what-if analyses are performed using which type of application software? spreadsheet business analytics database word processing

Answers

Answer 1

Most often, spreadsheet software is used to carry out a "what-if" study.

The correct option is A.

What exactly is an MS Excel spreadsheet?

For use with Windows, macOS, Android, and iOS, Microsoft Excel seems to be a spreadsheet programme. It has calculating or computing capabilities, graphing tools, pivot tables, and a language for creating macros called Visual Basic for Applications (VBA). In the Microsoft Office software package, Excel is included.

A spreadsheet was invented by who?

The first electronic spreadsheet, , It has calculating or computing capabilities, graphing tools, pivot tables,   co-created, transformed the world for good. It is the  of applications like Microsoft Excel as well as Sheets that you presumably use every day.

To know more about spreadsheet visit:

https://brainly.com/question/8284022

#SPJ4

Complete question is:

Performing a "what-if" analysis is most commonly accomplished using ____________ software.

A. spreadsheet

B. database

C. presentation

D. PIM


Related Questions

is the open( ) system call in unix absolutely essential? what would the consequences be of not having it?

Answers

No, it is not necessary to use the open() system call on Unix. Since the open() system call is used to open a file and assign it a file descriptor, without it the system would have trouble handling files.

The required details for system in given paragraph

What is a system?

A A System is an organized set of elements working together to achieve a common goal. It can refer to different components like a physical system, a business system, a computer system or a social system. Systems typically include input, processing, output, and feedback loops that help the system adapt to changing conditions.

Without the open() system call, applications would not be able to interact with files, limiting their functionality would .

To learn more about system

brainly.com/question/22946942

#SPJ4

the full receiving and return address, including names, along with the highest classification level and dissemination markings are required to be on the outer layer of classified documents double wrapped for mailing.

Answers

On the outer layer of classified documents double-wrapped for shipping, the whole receiving and return address, including names, as well as the highest security level and dissemination markings, are necessary. Loss, compromise, or suspicion of compromise are all components of a security violation.

Receiving Address

indicates the address(es) on the relevant blockchain that has been designated, as the Company may transfer or refund any proceeds from the auctions to bidders.

Return Address

When sending letters by postal service, a return address explicitly includes the sender's address. It gives the recipient (and occasionally authorized intermediates) a way to decide how to react to the message's sender, if necessary.

To know more about receiving and returning visit here

https://brainly.com/question/14814266

#SPJ4

what is the value of r as a result of executing the code segment?

Answers

A code segment, commonly referred to as a text segment or just text in computing, is a chunk of an object file or the relevant area of the program's

In coding, what is a segment?

A code segment in computing is a chunk of an object file or the corresponding area of the virtual address space of the programme that includes executable instructions. It is sometimes referred to as a text segment or simply as text.

What distinguishes.code/.data from code/data segment.

The only distinction that comes to mind between "code and data segment/code segment directives" is that when employing a code segment while, segments must be closed.

To Know More About code Segments Visit here:

https://brainly.com/question/20063766

#SPJ4

3.19 lab: convert from seconds people find it easier to read time in hours, minutes, and seconds rather than just seconds. write a program that reads in seconds as input, and outputs the time in hours, minutes, and seconds. ex: if the input is: 4000 the output is: hours: 1 minutes: 6 seconds: 40

Answers

Calculate the seconds, subtract the corresponding seconds in hours and minutes you previously found, the remaining is the seconds you have

Print the hours, minutes, and seconds

seconds = int(input("Enter time in seconds: "))

hours = int(seconds / 3600)

minutes = int((seconds - (hours * 3600)) / 60)

seconds = seconds - ((hours * 3600) + (minutes * 60))

print("{} hour(s) {} minute(s) {} second(s)".format(hours, minutes, seconds))

*The code is in Python.

