For this lesson, you will come up with your own challenging algorithm for other students to trace. It must contain at least 4 if statements, 1 else statement and use at least one and or or boolean condition.

Answers

Answer 1

Below is the program involves in tracing the possible output of the code, which has 5 variables in total. Python 3 is used to write the program.

Coding Part:

a , b, c, d, e = (10, 5 , 6, 2, 9)

#using the tuple unpacking, assigning values to the given variables a, b, c, d, e

if a > b:

#The first, if statement which tests if  the variable a is greater than b

e = b + 1

#if it is. Set variable e = b + 1

if b > c :

#if the above check becomes false, then we check if b > c

e = b * 2

#if it is, set variable e = b×2

if c > d :

#if the above is false, check if c >d

e = c /2

#if it is, set, variable e to c divided by 2 ; if not

if (d>e) or (d > c):

#if either condition is true,

e = d -2

#set e to d - 2 ; if not

if e < a :

#Check if e > a

e = e * 5

# set e to e multiplied by 5

print(e)

#display the final value of e

To learn more about Python program, visit: https://brainly.com/question/26497128

#SPJ4


Related Questions

when you are declaring an array, you must use the size declarator and create an initialization list. t/f

Answers

False. An array definition does not require an initialization list if the size declarator is omitted.

What is an Array?

An array is a type of data structure that consists of a collection of elements with the same memory size, each of which is identified by at least one array index or key.

A mathematical method is used to compute the position of each element from its index tuple in an array.

An array declaration gives the array a name and describes the type of elements it contains. It can also specify how many elements are in the array. A variable with an array type is regarded as a pointer to the array elements' type.

Learn more about array here:

https://brainly.com/question/30099412

#SPJ1

if more than one class of shares is authorized, what type of information must be specified? (select all that apply)

Answers

Answer:

- Designation to distinguish each class

- Specific rights for each class

define a sequence of functions recursively by and for integers . find the least value of such that the sum of the zeros of exceeds .

Answers

A recursive sequence, also known as a recurrence sequence, is a series of numbers generated by solving a recurrence equation. The terms of a recursive sequence can be denoted symbolically in a variety of ways, such as, or f[], where.

What is recursive sequence?

A recursive sequence, also known as a recurrence sequence, is a sequence of numbers f(n) indexed by an integer n that is generated by solving a recurrence equation. Recursive sequence terms can be symbolically denoted in a variety of ways, such as f n, f(n), or f[n], where f is a symbol representing the sequence.

The concept of sequences in which later terms are deduced from earlier ones, which is implicit in the mathematical induction principle, dates back to antiquity.

To know more about recurrence equation, visit: https://brainly.com/question/14208577

#SPJ4

where in the dashboard would you primarily view and engage with your audience and the social media content published by others? review later the composer area the app directory area the boards and streams area the content library area

Answers

A content library stores and manages content in the form of library items. A single library item can consist of one file or multiple files.

What is Content libary area?

The OVF template is a set of files (.ovf, .vmdk, and .mf). When you upload an OVF template to the library, you upload the entire set of files, but the result is a single library item of the OVF Template type.

Starting with vSphere 7.0 Update 3, you can protect the OVF items by applying default OVF security policy to a content library. The OVF security policy enforces strict validation on OVF items when you deploy or update the item, import items, or synchronize OVF and OVA templates.

In previous versions of vSphere, content libraries supported only OVF templates. As a result, VM and vApp templates were both converted to OVF files when you uploaded them to a content library. Starting with vSphere 6.7 Update 1, content libraries also support VM templates.

Therefore, A content library stores and manages content in the form of library items. A single library item can consist of one file or multiple files.

To learn more about social media, refer to the link:

https://brainly.com/question/29036499

#SPJ1

Consider the following incomplete method, which is intended to return the number of integers that evenly divide the integer inputVal. ; Assume that inputVal is greater than 0.
public static int numDivisors(int inputVal)
{
int count = 0;
for (int k = 1; k <= inputVal; k++)
{
if ( /condition/ )
{
count++;
}
}
return count;
}
Which of the following can be used to replace /condition/ so that numDivisors will work as intended?
Select one:
a. inputVal % k== 0
b. k % inputVal == 0
c. nputVal % k != 0
d. inputVal / k == 0
e. k / inputVal > 0

Answers

a. inputVal % k== 0

What is C programming?

