Which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently?

Answers

Answer 1

Answer:  

The answer is "SCMS".  

Explanation:  

MIS stands for management information systems. This system studies information systems and use in business and other organizations. This system is categories in many forms in which SCMS helps businesses manage inventories.  

The SCMS stands for Serial Copy Management System. It is a system that allows users to copy digital content by showing how much they would copy.  In this process, the user will be copying digital information via authorization flags.

Related Questions

Lily's supervisor asked her to add visual interest to the company Web site by tilting images at a slight angle. Lily knows this transformation will differ depending on the browser used to view it. Which vendor prefix property will allow her to apply the transformation when the page is viewed in Chrome and Safari?

Answers

Answer: WebKit transform style

Explanation:

This is a type of vendor prefix which is a string of characters which are related to a specific browser engineer. WebKit is related to chrome, safari, Android browser.

Jasper, a businessperson, has no connection with Yale University, but he has a new line of computer software that he would like to market to university students and faculty under the name of "Yale Software." Which statement is correct?a. Jasper may in all likelihood register the name "Yale Software" under the Lanham Act.b. It is unlikely that Jasper will be able to register the name "Yale Software," because it has a secondary meaning.c. Jasper may in all likelihood be able to copyright the name "Yale Software" under the Copyright Act.d. It is unlikely that Jasper will be able to register the name "Yale Software," because it falsely suggests a connection to an institution.

Answers

Answer:

The answer is letter D.

Explanation:

It is unlikely that Jasper will be able to register the name "Yale Software," because it falsely suggests a connection to an institution.

Write an application that displays the factorial for every integer value from 1 to 10. A factorial of a number is the product of that number multiplied by each positive integer lower than it. For example, 4 factorial is 4 * 3 * 2 * 1, or 24. The output would then be The factorial of 4 is 24. how i do solve this Java Programming Problem?

Answers

Answer:

The program to this question can be given as:

Program:

class Main //define class.

{  

public static void main(String args[])  //define main method

{  

 int i,Factorial=1;  //define variable.

 for(i=1;i<=10;i++)

 // for loop

 {    

     Factorial=Factorial*i;  //variable hold value    

     System.out.println("Factorial of "+i+" is: "+Factorial);  //print value  

 }    

}  

}  

Output:

Factorial of 1 is: 1

Factorial of 2 is: 2

Factorial of 3 is: 6

Factorial of 4 is: 24

Factorial of 5 is: 120

Factorial of 6 is: 720

Factorial of 7 is: 5040

Factorial of 8 is: 40320

Factorial of 9 is: 362880

Factorial of 10 is: 3628800

Explanation:

The description of the above java program can be given as:

In the above factorial program firstly we define the Main class. In this class, we define the main method. Then we define the main method, in this method, we define a variable that is  "i and factorial". The variable i is used in the loop and the variable factorial is used for holding factorial value. Then we define for loop it is an entry control loop. In this loop we calculate factorial form numbers 1 to 10. and print the values.

A technology upgrading strategy is utilized by incumbent companies in a mature industry to deter entry by investing in costly upgrades that potential entrants would have trouble matching.​ True or False?

Answers

Answer:

The answer is TRUE.

Explanation:

A technology upgrading strategy is utilized by incumbent companies in a mature industry to deter entry by investing in costly upgrades that potential entrants would have trouble matching. That is a true statement.

Assume that printStars is a function that takes one argument and returns no value. It prints a line of N stars (followed by a newline character) where N is the value of the argument received. Write a statement that invokes printStars to make a line of 35 stars.

Answers

Answer:

printStars(35);

Explanation:

public class Question {

   public static void main(String args[]) {

     printStars(35);

   }

   public static void printStars(int numberOfStars){

       for(int i = 1; i <= numberOfStars; i++){

           System.out.print("*");

       }

       System.out.print("\n");

   }

}

What does C4 refer to in the function =MATCH(C4,earnings,-1)?
A. The search row
B. The named range
C. The lookup value
D. The match type

Answers

Answer:

The match type

Explanation:

This command is used to find the smallest value from lookyp array that is larger than look up value. lookup value in lookup array.

This command is look like:

=Match (Lookup Value,lookup array, match type)

in given example

lookup value is C4, Lookup Array is earnings and -1 is match type.

due to -1,

this function find the value from earnings that is smallest in array but larger than C4.

