Somebody who is good at this stuff, please halp meh ;-;

Somebody Who Is Good At This Stuff, Please Halp Meh ;-;
Somebody Who Is Good At This Stuff, Please Halp Meh ;-;

Answers

Answer 1

Answer:

for the first question the correct answer is either A or B

the second problem is A

hope this helps you!

(p.s;tell me if this is right and please mark me as brainlyest)

Explanation:

Ask me if you want/need the explaination.


Related Questions

What is the main advantage to using Java?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A. It does not require a compiler.
B. It is platform agnostic.
C. It uses a 'write once, run anywhere' philosophy and does not need to be tested across multiple systems.
D. It is optimized for use primarily on the Windows operating system.

Answers

Answer:

The correct answer to the following question is an option (B) It is platform agnostic.

The attribute is controls="controls".

Explanation:

JAVA is the programming language which reliable, fast and secure.

Java is the platform-agnostic, which means the java programming language is the platform-independent, but the JVM(java virtual machine) is not the platform-independent it means it is platform-dependent and every operating system has its own Java Virtual Machine.

Java programs can be runs on the different Operating System. It was designed by the Sun Microsystems and later, it was occupied by the Oracle which is easy to learn and write programs in it.

A variable declared to be of one class can later reference an extended class of that class. This variable is known as_________.
a. public
b. derivable
c. cloneable
d. polymorphic
e. none of the above, a variable declared to be of one class can never reference any other type of class, even an extended class

Answers

Answer:

Option (D) i.e., polymorphic is the correct answer to the following.

Explanation:

Because polymorphism is the concept of the Object-Oriented Programming in which an object or method having same in name.

Polymorphism is one of the essential features of the OOPs in which the method having the same name but different in their argument or the parameter list, in other words, the items having the same names but different in their working.

The variables declared.

A variable is a symbol and a placeholder for a quantity that may be changed. It may also include a number of vectors and a matrix and a function. They also refer to the set of elements of a function. They can be declared in one class and can be later used for reference to an extended class of the class.

Thus answer is the polymorphic variable. Can be declared in one class and never in another type of class.

The polymorphic includes one or more variants of the specific DNA sequence. the variables  Polymorphisms can be sued to explain the strength and with variables and these are much larger in size.

Find out more information about the variable declared.

brainly.com/question/25784459

In the process view of business, which of the following should be identified when defining the system?
A) Inter-connected processes across functional areas
B) The process-flow analysis approach to be used
C) Only the operations function
D) The vertical nature of the organizational design

Answers

Answer:

A. Inter-connected processes across functional areas  

Explanation:

Option A is correct

Check Point Management (CPM) is the main management process that provides the architecture for a consolidated management console. CPM allows the GUI client and management server to communicate via web service using ______.

a. TCP port 19009
b. TCP Port 18190
c. TCP Port 18191
d. TCP Port 18209

Answers

CPM allows the GUI client and management server to communicate via web service using TCP port 19009.

a. TCP port 19009

Explanation:

Check point management is main security management process of future technology. It works as smart console which covers

1. Security Policy Management

2. Log Analysis

3. System Health Monitoring

4. Multi Domain Management

All communications are made through tcpip address and port.  It always as web service where port start with 1900.

Some blades use components of the former Smart Dashboard views.  To communicate with management server they always use CPM API use the port 18190. Database sessions, Database revisions,  Database domains.

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4GHz. Which 802.11 stand will work best in this situation?

Answers

Answer:

The best choice is 802.11a.

Explanation:

The most common option, that is widely used in home internet is 802.11b, however, this only supports a max speed of 11Mbps.

802.11a supports up to 54Mbps and it has regulated frequencies that prevent interference from other devices, such as the wireless system that your client already has. This option is more expensive, and its signal has issues going through walls and rooms but still, it is the one that fits him the most.

Identify a disadvantage of an instant online storefront.a. The store is based on a template and may look very similar to other online stores.b. The store can be ready in minutes.c. The store cannot accept credit cards.d. None of these

Answers

Answer:

The correct option to the following question is an option (a).

Explanation:

Because many of the online shoppers has unable to inspect that items which they are buying from online and they considered same as they see on the stores' template but sometimes these outlets are cheaper in pricing but also cheap in quality also because they don't know what type of quality they are buying.

