. When would one use the analytic application fraud detection?

Answers

Answer 1

Answer:Fraud detection through analytical method is used for detection of the fraud transactions,bribe activity etc in companies, business,etc. This techniques helps in the reduction of financial frauds in the organization, have the control over company to protect it,decrease in the fraud associated costs etc.

It has the capability of identifying the fraud which has happened or going to happen through the analytical ways and human interference. The organizations or companies require efficient processing and detection system for identification of such false happening.


Related Questions

Why does software have bugs?

Answers

Answer:

Human errors, changing requirements, complicated software, etc.

Explanation:

A bug in software is a coding error. The effects are often unexpected and affect the way a programme works, often resulting in the programme not functioning in the way it was intended. There are various reasons that bugs can exist in software, including (but not limited to) the following:

Human errors in programming and design is the most common reason for bugs. This could be as a result of time pressure, simple mistakes, or any other human related issue.Changing requirements, or even just misunderstandings between the parties involved, can often be a cause of bugs.Complicated software can often result in programmers making errors.Lack of documentation or updates being made by different programmers using different tools.

Final answer:

Software has bugs due to the complex nature of writing and integrating numerous lines of code, and the limitations of computer calculations. These bugs provide opportunities for learning and improving through good programming practices and debugging strategies. Quality assurance plays a key role in identifying potential bugs, helping to create more reliable software.

Explanation:

Software bugs are a common occurrence and they stem from a variety of sources. Writing software is a complex process, involving numerous lines of code, and the interaction between these lines can sometimes produce unexpected results, known as bugs. Consider bugs as an opportunity for growth; they provide a chance to learn and improve the software. Quality Assurance (QA) teams are essential in this process, constantly trying to break the software to identify potential issues. Good programming practices and debugging are critical in making the software more reliable. However, due to the complexity of software and limitations such as the accuracy of floating-point calculations, it's hard to eliminate all bugs.

It is important to proactively think about errors during development by asking, "What could go wrong here?" Moreover, implementing unit testing, which involves testing small, isolated parts of the program, helps identify and fix bugs early on. Nevertheless, as programs grow in size and complexity, the likelihood of bugs increases, making the debugging process more challenging.

Simplifying the program can sometimes be the best strategy when faced with a complex bug situation. It allows the developer to strip down to the basics and tackle issues one at a time. Remember, bugs are inevitable, but with careful testing and professional practices, their impact can be minimized, maintaining the credibility of software output.

What year was MCTC founded ? right answer 1996

Answers

Answer:

Minneapolis Community and Technical College was formed in February 1996

Explanation:

MCTC

Minneapolis Community and Technical College was formed in February 1996

this was Minneapolis Community and Technical College following by  july 1955 latter it was merger and become MCTC in 1966

and  

Chancellor of MCTC is Devinder Malhotra

and President is Sharon Pierce

it is situated at Minneapolis, Minnesota in  United States of America

Minneapolis Community and Technical College (MCTC) was founded in 1996. It was established to provide educational services to the community.

Founding Year of MCTC

MCTC, short for Minneapolis Community and Technical College, was founded in 1996. This college was established to serve the educational needs of the community, offering a wide range of associate degrees and certification programs. Since its inception, MCTC has grown significantly and continues to play a crucial role in higher education.

Continuous reboots of a Windows host upon encountering a persistent stop error might be caused by Startup and Recovery configuration settings in the Control Panel System applet (System -> Advanced system settings -> Advanced -> Startup and Recovery -> Settings... -> System failure).

(A) True
(B) False

Answers

Answer:

True.

Explanation:

Sometimes there comes a problem in computer systems of continuous reboots of a windows this could due to following reasons such as software issues,bad power supply,bad hard drive,hardware issues.

If the issue is from startup and recovery configuration or software you can see it by going in the Control Panel System applet given in the question.

Which of the following declares an abstract method in an abstract C++ class? (Points : 2) public: void print();
public: void print() {}
public: virtual void print() {}
public: virtual void print()=0;

Answers

Answer:

public: virtual void print()=0;

Explanation:

An abstract class contains a pure virtual function. Pure virtual class cannot be instantiated but it can be subclassed and the subclass can provide an implementation of the function.

