____ a program means writing down in a prescribed manner the instructions for using the program, the way in which the program performs its tasks, and other items that users, other developers, and management might require.

a) Indexing
b) Documenting
c) Texting
d) Labeling

Answers

Answer 1
the answer is d labeling
Answer 2

Final answer:

Documenting a program involves clearly detailing instructions, operation details, and interfaces like APIs for users and developers. It is crucial for problem-solving and communication in program development.

Explanation:

​​Documenting a program means writing down in a prescribed manner the instructions for using the program, the way in which the program performs its tasks, and other items that users, other developers, and management might require. It involves creating clear and precise documentation that includes all aspects of the program's operation, ensuring that anyone who needs to understand or work with the program has the necessary information at their disposal.

This process is integral to problem-solving within the development cycle, enabling effective communication between the code and its users or fellow developers. Writing high-quality documentation is akin to establishing a contract, often referred to in technical terms as an Application Program Interface (API), which dictates how other applications or users can interact with the program's services.

Proper documentation can include a variety of components such as a comprehensive instruction manual, clear definitions and markup in the code to facilitate syntax highlighting, and organizing a set of instructions with informative titles, introduction, body, and conclusion sections. This ensures that both the program and its interfaces (APIs) are usable and understandable by those who need to work with them.


Related Questions

Halcyon, an e-publisher has recently decided to use an information system that administers the way its customers access its online publications. The system assigns each customer with a unique ID, maintains records of the books purchased by them, encrypts electronic documents for transmission, and includes options to order hard copies of the electronic documents they read online. Which of the following refers to the set of technologies used in this case?

A. online identity management
B. digital rights management
C. internet resource management
D. inventory management

Answers

D inventory management

The science of nutrition studies the relationship of a. vitamins to minerals. b. foods to optimal health and performance. c. carbohydrates, fats, and proteins to the development and maintenance of good health. d. the macronutrients and micronutrients to physical performance. e. kilocalories to calories in food items

Answers

Answer:

B. Foods to optimal health and performance.

Explanation:

Because the science of nutrition is the relation between food diet and health. It's like eating to have good health, that's all.

The science of nutrition focuses on studying the relationship between carbohydrates, fats, proteins, and other nutrients in foods to the development and maintenance of good health. Therefore, the correct option is C.

It looks at the effects of these macronutrients and other important nutrients on the growth, development and general health of the body. Vitamins, minerals and other micronutrients are also taken into account by nutrition science as they are important for maintaining good health.

Nutritional science seeks to provide insight into appropriate dietary choices, nutritional standards, and methods for promoting health and preventing disease by understanding the composition and effects of various nutrients.

Therefore, the correct option is C.

Learn more about Nutritional science, here:

https://brainly.com/question/14577636

#SPJ6

Write the definition of a method named printPowerOfTwoStars that receives a non-negative integer n and prints a string consisting of "2 to the n" asterisks. So, if the method received 4 it would print 2 to the 4 asterisks, that is, 16 asterisks: ����**************** and if it received 0 it would print 2 to the 0 (i.e. 1) asterisks:

Answers

Answer:

import java.io.*;

import java.util.*;

import java.lang.Math;

class GFG {

   public static void PowerOfTwoStars(int n){

       double a=Math.pow(2,n); //calculating the power..

       for (int i=1;i<=a;i++)//looping to print the stars.

       {

           System.out.print("*");

       }

   }

public static void main (String[] args) {

    Scanner star=new Scanner(System.in);//creating the scanner class object.

    int n=star.nextInt();//taking input.

    PowerOfTwoStars(n);//calling the function.

}

}

Input:-

3

Output:-

********

Explanation:

In the method PowerOfTwoStars which contains one argument I have calculated the power that is 2 to the n.Then looping form 1 to power and printing the stars and for better explanation please refer the comments the code.

Which of the following is true regarding data analysis? a. Disciplines and professions do not provide guidance on data analysis. b. Data analysis methods should usually be specified in advance before a study begins. c. Data analysis methods are generally uniform across disciplines. d. Data analysis methods can typically be specified at the close of a study after it is clear what kind of data has been collected.