You are an IT technician for your company and would like to be able to:
a. Establish a remote server management session.
b. Send encrypted (clear text) transmissions to the remote server.
c. Manage specialized industrial and scientific devices.

Which of the following utilities would be the BEST to use to accomplish these tasks?

Answers

You are an IT technician for your company and would like to be able to establish a remote server management session.

a. Establish a remote server management session.

Explanation:

In an organization’s an IT technician to access the remotely the computer from his location he preferred access workstation or desktop or laptop by remote connectivity. If physical workstation or desktop or laptop on working IT technician should visit is requirement.

Purpose of Remote server management session is used by IT technician to troubleshoot the workstation or copy the files to designated workstation or laptop or desktop.

Once remote connection is established IT technician can also transfer files if required.

To access the remote connection network connection is required.

The best utility for establishing a remote server management session, sending encrypted transmissions, and managing devices securely is SSH: Secure Shell. SSH provides encrypted, secure channels over unsecured networks and is essential for maintaining cybersecurity standards.

To accomplish tasks such as establishing a remote server management session, sending encrypted (clear text) transmissions, and managing specialized industrial and scientific devices, the best utility to use would be SSH: Secure Shell. SSH allows for secure network services over an unsecured network by providing a secure channel over an unsecured network in a client-server architecture. It offers both strong encryption and secure remote login capabilities. Before logging in to a remote server via SSH, you need client software on your local computer, the remote computer's address (hostname or IP address), a username, and a password on the remote computer.

Encryption is crucial for protecting communications from eavesdropping. SSH provides an encrypted connection where information is secure between your computer and the server. This encryption safeguards sensitive data, making SSH ideal for securely managing servers and devices. Cybersecurity measures are integral to automate and remotely control systems safely, which includes the encrypted communications provided by SSH.

Compared to alternatives like telnet, SSH is favoured for its focus on security and the ability to encrypt communication to prevent potential eavesdropping. While telnet allows for server connections, it does not encrypt the data transmitted, making it unsuitable for secure communications.

Which of the following statements about C++ arrays is true?A.Array components cannot be of floating-point types.B.The index type of a one-dimensional array can be any data type.C.An array component can be treated as a simple variable of its component type.D.a and b aboveE.a, b, and c above

Answers

Answer:

The answer is letter C. True

Explanation:

The true  statement is an array component can be treated as a simple variable of its component type.

ASAP PLZ!!! Select the correct answer.
The sales team of an organization prepared a report using mined data. They had an issue of presenting a large amount of data on a small screen. Which data mining issue did the sales team face?
A.
security issue
B.
user interface
C.
web mining
D.
multiple sources

Answers

Final answer:

The correct answer to the data mining issue the sales team faced is 'B. user interface,' which concerns the efficient presentation of large data sets on small screens.

Explanation:

The correct answer to the student's question about the issue faced by the sales team when trying to present a large amount of data on a small screen is B. user interface. This problem is not related to security issues, web mining, or the handling of multiple sources of data, which are common concerns in data mining. Instead, the user interface is critical in determining how effectively the mined data can be displayed, especially when screen size is limited. Presenting complex data on small screens requires a user interface that is clean, efficient, and capable of highlighting the most important information without overwhelming the viewer.

A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following using a wireless network locator device:
a) They use an 802.11n wireless
b) The wireless network is broadcasting an SSID of Linksys.
c) The wireless network uses WPA2 with AES security.
d) Directional access points are positioned around the periphery of the building.
Based on this information what should you recommend your client do to increase their wireless network security?

Answers

Answer:

disable SSID broadcast and change the network name

Explanation:

Based on my experience with information technology and wireless networks my recommendation would be to disable SSID broadcast and change the network name. Disabling SSID will prevent the network name from appearing on devices that are searching for a network to connect to, and by changing the name it will also prevent anyone who knows the previous name from connecting unless they know the new name. Both of which will drastically increase security.

Final answer:

To enhance Widgets, Inc.'s wireless network security, it is recommended to change the SSID, disable SSID broadcast, and implement MAC Address Filtering.