The general-purpose programming language C is effective. The creation of software such as operating systems, databases, compilers, and other tools is possible with it. C is a great language for beginners to learn programming in.

What is operator and its types in C?

An operator is a symbol that instructs the compiler to carry out particular logical or mathematical operations. The built-in operators in the C language include the following categories:

Bitwise Operators

Assignment Operators

Arithmetic Operators

Relational Operators

Logical Operators

To know more about C programming, check out:

https://brainly.com/question/26535599

#SPJ1

Declan is creating a game but doesn’t know where to begin. Which of the following should be his first step? A. decide on a color palette for the game B. figure out the dynamics of the game C. create the game mechanics D. take a poll to find out what kind of game players want to play

Answers

Since Declan is creating a game but doesn’t know where to begin, his first step should be: C. create the game mechanics.

What is game mechanic?

In Computer technology, game mechanic can be defined as the rules and procedures that are designed and developed to govern and guide the actions of a game player, including the response of a game to the actions of a game player.

This ultimately implies that, game mechanic comprises rules and procedures that describes how a game player perform specific actions while playing a game such as the following:

A game player scoring a goal.A game player solving a puzzle.A game player progressing to a new level.A game player shooting a robot or alien.

Read more on game development here: brainly.com/question/13956559

#SPJ1

You have decided to establish a VoIP system in your home. Which of the following devices is necessary to connect your analog telephone to your VoIP server? a. Codec b. IP-PBX c. Softphone d. ATA

Answers

In order to establish VOIP network one way is by using ATA where we connect VOIP adapter to an analog telephone.

ATA (Analog Telephone Adaptor)

The simplest and most common way is to use a device called an ATA. ATA is a signal converter from analog to digital. ATA allows us to connect a regular telephone to a computer or connect to the internet to use Voip. The way it works is to convert the analog signal from the phone and convert it into digital data for transmission over the internet.

Providers such as VONAGE and AT&T Callvantage build ATA devices and provide them free of charge to their customers as part of their service. They just need to open the ATA, attach the telephone cable to the device, and Voip can be used.

Learn more about VoIP System: https://brainly.com/question/14255125

#SPJ4

In the following SAS program, the input data files are sorted by the NAMES variable:
libname temp 'SAS-data-library';
data temp.sales;
merge temp.sales
work.receipt;
by names;
run;
Which one of the following results occurs when this program is submitted?
A. The program executes successfully and a temporary SAS data set is created.
B. The program executes successfully and a permanent SAS data set is created.
C. The program fails execution because the same SAS data set is referenced for both read and write operations.
D. The program fails execution because the SAS data sets on the MERGE statement are in two different libraries.
Click Coment link to see answer.

Answers

When the program is submitted the result will be that, The program executes successfully and a permanent SAS data set is created.

What is a SAS data set?

A group of data values that SAS creates and processes is referred to as a data set. A data set includes. a so-called data table observations that are arranged in rows. a columnar array of variables.

One can generally think of a database as a collection of SAS data sets that are stored in the same directory and have linked information. Such a database stores information in various locations, just like a website.

Standard numeric values can be read by SAS data sets without the need for additional instructions. SAS needs certain guidelines in the form of informats in order to read nonstandard values.

To learn more about a SAS data set, use the link given
https://brainly.com/question/29353403
#SPJ4

listen to exam instructions to answer this question, complete the lab using the information below. you have completed this lab. if you want to change your answer, you may launch the lab again and repeat all lab tasks. you are the it administrator for a small corporate network. you have recently re-imaged the computer in office 1, and now you need to add it to the domain. in this lab, your task is to: connect the office1 computer to the local active directory domain. domain name: corpnet.local domain account: jgolden password: jgolden restart the computer and verify that it is a member of the domain.

Answers

Using the md5 hashing algorithm, # enable secret will allow a password and password encryption.

What does Cisco's enable secret command mean? It will activate a password and password encryption based on the MD5 hashing technique when you type in #enablesecret.The command to use when enabling a password on any Cisco network device is this one.In addition to overriding the enable password if it is specified, the _enable secret [password] command enables an encrypted password.Because it is an automatically encrypted password, the enable secret password is shown differently than how I configured it.The enable secret command improves security by using a nonreversible cryptographic function to store the enable secret password.When the password is shared across a network or kept on a TFTP server, the extra layer of security that encryption offers is helpful.

