_______is a network of physical objects embedded with sensors, processors, software and network connectivity capability to enable them to exchange data with the manufacturer, operator and other connected devices
a. the internet of digital divide
b. the internet of regulations
c. the internet of things
d. the internet of data

Answers

Answer 1

Answer:

c. the internet of things

Explanation:

Internet of things stands for IoT devices. the objects or devices which can be connected on internet and control by any of networking device comes under IoT devices.

IoT device is a combination of sensors, devices, and network working together. there are many sensors i.e PIR sensor, temperature sensor, light sensor, etc. which collect the information and send it over the connected devices. when it gets command it also acts on the same command like a printer function.

The example and most recent usage of IoT devices in the lighting automation, where the lighting of a house or office gets connected to the internet and can be controlled by any device connected with it.


Related Questions

A student is recording a song on her computer. When the recording is finished, she saves a copy on her computer. The student notices that the saved copy is of lower sound quality than the original recording. Which of the following could be a possible explanation for the difference in sound quality?

A. The song was saved using fewer bits per second than the original song.
B. The song was saved using more bits per second than the original song.
C. The song was saved using a lossless compression technique.
D. Some information is lost every time a file is saved from one location on a computer to another location.

Answers

Answer:

A. The song was saved using fewer bits per second than the original song.

Explanation:

A song can be recorded on the computer or any device ranging from bit rates 96 kbps to 320 kbps.  

The lesser the bitrates the lesser the quality of the audio and when we increase the bit rates, the quality of the audio recorded gradually increases.

Bitrates of 128 kbps give us a radio like quality whereas when we use bitrates of 320 kbps we get very good or CD-like quality.

According to the scenario, the most appropriate answer is option A.

Final answer:

The saved copy of the song is likely of lower sound quality because it was saved using fewer bits per second (Option A). Lowering the bit rate can reduce quality noticeably when less information of the sound is captured. Lossless compression doesn't degrade quality, and saving with more bits or transferring within a computer does not reduce sound quality.

Explanation:

The difference in sound quality of the student's recording could be due to saving the song using fewer bits per second than the original song (Option A). A lower bit rate reduces the file size but can also degrade the sound quality, as fewer voltage steps are being recorded, which means a less accurate representation of the sound wave. Lossless compression (Option C) would not reduce the sound quality because all the original data is preserved. Saving the song with more bits per second (Option B) would typically improve or maintain quality, not reduce it. Transferring a file on the same computer does not degrade its quality, so Option D is incorrect.

Bit rate is a key factor in determining the fidelity of a digitally recorded sound. If the bit rate is reduced too much, the quality may suffer to a point where it is noticeable to the listener. However, for many listeners, especially when played on basic entry-level speakers or mobile devices, the difference in quality between high and low bit rate files is not significant.

Audio formats like MP3 use compression to reduce file size by using strategies such as discarding data that may not significantly affect sound quality for human ears. Contrastingly, formats such as WAV typically do not compress or only use lossless compression, thus maintaining higher sound quality but resulting in larger file sizes.

"A software package developed to handle information requirements for a specific type of business is called a horizontal application"a. true.b. false.

Answers

Answer:

false.

Explanation:

false.

A horizontal application is defined as any programme that covers a wide number of customers with various sets of skills and expertise. Since application like horizontal types can cover different sectors and can be useful in a number of industries and moreover these application are not area specific or market specific application.

Which of the following is false? A. The last element of an array has position number one less than the array size. B. The position number contained within square brackets is called a subscript. C. A subscript cannot be an expression. D. All of these.

Answers

Answer:

C.A subscript cannot be an expression

Explanation:

The option C (A subscript cannot be an expression) is false

The false statement is a subscript that cannot be an expression. The correct option is C.

What is subscript?

An integer, real, complex, logical, or byte expression is a subscript expression. It must be an integer expression, according to the FORTRAN Standard.

Subscript is most typically encountered in chemical formulations, where the text right below the surrounding text specifies the number of atoms required to create the formula. H₂O, the chemical symbol for water, is a very typical example.

Writing can be described as any standard system of marks or signs that expresses a language's utterances. Language becomes visible through writing. Writing, unlike speech, is concrete and, by comparison, permanent.

Therefore, the correct option is C. A subscript cannot be an expression.

To learn more about subscripts, refer to the link:

https://brainly.com/question/28083256

#SPJ5

Which browser should you choose if you want speed, synchronization with other computers and accounts, and a simple interface?

