Conduct online research on any three careers related to computers and electronic communication that are important for business, management, and administration. For each of these roles, discuss how electronic communication is useful. Type your response here:

Answers

Answer 1

You will examine numerous computer and electronic communication-related occupations in this assignment. Communication styles, Eight Different Listening Reactions. Listening in silence. Questioning. Paraphrasing. Empathizing. Supporting. Analyzing. Evaluating. Advising.

Describe electronics

The emission, behavior, and consequences of electrons as well as electronic devices are the focus of the physics and electrical engineering field known as electronics.

An extraordinarily wide spectrum of technology is included in electronics. The phrase was first used to refer to the investigation of electron behaviour and motion, notably as seen in the earliest electron tubes. With new information regarding the nature of electrons at their core and the potential applications of their motion, it started to be used in a broader meaning.

To know more about electrons visit now

https://brainly.com/question/1255220

#SPJ4


Related Questions

she encounters malicious code that was set to carry out its functions when a specific event occurred in the future. what did alice detect?

Answers

Alice detect a logic bomb. An purposeful harmful code insertion into a software to damage a network when specific criteria are satisfied is known as a logic bomb.

A network in information technology is described as a physical or wireless connection between at least two computer systems. A combination of two computers connected by a cable forms the simplest network. Peer-to-peer networks are this kind of network. Both participants in this network have equal privileges; there is no hierarchy. Each computer has access to the other's data and can share resources like storage space, software, or peripherals (printers, etc.).

Today's networks frequently include more than two computers and are a little more complicated. Client-server networks are typically used in systems with more than ten participants. In these networks, a central computer (server) gives network members access to resources.

Here you can learn more about network in the link brainly.com/question/15088389

#SPJ4

wireless wearable fitness devices are authorized within scifs. True or False?

Answers

Within SCIFs, wireless wearable fitness devices are permitted. Banner lines, section marks, and a CUI designation indicator are necessary for controlled unclassified information (CUI).

Why do we hold Siprnet training every year?

This annual SIPRNET refresher training's goal is to make sure that everyone using the MEDCOM SIPRNET is aware of their duties in protecting sensitive information and systems in line with applicable Army rules and MEDCOM policy on SIPRNET Security Procedures.

\What is necessary in order to access classified information?

An individual must have national security eligibility, a need for the information, and have signed a Standard Form 312 (SF-312), Classified Information Nondisclosure Agreement, in order to have allowed access to it.

To know more about devices visit:-

https://brainly.com/question/13870219

#SPJ4

How To Fix 'Unable To Connect To The Login Queue' Error In League of Legends?

Answers

How To Fix The Problem Where You Can't Connect To A Login Queue Try relaunching League of Legends first.Please restart your computer if it doesn't resolve the problem because there might be one there as well.Look into your internet connection.

How can the League of Legends login line be fixed?

Fixes for the League for Legends Registration Queue Error Checking everything should be your initial step.Ensure that all of the wires are properly connected and that your internet access is operational.But when they are, it might be beneficial to detach, then reconnect.

Why am I unable to sign in to League of Legends?

If you are having trouble logging into League of Legacies, we advise double-checking your login information to make sure it is for you LoL/Riot account.If you've forgotten your account's password or are unsure if it's the right one, you can also try to reset it.

To know more about League of Legends visit:

https://brainly.com/question/28440140

#SPJ4

the difference between the lower class limits of adjacent classes provides the group of answer choices number of classes. class limits. class midpoint

Answers

The Class Width is determined by the variation between lower class limits of adjacent classes.

Class width in a frequency distribution is the distance between two consecutive lower limits (or two consecutive lower class boundaries). The class width is also the difference between the lower or upper bounds of two classes that follow one another. The distance between the upper and lower class limits in a frequency distribution table is referred to as the class interval's breadth or size. A class interval, for instance, is any of the groups 20–25, 25–30, 30-35, etc. The Class Width is determined by the variation between lower class limits of adjacent classes.

Learn more about frequency here-

https://brainly.com/question/13149415

#SPJ4

It is impossible to _____________ and not _____________ at something unless you live in such a cautiously way that is not worth living

Answers

It is impossible to spend a life without failing at doing something, except you live your life with such caution that it would have been better to not have existed at all, in which case you fail by osmosis.