To learn more a bout Cisco refer

https://brainly.com/question/27961581

#SPJ1

your company has started the transition to ipv6. you need to configure records on the dns server so that clients can submit a hostname query and receive back an ipv6 address for the specified host. what should you do?

Answers

As one need to configure records on the DNS server so that clients can submit a hostname query and receive back an ipv6 address for the specified host. Create AAAA records.

What is DNS server?

The Domain Name System (DNS) Server is a server dedicated to mapping website hostnames (such as example.com) to their corresponding Internet Protocol or IP addresses.

The DNS server maintains a database of public IP addresses and the domain names that correspond to them.

DNS servers convert requests for specific domains into IP addresses, allowing users to control which servers they can access when they enter the domain name into their browser.

As a result, records on the DNS server must be configured so that clients can submit a hostname query and receive an IPv6 address for the specified host. Produce AAAA records.

Thus, this can be done in the given scenario.

For more details regarding DNS server, visit:

https://brainly.com/question/17163861

#SPJ1

according to firstmark's internet of everything landscape survey, energy, supply chain, robotics, and industrial wearables are all part of what dimension of the applications (verticals) segment? question 1 options:

Answers

The answer is industrial internet. The widespread use of smart gadgets has created new commercial prospects, automated work environments, and difficulties in comprehending the potential of these novel technology.

This network makes it possible to gather data, analyze it, and optimize manufacturing, which boosts productivity and lowers costs. It makes use of the data that conventional machines have generated in industrial settings over the past few years by leveraging the power of smart machines and real-time analytics. The IIoT is based on the idea that intelligent machines are better than people at gathering and processing data in real-time and communicating crucial information that can be used to make decisions about the business more quickly and accurately.

Learn more about network here-

https://brainly.com/question/29350844

#SPJ4

cache misses caused when the cache cannot contain all the blocks needed during program execution are called

Answers

When the cache is too tiny to keep all the data that is being accessed concurrently, capacity misses happen.

What transpires in the event of a cache miss?When a cache miss happens, the system or application continues to search for the information in the underlying data store, lengthening the request.The system may typically write the data to the cache, increasing latency once more; however, this latency is typically offset by cache hits on other data.A cache miss can occur for one of two fundamental reasons: The requested data was not buffered there, thus it cannot be located in the cache. The requested data has been cached, but since the last cache, the file properties have changed. The data has so been deleted from the cache.When the cache is too tiny to keep all the data that is being accessed concurrently, capacity misses happen. When several addresses map to the same set and evict blocks that are still required, conflict misses are the result. One or more types of cache misses can be impacted by changing cache parameters.

To learn more about When the cache is too tiny refer to:

https://brainly.com/question/6284947

#SPJ4

lately, users in one location have complained that they are unable to access resources stored on a server named fs23 in a south american branch office. to troubleshoot the issue, you have done the following: verified that the server is up and running. verified that the various routers in between the two locations are up and running.

Answers

According to the aforementioned statement this means, that One of the intermediate routers is an MTU black hole. Correct answer: letter A.

The ping command returns the "Packet needs to be fragmented but DF set" message when the path MTU (maximum transmission unit) is too small for the ping packet. This can happen when one of the intermediate routers is configured with an MTU that is too small. In this case, the router will drop any packets that exceed its MTU size, thus creating an MTU black hole.

What are intermediate routers?

Intermediate routers are network devices that forward data packets between two networks. They perform packet switching, packet filtering, and routing operations.

They use two or more network interfaces to connect two or more networks and can also provide connections from one network to another. Intermediate routers are typically used to provide access between a local area network (LAN) and a wide area network (WAN).

What does this mean?

A) One of the intermediate routers is an MTU black hole.

B) The destination host is down.

C) One of the intermediate routers is offline.

D) Collisions are occurring on the network.

E) Communications are functioning normally between your workstation and the targetserver server.

Learn more about intermediate routers:

https://brainly.com/question/28555879

#SPJ4

listen to exam instructions while deploying windows updates, when would you use the critical update ring?

Answers

While deploying windows updates, we should use the critical update ring when deploying updates to machines (only after the update has been vetted).

What is a windows update?

For the Windows operating system and other Microsoft software, Windows Update is a free service that is used to deliver updates like service packs and patches. Driver updates for well-known hardware devices can also be done with it.