Answers

Answer: Option (B) is correct

Explanation:

Data analysis is known as a process or technique of cleansing, inspecting, transforming and also modeling data with the aim or goal of discovering useful and vital information, briefing conclusions and thus finally supporting decision-making. It tends to have multiple approaches and facets, encompassing or enclosing diverse methods under several names, and thus is used in several different science, business, and dismal science domains.

Answer:

b. Data analysis methods should usually be specified in advance before a study begins.

Explanation:

Data analysis is the process of gathering or collecting, inspecting and evaluating data. The first process in data analysis is the collection of data. Analysis cannot take place if there is no data. Also, data analysis can take place at all phases of a research or study - beginning, during and at the end.

The main purpose of data analysis is to get reasonable and useful information and come up with logical business decisions and as such should be  typically done in advance before a study begins.

What is the result of segmenting a network with a bridge (switch)? (Choose two)

a) It decreases the number of collision domains.
b) It increases the number of broadcast domains.
c) It decreases the number of broadcast domains.
d) It makes smaller collision domains.
e) It makes larger collision domains.
f) It increases the number of collision domains.

Answers

Answer: (D) It makes smaller collision domain and (F) It increases the number of collision domains.

Explanation:

  The result of segmenting a given network with the bridge is that it basically break the domain of the collision that increases the domain number. In additionally, it also makes it more smaller.  

Switch basically expands the quantity of collision network domain in the system. Switches are designed with V-LANs will diminish the given size of domain of the collision by increasing the number of the collision domain in the network.  

Portable media players (PMPs) are small portable devices that allow you to play digital music and video. They use a format called ________ that allows audio files to be compressed so they are small enough to be sent over the Internet or stored as digital files.

a) HD
b) MP3
c) SLR
d) PDA

Answers

Answer: The answer is a "MP3".

Your company has merged with another company that also uses Windows Server 2016 and Active Directory. You want to give the other company's users access to your company's forest resources and vice versa without duplicating account information and with the least administrative effort. How can you achieve this goal?

Answers

Answer:Creation of two-way forest trust

Explanation: In active directory, Two way forest trusty is the two way trusting condition where one forest trust the other forest and it works same for both forest.The forest domain of one forest is reliable and have trusty relationship with the other forest and vice-versa.

This function of the forest helps all the users to reliably access all the components of both the domains.Thus two-way forest trust should be created between the two organization mentioned in the question.

Which is the best tip for optimizing a TrueView video for viewer engagement?
a. Look at engagement rate for targeting and focus on the methods with the highest view through rate
b. Run both an in-stream and a video discovery version of the ad Increase each target group's bid by 100%
c. Add exclusions to the campaign

Answers

Answer: (A) Look at engagement rate for targeting and focus on the methods with the highest view through rate

Explanation:

TrueView video enables to post ads in social sites however it is paid by the sponsor only if the ad is viewed fully or in some cases it is viewed only upto 30s of the total size of the video.

So in order to have a larger viewer engagement it is necessary for it to focus on the methods which would garner it highest views.

So option A is correct.

Option B and c are not correct these options would not cater to the needs of the viewer.

You are researching RAM for a computer you are building for a friend who will be using the system as a home office server for her small business. She wants the added protection so the computer will not crash due to a memory error.

What type of RAM should you consider purchasing?

a) Unbuffered
b) Buffered
c) ECC
d) Registered

Answers

Answer:

ECC RAM

Explanation:

ECC RAM is the most popular Random Access Memory out there that is used by most business servers. Dealing with big data for most huge businesses is crucial. The need to prevent loss of data requires that they purchase ECC RAM. ECC RAM automatically protects the systems from potential errors that occur in memory. Any abrupt changes in temporary data stored in ECC RAM are automatically corrected. This is achieved by an additional memory chip that acts as error detection for the other eight RAM chips.

Based on the Standards, the statement, "Competition for computer time during periods of high demand had become intense because of a planned increase in the use of the computer by operating departments," is an example of

Answers

Answer:

cause

Explanation:

According to my research, I can say that based on the information provided within the question this is an example of a "cause". This refers to something that makes something else happen, and is usually stated by the word "because". For example in this situation the a "planned increase in the use of the computer by operating departments" caused a "Competition for computer time during periods of high demand to become intense".