Answers

Answer:

chrome!!!!!!!!!!!!!!

Explanation:

dont use firefox

A junior network administrator tells you that he can ping a DNS server successfully using its IP address, but he has not tested domain name lookups. What utility on the command line would you suggest your colleague use next?
a.tracerouteb.nbtstatc.ipconfigd.nslookup

Answers

Answer:

I would suggest "nslookup" utility on command line.

Explanation:

nslookup is a network administration command line tool and it is aimed for querying the Domain Name System to get domain name.

The nslookup command queries DNS servers and shows information about any DNS records.

Therefore, to test domain name lookups, one should use nslookup command.

Assume that you have created a class named Dog that contains a data field named weight and an instance method named setWeight(). Further assume that the setWeight() method accepts a numeric parameter named weight. Which of the following statements correctly sets a Dog's weight within the setWeight() method?a. weight = weight
b. this.weight = this.weight
c. weight = this.weight
d. this.weight = weight

Answers

Answer:

D) this.weight = weight

Explanation:

since a constructor call in java sets the initial value for variable, using the this.

in this way, refers to the current object in a method or constructor.

SONET: is a standard for optical transmission that currently operates at Terabit per second speeds is almost identical to the ITU-T standard, synchronous digital hierarchy (SDH) uses existing copper cabling and the PSTN network refers to Sprint Overall Network is not currently available, even in large cities

Answers

Answer:

The correct option to the following question is an option (B).

Explanation:

SONET is also known as the Synchronous Optical Network which is the optical fiber that is used to establishes digital communication and it is also the transmission system, it was evolved in the 1980's by the Bellcore in United States.

It is the subset of SDH and SDH is also known as the  Synchronous Digital Hierarchy that is used for the transmission and transport the communication signals

The statement print(words[len(words)]) will raise an exception. What should be placed in the blank so that this exception will be caught and the error message will be displayed?
A,B,C,D?

Answers

The answer D.

Put the except IndexError to catch IndexError which gets raised when the statement gets executed.

Personal Area Network (PAN--
provides communication over a short distance that is intended for use with devices that are owned and operated by a single user);
Wireless LAN (WLAN--
a local area network that uses radio signals to transmit and receive data over distances of a few hundred feet);
Wireless MAN
(WMAN--a metropolitan area network that uses radio signals to transmit and receive data); and
Wireless WAN (WWAN--
a wide area network that uses radio signals to transmit and receive data

Answers

Answer:

All of given terms are Categories of Wireless networks.

Explanation:

Wireless networks as obvious from name are the networks having no means of physical medium such as cords, wires or cables. This gives the advantage of mobility and extension of the applications to different parts of building, block and even anywhere in word. Wireless network can be divided into four basic categories in order to differentiate between there quality and range:

                     Category                                                           Coverage

Wireless Personal Area Network (WPAN)          |   Within One personWireless Local Area Networks (WLAN)               |    Within a buildingWireless Metropolitan Area Networks (WMAN)  |   Within a cityWireless Wide Area Networks (WWAN)              |     Worldwide

     

i hope it will help you!

Assume the int variable value has been initialized to a positive integer. Write a while loop that prints all of the positive divisors of value. For example,if values is 28, it prints divisors of28: 1 2 4 7 14 28

Answers

Answer:

The program to this question can be given as:

Program:

#include <iostream>//header file.

using namespace std; //using namespace

int main() //main function.

{

int value=28, x=1; //define variable.

cout<<"divisors of "<< value <<":"; //print value.

while (x <= value) //loop

{

if ((value % x) ==0) //if block

cout<<" "<<x; //print value

x++; //increment value.

}

return 0;

}

Output:

divisors of 28: 1 2 4 7 14 28

Explanation:

The description of the above c++ program can be given as:

In this program firstly we include a header file. Then we define a main method. In this method we define a variables that is "value and x" and assign a value that is "28 and 1". The variable "x" is used to calculate the value of divisors and print its values and then we print the value variable value. Then we define a while loop. It is an entry control loop in this loop, we check the condition that the variable x is less than equal to value. In this loop, we use a conditional statement. In the if block we define condition that is variable value modular variable x is equal to 0. if this condition is true it will print the value and increment value of variable x. When variable x is greater than and equal to value variable it will terminate the loop and print the value.

