Careers on the largest declining industries list will see an increase in the number of employees in their workforce.

True
False

Answers

Answer 1

The answer is False.

The word "declining" means going down. So, in this case, the employees would go down or leave.

Answer 2

Answer:

False

Explanation:


Related Questions

For each of the following Visual Basic code snippets, identify the syntax error.
1. If intX > 100
lblResult.Text = "Invalid Data"
End If
2. Dim str As String = "Hello"
Dim intLength As Integer
intLength = Length(str)
3. If intZ < 10 Then
lblResult.Text = "Invalid Data"
4. Dim str As String = "123"
If str.IsNumeric Then
lblResult.Text = "It is a number."
End If
5. Select Case intX
Case < 0
lblResult.Text = "Value too low."
Case > 100
lblResult.Text = "Value too high."
Case Else
lblResult.Text = "Value just right."
End Select

Answers

Answer:

1. No 'Then' in the if statement

2. No syntax error.

3. No closing if statement that is no "END IF"

4. No syntax error

5. No syntax error

Explanation:

1. The syntax for writing if statement in visual basic is:

If condition Then

'Stament block'

End If

From the above syntax, we see that the "Then" keyword is missing in the snippet.

2. This is okay as there is no syntax error.

str was declared as a string and a variable was assigned to it. Then, intLength was also declared as integer and the length of str is assigned to it.

3. The syntax for writing if statement in visual basic is:

If condition Then

'Stament block'

End If

From the above we can see that "End If" is missing in the given snippet.

4. There is no syntax error. The opening if and ending if are present.

5. There is no syntax error. The general form of writing a select case statement in Visual basic is:

Select Case VariableName

Case 1

"Statement to execute"

Case 2

"Statement to execute"

Case Else

"Default Statement to execute if other case fail"

End Select

Select the correct boolean expression for each condition in the function m(x). This function should return "Small" if the value stored in x is divisible by both 3 and 5, "multiple of 5" if divisible only by 5, "multiple of 3" if divisible only by 3, and "Orange" otherwise.

Answers

Answer:

Following are method definition to this question:

def m(x): #defining a method and pass an integer parameter

   if x%3 == 0 and x%5 == 0: #defining  condition that value is divisible by 3 and 5

       return "Small" #return value

   elif x%5 == 0: # defining condition if value is divisible by 5 only

       return "multiple of 5" #return value

   elif x%3 == 0: # defining condition if value is divisible by 3 only

       return "multiple of 3" # return value

   else: # else block

       return "Orange" # return value

z=m(15) #call the method and hold return value in variable x

print(z) #print value of variable x

Output:

Small

Explanation:

In the given method definition a method "m" is defined, that passes the value in its parameter, that is x, inside the method, a conditional statement is used, that check multiple conditions, which are described as follows:

In if block, it will check, that value is divisible by both 3 and 5 then, it will return a string value, which is "Small". If the above condition is not true, it will go to elif block, in this block we check the value individually divisible by 5, and 3, then it will return "multiple of 5" and "multiple of 3". If the above condition is not true, it will go to else block, in this block, it will return "Orange".

Which symbol should you use for entering a formula in a cell?
A.
+
B.
=
C.
$

D.
÷
E.
#

Answers

Final answer:

To enter a formula in a spreadsheet cell, you use the symbol = (option B). This indicates that the text you're entering is a formula. You can construct formulas with operations and cell references and use shortcuts like "Alt" + "=" for quick entry.

Explanation:

The symbol you should use for entering a formula in a cell is = (option B). In spreadsheet software like Excel, formulas always begin with the equal sign (=). This is the standard way to indicate to the program that the text you're entering is a formula rather than data. For example, if you're entering a simple subtraction formula, you would use cell references to create a formula like =B5-C5 instead of typing static values. Using cell references is beneficial because it ensures that if your input values change, the result of the formula will update automatically. Moreover, you can use shortcuts like "Alt" + "=" to quickly insert a sum equation. Formulas can be more complex, including operations like multiplication and division, and may contain relative and absolute cell references, functions, and you can use other mathematical symbols like +, -, *, and / to construct them.