An administrator has two servers that host the same web content, but only one server is utilized at a given time.
What can be configured that can help to evenly distribute work across the network, and make use of both servers in a manner that is transparent to the end-users?

a. stateful packet filtering
b. load-balancing
c. failover servers
d. proxy servers

Answers

Answer: (B) Load balancing

Explanation:

 The load balancing is one of the computing element that helps in improving the workload distribution across the multiple resources of the computing such as disk driver, network links, CPU (Central processing unit) and the computer clusters.

The load balancing is basically refers to the distribution technique that help the incoming traffic in the network.The load balancing also improve the responsiveness. Increases the various types of application availability.

Therefore, Option (B) is correct.

A conventional uniprocessor has __________ .
a. a single instruction stream and a single data stream
b. a single instruction stream and multiple data streams
c. multiple instruction streams and a single data stream
d. multiple instruction streams and multiple data streams

Answers

Answer:

The correct option to the following question is option (A).

Explanation:

SISD is used in the uni-processors systems which executes an individual instruction streams at a time by which we control an individual memory for the storage of data.

It is the flow or the sequence of an individual data or instructions which controlled on the systems.

Whereas SISD is different from the SMID and it is not used in the Uni-processor systems

What's the purpose of maintaining a network of digital forensics specialists?

Answers

Answer:

Explanation:

Digital forensics comes under forensic science, which is mainly used to investigate and search for evidence of crime through electronic devices i.e. computer systems.  

Digital forensics specialists are mainly used to deal with the cases related to electronic devices i.e. computers, to search for evidence of the case, which helps to make the correct decision.

Final answer:

The purpose of maintaining a network of digital forensics specialists is to tackle cybercrimes, support legal processes, and ensure digital security. They work with law enforcement and provide expertise in technology use and surveillance.

Explanation:

Purpose of Maintaining a Network of Digital Forensics Specialists

The purpose of maintaining a network of digital forensics specialists is multi-faceted. These experts play a crucial role in addressing cybercrimes, which have evolved with advancements in digital communications and encrypted digital streaming. The forensic psychology aspect involves understanding the behavior of individuals within the criminal justice system, including the assessment of the reliability of eyewitnesses and jury selection. Additionally, these specialists support legal situations by determining what happened in cases involving digital evidence and formulate interpretations that influence both public and private sector decisions.

To combat crimes that use advanced technologies, large corporations and law enforcement agencies rely on the expertise of digital forensics professionals to navigate the complexities of technology and surveillance. They also help inform policy and practice, as seen in crime mapping and analysis, which utilizes GIS technology to digitally plot and analyze crime data to aid law enforcement strategies.

In a broader societal context, digital forensics specialists contribute to addressing the challenges posed by misuse of technology, such as unchecked data collection and surveillance by powerful entities. They assist in ensuring digital security and protecting sensitive information, advocating for integrity and responsibility in the digital age.

Which professional organization is responsible for the development and continued monitoring of the curriculum standards for sport management degree programs?

A) AAHPERD
B) NCAA
C) NFHSA
D) NASSM

Answers

Answer:

Option D is correct.

Explanation:

The North American Society for Sport Management (NASSM), was established in 1985, and its purpose was to promote the study, research, and development in the field of sports management.

It currently publishes a research journal called the Journal of Sport Management, which is used as a model for sports management in several universities across the US.  

You want to create Web pages that can easily adapt to and serve multimedia content to smartphones, tablets, gaming devices and smart TVs, as well as to traditional desktop computers, without the use of plug-ins.
Which of the following would be best suited for this purpose?

Answers

Answer:

HTML5

Explanation:

HTML5 has features to create a webpage or pages without using external plug ins. With the help  of API's we can alos add content related to multimedia.

A ________ cloud allows an organization to take advantage of the scalability and cost-effectiveness that a public cloud computing environment offers without exposing mission-critical applications and data to the outside world.
a) hybridb) privatec) pointd) community

Answers

Answer:

a) hybrid cloud

Explanation:

Hybrid cloud -

It is mixes cloud computing methodology , which require a mixture of private cloud , on premises and the public cloud service and third party and thereby the balance between the two , is known as the Hybrid cloud .

This type of cloud enables more flexibility and the movement between the public and the private clouds .

Hence , from the statement of the question , the correct term from the given option is a) hybrid cloud .

What version of Windows Server 2016 can be used to share the same physical computer through each person connecting a keyboard, mouse, and monitor to a USB hub that connects to the server?