Explanation:

To increase the wireless network security for Widgets, Inc., I would recommend the following steps:

Change the SSID: Broadcasting the manufacturer's default SSID makes it easier for attackers to identify the network. Changing it to a unique name enhances security.Disable SSID Broadcast: Disabling SSID broadcasting adds an extra layer of security as the network won't be openly visible to unauthorized users.Implement MAC Address Filtering: By configuring the wireless access point to only allow specific MAC addresses, you restrict unauthorized devices from connecting to the network.

The development of the original personal computer (PC) was a(n) __________ innovation at the time, whereas adding a different kind of whitening agent to a soap detergent is an example of a(n) __________ innovation.

Answers

Answer:

The correct answer to the following question is radical, incremental.

Explanation:

Personal Computer is the system which helps us in official work, in study, in business and organization, in schools and hospitals, etc.

It is one of the good human creations which helps us in every field and every sector, it also used in entertainment. It saves our precious time in which we do other important works.

____ documents consist of the text to be displayed on a Web page, together with a number of special characters: tags that achieve formatting, special effects, and references to other similar documents.

Answers

Answer:

HTML

Explanation:

HyperText Markup Language ( HTML ) -

It is the foundation block of the Web page , which gives the main frame and structure to the web page .  

It is basically the type of language which is coded and generates a web page , and many web pages combine together to make up a web site in the internet .  

Many features like , formatting , color , fonts , special effects and special characters can be used in a coding of the HTML .

What occurs when you call a method on a reference variable that contains null? Select one: a. An ArrayIndexOutOfBoundsException error b. An ArithmeticException error c. A NullPointerException error d. A ClassCastException error

Answers

Answer:

Option(c) i.e "A NullPointerException error " is the correct answer for the given question.

Explanation:

Exception are the run time error in the program.A NullPointerException is the runtime error when the pointer containing the NULL value .This type of exception occur when we call that function on the pointer variable which contains the NULL.

ArrayIndexOutOfBoundsException error occur when we accessing the element which is out of the index or bound so this option is incorrect.An ArithmeticException error  occur in the arithmetic operation. Suppose a number is divided by zero then the ArithmeticException error is occured .ClassCastException error occur in the typecasting of a specific object.So this option is incorrect.

A ____ search starts looking in the middle of a sorted list, and then determines whether it should continue higher or lower.

Answers

Answer:

The correct answer to the following question is binary.

Explanation:

The binary search is the type of algorithm or program in which the user find their items from the sorted list.

Binary search is the search in the sorted list or an array which is rapidly divided in half interval search.

Steps of the binary search:

Firstly, read the array or the list of the elements.Then, arrange them in the sorted array or the list.Then, in the sorted list compare that item which you want to search with the middle element of the array or the list. By using formula:middle_element=(first_element + Last_element)/2Then, if both of the elements are same then, you have found that element.Then, if the element is not found than we compare that item is greater or the smaller from the middle element.Then, if that item is smaller than the middle element than search left side of the sorted list and repeat 2,3,4,5 steps and if not smaller or it is greater than that element than search right side of the sorted list from the middle and repeat 2,3,4,5 steps. by using formula if less than middle: First_element = middle_element + 1, otherwise Last_element = middle_element - 1Then, the element is successfully found, if not then that search item is not in the give array or the list of elements.

A drainage network Choose one: A. is considered a trellis network when rivers flow over uniform substrate with a gentle slope. B. drains water directly into the ocean. C. is an interconnected group of streams that collects water over a large area. D. is a trunk stream that cuts across a resistant ridge.

Answers

Final answer:

A trellis drainage network forms in folded topography where main channels and tributary streams resemble a garden trellis, typically seen in regions like the Appalachian Mountains. It is distinct from other patterns, such as dendritic or radial, which are influenced by different geographical and geological factors.

Explanation:

A drainage network is considered a trellis network, which is answer A, when rivers flow over a folded topography, such as that found in the Appalachian Mountains. In a trellis drainage pattern, the main streams and tributaries resemble a garden trellis, where down-turned folds known as synclines create valleys that host the main channel. Tributary streams enter these channels at sharp angles, following the ridges known as anticlines. This contrast to dendritic patterns, radial patterns, and other types of drainage networks that form in different conditions, such as over homogeneous material or around central elevated points like volcanoes. Comparing a trellis drainage pattern to other drainage patterns provides insight into the local topography and subsurface geology that dictate the drainage network. Over time, streams within these networks develop gradients, where the inclination reduces from the headwaters to the mouth. Geologic events, such as folding and faulting, can greatly influence the development of these patterns, as can the type of rock present in the region.