You have been tasked with designing an Ethernet network. Your client needs to implement a very high-speed network backbone between campus buildings, some of which are around 300 meters apart. Multi-mode fiber optic cabling has already been installed between buildings. Your client has asked that you use the existing cabling.
Which Ethernet standard meets these guidelines? (Choose two.)

a.10GBaseSR
b.10BaseFL
c.10GBaseER
d.1000BaseSX
e.1000BaseT

Answers

Answer:

a.10GBaseSR

d.1000BaseSX

Explanation:

In Computer Networking, The 1000BaseSX is a type of cabling standard used for deploying Gigabit Ethernet networks. The SX in 1000BaseSX denotes short, and it implies that it's for use with transmissions having short-wavelength over short runs of fiberoptic cabling in a Gigabit Ethernet networks.

The SR in 10GBaseSR denotes short-range, it is exclusively used for multi-mode fiberoptic medium that uses 850nm lasers having LC duplex connector and DDM with a maximum transmission distance of 300meters in a Gigabit Ethernet networks.

Which of the following is true of tape? Group of answer choices It is no longer used as a primary method of storage but is used most often for long-term storage and backup. It is used as a primary method of storage and for long-term storage and backup. It is no longer used for long-term storage and backup but is used most often as a primary method of storage. It is no longer used as a primary method of storage or for long-term storage and backup.

Answers

Answer:

It is no longer used for long-term storage and backup but is used most often as a primary method of storage.

Suppose we have two String objects and treat the characters in each string from beginning to end in the following way: With one string, we push each character on a stack. With the other string, we add each character to a queue. After processing both strings, we then pop one character from the stack and remove one character from the queue, and compare the pair of characters to each other. We do this until the stack and the queue are both empty. What does it mean if all the character pairs match?

Answers

Answer:

If all the character pairs match after processing both strings, one string in stack and the other in queue, then this means one string is the reverse of the other.                            

Explanation:

Lets take an example of two strings abc and cba which are reverse of each  other.

string1 = abc

string2 = cba

Now push the characters of string1 in stack. Stack is a LIFO (last in first out) data structure which means the character pushed in the last in stack is popped first.

Push abc each character on a stack in the following order.

c

b

a

Now add each character of string2 in queue. Queue is a FIFO (first in first out) data structure which means the character inserted first is removed first.

Insert cba each character on a stack in the following order.

a   b   c

First c is added to queue then b and then a.

Now lets pop one character from the stack and remove one character from queue and compare each pair of characters of both the strings to each other.

First from stack c is popped as per LIFO and c is removed from queue as per FIFO. Then these two characters are compared. They both match

c=c. Next b is popped from stack and b is removed from queue and these characters match too. At the end a is popped from the stack and a is removed from queue and they both are compared. They too match which shows that string1 and string2 which are reverse of each other are matched.

What are ways to enter formula in Excel? Check all that apply

Answers

Final answer:

To enter formulas in Excel, one can type them directly or use the pointing method. AutoSum is a feature that can create formulas automatically, and keyboard shortcuts like Ctrl + Shift + Enter can apply formulas across multiple cells.

Explanation:

To enter a formula in Excel, you can type the formula directly into the cell by starting with an equal sign (=). This can include cell references, arithmetic operators, and constants. Another way to enter formulas is by using the pointing method, where you click on the cells you want to reference instead of typing them, which can help avoid typing errors. For example, to calculate Owner's Equity, you would type '=', click on cell D30, type '-', and then click on cell D60, followed by clicking the Enter check mark on the formula bar. Additionally, when using functions like AutoSum, Excel can automatically generate a formula. Simply select the destination cell, click the AutoSum button, and adjust the default range if necessary before confirming with the Enter check mark.

Remember that after entering a formula, if you want to apply it to multiple cells, you need to use the Ctrl + Shift + Enter shortcut instead of just hitting Enter to ensure it populates across the selected range. You can also use various keyboard shortcuts to streamline the data entry process in Excel, such as F1 to open the Help pane for more shortcuts.

The Telecommunications Act of 1996 was a mixed bag for cable customers. Although cable companies argued that it would bring more competition, about 60 percent of communities in the United States still have only one local cable company.
A. True
B. False

Answers

Answer:

The answer is "Option B".

Explanation:

It was designed to reduce administrative burdens and maximize market capacity, as did the US telecom act of 1996. This act specifies the people in the UK, that may view or use telecoms, which involves the TV, phone calls and, and most of all, the internet.

It enables us to participate in each contact business because every telecom company could compete in every sector.  This act is mainly aimed at privatizing linear television and telecom sectors.

