Which of the following is the best reason to use a macro?: *
a. You want to send a personalized form email to many people
b. You want to correct the citations in a research paper
c. You want to automate a repetitive task to save time
d. You want to build a table based on an Excel spreadsheet

Answers

Answer 1

Answer:c)You want to automate a repetitive task to save time

Explanation: Macro is the program that is utilized when there is a requirement of a task or operation to be repeated in a automatic way.This helps in saving the time without commanding the same operation to take place manually.

This program works by taking the into and generating the preset output sequence. Other options are incorrect because it does not help in email functions, correction of the citation in documents or generation of the table.Thus, the correct option is option(c).

Answer 2

The use of macros is best suited for automating repetitive tasks, which saves time and increases efficiency, especially in applications like Excel. C is correct.

The best reason to use a macro is to automate a repetitive task to save time. Macros are used to streamline activities such as data entry in Excel, through repetitive tasks like keyboard shortcuts or Automatic Completion. These utilities are designed for users to quickly navigate worksheets and automate tasks; thus, eliminating the need to perform monotonous actions.

Automation in general allows you to focus on more important activities rather than getting bogged down with tedious tasks. For instance, you might use macros to write little programs for formulas you use frequently, adding efficiency to your workflow.


Related Questions


Is 49 greater than y? Which below is correct?
A) 49 > y
B) 49 >= y
C) 49 < y
D)49 != y

Answers

Answer:

49>y

Explanation:

Given objective: Is 49 greater than y?

Among the options:  

a) 49 > y => 49 is greater than y

b) 49 >= y => 49 greater than or equal to y

c) 49 <y => 49 is less than y or in other words, y is greater than 49.

d) 49 !=y => 49 is not equal to y.

So the requires solution is represented by (a) namely, 49>y . This can be alternatively read as y<49, that is y is less than 49. The other options do not represent the given requirement as illustrated earlier.  

With an example in each, describe the use of two basic functions which are known by the "string.h" header file.

Answers

Answer:

strcmp(char * A, char * B);

strcat(char * A, char * B)

Explanation:

One of these basic functions is the function strcmp(char * A, char * B).

This functions compares if two strings are equal; If they are, it returns 0. If not, it returns 1;

So, an example:

char A[13] = "Buffalo Bills";

char B[13] = "Buffalo Bills";

if (strcmp(A,B) == 0)

printf("The strings are the same\n);

else

printf("The strings are not the same");

In this case, they are the same.

----------------------

If for example:

char B[13] = "Buffalo Billz"

It would fall in the else, A and B would not be the same strings.

--------------------------

Other function is the strcat(char * A, char * B);

This function takes two strings as an input, and concatenate them to the first.

For example:

char A[15] = "Buffalo";

char B[5] = "Bills";

strcat(A, B);

printf("%s\n", A);

The output is:

Buffalo Bills

Residential and business customers are paying different rates for water usage. Residential customers pay $0.005 per gallon for the first 6000 gallons. If the usage is more than 6000 gallons, the rate will be $0.007 per gallon after the first 6000 gallons. Business customers pay $0.006 per gallon for the first 8000 gallons. If the usage is more than 8000 gallons, the rate will be $0.008 per gallon after the first 8000 gallons. For example, a residential customer who has used 9000 gallons will pay $30 for the first 6000 gallons ($0.005 * 6000), plus $21 for the other 3000 gallons ($0.007 * 3000). The total bill will be $51. A business customer who has used 9000 gallons will pay $48 for the first 8000 gallons ($0.006 * 8000), plus $8 for the other 1000 gallons ($0.008 * 1000). The total bill will be $56. Write a program to do the following. Ask the user which type the customer it is and how many gallons of water have been used. Calculate and display the bill.

Answers

Answer:

// here is program in Java.