What does Rowling define as imagination, and what is it's purpose?

She claimed that imagination is the root of all creativity and innovation, not just the unique human ability to picture the unreal."It is the ability that permits us to empathize other others whose experiences you have never lived, and it is undoubtedly the most transforming and enlightening capacity."

Why is it called Excel?

To excel in English implies to be exceptionally good at something and to outperform others.Early in the 1980s, Lotus 1-2-3 rose to prominence as the top spreadsheet application.Multiplan, a spreadsheet tool from Microsoft, fell behind in popularity.

To know more about living visit:

https://brainly.com/question/29153181

#SPJ4

a project is due in two days, and the team of testers needs at least three days to finish testing. based on the istqb code of ethics, what should the team of testers do? group of answer choices

Answers

In accordance with the general welfare, testers must uphold the integrity and credibility of their trade. COWORKERS: Testers must treat their coworkers with respect and fairness. Participants in the test must pursue lifelong learning.

Explain about the purpose of testing ISTQB?

The goal of testing is to fully inform the stakeholders about any limitations, risks, or unclear requirements that may exist on a technical or otherwise basis.

Examining a product's documentation and contents to assess how well demands or requirements have been satisfied, to look for flaws, gauge quality and risk, build trust, and stop flaws.

A software product or application is tested in order to determine whether or not it performs as intended. Testing has advantages such as problem elimination, lower development costs, and enhanced functionality.

Identification and subsequent correction of faults is the main advantage of testing. Comparing actual and anticipated results during testing enables developers and testers to enhance quality. It may be worthless or even dangerous for clients if software is produced without being tested.

To learn more about purpose of testing ISTQB refer to:

https://brainly.com/question/29973345

#SPJ4

using the w/b hat model, which hacker is more likely to make up a web site to teach new hackers how to hack a network?

Answers

A white hat hacker, commonly referred to as an ethical hacker, uses hacking methods to discover security holes in hardware, software, or network infrastructure.

In contrast to black hat hackers, or hostile hackers, white hat hackers adhere to the law as it relates to hacking. White hat hacking typically follows black hat hacking. The expressions are inspired by old Western movies where the villains typically wore black hats and the heroes typically wore white hats. When it's legal to do so, white hat hackers will solely search for security holes or exploits. White hat hackers are permitted to do research on systems or programs they own or have been given permission to study in addition to open source software.

Learn more about permission here-

https://brainly.com/question/13146880

#SPJ4

what component can be used to reduce the risk of a trojan or rootkit sending information from an attacked computer to a remote host?

Answers

The correct answer is Firewall  component can be used to reduce the risk of a trojan or rootkit sending information from an attacked computer to a remote host.

An organization's previously set security rules are used to monitor and filter incoming and outgoing network traffic through a firewall, a network security device. A firewall is simply the barrier that stands between a private internal network and the open Internet at its most basic level. Internet traffic entering, leaving, or moving within a private network is restricted by a firewall, a computer network security device. By selectively blocking or permitting data packets, this software, or dedicated hardware-software device, performs its purpose. A firewall may be physical or software. Each computer has software firewalls placed on it.

To learn more about Firewall click the link below:

brainly.com/question/13098598

#SPJ4

what are the characteristics of tacacs ? (select 3 answers) group of answer choices combines authentication and authorization encrypts only the password in the access-request packet primarily used for network access separates authentication and authorization encrypts the entire payload of the access-request packet primarily used for device administration

Answers

Tacacs have the characteristics of being primarily used for network access, combining authentication and authorization, and encrypting only the password in the access-request packet.

What is TACACS and how does it function?

A security protocol called TACACS—Terminal Access Controller Access Control System—provides centralized validation of users who attempt to access a router or NAS. TACACS+ provides distinct accounting, authorization, and authentication services. Administrator authorization can be managed with the help of vendor-specific attributes (VSAs) provided by TACACS+. TACACS+ VSAs let you quickly change administrators' roles, access domains, and user groups through your directory rather than changing firewall settings. The process of determining who a user (or entity) is is known as TACACS Authentication. A username and a fixed password are used for traditional authentication. However, there are limitations to fixed passwords. "One-time" passwords or challenge-response queries are two common modern authentication methods.

