Use the find command to display all files owned by the user guru

Answers

Answer 1

Answer:

find * -user guru

Explanation:

find is the command to search in files and the flag -user allow search by the owner of the file

the symbol * is a regular expression that means all the files

Example

find * -user guru

find all the files owned by the user guru


Related Questions

Sarah finds herself repeating the same keystrokes and mouse operations on a regular basis. What should she use to improve her efficiency?: *
a. Copy and Paste
b. Indices
c. Macros
d. Redo

Answers

Answer: c)Macro

Explanation: Macro function is the computing operation that is collection or group of commands and made into a single instruction.This instruction is created so that the repeated tasks can be  carried out automatically.This function helps in saving the processing time.

Other options are incorrect because copy and paste function copies the selected instruction or text and pastes it to the desired location, indices denotes the index having data collection and redo command is for undoing the function and restoring it.Thus, the correct option is option(c).

Analysts use _____ to show the objects that participate in a use case and the messages that pass between the objects over time for one particular use case. (Points : 6) structural models
sequence diagrams
communication diagrams
class diagrams

Answers

Answer:Sequence diagrams

Explanation: Sequence diagram is the diagram that displays about the connection of the objects in a sequential manner. The sequence depicted through the vertical lines in parallel form was about the object function and the horizontal line showed interaction between them for the exchange of the information.

Other options are incorrect because structural models have the infrastructure in particular format, communication diagrams depicts the exchange of information through communication and class diagram is the diagram that displays the system's class.Thus the correct option is sequence diagram.

Which of the following is a correct call to a method declared as public static void i) aMethod(char code)? a. void aMethod(); b. void aMethod(‘V’); c. aMethod(char ‘M’); d. aMethod(‘Q’);

Answers

Answer:

Option(d) i.e aMethod(‘Q’); is the correct answer for the given question .

Explanation:

To call any method following syntax is used

methodname(parameter);

In option(a) the return type void is used and no char parameter is passed in the function so this option is wrong.

In option(b) the return type void is used which is not correct syntax to calling a method so this option is wrong.

In option(c) the char datatype is passed in the function which is not correct syntax to calling a method so this option is wrong.

So  aMethod(‘Q’); is the correct answer .

Assume a 8x1 multiplexer’s data inputs have the following present values: i0=0, i1=0, i2=0, i3=0, i4=0, i5=1, i6=0, i7=0. What should be value of the select inputs s2, s1 and s0 for the value on the multiplexer’s output d to be 1?

s2=

s1=

s0

Answers

Answer: s2=1 s1=0 s0=1

Explanation:

Generally speaking, the multiplexer is a digital circuit , build with combinational logic, that acts like a switch, sending to the output the current value present at the input which order number (in decimal) is equal to the binary combination of the select inputs, expressed in decimal form.

If the multiplexer is 8x1, in order to be able to pass to the output any of the 8 inputs, the number of select inputs (n), must satisfy the following relationship:

M(number of inputs) = 2ⁿ

In this case, as the only input which present value  is "1" ,is the input i5, the value present at the input select must be the binary combination of s₀, s₁

and s₂, that yields the decimal 5, i.e.,  s₀ = 1  s₁ = 0  s₂ = 1.

What are some of the features about Word that you find interesting?

Answers

Answer:

 Some interesting features of the Microsoft word are as follow:

The main key feature of the word is that it has the ability to write the formatted text and also we can save and also print the document according to the individual requirement.

It also used the word processing system in the Microsoft word for checking the spelling and grammar mistake to make the document error free and efficient.

It is compatible with the different kinds of software for local use and for collaboration features.  

Encryption that uses 16-character keys is known as ____. strong 128-bit encryption strong 256-bit encryption military-strength 512-bit encryption military-strength 1,024-bit encryption

Answers

Answer: Strong 128-bit encryption.

Explanation: An individual character corresponds to 8 bits . So if there are 16 characters then,

16[tex]\times[/tex]8=128 bits keys

This makes the 128 bit key encryption the strongest amongst all other options.It is strongest because it is almost impossible to decode the 128-character key  by any method e.g.-brute-force method.