So, the output of this program is "1 2 4 7 14 28".

Write a method, makeSubjectLine, that gets a String argument and returns the same String but with "Subject: " in front of it. So if the argument is "Are you going to the show?" the method returns "Subject: Are you going to the show?".

Answers

Answer:

public class newass {

   /*

   Write a method, makeSubjectLine, that gets a String argument and returns the same String but with "Subject: " in front

   of it. So if the argument is "Are you going to the show?" the method returns "Subject: Are you going to the show?".

    */

   public static void main(String[] args) {

       System.out.println(makeSubjectLine("Are you going to the show?"));

   }

   public static String makeSubjectLine(String subj){

       return "Subject: "+subj;

   }

}

Explanation:

The solution in Java Programming Language

When Shelly downloaded an arcade game from an unknown Internet Web site, an unauthorized connection unknown to Shelly was established with her computer. The arcade game is most likely to be ________. A. adware B. a Trojan horse C. spyware D. encryption E. a worm.

Answers

Answer:

B. a Trojan horse

Explanation:

A Trojan Horse is a malware that disguises itself as a legitimate code or software. In this scenario, Shelly downloaded what she thought was an arcade game. When the file is executed, it gives the attacker remote access to the affected computer allowing them to steal and access sensitive information on the user's computer This type of Trojan Horse malware is specifically known as a Remote Access Trojan (RAT).

Which of the following is an advantage of using CSS? (choose all that apply)
-more than one HTML page in a website can use the same CSS file
-global style changes to a website can be made by editing the CSS
-new content can be written and updated to a web page automatically using CSS
-different CSS files can be used to enable a page to display well on different devices

*Answers: A, B, D

Answers

Answer:

Correct answers are option 1,2,4.

Explanation:

One css file can be reused in multiple html files to save time for similar html code.If css file is imported globally in html file it can be really useful to make design changes to the website just by changing the global css file. All the changes made in that file would be reflected in all html files where that particular stylesheet is included.

While importing a stylesheet one can link multiple stylesheets with multiple screen size so that for a particular screen size a particular stylesheet is loaded

Answer:

A, B, D

Explanation:

Just took the question and they are all right

A propaganda agent can manage multiple online personalities, posting to many different _____________. A. Bulletin boards and email accounts B. Bulletin boards and discussion groups C. Discussion groups and email accounts D. Financial websites

Answers

Answer: B) Bulletin boards and discussion groups

Explanation:

Propaganda agent is a person who is representative that has the information and topic for influencing and manipulating the thoughts of audiences or public through communication.The topic is raised as agenda in front of public to mislead them or raise political view.

According to question's situation,  propaganda agent can manage online personalities by publicizing it through bulletin board and discussion group to display topic or agenda and having conversation can happen in groups respectively.

Other options are incorrect because email accounts are used for mailing people rather than raising issue.Financial websites are used for finance-related help and topics.

Thus, the correct option is option(B).

Final answer:

A propaganda agent can manage multiple online personalities, posting to bulletin boards and discussion groups. These platforms are key for spreading messages to a wide audience, making B the correct answer.

Explanation:

A propaganda agent can manage multiple online personalities, posting to many different bulletin boards and discussion groups. The correct answer to the question is B. Bulletin boards and discussion groups. These platforms are extensively used for communication and dissemination of information, including political messages and propaganda. Online spaces like bulletin boards, discussion groups, and social media sites provide vital venues for individuals or entities looking to spread their messages quickly and to a wide audience. As noted in various examples, political campaigns and interest groups have turned to the Internet and these platforms for communicating with potential supporters, organizing events, and influencing public opinion.

Assume that an int variable counter has already been declared. Assume further a variable counterPointer of type "pointer to int" has also already been declared. Write a statement that makes counterPointer "point" to counter.

Answers

Answer:

Following are the statement:

counterPointer = &counter;

Explanation:

The following statement is correct because in the question it is given that there is an integer data type variable i.e., "counter" and there is another integer data type pointer variable i.e., "counterPointer" and finally we write a statement in which the pointer variable points to the integer variable.

To point the 'counterPointer' to 'counter', assign the address of 'counter' to 'counterPointer' using the address-of operator (&) in the form: counterPointer = &counter;.