The advent of mobile systems run by Android and other operating systems opens a wide range of new system management and security concerns for systems administrators, including the _____ paradigm in which an organization’s members connect their personal devices directly to a secured network.

Answers

Answer:

bring your own devices

Explanation:

"bring your own devices" paradigm is getting popular since organizations are increasingly allowing users to perform work tasks on their own personal devices, It is preferred because of the benefits and ease for the user. On the other hand, this paradigm opens several security risks.

For example processing sensitive data on personal devices creates risks in case of data recovery or if the device is stolen or lost.  

Additionally, control and monitoring of organizational data is harder when users allowed to work on their personal devices. Thus data leakage and public exposure can happen more easily.

Assume you have the following array: int[] values = new int[15]; What will happen if the following code is executed? int[15] = 20;
a. The value will be added to the array.
b. You will get an ArrayIndexOutOfBoundsException
c. Nothing will happen
d. The array will grow in size by one and the value will be added to the array.

Answers

Answer:

You are creating an array "values" which stores 15 integers. And if we will write int[15]=20, we are not following correct syntax. Hence, nothing will happen, and it might however, throw an error that the syntax is wrong.

Explanation:

int[15]=20 is a wrong syntax, and hence nothing will happen or computer might throw an error like that not correct syntax is being used. And if we write values[15]=20,  It will certainly throw ArrayIndexOutOfBoundsException as the maximum length is fixed to 15 and values[14] and not more than that.  

A​ ________ is a person or organization that seeks to obtain or alter data or other IS assets​ illegally, without the​ owners' permission.

Answers

Answer: Threat

Explanation:

 Threat is one of the type of possible danger occur in the computer system security and also also exploit the security system that cause various types of possible harms.

Threat is alter any type of data in an organization without the permission of the owner.  

The threat can be classified into the different types are as follows:

Computer worm DOS attack Rootkit Computer viruses

Which of the following tools enables users to connect to a remote computer, including servers with no interaction required from the remote computer, so that they can interact with the Windows desktop and applications?
a. Remote Desktop
b. Remote Assistance
c. Computer Management console
d. Computer Assistant

Answers

Answer:

Remote Desktop

Explanation:

This is a software, that enable you to connect with a remote computer with all access. e.g. Team Viewer

What is a computer network that provides connectivity in a geographic area or region larger than that covered by a local area network, but smaller than the area covered by a wide area network?

Answers

Answer:

The correct answer for the given question is "Metropolitan Area Network"

Explanation:

The metropolitan area network connect the user with a geographic area of the size of  metropolitan area.Metropolitan area network connect LAN i.e " local area network " to a single larger network thats provide efficient  connection to the WAN network.Their are many advantage to use metropolitan area network which are mention above .

Provides the better security then other network.Cheaper lost when we connect MAN with WAN.If we use MAN network then data will be fastly transferred.

How does voting help in a social news site? A. By improving the website's ranking, thereby increasing traffic to it B. By increasing the site's visibility on search engines C. By gathering financial support from political parties D. By making the site accessible on various browsers

Answers

Answer:

by improving the website's ranking, thereby increasing traffic to it.

Explanation:

As the ranking of the website is increases, it will be visible to more number of users. As the number of users increases on website, they will help in voting.

Assume that input file references a Scanner object that was used to open a file. Which of the following while loops shows the correct way to read data from the file until the end of the file is reached?
a) while (inputFile != null)
b) while (!inputFile.EOF)
c) while (inputFile.hasnextInt())
d) while (inputFile.nextLine == " ")

Answers

Answer:

The correct answer to the following question is an option c) while (inputFile.hasnextInt()).

Explanation:

hasnextint() is the function of the scanner class which is "java.util.Scanner".

This method returns the boolean value so the data type of this method is boolean.

Integer values of radix are assumed only when a next token is in the Scanner input and it returns output True.

The other options are false because the input file can be null and the end of file is not equal to the input file and the next line is equal to the space and also the other options are not the object of the scanner class.

Write some code that reads a value into the variable name then prints the message "Greetings, NAME" on a line by itself, where NAME is replaced the value that was read into name. For example, if your code read in "Rachel" it would print out "Greetings, Rachel" on a line by itself.

