Sharon has received the volleyball season schedule from her coach via e-mail. She wants to send the same e-mail to her family members so that they know when her team is playing. Which e-mail activity should Sharon perform to send a copy of the e-mail to her family members?
a. Forward
b. Blind Copy
c. Reply
d. Reply All

Answers

Answer 1

Answer:

a. Forward

Explanation:

There are many terms in an e-mail. The few are described below:

Forward: if you have received an email and you want to send the same email to another person, then this task is known as email forwarding.

Blind copy: when a user wants to send the same email to many people at once but don't want that receiver to know who else is getting the email. this task is termed as a blind copy.

Reply: when a user receives an email and wants to respond to the sender of the email can be termed as reply task.

Reply all: when a user receives an email in a group and wants to respond not only sender but to all the users in the group, it is known as the reply all task in email.

so according to the scenario  (a), Forward is the correct answer.  


Related Questions

While working alone at their constant rates computer X can process 240 files in 4 hours, and comp Y 240 files in 8 hrs. If all files processed by these comp. are the same size how long would it take the two comp. working at the same time at their respective constant rates , to process a total of 240 files?
A. 2hrs
B. 2hrs 20 min
C. 2hrs 40 min
D. 6hrs
E. 6hrs 20 min

Answers

Answer:

2hrs 40 min

Explanation:

Answer: c) 2hrs 40 min

Explanation:

Rate of working of Computer X is = 240 files/ (4 × 60min)

= 1 file / min

Rate of working of Computer Y is = 240files/ (8×60min)

= 0.5 file/min

The combined rate for computer X & Y is = 1 + 0.5 = 1.5 file/ mins.

Therefore, time taken to process 240 files is = 240/1.5

= 160mins

= 2hrs 40mins

Unit testing:_________. A. provides the final certification that the system is ready to be used in a production setting. B. includes all the preparations for the series of tests to be performed on the system. C. tests each individual program separately. D. tests the functioning of the system as a whole in order to determine if discrete modules will function together as planned.

Answers

Answer:

Option (C) is the correct option to the following question.

Explanation:

The following option is correct because the unit testing is the process of testing a single unit of software at a time, which means the testing of each and every program separately.

In simple words, Unit testing a process of testing in which the developer executes the single method or a function, statements or loop in the program of the software to checking is it working fine or not.

A slide can have which of the following?

A) more than one title text box
B) more than one text box
C) text box and drawing objects
D) all of these

Answers

Answer:

D all of them mofos

Explanation:

Final answer:

A slide in presentation software can include more than one title text box, multiple text boxes, drawing objects, and essentially all of these options combined. Presentation tools are designed to be flexible, allowing for a diverse range of content to be incorporated into each slide. Thus, the correct answer is D) all of these.

Explanation:

The question posed is about the capabilities and features of a slide in a presentation software, such as PowerPoint. It asks which of the following a slide can have: A) more than one title text box, B) more than one text box, C) a text box and drawing objects, or D) all of these. In presentation software, slides are highly customizable. Users can add multiple text boxes, including more than one title text box if they choose, although typically a single title is used for simplicity and clarity. Slides can also incorporate various drawing objects such as shapes, lines, and more.

Furthermore, placeholders in slides allow for the inclusion of not just text but also graphics, tables, charts, videos, and more. This versatility supports the creation of dynamic and informative presentations tailored to the presenter's needs. It's important to understand that presentation software is designed to be flexible, catering to a wide range of content types and presentation styles. The ability to include text boxes, drawing objects, and other elements in a single slide makes it a powerful tool for communicating ideas effectively.

Assume the class BankAccount has been created, and the following statement correctly creates an instance of the class:
BankAccount account = new BankAccount(5000.0);
What is TRUE about the following statement?
System.out.println(account);

a. The account object's toString method will be implicitly called.
b. A compiler error will occur.
c. The method will display unreadable binary data on the screen.
d. A runtime error will occur.

Answers

Answer:

C

Explanation:

All Java objects have a toString() method, which is invoked when you try to print an object. The output will be some unreadable binary data because the toString method of the object has not explicitly define in our BankAccount class. To get a readable text as output, the toString method of our BankAccount class need to be over ride.