Answers

Windows server 2016 standard version for minimally virtual environments.

Explanation:

Basically windows server 2016 it is operating system where installed in server platform and connected to local network or VPN or wide area network. Since it is server type of operation end user can configure domain server and active directory in big server.

Windows 2016 has six server types where provided by Microsoft. End user has to select operating systems depends on number user and load of traffic in network.  End users can upgrade possible by paying extra price. Best practice to reinstall the OS with minimal down time.

Which terms are used in conditional logic functions? Check all that apply.

WHEN
IF
OR
NOR
IFTRUE
IFERROR

Answers

Answer:

The answer is "IF and IFERROR".

Explanation:

The conditional logic function is used in excel that use to generate a conditional equation. It is normal to use for many tasks to check whether facts are true or false and to make logical distinctions between words.

This function considers IF and IFTRUE as a conditional logic function. and others are not correct that can be defined as:

The NOR and OR is used as a boolean operator functions in excel that return true or false value only.IFTRUE and WHEN is used in programming language. It used as a macro and condition operator.

Condition statements are “IF, IFTRUE, IFERROR".

Explanation:

In programming languages  “IF <Conditon>’” is used. Normally if condition means, if given condition is true either single statement or multiple statement are executed.

With “IF <Conditon>” has “ELSE” or “ELSEIF <Conditonn>”, Else path execution of “IF <CONDITON>” is false.

Same “ELSEIF <CONDITION>” is executed  if “IF CONDITON” is false.

“OR and NOR” is logical operations, “When” is only on sql query mostly.

“IFTRUE” Mostly inbuilt function on some of programming languages, executer if condition is true.

“IFERROR” mostly inbuilt function on some of programming languages, execute if end error comes where assign value is wrong type or variable or identified is not found etc.

When talking about changes related to information​ technology, the text identifies three interrelated changes that are responsible for the bulk of innovations. These include the mobile digital​ platform, the growth of cloud​ computing, and​ ________.

A.faster networks
B.improved application software
C.the Internet
D.the growing use of big data
E.home computing

Answers

Answer:

The Growing use of Big data

Explanation:

In information technology big data is along with mobile digital platforms and cloud computing are responsible for bulk of innovations.

Big data is a large set of data that can be analyzed and used for pattern recognition, and extract information from different collection of data. This analysis or collection of data leads to innovation in the field of information technology.

Which of the following is not considered to be type of database client?A(n) _________ database is used to collect data that will be used for spotting trends that offer insights for tactical and strategic business decisions.

Answers

Answer:

An analytical database is used to collect data that will be used for spotting trends that offer insights for tactical and strategic business decisions

Explanation:

Analytical databases are optimized for analytics. This optimization is done so that the performance of query execution is faster and the database can be scaled easily.

It keeps data for business metrics, key performance indicators (KPI) etc. and provides information for business analytics.

In some organizations, facilities management is the identification, inventory, and documentation of the current information systems status—hardware, software, and networking configurations. _________________________

Answers

Answer:

Following are the statement is False

Explanation:

Because in the organizations there are the following computer components and software are managed by that person who is professional in the Information Technology department and IT administrator so this comes under IT management.

So, That's why the following statement is False.

Write a loop that displays all possible combinations of two letters where the letters are 'a', or 'b', or 'c', or 'd', or 'e'. The combinations should be displayed in ascending alphabetical order:

Answers

Answer:

In what programming language?

Explanation:

Bob gets an e-mail addressed from his bank, asking for his user ID and password. He then notices that the e-mail has poor grammar and incorrect spelling. He calls up his bank to ask if they sent the e-mail, and they promptly tell him they did not and would not ask for that kind of information. What is this type of attack called?

Answers

This type of attack is called as phishing emails.

Explanation:

Normally any bank will not ask end user about login details such user id, password, pin number in email. So bob as think and before responding the mail. Moreover this type email to be considered as hacker email, who want to access the bob accounts and do access his account and steal money from bob accounts.

Luckily bob contacted bank to stop further hackers not to his accounts. Since it is grammar mistake bob understood it is hackers who asking bob user id and password.

Bob has prompted these type of mails are called phishing emails. Better to avoid it.

Final answer:

The attack described in the question is known as phishing, which is a deceitful attempt to obtain sensitive information like passwords via email by pretending to be a legitimate entity. Spear phishing is a more targeted form of phishing. Both are examples of social engineering techniques used by cybercriminals.