To learn more about TACACS visit:

https://brainly.com/question/29308796

#SPJ4

refer to the exhibit. in what switch mode should port g0/1 be assigned if cisco best practices are being used?

Answers

If Cisco best practices are being used, port G0/1 should be assigned to Access mode. This mode is used when connecting a single host to the switch. In Access mode, the switch will automatically set the port to the correct VLAN and will not allow the host to send or receive tagged frames.

Access mode is used when connecting a single host to a switch and is the recommended mode if Cisco best practices are being followed. In Access mode, the switch will automatically set the port to the correct VLAN and will not allow the host to send or receive tagged frames.

Access mode provides a simple, secure way to connect a host to a switch, as it ensures that only traffic relevant to that host is sent to the port. Additionally, Access mode prevents a host from accidentally sending traffic to other ports on the switch.

Learn more about port switching:

https://brainly.com/question/29035398

#SPJ4

you are configuring a router for a small office network. the network users should be able to access regular and secure websites and send and receive email. those are the only connections allowed to the internet. which security feature should you configure to prevent additional traffic from coming through the router? group of answer choices port forwarding/mapping mac filtering port security/disabling unused ports content filtering

Answers

To prevent additional traffic from coming through the router and only allowing the specified connections, you should configure content filtering.

Describe router?

It connects multiple devices on a home or office network, allowing them to communicate with each other and with the Internet. Routers use routing tables to determine the best path for forwarding the packets, and they use network address translation (NAT) to share a single Internet connection among multiple devices. They also typically include built-in firewall functionality to protect the network from unauthorized access.

Content filtering is a security feature that controls access to specific types of internet content, such as websites and email. It can be used to block or allow access to specific websites, email addresses, and IP addresses. This can be configured to only allow regular and secure websites, and email traffic, while blocking other types of traffic.

Port forwarding and mapping, MAC filtering, and port security/disabling unused ports are all important security features, but they are not directly related to controlling access to specific types of internet content.

Port forwarding allows incoming traffic to be directed to a specific device on the network based on the destination port, it is useful when you need to allow incoming traffic to access a specific service or application on a device on your network.

MAC filtering allows you to specify which devices are allowed to connect to your network based on their MAC address.

Port security/disabling unused ports, it helps to prevent unauthorized devices from connecting to the network by disabling unused ports or limiting the number of devices that can connect to a specific port.

To know more network visit:;

https://brainly.com/question/13105401

#SPJ4

PLEASE HELP ILL GIVE POINTD AND BRAINLIEST

Joshua forgot to add a heading style to the title of the first journal entry. What will happen in his table of contents without that heading style?


The journal entry title will be in a different color than other entries in the table of contents


The journal entry will be bolded in the table of contents.


the journal entry will not be included in the table of contents


The journal entry will be italicized in the table of contents

Answers

The journal entry won't be included in the table of contents because it lacks that headline style.

How do you format numbered list items in the Heading 1 style?

Open the document with built-in heading styles selected, and then choose Heading Select Multilevel List in the Paragraph group under the Home tab's Home option. The numbering style you want to use in your document can be found under List Library.

How can I insert a new heading into an existing Word table of contents?

To view the table of contents, select References. Choose Create an own table of contents. Use the options to add or modify the tab leader, configure formats, specify, and show, hide, and align page numbers.

To know more about heading style visit:-

https://brainly.com/question/16951777

#SPJ4

a data analyst is working with the penguins dataset. what code chunk does the analyst write to make sure all the column names are unique and consistent and contain only letters, numbers, and underscores?

Answers

clean_names (penguins) is the portion of code that analysts write to ensure that all column names are distinct, uniform, and only comprise letters, digits, and underscores.

A data analyst is much more than just a calculator. Analysts examine data to find solutions to issues, get important knowledge about a company's clients, and increase revenue. Key stakeholders, such as the corporate management, are also informed by analysts. Modern businesses rely heavily on data analysts to reflect on their work and client base, assess how these elements have affected earnings, and offer leadership advice on how to expand the company going forward. According to McKenzie, data analysts also need a solid foundation of business knowledge and technical abilities, including problem-solving, communication, and decision-making.