A virtual function declaration in the class is preceded by the virtual keyword. For example, virtual void print();

A pure virtual function declaration is followed by '=0;'

public: virtual void print()=0;

Extended ACLs can filter traffic based on _____. (Points : 3) protocol type
source IPv4 address
source TCP or UDP ports
All of the above

Answers

Answer: All of the above

Explanation: Extended Access Control Lists(ACL) is the system that works between the Source IP address and the destination IP address for the granting or denying the permission for the traffic flow. This has very certain functioning and allow the traffic on the basis of the protocols such as TCP(transmission control protocol),UDP(user datagram protocol) etc.

All the given option are correct because IPv4(internet protocol version 4), TCP pots and UDP ports are the protocol types for source and can be filtered through extended ACL. Thus the correct option is all of the above.

. What is meant by the term three tier architecture.?

Answers

Answer:

  The three tier architecture is based on the client and server architecture. It is basically maintain the independent module on the individual platform.

In the three tier architecture, it include various functional process, data computer storage and the user interface are basically developed in this architecture.

The three tier architecture are:

Presentation layerApplication layerData layer

What is the purpose of the "def" keyword in Python?

a) It is slang that means "the following code is really cool"

b) It indicates the start of a function

c) It indicates that the following indented section of code is to be stored for later

d) b and c are both true

e) None of the above

Answers

Answer:

d) b and c are both true.

Explanation:

The purpose of def keyword in python is to indicate start the function and it also indicates that the piece of code following the def keyword is to stored so that it can later be used in the program.

For ex:

def check(n):

   if n==10:

       return True

   return False

   

n=int(input("Enter an integer\n"))

if check(n):

   print("n is 10")

else:

   print("n is not 10")

In the above written code the function check is defined by using the keyword def.It also tells the interpreter to store the code because we will need it in future.

The correct option is (d) b and c are both true.

When The main purpose of the def keyword in python is to indicate the start of the function and also it indicates that the piece of code following the def keyword is to be stored so that it can later be used in the program.

Python

For ex:

After that def check(n):

Then if n==10:

Now the return True

return False

After that n=int(input("Enter an integer\n"))

Then if check(n):

Now, print("n is 10")

else:

print("n is not 10")

In the above-written code that is the function of the check is defined by using the keyword def. It also tells the interpreter to store the code because we will need it in the future.

Find out more information about Python here:

https://brainly.com/question/14492046

If you are looking at the OSI model Protocol Stack, what layer is the only layer with both a header and trailer?

Answers

Answer: Data-link layer

Explanation:Data link layer is the second layer of the OSI(Open system interconnection) that functions by managing the movement of the data/information into physical link. This layer encapsulates both header and trailer.

Header is  the part of data link layer that has the purpose of having control  data and its activities which are added at the start of PDU(protocol data unit)  like addressing .Trailer is the part that serves as containing the information of control which gets attached at the bottom part of the PDU

What is the purpose of a filename extension? How can you restore a file that you deleted from the hard disk?

Answers

Answer:

The main purpose of the file name extension is that in the operating system it basically helpful for knowing the actual name of the file which we want to open in the system. The file name extension is also known as file suffix and file extension.

The file name extension are the character and gathering of the given characters after some time period that making the whole name of the record in the file system.

It basically enables a working framework, such as Windows and mac operating system (OS), figure out which programming on our PC the document is related with the particular file.

We can easily restore our file from hard disk system by two main ways as follows:

We can easily recover our file from the computer backup. Checked your deleted file in the recycle bin and then restore it.

If the code in a method can potentially throw a checked exception, then that method must:

a.)handle the exception

b.)have a throws clause listed in the method header

c.)neither handle the exception nor have a throws clause listed in the method header

d.)either handle the exception or have a throws clause listed in the method header

Answers

Answer:

d.)either handle the exception or have a throws clause listed in the method header

Explanation:

A checked exception that can be thrown in a method , necessarily needs to be handled in the method in one of the two ways:

Handle the exception in codeHave a throws clause in method header

For example, let us see both:

a)

public void mymethod(){

// Exception handling using try/catch block

  try{

  }

  catch ( IOException e){

  }

}

b)

public void mymethod() throws IOException{

   // Exception in the throws clause

}

Broker Ray is closely acquainted with the Subdivision Heights neighborhood of his town. Over the year, Ray has made it a practice to contact homeowners in person and also to send them quarterly mailings. This method of finding listings is known as:

Answers

No multiple choice?

Once the destination has been reached the network makes a connection at what layer to connect for transfer or data?

a) network b) data link c) physical d) transport

Answers

Answer: (C) Physical

Explanation:

 When the destination are selected by the network then, it makes the connection for transferring the data packets by using physical layer.

As, the physical layer is basically responsible for transmitting the data and reception of the data between the physical medium and device.