Adding the below snippet to the BankAccount class will yield a readable output.  

@Override

 public String toString() {

   return nameOfField;

   // nameOfField is the name of field defined in BankAccount class which is passed as parameter when creating an instance of the object.

 }

The ________ phase is a technical blueprint for a whole system which captures all aspects of how the system's components will function together to accomplish goals, using descriptions, diagrams, and models.

Answers

Answer:

design

Explanation:

At the design phase you consider potential solutions and conceptualize the choices and how to construct the solution in an effective and efficient way. The Design Phase, in the end, answers "how" you will build the solution.

As an outcome of the design phase, you will have a defined solution. The solution is explained using descriptions, diagrams, and models.

"The system design specification is a document that presents the complete design for a new information system, along with _____ for completing the next SDLC phase — systems implementation"

Answers

Answer:

The answer to the given question is "detailed costs ".

Explanation:

SDLC stands for System development life cycle. It is also known as the Software development life cycle. In SDLC 7 phases are "Planning, Analysis, Design, Development, Testing, Deployment, Maintenance." The detailed cost is a part of the SDLC phases.

In the detailed cost, we calculate the total cost for making software. Then we go to the next phase that is the implementation state. It is also known as the "development state".

Two non-negative integers x and y are equal if either: Both are 0, or x-1 and y-1 are equal Write a boolean-method named equals that recursively determines whether its two int parameters are equal and returns true if they are and false otherwise.

Answers

Answer:

Following are the code which is mention below.

bool equals (int x, int y)  // method equals

{

if( (x<0) || (y<0) )  // check number if it is less then 0

return false;  // return false

if( (x==0) && (y==0) )  // check condition if number is equal to 0

return true;  // return true

return equals(x-1, y-1);  

}

Explanation:

Here we declared a function "equals" of type bool which means it either return "true" or "false".Inside the function equals we check the condition which are mention above

                   1.   if x and y both are less then  0 then it returns "false".

                   2.  if x and y both are equal to 0 then it returns "true"

                   3.   Otherwise it return x-1 and y-1.

Member function definitions: ______________.a. Always require the binary scope operator (::)b. Require the binary scope operator only when being defined outside of the definition of their class c. Can use the binary scope operator anywhere, but become public functions d. Must use the binary scope operator in their function prototype

Answers

Answer:

Option (B) is the correct answer to the following questions.

Explanation:

The following option is correct because the binary scope operator is used to define the global variable only when the local variable has also the same name and we want to use global variable also or we also use scope operate when we do not want to use any function inside the class.

The following option (A) is wrong because we not always required binary scope operator and the option (C) is wrong because we cannot use the scope operator anywhere and the option (d) is already wrong because that binary scope operator would not be used in the function prototype.

An electronic​ _____ is a computer program or an electronic or other automated means used independently to initiate an action or respond to electronic records or performances in whole or in​ part, without review or action by an individual.

Answers

Answer:

An electronic​ agent is a computer program or an electronic or other automated means used independently to initiate an action or respond to electronic records or performances in whole or in​ part, without review or action by an individual.

Explanation:

By above explanation, we know that an electronic agent can be defined as a non-living operator that performs different kind of tasks assigned to it. Directly we can take it as  robots or  softbots that are designed on software basis and today are common in many ways.

Different kind of machinery such as serving robots, automated machinery all lie under the category of electronic agent that may also me termed as software agents or intelligence agents.

i hope it will help you!

A satisfactory radiograph of the abdomen was made at a 42-inch SID using 300 mA, 0.06-second exposure, and 80 kVp. If the distance is changed to 38 inches, what new exposure time would be required?

Answers

Answer:

the new exposure time would be 0.049 seconds

Step-by-step answer:

Given that:

Distance 1 = D1 = 42 inch

Current = 300 mA

Time 1 = T1 = 0.06 seconds

Max voltage = 80 kVp

Distance 2 = D2 = 38 inches

Time 2 = T2 = ?

Inverse square law states that:

The intensity of radiation becomes weaker as it spreads out from the source since the same about of radiation becomes spread over a larger area.  The intensity is inversely proportional to the distance from the source.

