is carried out. Depending on the project, an iteration may last between 7 to 28 days.

                                       

As far as the Agile Manifesto is concerned, the short development cycles of or iteration means that priorities can be moved between iterations. It also means that features of an Agile project can be modified on or before the next iteration.

In traditional project managagement this sort of revisions is called scope creep. That is when a project deviates from or expands upon it's original deliverables before the project is over. This is usually a problem. The Agile methodology however allows for revisions to happen within timeboxes. Thus ensuring that regardless of addition of new features, the time set for the development is not exceeded.

It is the view of Agile Project Developers that the iterations allow for provision of additional value and improvement.

Cheers!

working on a python assignment, not sure what i did wrong can anyone help?

working on a python assignment, not sure what i did wrong can anyone help?

Answers

Answer:

Explanation:

line 13 should be changed to:

print(“Item 1: “ + item1 + “ - $” + str(float(const1)))

You cannot concatenate a string to float type.

what is the name of the statement used for providing calculations in pseudocode​

Answers

Answer:

processing statement

Explanation:

processing statement is used to perform calculation or assignment.

when you print from your laser printer, the paper contains faint images from previous printouts. which of the following components is most likely the cause? (select two)

Answers

The most likely cause of faint images from previous printouts on paper when printing from a laser printer is the Fluorescent lamp.

In some laser printers, there is a fluorescent lamp or light source that illuminates the drum or the imaging unit. This illumination is necessary for the laser printing process to expose the drum to form the latent image that will be transferred onto the paper.

If the fluorescent lamp or light source is not functioning properly, it may result in insufficient illumination of the drum, leading to faint or incomplete images being transferred onto the paper during the printing process.

Learn more about Laser Printer here:

https://brainly.com/question/30772031

#SPJ4

The question attached here seems to be incomplete\ inappropriate, the complete question is

When you print from your laser printer, the paper contains faint images from previous printouts. Which of the following components is MOST likely the cause?

– Discharge lamp

– Primary Corona light

– Fluorescent lamp

– Secondary corona wire

To filter media means to :
A. decide what is meaningful and useful and what is not
B. make a choice to never eat junk food while on the internet
C. decrease face-to-face interactions with family and friends
D. become addicted to digital media and social networking

Answers

Answer:

A. decide what is meaningful and useful and what is not

Explanation:

"Media" refers to the different modes of communication such as TV, radio, Internet, newspaper, etc.

"To Filter" means to remove something that is not meant for people to know.

So to speak, to filter the media means to remove unnecessary information or useless information from the pool of information in the media. This means that only the meaningful things or information will be relayed or posted for the audience/readers to know.

Why can't you determine the shape and polarity from Lewis structures alone? In other words, why must you apply VSEPR theory to a Lewis structure to determine shape and polarity?

Answers

VSEPR theory must be applied to a Lewis structure to determine shape and polarity because Lewis structures only provide the arrangement of valence electrons, and the arrangement of atoms is not determined by Lewis structures alone. For determining the shape and polarity of molecules, VSEPR theory is used.

VSEPR theory stands for Valence Shell Electron Pair Repulsion Theory. It is used to predict the shape of a molecule, based on the number of valence shell electrons of the central atom. In other words, VSEPR theory is applied to predict the shape of a molecule by considering the number of valence electrons on the central atom of the molecule.In contrast, Lewis structures only provide the arrangement of valence electrons and the arrangement of atoms is not determined by Lewis structures alone. Therefore, Lewis structures are not sufficient for determining the shape and polarity of molecules.In VSEPR theory, the electron pairs are arranged in such a way that they repel each other and try to get away from each other. Based on this, the shape of the molecule is predicted, and from the shape, the polarity is determined. So, VSEPR theory is necessary for determining the shape and polarity of molecules, whereas Lewis structures are not sufficient.