A system administrator is selecting an operating system for use by the company's research and development team. The team requires an OS that can be easily modified and changed to meet its particular requirements. Which of the following operating systems will be the best choice for the users
Windows
Linux
Macintosh

Answers

Answer:

Linux

Explanation:

Linux is a family of open source operating system and can be easily modified and changed to meet its particular requirements. Linux is one the most used operating systems on servers, mainframe computers and even super computers. Being a free and open source system, it can be modified and distributed for both commercial and non commercial by anyone under the terms of its licence.

Assume an int array, candy, stores the number of candy bars sold by a group of children where candy[j] is the number of candy bars sold by child j. Assume there are 12 children in all ,which of the following code could be used to compute the total number of bars sold by the children?

Scanner scan = Scanner.create(System.in); int value1 = scan.nextInt( ); int value2 = scan.nextInt( ); bars[value1] += value2;

1. adds value1 to the number of bars sold by child value2
2. adds 1 to the number of bars sold by child value1 and child value2
3. adds 1 to the number of bars sold by child value1
4. inputs a new value for the number of bars sold by both child value1 and child value2
5. adds value2 to the number of bars sold by child value1

Answers

Answer:

5. adds value2 to the number of bars sold by child value1

Explanation:

First, the code snippet create a Scanner object called scan.

Then it receive user input as value1. It then also receives another user input as value2.

From the question, we are told that candy[j] is the number of candy bars sold by child j. So, value1 represent number of candy bars by child 1 and value2 represent number of candy bars by child 2.

Therefore;

bars[value1] += value2;

adds value2 to the number of bars sold by child value1

When the processor needs an instruction or data, it searches memory in this order: L1 cache, then L2 cache, then L3 cache (if it exists), then RAM — with a greater delay in processing for each level it must search.

Answers

Answer and Explanation:

Memory Cache speed the processes of the computer. It stores instruction and data. The computer has two types of memory cache

L1 cache, L2 cache, and L3 Cache i.e., Level 1, Level 2 and Level 3

L1 cache is built on the processor chip and has a minimal capacity.

L2 cache is slower than L1 and has a large capacity. Mostly processor uses ATC advanced transfer cache.

When the processor needs instruction, it searched in order L1 cache than L2 cache and L3. If any data or instruction is not found, then search slower speed medium such as a hard disk and optical disc.

Final answer:

Processor checks data or instruction first in the L1 cache, then L2, L3 cache and finally RAM. The time required to access data increases with each level, starting from the least latency in L1 cache to the most latency in RAM. This hierarchy is utilized for maintaining quick instruction execution.

Explanation:

The subject of this question is related to a computer processor and its memory hierarchy. In a processor, when an instruction or data is needed, it typically follows a sequential order for searching - first it checks L1 cache, if not found then it checks L2 cache, further the L3 cache and finally the RAM. Each level increases the delay in processing as the time required to access data increases from L1 cache to RAM.

This search order is utilized since the closest memory to the processor (L1 cache) has the least latency, and therefore provides the fastest access to data, while the furthest memory (RAM) has higher latency but typically larger size.

Therefore, by checking the closest memory levels first, the processor can keep instruction execution as rapid as possible.

Learn more about Processor Memory Hierarchy here:

https://brainly.com/question/31959355

#SPJ3

The Watch Window is observable: a) only when the complete model is observable on the screen.b) only in the same worksheet of a workbook. c) across different worksheets of a workbook. d) across different workbooks in the same folder.

Answers

Answer:

Option c is the correct answer for the above question.

Explanation:

The watch window is an important feature of the excel sheet or spreadsheet software which is used to gives the features to see the important cells or data into a separate window. When any user wants to put the record of an important cell on a single glance, then he can do it with the help of the watch window.

This is a feature which is used in all the worksheet of the same workbook. SO option c is the correct answer, while the other is not because:-

Option a states about the complete software which is not correct.Option b states about the same worksheet only, but it is available on the whole workbook.Option d states about all workbooks, but it is available on the same workbook.

Final answer:

The Watch Window in Microsoft Excel allows users to track cell values and formulas across different worksheets within a workbook.

Explanation:

The Watch Window in Microsoft Excel is a powerful feature that allows users to keep track of certain cells and their formulas across different areas in a workbook. Specifically, it provides the ability to observe cell values and formulas even when navigating away from the cell.

To answer the student's question, the Watch Window is observable c) across different worksheets of a workbook. This means you can monitor the value of a cell regardless of which sheet you are currently viewing in the workbook.