To make a pointer called counterPointer point to an int variable called counter, use the address-of operator (&) to get the address of counter and then assign that address to counterPointer. The statement to do this in C or C++ would be:

counterPointer = &counter;

This line tells the compiler to store the memory address of counter in the pointer counterPointer. Pointers are used to directly access and manipulate the memory allocated to variables, which can be more efficient or necessary for certain programming scenarios.

Your computer displays the error message ""A disk read error occurred."" You try to boot from the Windows setup DVD and you get the same error. What is most likely the problem? Group of answer choices

Answers

Answer:

The answer to this question is "The boot system order is placed before the optical drive to boot from the hard drive".

Explanation:

In the question, it is defined that a computer displays an error message that is "A disk read error occurred" to solve this error firstly we boot the machine, that requests to launch the HDD process that placed before the DVD drive. For boot the machine we press function keys that are (F1 to F12).To use this process the error message problem will solve automatically.

Byron wants to use Quick Parts to insert reusable content into a company Word document. Where will he access this option? Design tab Insert tab Home tab Review tab

Answers

Answer:

Insert tab

Explanation:

To use Quick Parts, first go to Insert tab then text group. The icon of Quick Parts is there in the attached picture.You can use the Quick Part Gallery to create, store, and reuse pieces of content, including AutoText, document properties (such as title and author), and fields. These reusable blocks of content are also called building blocks. AutoText is a common type of building block that stores text and graphics. You can use the Building Blocks Organizer to find or edit a building block

Answer:

The correct answer is the option B: Insert Tab.

Explanation:

First of all, the feature of Quick Parts inside Microsoft's Word Office introduced in 2007 allows the user to create a library of content that the person commonly uses and then permits him to use that content everytime he needs instead of creating it again, therefore the content stays permanent.

Secondly, if the person wants to use this feature then he needs to first press Insert Tab in the Word's menu tool and then go the part of text group, in there the person will find the Quick Parts feature in the highest icon in the middle of the text group. Byron will find this feature very usefull due to the fact that it will allow him to create, store and reuse the content he wants everytime he needs into a company Word document.

In the implementation of the getMax() function in the PriQueue class, we need to read and write the variables "front" and "rear", which are defined as protected members in the base class Queue. Are the functions in the derived class allowed to access the protected members in the base class?

Answers

Answer:

The answer to the given question is "yes".

Explanation:

In the programming language, Protected is a keyword that is used as an access modifier by using protected members we only access within the same class and it also provides access to use this member in the derived class that is inherited by derived class from the base class.

That's why the answer to this question is "yes".

A ____ is a group of preset settings for controlling how color will appear on the screen and in a printed document.a.swatch profileb.swatch listc.color directord.color profile

Answers

Answer:

Option (D) i.e., color profile is the correct answer to the following question

Explanation:

A color profile is that color which we are clicked from our photo camera and then it will display on our screen and the extension of the color is .ICM or .ICC.

Steps to create a color profile:

Firstly, click on the Start menu.Then, you have search for the Color Management.Then, you have to select the Device tab.Then, you click on the check box which appear on the top.Then, click on Add.Then, a page appears than click on the Browse.Then, you have browse that folder which has that color profile.Then, you have to click on .icm or .icc file, click on ADD.Finally, you have to close that window.

Final answer:

A color profile is a set of predefined settings that controls color representation on screens and in printed materials, based on models like RGB and CMYK. It ensures consistency and accuracy of colors across different mediums.

Explanation:

A color profile is a group of preset settings for controlling how color will appear on the screen and in a printed document. This is crucial in fields such as digital imaging and graphic design, as it ensures that colors are consistent across different devices and media. Color profiles are based on color models such as RGB (Red, Green, Blue) for screens and CMYK (Cyan, Magenta, Yellow, Black) for print.

The primary colors, or hues, are red, yellow, and blue, and through various combinations and adjustments, a wide spectrum of colors can be created. The use of a color wheel, developed by Isaac Newton, is a basic tool for understanding color relationships. Furthermore, adjustments in hue, value, saturation, shade, and tint can be finely tuned within these profiles to convey specific meanings or aesthetics, ensuring the color alignment meets contrast and visibility standards.