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

What component of enterprise level structured cabling serves as the location where an incoming network interface enters a building and connects with the building's backbone cabling?

Answers

Answer: Entrance facility

Explanation: Entrance facility is the service of the telecommunication field that provide entrance in the building in the situation of private network cabling and public network cabling.

This cabling connects the outdoor cables to the backbone cabling of building.The points that can be cabled at the entrance point like wall of the building, entrance room, floor of the building etc.

Final answer:

The Entrance Facility (EF) is the component in enterprise-level structured cabling where external communication lines enter a building and connect to the backbone cabling. It handles the transition from outdoor to indoor cabling and adheres to standards for structured cabling systems.

Explanation:

The component of enterprise-level structured cabling that serves as the location where an incoming network interface enters a building and connects with the building's backbone cabling is known as the Entrance Facility (EF). This crucial segment is where external communication lines from service providers, which can include telephone lines and data services, meet the internal cabling infrastructure. Within the EF, the transition from outdoor cabling to indoor cabling takes place, which may involve connecting to different types of media such as copper, fiber optic, or coaxial cables.

The structured cabling system typically adheres to a set of standards like ANSI/TIA-568 that outline how to wire an office or building for data or voice communications. These standards ensure connectivity for various structures and devices used for communications, including computers, servers, and telecommunication devices. The backbone cabling then distributes these connections throughout the building to different floors or sections via intermediate and horizontal distribution frames.

In a particular jurisdiction, taxi fares consist of a base fare of $4.00, plus $0.25 for every 140 meters traveled. Write a function that takes the distance traveled (in kilometers) as its only parameter and returns the total fare as its only result. Write a main program that demonstrates the function.

Answers

Answer:

// here is code in java.

import java.util.*;

// class definition

class Main

{

// method that return total fare

   public static double fare(double dis)

   {

   // calculate the total fare

       double tot_fare=(4+((dis*1000)/140)*0.25);

       return the fare

       return tot_fare;

   

   }

   //driver method

public static void main (String[] args) throws java.lang.Exception

{

   try{

    // scanner object to read input string

       Scanner s=new Scanner(System.in);

        // variable

       double dis;

       System.out.print("please enter the distance in KM: ");

       //read the number

       dis=s.nextDouble();

       

       // call the function with "dis" parameter

     double ride_fare=fare(dis);

     // print the total fare

     System.out.println("total fare is: "+ride_fare);

   }catch(Exception ex){

       return;}

}

}

Explanation:

Read the distance from user with the help of scanner class.Call the function with parameter "dis".Here it will calculate the total fare as (4+((dis*1000)/140)*0.25). Here base fare is $4 and $0.25 for every 140 meter.Then function will return the total fare.

Output:

please enter the distance in KM: 7                                                                                                                            

total fare is: 16.5  

​___________, such as smart phones and social​ media, fundamentally change the nature of an industry and can be influential enough to create or destroy whole companies.

Answers

Answer:

Disruptive Technologies.

Explanation:

Smart Phones and the social media are very power tools they can be used to spread a news like a fire very rapidly.

People mostly believe the new that come on their smartphones and the social media.

So the employees of the company can also be influenced by these technologies hence they can disrupt the work of the company and can make or break the company.

Which of the following temporarily stores data and programs while you are using them?
a. Read-Only Memory
b. Random Access Memory
c. System software
d. Basic Input/Output system

Answers

Answer:

b. Random Access Memory

Explanation:

In computers, there are 2 types of memory: Volatile and Non-volatile memory. The first one is also known as RAM (Random Access Memory) and it is used by the PC when it needs to store data and programs temporarily and have immediate access when they are used. Notice that this memory is deleted when the computer is shut down.

On the oher hand, the Non-volatile memory (also known as ROM- Read Only Memory) is used to store data in a more permanently way so that crucial Operating System data files as well as all the programs installed are not deleted when the computer is shut down.

Due to the above, the answer is Random Access Memory (RAM).

___________ is an approach to boundary spanning that results from using sophisticated software to search through large amounts of internal and external data to spot patterns, trends, and relationships that might be significant.