Know more about VSEPR theory, here:

https://brainly.com/question/17177984

#SPJ11

Select the correct answer.Priyanka wants to send some important files to her head office. Which protocol should she use to transfer these files securely?A.HTTPB.FTPSC.FTPD.DNS

Answers

Answer: FTP

Explanation: FTP stands for file transfer protocol.

College is considered _____ education. Please type the correct answer in the following input field, and then select the submit answer button or press the enter key when finished.

Answers

Answer:

Postsecondary education 

Explanation:

help with this please anyone
Keywords:
-Virus
-Spyware
-Worm
-Trojan Horse
Definitions:
-This type of malware pretends it will be useful and it is a safe program when it will actually try and attack your device.
-This type of malware can copy itself hundreds of times so can hard your device very quickly.
-A type of malware that spreads through normal program.It could simply slow down your device down or cause you to lose all access to programs on your computer.
-A type of malware that installs itself onto devices and steals personal information about the user like usernames and passwords.It tracks every key the user pressed called key logging.
PLZ ANYONE HELP ME ​

Answers

Answer:

       trojan horse

         worm

         virus

        spyware

Explanation:

gimme the brainliest hehe

Answer:

1).Virus :- A type of malware that spreads through normal program.It could simply slow down your device down or cause you to lose all access to programs on your computer.

2).Spyware:- A type of malware that installs itself onto devices and steals personal information about the user like usernames and passwords.It tracks every key the user pressed called key logging.

3).Worm:- This type of malware can copy itself hundreds of times so can hard your device very quickly.

4). Trojan Horse :- This type of malware pretends it will be useful and it is a safe program when it will actually try and attack your device.

Explanation:

Pls give another person brainliest...

thanks hope it helps

what does the term interoperability mean? group of answer choices restricting the capability of a system to interact with other systems in order to be more efficient the capability of a system to interact with other systems without access or implementation limitations or restrictions the process of linking an estimate and a schedule to a bim model the process of creating a 3d video display of a computer-generated virtual reality environment

Answers

Answer:

The term interoperability refers to the capability of a system to interact with other systems without access or implementation limitations or restrictions. Interoperability is an important aspect of software and system design, particularly in environments where different systems or applications need to communicate and exchange data. When systems are interoperable, they can communicate and work together seamlessly, without requiring special adapters, middleware, or other types of integration tools. Interoperability can be achieved through the use of standard protocols, formats, and interfaces that are widely supported across different platforms and technologies.

Explanation:

please follow me for more if you need any help

Select the correct answer from each drop-down menu.
Regular computer maintenance minimizes the chances of
It also helps prevent

Select the correct answer from each drop-down menu.Regular computer maintenance minimizes the chances

Answers

Regular computer maintenance minimizes the chances of computer hardware and software failures, system crashes, and data loss.

What is computer maintenance?

It helps prevent various issues that can lead to poor performance, security vulnerabilities, and software conflicts.

For example, regular maintenance can help prevent the accumulation of dust and debris in the computer's cooling system, which can cause overheating and damage to the hardware components.

Therefore, Regular maintenance can include tasks such as cleaning the computer hardware, updating software and drivers, performing virus scans and system backups, optimizing system settings, and monitoring system performance. By performing these tasks on a regular basis, computer users can help ensure that their systems remain stable, secure, and reliable over time.

Read more about computer maintenance here:

https://brainly.com/question/25243683

#SPJ1

Given the following AHDL code, explain how this code "debounces" a pushbutton. If a key is pressed, input key_pressed is high; if no key is pressed, key_pressed is low. What happens when the key is not pressed? What happens when the key is pressed? Refer to parts of the code and be specific in your answer. SUBDESIGN debounce { clk, key_pressed: INPUT; strobe: OUTPUT; count [6..0]: DFF; count [].clk = clk; count [].clrn = key_pressed; IF (count [].q <= 126) & key_pressed THEN count [].d = count [].q+1; IF count [].q == 126 THEN strobe VCC; = ELSE strobe = GND; END IF; } VARIABLE BEGIN END;

Answers

When the key is not pressed, the code keeps the debounce counter in a reset state. When the key is pressed, the code increments the counter and checks if the debounce process is complete. Once the debounce process is complete, the strobe signal is set high to indicate a valid key press, otherwise, it remains low. This debounce mechanism helps in eliminating or reducing the effects of any noise or rapid transitions in the pushbutton input, ensuring accurate and reliable detection of key presses.