Which one of the following is the correct code snippet for calculating the largest value in an integer array list aList?
a. int max = aList.get(0); for (int count = 1; count < aList.size(); count++) { if (aList.get(count) > max) { max = aList.get(count); } }
b. int max = 0; for (int count = 1; count < aList.size(); count++) { if (aList.get(count) > max) { max = aList.get(count); } }
c. int max = aList.get(0); for (int count = 1; count > aList.size();count++) { if (aList.get(count) >= max) { max = aList.get(count); } }
d. int max = aList[1]; for (int count = 1; count < aList.size();count++) { if (aList.get(count) > max) { max = aList.get(count); } }

Answers

Answer:

Option a.  int max = aList.get(0); for (int count = 1; count < aList.size(); count++) { if (aList.get(count) > max) { max = aList.get(count); } }

is the correct code snippet.

Explanation:

Following is given the explanation for the code snippet to find largest value in an integer array list aList.

From the array list aList, very first element having index 0 will be stored in the variable max (having data type int).By using for starting from count =1 to count = size of array (aList), we will compare each element of the array with first element of the array.If any of the checked element get greater from the first element, it gets replaced in the variable max and the count is increased by 1 so that the next element may be checked. When the loop will end, the variable max will have the greatest value from the array aList.

i hope it will help you!

When computer criminals launch an intentional attack in which servers are flooded with millions of bogus service requests that so occupy the server that it cannot service legitimate​ requests, it is called a​ ________ attack.

Answers

Answer:

"Denial of service" is the correct answer to the following statement.

Explanation:

DoS attack is that type of cyberattack in which an individual system or an internet connection to the different fakes services which target the resources of the system and it is an illegal act according to 'Computer Misuse Act' which comes in 1990's.

It is an attack which is done by the computer terrorists, they can mostly flood the severals of the fake services in the intention of theft privacy and resources from the system.

DOS was the most common operating system for Microsoft-based computers before the introduction of Windows. DOS required the user to type instructions into the computer through an interface system known as command line. From an HCT point of view, how does the Windows operating system compare to its predecessor DOS?

Answers

Answer:

Windows has GUI, where its predecessor DOS does not.

Explanation:

DOS required the user to type instructions into the computer through an interface system known as command line.

Windows has graphical user Interface (GUI), that allows commands in a more user friendly environment than DOS.

Answer:

Windows has GUI, where its predecessor DOS does not.

Explanation:

DOS required the user to type instructions into the computer through an interface system known as command line.

Windows has graphical user Interface (GUI), that allows commands in a more user friendly environment than DOS.

_________ is a feature of all modern browsers that will delete your history, cache, and cookies the moment you close the private window. Private browsing Do not track Anonymity Automation

Answers

Answer:

"Private browsing" is the correct answer to the following question.

Explanation:

Private browsing is the private mode, if the person works on the private browsing then its information would not be stored in the browser which means his the record of your would not store in the browser that is completely private to the other persons but his ISP is always recorded if you are browsing private or not.

The other name of private mode is the incognito mode which is available in all the browsers in one of these two names.

"Private browsing" is the correct answer to the following question.

Explanation:

Private browsing is the private mode, if the person works on the private browsing then its information would not be stored in the browser which means his the record of your would not store in the browser that is completely private to the other persons but his ISP is always recorded if you are browsing private or not.

The other name of private mode is the incognito mode which is available in all the browsers in one of these two names.

An organization has a website with a guest book feature, where visitors to the web site can input their names and comments about the organization. Each time the guest book web page loads, a message box is prompted with the message "You have been P0wnd" followed by redirection to a different website. Analysis reveals that the no input validation or output encoding is being performed in the web application. This is the basis for the following type of attack?A. Denial of ServiceB. Cross-site Scripting (XSS)C. Malicious File ExecutionD. Injection Flaws

Answers

Answer:

B

Explanation:

Answer:

C: Malicious File Execution

Explanation:

An emmbedded file in the Landing page of the website cause the page to be automatically redirected to another source, the new page loads automatically, malicious execution of the webpage redirects the new site to another link, and makes such traffic meant for the site to be automatically turned to another website.

What method is overridden by the Exception class in order to provide a descriptive error message and provide a user with precise information about the nature of any Exception that is thrown?

Answers

Answer:

toString() is the correct answer to the following question.

Explanation:

ToString() function is the built in function that is used to convert the number into the string.

For example:

int n=25

var s=n.toString()

Here, we define an integer data type variable "n" and assign value to "25" then, we define the string data type variable "s" and assign n.toString() to convert number into string.