Answers

Final answer:

To read a value into a variable and print a message in Python, use the input() function to get the value from the user and the print() function to display the message. Concatenate the variable containing the value with the desired message using the '+' operator.

Explanation:

To write code that reads a value into a variable and prints a message, you can use the input() function in Python. Here is an example:

name = input("Enter your name: ")
print("Greetings, " + name)

In this code, the input() function prompts the user to enter a value, which is then stored in the variable name. The print() function is used to display the greeting message, where the value of the name variable is concatenated with the string "Greetings, ".

Java performs ________, which means that it does not allow a statement to use a subscript that is outside the range of valid subscripts for the array.
a. active array sequencing
b. buffer overrun protection
c. array bounds checking
d. scope resolution binding

Answers

Answer:

The correct option to the following question is an option (c) array bounds checking

Explanation:

Array bound checking is the checking is the checking of the elements of an array, when the number of the array goes beyond the number of array that is given at the time of declaration of the array.

This time if the programmer executes the program than an error arises that is 'IndexOutOfBoundsException'.

For Example:

//import packages

public class A {   //define class

//define main function

  public static void main(String args[]) {    

     int[] ar = {8, 6, 7, 0, 2, 23, 7};    //set integer array type variable

     System.out.println("Array are:: ");  //print message

     System.out.println(Arrays.toString(ar));    //convert array into string

     Scanner s = new Scanner(System.in);   //creating object of Scanner

     System.out.println("Elements enter ::");   //print message

     int e = s.nextInt();

     System.out.println("Elements are :: "+ar[e]);  //print array

  }

}

Output:

Array are::

[8, 6, 7, 0, 2, 23, 7]

Elements enters ::

7

Exception in thread "main" java.lang.ArrayIndexOutOfBoundsException: 7

at A.main(A.java:12)

Words used by a system that cannot be used for any other purpose are called __________ words. For example, in oracle sql, the word initial cannot be used to name tables or columns

Answers

Answer:

Reserved words

Explanation:

Reserved words are words that have predefined meaning in a system and cannot be use for another purpose like naming. Reserved word also contain keywords; that is, key words are reserved words.

All formulas that begin with =IF will

A. change the formatting of a cell in a specific way if certain conditions are met.
B. return a specific value, calculation, or message if certain conditions are met.
C. always copy the contents of the adjecent cells if they contain data.
D. remove contents from a cell if they will likely cause an error during calculations.

Answers

Answer:

return a specific value, calculation or message if certain condition met

Explanation:

"if" is used for conditional statements that means, do some work if the condition is met against that logic.

e.g.

If (a > 5)

{

Show "a is greater than 5"

}

so if we put a= 6 than condition met and given statement will be shown on out put as "a is greater than 5".

Many company websites are now designed to do more than just sell a product. These​ websites, known as​ __________ websites, attempt to build closer customer relationships and generate engagement with and between the brand and its customers.

Answers

Answer:

brand community

Explanation:

Many company websites are now designed to do more than just sell a product. These​ websites, known as​ brand community websites, attempt to build closer customer relationships and generate engagement with and between the brand and its customers. These online communities bring together consumers who have shared interests in a brand or product. One advantage of online brand communities is that they reduce customer support costs as the business has more engagement with their customers.This also helps the business to retain customers through brand improvement centered around the customer's actual needs.

Patrick is creating a form for his Web site, and he wants to have visitors provide their names. Which HTML5 code would ensure that users enter their first names prior to submitting the form?

Answers

Answer:

required is the HTML5 keyword that will be used. See the snippet in the explanation.

Explanation:

<form>

 <label>FirstName</label>

 <input type="text" name="firstname" required>

 <button>Submit</button>

</form>

The above snippet will not allow the web page to be submitted until the firstname field is filled with text.

The use of an information system to support the sharing of content among networks of users related by common interests is termed​ __________.
A. media networks
B. online communities
C. common media systems
D. social networks
E. social media information systems

Answers

Answer:

The answer is E, Social media information system.

Explanation:

What makes the answer unique is the fact that the system only supports information shared within a specific group of local network users.

By definition, Social media information system is an information technology tool that assists in the reversible distribution of information or digital content among people of like and similar network.