Other options are incorrect because the characters given by the other bits are as follows:  [tex]{\frac{256}{8}[/tex]=32 characters

                         [tex]{\frac{512}{8}[/tex]=64 characters

                         [tex]{\frac{512}{8}[/tex]=128 characters  

Thus, the strongest character key is of 128 bits. for cipher.

Dеclarе and allocatе mеmory (on thе hеap) for a onе-dimеnsional array of 256 doublеs namеd pricеs

Answers

Answer:

double *prices=new double [256];

Explanation:

To allocate memory on heap we use new keyword.In the above statement an array name prices is declared and the memory allocated to it is on the heap memory.

First look at double * prices.It is a pointer this pointer is created on the stack memory which holds starting address of the array present on the heap memory of size 256..

Briefly tell me what a PUT request does

Answers

Answer:

 The PUT request is the method by which it basically stored the entity that is provided the URI request to the server. The PUT request method basically demands that the encased substance be put away under the provided Request-URI.

As a rule the HTTP PUT strategy replaces the asset at the present URL with the asset contained inside the solicitation. PUT is utilized to both make and update the condition of an asset on the server.

The HTTP PUT strategy makes another asset or replaces a portrayal of the objective asset with the other request payload.

Which of the four digital-to-analog conversion techniques is the most susceptible to noise? EXPLAIN WHY.
a. ASK
b. FSK
c. PSK
d. QAM

Answers

Answer:

a. ASK.

Explanation:

ASK(Amplitude Shift Keying) :- It is the form of amplitude modulation.It represents digital data variations in the carrier wave's amplitude.

It is most susceptible technique  to noise because among the frequency or phase and amplitude ,amplitude is most affected by the noise as compared to frequency.

As the performance of PCs steadily improves, computers that in the past were classified as midrange computers are now marketed as ____.
laptops
PC servers
PDAs
tablet PCs

Answers

Answer: PC servers

Explanation: PC(Personal computer) servers are the helps in the utilization of the network services to the software and hardware of the computer. It manages the network resources . In the past time ,Mindrange computers, mini computers etc are present time's PC servers.

Other options are incorrect because laptops ,PDA(Personal digital assistant) or tablets are the modern version of the computer units that are portable and compact with fast processing. Thus the correct option is option PC servers.

According to the ________ definition of organizations, an organization is seen as a means by which primary production factors are transformed into outputs consumed by the environment.

Select one:

a. macroeconomic

b. sociotechnical

c. microeconomic

d. behavioral

Answers

Answer: (C) Microeconomic

Explanation:

The microeconomic organization basically consist two factor of the primary production that is labor and capital by which the output is consume by environment.

It is transformed by using the firm by the process of the production into the products and the different services.

According to the microeconomic the organization is basically refers to the collection of the responsibilities and rights for balanced the time by conflict resolution in the organization.

This microeconomic definition basically suggest established a new information system and also rearrange all the technical machines in the organization

Who are the users of the encryption technology?

Answers

Answer: The users of encrypted technology can range from a consumer to a professional. As an individual, you might tend to login to a social media platform. These activities mostly use encryption in order to prevent your data and information from being exposed. More general uses might include safeguarding sensitive data and information, governments protecting social security and records.

In this type of password attack, the attacker has some information about the password. For example, the attacker knows the password contains a two- or three-digit number.



hybrid

nontechnical

rule-based

precomputed hashes

Answers

Answer: Non- technical

Explanation:

Non technical attacks also known as non- electronic attack. The non technical attack does not required any type of the technical domain knowledge and methods for intruding the other systems.

In the non technical password attack, the attacker contain some data or information regarding the password like two and three digits  and umber of the password. It basically search the data from the users trash bins and sticky notes from the users system.

On the other hand, all the the options are incorrect because it does not have some information and data regarding the password according to the given statement.

Therefore, non technical option is correct.  