// import package

import java.util.*;

// class definition

class Main

{

   // main method of the class

public static void main (String[] args) throws java.lang.Exception

{

   try{

   // variable

   int gall;

   double cost=0;

       // object to read value from user

    Scanner scr=new Scanner(System.in);

     // ask user to enter type

    System.out.print("Enter customer type  (R for residential or B for business ):");

    // read type of customer

       char t=scr.next().charAt(0);

       if(t=='r'||t=='R')

       {

           System.out.print("enter the number of gallons:");

           //read number of gallons

           gall=scr.nextInt();

           // if number of gallons are less or equal to 6000

           if(gall<=6000)

            {

           // calculate cost

           cost=gall*0.007;

           // print cost

           System.out.println("total cost is: "+cost);

             }

           else

           {

           // calculate cost

            cost=(6000*0.005)+((gall-6000)*0.007);

            // print cost

            System.out.println("total cost is: "+cost);

           }

       }

       else if(t=='b'||t=='B')

       {

           System.out.print("enter the number of gallons:");

           //read number of gallons

           gall=scr.nextInt();

           // if number of gallons are less or equal to 8000

           if(gall<=8000)

            {

           // calculate cost

           cost=gall*0.006;

           // print cost

           System.out.println("total cost is: "+cost);

             }

           else

           {// calculate cost

            cost=(8000*0.006)+((gall-8000)*0.008);

            // print cost

            System.out.println("total cost is: "+cost);

           }

       }

   }catch(Exception ex){

       return;}

}

}

Explanation:

Ask user to enter the type of customer and assign it to variable "t" with scanner object.If the customer type is business then read the number of gallons from user and assign it to variable "gall". Then calculate cost of gallons, if   gallons are less or equal to 8000 then multiply it with 0.006.And if gallons are greater than 8000, cost for  first 8000 will be multiply by 0.006 and   for rest gallons multiply with 0.008.Similarly if customer type is residential then for first 6000 gallons cost will be multiply by 0.005 and for rest it will  multiply by 0.007. Then print the cost.

Output:

Enter customer type  (R for residential or B for business ):r

enter the number of gallons:8000

total cost is: 44.0

. Convert BAC4 from hexadecimal to decimal. Show your work.

Answers

Answer:

BAC4₁₆ = 47812₁₀

Explanation:

To convert from hexadecimal base system to decimal base system use this formula:

[tex]N = x_1 * 16^0 + x_2 * 16^1 + x_3 * 16^2 + x_4 * 16^3+ ... + x_n 16^n^-^1[/tex]

, where position of the x₁ is the rightmost digit of the number.

and:

A = 10.B = 11.C = 12.D = 13.E = 14.F = 15.

BAC4 = 11*16³+10*16²+C*16¹+4*16⁰ = 45056 + 2560 + 192 + 4 = 47812

What is the effect of block size in cache design?

Answers

Answer:

When designing a cache, you have to consider this things:

Delay. Miss rate. Area.

If the cache has a bigger block size may have a lower delay, but when miss the miss rate will be costly. If an application has high spatial locality a bigger block size will do well, but programs with poor spatial locality will not because a miss rate will be high and seek time will be expensive.

Final answer:

The block size in cache design determines the amount of data stored in each cache block. It affects cache hit rate and wasted storage space. The optimal block size depends on various factors.

Explanation:

The block size in cache design refers to the amount of data that can be stored in each cache block. It plays a crucial role in determining the cache's performance and efficiency. A larger block size can lead to a lower cache miss rate and higher hit rate, as it allows for more data to be fetched from memory at once. However, a larger block size also results in more wasted storage space, known as internal fragmentation.

For example, let's consider a cache with a block size of 64 bytes. If the processor requests a single 4-byte integer, the cache will still load the entire 64-byte block into the cache. This leads to wasted space and can reduce the effective cache capacity. On the other hand, if the block size is too small, the cache may experience frequent cache misses, as it would need to load more blocks to fetch the required data.

Choosing the optimal block size involves balancing the trade-off between cache hit rate and wasted storage space. Factors like the access pattern of the application, cache associativity, and memory bandwidth also influence the effect of block size on cache performance.

Please list the computer data hierarchy from bit to database

Answers

Answer:

 Data hierarchy is basically define to the data which is organized in the systematic manner. The main concept of the data hierarchy is to check the basic structure of the data. It basically involve the fields records and files for the data organization.

The following is the list of the computer data hierarchy from nit to address are:

1) Bit: It is the smallest unit of the data.

2) Field: The collection of all the characters in the data is known as field.

3) Record: The collection of the different fields is known as records.

4) File: The collection of various types of records in the database is known as file.