The physical layer basically provide the electrical interface during the transmission of data. The physical layer in the network basically provide the hardware elements like cable, ethernet and repeaters.  

Which component in a desktop PC converts electricity from AC to DC?
-SSD
-CPU
-PCIe Slot
-Power Supply

Answers

Answer:

Power Supply

Explanation:

A power supply unit in a Desktop PC converts AC power from the mains to low-voltage DC power needed by the computer. The power supply, commonly referred to as the PSU, is the metal box usually found in the corner of the case connected to the power through a cord. The PSU uses the switcher technology to convert AC input to DC. The typical voltages used are 3.3, 5, and 12 volts.

Answer: power supply

The data field in an ethernet frame contains between 46 and _______ bytes of information.

Answers

Answer: 1500 bytes

Explanation:

 In the ethernet frame, the data field basically contain 46 to 1500 bytes of information.  

The ethernet frame begins with the header, that basically contains MAC addresses source and its destination in the network, along with some other information. The center part of the given frame contain genuine information. The edge of the frame closes with the field known as Frame Check Sequence (FCS).

The tag information or data is also being added for creating the particular data field of the MAC client.  

Standards are used when an organization has selected a solution to fulfill a policy goal.

True

False

Answers

Answer: True

Explanation:

 Yes, the given statement is true that the standard are basically used when the organization are selected for the solution to fulfilling the particular policy goals. In the organization are standard are basically require for the software and hardware solutions to control the security risk.

Adopting standard in the organization it provide many advantages like it helps to save money and productivity of the organization or company.

Standard are basically establish a common throughput in the organization which provide all the department in the organization on the same level.

Dеclarе and allocatе mеmory (on thе hеap) for a two-dimеnsional array of strings namеd carMakеs with 20 rows, еach with 6 columns

Answers

Answer:

string ** carMakes=new string*[20];  

   for(int i=0;i<20;i++)

   {

       carMakes[i]=new string[6];

   }

Explanation:

The above written piece of code is in C++ and it will declare and allocate memory on the heap for a 2-D array of strings with the number of rows 20 and number of columns 6 with name of the array carMakes.

To declare a 2-D array in C++ we use new keyword.

When using _____, developers are required to comply with the rules defined in a framework. (Points : 2) inheritance
base classes
object-oriented constructs
contracts
None of the above

Answers

Answer: Contracts

Explanation:

The contract is the mechanism which is basically used by the developers to follow the set of rules that is defined in the framework with the proper specification in the API ( Application programming interface).

The contract is the proper agreement between the two and more developers so that they must follow the rules that is mentioned in the agreement contract.  

The contract is widely used in the software development process in which all the possible design requirement are mentioned according to the needs of the client.

Therefore, Contract is the correct option.

What are three key characteristics of an OS process?

Answers

Answer:

 The three key charactertics of the operating system process is that:

The process of the operating system is the instance of the program that can be executed and run.The operating system process is represented by the code and program. It is also indicated by the parameters that it is also allow in the situation if any interruption occur. In the case of the Linux operating system the process is also used to indicate as task in the system.  

. Convert your age into binary and then to hexadecimal. Show your work.

Answers

Explanation:

Age = 23.

To convert a base 10 number to hexadecimal number we have to repeatedly divide the decimal number by 16 until  it becomes zero and store the remainder in the reverse direction of obtaining them.

23/16=1 remainder = 5

1/16=0 remainder = 1

Now writing the remainders in reverse direction that is 15.

My age in hexadecimal number is (15)₁₆.

Defining a(n) ______________ of an object is called instantiation.

(Points : 2) object
link
instance
prototype

Answers

Answer: Instance

Explanation: Instantiation is the creation of the instance for any particular object in the field of object-oriented programming concept. The previously defined objects are realized in a program.This object that gets created in the class is provided with the name and placed in the memory.

They have their certain methods, process and properties on which they access.Other options are incorrect because instantiate object does not gets created from the link, object or prototype.Thus, the correct option is instance.

Companies discourage their suppliers from joining their extranets.

True

False

Answers

Answer:

False

Explanation:

A controlled private network that can be used for information exchange by using internet technology and the telecom system of the public.

It allows the outside user with authentication to partially access the network for business information exchange securely.

Thus companies encourage the suppliers to use extranets to share information or operations related to a business so as not to lag behind in the technologically competitive era.

Companies actually encourage their suppliers to join their extranets as it can streamline communication, enhance collaboration, and improve efficiency in the supply chain. The statement is false.