The ability to track cells is not limited to the visibility of the complete model on the screen, as it displays the cell value and location even when you are working on a different part of the workbook. Additionally, the Watch Window is not restricted to viewing within the same worksheet or across different workbooks in the same folder.

The normalization process used to convert a relation or collection of relations to an equivalent collection of third normal form tables is a crucial part of the database design process. Group of answer choices True False

Answers

Answer:

The normalization process used to convert a relation or collection of relations to an equivalent collection of third normal form tables is a crucial part of the database design process is true.

Explanation:

Given statement is "The normalization process used to convert a relation or collection of relations to an equivalent collection of third normal form tables is a crucial part of the database design process".

To check whether the given statement is true or false :Given statement is true.FOR:

By using the application to Database Design the normalization process is true with the given statement.

By following rules and appropriate normalization methods, normal forms higher than the third  normal form.

Hence the normalization process used to convert a relation or collection of relations to an equivalent collection of third normal form tables is a crucial part of the database design process is true

A network administrator is working on the implementation of the Cisco Modular Policy Framework on an ASA device. The administrator issues a clear service-policy command. What is the effect after this command is entered?

A. All class map configurations are removed.
B. All service policy statistics data are removed.
C. All service policies are removed.
D. All policy map configurations are removed.

Answers

Answer:

B. All service policy statistics data are removed.

Explanation:

When you issue the clear-service policy command on the Cisco Modular Policy Framework, what it does is to ensure that all statistics concerning service policy is totally eliminated from the system. This does not imply that all services policies are removed. It also does not remove all class or policy map configurations.

Brianna has a physical store that she's successfully managed for 10 years. Her products aren't designed to sell and ship online. She recently created an online website and app to advertise her business. Now she's interested in using Google Ads to create an ad campaign and measure its effectiveness.
1. Brianna can convert offline customers into online shoppers.
2. Brianna can measure how many shoppers intend to visit her physical store.
3. Brianna can track conversions for first opens for her app.
4. Brianna can measure offline sales initiated from an ad click.

Answers

Answer:

4. Brianna can measure offline sales initiated from an ad click

Explanation:

offline conversion tracking will help Brianna when she can measure her offline sales initiated from an ad click.

Your company just opened a small branch office where 10 computer users will work. You have installed a single Windows Server 2016 computer configured as a member server for basic file and print server needs. Users require DNS to access the Internet and to resolve names of company resources. You decide to install DNS on the existing server. Which of the following types of installations makes the most sense?a. A primary server hosting a standard zoneb. An Active Directory-integrated zone hosting the zone in which the server is a memberc. A caching-only DNS serverd. A server that's a forwardera. A primary server hosting a standard zone

Answers

A) a primary server hosting a standard zone

For questions 1 – 3, use the following partial class definitions:
public class A1
{
public int x;
private int y;
public int z; …
}
public class A2 extends A1
{
public int a; private int b; …
}
public class A3 extends A2
{
private int q; …
}

1) Which of the following is true with respect to A1, A2, and A3?
a) A1 is a subclass of A2 and A2 is a subclass of A3
b) A3 is a subclass of A2 and A2 is a subclass of A1
c) A1 and A2 are both subclasses of A3
d) A2 and A3 are both subclasses of A1
e) A1, A2 and A3 are all subclasses of the class A

2) Which of the following lists of instance data are accessible in class A2?
a) x,y,z,a,b
b) x,y,z,a
c) x,z,a,b
d) z,a,b
e) a,b

3) Which of the following lists of instance data are accessible in A3?
a) x,y,z,a,b,q
b) a,b,q
c) a,q
d) x,z,a,q
e) x,a,q

Answers

Answer:

QUESSTION 1: B

QUESTION  2: C

QUESTION 3:  D

Explanation:

In question 1, since A3 extends A2, it implies A3 is the subclass of A2 and A2 is its super class, same applies to the relationship between A1 and A2, the extends keyword is used to indicate inheritance in the child class (subclass)

In question 2, the class A2 has two declared instance variables (a,b) It has also inherited the public variables of its superclass (A1) so it has the x,z (Inherited variables) and a,b (its own variable)

The same explanation in question 2 applies to question three. The Class A3 has access to all the public fields of A1 and A2 as well as its own declared field x,z,a (Inherited public fields) q Its own field.