Mathematically,

I1/ I2 = D1^2/ D2^2  ------------ eq1

Intensity 1 = I1 = Current * time = 300 * 0.06 = 18 mAs

Let Intensity 2 as I2

Putting values in eq1

18/ I2 = (42)^2/(38)^2

By simplifying:

18/ I 2 = 1764/1444

By cross multiplying we get:

1764 * I2 = 25,992

Dividing both sides by 1764 we get:

Intensity 2 = I2 = 14.7 mAs

Now we will find exposure time.

We know that:

Intensity = Current * Time

As Intensity 2 = 14.7 , Current = 300 mA and time is T2

So by putting values:

14.7 = 300 * T2

By simplifying,

T2 = 0.049 seconds

So the new exposure time required would be 0.049

i hope it will help you!

Timur was making a presentation regarding how attackers break passwords. His presentation demonstrated the attack technique that is the slowest yet most thorough attack that is used against passwords. Which of these password attacks did he demonstrate?
A. Dictionary attack
B. Hybrid attack
C. Custom attack
D. Brute force attack

Answers

Answer:

D. Brute force attack

Explanation:

A Brute Force Attack is the fastest way of accessing a website or database (or whatsoever secured by a password). It attempts repeatedly different combinations of usernames and passwords till it breaks in.

This repeated behavior is just like an enemy that attacks a fort.

Optionally, using a key derivation function, the attacker can try to guess the key generally created from the password. This is known as an exhaustive key search.

A forensic investigator at a crime lab is performing a forensic analysis of a hard drive that was brought in by state troopers. They make a mistake by using the wrong forensic tool during their forensics examination. What should the investigator do?
a. Document the mistake and workaround the problem.
b. Document the mistake and press on with remaining tasks.
c. Disclose the mistake and assess another area of the hard drive.
d. Disclose the mistake and preserve the chain of custody.

Answers

Answer:

a. Document the mistake and workaround the problem.

Explanation:

The forensic investigation is mainly used to collect and analyze the evidence of a crime, which helps in search of a suspect.

The forensic investigator's main purpose is to find the most important evidence by thorough workout on fingerprints, blood, computer, etc of a crime to help to find a suspect.

It is a detail inspection of the crime scenes which come into some result so that the correct decision should be made

So, according to the given options, the most appropriate one is option a.

Adobe Acrobat reader is free. Adobe does this to build a market for the sale of software that creates Acrobat files. This is an example of: (pick all that apply)
a. firms taking advantage of complementary products developed for a prior generation of technology.
b. firms giving away products for half of a two-sided market.
c. firms spreading costs across increasing units of production or in serving multiple customers.
d. seeding the market. on market attempting to conquer a new market by making it a subset, component, or feature of its primary offering.

Answers

Answer:

The correct option to the following question is an option (D).

Explanation:

The latest version of the Adobe Acrobat reader is Adobe Acrobat Reader DC which is the best pdf reader or viewer and this software is available free on the website of the acrobat with license.

Adobe Acrobat reader is only used in reade and view the pdf file if we want to edit those file then we have to purchase them.

Options b. firms giving away products for half of a two-sided market, and d. seeding the market. on market attempting to conquer a new market by making it a subset, component, or feature of its primary offering, clearly define Adobe's strategy in building a market for their premium products through the widespread usage of the free Acrobat Reader.

The strategy of offering the Adobe Acrobat Reader for free while charging for Adobe Acrobat software, which creates PDF files, demonstrates several business tactics:

Firms giving away products for half of a two-sided market: This tactic involves offering one part of a product or service for free to build a user base, which in turn makes the paid part of the market more valuable and appealing.Seeding the market: By providing a free tool, Adobe seeds the market by increasing the usage and familiarity with PDF files, thus driving demand for their paid software needed to create these files.

While options a, c, and the second part of option d don't directly apply in this context, options b and the first part of d clearly define Adobe's strategy in building a market for their premium products through the widespread usage of the free Acrobat Reader.