Extranets are secure networks that extend internal company resources to external parties like suppliers, enabling shared access to information and data.

However, many companies may not actively encourage suppliers to join their extranets due to concerns over data security, privacy, and the complexity of managing external access.

What is an independent data mart?

Answers

Answer: Independent data mart is the subset of data that is obtained from the data warehouse in independent form. Various traits are used for the display of the independent data marts.They are built in the independent manner from each other .

It is utilized by the organization for the analysis of the certain unit of data in compact form. Independent data mart does not persist the central data warehouse. The operational sources gets distributed in the independent section known as data marts. It is usually preferred by small organizations.

Which of the following is NOT a MySQL table storage engine?
(a) Blackhole
(b) SuperNova
(c) MyISAM
(d) MRG_MyISAM
(e) InnoDB

Answers

Answer:

(b)Supernova.

Explanation:

MYSQL storage engines are software modules that are used by the database management systems to read,update,create from a database.

There are basically two types of storage engines Transactional and Non-Transactional.

Among the names engines provided all of them are MYSQL storage engines except supenova.

The technology which is not a MySQL table storage engine is: B. SuperNova

What is MySQL?

MySQL can be defined as open-source relational database management system (RDBMS) that was designed and developed by Oracle Corporation in 1995. Also, MySQL was developed based on structured query language (SQL).

In Computer technology, there are various storage engine that are designed and developed for use in MySQL table and these include the following:

BlackholeMyISAMMRG_MyISAMInnoDB

However, SuperNova is not a MySQL table storage engine.

Read more on MySQL here: https://brainly.com/question/24443096

When passing data values between different machines with different operating systems what problems have to be solved?

Answers

Final answer:

When passing data values between different machines with different operating systems, several problems need to be solved, including file compatibility, encoding and character sets, and network connectivity.

Explanation:

When passing data values between different machines with different operating systems, there are several problems that need to be solved:

File Compatibility: Different operating systems may have different file formats and structures, making it difficult to open and read files created on one system on another system. For example, a file saved in a specific format on a Windows machine may not be compatible with a Mac machine.

Encoding and Character Sets: Different operating systems may use different encoding and character sets, which can lead to garbled or incorrect data when transferring files. For example, a file containing special characters in one encoding system may not be correctly interpreted by another system.

Network Connectivity: Transferring data between machines with different operating systems may require establishing compatible network connections and protocols. This can involve configuring firewalls, setting up appropriate network protocols, and ensuring both machines can communicate effectively.

To address these problems, various software and tools are available that enable file conversion, encoding conversion, and network compatibility. Additionally, establishing good communication channels and protocols between machines is essential for successful data transfer.

Java uses a right brace to mark the end of all compound statements. What are the arguments for and against this design?

Answers

Explanation:

The argument is for the right braces.The right braces are used for simplicity.The right brace always terminates a block of code or a function.

The argument against right brace is that when we see a right brace in a program,we are not obvious about the location of the corresponding left brace because all or multiple  statement end with a right brace.

Final answer:

Java's use of right braces to end compound statements ensures clear visual demarcation and structured code. However, it can also introduce syntax errors if not used correctly and limits coding style flexibility. The strict syntax provided by braces can be beneficial in preventing logic errors, especially when used with consistent indentation and statement-ending semicolons.

Explanation:

Using a right brace { } in Java to mark the end of compound statements is a design choice with its own set of pros and cons. One of the arguments in favor of this approach is the visual clarity it provides. With braces, it is immediately evident where a block of code begins and ends, which can be especially helpful with nesting multiple layers of logic and scopes within each other. Proper use of braces in conjunction with consistent indentation practices can greatly enhance the readability of the code.

On the other hand, there are some arguments against the obligatory use of braces, primarily focused on the potential for errors and the rigidity it imposes on coding style. For instance, if a programmer forgets to include a closing brace or places it incorrectly, it can lead to a syntax error. Furthermore, this requirement enforces a certain structure which might reduce the flexibility that programmers have in laying out their code, as seen in languages like Python which uses indentation rather than braces to denote blocks of code.

Additionally, in languages like JavaScript, omitting braces for single-line control structures is permissible, which can lead to more concise code but also introduces the potential for inconsistently coded programs and harder to detect logical errors. Therefore, while using braces imposes a strict syntax, it can prevent some types of logic errors that might occur when they are optional. The use of semicolons (;) at the end of each statement is another syntactic rule that complements the use of braces, indicating the end of one statement and the start of another.