What is the purpose of the following loop? int upperCaseLetters = 0; int position; String str = "abcdEfghI"; boolean found = false; for (position = 0; position < str.length() && !found; position++) { char ch = str.charAt(position); if (Character.isUpperCase(ch)) { found = true; } }

Answers

Answer:

See the explanation

Explanation:

Initialize a string called str and a boolean called found

Initializes a for loop that iterates through the str

Inside the for loop:

Gets the characters of the str and assigns them to the ch. Checks if the character is an uppercase or not. If an uppercase character found, updates the found as true and stops the loop.

For this example, the loop will stop when the character "E" is reached

Bob has been assigned to set up a digital certificate solution for use with e-mail. One of the requirements he has been given is to ensure that the solution provides for third-party authentication. Which of the following should he choose

PGP

X.509

Kerberos

Sesame

Answers

Answer:

B : X.509

Explanation:

Write down the bit pattern to represent -3.75 assuming a version of this format, which uses an excess-16 format to store the exponent. Comment on how the range and accuracy of this 16-bit floating point format compares to the single precision IEEE 754 standard.

Answers

Answer:

Explanation:

find the solution below

Mario is working on a text ad that will run on the Google Search Network. He filled in each component with the necessary information. What component asked Mario to highlight unique details about his product and limited the number of characters he could use to two fields of 90 characters

Answers

Answer:

The description component

Explanation:

When creating a text ad that'll run on Google Search Network, the requirements are

A First headline

A Second headline

A third headline

The Display URL

The First Text Description

The Second Text Description

Path

As highlighted above, there are two description fields in a text ad; both of which are 90 characters long,

The description fields are used to make unique details about the ads, outstanding. If it's product sales ads, for instance; the description could include texts like “Shop now” or “Buy shoes now.”  etc.

In this case of Mario's text ad, the component asking Mario to highlights the unique features of his text ad is the description component.

2.Write an if /else if statement that carries out the following logic. If the value of variable quantityOnHand is equal to 0, display the message ''Out of stock''. If the value is greater than 0, but less than 10, display the message ''Reorder ''. If the value is 10 or more do not display anything.

Answers

Answer:

if(quantityOnHand == 0) { cout<<"Out of stock"; }

else if(quantityOnHand > 0 && quantityOnHand <10) { cout<<"Reorder "; }

else if(quantityOnHand >= 10){ }

See Explanation for comments

Explanation:

//This program segment is written in C++

//Only required segment is written

// Comments are used for explanatory purpose

// Program Segment starts here

/*

The following condition tests if quantityOnHand equals 0

If this condition is true, the program prints "Out of stock" without the quotes

*/

if(quantityOnHand == 0) { cout<<"Out of stock"; }

/*

The following condition tests if quantityOnHand  is greater than 0, but less than 10

If this condition is true, the program prints "Reorder " without the quotes

*/

else if(quantityOnHand > 0 && quantityOnHand <10) { cout<<"Reorder "; }

/*

The following condition tests if quantityOnHand  is greater than o equal to 10

If this condition is true, nothing is done

*/

else if(quantityOnHand >= 10){ }

// End of program segment

Assumption: The program assumes that variable quantityOnHand has already been declared

In a _____ scan, Nmap marks the TCP bit active when sending packets in an attempt to solicit a response from the specified target system. This is another method of sending unexpected packets to a target in an attempt to produce results from a system protected by a firewall.

Answers

Answer:

The answer is "TCP fin"

Explanation:

TCP FIN is used to scan the only closing the linkage on one half or even both sides. It is divided into two parts, that are TCP-RST server and TCP-RST client, both can be described as follows:

In the Server, it occurs to reset the server, which is transmitted by the server. In the client, it transmits a TCP reset to the device. The main purpose of this link is to end by sending a FIN bit set special message.It serves as the termination request for the other unit, which may also convey information like standard line.

A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption to encrypt their customers' credit card information. Is this a secure form of payment?
Yes, public key encryption is built upon computationally hard problems that even powerful computers cannot easily solve.
No, encryption is an issue in that case

Answers

Answer: Yes

Explanation:

Public key encryption is the encryption technique that is used for private keys and public keys for securing the system.Public key is used for encryption and private key is for decryption.Public keys can only open content of the system

According to the question, public key encryption is secure for coffee shop customer payment process as they are stored on digital certificates in long form for verifying digital signature and encrypting information.Its computation is difficult to crack through power computer access.  Other options is incorrect as encryption is not a problem for payment procedures. Thus, the correct option is yes ,public key encryption is secure method for coffee shop customers .