Explanation:

The type of attack described in this scenario is known as phishing. Phishing is a form of cyber attack where attackers use fraudulent emails that appear to come from legitimate sources, such as a bank, to trick individuals into providing sensitive information like passwords and user IDs. The method often involves poor grammar and incorrect spelling, and banks will never ask for such sensitive information via email.

Sometimes phishing attempts can be more targeted and sophisticated, this is called spear phishing, which involves emails personalized with information known about the individual to increase the chances of success. This type of activity is a part of larger social engineering techniques, where hackers use psychological manipulation to trick users into making security mistakes or giving away sensitive information. These criminals exploit human weaknesses to bypass sophisticated security measures by simply asking for confidential information.

. Use of communications and information systems that are familiar to users is a part of which key principle? A. Security
B. Reliability, Scalability, and Portability
C. Resilience and Redundancy
D. Interoperability

Answers

Answer

Option B.Reliability, Scalability, and Portability.

Explanation:

Use of communications and information systems that are familiar to users is a part of Reliability, Scalability, and Portability.

So option B is correct one

The principle related to the use of familiar information systems by users is Interoperability, which supports seamless interaction with other systems, ensuring reliability, efficiency, and security. The correct option is D. Interoperability.

Use of communications and information systems that are familiar to users falls under the key principle of D. Interoperability. This principle implies that different information systems, devices, and applications should be able to work together within and across organizational boundaries in order to facilitate efficient and effective integration of technology and exchange of information. Specifically, when systems are interoperable, they not only enhance user experience by utilizing familiar interfaces, but also support functionality that allows for effective communication and data exchange, which is crucial for the development of national IT infrastructures with high transmission capacity and access to interactive public e-services.

An organization may face the choice of outsourcing IT development versus in-house service development to meet requirements such as security, efficiency, availability, and the needed transmission capacity. By focusing on interoperability, the organization ensures that its IT infrastructure can interact with other systems seamlessly, which is essential for maintaining reliability and optimizing cost without compromising on security and essential functionalities like confidentiality, integrity, and availability of information.

To output the contents of a fully-filled two-dimensional array using pseudocode, write out the elements in the columns within a row, before moving to the next row, using a ________ loop within another.

A. DOWHILE
B. REPEAT UNTIL
C. DO
D. None of the other answers are correct

Answers

Answer:

B.

Explanation:

Based on the information provided within the question it can be said that the loop that should be used is a repeat until loop. This is because this loop will continue cycling until a certain condition is met. In this situation, the loop breakout condition would be the output of the final element in the last column and row of the two-dimensional array.

Final answer:

To output the contents of a fully-filled two-dimensional array using pseudocode, you can use a nested FOR loop. The outer loop will iterate over the rows of the array, while the inner loop will iterate over the columns within each row.

Explanation:

To output the contents of a fully-filled two-dimensional array using pseudocode, you can use a nested FOR loop. The outer loop will iterate over the rows of the array, while the inner loop will iterate over the columns within each row. Here's an example:

FOR row = 1 TO number_of_rows
   FOR column = 1 TO number_of_columns
       OUTPUT array[row][column]
   END FOR
END FOR

In this pseudocode, number_of_rows and number_of_columns represent the dimensions of the array. The OUTPUT statement is used to display the value of each element in the array.

A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting these vulnerabilities.A. corporate spyB. ethical cyber criminalC. hacktivistD. white hat hackerE. data harvester

Answers

Answer: white hat hacker

Explanation:

Like other forms of hacker, white hat hackers also have wide range of knowledge of breaking into systems, overriding firewalls, bypassing security protocols and can also do all other things hackers do. But what differentiates white hat hackers is the motive behind what they do, in that they carry out all this test not for their personal gain but for the benefit of the owners and also with the approval of the owners. Because after carrying out tests on the ways of exploiting the loop holes in the system they reveal it to the manufacturer or system owners for correction.

_______________ refers to the type of artificial intelligence that leverages massive amounts of data so that computers can improve the accuracy of actions and predictions on their own without additional programming.

Answers

Answer:

Machine learning

Explanation:

Machine learning is a field of artificial intelligence (AI) that provides systems  to automatically learn and improve from processing and leveraging data without being explicitly programmed.

With the use of machine learning computer programs can be developed so that they can access data and use it learn for themselves.