Answers

Answer: Business intelligence

Explanation:

Most of the enterprises and organizations collects huge amount of data through the use of MIS. These data can be based on any aspect of the business. But the collection of such large sets of data is useless until and unless there is a business intelligence associated with it. the work of business intelligence is to use software tools for analysis of the collected data so that it could be useful for enterprise or company to look for patterns and trends in the market.

The outcome of such business intelligence is very helpful particularly to managers, executives for taking particular decisions in the greater interest of the company.

So we can say, business intelligence is an approach to boundary spanning that results from using sophisticated software to search through large amounts of internal and external data to spot patterns, trends, and relationships that might be significant.

Consider the following scenario: "You are an assistant to the accounting manager for a small company that sells sports equipment online. The manager needs an analysis of sales by product to be presented at Friday’s managers’ meeting and asks you to gather and summarize the data." How can you use Excel to complete this assignment? What information do you need to produce an accurate, useful analysis? What questions might you ask the accounting manager before starting on the assignment?

Answers

Answer:

1. Microsoft Excel helps data analysis through different spreadsheet queries and operations options.

2. Input data to the analysis of sales by product is required for the development of formula and extracting results.

3. The information of data source and frequency of report is required to start the work.

Explanation:

1. Microsoft Excel tool can be used to calculate the results of equipment. Obtained results can be displayed in charts and graphs from the excel.

2. Information like the quantity of sold items, remaining items are required to produce accurate, useful analysis.

Before starting assignment accounting manager will be asked the following questions.

1) Where does the input data come from?

2) Is analysis required on a daily basis or once for all provided data?

3) Is Summary is in the form of tabular data, Graphical data, or Both?

You are the network administrator for a small organization of 100 users. Users till now were freely browsing the Internet. You want to put a provision in place where you can monitor their visits to the different Websites and block all unwanted Websites. What should you install and configure?

Answers

Answer: Proxy server

Explanation: Proxy server is a type of server that is acts as interface between the network on huge scale and any local network. This server provides the feature of security, operations, privacy etc in the network system. They also help in improving the performance of the network.

It can work as the web filter to eliminate the unwanted websites.They acts as the gateway by  observing the website that is being browsed by the other user.Thus installation of proxy server should implemented on the organization.

Identify the false statement.

a. When you perform arithmetic operations with operands of unlike types, you must make an explicit conversion to a unifying type.
b. You can explicitly override the unifying type imposed by Java by performing a type cast; type casting forces a value of one data type to be used as a value of another type.
c. Summing a double, int, and float results in a double.

Answers

Final answer:

The false statement is that explicit conversion is always necessary when performing arithmetic operations with operands of unlike types. In fact, Java automatically promotes the operand types as needed. Understanding type promotion and explicit type casting is crucial in Java programming.

Explanation:

The student asked to identify the false statement among three given options related to type conversion and arithmetic operations in Java. Firstly, it's crucial to recognize that Java performs automatic type conversion in certain scenarios when dealing with arithmetic operations involving different data types. This automatic conversion aims to prevent data loss by promoting smaller data types to larger ones.

The false statement is: "When you perform arithmetic operations with operands of unlike types, you must make an explicit conversion to a unifying type." This statement is not entirely accurate because Java automatically promotes one of the operands to the type of the other operand when performing arithmetic operations on operands of different types, a process known as type promotion. However, explicit type casting can be used to override this behavior if desired.

Explicit type casting and the automatic type promotion mechanism are crucial for ensuring accuracy and avoiding errors during arithmetic operations involving different data types in programming languages like Java.

​When preparing a representative sample from a list of 200 customers who complained about errors in their statements, a _____ could ensure the sample is balanced geographically by selecting five customers from each of four zip codes.

Answers

Answer: Stratified sample

Explanation:

For preparing samples of various data of companies and enterprises we need to apply probability distribution to different samples of data. Here in the question we are to apply a representative sample from a list of 200 customers who have complained about errors in their statement. So here we can apply stratified sampling where we can divide the 200 customers into separate groups. These sub groups of the customers are known as stratas. These stratas are selected based on certain characteristics which can be identified among the customers group. Here we can form subgroups based on the type of complain that has been lodged by the customer and selecting 5 customers from four zip codes. Then it would be easy to apply probability distribution to the sub groups to derive information from them.