The second Tuesday of every month, known as Patch Tuesday, sees the routine release of patches and other security updates via Windows Update. Microsoft does, however, also release updates on other days, for instance, when there are critical errors.

Windows Update is used to update Microsoft Windows and a number of other Microsoft applications.

To shield Windows from malware and malicious attacks, updates frequently include security updates as well as feature improvements.

To view the complete list of updates that have been downloaded and installed on the computer using the Windows Update service, you can also access the update history using Windows Update.

Learn more about windows update

https://brainly.com/question/28903855

#SPJ1

reach-to-grasp movements are made possible by two anatomically discrete but interconnected neural networks. true or false?

Answers

True. Reach-to-grasp movements are made possible by two anatomically discrete but interconnected neural networks.

What are the two neural networks of reaching and grasping movements?

The two anatomically discrete but interconnected neural networks underlying reach-to-grasp movements are:

The dorsal stream is responsible for formulating the motor commands necessary for executing a reach-to-grasp movement.The ventral stream is responsible for recognizing the object of the movement and guiding the hand to the correct location.

Together, these two systems enable the precise and coordinated movements required for successful reach-to-grasp movements.

Learn more about Neural networks:

https://brainly.com/question/19537503

#SPJ4

WILL GIVE BRAINLIST TO THE FIRST PERSON TO GET IT RIGHT!
Consider the following code:

x = int(input("Input an integer: "))
if x >= 0:
print("Yay!")
else:
print("Boo!")

It outputs "Yay!" if the value is non-negative and "Boo!" if the value is negative. Change the condition so that it only outputs "Yay!" if the value is non-negative (i.e. zero or positive) AND even.
Group of answer choices

x >= 0 and x % 2 == 1

x >= 0 and x % 2 == 0

x >= 0 or x % 2 == 1

x >= 0 or x % 2 == 0

Answers

Answer:

x >= 0 and % 2 == 0

Explanation:

hope it helps

what is dash? in dash (dynamic, adaptive streaming over http), a server divides a video file into chunks that ...

Answers

Dynamic Adaptive Streaming over HTTP is known as DASH..

What is HTTP based adaptive streaming?Dynamic Adjustable Streaming over HTTP (DASH), sometimes referred to as MPEG-DASH, is an adaptive bitrate streaming method that enables high quality media content streaming over the Internet using traditional HTTP web servers.Depending on its buffer size and available bandwidth, the video player requests chunks from one of the movie's bitrate versions. This means that a player may adaptably stream material and offer a positive user experience by continually sensing the bandwidth circumstances and buffer levels.Dynamic Adaptive Streaming over HTTP is known as DASH. It's a standardized effort to take the place of related incompatible technologies as Apple's HTTP Live Streaming (HLS), Adobe Dynamic Streaming, and Microsoft Smooth Streaming.

To learn more about DASH refer,

https://brainly.com/question/29314503

#SPJ4

true or false? link aggregation can only be configured between intermediate systems, such as switch-to-switch or switch-to-router. comptia

Answers

The statement that link aggregation can only be configured between intermediate systems is false.

The correct answer is link aggregation can only be configured between ethernet interfaces.

What is link aggregation?

Ethernet link аggregаtion bundles multiple physicаl ethernet links into one logicаl link, cаlled аn аggregаte link. Link аggregаtion hаs the following benefits:

Increаsed bаndwidth beyond the limits of аny single link. In аn аggregаte link, trаffic is distributed аcross the member ports.Improved link reliаbility. The member ports dynаmicаlly bаck up one аnother. When а member port fаils, its trаffic is аutomаticаlly switched to other member ports.

Link aggregation configures eаch ethernet interfаce in the аggregаte interfаce with the link аggregаtion mode property. When enаbled, indicаtes thаt the ethernet interfаce is for аn аggregаte interfаce.

For more information about link aggregation refer to the link:

https://brainly.com/question/13025613

#SPJ4

which method is automatically called when you pass an object as an argument to the print function? a. state b. obj c. str d. init

Answers

The method that is automatically called when you pass an object as an argument to the print function is option b. obj.

When an object is printed and automatically called?

Println automatically is the tool that tends to invokes the toString() function, but any object may manually invoke the method. On an object, such as this one named object, the method may be invoked. toString() or a numeric number, such as this - Integer, can be used to pass a value to the method.