Your application needs to process large numbers of job requests and you need to ensure that they are processed in order, and that each request is processed only once. How would you deploy SQS to achieve this end?

a.Use the SetOrder attribute ensure sequential job processing.
b.Convert your standard queue to a FIFO queue by renaming your standard queue with the .fifo suffix.
c. Use an SQS FIFO queue to process the jobs.
d.Configure FIFO delivery in a standard SQS queue.

Answers

Answer:

Use an SQS FIFO queue to process the jobs.

Explanation:

SQS stands for Simple Queue Service. It is a programmatic web service that is used to process and store information between computers. SQS was designed to build applications to prevent requests from staying too long on a queue. They process large number of requests at least once and in a sequential order. SQS removes messages permanently from the queue that have been there for a maximum period of time. The default retention period is usually 240 hours but you can reset it to a time to suit your desire.  Using FIFO( First-in, First-out) queue, messages are processed exactly once and it supports 300 messages per second. Therefore, using an SQS FIFO queue to process messages will ensure that messages are processed in order and only once.

The BasicSet 2 class implements the Set ADT by wrapping an object of the Linked Collection class and:______.
a) "forwarding" all method calls to it.
b) making its variables private.
c) disallowing null elements.
d) "forwarding" all method calls except certain calls to the add method.
e) None of these is correct.

Answers

Answer:

The BasicSet 2 class implements the Set ADT by wrapping an object of the Linked Collection class and forwarding" all method calls except certain calls to the add method.

Review the excerpt from the outline for the speech, "Organ Donation." What type of research do you think this student did to prepare for his speech? What quotes or other types of information did he include in his speech? Did he include source information?

Answers

Answer and Explanation:

Ethical, regulatory, policy and organizational issues relevant research would have been involved, deceased organ donors.

Answers will vary. In organ donor research, it involved in preparation. This type of research includes the transplantation of organs. The research purpose is to improve the outcomes and transplanting of the organ. Quotations from speech should list.The quotation list may or may not include source information.

Answer:

kalso is right, I dont know why they have such low amount of stars bc they are right sooo just saying

Explanation:

Write the definitions of two classes Day and Night. Both classes have no constructors, methods or instance variables. Note: For this exercise, please do not declare your classes using the public visibility modifier.

Answers

Answer:

class Day

{

}  

class Night

{

}

Explanation:

Given

Two classes named: Day and Night

Requirement: Both classes have no constructors, methods or instance variables. should not be declared using the public visibility modifier.

The syntax to define a class in object oriented programming is

modifier class classname {

 // Constructor

 constructor(variablename) { ......}

 // Methods

 methods() { ... }

 ...

}

Access modifiers (or access specifiers) are keywords in object-oriented languages that set the accessibility of classes, methods, and other members. Examples are private, public, protected, etc.

Going by the syntax above to define class Day

Day

private class Day{

 // Constructor

 constructor(duration)

{

this.duration = duration;

}

 // Methods

CalculateDate() { ... }

}

But the question states that both classes have no constructors, methods or instance variables. should not be declared using the public visibility modifier.

So, class Day will be defined as follows

class Day

{

}

It could also be declared using visibility modifiers other than public modifier.  So, class Day will be defined as follows

private class Day

{

}

and

protected class Day

{

}

Similarly, class Night can be defined as follows

class Night

{

}

private class Night

{

}

and

protected class Night

{

}

Advanced Communications, a leading mobile communication service provider, has a deal with On-the-Go, a chain of several thousand convenience stores nationwide. Users of Advanced Communications simply have to punch in their phone number at an On-the-Go gas pump to get 20 percent off on up to 20 gallons of gas for the next 90 days. This scenario describes a __________.

Answers

Answer:

The answer is "Strategic alliance"

Explanation:

These alliances are an indo-organizational type in which several trading stakeholders decide to put resources, transfer knowledge. It also collaborates in environmentally friendly-nomic price-creating exercises.

In this alliances major mobile phone service provider, Advanced Phone has a contract with On-the-Go, a chain of several thousand convenience stores nationwide. It depends on synergy in both the assets and technical expertise to introduce to those of the partnership by any of the trade members, that's why the strategic alliance is the correct answer.