Here you can learn more about data analyst in the link brainly.com/question/28893491

#SPJ4

jane has been asked to investigate a method that would ensure email traffic gets priority on the corporate network. she would need to implement ?

Answers

Trevor should employ NTP technology to make sure that some traffic receives priority over other traffic.

To synchronize with networked computer clock time sources, one uses the Network Time Protocol (NTP) internet protocol. One of the initial parts of the TCP/IP suite, it is a component. NTP is the name of both the protocol and the client-server computer systems. A network of computers is time-synchronized using the Network Time Protocol (NTP) technology. NTP makes use of User Datagram Protocol (UDP), an IP-based protocol. NTP Version 3 documentation can be found in RFC 1305. This module explains how to configure Network Time Protocol on Cisco gear. Trevor should employ NTP technology to make sure that some traffic has precedence over other traffic so that the most crucial traffic gets through even when there is congestion.

Learn more about NTP here:

https://brainly.com/question/29554810

#SPJ4

other than installing virus and worm control software, what can sls do to prepare for the next incident?

Answers

SLS can help users become more aware of viruses and take precautions. Opening such files would be unethical because they might contain malware and viruses that could cause further system attacks and result in significant financial loss for the organisation.

In what ways can computer viruses be avoided?

Stay away from websites you don't trust. Open no email attachments from unknown senders or businesses. Avoid clicking on links in spam emails. Always check the destination of a link with your mouse before clicking on it (especially one with a short URL).

How do you prevent computer viruses, and what are they?

A malicious piece of computer code created to spread from one device to another is known as a computer virus. These self-copying threats, a subset of malware, are frequently made to harm a device or steal data. Consider a biological virus that causes illness.

To know more about malware visit:-

brainly.com/question/14759860

#SPJ4

WHERE CAN I FIND HOW MANY POINTS I EARNED!
BE SPECIFIC PLS

EXACT LOCATION

Answers

Answer:

This is the option if you are using brainly in the browser.

On the right top corner click on your account, then click view profile.

In your profile under your username, you have the number of points you earned.

If you are using the app brainly

Go on the app, click profile on the right low corner and under your username you should be able to see your points

I hope that helped.

Explanation:

This is the option if you are using brainly in the browser.

On the right top corner click on your account, then click view profile.

In your profile under your username, you have the number of points you earned.

If you are using the app brainly

Go on the app, click profile on the right low corner and under your username you should be able to see your points

I hope that helped.

When working on a selection sort method, what are the things you need to remember about the three methods you need to code?
element in an array from a given element n to the end of the array.
First, you need a method that finds the position of the
Second, you need a method that
the contents of two elements in an array. Third, you need a method that uses the above two
methods to perform the sort.

Answers

First, you need a method that finds the position of the smallest element in an array from a given element n to the end of the array. Second, you need a method that swaps the contents of two elements in an array. Third, you need a method that uses the above two methods to perform the sort.

What is the array  about?

When working on a selection sort method, you need to remember the following about the three methods you need to code:

The first method should be a method that finds the position of the smallest element in an array from a given element n to the end of the array. This method should iterate through the array starting from the given element n and compare each element to the current minimum value. If an element is smaller than the current minimum value, it should update the minimum value and its position.

The second method should be a method that swaps the contents of two elements in an array. This method should take in the array and the positions of the two elements to be swapped as inputs, and should use a temporary variable to store the value of one element before swapping the values of the two elements.

Learn more about array from

https://brainly.com/question/28061186
#SPJ1

Imagine you are a team leader at a mid-sized communications company. One of your fellow team leaders is considering setting up a cloud computing system for their team to store and share files. They have begun to question the wisdom of this move, as someone has told them that security might be an issue. Security concerns aside, what would you say in order to convince them that cloud computing is a good idea? Mention at least three advantages that would benefit their team

Answers

Users can launch their applications rapidly by developing in the cloud. Data security: Because of the networked backups, hardware failures do not cause data loss.