Should technology managers strategize technology projects? Why? How?

Answers

Answer: Yes, technology projects should be strategized by the manager of technology.

Explanation: It is correct for technology manager to crate technology projects because the manager would be persisting the knowledge about the technology.Without the correct strategy, which is required to accomplish the goal, the technical project cannot be achieved.

The manager can carry out the work with the help of the critical thinking  and the knowledge about the technologies that should be used.By analyzing the need of the project ,he/she can plan the right steps of strategy.

____________ is a hardware or software tool for recording keystrokes on a target system.


Keyboard

KeyScanner

Keylogger

RootKit

Answers

Answer: Key-logger

Explanation: Key-logger is the device that is used in the capturing the keystrokes of the user and then recording it .They can be in the form of software or hardware.The recording made by key logger consist the data typed through the keyboard like email, messages, passwords .

Other options are incorrect because keyboard is the hardware device used for inputting data in the system, key-scanner is the input reading device in the form of library and rootkit is malicious collection of software to disturb the function of the computer system.Thus the correct option is key-logger.

A keylogger, which can be software or hardware, records keystrokes on a computer to capture sensitive information like passwords. Rootkits, in contrast, provide backdoor access to systems.

The correct answer to the question is Keylogger. A keylogger is a tool that can be either hardware or software, designed for the purpose of capturing keystrokes on a computer system. Once activated, it records every key pressed and sends this information to an attacker or stores it for retrieval. In contrast, a rootkit is a type of malware that provides unauthorized users with administrative access to a computer system, often without being detected.

Keyloggers are considered a form of spyware because they covertly monitor and record users' keystrokes, which can include sensitive information like passwords and personal data. The information captured by keyloggers can be used for malicious purposes, such as identity theft or unauthorized access to secured systems.

What is the purpose of a mutator?

Answers

Answer:

To change the value of private or protected members.

Explanation:

Mutator also known as setters are the member function or method in class that is used to set or change the value of private or protected members. Mutator does not return any values. They are very important in Object Oriented Programming.

___________ are used when an SQL statement has to be executed multiple times in a Python script.

a

Prepared statements

b

Cursors

c

Connections

d

Queries

Answers

Answer: (A) Prepared statement

Explanation:

 Prepared statement is basically used in the structured query language (SQL) statement which are basically execute multiple times in the python script.

The prepared statement is typically used in the SQL statement for update and queries. It is used to executed for the similar SQL statement and it has high efficiency.

It basically is in the form of template where the database compile and perform various query optimization.

A(n) _____ provides an organization with vision and leadership in the area of business conduct.

Corporate ethics officer
Code of conduct
Code of ethics
Common good practice

Answers

Answer: Corporate ethics officer

Explanation:Corporate ethics officer is the officer that is responsible for examining the business conduct of an organization. The duties of the officer includes the looking after the functioning, execution,development and other factors of the business.They follow the leadership to maintain the ethics and polices.

Other options are incorrect because code of conduct and ethics are general codes that can be followed by schools, individual etc and not necessarily by organization.Common good practices is the practicing of the general good habits and  conducts. Thus, the correct answer is Corporate ethics officer

BI systems have eliminated a common organizational problem, which is simultaneously having too much data but somehow not enough.
a. True
b. False

Answers

Answer:

True

Explanation:

Most of the organization suffers from InfoObesity, i.e., too much data without the proper holding structure for this.

Business intelligence abbreviated as BI plays a major role in the determining the planning strategies of an organizations and serves multiple purposes which includes measurement of performance towards business objectives, quantitative analysis, data reporting and sharing, etc.

BI systems helps in eliminating InfoObesity, by manging the data and filtration of the data with proper data structure to serve specific purposes.

Think about an internet of things that we are using on our daily life and how it can be hack and what consequences this will be on us.

Answers

Answer:

Internet of thing is a generic term given to all the devices that are interconnected via internet. The things are all the devices that we use in out daily lives such as refrigerators, cars, homes ,e.t.c The interconnections of all the things allows better operation and high ease of daily life as the devices are calibrated to our needs hence automatically turn off if we don't use them. As an example the interconnected electric lights in smart homes know weather we are present in home or not and automatically turn off and on depending on our presence.