Explain the benefits a recursive algorithm can provide. Use an example from a process in your organization or with which you are familiar.

Answers

Explanation:

Recursion is when the function calls itself inside it's definition.The advantages of recursion are as following:-

The problems solved by recursion have small code and elegant as compared to it's iterative solution which will be big and ugly to look at.Recursion is best suitable for data structures such as trees it's solution more understandable and easy while it's iterative solution is very big and also a bit difficult.

#include<iostream>  

using namespace std;  

 

int factorial( int n1)  

{  

   if (n1 == 0)  

   return 1;  

   return n1 * factorial(n1 - 1);  

}  

int main()  

{  

   int no ;

cin>>no;

cout<<factorial(no)<<endl;

   return 0;  

}

Recursive function to find the factorial of a number.

Float and double variables should not be used _____. (Points : 4)

as counters
to perform mathematical calculations
as approximate representations of decimal numbers
for applications when precision is required

Answers

Answer: As approximate representations of decimal numbers

Explanation:

 In the computer programming language, the float and the double variable is basically used to represent the decimal numbers. In the C language, both the float is basically represent the decimal value of precision upto the 7 digits and the double variable represent upto 16 digit of the precision.

Float is the type of the data type that is used to represent the floating point in the programming language and it takes less memory so that is why it is faster in speed.

Double variable is basically used to represent the numeric variable and decimal number in the programming language and it hold very large number as compared to float.

. When would one use the analytic application fraud detection?

Answers

Answer:Fraud detection through analytical method is used for detection of the fraud transactions,bribe activity etc in companies, business,etc. This techniques helps in the reduction of financial frauds in the organization, have the control over company to protect it,decrease in the fraud associated costs etc.

It has the capability of identifying the fraud which has happened or going to happen through the analytical ways and human interference. The organizations or companies require efficient processing and detection system for identification of such false happening.

Write a program which asks the user to enter N numbers. The program will print out their average. Try your program with the following numbers: 20.5, 19.7, 21.3, 18.6 and 22.1

Answers

Answer:

// here is code in C++.

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

   // variables

int n;

double average,sum=0,x;

cout<<"enter the Value of N:";

// read the value of N

cin>>n;

cout<<"enter "<<n<<" Numbers:";

// read n Numbers

for(int a=0;a<n;a++)

{

   cin>>x;

   // calculate total sum of all numbers

   sum=sum+x;

}

// calculate average

average=sum/n;

// print average

cout<<"average of "<<n<<" Numbers is: "<<average<<endl;

return 0;

}

Explanation:

Read the total number from user i.e "n".Then read "n" numbers from user with for loop and sum them all.Find there average by dividing the sum with n.And print the average.

Output:

enter the Value of N:5

enter 5 Numbers:20.5 19.7 21.3 18.6 22.1

average of 5 Numbers is: 20.44

The declarations and statements that compose the method definition are called the __________.

a.method body

b.method header

c.parameter list

d.method name

Answers

Answer:

a. method body.

Explanation:

A method contains the following components:

method namemethod argumentsmethod return typemethod implementation code

All of these together constitute the method body. The method body contains the declarations and statements constituting the method definition.

Apart from this, when the method is invoked at runtime, it needs to be called with method-name and the actual parameter list which gets substituted for the formal parameters in the method body.

A method variable a class variable with the same name. a) acquiesces to b) destroys c) overrides d) alters

Answers

Answer:

Option(c) is the correct answer for the given question.

Explanation:

The method variable overrides the class variable name with same name The method variable overrides of the class variable name .

Following are the example in java language

public class Main

{

int b=90; // class varaible or instance varaible

void sum()

{

   int b=34; // method having same name as class varaible name

   b=b+10;

   System.out.println(b); // display b

}

public static void main(String[] args)  // main method

{

 Main ob=new Main(); // craete object

 ob.sum(); // calling method sum

}

}

Output:

44

In this we declared a variable 'b' as int type in class and override this variable in sum() function it means same variable name is declared in function sum() .

acquiesces ,destroys,alters are the wrong for the given question.