The given AHDL code implements a debounce mechanism for a pushbutton input. Debouncing is a technique used to eliminate or reduce the effect of rapid transitions or noise in the input signal when a pushbutton is pressed or released. It ensures that the output reflects the stable state of the input after it has settled.

The code defines a subdesign called "debounce" which takes the clock signal (clk) and the input signal from the pushbutton (key_pressed). It also has an output signal called "strobe" and a 7-bit register called "count" which serves as a debounce counter.

When the key is not pressed, the input signal key_pressed is low, which means the pushbutton is in an idle or released state. In this case, the code sets the clear input (clrn) of the count register to key_pressed, which clears the counter and keeps it in a reset state.

When the key is pressed, the input signal key_pressed becomes high. The code then increments the value stored in the count register by 1. The condition `IF (count[].q <= 126) & key_pressed` checks if the count value is less than or equal to 126 (indicating that the debounce process is ongoing) and if the key is still pressed. If this condition is true, the code assigns `count[].d = count[].q+1` to increment the count value by 1.

If the count value reaches 126 (indicating that the debounce process is complete), the code sets the strobe signal to VCC (high) to indicate a stable and valid key press. Otherwise, when the count value is less than 126, the strobe signal is set to GND (low) to indicate that the debounce process is still ongoing and the key press is not yet considered stable.

In summary, when the key is not pressed, the code keeps the debounce counter in a reset state. When the key is pressed, the code increments the counter and checks if the debounce process is complete. Once the debounce process is complete, the strobe signal is set high to indicate a valid key press, otherwise, it remains low. This debounce mechanism helps in eliminating or reducing the effects of any noise or rapid transitions in the pushbutton input, ensuring accurate and reliable detection of key presses.

Learn more about Output here,

https://brainly.com/question/27646651

#SPJ11

Is management information systems is essentially synonymous with information technology?

Answers

Both the degrees concentrate on the design of networks and sophisticated systems, but while IT degrees place more of an emphasis on computers and their capabilities, MIS degrees are typically more business-focused.

What do IT professionals do?

IT professionals work with computer systems' hardware and software to install, diagnose, and resolve issues. It's frequently seen as an entry-level job. An IT professional offers a variety of services to manage, maintain, and repair the computer systems' hardware and software.

What information technology fundamentals exist?

The simplest form of computer technology is the widespread use of computers to business or organization challenges.

To know more about the Information Technology visit:

https://brainly.com/question/24015737

#SPJ4

Write a program that meets these requirements: - Prompt the user to enter a person's first name and last name (on the same line) Use the fgets function to read in the names and store them in a single string. The user may enter a name in FirstName LastName format. The user may also enter a name in LastName, FirstName format (note the comma). The entered name may be a mix of uppercase and lowercase characters. - Use string I/O functions and/or string library functions to extract the names stored in the original string and put them in two, separate strings (one holds first name, the other holds last name). - Hint: The existence of a comma in the original string determines the name format. - Hint: The sscanf function can be used to extract the names from the original string. - Print out your fully processed first and last names. - Print out the lengths of the first name string and the last name string. - Check if the entered first name is "Sarah". Display a message with your comparison result. - Create a new string that concatenates the first name string, the constant string "Viking", and the last name string. - Display the concatenated string. Note If you get stuck, try to move on to other parts of the requirements. You can always come back later to work on it. Feel free to discuss possible approaches and algorithms for this problem with other students in the lab. Sample Run: Greetings, my name is Sarah. Please enter your first and last name: joe smith Hello, joe smith. Your first name has 3 characters. Your last name has 5 characters. You and I have different first names. I will call you joe "Viking" smith from now on! Greetings, my name is Sarah. Please enter your first and last name: Johansson, Scarlett Hello, Scarlett Johansson. Your first name has 8 characters. Your last name has 9 characters. You and I have different first names. I will call you Scarlett "Viking" Johansson from now on! Greetings, my name is Sarah. Please enter your first and last name: Sarah Conner Hello, Sarah Conner. Your first name has 5 characters. Your last name has 6 characters. Hey, you and I have the same first name! I will call you Sarah "Viking" Conner from now on!