What exactly is cloud computing in simple terms?

Cloud computing can be defined as the provision of computer services over the Internet ("the cloud"), including servers, storage, databases, networking, software, analytics, and intelligence, in order to give scale economies, faster innovation, and flexible resources.

Which of the following encapsulates cloud computing the best?

Instead of purchasing and installing the components on their own computers, organizations and people who use cloud computing rent or lease computing resources and software from third parties across a network, such as the Internet.

To know more about loud computing visit:-

https://brainly.com/question/29737287

#SPJ4

Input Sanitisation and SQL injections question.

What is meant by the term ‘Input Sanitisation’ and how can it prevent SQL injections? Explain your answer in full.

Answers

Answer:

Input sanitization refers to the process of ensuring that any data input by a user into a system or application is clean, safe and does not pose a security risk. This process is used to prevent malicious attacks such as SQL injection, which is a type of exploit that allows an attacker to insert malicious SQL statements into a web form input box to gain unauthorized access to a database.

Reggie wants to send an audio file to his colleague. However, he is unable to do so as the files are heavy in format. His friend asked him to convert the [BLANK] files to [BLANK] files

Answers

Audio file formats are categorized into three broad categories: raw headerless PCM or uncompressed audio formats like WAV, AIFF, or AU.

What is  [BLANK] files?

A file that does not contain any data is referred to as a "blank document" or "blank file." For instance, beginning with a blank document, creating a new document in Microsoft Word begins.

Right-click the area where you want to create the file in Windows. To start a new text file on the desktop, for instance, right-click the desktop. Select New and Text Document from the available drop-down menu.

Using the right-click menu in File Explorer, Microsoft lets you make a new, blank text file. Navigate to the folder in File Explorer where you want to create the text file. Navigate to New > Text Document by right-clicking on the folder. The default name for the text file is "New Text Document."

Learn more about files:

brainly.com/question/14312868

#SPJ4

modern network traffic monitoring devices, such as fireeye and palo alto, provide a higher level of security and detection than common firewalls and ids/ipss. describe how these devices function. do they really offer the level of protection that they claim? would you recommend them to a client? why or why not?

Answers

A firewall is essentially the barrier that stands between a private internal network and the open Internet at its most basic level. The basic function of a firewall is to let safe traffic in while blocking harmful traffic.

Two cloud-based security platforms, FireEye and Palo Alto Network's (PAN) Wildfire, are used to quickly aggregate, analyze, and share threat data across all of their respective customer installations and subscriptions. Palo Alto Networks provides superior architecture and advantages: full view and exact control: Based on apps, users, content, and devices, our next-generation firewalls offer total insight into all network traffic. Do not allow unauthorized file and data transfers. Find and stop malware, exploits, and malware communications. Control unauthorized web usage.

Learn more about communication here-

https://brainly.com/question/22558440

#SPJ4

a wireless engineer is comparing the deployment of a network using wpa2 versus wpa3 authentication. how is wpa3 authentication more secure when deployed in an open wlan network in a newly built company-owned cafe shop?

Answers

WPA3 is more secure than WPA2 in open WLAN networks because it uses stronger encryption algorithms, such as AES-256, and also includes additional security features like individualized data encryption (per-device encryption keys).

How is WPA3 more secure than WPA2?

WPA3 improves upon WPA2 by using stronger encryption, such as AES-256, and implementing additional security features like individualized data encryption for each client connected to the network.

Additionally, WPA3 includes a feature called Simultaneous Authentication of Equals (SAE), which provides protection against password-guessing attacks. Overall, WPA3 offers improved security for wireless networks and better protection for user's personal information.

To learn more about WPA3, visit: https://brainly.com/question/30141718

#SPJ4

when reconciling a bank account in qbo, where does the value of the register balance come from?

Answers

Learn how to balance your accounts so that they constantly match your bank and credit card bills. similar to keeping your checkbook in order

What does QuickBooks' register balance mean?

The balance in the register of QuickBooks Online will be $900 if, for instance, your bank balance is $1000 and you have an outstanding check for $100. QuickBooks Online will enter the check into the register, making it appear as though it has already cleared the bank and reducing your balance by $100.