Ask the user to enter the time in seconds

Calculate the hours, divide the seconds by 3600 and cast it to the integer

Calculate the minutes, subtract the corresponding seconds in hours you previously found, divide it by 60 and cast the result to the integer

Calculate the seconds, subtract the corresponding seconds in hours and minutes you previously found, the remaining is the seconds you have

Print the hours, minutes, and seconds

Learn more about print here-

https://brainly.com/question/14668983

#SPJ4

The purpose of this lab is to help reinforce container class concepts in C++ Specifically, you will be repeating the lab from last week except you will be using a dynamic array for the sequence class. Note that there is no upper bound on the size of the sequence. You need to use the author's files sequence2. H and sequence_exam2. Cpp. This Lab assignment requires you to implement all functions for this sequence class. Refer to bag2. H, bag2. Cxx and sequencel. Cpp (implemented in your previous lab) to get an idea ofhow to work on this lab

Answers

/DieRolls FirstName LastName.java (rename the class as you desire) (rename the class as you like)

Coding

introduce JavaIOFile;

the import of java.io.FileNotFoundException;

bring up the Java.IO.PrintWriter;

import random from java.util;

a common class FirstName LastName DieRolls

throws a FileNotFoundException in the public static void main(String[] args) function.

constructing a PrintWriter object to publish the outcomes to the Rolls.txt file

Writer: = new PrintWriter("Rolls.txt"), new File);

launching the random number generator in /

random = fresh Random();

the quantity of rolls

numrolls int = 10,000;

/ Counts of each roll are stored in six variables.

one is equal to zero, two to four, three to five, and six to zero;

/ Repeatedly looping for numrolls

i++ for (int I = 0; I numrolls);

/ producing a result in the range of 1 and 6

roll an int at random.

next

Int(6) + 1;

/ raising the relevant counters.

If (roll == 1), then

ones++;

if (roll == 2), then else

twos++;

Otherwise, if (roll == 3)

threes++;

Otherwise, if (roll == 4)

fours++;

if not else (roll)

Learn more about the Java here: https://brainly.com/question/26789430

#SPJ4

a user asks you to perform a task that you do not know how to do and is not in the scope of your job duties. what is the best way to respond to this situation?

Answers

Answer:

Escalate the interaction to the next level of customer support and politely inform the customer.

Which type of biopsy is not coded as an excision?

Answers

Biopsies of the endometrium and bone marrow are not linked to excision. Instead, they are coded to the primary operation, extraction, and the biopsy is identified using the qualifier diagnostic.

What makes resection and excision distinct from one another?

An excision is defined as a process when a part of the body is removed or severed in the ICD-10-PCS medical coding system. A resection is when a whole body portion is removed or severed. However, it need not be a full organ or tissue; frequently, they are labeled as parts of an organ.

Excision or extraction is used in core biopsy?

Since the bigger bore needle "cuts" a core of tissue from the body part during a core needle biopsy, the procedure is at its core a "excision."

To know more about Biopsies visit :-

https://brainly.com/question/14547033

#SPJ4

Why did we have to typecast age as a str data type in the print statement?

Answers

Answer: The process of typecasting involves changing a value's data type. The variable "age" in this instance is probably saved as an integer or a float data type, and the print command is converting it to a string data type. This is done so that the text in the print statement and the value of "age" may be concatenated to create a single string that can be printed. The print command will malfunction and throw a TypeError if the variable "age" is not typecasted to a string.

Explanation:

What is a minimum security satellite camp?

Answers

A minimum security satellite camp is a type of federal correctional facility that is typically less restrictive than a traditional prison. These camps are often used to house inmates who pose a low risk of escape or danger to the community.

What is Satellite?

A satellite is a celestial body that orbits around another celestial body. There are two main types of satellites: artificial satellites, which are man-made, and natural satellites, which occur naturally.

Artificial satellites are used for a variety of purposes, such as communication, navigation, and weather forecasting, while natural satellites are primarily used for scientific study.