Answers

The program prompts the user to enter their first and last name, extracts the names using string manipulation functions, performs comparisons and concatenates the strings as required.

Certainly! Here's a program in C that meets the requirements you specified:

```c

#include <stdio.h>

#include <string.h>

int main() {

   char input[100];

   char firstName[50];

   char lastName[50];

   printf("Greetings, my name is Sarah. Please enter your first and last name: ");

   fgets(input, sizeof(input), stdin);

   input[strcspn(input, "\n")] = '\0'; // Remove the newline character from the input

   int commaIndex = strchr(input, ',') - input;

   if (commaIndex != -1) {

       // Format: LastName, FirstName

       sscanf(input, "%[^,], %[^\n]", lastName, firstName);

   } else {

       // Format: FirstName LastName

       sscanf(input, "%s %s", firstName, lastName);

   }

   printf("Hello, %s %s.\n", firstName, lastName);

   printf("Your first name has %zu characters.\n", strlen(firstName));

   printf("Your last name has %zu characters.\n", strlen(lastName));

   if (strcmp(firstName, "Sarah") == 0) {

       printf("Hey, you and I have the same first name!\n");

   } else {

       printf("You and I have different first names.\n");

   }

   char concatenated[150];

   sprintf(concatenated, "%s Viking %s", firstName, lastName);

   printf("I will call you %s from now on!\n", concatenated);

   return 0;

}

```

We can compile and run this program in a C compiler to see the desired output. It prompts the user to enter their first and last name, extracts the names using string manipulation functions, performs comparisons and concatenates the strings as required.

Learn more about Concatenates:https://brainly.com/question/29760565

#SPJ11

Which of these would make text on a slide difficult to read?
Ohigh contrast between text and background
Olow contrast between text and background
O a sans serif font
O a large font when the presentation is in a large room

Answers

Low contrast between your text and the background

Salim wants to add a device to a network that will send data from a computer to a printer. Which hardware component should he use?

A.
repeater
B.
modem
C.
switch
D.
bridge

Answers

It’s letter B good luck
I think person above is correct (sorry if I'm wrong I just need points)

Which data structure allows insertion only at the back, and removing only from the front?

Answers

Queue data structure permits insertion only at the back, and removal only from the front.

What  is Data structure?

A data structure exists in a data organization, management, and storage format that stands usually chosen for efficient access to data. A data structure exists as a specialized format for organizing, processing, retrieving, and storing data. There stand several basic and advanced kinds of data structures, all developed to arrange data to suit a specific purpose. Data structures create it easy for users to access and work with the data they require in appropriate ways.

Data structure exists as storage that is used to store and organize data. It is a method of arranging data on a computer so that it can be accessed and updated efficiently. Depending on your requirement and project, it stands important to select the right data structure for your project.

Hence, Queue data structure permits insertion only at the back, and removal only from the front.

To learn more about Data structure refer to:

https://brainly.com/question/24268720

#SPJ4

virtual conections with science and technology. Explain , what are being revealed and what are being concealed​

Answers

Some people believe that there is a spiritual connection between science and technology. They believe that science is a way of understanding the natural world, and that technology is a way of using that knowledge to improve the human condition. Others believe that science and technology are two separate disciplines, and that there is no spiritual connection between them.