How can I compare the balances in my bank account and QuickBooks?

Reconcile can be found under Settings in QuickBooks Online. Select Get started to proceed if this is your first time reconciling. Choose the desired account from the Account menu.

To know more about bank account visit:-

https://brainly.com/question/13242916

#SPJ4

question 9 please help

Answers

Answer:

FileZilla

Explanation:

FileZilla is open-source software that supports multiple FTP protocols that allow file exchange over the network.

how long does it take for nintendo switch controllers to charge

Answers

Nintendo switch controllers must be fully charged for the Joy-Con controllers, which takes about three and a half hours.

How can my Switch Controllers be charged quickly?

Simply docking the Nintendo Switch controllers to the edges of the system is a fairly easy way to charge them. The controllers will begin charging the moment you connect them, and it doesn't take long as long as the console's main tablet-like component is on.

Can Joycons be wirelessly charged?

When within two feet of Powercast's PowerSpot wireless transmitter, wireless charging grips for Nintendo Switch Joy-Con Controllers begin to charge without the use of wires, plugs, or charging mats. There is never a need for users to dock their controllers, plug in, or stop playing because of a low battery.

To know more about switch  visit:-

https://brainly.com/question/20595293

#SPJ4

what are examples of potential security breaches that would need to be referred to the local spec territory office? a. loss of computer containing personally identifiable information (pii) b. loss of computer bag containing tax returns c. loss of taxpayer information d. all of the above

Answers

Answer:

Explanation:

D

Consider two different implementations of the same instruction set architecture. The instructions can be divided into four classes according to their CPI (class A, B, C, and D). P1 with a clock rate of 2. 5 GHz and CPIs of 1, 2, 3, and 3, and P2 with a clock rate of 3 GHz and CPIs of 2, 2, 2, and 2.



Processor Class A Class B Class C Class D

P1 3 2 1 4

P2 2 2 2 2



Given a program with a dynamic instruction count of 1. 0E6 instructions divided into classes as follows: 10% class A, 20% class B, 50% class C, and 20% class D.


a. Which implementation in faster?

b. What is the global CPI for each implementation?

c. Find the clock cycles required in both cases?

Answers

The metric known as cycles per instruction, or CPI, as it is defined in Fig. 14.2, has been a component of the VTune interface for a long time. It provides information on how many CPU cycles are typically needed to retire an instruction.

How is the global CPI determined?

P1 CPU Time = (2.6 * 106 Clock Cycles) / 2.5 GHz = 1.04 (106/109) = 1.04 * 10-3 = 1.04 ms, where the global CPI is 2.6 cycles per instruction. P2 CPU Time = (2 * 106 Clock Cycles) / 3 GHz = 0.667 (106/109) = 0.667 * 10-3 = 0.667ms, with the global CPI set to 2 cycles per instruction. P2 outpaces P1 in speed.

What factors affect how often instructions are executed?

A useful average is called clocks per instruction (CPI). is calculated as the average of each instruction execution in a program. Instruction complexity has an impact on CPI at the instruction level.

To know more about cycles per instruction visit :-

https://brainly.com/question/14210413

#SPJ4

where is the known traveler number on global entry card

Answers

On a Global Entry card, where is a Known Traveler Number located? By scanning the back of your Global Entry card, you can immediately obtain your Known Traveler Number, commonly known as PASSED. This number usually has nine digits and starts with 15.

A Known Traveler Number (KTN) is what, exactly?

Each person cleared for TSA PreCheck® expedited screening receives a Known Traveler Number (KTN). When making airline travel plans, the KTN must be entered in the KTN field in order for the TSA PreCheck® indicator to show up on your boarding pass.

This number is 9 digits long, can contain both numbers and letters, and commonly starts with TT for participants in the TSA PreCheck® Application Program.

To know more about Traveler numbers visit here

https://brainly.com/question/12775270

#SPJ4

What is the most advanced warehouse inventory management software?