// This program uses a bubble sort to arrange an array of integers in // ascending order // PLACE YOUR NAME HERE #include using namespace std; // function prototypes void bubbleSortArray(int[], int); void displayArray(int[], int); const int SIZE = 5; int main() { int values[SIZE] = { 9, 2, 0, 11, 5 }; cout << "The values before the bubble sort is performed are:" << endl; displayArray(values, SIZE); bubbleSortArray(values, SIZE); cout << "The values after the bubble sort is performed are:" << endl; displayArray(values, SIZE); return 0; } //****************************************************************** // displayArray // // task: to print the array // data in: the array to be printed, the array size // data out: none // //******************************************************************

Answers

Answer:

i dont get it; what are we supposed to do here

Explanation:

In client/server computing, the _______ is the computer that provides resources such as user accounts, printer, and others in the network, while the ________ is the computer that uses the resources in the network.

Answers

Answer:

Server provide the resources while client is attached to the server to share the resources

Explanation:

The 'parseInt' method of the 'Integer' class throws a 'NumberFormatException' when it is passed a String argument that it cannot convert to an int. Given the String variable s (which has already been assigned a value), write the code needed to convert the value in s as ________.

Answers

Answer:

new BigInteger(s);

See the explanation

Explanation:

Since "parseInt" throws a 'NumberFormatException"; the best solution will be to use 'BigInteger'. Since 's' is already assigned a value, we can print it out as:

System.out.println(new BigInteger(s));

The BigInteger class might need to be imported to the class using:

import java.math.BigInteger;

The ________ is the main switch station for memory; if the right and left areas are destroyed, the result is widespread amnesia. The ________ is the main switch station for memory; if the right and left areas are destroyed, the result is widespread amnesia. Wernicke's area hypothalamus hippocampus thalamus

Answers

Answer:

The answer is hippocampus.

Explanation:

The ___hippocampus._____ is the main switch station for memory; if the right and left areas are destroyed, the result is widespread amnesia. The __hippocampus.______ is the main switch station for memory; if the right and left areas are destroyed, the result is widespread amnesia.

A junior network administrator tells you that he can ping a DNS server successfully using its IP address, but he has not tested domain name lookups. What utility on the command line would you suggest your colleague use next?

Answers

Answer:

nslookup is the correct answer to the following question.

Explanation:

The following answer is correct because It is the tool or the utility of the command line by which an administrator to query a DNS(Domain Name System) for finding the domain name or the Internet Protocol address or many other records.

Steps to use nslookup:

Firstly, you have to press the window key + R to open run.Then, you have to type cmd in it and press enter.Then, cmd will appear after that, you have to type the command 'nslookup' and then press enter.Then, it shows the default server name and ip address after that, you have to type an ip address of DNS server.Then, you have to type 'set' then type q=M X and then press enterThen, you have to type the name of your domain then, press enter key.

Assume the availability of class named IMath that provides a static method, toThePowerOf which accepts two int arguments and returns the value of the first parameter raised to the power of the second.An int variable cubeSide has already been declared and initialized. Another int variable, cubeVolume, has already been declared.Write a statement that calls toThePowerOf to compute the value of cubeSide raised to the power of 3 and that stores this value in cubeVolume.

Answers

Answer:

cubeVolume = IMath.toThePowerOf(cubeSide, 3);

Explanation:

Following is the explanation for above statement:

Left side:

cubeVolume is a variable with data-type int, it will store the integer value that is the output from right side.

Right side:

IMath is the class name.toThePowerOf is the built-in function that takes two arguments of data type int. First is the base and second is the power(exponent) separated by comma. In place of first argument that is the base variable we will pass the variable cubeSide that has been declared and initialize.Now the output will be stored in the variable cubeVolume.

i hope it will help you!

Raul is setting up an Excel spreadsheet to track how many hours his employees work each day. For the first worker, he has inserted the formula "=(I3-H3)” into cell J3.


Raul needs to see a number of hours but instead he sees a decimal. He knows the employee worked more than 0.35 hours that day. What should Raul do to make J3 show a number of hours?


A. insert “*24” at the end of the formula

B. reformat J3 as a general number

C. insert “HOURS” after the equal sign in the formula

D. change the order of the cells referenced in the formula

Answers

Answer:

The key to solve this number time format in Excel lies in understanding the simple seconds, hour and day calculations together with cell referencing. Cell referencing stands for the cell names where we will be performing our formula.