What is technology?
Technology is the use of knowledge in a specific, repeatable manner to achieve useful aims. The outcome of such an effort may also be referred to as technology. Technology is widely used in daily life, as well as in the fields of science, industry, communication, and transportation. Society has changed as a result of numerous technological advances. The earliest known technology is indeed the stone tool, which was employed in the prehistoric past. This was followed by the use of fire, which helped fuel the Ice Age development of language and the expansion of the human brain. The Bronze Age wheel's development paved the way for longer journeys and the development of more sophisticated devices.

To learn more about technology
https://brainly.com/question/25110079
#SPJ13

Look at the logos below, decide which one would be the most suitable to use for a Cooking App? Please explain your reason below. Remember explain your answer in good detail, please.

Look at the logos below, decide which one would be the most suitable to use for a Cooking App? Please

Answers

Answer:

The logo on the top right

Explanation:

It's pretty obvious :/

Everything else is not related to baking or cooking (kiiiinda excluding taco bell, but thats a fast food chain)

1
TIME REMAINING
01:51:06
Zubair needs to change some of the data in a table that he has created. How should he go about selecting a row in
the table?
Moun the mourn nointor in a noint hefore the text in a cell​

Answers

the answer is zubair needs to change something

the _____tool is used to move the selected text to the right of the page ( align text right. / Align text left)​

Answers

Answer:

align text right

Explanation:

A survey of 68 college students was taken to determine where they got the news about what's going on in the world. Of those surveyed, 29 got the news from newspapers, 18 from television, and 5 from bo

Answers

 we can construct a Venn diagram representing the survey results. From the diagram, we can determine the cardinality (number of elements) for each region, including those who got the news from only newspapers, only television, both newspapers and television, and those who did not get the news from either source.

Based on the given information, we can construct a Venn diagram with two overlapping circles representing newspapers and television. The region where the circles overlap represents the individuals who got the news from both newspapers and television, which is given as 5.
To determine the number of individuals who got the news from only newspapers, we subtract the number of individuals who got the news from both sources (5) from the total number of individuals who got the news from newspapers (29). Therefore, n(Newspapers only) = 29 - 5 = 24.
Similarly, to find the number of individuals who got the news from only television, we subtract the number of individuals who got the news from both sources (5) from the total number of individuals who got the news from television (18). Therefore, n(Television only) = 18 - 5 = 13.
To calculate the number of individuals who got the news from either newspapers or television, we add the number of individuals who got the news from only newspapers (24), the number of individuals who got the news from only television (13), and the number of individuals who got the news from both sources (5). Therefore, n(Newspapers or Television) = 24 + 13 + 5 = 42.
Finally, to determine the number of individuals who did not get the news from either newspapers or television, we subtract the number of individuals who got the news from newspapers or television (42) from the total number of individuals surveyed (68). Therefore, n(Neither) = 68 - 42 = 26.
By analyzing the completed Venn diagram and calculating the cardinality for each region, we can provide the answers to the specific questions regarding the number of individuals who got the news from only newspapers, only television, both newspapers and television, and those who did not get the news from either source.

learn more about cardinality here

https://brainly.com/question/13437433



#SPJ11

Does forwarding an email notify the original sender?

Answers

Whether forwarding an email notifies the original sender depends on the email client and the email server settings. Some email clients have the option to notify the original sender when an email is forwarded, while others do not. Additionally, some email servers also have options to notify the original sender when an email is forwarded, but it's not a standard. It's also possible that the email client or server used by the original sender can detect that an email has been forwarded, but it doesn't notify the sender.

So in summary, whether forwarding an email notifies the original sender is not something that can be determined generally, it depends on the specific email client and server settings.

Explain the expression below
volume = 3.14 * (radius ** 2) * height

Answers

Answer:

Explanation:

Cylinder base area:

A = π·R²

Cylinder volume:

V = π·R²·h

π = 3.14

R - Cylinder base radius

h - Cylinder height

an industrial operating system works with a large computer system requiring a(n) . a. ide b. server c. sdk d. gui

Answers

b. server. an industrial operating system works with a large computer system requiring a server.