This process would also enable a more easier and cheaper way of sampling the customer data.

The _____ establishes that the destination device is present on the network, verifies active service, and informs the destination device that it intends to establish a communication session.

Answers

Answer: Three way handshake

Explanation:

The three way handshake is the process in which it established a connection at the destination device in the network. It also verifies the currently active services in the network.

The three way shake process basically uses in the transmission control  protocol(TCP) and it also inform to the destination device about the communication session.

Three way handshake process are properly understand in the TCP segment header by the various values in the two host exchange.

When using HTML5 and typing text within the tags of a page, browsers will preserve and display all white space characters (spaces, tabs, newlines) as typed. True or false?

Answers

Answer:

Hi!

The answer is false.

Explanation:

The browsers ignore tab indents, double-spaces, newlines, and another typographic formatting when using HTML5.

You can use the tag <pre> to preserve and display typographic formatting as typed.

Furthrmore:

For indent a text, you should use CSS. For spaces, you should use &nbsp. For newlines is commonly used the <div> tag.

If you have translated someone else's work into a different language, you do not need to include a citation, reference or quotation marks because the words are your own and you can take credit for the translation.True / False.

Answers

The answer is False because that would still be considered as plagiarism.

It is false that if you have translated someone else's work into a different language, you do not need to include a citation, reference or quotation marks because the words are your own and you can take credit for the translation.

What is translation?

Language translation is the method of converting written words from one language into another in a culturally and linguistically appropriate manner so that they can be understood by their intended audience.

Translation is required for the global dissemination of new information, knowledge, and ideas. It is absolutely necessary for effective communication between cultures.

If you translate a passage from one language into another on your own in your paper, it is considered a paraphrase rather than a direct quotation.

To cite your translated material, simply include the author and date of the material in the in-text citation.

Thus, the given statement is false.

For more details regarding translation, visit:

https://brainly.com/question/14480244

#SPJ5

A user has a network device that streams media to the LAN. The device is visible on the network. All PCs on the LAN can ping the device. All firewalls are turned off. The streaming device appears to function properly, but the media will not stream as requested. Which of the following TCP/IP technologies is not implemented properly?A. MulticastB. BroadcastsC. UnicastD. Anycast

Answers

Answer: A. Multicast

Explanation:

Here we are given a situation where it is necessary for the device to stream media to all the PCs connected across the LAN. But as the they are unable to stream the media then it is a problem in the multicast TCP/Ip technology.

Multicasting enables to transfer information or messages from one to many or many to many. Here as a single device is responsible for streaming the content to other PCs across the LAN, therefore it is necessary that multicast has been properly implemented.

Option B is incorrect as it is not a scenario of broadcast as in broadcasting all the receivers must get the streaming however here if a PC does not want to receive the media stream it cannot receive for which multicasting is required.

Option C is incorrect as here we are not talking of one to one communication.

Option D is incorrect as here we cannot have more than one route to send the media content except the LAN.

A switch has just arrived from Cisco. The switch has never been configured with any VLANs, but VTP has been disabled. An engineer gets into configuration mode and issues the vlan 22 command, followed by the name Hannahs-VLAN command. Which of the following are true? (Choose two answers.)
a. VLAN 22 is listed in the output of the show vlan brief command.
b. VLAN 22 is listed in the output of the show running-config command.
c. VLAN 22 is not created by this process.
d. VLAN 22 does not exist in that switch until at least one interface is assigned to that VLAN.

A. B and C
B. C and D
C. A and B
D. A and D

Answers

Answer:

C. A and B

Explanation:

The switch was never been configured with VLANs before and the VTP also has been disabled.So by issuing the vlan 22 command and Hannahs-VLAN command.VLAN 22 will be listed in the output of the show vlan brief command and VLAN 22 will be llisted in the output of the show running - config command.Hence the answer is option C. (A and B) .

In a fantasy world, your character must face hordes of demons. Each demon is vulnerable to a type of magical spell. This weakness is exposed through trial and error. What kind of challenge has been described here?


extrinsic knowledge


imperfect information


perfect information


intrinsic knowledge

Answers

Answer:

Imperfect information

Explanation:

-Extrinsic knowledge refers to information that comes from the outside.