Therefore based on the above, the String representation of the object is returned by the toString() function. Java compiler internally calls the toString() function on any object when you print it. The toString() method of the Object class is called by the println() method when printing an object.

Learn more about print function from

https://brainly.com/question/25324400
#SPJ1

What aspect of today’s business environment is central to the need for robust transaction management processing systems?.

Answers

The business environment is currently based on the sales technological framework, whose transaction processing system element due to an organization bases part of its operations on online media, that can be, ecommerces and makertplaces

Transaction processing System

They are instruments that collect, save, edit and restore different types of transactions. It is favored by a database that accompanies each transaction and that is directly integrated into the organization's data center.

This system allows adding a time delay between when the buy button for a specific product is pressed and when the sale is actually presented in the company.

For more about transaction processing system here https://brainly.com/question/14721213

#SPJ4

when using on-demand instances in aws, which of the following statements is false regarding the cost for the instance? (select two)

Answers

You have to pay the termination fees if you terminate the instance,

What are on-demand instances in AWS?

With On-Demand Instances, there are no long-term obligations and you can pay for compute capability by the hour or second (minimum of 60 seconds). By doing this, you are liberated from the high fixed costs and complicated planning, buying, and maintaining hardware requirements. Instead, you are left with significantly lower variable expenses.

AWS's "Security of the Cloud" mission include safeguarding the infrastructure that powers all of the services provided by the AWS Cloud. The facilities, networking, hardware, and software used to run AWS Cloud services make up this infrastructure.

You may examine and analyze your AWS Cost and Usage Reports with AWS Cost Explorer (AWS CUR). By developing an AWS projection, you may also anticipate your entire cost for using AWS services in the future.

To learn more about on-demand instances in AWS refer to:

https://brainly.com/question/29222519

#SPJ4

when configuring the ssh daemon using the /etc/ssh/sshd config file, which options can be set to either prevent or allow unrestricted access to all gui features on the client? (select two).

Answers

The main configuration source for the SSH daemon itself is in the /etc/ssh/sshd config file. Note that this is different from the ssh_config file, which specifies client-side default settings.

sshd_config is the OpenSSH server configuration file. ssh_config is the OpenSSH client configuration file. Specifies which environment variables sent by the client are copied to the session's user environment. Specifies the IP address family used by sshd. Valid arguments are:

any , inet (IPv4 only), inet6 (IPv6 only). When a user runs her ssh, scp, or sftp command, it starts a Secure Shell session. A new sshd daemon is forked for each incoming connection. The fork daemon handles key exchange, encryption, authentication, command execution, and data exchange with clients.

Learn more about configuration here-

https://brainly.com/question/14307521

#SPJ4

what troubleshooting steps should you take if a shared printer is printing out control codes on output pages?

Answers

Reinstall the print driver on the affected workstation if there is only one affected workstation

Which phase in the troubleshooting process aids in locating printer issues?Printing a test page or printer status report might assist you identify the issue if you're having problems troubleshooting a printer issue. The printer driver, printer software, or cable connection is probably the cause of your problem if the test page prints out satisfactorily.Reinstall the print driver on the affected workstation if there is only one affected workstation; otherwise, switch off the printer, wait 30 seconds, and then turn it back on. Reinstall the printer and print driver on the PC or print server providing the print share if this doesn't work (using print management tool)

To learn more about troubleshooting refer to:

https://brainly.com/question/29022893

#SPJ4

analytical queries on the dimensionally modeled database can be significantly simpler to create than on the equivalent non-dimensional database.

Answers

This is so because dimensional models enable a more straightforward database structure. As a result, queries can be made more easily because the data is better ordered and more understandable.

What is data?

The information is gathered using methods like measurement, observation, querying, or analysis, and is often expressed as numbers and characters that can then be processed further. Field data are information that are gathered in an unregulated in-situ setting. Data obtained during a carefully planned science experiment is known as experimental results. Techniques including calculation, reasoning, discussion, presentation, visualisation, or other types of post-analysis are employed to analyse data. Raw data (aka unprocessed data) is usually cleansed before analysis: Outliers are eliminated, and glaring instrumentation or data input problems are fixed.

To know more about data

https://brainly.com/question/10980404
#SPJ4

Fill in the blank: A data analyst is working with the World Happiness data in Tableau. To get a better view of Moldova, they use the _____ tool.Single Choice Question. Please Choose The Correct Option ✔ARadialBPanCLassoDRectangular

Answers

The data from Tableau's World Happiness study is being worked on by a data analyst. They employ the pan tool to acquire a better perspective of Moldova. The right answer is b.