So overrides is the correct answer

A class can inherit from a super class whose behavior is “near enough” and then adjust behavior as necessary thanks to the ability of a subclass to override a method. Thus, option C is correct.

What are the main uses of overrides as class variable?

The name, number, type, and return type of the overriding method are the same as those of the method it overrides.

In the case of method overriding, the overridden methods entirely replace the inherited method.

However, in the case of variable hiding, the child class conceals the inherited variables rather than replacing them.

In a nutshell, a class variable cannot be overridden. In Java, class variables are hidden rather than overridden. For example, overriding is for methods. Overriding differs from hiding.

Therefore, overrides  A method variable a class variable with the same name.

Learn more about overrides here:

https://brainly.com/question/20216755

#SPJ2

What is database design?

Answers

Answer: Database design is the model created of data/information for any particular organization .the relation between the information and which data is to be stored is the most important factor for designing .These parameters are decided by the designer of the database.

After the decision of the designed the data is invoked in the database .The data representation in the theoretical manner is known as ontology.The classification and relation defining is the purpose of the database design.

Convert (675.6)8 to hexadecimal. (use base 2 instead of base 10 as the intermediate base for conversion).

Answers

Answer:

1BD.C

Explanation:

Keep in mind that octal number has 3 binary fields where the right field is the number 1, the center field is the number 2 and the left field is the number 4. you need that your 3 fields sum the final octal digit.

For example :

(1)8 = (001)2(2)8 = (010)2(3)8 = (011)2

The hexadecimal number has 4 binary fields where the right field is the number 1, the center field is the number 2 , the next center field is the number 4 and the left field is the number 8. you need that your 4 fields sum the final hexadecimal digit.

For example:

(F)16 = (1111)2(1)16 = (0001)2(6)16 = (0110)2

Step 1: Split your octal number  in digits and convert to binary form

         6                             7                           5               .                  6

        110                          111                         101              .                110

Step 2: Join your binary number and split in groups of 4 elements from the point (Important note: If you miss some element to complete the groups at the left of the point complete with zero's at the left, else if you miss some element to complete the groups at the right of the point complete with zero's at the right)

binary complete:      110111101.110

binary in groups of 4:

                     1                1011                      1101            .                110

Complete the groups with zero's (Remember the important note):

               0001                1011                      1101            .              1100

Step 3: Calculate the hexadecimal number

                  1                      B                         D               .               C

     

Which of the following keywords is used to remove a database table in Oracle? (Points : 2) DROP TABLE
ALTER TABLE...DROP
DELETE TABLE
TRUNCATE TABLE

Answers

Answer:

DROP TABLE

Explanation:

DROP TABLE is used to remove a database table in Oracle.

The syntax is DROP TABLE <TableName>;

For example: Suppose there is a table called Student in the database which needs to be removed. Then the administrator with the required privilege can issue with the following command:

DROP TABLE Student;

This is distinct from DELETE statement which is used to delete individual row or set of rows.

Create a float variable named circumference.

Answers

Answer:

Float circumference; // Create a float variable

Explanation:

The float datatype is used for storing the decimal point values .The syntax  to declaring  any float variable is given below.

float variable-name;

float  circumference; // create a float variable

circumference=89.9007;; // store the value in circumference

Following are program in c++

#include <iostream> // header file

using namespace std; //namespace

int main() // main function

{

   float circumference; // creating variable float

   circumference=89.9007; // storing value

   cout<<circumference;  // display value circumference

   return 0;

}

Output:

89.9007

What is the advantage of using the conditional operator?

Answers

Answer: Conditional operator are the ternary operator that work during a particular condition in which they returns a value as a result.This mechanism of the conditional operator helps in the making of the decision. The advantages of the conditional operator are as follows:-

It has faster executionIt can operate in many conditions even where the if-else condition is not executableCompact in nature Readable

Explain why a business would use metrics to measure the success of strategic initiatives.