-Imperfect information refers to a situation in which a player doesn't know all the information needed from the beginning of the game when he has to do something.

-Perfect information refers to a situation in which a player knows all the information needed from the beginning of the game when he has to do something.

-Intrinsic knowledge refers to the information that a person knows without realizing it.

According to the definitions, the kind of challenge that has been describe in this situation where the weakness of the demon is exposed through trial and error is imperfect information.

Answer:

D. intrinsic knowledge

Explanation:

So just for this question, we want to keep our eyes on A and D. Keep in mind that A and D are the complete opposite of each other, so the best way I can put it simply is that in the gaming world "extrinsic knowledge" is like an action game, however, "intrinsic knowledge" is like a puzzle game. And as we see in the question your player has to think their way out, so it leans more into "intrinsic knowledge" than anything.

So again its D. intrinsic knowledgeI HOPE THIS HELPS! STAY AWESOME!

The __________ is the continuity of control of evidence that makes it possible to account for all that has happened to evidence between its original collection and its appearance in court, preferably unaltered.

Answers

Answer:

chain of custody

Explanation:

According to my research on the criminal investigation process, I can say that based on the information provided within the question the term being described is called the chain of custody. This is the process of documenting every person that handles a piece of evidence from the moment it was discovered to the moment that it gets presented in court.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

Answer:

Chain of custody

Explanation:

The chain of custody is the continuity of control of evidence that makes it possible to account for all that has happened to evidence between its original collection and its appearance in court, preferably unaltered.

Assume there is a class AirConditioner that supports the following behaviors: turning the air conditioner on and off. The following methods provide this behavior: turnOn and turnOff. Both methods take no arguments and return no value.
Assume there is a reference variable myAC to an object of this class, which has already been created. Using the reference variable, invoke a method to tell the air conditioner object to turn on.

Answers

Answer:

Hi!

I will use JAVA to answer the question.

The class AirConditioner could be:

public class AirConditioner {

  bolean state;

  AirConditioner(){ //constructor

     this.state = false;

   }

public void turnOff{ //turn off method

 this.state = false;

   }

public void turnOn{ //turn on method

 this.state = true;

   }

}

Program to solve the problem:

public static void main(){ //main program

  AirConditioner myAC = new AirConditioner();  //instanciate the AirConditioner object

  myAC.turnOn(); //call the method turnOn for myAC instance.

}

In Microsoft Word, spelling errors are identified by a _____. green underline call-out box with notes in the margin red underline strikethrough text format

Answers

Answer:

Spelling errors are identified by a red underline.

Explanation:

Answer:

Spelling errors are identified by a red underline

Explanation:

A user’s laptop hard drive contains sensitive information. The user often plugs the laptop into the corporate network. A sensitive file from the laptop has been found on another users laptop. How could the user have prevented this breach?

Answers

Answer:

the user should disable file and print sharing on the laptop

Explanation:

According to my research on information technology and cyber security, I can say that based on the information provided within the question in order to prevent this the user should disable file and print sharing on the laptop. This is because this file and printer sharing allows users to see your files that you have available as shared and copy or print those files. Which if they are sensitive data you should just disable this option so that people on the same network cannot see or access these files.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

Final answer:

To prevent data breaches, users should implement strong passwords, use file encryption, avoid insecure networks, and follow secure file sharing practices. Additionally, using VPNs, network access controls, and staying up-to-date with privacy rights and policies are important. Organizations should train employees to recognize phishing attacks and have a response plan for breaches.

Explanation:

Preventing Data Breaches in a Corporate Environment:

To prevent a sensitive file from a laptop from being found on another user's laptop, several steps could have been taken by the user. Firstly, using a combination of strong passwords, file encryption, and secure file sharing practices would make unauthorized access more difficult. This includes avoiding the sharing of passwords and ensuring the laptop is running updated security software to protect against malware and other threats. It's also critical to be cautious of the networks to which the laptop is connected; unsecured or public networks should be avoided for transmission of sensitive information.