Thus,

Machine learning refers to the type of artificial intelligence that leverages massive amounts of data so that computers can improve the accuracy of actions and predictions on their own without additional programming.

Agape was asked to make a recommendation regarding short-range wireless technologies to be supported in a new conference room that was being renovated. Which of the following would she NOT consider due to its slow speed and its low deployment levels today?A. ANTB. BluetoothC. InfraredD. NFC

Answers

Answer:

C. Infrared

Explanation:

According to my experience in the field of information technology, I can say that the one technology that she would not consider is infrared. Even though infrared is used in for many applications such as remote controls and sensors it is not that good for wireless communications. This is because compared to the other options available, infrared is only short range, the speeds at which it can transmit are very low, and any physical object can immediately block the signal and cause interference.

Concentric circles on a disk platter where data is stored;________
A new file system developed for Windows Server 2012;_________
It allows increased stability for disk storage and improved features for data recovery and error checking;__________

Answers

Answer:

Tracks

Resilient File System (ReFS)

Explanation:

Concentric circles on a disk platter where data is stored is called TracksThe new file system developed for Windows Server 2012 is called Resilient File System (ReFS). It allows increased stability for disk storage and improved features for data recovery and error checking

Write a function called check_nums that takes a list as its parameter, and contains a while loop that only stops once the element of the list is the number 7. What is returned is a list of all of the numbers up until it reaches 7.

Answers

Answer:

Following are the program in the Python Programming Language:

def check_nums(length): #define function

 my_lst=[]  #set list type variable

 n=0  #set integer type variable

 while(length[n] != 7): #set the while loop  

   my_lst.append(length[n])  #append liat in my_lst

   n+=1  #increament in n

   if(len(length)==n): #set if condition

     break  #break the loop

 return my_lst  #return the list

l=[4,6,2,55,16,7,81]  #set list variable and assign list init

print(check_nums(l)) #call and print the function

Output:

[4, 6, 2, 55, 16]

Explanation:

Here, we define a function "check_nums()" and pass an argument in its parentheses inside the function,

we set list data type variable "my_lst" and integer type variable "n"we set while loop and pass the condition is the variable "length[n]" is not equal to the 7 then, the value of "length[n] " is appends to the variable "my_lst" and increment in the variable "n" by 1.we set if condition and check when the length of the variable "length" is equal to the variable "n" then, break the loop and return the value of "my_lst".

Finally, set the list type variable "l" and assign the list of numeric value in it then, call and print the function "check_nums"

In this exercise, using the knowledge of computational language in python, we have that this code will be written as:

The code is in the attached image.

We can write the python as:

def check_nums(length):

my_lst=[]  

n=0  

while(length[n] != 7):  

  my_lst.append(length[n])  

  n+=1  

  if(len(length)==n):

    break  

return my_lst  

l=[4,6,2,55,16,7,81]  

print(check_nums(l))

See more about python at brainly.com/question/13437928

Which statement about muzzleloaders is true? All muzzleloaders are rifles. All muzzleloaders have only one barrel. Muzzleloaders are safer and easier to use than modern firearms. Muzzleloaders are early firearms that are loaded from the open end.

Answers

Answer:

Muzzleloaders are early firearms that are loaded from the open end

Explanation:

A muzzleloader is any firearm into which the projectile and usually the propellant charge is loaded from the muzzle of the gun.

This is distinct from the more popular modern designs of breech-loading firearms.

Thus, muzzleloaders are early firearms that are loaded from the open end.

Early firearms that loaded with an open end were known as muzzleloaders.

Guns known as muzzleloaders are loaded by placing the bullet and propellant (such as black powder) into the open end of the weapon's barrel. Contrast this with contemporary firearms, which use cartridge-based gunpowder. Prior to the development of breech-loaded firearms, muzzleloaders had a long history and were frequently used. The most prevalent muzzleloaders are the single-barreled models, most often employed for target shooting and hunting. But double-barreled and even multi-barreled muzzleloaders are also available.

Therefore, the correct option is D.

Learn more about muzzleloaders, here:

https://brainly.com/question/29887462

#SPJ6

Your question is incomplete, most probably the complete question is:

Which statement about muzzleloaders is true?

All muzzleloaders are rifles. All muzzleloaders have only one barrel.Muzzleloaders are safer and easier to use than modern firearms. Muzzleloaders are early firearms that are loaded from the open end.