Answers

Answer:

 Metrics is basically used to measurement various type of success initiatives in the business for determining the current status of the project. The various business leaders uses the metrics for evaluating and monitoring various types of activity for tracking their business.

As,it helps in checking whether the project meets its particular goals.It gauges something which is legitimately controllable by the people or various small groups. This recommends measurements are neighborhood, and associated with activity.

It basically measuring which is something significant. In the event that the word key methods significant, at that point measurements mirror the goals for individual or association.

 

Final answer:

Businesses use metrics to quantifiably track and measure the success of strategic initiatives, provide essential feedback, and drive improvement. Metrics such as sales, defects, and satisfaction levels help in aligning employees' efforts with the company's strategic goals and aid in effective decision-making.

Explanation:

Businesses use metrics to measure the success of strategic initiatives to ensure that objectives are met efficiently and effectively. Metrics provide a quantifiable method to assess performance and progress towards goals, acting as a vital feedback mechanism for employees and management alike. They are used to track various aspects such as sales, defects, efficiency, and satisfaction levels, among others. By establishing Key Performance Indicators (KPIs), companies can objectively determine how well they are performing in specific areas and where they need to improve.

Specific metrics like turnover rates or productivity are typically straightforward to quantify and can be tracked easily. They are necessary to determine Critical to Stakeholder metrics and translate customer requirements into coherent project goals. However, companies often need to quantify less tangible aspects, such as employee or customer satisfaction, to get a holistic view of their performance. Although this may require additional effort, tools like surveys can help in quantifying these 'soft targets.'

Ultimately, utilising these metrics allows all members of an organization to identify and address issues proactively, aligning their efforts with the broader strategic goals of the business, enhancing decision-making, and fostering a culture of continuous improvement.

Write a Java program HW2.java that asks the user to enter an array of integers in the main method. The program should prompt the user for the number of elements in the array and then the elements of the array. The program should then call a method named isSorted that accepts an array of and returns true if the list is in sorted (increasing) order and false otherwise. For example, if arrays named arr1 and arr2 store [10, 20, 30, 30, 56] and [2, 5, 3, 12, 10] respectively, the calls isSorted(arr1) and isSorted(arr2) should return true and false respectively. Assume the array has at least one element. A one-element array is considered to be sorted.

Answers

Answer:

The java program for the given scenario is given below.

This program can be saved as HW2.java.

import java.util.Scanner;

public class HW2 {

   public static void main(String args[]) {

      HW2 ob = new HW2();  

     Scanner sc = new Scanner(System.in);

     int len;      

     System.out.println( "Enter the number of elements to be entered in the array");

     len = sc.nextInt();

     int[] arr = new int[len];

     System.out.println( "Enter the elements in the array");

     for( int k=0; k<len; k++ )

     {

         arr[k] = sc.nextInt();

     }

     boolean sort = ob.isSorted(arr, len);

     System.out.println( "The elements of the array are sorted: " + sort );

   }    

   public boolean isSorted( int a[], int l )

   {

       int sort = 0;

       if( l==1 )

           return true;

       else

       {        

           for( int k=1; k<l; k++ )

           {

               if(a[k-1] < a[k])

                   continue;

               else

               {

                   sort = sort + 1;

                   break;

               }

           }

           if(sort == 0)

               return true;

           else

               return false;

       }

   }

}

OUTPUT

Enter the number of elements to be entered in the array

3

Enter the elements in the array

1

2

1

The elements of the array are sorted: false

Explanation:

1. First, integer variable, len, is declared for length of array. User input is taken for this variable.

2. Next, integer array is declared having the size, len. The user is prompted to enter the equivalent number of values for the array.

3. These values are directly stored in the array.

4. Next, the function isSorted() is called.

5. This method uses an integer variable sort which is declared and initialized to 0.

6. Inside for loop, all elements of the array are tested for ascending order. If the 1st and 2nd elements are sorted, the loop will continue else the variable sort is incremented by 1 and the loop is terminated.