By using the Filter tool, you could limit the list of countries to those with a World Happiness score of 3.5 or lower. The magnifier is a helpful tool that enlarges a portion or your entire screen so you can see the text and images more clearly. Data from a data source is extracted, and then filtered using extract filters. Only if the user extracts the data from the source does this filter come into play. When a text file is connected to Tableau, the live and extract option appears in the data source tab's upper right corner. Self-reports are by far the most popular method used by researchers to measure happiness. We simply ask people about how happy they are using multiple-item scales or a single question.

Learn more about Tableau here:

https://brainly.com/question/25531734

#SPJ4

A user of a windows 10 pc wants to automatically sync the user profile across various windows 10 devices that the user owns. How can the user accomplish this?.

Answers

For the user to accomplish the automatic sync of the user profile across various windows 10 devices, Have the user sign into all devices with the Microsoft account of the user.

A Microsoft account is essential to enable you to sync data between devices, use OneDrive, as well as function with both the Child user's parental restrictions. It provides access to Microsoft cloud computing as well as the ability to sync desktop configurations and profiles across various devices. All devices must be logged in with the same Microsoft account for this to happen. A Microsoft account is a free account that allows you to use several Microsoft products and services, such as Outlook formerly branded as Hotmail, MSN Office Online programs, Bing,  and the Microsoft Store.

Learn more about Microsoft account here:https://brainly.com/question/29550355

#SPJ4

After watching a 30-second commercial from Jared Inc. for fine jewelry, Mariah became certain the necklace she saw would be perfect for her mother’s birthday gift. In terms of the communication process, Mariah engaged in the task of __________.
Group of answer choices
sending
encoding
integrating
decoding

Answers

In terms of the communication process Mariah engaged in the task of decoding

What is decoding in communication?

An audience member's ability to comprehend and interpret a message depends on their ability to decode it. It is the process of decoding and translating information into an understandable form. By understanding messages as a whole and giving symbols meanings, the audience is attempting to piece together the concept.

So decoding in the case of Mariah is he saw the commercial video of 30 seconds and he decided to take the gift and decided it as a perfect gift so actually, he considered the video and decoded it then he understood the commercial video

Thus we can say the communication done is the decoding

To know more on decoding in communication follow this link:

https://brainly.com/question/4211230

#SPJ4

Which of the following becomes the focus of game development at the end of the process?

A.
mechanics

B.
objective

C.
gameplay

D.
aesthetics

Answers

An activity which becomes the focus of game development at the end of the process is: C. gameplay.

What is gameplay?

In Computer technology, gameplay simply refers to the specific ways, procedures, and patterns in which game players are required to interact with a particular game.

This ultimately implies that, gameplay should be the main focus of game development at the end of the process because it encompasses the patterns that are defined by the game developer, especially through game rules, game mechanics, plot, connection between player and the game, etc.

In this context, we can reasonably infer and logically deduce that gameplay is indicate how players should interact with a computer game.

Read more on game development here: brainly.com/question/13956559

#SPJ1

what is it called when a company uses organizations from developing countries to write code and develop systems? group of answer choices insourcing outsourcing business process outsourcing offshore outsourcing

Answers

When a company uses organizations from developing countries to write code and develop systems is called offshore outsourcing.

About Offshore Outsourcing

Offshore outsourcing is a hiring system that is a bit different from the way we are used to it.

This system involves a third party as a supplier of workers to companies that need them.

Because it is called offshore, this system involves two different countries.

However, this doesn't mean you have to leave your home country to work,

The business categories that most often require outsourcing are for business processes, infrastructure, as well as technology and information.

1. Business process outsourcing (BPO)

Business process outsourcing is a type of outsourcing that is carried out by companies for important areas that support the core functions of their business.

Examples of jobs that require outsourcing are such as customer support, payroll processing, bookkeeping, and others.

2. Infrastructure and technology outsourcing

Infrastructure and technology outsourcing is carried out for fields that support the general operation of a business.

Several fields that many companies are looking for in offshore outsourcing are networking, technology services, technology support, and others.

Currently, outsourcing in the IT field is one of the things that is most needed.

Learn more about offshore outsourcing at https://brainly.com/question/28773484.