To learn more about Satellite, visit: https://brainly.com/question/27913592

#SPJ4

A student wrote the future of optical media is one of obsolescence in the next 5 years. Discuss this statement by referring to modern technologies

Answers

Despite this, optical media is no longer used for some professional applications and its sales are declining in the consumer markets.

What does optical media's future hold?

The next generation of Archival Optical Discs will offer quicker data transfer rates, reduced cost per bit, and increasing disc capacity up to 1 TB.

What is the optical industry's future?

Additionally, consumers will raise their expectations for products. Future technologies like 3D printing and so-called "smart glasses" will be more prevalent, and online eye exams will soon be available in Europe. Finally, as automation and digitization progress, businesses will be able to optimize their value chains.

To know more about optical media visit:-

https://brainly.com/question/29805368

#SPJ4

when building a high-fidelity prototype in figma or adobe xd, what do you do once you connect the screen or elements within the screens?

Answers

Mockups should be laid out, screens connected, interaction details added, and animations adjusted before all screens are finished.

What are animations?

Animation is a method for making still images appear to be in motion.

Traditional animation entails manually painting or drawing images on sheets of transparent celluloid, which are then photographed and filmed.

Today's most popular animations are made with computer-generated visuals (CGI). In contrast to 3D computer animation, which can be incredibly detailed, 2D computer animation (which occasionally mimics traditional animation) may be used for artistic reasons, minimal bandwidth, or quicker real-time renderings.

Other common animation methods employ a stop-motion approach to produce clay figures, paper cutouts, and puppets in two and three dimensions.

A cartoon is an animated movie with a bizarre visual aesthetic.

Hence, Mockups should be laid out, screens connected, interaction details added, and animations adjusted before all screens are finished.

learn more about animations click here:

https://brainly.com/question/28218936

#SPJ4

aggregating unclassified information together will never make the information classified. T or F

Answers

It is true that grouping unclassified material together will never turn it into classified information.

Doesn't original categorization have the same influence and effects as derivative classification?

Original classification has a greater impact and more lasting effects than derivative classification. Derivative classifiers are responsible for each of the following: EXCEPT: The authority for original classification must be held by derivative classifiers.

Which of the following is a legitimate justification for categorizing data?

The only legitimate justification for classifying information is to safeguard national security. The following steps are all included in derivative categorization, EXCEPT for: first deciding that it is necessary to protect information from unauthorized disclosure for national security reasons.

To know more about information visit:-

https://brainly.com/question/17218068

#SPJ4

which type of network-based attack prevents legitimate users from accessing a system by overwhelming the network?

Answers

A DoS attack is an attack that floods a network with requests, preventing legitimate users from accessing the system.

Denial of Service (DoS) Attack: Preventing Legitimate User Access

A Denial of Service (DoS) attack is a type of network-based attack that seeks to prevent legitimate users from accessing a system by overwhelming the network with malicious requests. It does this by saturating the target machine with external communications requests, such as ping requests or malformed packets, so that it cannot respond to legitimate traffic, or by consuming the bandwidth of the victim so that it can no longer communicate effectively.

Learn more about Network: https://brainly.com/question/8118353

#SPJ4

50 points 3. Which of the following statements is true of phishing emails?
O A. They're important to keep.
B. They come from trusted sources.
C. They pretend to need information and use it for harm.
D. They're the same thing as junk mail.

Answers

Answer:

C. They pretend to need information and use it for harm

Explanation:

goog it

They pretend to need information and use it for harm. Therefore, the correct answer is option C.

Phishing is a form of cybercrime in which criminals use malicious emails and websites to try and extract sensitive information such as usernames, passwords, credit card numbers, and other personal information from unsuspecting victims. The criminals use this information for their own financial gain, either by stealing the victim's money or using the victim's identity to commit various other frauds. Phishing emails often appear to come from trusted sources and can use various tactics to try and convince the recipient to click on a malicious link or provide credentials. In contrast, junk mail or spam is just annoying and usually is not associated with malicious activities.

Therefore, the correct answer is option C.