A technician is configuring a new SOHO multifunction wireless router at a customer’s location to provide network access to several wireless devices. The technician is required to protect the customer’s private network from unauthorized access while performing the initial router setup as well as during normal operation after the configuration is completed.
A. DMZB. DHCPC. ARPD. SSIDE. MAC filtering

Answers

Answer:

E. MAC filtering

Explanation:

Based on the information provided within the question it can be said that the tool that the technician must use is MAC filtering. This is a networking tool that is a security access control method, in which you can see and control the network cards that have access to the network. This would allow the technician to protect the customer's private network during and after setup.

Refer to the exhibit. A network administrator configures a named ACL on the router. Why is there no output displayed when the show command is issued?

Answers

Answer:

The correct answer to the following question is ACL name is the case sensitive.

Explanation:

ACL name is unique, alphanumeric and case sensitive that's why the router deals like the access_network, the ACCESS_NETWORK as it if they are the two separates ACL's.

That's why ACL always has the unique identities.

Mailbox protocols do not include: A. Simple Mail Transfer Protocol (SMTP) B. Post Office Protocol 3 (POP3) C. Internet Message Access Protocol (IMAP) D. Internet Control Message Protocol (ICMP)

Answers

Mailbox protocols do not include: Internet Control Message Protocol (ICMP)

D. Internet Control Message Protocol (ICMP)

Explanation:

For email accounts to receive emails, end user has three type configurations.  The configurations are done based on web service provider where the domain is hosted.

The following are three configurations to receive email for end user in their MS outlook or lotus dominos.

1. SMTP: - it configures to send mail to others.

2. POP3:- it is configure to receive mail from others.

3. IMAP: - some web services use these services to receive mail from others and sent to others.

We need to necessary settings in MS-outlook or lotus dominos.

The master production schedule for Product A shows a need for 30 units, and Product B shows a need of 25 units. To manufacture a unit of Product A, three units of component C are required. To manufacture a unit of Product B, four units of component C are required. Determine the gross requirements for component C to complete production.

Answers

Answer:

the amount of C required is 190 units of C

Explanation:

the amount of C to cover the necessity of product A is

Ca = A units required * number of C units to manufacture a unit of A

Ca = 30 unit of A * 3 units of C/ unit of A =90 units of C

to produce B the same applies

Cb = B units required * number of C units to manufacture a unit of B

Cb = 25 unit of B * 4 units of C/ unit of B =100 units of C

therefore to cover the necessities of A and also B we will need:

total units of C required = units of C to produce A + units of C to produce B

C = Ca + Cb = 90 units of C + 100 units of C = 190 units of C

C= 190 units of C

A website that allows a company to share information in order to increase customers' know-ledge about its products, create a conversation between the firm and consumers, and provide an active forum for testing new ideas is a:

Answers

Answer:

Blog is the correct answer to the following question.

Explanation:

A website that is created to share the information of the companies or the organisations to increase the knowledge of their customers related to the companies services and goods.

In other words, a blog is a type of website but not a full website in which the new content is updated in a daily manner but the nature of the website is the static where the contents is stored in the different pages and also they are not updated in a daily manner.