In order to be accredited by the Better Business Bureau, a business is required to publish a privacy notice on its website that includes all of the following elements EXCEPT a. sharing and selling b. updates c. choice d. access

Answers

Answer:

Explanation:Option D (Access)

Other Questions
What is the slope of the line? Which of the following reactions is the least energetic? Question 18 options: ATP + H2O ADP + Pi ATP + H2O AMP + PPi AMP + H2O Adenosine + Pi ADP + H2O AMP + Pi All give off the same amount of energy. Which statement is true about Britishrelationships after the war?A-They had good relations with colonists butstrained relations with American Indians.B-They had strained relationships with bothAmerican Indians and colonists.C-They had strained relationships with colonistsbut good relationships with American Indians.D-They had good relations with both colonistsand American Indians. Use the standard half-cell potentials listed below to calculate the standard cell potential for the following reaction occurring in an electrochemical cell at 25C. (The equation is balanced.)3 Cl2(g) + 2 Fe(s) --> 6 Cl-(aq) + 2 Fe3+(aq)Cl2(g) + 2 e- --> 2 Cl-(aq); E = +1.36 VFe3+(aq) + 3 e- -->Fe(s); E = -0.04 V+1.32 V-1.32 V-1.40 V+1.40 V+4.16 V Two hundred thousand twenty five Think about what it would be like to be on theocean. What images come to mind for youpersonally? Check all of the boxes that apply.endless expansescrashing waveslots of starscalm water everywherebig fish jumping out of the water Marie is saving money for home repairs. To date, she has saved $1,329. She needs at least $1,569 for the repairs. She plans to set aside $40 per week to add to her current savings. If this situation is modeled by the inequality below, how many more weeks, x, does she need to continue saving in order to have enough money for the repairs? $1,329 + $40x > $1,569 984x=3 remainder:84 Ms. Hartmans class is going on a field trip to planetarium. There are 25 students in the class, and each students need to purchase a day pass to the planetarium and a lunch ticket. The day pass costs $10 and the lunch ticket costs t dollars Pick all the expressions that represent the total costs for the field trip 250+10tt(25+10)250+25t25(10+t) During the year an enterprise fund purchased $230,000 worth of equipment. The equipment was acquired with a cash down payment of $30,000 and a $200,000 loan. A partial year of depreciation on the equipment was taken in the amount of $23,000. What is the net effect of this transaction on the net position accounts of the enterprise fund? the child weighs 55 lbs. Calculate the childs weight in pounds to kilograms A major purpose of using an Allowance for Doubtful Accounts is to recognize uncollectible accounts expense in the same accounting period as the related sales which caused the expense. True or False? The internal energy of a system ________. refers only to the energies of the nuclei of the atoms of the component molecules is the sum of the kinetic energy of all of its components is the sum of the potential and kinetic energies of the components is the sum of the rotational, vibrational, and translational energies of all of its components none of the above the product of a 3x3 and a 6x6 matrix would be Five ways that the membrane can deal with material If an object on a horizontal frictionless surface is attached to a spring, displaced, and then released, it will oscillate. If it is displaced a distance 0.125m from its equilibrium position and released with zero initial speed. Then after a time 0.800s its displacement is found to be a distance 0.125m on the opposite side, and it has passed the equilibrium position once during this interval. Find : Amplitude, period, and frequency. Millie Co. completed its first year of operations on December 31, 2017, with pre-tax financial income of $400,000. Millie accrued a contingent liability of $900,000 for financial reporting purposes; however, the $900,000 will be paid and therefore is deductible for tax purposes in 2018. Millie also has gross profit of $800,000 from certain sales recognized currently for financial reporting purposes but that will be taxable as installment sales in 2018 and 2019 when the cash is received ($400,000 each year). Millies pre-tax financial income includes $38,000 interest earned on its holdings of the bonds of the State of Montana. The tax rate is 35% for all years. Required: Determine Millies taxable income and taxes due for 2017. Determine the changes in Millies deferred tax amounts for 2017. Calculate tax expense for Millie for 2017. I dont know where to start with this problem Ogilvie Corp. issued 23,000 shares of no-par stock for $10 per share. Ogilvie was authorized to issue 46,000 shares. What effect will this event have on the company's financial statements? Since medical assistance are often the patient first contact with a healthcare facility and the provider what attributes responsibilities and skills must medical assistant possess?