Learn more about the Phishing here:

https://brainly.com/question/32858536.

#SPJ6

Eufy Security By Anker Solo Pro 2-Pack Standalone Security Cameras With Solar Panels

Answers

Eufy is a wonderful option if you want to replace your house surveillance cameras or require a straightforward system for a modest rental.

How reliable are Eufy cameras?

Most of the time, eufy cameras are our second choice rather than our first.They provide dependability, superior video quality, several power options, cost-effective options, and interoperability with smart homes.

Is Eufy an Asian business?

The Chinese business Anker Innovations' Eufy Security advertises to save recorded video data inside the HomeBase, that is a smart home gateway on overdrive.

To know more about Security Cameras visit:

https://brainly.com/question/28388195

#SPJ4

Finish the format string to get the output shown below.
'Answer: 0.99'
'Answer: {
}' .format(0.987654)
HELP ASAP!!!

Answers

The output of the given question of format string 'Result:{___}' .format(0.2345789) will be 4.2f.

What is string?

In computer programming, a string is often a series of characters that can be either a literal constant or a type of variable.

The latter can either be fixed with its elements and length fixed, or its elements and length adjusted (after creation).

A string is frequently represented as an array data structure made up of bytes (or words) that uses some type of character encoding to store a succession of components, usually characters.

More expansive arrays or other sequence (or list) data types and structures can also be represented by strings.

Given,

The ^ symbol centers 'Root' in a field eight characters wide. 4.2f rounds to two decimal places and places the number in a field 4 characters wide.

Thus, 4.2f will be the output.

For more details regarding string, visit:

https://brainly.com/question/30099412

#SPJ1

why can't i get audio output on my headphones hooked up to a canon camera witha rode newsshooter kit

Answers

Automatic Gain Control AGC is enabled by default on many cameras, along with other audio processing functions like wind-noise reduction. You should disable these.

How do I connect my camera's sound to my microphone?

A microphone adapter for the camera is involved. Similar to how a tripod is mounted, attach the XLR cable adapter to the camera's bottom. Connect the microphone and adapter with an XLR cable.

Why is there no detection of my external microphone?

Open the app Settings. Click on Sound in the left sidebar of the System setting. In the Input devices settings, click Manage sound devices under the Troubleshoot button. Locate your device in the "Disabled" section further down, and then click "Enable" to turn on your microphone.

To know more about audio processing visit :-

https://brainly.com/question/24228690

#SPJ4

If a fan is installed in a computer case so that it blows the wrong direction , what problem can this cause ?

Answers

Dust and debris may result if a fan is installed in a computer case such that it blows in the wrong direction.

Can the direction of a PC case fan be reversed?

Not possible. To be able to reverse the rotation, which practically all computer fans cannot accomplish, a fan must be made to spin in both directions. The PCB in these brushless fans only changes the phases in one direction.

How can I turn my computer's fans in a different direction?

It's possible that you can just remove the fan, flip it over to the opposite side (or right-side up, as it were), and then screw it back in. Most fans can be set up facing either way.

To know more about computer visit:-

https://brainly.com/question/15707178

#SPJ4

when the computer is started, a bootstrap program begins testing the system hardware. where is this bootstrap program stored?

Answers

The ROM is the most practical site to store the bootstrap because it is a fixed location, requires no initialization, and cannot be infected by a computer virus because it is read-only memory.

What is the purpose of Bootstrap?

A free and open source front-end development framework called Bootstrap is used to build websites and web applications. Bootstrap offers a collection of vocabulary for template designs and is designed to enable responsive construction of mobile-first websites. The most widely used CSS framework for creating responsive and mobile-first websites is Bootstrap. It is simple to use and saves developers a tonne of time by eliminating the need to manually write HTML, CSS, and JavaScript code. Almost any requirement for front-end website development may be met by the Bootstrap framework because it is sturdy and versatile. Bootstrap is a set of CSS classes and JavaScript functions used to develop responsive, mobile-first websites and applications.