As an example of Internet of things device consider Smart Homes that use automation to regulate various operations such as lighting, air conditioning and other operations. If an rouge entity gets access to the system and is able to disrupt the operation's we can easily identify the consequences such as no light , no air conditioning among others. Even our access to our own house can be blocked thus making our life miserable.

Answer

responsible I think I wouldn't know

Explanation:

How many bits are necessary for a binary representation (unsigned) of:

a. The states of the U.S.A.?

b. The days in a year?

c. The inhabitants of California (est. 36,457,549)?

Answers

Answer:

Hi!

The answer to:

a. 6 bits.

b. 9 bits.

c. 26 bits.

Explanation:

a. For the states of the U.S.A, you need 50 or more combinations to represents each element.

If you use 6 bits, the possible combinations are 2⁶ = 64.  

b. For days in a year, you need 365 or more combinations to represents each element.

If you use 9 bits, the possible combinations are 2⁹ = 512.

c. For inhabitants of California, you need 36,457,549 or more combinations to represents each element.

If you use 26 bits, the possible combinations are 2²⁶ = 67,108,864. If you use 25 bits instead of 26, then you have 2²⁵ = 33,554,432 combinations. These possible combinations are not enough to represent each inhabitant.

Why is exception handling an issue for testers in object-oriented developments?

Answers

Answer:

 The exception handling occurs when the unexpected events are happened, which basically require special type of processing. The exception handling is the mechanism that mainly handle all type of the exception during the run time process in the system.

In the object oriented programming, the testers face issue during the development as it used for prevent the abnormal node in the program and also it customize the exceptional message in the system.

We basically used the try catch block in the exception handling as, it efficiently handle the difficult situation in the object oriented development.

Magnetic tapes are a good choice for backups that need to be kept for five or more years.

True

False

Answers

Answer:

True.

Explanation:

Magnetic tape is used to store data.It is one of the oldest technology for data storage.It is suitable for  high volume data and storing it for long duration.It's cost is also very less.

Magnetic Tapes are well suited for storing data for long duration because of it's durability.It's shelf life is 30-years.

An instance of an abstract class can be created using _____. (Points : 2) the new operator
encapsulation
a public accessor
None of the above

Answers

Answer:

The correct answer for the given question is the new operator.

Explanation:

An abstract class is those which have the only declaration of the abstract method, not a definition. Any class which inherits abstract class must define all the method of abstract otherwise it also be abstract.

To declared any abstract class following syntax is used  

abstract class class name

{

// abstract method  

}

To create an instance of an abstract class we can use a new keyword. The new keyword created the instance of an abstract class.

encapsulation is the feature of object-oriented we cannot create an object by using encapsulation so this option is wrong.

The public is an access modifier we cannot create an object by using public keyword so this option is also wrong.

Therefore the correct answer is new.

An expression using the conditional operator is called a(n) __________ expression.

Answers

Answer: Conditional expression

Explanation: Conditional operators are those operators that are used between two values or variables for the given condition. This operator return an answer after evaluating the condition that can turns out to be true or false .

They also help in increment and decrement of the variable value by one according to condition.Conditional expression are those expression that use conditional operator in their statement for gaining a return value according to the condition being true or false.

.Name two loaders used in Linux?

Answers

Answer:

LOADLIN(Load linux)    LILO(Linux Loader).

Explanation:

Loader is a computer program that is used in linux to load linux in the memory.In linux we have to install a special loader while in other operating system we do not need to  install the loader it comes in them by default.

The two most common loader in linux are as following:-

LOADLIN(Load Linux).LILO(Linux Loader).

Perform the following calculations. Make sure the units of the solution are correct.

a.10 Kbps * 3

b.10 Mbps * 3 sec

c.Convert 2400 bits to bytes

Answers

Answer:

30 Kbps

30 Mb

300 bytes

Explanation:

a. 10 Kbps * 3 = (10 * 3) Kbps = 30 Kbps [Note: numbers and units are aggregated and processed separately]

b. 10 Mbps * 3 sec  = (10 * 3) Mbps * sec = 30 Mbps*s = 30 Mb [Note: numbers and units are aggregated and processed separately]b

c. Byte is a unit of storage in a computer. 1 byte is made up of eight bits, while each bit  can be either 0 or 1.