Explanation:

Numbers in Excel comes in various format. One of the headache from it is Excel often recognize times (x) as a decimal even when we are talking about time or hour. The key to solve this number time format in Excel lies in understanding the simple seconds, hour and day calculations together with cell referencing. Cell referencing stands for the cell names where we will be performing our formula.

The formula that we need to put in to cell J3 should have an idea like this: = (Clocked out - Clocked in) x 24  

You can just use a simple formula by applying subtraction operation using from your clocked out / time out to your clocked in / time in. The answer will be the difference of this two times then you should multiple it to 24 which stands for 24 hours in one day.  

Another thing, you must use the INT function to make sure that our answers in excel will be rounded off to the nearest integer. We definitely don't want any decimals in any of our cells.

Therefore the formula should look like this in cell J3:  = INT((I3-H3) *24).

Almost a similar idea can be applied if we want to solve for the MINUTES between two times. Instead of using 24, we must use 1440 instead. Now, why do we need to use 1440? 1440 stands for the total minutes that we have for a single day. (24 hours * 60 minutes = 1440 minutes)

Therefore the formula should look like this: = ((I3-H3)*1440).

Answer:

its b. reformat J3 as a general number

Explanation:

You have taken a new job as a network administrator. Although you have been an IT professional within your organization for a number of years, this particular responsibility is a new one for you, so you have been studying network standards and protocols. You learn that all of the following are true about token ring networks

Answers

Answer:

Except more than one token can exist on a token ring network

Explanation:

The token ring is the LAN(Local Area Network) in which the computer systems are connected with each other computers in the form of topologies. In the token ring networks more than one logic tokens from one host to another host.

The token ring has entirely taken over by the Ethernet because it is cheaper and better in price and performance.

You have created a new Web site for your company, and you want to add a script so that a "welcome" pop-up box appears to the user as soon as he or she launches the site. Which JavaScript method should you use to display the message?

Answers

Answer:

The correct answer to the following question is The alert() method.

Explanation:

The alert() function is the function of the javascript which is applied on the web page to alert the users for something important who is surfing on that web page.

If the javascript alert box is on the button in the HTML page then, when the user clicks on that button the alert box will pop-up on the screen with the alert message which you written inside the alert() parentheses.

Syntax:

alert("Hello sir");

Declare a char array named line suitable for storing C-strings as large as 50 characters, and write a statement that reads in the next line of standard input into this array. (Assume no line of input is 50 or more characters.)

Answers

Answer:

char line[50];

cin.get(line,50);

Explanation:

The "char" data type stores character data in a fixed-length field.

Assume that you declare a variable as int x = 100, and correctly pass it to a method with the declaration private static void IncreaseValue(int x). There is a single statement within the IncreaseValue() method: x = x + 25;. Back in the Main() method, after the method call, what is the value of x?

Answers

Answer:

The value of X after the method call is 125

Explanation:

Recall that x was assigned the value 100. this value (100) was passed as an argument to the method IncreaseValue() which adds 25 to x that was initially 100.

Conchita uses the CSS Box Model to help configure the space around each HTML element as she develops her Web pages. Which Box Model element defines the space between the HTML element and the border?

Answers

Answer:  

The answer to this question is "Padding".  

Explanation:  

The description of padding property as follows:  

Padding is a property that is used in CSS. It established in the inner portion of the box model that Creates content space, defines any edges or boundaries within. This value is a set that uses a length in percentages or pixels and It does not accept negative values.  The default value for all padding properties is 0.  

 

Historically, it has been observed that computer processing speeds tend to double every two years. Which of the following best describes how technology companies can use this observation for planning purposes?
A. Technology companies can accurately predict the dates when new computing innovations will be available to use.B.Technology companies can plan to double the costs of new products each time advances in processing speed occur.C. Technology companies can set research and development goals based on anticipated processing speeds.D. Technology companies can spend less effort developing new processors because processing speed will always improve at the observed rate.

Answers

Answer:

Option C is correct.

Explanation:

This is what is called Moore's law, pronounced by Gordon Moore (Intel's CEO) in 1965. More precisely, it states that transistor count in processors doubles every 2 years. Not always this can translate to more processing power, because usually software can't keep up the pace with the raw power of new processors, and can't take full advantage of its speed.