Learn more about the Computer here: brainly.com/question/28498043

#SPJ4

it is not possible to name a worksheet history in excel T/F

Answers

True, in Excel you cannot give a worksheet history a name. When you attempt to name a worksheet History, Excel will notify you that the name "History" is a reserved name.

The required details for Excel in given paragraph

Does Excel not allow you to give a worksheet history a name?

The sheet designated for "monitoring changes between shared workbooks" is referred to by the reserved word "history." It will launch the Highlight Changes dialog.

In Excel, how can I make a worksheet history?

Selecting the Highlight changes on screen check box will make changes to the worksheet stand out. By checking the option labeled "List changes on a new sheet," you may display the history worksheet while also generating a list of changes on a different worksheet.

To know more about Excel visit:-

brainly.com/question/30334694

#SPJ4

A 3-D formula in Excel allows you to simultaneously select multiple adjacent worksheets.
True
False

Answers

Yes, that is true. Excel's 3-D formula lets you choose many nearby worksheets at once.

Does an Excel 3-D formula allow you to select numerous nearby worksheets at once?

Excel's 3-D formulas let you choose many nearby worksheets at once. Using paste special with values just and the transpose option, it is possible to reorient the data in a spreadsheet.

Which Excel function enables simultaneous work on many worksheets?

At the bottom of the screen, select the Insert Worksheet tab. Click Sheet1, Sheet2, and so on while holding down the CTRL key to select all of your spreadsheets.

To know more about worksheets visit:-

https://brainly.com/question/13129393

#SPJ4

ad extensions assist in providing users with which two things they want from their search experience?

Answers

Promotion augmentations help with furnishing clients with Pertinent data and Data in view of their second they need from their hunt insight.

What is one of the principal reasons for utilizing promotion augmentations?

A Googgle promotion expansion is an extra snippet of data that makes your promotion more valuable to perusers. It gives data like merchant surveys, different connections from your site, and phone numbers, subsequently extending your commercial.

What is the advantage of remembering promotion augmentations for your pursuit promotion?

Promotion expansions are a fast and simple method for growing your Pursuit advertisements, giving individuals more motivations to pick your business — at no additional expense. There is an entire scope of manual expansions you can decide to carry out yourself, like area data, cost, and advancement callouts.

To know more about Data visit :-

https://brainly.com/question/13650923

#SPJ4

PLEASE PLEASE PLEASE I NEED HELP!!! 15 POINTS!!

Moore's law is the observation that the number of transistors in a dense integrated circuit doubles about every two years. Research Moore's law and answer this question: Do you believe that transistors will continue to double as observed by Moore, or will the trend slow down? Why?

Answers

Moore's Law is the observation that the number of transistors on a microprocessor doubles about every 18 to 24 months. The trend of Moore's Law has been observed to hold true for several decades, but it is expected to slow down in the future. There are several reasons for this.

What were the reasons?

One reason is that as transistors get smaller, they become more difficult and expensive to manufacture. As the size of transistors approaches atomic scales, the laws of physics begin to limit the ability to further shrink transistors.

Another reason is that as the number of transistors on a microprocessor increases, the power consumption and heat generated by the chip also increases, which can limit the performance of the chip.

Read more about Moore's law here:

https://brainly.com/question/28877607

#SPJ1

an admin at universal containers wants to map configuration attribute values to the quote line in a customer's product catalog. assuming the field mapping is correct, which setup will prevent the configuration attribute value from being stored on the non-bundle quote line?

Answers

A setting in the configuration: even if those values aren't displayed in your line editor field set, applies its value to the fields in your bundle. inherits the field's type as its own.

Targeting a picklist, for instance, causes the configuration attribute to display as a picklist containing all of the values for the targeted field. Oracle CPQ is a cloud-based tool that assists sellers in configuring the ideal combination of goods or services and producing precise, expert estimates to promptly satisfy the pricing objectives of their clients. On new quotes, quotes up for renewal, and quotes that have been amended, Salesforce CPQ applies the agreed pricing. The effective amount field for the quote line displays the quantity actually used by Salesforce to determine prices for that quote line.