Name three "Hints" for computer systems design.

Answers

Answer:

The three hints for the computer system design is that:

Implementation is the important key feature while designing the computer system design. It also implement new application of the software and also help in the structure analysis and data modeling in the organization. Planning is efficient way for computer system design as it help the organization to understand the proper software architecture and modules. Performance should be good, efficient and useful for the computer system design and it increase the capability of fault tolerance in the computer system.

Analyze the impact of economic factors on the development of IT strategy decisions at the enterprise level of the organization.

Answers

Answer:

 The unstable economical factor affect on the development of the IT strategies. The economical condition also vary with the results which is basically depend upon the company product and services.

Due to weak economical factor, it become risky to the business in terms of economical growth, inflation rate and interest rate as these all are very important during the decision making process.

The economical factor are basically interlink with the political factor also. Interest rate also play an important role in the economical factor as it help in the growth and development of the company.

 

Answer and explanation:

Economic factors are those who influence the fluctuations of the economy. Among those factors we can identify interest rates, tax rates, law, policies, wages, and governmental activities. At the corporate level, in the Information Technology industry as in any other, those factors determine what decision entrepreneurs will take to conduct their businesses. Indirectly what investment managers will decide to choose, what the salary of the employees will be, what the size of production could be, and to what market the product could be offered.

[What is an ‘inspection’?

Answers

Answer:

 The inspection is the process where the trained people inspect or check the important documents and design thoroughly. The main function of the inspection is to check the proper quality of the document and design by the process analyzing, testing and examining.

Inspection basically provide various benefits as it increase the quality of the system by examine properly so that the document must be error free.

Inspection is required in all the workplace so it help to increase the productivity and efficiency of the organization.

Social engineering is deceiving or using people to get around security controls.

True

False

Answers

Answer: True

Explanation:

Social engineering, in regards to information security, it is referred to as the cognitive manipulation of an individual into divulging confidential data and information. This also tends to differs from social engineering within discipline and domain of social sciences, which usually does not concern with the divulging of confidential data and information.

Answer: FALSE

Explanation:

Write an application that calculates and displays the weekly salary for an employee. The main() method prompts the user for an hourly pay rate, regular hours, and overtime hours. Create a separate method to calculate overtime pay, which is regular hours times the pay rate plus overtime hours times 1.5 times the pay rate; return the result to the main() method to be displayed. Save the program as Salary.java.

Answers

Answer:

// import package

import java.util.*;

// class definition

class Salary

{

   // method to calculate weekly salary

   public static double fun(int p_rate,int r_hour,int o_hour)

   {

       // calculate weekly salary

       double w_salary=(p_rate*r_hour)+(o_hour*p_rate*1.5);

       // return salary

       return w_salary;

   }

   // main method of the class

public static void main (String[] args) throws java.lang.Exception

{

   try{

    // object to read value from user

    Scanner scr=new Scanner(System.in);

   

       System.out.print("enter hourly pay rate: ");

       // read hourly pay rate

       int p_rate=scr.nextInt();

     

       System.out.print("enter regular hours: ");

       //read regular hours

       int r_hour=scr.nextInt();

       

       System.out.print("enter overtime hours : ");

       // read overtime hours

       int o_hour=scr.nextInt();

       // call the method

       System.out.println("weekly salary of an employee :"+fun(p_rate,r_hour,o_hour));

   }catch(Exception ex){

       return;}

}

}

Explanation:

Read hourly pay rate, regular hours and overtime hours from user.Call the method sal() with these parameters.There weekly salary is calculated by multiply regular hours with p_rate and overtime hours with 1.5 time of p_rate.Sum both of them, this will be the weekly salary.return this to main method and print it.

Output:

enter hourly pay rate: 50                                                                                                  

enter regular hours: 35                                                                                                    

enter overtime hours : 15                                                                                                  

weekly salary of an employee :2875.0

The `Salary` application prompts the user for hourly pay rate, regular hours, and overtime hours, then calculates and displays the weekly salary using a separate method to calculate overtime pay.