1 byte = 8 bit

=> 1 bit = 1/8 byte

=> 2400 bits = 1/8 * 2400 = 300 bytes

A group of related files is stored in a(n

Answers

Answer: Records

Explanation:

A group of the related file is basically stored in a record as record is the collection of the related field.

A record is the object in the database that basically contain one and more than one value.

In the database, the records are also store in the form of table and in table the data are in the form of rows and columns. There is multiple table in the database and each of the table basically contain multiple records.

When a column is added to a table, it is the _____ column in the table. (Points : 2) first
last
second
third

Answers

Answer:

last

Explanation:

When a column is added to a table, it gets appended at the end of the table. For example, suppose we have a table called Student with a column 'Name'. Now suppose we want to add another column called class to the table, then the new column will be added at the end of the table. So the new table structure will consist of <Name,Class>.The same procedure will apply for any other added column.

Answer:

The correct answer for the given question is "last ".

Explanation:

When we add a column into the table so the column will add in the last of the table .We can use alter command in SQL to added the column in the table.

The syntax for adding new column into the table is given below .

ALTER TABLE table_name

ADD column_name datatype;

For example  

Suppose we have to add the address column into the student table.

ALTER  TABLE student  

ADD address varchar (50);

This query will add the column in last  of the table  .

Typically, the first item in defining a function is _____. (Points : 4)

an open curly brace "{"
passing an argument
passing the function
naming the function

Answers

Answer: Naming the function

Explanation:

 The first item for defining the function is the naming of the function. In the function, the first line is known as header and rest of the function is known as body of the function.

The function name is the first step while defining the proper function as we can define the actual function name on which the program are rest based.

We can define a function from which the each value from the set of the components are basically associated with the second component in that particular function.

 

Discuss why Web services are important to Web development

Answers

Answer:

 The web services is the software that uses over the internet and also used various standard XML message system.

The web services is basically used in various applications to make the platform and various types of the technologies independent.

The web services play very important role in the web development as, it allow various types of applications to share data and different types of services with each other in the system. It is used in various UNIX applications and java for the communication purpose.

What are CRC cards and use-case scenarios used for in object-oriented analysis and design?

Answers

CRC stands for class, responsibilities, and collaborators. The analyst can use these concepts when beginning to talk about or model the system from an object-oriented perspective. CRC cards are used to represent the responsibilities of classes and the interaction between the classes.

CRC cards and use-case scenarios are crucial tools in object-oriented analysis and design. They involve defining class responsibilities and interactions (CRC) and detailing user-system interactions (use-case scenarios). These tools help construct efficient computer models by identifying patterns and structures within systems.

Understanding CRC Cards

CRC cards are a brainstorming tool used to represent the responsibilities of classes and how they interact with other classes. Each card typically has three sections: the class name, the responsibilities of the class, and the collaborators (other classes) that the class interacts with.

For example, a CRC card for a Library class might look like this:

Class: LibraryResponsibilities: Manage books, Issue loans, Return booksCollaborators: Book, Member, Loan

Use-Case Scenarios

Use-case scenarios describe the interactions between a user and a system to achieve a specific goal. These scenarios help in understanding the functional requirements of the system by detailing the sequence of actions and reactions required to complete a given task.

For example, a use-case scenario for borrowing a book might include:

User logs inUser searches for a bookUser requests a loanSystem checks for availabilitySystem issues the loan

Both CRC cards and use-case scenarios provide a structured approach to analyze and design a system, ensuring that all necessary interactions and responsibilities are accounted for.

Describe practices that enable software designers to think about using patterns?

Answers

Answer:

 Firstly, the software designer basically understand the pattern of the system by think with broader perspective. By establish the pattern first design the proper context of the system.

The pattern dependency basically focus on manage the relationship between the different types of the modules. It basically provide the actual guidance which increase the reuse-ability of the module.  

We can also extract the given pattern that from the level of the abstraction and lack cohesion modules are basically difficult to maintain.

What is ‘validation’?

Answers

Talking about models, validation is the process by the model is corroborated and its outputs are compared with experimental results. From validation, it can be seen how quantitative and qualitative accurate the model is, and it can be confirmed model fidelity to the real world.

What is an E-R diagram?