Learn more about configuration here-

https://brainly.com/question/14307521

#SPJ4

How to solve : sorry accessing peacock through a vpn is restricted

Answers

Sorry, using a VPN to access Peacock is prohibited (OVP 00013). With either of its services.

The required details for VPN in given paragraph

Unlocator VPN continually adjusts to such problems and gets around them. With Unlocated VPN, you may quickly get an American IP address by connecting to one of the US server locations within the program.

Describe the VPN

The term "Virtual Private Network," or VPN, refers to the possibility of creating a secure network connection when utiliZing public networks. VPNs mask your online identity and encrypt your internet activity. This makes it more challenging for outside parties to monitor your internet activities and steal data.

To know more about VPN visit here

https://brainly.com/question/16632709

#SPJ4

write a script hat utilizes both a while loop and condition statement to round numbers to the nearest tenth place. test this script on 6.88. the answer should be 6.9.

Answers

The practice of providing healthcare remotely through the use of communication networks is known as telemedicine (TM).

It has the potential to increase patient access to care, enhance patient health outcomes, and lower healthcare expenditures. Understanding the potential effects of TM on patients, medical professionals, and healthcare delivery is crucial as TM applications develop further. We took into account randomized controlled studies of interactive TM that involves direct patient–provider interaction and was given to patients with any clinical condition in addition to, or as a substitute for, usual care as opposed to usual care alone. Telephone-only treatments and fully automatic self-management TM interventions were not included.

Learn more about communication here-

https://brainly.com/question/22558440

#SPJ4

a(n) is a flash memory storage device that contains its own processor to manage its storage. a. magnetic hard disk b. thumb drive c. optical disc

Answers

The term "thumb drive" refers to a flash memory storage device with its own processor for storage management.

A thumb drive (also known as a USB drive or flash drive) is a type of flash memory storage device that contains its own processor to manage its storage. It is small, portable, and typically connects to a computer via a USB port.

Flash drive is a type of flash memory storage device that contains its own processor to manage its storage. It is small, portable, and typically connects to a computer via a USB port. It is also known as a thumb drive or USB drive. It stores data in flash memory, which is a type of non-volatile memory that retains data even when the power is turned off. Flash drives are commonly used for storing and transferring files between computers, and for storing backup copies of important data.

Learn more about Flash drive here:

https://brainly.com/question/30366040

#SPJ4

which networking component would connect to a soho router, operating at the first layer of the osi model?

Answers

Devices at layer 1 include Ethernet cable connectors, repeaters, and hubs. These are the fundamental components that are used at the physical layer to transmit data through a specific physical medium that meets the needs of the network.

What in networking is Layer 1?

The physical media of the network, which are the actual hardware elements that process and transmit digital data over long distances, are referred to as Layer 1 of the OSI layer. It specifies how physical electrical signals, as opposed to the logical data packets that other layers handle, are transported.

A router is a Layer 1 device, right?

The Network-Control Layer, the third layer of the OSI Model, is where routers are operational.

To know more about network visit:-

brainly.com/question/14276789

#SPJ4

write a program that squares an integer and prints the result.

Answers

Computer programming is the process of creating instructions and coding to enable certain tasks in a computer, application, or software program.

Is programming for computers difficult?

Although it might seem challenging at first, learning to code is not tough. It could be challenging to learn something new at first. Coding gets easier with experience, perseverance, and patience. If you're considering learning to code, it's easy to become overwhelmed by the difficulty.

import java.util.Scanner;

class Main

{

public static void main(String[] args)  

{

  System.out.println(" Enter the the two numbers:");

   Scanner input = new Scanner(System.in);

    int a = input.nextInt();

    int b = input.nextInt();

    int c = sumsquareFunction(a, b);

    }

sumsquareFunction(int n1, int n2) is a public static int.

    int c= n1*n1 + n2*n2;

    return c;  

 }

}

To know more about programming visit:-

https://brainly.com/question/11023419

#SPJ4

Intermediate repair of a laceration is coded when layered closure is required. True or False?