An industrial operating system typically works with a large computer system, which requires a server to manage and control various operations. A server is a powerful computer that provides services or resources to other computers or devices in a network. It handles data storage, communication, security, and other critical functions. The industrial operating system communicates with the server to access the necessary data and resources, and the server responds by executing the requested commands or actions. Without a server, it would be challenging to manage and coordinate the complex operations of an industrial system effectively. Therefore, a server is an essential component of an industrial operating system.

learn more about operating system here:

https://brainly.com/question/31551584

#SPJ11

Leslie’s parents put a big dry-erase board on the refrigerator and let the kids write suggestions for how to organize and assign household chores. Which step of problem solving does this situation illustrate?

A. Define the problem
B. Evaluate the solution
C. Determine possible solutions
D. State and check assumptions

Answers

Answer

determine possible solutions

Explanation:

im assuming

ty for the thanks

How would you create a loop that never ends?

a
Use the "repeat" block

b
Use the "infinite" block

c
Use the "repeat until" block

d
Use the "forever" block

Answers

Answer:

the answer is d use the forever block

Explanation:

I took the test and I got it right but sometimes it is different for others

Other Questions
The term ______ is used to stress that the political, economic, and legal systems of a country are connected. Could anyone solve this ? I always mark brainiestI need to find a divergent boundary where seafloor spreading occurred in the real world. It can not be the mid-Atlantic ridge or Iceland. Thank You What does the Constitution say about equal representation? PeregrinationMisfortune Horrified Despair Sarcastic Plz help find meaning is a form of social support that involves the provision of services, financial assistance, or goods. the form of bond issue in which the bond is issued without record of the owner's name, with relevant payments made directly to whoever physically holds the bond, is called What happens when "morning's altar whitely burns"?Question 4 options:The sun rises.The sun shines brightly.Flowers begin to grow.The speaker wakes up. PLS HELP ASAP WITH SCREEN SHOTS ASAPTHANKS ILL GIVE BRANLIEST ALSO HOW DO YOU TURN OFF CAPS LOCK .Calculate pay in the following cases- 2+4+3= 10 marksa) Mark works at a rock concert selling programs. He is paid $20 for showing up,plus 45 cents for each program that he sells. He sells 200 programs. Howmuch does he earn working at the rock concert?b) Mary wood is an architect working for New Horizons. She makes every month a salary of 5500.i What is her annual income?ii What is her gross earnings per pay period.iii How much does she earn per period if paid semi-monthlyiv How much does she earn per period if paid weekly.c) Danny Keeper is paid $12.50 per hour. He worked 8 hours on Monday and Tuesday, 10 hours on Wednesday and 7 hours on Thursday. Friday was a public holiday and he was called in to work for 10 hours. Overtime is paid time and a half. Time over 40 hours is considered as overtime. Calculate regular salary and overtime. Show all of your work. One of the defining aspects of mass extinctions in that natural selection forces do not play a role in the outcome? What are the functions of the provincial school boards?. Error analysis: You are going to find the error(s) in the math work shown below. Explain any errors completely, then enter the correct solution including the correct steps. For both problemsThank you please answer In the competitive forces model, the central force that the other four forces contribute directly to the strength of is:Question 18 options: rivalry among established firms in the industrybargaining power of supplierscloseness of substitutes to an industry's productsrisk of entry by a potential competitor. How does hajj strengthen the community of the Muslims around the world in the 1990s there were few hip-hop artists who participated in traditions that were less militant than those of the east and west coast factions of gangsta rap.truefalse Assume bob did use margin to buy his verizon stock. also, assume he paid another $40 to sell his stock and sold the stock for $25 a share. how much profit did he make on his verizon stock investment? Simon makes 30 cakes he gives 1/5 of it to sali he gives 10% the velocity of an object as a function of time is given by v(t) = 2.00 m/s (3.00 m/s) t - (1.0 m/s2) t2. determine the instantaneous acceleration at time t = 4.00 s. For each pair of triangles below state whether the triangles are congruent not congruent or impossible to tell