7. Other values of the variable sort indicates array is not sorted.

8. A Boolean variable, sort, is declared to store the result returned by isSorted method.

9. Lastly, the message is displayed on the output whether the array is sorted in ascending order or not.

What is white noise and how does it affect a signal? Provide a business process example that could be affected and what would you recommend to minimize white noise?

Answers

Answer: White noise is the merging of the audible signal of different frequencies varying from high to low into a single unit. The number of frequencies combined  in white noise more than 20,000. It helps in masking the other noise in the environment.

In accordance with the signal, white noise acts as a statistical mode which merges all the signal into one with same intensity which results in the power spectral density being persistent.

E.g.- Any business process of company that requires attention and speedy working such as creating report, presentation can get affected by the white noise in positive  or negative manner depending on the person.It might lead to increment or decrement in the cognitive performance of employees.

White noise can be remove by several software present in the market, removing it by the "Noise removal" option from the Effects menu in operating system, etc.  

Create a single line comment before you define your variables that says ""Variable Definitions"".

Answers

Answer:

// Variable Definitions

int a=67;

float b=78.8797;

Explanation:

For creating a single line comment we use // slash. It is used for making the comment in the program. In this we made a comment with help of  // after that we create a two variable i.e a and b of integer and float type.

) The order of messages on a sequence diagram goes from _____. (Points : 6)
right to left
bottom to top
left to right
top to bottom

Answers

Answer:

Top to bottom

Explanation:

A sequence diagram shows the sequence or the order in which the interaction between components takes place.

It places them in order of the occurrence of the events or interactions between the components or objects thus arranging these from top to bottom.

The sequence diagram shows the way an object in a system functions and the order it follows.

Convert A4B from hexadecimal to binary. Show your work.

Answers

Answer:

The answer is A4B₁₆ =  2635₁₀ =  101001001011₂

Explanation:

To convert from hexadecimal base system to binary base system, first you can do an intermediate conversion from hexadecimal to decimal using this formula:

where position of the x₁ is the rightmost digit of the number and the equivalents hexadecimal numbers to decimal:

A = 10.B = 11.C = 12.D = 13.E = 14.F = 15.

A4B₁₆ = A*16²+4*16¹+B*16⁰ = 2560 + 64 + 11 = 2635₁₀

Now, you have the number transformed from hexadecimal to decimal. To convert the decimal number 2635 to binary: Divide the number repeatedly by 2, keeping track of each remainder, until we get a quotient that is equal to 0:

2635 ÷ 2 = 1317 + 1;

1317 ÷ 2 = 658 + 1;

658 ÷ 2 = 329 + 0;

329 ÷ 2 = 164 + 1;

164 ÷ 2 = 82 + 0;

82 ÷ 2 = 41 + 0;

41 ÷ 2 = 20 + 1;

20 ÷ 2 = 10 + 0;

10 ÷ 2 = 5 + 0;

5 ÷ 2 = 2 + 1;

2 ÷ 2 = 1 + 0;

1 ÷ 2 = 0 + 1;

Now, construct the integer part base 2 representation, by taking the remainders starting from the bottom of the list:

2635₁₀ =  101001001011₂

Other Questions
Sonia says she prefers two theater tickets and one bottle of French wine to three games of bowling and one pitcher of draft beer. In this example, Sonia is demonstrating the _____ assumption of consumer behavior. Deduce the formula of the ion that has a charge of 2+ with the same electron configuration as krypton. A pot contains 257 g of water at 99C. If this water is heated and all evaporates to form steam at 100C, what is the change in the entropy of the H2O? In 1912, the RMS Titanic, a British passenger ship, sank in the North Atlantic Ocean after colliding with an iceberg. Historians do not know the exact passenger list, so the death toll is estimated. Here is data from the 2201 passengers on board, by cabin class. First Class Second Class Third Class Crew Row Totals Died 122 167 528 673 1490 Survived 203 118 178 212 711 Col Totals 325 285 706 885 2201 Source: Wikipedia, RMS Titanic (2015) If we randomly select a passenger who survived the Titanic, what is the probability that this passenger is in a second class cabin? A "producer" in an ecosystem is: A) the sun's energy B) a plant C) a herbivore D) a carnivore E) an omnivore Which of the following statements correctly describes any chemical reaction that has reached equilibrium?a. the concentration of products and reactants are equal.b. The reaction is now irreversible.c. Both forward and reverse reactions have halted.d. The rates of the forward and reverse reactions are equal. If an entry to adjust depreciation is not recorded at the end of the period, Depreciation Expense on the income statement will be a. overstated. b. understated. c. unaffected because the omitted entry affects two accounts that cancel each other out. d. unaffected because Depreciation Expense is reported on the balance sheet, not on the income statement. A partially amortizing loan for $90,000 for 10 years is made at 6 percent interest. The lender and borrower agree that payments will be monthly and that a balance of $20,000 will remain and be repaid at the end of year 10. Assuming 2 points are charged by the lender, what will be the yield if the loan is repaid at the end of year 10? What must the loan balance be if it is repaid after year 4? What will be the yield to the lender if the loan is repaid at the end of year 4? Calculate the potential energy associated with 1 m^3 of water at 607 feet tall taking the mass of 1 m^3 of water to be 1000 kg 2. Find the equation of a line that is parallel to the line y=-- x - 3 and goes through the point (-4,3).Whats the answer? to make a cup of potato soup A liquid mixture of density 0.85 g/mL flowing at a rate of 700 lbm/h is formed from mixing a stream of benzene S = 0.879 and another of n-hexane S = 0.659. Determine the volumetric flow rates of all three streams as well as the mass flow rate of benzene and n-hexane. Which statement concerning polygenic traits is not true? a. The most frequently discussed are skin, hair, and eye color. b. Their expression is often influenced by genetic/environmental interactions. c. The alleles have an additive effect on the phenotype, intensifying the genes. d. They are continuous traits. e. They are governed by more than one genetic locus. You extract DNA from some of your cells and cut out the complete human growth hormone gene directly from this DNA. You put this gene into a plasmid and transform E.coli with the plasmid. To your dismay, you find that E. coli does not make any human growth hormone. What is the most likely explanation for the failure of this experiment?A) Bacteria cannot carry out RNA splicing to remove introns and so produced a much larger protein.B) Bacteria lack a nucleus for proper transcription of eukaryotic genes.C) Human DNA cannot be cloned in a bacterium.D) Human DNA can be maintained in cloned form only for brief periods in bacteria. A= 4a-9b Solve for a The index of refraction of a thin lens is 1.5. Its one surface is convex (radius of curvature 20 cm) and the other planar. Calculate the focal length of the lens. What kind of an image does it form when the object is real and at 40 cm before the lens? What is the focal length if the lens is turned around? How does this influence image formation? In a normal costing system, the cost of a job includes A. actual direct materials, actual direct labor, and estimated (applied) overhead. B. estimated direct materials, estimated direct labor, and estimated overhead. C. actual direct materials, actual direct labor, actual overhead, and actual selling cost. D. actual direct materials, actual direct labor, and actual overhead. E. None of these. Job-order costing requires the use of actual, not normal, costing. Solve the following equation.LaTeX: \left|\frac{x}{7}\right|=1| x 7 | = 1Group of answer choicesLaTeX: x=7 x = 7LaTeX: x=-4,\:x=-16 x = 4 , x = 16LaTeX: x=7,\:x=-7 x = 7 , x = 7LaTeX: x=-5,\:x=-13 (1) Depreciation for the current year includes equipment $2,700(2) The beginning balance of Office Supplies was $ 2,100. During the year, Bookfield purchased office supplies for $ 3,400, and at December 31 the office supplies on hand totaled $ 1,100. (Assume that Bookfield debits an asset account when supplies are purchased.)(3) The company had earned $3,400 of unearned revenueJurnalize the adjusting entry needed on December 31 for each situation. 7 1/2 of what number is 12