Answers

When layered closure is necessary, an intermediate repair of a laceration is coded. True .

What does a wound closure with layers mean?

The term "layered" repair often refers to the use of absorbable sutures to cover dead space (where else infection or an abscess may form) and to release stress on the epidermis.

(CPT codes 12031–12057) Intermediate repair The treatment of a wound that, in addition to the requirements for basic repair, needs a layered closure of one or more of the deeper layers of subcutaneous tissue and superficial (non-muscle) fascia in addition to the skin falls under the category of intermediate wound repair.

To know more about  laceration visit:-

https://brainly.com/question/10448206

#SPJ4

Other Questions
An architect's model for a building is 1. 4 m long and 0. 8 m wide. The actual building is 240 m wide. What is the length of the building? Answer: a child is diagnosed with dehydration resulting from diarrhea. the child's condition improves and a regular diet is started. which foods would the nurse suggest that the parents offer their child? select all that apply. one, some, or all responses may be correct. Your first assignment in this journey is to research the events leading up to the founding of America from 1492 to 1620. Choose what you believe to be the five most important events and the five most influential people leading up to the founding of America during this time. Explain why you chose each event and each person. Korbel pushes a 15 kg chair for a distance of 30 meters. How muchwork did he do? You live and work in a country that tells you where to work and sets your wage. The goods you produce go to the government, which then sells them in government-run stores. What type of economy do you live in? A. Specialized B. Command C. Free market D. Mixed You have read a passage from Germinal, in which the author develops suspense aboutwhat will happen next as tienne descends further into the mine. Write a continuation ofthe passage that resolves the suspense. Be sure to maintain the style of the passage, anduse dialogue when needed to support your narrative response. help me answer this pls Write the word sentence as an inequality. A number y minus is no more than N100 The inequality is Part 1 out of 4 y+4=2(2x + 2) y+4= Show that the equation y +4=2(2x + 2) is linear and that it represents a proportional relationship between x and y. Check 5 X+ 7 8 Next A new planet is discovered orbiting a star with a mass 3. 5 10^31 kg at a distance of 1. 2x10^11 m. Assume that the orbit is circular. What is the gravitational acceleration on this new planet? Calculate the percent relative average deviation for the following set of data. 20.96, 20.85, 20.89, 20.92 suppose, when evaluating a nation's economic activity, economists include the market value of a new truck's tires and the market value of the truck. this is an example of Which of the hypothesis of Rolle's Theorem is not satisfied for the function f(x) = x^3/3 over [ 0, 2 ]? why would you want to use small steps to get to a big economic goal? What type of credentials might a home childcare facility that cares for a small number of children have?A. state certificationB. federal licensingC. county endorsementD. Food and Drug Administration certification grayson lives and works in indiana, which has a flat state income tax of 3.4% of his annual salary is 49,255$ and he gets paid once a month, how much is withheld from his gross income for state income tax each pay period a large family that is struggling financially is instructed by the home health nurse about ways to increase their dietary intake of calcium. which suggestion would the nurse make? which of the following statements correctly describe a resonance hybrid? select all that apply.multiple select question.the true structure of the resonance hybrid is the structure of the most stable contributor.the resonance hybrid is stabilized due to delocalization of electrons.a resonance hybrid rapidly interconverts between the possible resonance forms.equivalent resonance forms contribute equally to the overall structure of the hybrid.a resonance hybrid has a single structure. machine intelligence in healthcare-perspectives on trustworthiness, explainability, usability, and transparency. xyz corporation is interested in a piece of land for development. they are selling off a bit of company stock to buy the property without any debt. is xyz's sale of stock considered a form of financing?