#SPJ4

Radioactive sources for use in school experiments are always stored in a container lined with which metal? give the full name, not the symbols.

Answers

For use in educational experiments, radioactive materials are always kept in a lead-lined container (pb).

Various radiation types?Radiation comes in 3 forms: Paper is easily absorbed by light materials like alpha radiation because it has a high ionization energy.Beta particles: mild ionization; can be absorbed by paper-thin metal foil.Gamma rays are a weak form of ionization energy, yet they are nonetheless quite harmful because they can pass through lead walls up to several thicknesses.To be on the safe side, the walls of the container for storing radioactive materials are often lined with thick lead wall because the majority of radioactive materials emit all three radiations.      

To learn more about Radiation refer to:

https://brainly.com/question/893656

#SPJ4

Other Questions
an intoxicated clockmaker produces a grandfather clock whose pendulum has a period of 3.5\;\mathrm{s}3.5s. what is the length of the pendulum? Select all of the relations that ARE functions.Select 2 correct answer(s) Contribution Margin Ratio, Break-Even Sales Revenue, Sales Revenue for Target ProfitSchylar Pharmaceuticals, Inc., plans to sell 130,000 units of antibiotic at an average price of $22 each in the coming year. Total variable costs equal $1,086,800. Total fixed costs equal $8,000,000. How many solutions does the equation 5n + 1 = 1 + 4n have Which cerebral lobe is responsible for voluntary motor function, motivation, memory, mood, and aggression?. what is the variance of the number of times a 6 appears when a fair die is rolled 12 times? (enter the final answer in decimal format and round to three decimal places.) Help please asap!!A- z=15B- z= 20C- z=23D- z=41 Malcolm should have explained how each person could benefit from completing his or her part of the project, which would be using what influence tactic?. when creating a project plan, you include important points within the schedule that indicate progress. which project plan component does this represent? 1 point A house on the market was valued at 376,000. After several years, the value decreased by 9%. By how much did the house value decrease in dollars. What is the current value of the house? David has a bank account which pays interest at the rate of 1.5% per year, compounded annually. determine what amount david must have in the bank, given that he would like to draw an annual salary of $32,635.15 from his account at the end of each year for 30 years. round to the nearest cent. a. $783,760.48 b. $979,054.50 c. $1,225,080.50 d. $795,516.88 please select the best answer from the choices provided a b c d what is oxidation? what is reduction? what are the oxidation states of cu and zn (both species) in the following reaction: cu2 (aq) zn(s) cu(s) zn2 (aq) what is oxidized? what is reduced? In the snail Cepaea nemoralis, an autosomal allele causing a banded shell, u, is recessive to the allele for an unbanded shell, U. Genes at a different locus determine the background color of the shell. The allele for a yellow shell, b, is recessive to the allele for a brown shell, EB. A banded, yellow snail is crossed with a homozygous brown, unbanded snail. The F1 progeny are then crossed with banded, yellow snails in a testcross. Predict the percentage of progeny in each phenotype if the two genes are linked with no recombination, if the two genes assort independently, and if the genes are 20 m.u. apart. Place the percentage for each phenotype for each of the scenarios in the table below. Percentages can be used more than once. Phenotyp Linked Independent Genes 20 m.u. no recombinationassortment apart Brown, unbanded Brown, banded Yellow, unbanded Yellow, banded 0% 10% 20% 25% 30% 40% 50% 60%| 70% 75% | 80%, 90% 100% as a commercial banker, which objective outside source should you use to supplement your business development calls? Which person makes original journal entries in the general ledger and reporting system about events such as dividend payments and payments to creditors?. how many milliliters of a 0.900% (m/v) normal saline solution can be prepared from 2.50 g of sodium chloride, nacl ? note that mass is not technically the same as weight, but the abbreviation % (w/v) is often used interchangeably with % (m/v). (d) is it possible for this curve to have a horizontal tangent at points where it intersects the x-axis? explain your reasoning. project star, a study in tennessee begun in 1985, examined the effect of class sizes on later student achievement. identify the findings of this study. which has the lowest heat capacity? (values of heat capacities and calculations are unnecessary). which has the lowest heat capacity? (values of heat capacities and calculations are unnecessary). 3 kg of iron 10 g of liquid water 30 kg of ice 1 g of gold cos \theta =-(5)/(13) and sin > 0. Identify the quadrant of and find sin .