Here's the Java program `Salary.java` that calculates and displays the weekly salary for an employee:

import java.util.Scanner;

public class Salary {

   public static void main(String[] args) {

       Scanner scanner = new Scanner(System.in);

       // Prompt the user for input

       System.out.print("Enter hourly pay rate: ");

       double hourlyPayRate = scanner.nextDouble();

       System.out.print("Enter regular hours: ");

       double regularHours = scanner.nextDouble();

       System.out.print("Enter overtime hours: ");

       double overtimeHours = scanner.nextDouble();

       // Calculate and display the weekly salary

       double weeklySalary = calculateWeeklySalary(hourlyPayRate, regularHours, overtimeHours);

       System.out.println("Weekly salary: $" + weeklySalary);

       scanner.close();

   }

   // Method to calculate overtime pay

   public static double calculateWeeklySalary(double hourlyPayRate, double regularHours, double overtimeHours) {

       double regularPay = regularHours * hourlyPayRate;

       double overtimePay = overtimeHours * hourlyPayRate * 1.5;

       return regularPay + overtimePay;

   }

}

Explanation:

The `main` method prompts the user for input: hourly pay rate, regular hours, and overtime hours.It then calls the `calculateWeeklySalary` method to calculate the weekly salary based on the provided inputs.The `calculateWeeklySalary` method calculates the regular pay and overtime pay separately, then returns the total weekly salary.Finally, the main method displays the calculated weekly salary.

You can compile and run this program to calculate and display the weekly salary for an employee based on the provided hourly pay rate, regular hours, and overtime hours.

Other Questions
Juicebox Inc., a fruit juice processing company, has been facing irregular demand patterns for the last two years. These large fluctuations have created a bullwhip effect for the company. Which of the following steps will Juicebox Inc. most likely take to cope with this effect?a. reduce the number of employees to cut costsb. follow the just-in-time inventory policyc. carry larger inventoriesd. reduce its annual production of juice Which of the following tools of DNA technology is incorrectly paired with its use?a. electrophoresisseparation of DNA fragmentsb. DNA ligasecutting DNA, creating sticky ends of restriction fragmentsc. DNA polymerasepolymerase chain reaction to amplify sections of DNAd. reverse transcriptaseproduction of cDNA from mRNA Will chromium metal dissolve in 10 M hydrochloric acid? a) yes b) no c) impossible to tell How do I write 8 ten-thousands The distance between the two islands showed on the map is 210 miles a ruler measure distance on the map as 3 1/2 inches how many miles would be represented by 1 3/4 inches on the map graph the region of solution of the given linear inequalityx>7 Write the elements of (a, b,c}-{a, b, d}) {c, d), where a, b, c, and d are distinct Which of the following statements is false? If a number is a natural number, then it is rational.If a number is a whole number, then it is rational.If a number is a fraction, then it is rational.If a number is an integer, then it is irrational. ( I think it could be this one but this rational number thing confuses me)I will mark brainliest! A 76.00 pound flask of mercury costs $145.00. The density of mercury is 13.534 g/cm3. Find the price of one cubic inch of mercury by calculating intermediate values. What is the price of one pound of mercury? A water rocket can reach a speed of 76 m/s in 0.060 seconds from launch.What is its average acceleration? Fill in the Activity Log correctly using the following information. Jon performed exercise and the following information needs to be logged in to the log: He did vigorous cardiovascular exercise in the form of running for 15 minutes, and then he ended with a 6-minute cool-down. He started with a 5-minute warm-up. He did these activities on 1/20/10. a planned procedure to test a hypothesis is called bias true or false Find the value of a for which the solution of the inequality is all real numbers.3x+8+2ax3ax4aHow do I solve for a and what does a stand for please help meeeeeee. What is the approximate buffering range of formic acid? a. You have a formic acid/potassium formate solution that has a pH of 4.75. What is the ratio of the formate to the formic acid? b. With respect to compilation, the syntax analyzer takes the lexical units from the lexical analyzer and uses them to construct hierarchical structures called . Which of the following observations is true? a. Fixed costs can be completely varied if the time period is sufficient. b. Fixed costs arise when some types of inputs can be bought only in big batches. c. Variable costs arise when inputs have a large productive capacity. d. In the long run, more costs become variable. During the light dependent reaction, the hydrogen ions go down their concentration from __________ producing ATP in the process. a. The stroma into the thylakoid lumen b. The thylakoid lumen into the stroma c. Across the inner membrane into the stroma d. The stroma across the inner membrane Anya was taking some medicine that upset her stomach. Later that day, when she drank orange juice, she became violently ill. Since then, Anya feels sick to her stomach if she even thinks about orange juice. One day when Anya is out with friends, the waitress puts a glass of grapefruit juice near her. Anya immediately feels sick to her stomach. Anya's nausea in response to the grapefruit juice is most likely the result of the use of depth and distance on a flag surface such as painting is called a. shading b. perspective c. illustrationd. fresco I need help I dont understand this at all