Answers

Answer:

Warehouse Management System

Top 10 Warehouse Management Systems

WMS Comparison Table

#1) Sortly

#2) NetSuite WMS

#3) Fishbowl Inventory

#4) 3PL Warehouse Manager

#5) Softeon

#6) Infor SCM

#7) HighJump

#8) Manhattan Associates

#9) TECSYS WMS

#10) Astro WMS

#11) Latitude WMS

Explanation:

How to report interest income from the Internal Revenue Service?

Answers

The U.S. Individual Income Tax Return Form 1040, the U.S. Tax Return for Seniors Form 1040-SR, and the U.S. Nonresident Alien Income Tax Return Form 1040-NR all allow for the reporting of interest income.

Do you need to notify the IRS of interest you received?

Even if a Form 1099-INT or Form 1099-OID is not sent to you, you are still required to declare any taxable and tax-exempt interest on your federal income tax return. In order to avoid penalties and backup withholding, you must provide the payer of interest income with your accurate taxpayer identification number.

The Internal Revenue Service defines interest income as what?

The income a person earns from certain bank accounts or by lending money to another person is known as interest income. This income is taxable, meaning it is liable for income tax.

To know more about Individual Income visit :-

https://brainly.com/question/17075354

#SPJ4

Other Questions
PLEASE HELP(PIC)123456789?=picture posted where is the oldest state capitol still in continuous use? g suppose that w(t) is a real-valued signal. prove that its fourier transform magnitude is symmetric around f an avid skater wants to buy a new skateboard. they go to search in order to research and purchase the best skateboard they can find. which steps, in order, could the skater take to interact with search ads? Ryan claims that the cost of Plan A and Plan B differ a lot.Which statement best explains why Ryan was misled by the graph?a.) The two graphs use different vertical scales.b.) The scale of intervals on the horizontal axis of both graphsis inconsistent.c.) The graph of Plan B shows a rapid increase in price.Ed.) The graph of Plan A shows a gradual increase in price. A manufacturer of bolts has a quality-control policy that requires it to destroy any bolts that are more than 2 standard deviations from the mean. The quality-control engineer knows that the bolts coming off the assembly line have mean length of 10 cm with a standard deviation of 0. 05 cm. For what lengths will a bolt be destroyed? among mid-level / intermediate data science employees whose employment type is full time, the median salary in us dollars is A character dying stranded on an island just before rescue arrives is an example of which type of irony?A) VerbalB) DramaticC)SituationalD)Morbid what substance is removed from the blood in the lungs to be exhaled? Shalissa is described as being tactful and able to manipulate situations to her advantage. She is probably high in ______ at a high-end restaurant, the restaurant owner has one chef at a meat station, one chef at a vegetable station, and one chef, who has an artistic eye, plate the food she is given. the result is increased service speed, and the kitchen is able to serve more customers in an evening In the context of the passage, the author probably intends the reader to find the words of Jack Ketchis wife A sobering B deceptive horrifying D humorous E compassionate sociology: pls help thxbtw the highlighted option is wrong Which calculation shows the best method for estimating the result of 384 divided by three-sixteenths?400 divided by one-fourth equals 1,600400 divided by one-fourth equals 100300 divided by one-third equals 900300 divided by one-third equals 100 How to find proportional parts in triangles and parallel lines? a ball is thrown horizontally from the top of a 70.6-m building and lands 188 m from the base of the building. ignore air resistance. how long is the ball in the air? Using a balance, determine the mass of the ball and basket of the ballistic pendulum. Fire the ballistic pendulum and measure the maximum height the pendulum reaches. Use the conservation of energy (initial KE + initial GPE = final KE + final GPE, KE = 12mv2; GPE = mgh) to calculate the initial speed of the pendulum after the ball has collided with the pendulum basket. Next, use the conservation of momentum (total initial p = total final p; p = my) fo determine the initial speed of the ball before it collided with the pendulum basket. what is the position of (L) with respect to (c) which party transfers the right of possession and use of a good for a term in return for consideration? a defendant is on trial for the brutal murder of a victim. the defendant's first witness testified that, in her opinion, the defendant is a peaceful and nonviolent person. the prosecution does not cross-examine the witness, who is then excused from further attendance. which one of the following is the least likely to be admissible during the prosecution's rebuttal?