Juan comes across documentation from his organization related to several information security initiatives using different standards as their reference. Which International Organization for Standardization (ISO) standard provides current guidance on information security management?

Answers

Answer:

Answer to the following question is ISO 27002.

Explanation:

ISO(International Organization for Standardization) 27002 or ISO/IEC 27002 is referred to as it is the standard supplementary that hs pay particular attention to the information security to secure those organizations which might be chosen to apply.  

Purpose:

The main purpose of the ISO 27002 is to collect all the important information securities guidelines that design for the particular purpose to help the firm or an organization to improve and maintain the management of its information security.

All ____ language programs tell the computer how to manipulate the contents of memory locations step-by-step.

functional
baseline
procedural
logical

Answers

Answer:

logical

Explanation:

logical

What kind of attack allows for the construction of LDAP statements based on user input statements, which can then be used to access the LDAP database or modify the database's information?

Answers

Answer:

LDAP injection

Explanation:

LDAP injection is a kind of assault on a web application where hackers place code in a client input field with the aim of gaining unauthorized access in to the system or retrieve information.

At the point when a web application doesn't satisfactorily sanitize client provided input, hackers might have the option to change the construction of a LDAP statement which will run with similar permissions that executed the command.

Other Questions
A newborn is screened for congenital hypothyroidism and is found to have the disorder. When educating the mother about the importance of the infant taking thyroid hormone supplement, what should be included in the education? 8 people eat at Charlie Brown's for Thanksgiving. How many different seatingarrangements can be formed around the ping pong table? A major software company is arranging a job fair with the intention of hiring 6 recent graduates. The 6 jobs are different, and numbered 1 through 6. No candidate can receive more than one offer. In response to the company's invitation, 136 candidates have appeared at the fair. a. How many ways are there to extend the 6 offers to 6 of the 136 candidates? {1 point} b. How many ways are there to extend the 6 offers to 6 of the 136 candidates, if we already know that Computer Joe is getting an offer, but we do not know which? {1 point} C. How many ways are there to extend the 6 offers to 6 of the 136 candidates, if we already know that Computer Joe is getting an offer for job number 2? {1 point} d. How many ways are there to extend the 6 offers to 6 of the 136 candidates, if we already know that Computer Joe is not getting any offers? {1 point} e. How many ways are there for 3 interviewers to select 3 resumes (one resume for each interviewer) from the pile of 136 resumes for the first interview round? When BranchCache is being utilized in an office and a client computer makes a subsequent request for a file, what will indicate to the client where the file can be retrieved from the cache in the branch office? Marlin, a physicist in a large corporation, has been asked by his professional association to present a scientific paper at the national convention. This type of recognition will help Marlin fulfill his ________ needs.a.social esteemb.self-actualizationc.psychological Observing the size of a herd of elephants that are all the same species would be an observation at the __________ level.A. ocommunityB. ecosystemC. populationD. individual Which of the following correctly displays the sequence of developmental milestones?A) blastula gastrula cleavageB) cleavage gastrula blastulaC) cleavage blastula gastrulaD) gastrula blastula cleavage Mike installed a new external DVD drive. The installation program required a reboot. As the system rebooted, Mike got a Blue Screen of Death (BSOD) error before Windows fully rebooted. He shut off the system and disconnected the external DVD drive. What should he try next? A bowling ball encounters a 0.760-m vertical rise on the way back to the ball rack, as the drawing illustrates. Ignore frictional losses and assume that the mass of the ball is distributed uniformly. The translational speed of the ball is 8.57 m/s at the bottom of the rise. Find the translational speed at the top. Explain why nitrate fertilizers may not be suitable for application in soils with low redox potential what does hazel notice and remember others saying to herBook the fault in our stars PLEASE HELP!!I need help with US History A. "Aftermath of World War Quiz" for Connexus. please help! I really don't wanna fail, but some of these questions are literally opinion questions.-Use the drop-down menus to complete the sentence. (the choices for all of them are "deportations, hysteria, strikes, violence")The general public responded to the threat of the influenza epidemic with___. It responded to the challenge of labor disputes with___, and to racial tensions with___.-Trace the impact of World War I on the Prohibition movement. Arrange the events in order, starting with the first event on top.