Answers

Answer:

 The E-R diagram is basically used in the designing and debugging the relational database in the field of the information system and software engineering.

In the E-R diagram, entity is the object and the component of the data that is used to represent as rectangle.

This E-R diagram is basically used to control the conjunction in the DFD (Data flow diagram). Entities, attribute and action are the three main components that are used in the E-R diagram.

. Explain the notions of WAN, LAN, MAN and PAN.

Answers

Answer:

Explanation:

WAN (Wide Area Network), is a computer network that joins several local networks, although their members are not all in the same physical location.LAN (Local Area Network) is a network of computers that cover in a small area for example a house, an apartment or a building. One part of the topological definition is the physical topology, which is the actual arrangement of the cables or media.MAN (metropolitan area network) is a network of computers that interconnects users with computer resources in a geographic area or region larger than area covered by a large local area network (LAN)PAN (Personal Area Network.) Is a network used to connect different personal computer devices centered on an individual person workspace.

Final answer:

Networks are categorized into WAN, LAN, MAN, and PAN based on their geographical coverage and usage, ranging from expansive (like the internet) for WAN, to personal space for PAN. Wi-Fi is a common technology used for creating LANs that allow devices to connect wirelessly within a certain area.

Explanation:

Networks come in various sizes and are categorized based on their geographical span and usage. Here we explore four kinds: Wide Area Network (WAN), Local Area Network (LAN), Metropolitan Area Network (MAN), and Personal Area Network (PAN).

WAN is a network that covers a broad area, potentially spanning countries or continents. It can be made up of multiple LANs and connects devices across long distances, such as the internet. LAN, on the other hand, is restricted to a small geographical area, typically a single building or campus, and offers high data transfer rates. It is commonly used in homes, schools, and offices.

MAN encompasses a larger area than LAN but smaller than WAN, often spreading across a city or metropolitan area. It is useful for connecting several LANs within that city to allow networks to communicate with each other. Lastly, PAN is the smallest network, intended for personal use within a range of a few meters. It typically involves devices like smartphones, tablets, and wearables interacting with each other.

Wi-Fi is a widely adopted technology enabling wireless LANs, described by the IEEE 802.11 series of standards. It's a key part of many networks, providing connectivity in homes, offices, and public hotspots. People might pay a monthly fee or get access for free, depending on the business model of the ISP or facility providing the Wi-Fi service.

Using a word processor of your choice, write the pseudocode for an application that allows a user to enter the price of an item and computes 10 percent sales tax on the item and prints out for the user the original price and the tax and the total. Remember to declare the class and the main method.

Answers

Answer:

// here is pseudo-code and implementation in java.

import java.util.*;

// class definition

class Solution

{

// main method of the class

public static void main (String[] args) throws java.lang.Exception

{

   try{

    // scanner object to read innput

       Scanner s=new Scanner(System.in);

        // variables

      double item_cost;

      System.out.print("Please enter cost of item:");

   //read the cost of item

      item_cost=s.nextDouble();

   // calculate 10% tax on the item

      double tax=item_cost*0.1;

   // print original cost

      System.out.println("original cost of item is: "+item_cost);

   // print tax on the item

      System.out.println("tax on the item is: "+tax);

   // print total cost of item

      System.out.println("total cost of item is:"+(item_cost+tax));

   }catch(Exception ex){

       return;}

}

}

Explanation:

Read the original cost of item from user and assign it to variable "item_cost". Calculate 10% tax on the cost of item and assign it to variable "tax".Print the  original cost and tax on item.Then add the cost and tax, this will be the total  cost of item and print it.

Output:

Please enter cost of item:125

original cost of item is: 125.0

tax on the item is: 12.5

total cost of item is:137.5

Answer:

#Python

class PriceTax:

   def __init__(self): #Main method

       self.itemPrice = int(input("Price of your item: "))

       self.tax = 0.1

       self.total = round(self.tax*self.itemPrice,2)

       print("\nOriginal price: ", self.itemPrice)

       print("Tax: %d%%" % (self.tax*100))

       print("Total: ", self.total)

   

price = PriceTax()

Explanation:

We define a class called PriceTax with a main method __init__, we asked for the user input and store the int value in an attribute called itemPrice, we define the tax attribute and we calculate the total by multiplying the predefined tax and the item price entered by the user. Finally, we print the original price, the tax, and the total. Note that for this to work we instantiate the class 'PriceTax' first under the variable price.