Secondly, the user could employ network security measures such as Virtual Private Networks (VPNs) and network access controls to restrict unauthorized access. Additionally, educating oneself on privacy rights and reading privacy policies is essential.

Lastly, organizations should implement comprehensive security policies that include regular security training for employees, to make them aware of phishing attacks and other tactics used by cybercriminals. It's important for businesses, organizations, and even governments to have a response plan in case of a data breach.

"Which type of resource record addition allows computers to register or update their own DNS records, or DHCP can update DNS on behalf of the clients when the clients lease a new IP address?"

Answers

ebola

and

aids

......................................................

Other Questions
A boat radioed a distress call to a Coast Guard station. At the time of the call, a vector A from the station to the boat had a magnitude of 45.0 km and was directed 15.0 east of north. A vector from the station to the point where the boat was later found is B = 30.0 km, 15.0 north of east.How far did the boat travel from the point where the distress call was made to the point where the boat was found? In other words, what is the magnitude of vector C? A)65.3 km B)39.7 km C)26.5 km D)54.0 km E)42.5 km If the points (0,0), (-1, 1), and (-2,2) lie on the graph of function h, then which of the following rules could represent thefunction? Gross income includes all of the following except a. capital gains realized. b. interest or dividends received. c. salary or wages. d. employer's current contribution to 401(k). A company has the following balances on December 31, 2018, after year-end adjustments: Accounts Receivable = $62,500; Allowance for Uncollectible Accounts = $6,200. Calculate the net realizable value of accounts receivable Blossom Company began the year with retained earnings of $390000. During the year, the company recorded revenues of $489000, expenses of $379000, and paid dividends of $44500. What was Blossom retained earnings at the end of the year? a) 489000 b) 455500 c) 533500 d) 833500 Which of the four digital-to-analog conversion techniques is the most susceptible to noise? EXPLAIN WHY.a. ASKb. FSKc. PSKd. QAM Which of the following events strained the British government's relationship with the colonists? (select 2) 2 points raising taxes on foreign-made molasses trying suspected smugglers in vice-admiralty courts authorizing writs of assistance to search any ships and builders refusing to send soldiers to protect against Native American attacks forbidding the settlement of lands east of the Appalachian Mountains Jay said that by the quotient of powers property zero to the fifth power divided by zero to the second power equals zero to the fifth power -2 equals zero to the third power which equals zero is this correct explain Which of the following phrases BEST defines marketplace ethicalbehavior?AIt allows a consumer to return an item they have misused,BIt satisfies a consumer's need to buy an item on credit.It is fair, just, and moral in terms of what is right and wrong andapplies to both consumers and producers.It results in possible court action against producers. A network administrator is using packet tracer to mock up a network that includes iot devices. What can the administrator do from the physical tab of any iot device? Oral communications classThe difference between a thesis statement and the generalpurpose of the speech is....A. The thesis statement identifies the main idea of the speechwhere the general purpose statement explains you want to achievewith the speech.B. The general purpose statement offers your opinion of thespeech, the thesis statement provides the facts.C. The thesis statement is longer and more detailed than thegeneral purpose statement.D. The thesis statement and the general purpose statement arethe same thing. The charge to rent a trailer is $15 for up to 2 hours plus $8 per additional hour or portion of an hour. Find the cost to rent a trailer for 2.8 hours, 3 hours, and 8.5 hours. Then graph al ordered pairs, (hours, cost), for the function a. What is the cost to rent a trailer for 2.8 hours? potential danger of sea snakes what is the value of x if the average of 10, 11, 12 and x is 9? "No free man shall be seized or imprisoned, or stripped of his rights or possessions... Except by the lawful judgment of his peers." This quote from the Magna Carta encouraged American colonists to believed Select the external influences that affect the consumer service industry.competitionemployee moralemanagementgovernmental policiesorganizational cultureeconomytechnological changes A girl carried a box of books up two flights of stairs to her attic. Her father carried a box the same weight up a ladder directly to the attic. The girl says she did more work on the box than her father because she walked further up the stairs, is she correct? if f(1) =160 and f(n+1) = -2f(n), what is f(4)? Imagine mathI need helpAlgebra 2Leave answers from left to right thank you could someone pls help me this is due tomorrow