(United States enters World War I.World War I ends.Congress ratifies the Eighteenth Amendment.General public begins to oppose the Eighteenth Amendment.)-Gavrilo Princip assassinated Archduke Franz Ferdinand because he believed that all Slavic people should have their own homeland. The sense of placing primary emphasis on one's own culture is an example of what factor that led to World War I?A. militarismB. alliancesC. imperialismD. nationalism-How did new naval technology impact World War I?A. Germany engaged in unrestricted submarine warfare to gain tactical advantages.B. The Allies used U-boats to attack and sink German ships without warning.C. Navies became less focused on manpower since most submarines could operate on their own.D. War at sea became less deadly since submarines were used to observe the enemy, rather than attack.-Use the passage to answer the question.Based on the diary entry, what was the writers least favorite part of being in the Army Air Service?(from the Diary of Gustav Kissel Thursday, November 15, 1917Today has been one of my busiest. Ive been up four different times and have done two hours 25 minutes flying altogether. I flew over to Jans house and waved at her in her garden. I also practiced steep banks, zooms, spins, side-slips, stalling turns, and landing.In the afternoon I drilled my mechanics and also had to have one brought up before me for a calling down. He had refused to obey an order to sweep out a shed. I think I was just as frightened as he was.)A. doing drills with the mechanics under his commandB. disciplining men for refusing to obey ordersC. practicing air maneuversD. landing the airplane-What occurred, in part, because of President Wilsons Fourteen Points?A. The Central powers suffered four million military deaths, half of which were German soldiers.B. Germany requested an armistice to end the war and negotiate peace terms.C. The Paris Peace Conference took place without President Wilson in attendance.D. The United States ratified the Treaty of Versailles in 1920.-How did President Wilson attempt to gain the publics support for the League of Nations?A. He announced his postwar peace plan in his Fourteen Points speech. B. He assured Americans that the United States would be in charge of the League.C. He embarked on a railway speaking tour across the United States.D. He urged Republican senators to reject any compromise on the Treaty of Versailles.-In a paragraph, explain why President Wilson encountered opposition in the U.S. Senate in his efforts to ratify the Treaty of Versailles. Your response should discuss key terms such as League of Nations, Irreconcilables, Reservationists, isolationism, and interventionism.Please help me out here, I only listed the questions I need help with, but if you have or know all the answers please write them down so I can check my other answers or for others who need help. A skateboarder is attempting to make a circular arc of radius r = 11 m in a parking lot. The total mass of the skateboard and skateboarder is m = 87 kg. The coefficient of static friction between the surface of the parking lot and the wheels of the skateboard is s = 0.62 .(a) What is the maximum speed, in meters per second, he can travel through the arc without slipping? how do u slove for 3x-6=15 Which one of the following is true about risk and return?A) Riskier assets will, on average, earn lower returns.B) The reward for bearing risk is known as the standard deviation.C) Based on historical data, there is no reward for bearing risk.D) An increase in the risk of an investment will result in a decreased risk premium.E) In general, the higher the expected return, the higher the risk. 4x+(x-y/8)=17 and 2y+x-(5y+2/4)=2 by using elimination method A car dealer is interested in comparing the average gas mileages of four different car models. The dealer believes that the average gas mileage of a particular car will vary depending on the person who is driving the car due to different driving styles. Because of this, he decides to use a randomized block design. He randomly selects five drivers and asks them to drive each of the cars. He then determines the average gas mileage for each car and each driver. Can the dealer conclude that there is a significant difference in average gas mileages of the four car models? The results of the study are as follows. Average Gas Mileage Driver Car A Car B Car C Car D Driver 1 29 31 20 34 Driver 2 27 37 35 39 Driver 3 24 23 31 23 Driver 4 38 24 22 38 Driver 5 20 33 37 36 ANOVA Source of Variation SS df MS Rows 190.2000 4 47.5500 Columns 114.5500 3 38.1833 Error 534.2000 12 44.5167 Total 838.9500 19 Step 1 of 3: Find the value of the test statistic for testing whether the average gas mileage is the same for the four car models. Round your answer to two decimal places, if necessary. 2 different elements have the same number of neutrons Hydrogen 3 has a half life of 12.32 years a sample of h-3 weighing 3.02 grams is left for 15.0 years what will the final weight of H-3 sample be? If unions help workers secure pension benefits, so that those workers are less dependent on government social assistance after their retirement, then a. the for-profit unionized industries will be less productive. b. the for-profit unionized industries will be harmed. c. the union is economically harmful. d. the union is economically beneficial.