Moore's law has had a positive effect on the market. Not only to the processor market but more so to the software market. The reason is that even though faster, multi-core processors are out there, the software was written to work with single-thread tech for a long time. Now, developers need to adjust their software to support multi-threading (split the program's functions across all processor cores) to increase performance and take advantage of the speed. This helps developers to create software that is up to the latest technologies and maximize efficiency.

The best choice is C. Technology companies can set research and development goals based on anticipated processing speeds. This approach allows them to align their innovation efforts with expected advancements, ensuring that their products remain competitive and relevant as processing speeds continue to increase.

Choice C is the most viable. By setting research and development goals based on anticipated processing speeds, technology companies can strategically allocate resources and prioritize projects that leverage expected advancements.

This approach enables them to stay ahead in innovation, design products that capitalize on increased processing power, and meet evolving market demands. It also helps in resource planning, allowing for the timely development of competitive products.

However, it's important to note that while the observation of doubling processing speeds every two years provides a general trend, it's not a rigid rule.

Actual progress may vary due to various factors. Thus, companies should adapt their plans accordingly, considering both the observed trend and specific technological developments in their respective fields.

This approach fosters agility and flexibility, essential qualities in the fast-paced technology industry.

Transaction processing systems are primarily used to automate business processes. Automation increases efficiency and effectiveness, while reducing head count which in turn reduces the overall operational ____________.
A.Costs
B. Systems
C. Revenues
D. Intelligence

Answers

Answer:

A.Costs

Explanation:

Transaction processing systems are used in business for operational support. This information system processes data as transactions usually in automated manner.

Automation causes efficiency and reduced human intervention, which will end up reduced operational costs.

Which one of the following statements about functions is TRUE A. A function can change names over the course of a program. B. Code can be added or removed dynamically from a function while the program is running. C. Functions can be called using different names depending on where in the program they are called. D. Two functions can be given identical names as long as their code is identical. E. Two functions in a single program can have different names but contain identical code.

Answers

Answer:

Answer is E

Explanation:

Two functions with identical codes can have the same name in any programming language. Any of the functions can be called to do its job with the appropriate name. While this is allowed and you wont get errors, just be careful not to waste memory and have redundant code

The true statement regarding the function is that the two functions could be the single program.

What are functions?

It means the relationship between the set of input that contains one output each. The function represent the relationship that lies between input where every input should be related to exactly one output. In the case when the function contains the same code so they have similar name for any kind of programming language. Also, the error should be minimized.

Therefore, the option E is correct.

Learn more about function here: https://brainly.com/question/19703259

_______is a network of physical objects embedded with sensors, processors, software and network connectivity capability to enable them to exchange data with the manufacturer, operator and other connected devices
a. the internet of digital divide
b. the internet of regulations
c. the internet of things
d. the internet of data

Answers

Answer:

c. the internet of things

Explanation:

Internet of things stands for IoT devices. the objects or devices which can be connected on internet and control by any of networking device comes under IoT devices.

IoT device is a combination of sensors, devices, and network working together. there are many sensors i.e PIR sensor, temperature sensor, light sensor, etc. which collect the information and send it over the connected devices. when it gets command it also acts on the same command like a printer function.

The example and most recent usage of IoT devices in the lighting automation, where the lighting of a house or office gets connected to the internet and can be controlled by any device connected with it.

What is the output of the following C++ code? int x = 55; int y = 5; switch (x % 7) { case 0: case 1: y++; case 2: case 3: y = y + 2; case 4: break; case 5: case 6: y = y – 3; } cout << y << endl;

Answers

Answer:

you get 2

Explanation:

Other Questions
Un cuerpo se mueve a la derecha sobre una superficie horizontal spera a una velocidad constante bajo la accin de una fuerza horizontal de 15 N. Determine:a) Modulo y direccin de la fuerza de roce What was George Washington's relationship to the press and his connection to news leaks? Who were some of the most influential writers of the HarlemRenaissance? Select the two correct answers.The two answers is b and d If you could only see the lights in the circuit and the wires were covered from view, how could you determine the type of circuit the lights are arranged in? Find the work done by F= (x^2+y)i + (y^2+x)j +(ze^z)k over the following path from (4,0,0) to (4,0,4)a. The line segment x=4 y=0 z=[0;4]Find a scalar potential function f for F, such thatF=f.The work done by F over the line segment is?b. The helix r(t)= (4cost)i +(4sint)j +(2t/pi)k t=[0;2pi]Find df/dt for F?The Work done by F over the Helix?c. The x axis from (4,0,0) to (0,0,0) followed by the line z=x, y=0 from (0,0,0) to (4,0,4)What is the integral to comput the work done by F along the x-axis from followed by the line z=x?What is the work done by F over the 2 curves Sunland Company had these transactions during the current period. June 12 Issued 84,000 shares of $1 par value common stock for cash of $315,000. July 11 Issued 4,000 shares of $105 par value preferred stock for cash at $113 per share. Nov. 28 Purchased 3,100 shares of treasury stock for $7,700.Prepare the journal entries. How many degrees would a kite need to be rotated to carry it onto itself? _________ policy involves the decision to pay out earnings to shareholders or to retain and reinvest them in the firm. When distributing income to stockholders there are three key issues to consider: (1) How much should be distributed? (2) Should the distribution be in the form of dividends, or should the cash be passed on to shareholders by _________ stock? (3) How stable should the distribution be? When deciding how much cash to distribute, a firm's managers must remember that the firm's objective is to_______ shareholder value. The target_______ ratio is defined as the percentage of net income distributed as cash dividends, and it should be based on investors' preferences for dividends versus capital gains. Any change in this ratio will have two opposing effects: (1) If dividends are increased, then taken alone this will cause the firm's stock price to_______ . (2) However, an increase in dividends will also cause the firm's expected growth rate to_______ and this will tend to _______the firm's stock price. The _______dividend policy is the one that strikes a balance between current dividends and future growth _______and the firm's stock price. Solve for b 2/3+5=20-b In a school with 400 students, 120 ride the bus to school. What percent of the students ride the bus to school? Refer to Explorations in Literature for a complete version of the speech. What was one of Churchill's purposes for writing "The Sinews of Peace"? to advocate for the United Nations to develop its own armed forces so that member states need not participate in future wars to call for the United States to establish formal diplomatic relations with the Soviet Union in order to prevent further war to warn America and the world about the threat that the Soviet Union and the rise of communism posed to freedom and peace to reject and dismiss calls for the British government to forge a "special relationship" with the American government PLEASE HELP!!!Bonus: Please put the important events of the American Revolution in correct timeline order.Trenton & Princeton, NJFort Ticonderoga captured by American forcesKing's Mountain, Cowpens, & Guilford Courthouse (SC, NC)Declaration of Independence written & signedYorktown, VAMonmouth Courthouse battleValley ForgeLexington & Concord, MASaratoga, NYTreaty of Paris 1783 After 56 cans of soup were sold, a clerk moved the remaining cans to a displaycase. The display case had shelves that could each hold 9 cans. How manyshelves were needed to fit all the remaining cans? In 1960, the earth carried 3 billion people and 127 million cars. Today it has more than ___ billion people and ___ billion cars.A. 4;75B. 5;100C. 6;300D. 7;1 Eve split 42 marbles between herself and 5 friends. Her mom then gave her 2 more packs of marbles with 4 in each. How many does she now have? Distinguish between dunes and loess Can someone help me solve #4! Please and thank you! :) ATP hydrolysis, ATP + H2O ADP + Pi, is the exothermic chemical reaction that provides the energy for many of the processes that take place in a cell. The reaction is described as arising from "breaking a phosphate bond in ATP" that is often described as a "high energy bond." The reaction also forms an OH-P bond to create Pi. Just consider this reaction in isolation. Which of the following statements would you therefore expect are true about the reaction? It only takes a little energy to break the O-P bond in ATP. The OH-P bond that is formed in the reaction is a weak bond. The OH-P bond that is formed in the reaction is a strong bond. It takes a lot of energy to break the O-P bond in ATP. The formation of the OH-P bond is the part of the reaction responsible for releasing energy. The breaking of the O-P bond releases energy that is stored in the bond. The table shows how the number of cars, c, depends on the number people, t. How would you write this as an equation?C T2 13 44 75 10t=3c-5 t=3c+5t=5c+3 t=5c-3 Act scene where Macbeth and last Macbeth plan to kill king Duncan