The ____ format has become an unofficial web standard for documents that require a specific printed format, such as forms that must be filled out by hand and/or signed, and you can rely on most of your users having the capability to view and print this format. a. DOC b. DOCX c. TXT d. PDF

Answers

Answer:

The pdf format has become an unofficial web standard for documents that require a specific printed format, such as forms that must be filled out by hand and/or signed, and you can rely on most of your users having the capability to view and print this format.

Explanation:

Portable Document Format (PDF)

PDF is a well known file format that is used all around the world by millions of users to view, read, edit or print documents. It is based on the PostScript language and can support a variety of features.

The pdf format is also widely used for web applications since a lot of users have the capability to view and print this format.

Other Questions
Please answer this correctly Which government agency came into being as a result of the Triangle Shirtwaist Factory fire?the Bureau of Minesthe Federal Bureau of Investigationthe Factory Investigative Bureauthe Sherman Anti-trust Act The function of the hormones secreted by the thymus gland is to: a. stimulate lymph production. b. concentrate the lymph and filter out toxins. c. enable lymphocytes to develop into mature T cells. d. break down old erythrocytes and recycle the hemoglobin. When perfect competition prevails, which characteristic of firms are we likely to observe? They are all price takers. They all try to operate where price equals average variable cost. They all try to operate where price equals total cost. None of them ever has diminishing marginal returns. Which was NOT a reason Texans and other Americas purchased Liberty Loans?a.To support the U.S. war effortb.To show patriotismc.To make a small amount of money in interestd.To protest against World War IPlease select the best answer from the choices providedABCD When Eileen told her father that someone had stolen her new phone at school, he said that she should have known better than to take her phone to school. "It was bound to happen," he said. This example most clearly illustrates:__________. A rectangle has a height of 6k^3 and a width of 2k^2 + 4K +5 what is the area When the market is in balance it is called market __________. Explain how the Texas oil industry has had both positive and negative influences on the state of Texas. (8c2-2c) + (2c2+3c) in standard form Joseph Gallo, the founder of the famous wine company that bears his name, said that when he first started selling wine right after Prohibition (laws outlawing the sale of alcohol), he poured two glasses of wine from the same bottle and put a price of 10 cents a bottle on one and 5 cents a bottle on the other. He let people test both and asked them which they wanted. Most wanted the 10-cent bottle, even though they were the same wine. What does this tell us about people? Can you think of other areas where that may be the case? What does this suggest about pricing? As a reminder, see below regarding my course policies on "Discussion" (Also located in the Course Syllabus). 7/15+(-5/6)What is the answer and how do I get it Use the diagram, which is not drawn to scale, to decide which proportions are true. 1. Which educational group has the highest turnout?a. high school dropoutsb. high school graduatesc. people with bachelor's degreesd. education is irrelevant to voter turnout What is the function of these organelles Tom's stockbroker offers an investment that is compounded continuously at an annual interest rate of 3.7%. If Tom wants a return of $25,000, how long will Tom's investment need to be if he puts $8000 initially? Give the exact solution in symbolic form and then estimate the answer to the tenth of a year. Use the drop-down menus and your knowledge of suffixes to choose the correct word in each sentence.The kind doctor was always toward her patients.The king was supported by who believed in a royal leader rather than a democracy.The actor was an person who volunteered to help the poor. A lamp operates at 115 volts with a current of 0.25 ampere. What is the lamp's resistance? With which of the following statements would Tecumseh most likely agree?A) Land belongs to everyone, so it cannot be bought or sold.B) Land can be bought and sold, but only by Native Americans.C) Land is meant to be shared, but only with those who pay for it.D)Land is a government resource, so it cannot be bought or sold. Bob leased an apartment for three years from the Steiners. He was never late on his rent in those three years, kept the apartment immaculate, and never caused a moment of trouble. He has recently purchased his first home and moved out of the apartment. As expected, Bob gave the Steiners sixty days notice he would be moving and left the apartment in perfect condition. It has been 45 days since he moved out and he's been watching for his security deposit refund to purchase a new sofa. When should he expect his security deposit refunded?a. if there had been no damage or cleaning required, which seemed highly unlikely in bobs case, the landlord should have refunded his security deposit within 21 days of bobs vacating the property.b. if there had been no damage or cleaning required, which seemed highly unlikely in bobs case, the landlord should have refunded his security deposit within 30 days of bobs vacating the property.c. if there had been no damage or cleaning required, which seemed highly unlikely in bobs case, the landlord should have refunded his security deposit within 14 days of bobs vacating the property.d. none of the above.