Other Questions
a. Find PR in the diagram b. Find the perimeter of quadrilateral PQRS A chemist prepares a solution of silver(I) nitrate (AgNO3) by measuring out 269. micromol of silver(I) nitrate into a 300. mL volumetric flask and filling the flask to the mark with water. Calculate the concentration in mmol/L of the chemist's silver(I) nitrate solution. Be sure your answer has the correct number of significant digits. Horner Construction Co. uses the percentage-of-completion method. In 2014, Horner began work on a contract for $16,500,000; it was completed in 2015. The following cost data pertain to this contract : Year ended December 31 2014 2015 Costs incurred during the year $5,850,000 $4,200,000 Estimated costs to complete at the end of year 3,900,000 If the completed-contract method of accounting was used, the amount of gross profit to be recognized for years 2014 and 2015 would be ____________? Thirst, a beverage manufacturer, markets its products using the same strategy worldwide. However, changes are made when implementing the strategy to reflect an essence of the local culture, such as the ethnicity of the people in their ads and the music used in jingles. This is an example of __________. PLEASE HELP! 100 POINTS!!+ BRAINLIEST!!Two wires help support a pole. The wire at point A forms an angle of 54 with the ground and the wire at point B forms an angle of 72 with the ground. The distance between the wires on the ground is 23 m. Find the height of the pole to the nearest tenth of a meter. Do you agree with Thomas Jeffersons belief that building the Erie Canal was little short of madness for the time? Why or why not? Tamsin has been asked by the mayor of her city to write content for a brochure, which will make people realize why carpooling is a better option than everyone driving individually. What kind of a brochure would Tamsin have to write, and why? The hypotenuse of a right triangle has one end at the origin and one end on the curve y = x 2 e 3x , with x 0. One of the other two sides is on the x-axis, the other side is parallel to the y-axis. Find the maximum area of such a triangle. At what x-value does it occur? please help me!!!!!!!!!!!!!!!! CASE STUDY: THE POWER OF NON-VERBAL COMMUNICATIONExperts contend that somewhere between half and up to 80% of all interpersonal communication is non-verbal. Theres no doubt, non-verbal communication is impact, and can make or break a message. This type of communication goes far beyond simply lacking the spoken word. Its hand gestures, eye contact, posture, body movement, and the way we tilt or nod our heads. Its how we present ourselves and how audiences receive us. Non-verbal communication plays an important role in conveying intended and unintended messages, so its important to take it seriously and get it right. Students of communications study numerous examples of non-verbal communication, including noteworthy moments in history where our learning in this area grew. Consider the famous 1960 Nixon-Kennedy debate, the first of its kind to be televised. Up to this point, campaigners gave live speeches, spoke on radio, or appeared often edited in print. Most Americans didnt see candidates outside of a still photo. In the Nixon-Kennedy debate, Nixons non-verbal communications did not match the intelligence or intent of his message. His facial expressions were dour. He appeared pale and sweaty from a recent hospitalization. He didnt have a confident stance or posture. By contrast, Kennedy appeared calm, friendly, and confident. Both verbalized articulate messages to the 74 million people who watched the debate. Kennedy won the election by a narrow margin, and many historians attribute his win to this particular debate.QUESTION:1: how do you respond to non-verbal communication? What are the main factors needed to be careful on non verbal communication. jessie has n dollars in his bank account. he deposits $132 write an expression that represents the total amount jessie now has in hi account 3(x^2 + 5)(x^2 - 5) multiply and simplify. Emparejar Match the adjectives with their sentences. Es invierno y la ventana est . Cuando Marcos habla en pblico, est . Camila estudia todo el tiempo. Est para el examen. Juan no quiere llevar a Julia al cine. Ella est . El hotel tiene cien huspedes. Est During the 1960s in the United States, many males were faced with the choice of going to Vietnam and fighting in a war they did not believe in, or deserting, an act that meant giving up personal freedom. This was an example of a(n) _______ conflict.A) approach-avoidanceB) approach-approachC) avoidance-avoidanceD) double avoidance-approach 1 : Is the following sentence in Active or Passive voice?The hamster can be kept in a cage2 : Is the following sentence written in Active or Passive voice?The police didn't find the robber last week.3 : Is the following sentence written in Active or Passive voice?The search will be stopped because of the storm.4 : Is the following question written in the Active or Passive voice?The train is going to arrive late.5 : Is the following sentence in Passive or Active voice?The friends have been looking forward to meeting her.6 : Is the following sentence written in the Active or Passive voice?The report must be completed by next Friday. Two people with a combined mass of 127 kg hop into an old car with worn-out shock absorbers. This causes the springs to compress by 9.10 cm. When the car hits a bump in the road, it oscillates up and down with a period of 1.66 s. Find the total load supported by the springs. 9 / 372 what is what is 9 / 372 Two new mathematics learning techniques are being tested. The researchers are unsure which one, if any, will be better. Two hundred students were randomly selected from a population. Ninety of them were randomly assigned to use Technique A, and 110 of them were randomly assigned to use Technique BEach student spent 30 minutes learning the technique to which they were assigned, and then were asked to complete a task. The time to complete the task was recorded, in seconds. A shorter time indicates better mastery ofthe task. The data are below:Technique A: sample average = 26.1, sample SD = 7.2Technique B: sample average = 27.9, sample SD = 12.4(a) State hypotheses relevant to the research question.(b) Perform a test of the hypotheses from (a) using a significance level of 10%. Make sure to compute the test statistic and P-value, and make a conclusion in context. The monthly utility bills in a city are normally distributed with a mean of $121 and a standard deviation of $23. Find the probability that a randomly selected utility bill is between $110 and $130. Jordan drove from his home to his new college. He drove 150 miles in 2.5 hours. What was his average speed, in miles per hour