Other Questions
The following standards have been established for a raw material used to make product O84: Standard quantity of the material per unit of output 8.9 meters Standard price of the material $ 19.00 per meter The following data pertain to a recent month's operations: Actual material purchased 5,300 meters Actual cost of material purchased $ 104,520 Actual material used in production 5,100 meters Actual output 680 units of product O84 The direct materials purchases variance is computed when the materials are purchased. What is the materials price variance for the month you can read 52 pages per hour. You read for an hour and half. How many pages have you read? You must read 130 pages for homework. Can you complete the assignment in two hours? Explain your reasoning ________ is the first component of an operational customer relationship management system that supports a broad range of business processes, such as tracking and managing customer history and preferences, account and contact management, and order processing and tracking. Prove or disprove that the intersection of any collectionofclosed sets is closed. 1. Hernn compr un pasaje de ida y vuelta. lgico ilgico 2. Matilde va a viajar con Hernn. lgico ilgico 3. Hernn busc su pasaporte. lgico ilgico 4. Los documentos personales de Hernn estn en su mochila. lgico ilgico 5. Hernn tiene mucho equipaje. lgico ilgico A placekicker must kick a football from a point 36.0 m (about 40 yards) from the goal. Half the crowd hopes the ball will clear the crossbar, which is 3.05 m high. When kicked, the ball leaves the ground with a speed of 22.8 m/s at an angle of 51.0 to the horizontal. (a) By how much does the ball clear or fall short of clearing the crossbar? (Enter a negative answer if it falls short.)(b) Does the ball approach the crossbar while still rising or while falling? Match the question with its correct answer.TermDefinitionCul es tu nmero de telfono?A) Siete siete cinco, tres nueve ocho, dos cuatro cero cero.Cul es su direccin?B) Calle Sur, nmero 7.Dnde vives t?C) Yo vivo en Barcelona.Cul es tu correo electrnico?D) caledonia34@hotmail.com Which of the following has the greatest kinetic energy? A. a mass of 4m at velocity v. B. a mass of 3m at velocity 2v. C. a mass of 2m at velocity 3v. D. a mass of m with a velocity of 4v. One number is 5 times a first number. A third number is 100 more than the first number. If the sum of the three numbers is 555, find the numbers. Select the correct statement. ""Brother"" and ""male sibling"" are not synonymous. It cannot be known a priori that a brother is a male sibling. ""A brother is a brother"" is a non-trivial statement. ""A brother is a brother"" and ""A brother is a male sibling"" differ in cognitive value. ""A brother is a brother"" and ""A brother is a male sibling"" dont differ in cognitive value. What is the correct equation for calculating the average atomic mass for 3 isotopes? (pls be 100%of your answer pls no guessing)Add all the masses together and divide by 3 Add all the protons together and divide by three Multiply the percent abundance by each mass, add them up, and then divide by 3 Multiply the percent abudance by each mass and add them up Read the excerpts from the two poems by William Blake. From "The Lamb" Little Lamb who made thee Dost thou know who made thee From "The Tyger" When the stars threw down their spears And waterd heaven with their tears: Did he smile his work to see? Did he who made the Lamb make thee? Tyger, Tyger burning bright, In the forests of the night: What immortal hand or eye, Dare frame thy fearful symmetry? Which statement best describes the similarities between the speakers in "The Lamb" and "The Tyger"? The most inferior cartilage of the larynx is the _________ and serves as the landmark for tracheotomies. Question 1 of 100.5 PointsWhich country controlled most of the territory in Latin America prior to Independence?A. EnglandB. FranceC. GermanyD. SpainReset SelectionMark for Review What's This?Question 2 of 100.5 PointsPrior to Independence, which country controlled the territory now known as Brazil?A. EnglandB. SpainC. PortugalD. FranceReset SelectionMark for Review What's This?Question 3 of 100.5 PointsThe term for a person of European descent born in Latin America is:A. creoleB. mulattoC. gringoD. mestizoReset SelectionMark for Review What's This?Question 4 of 100.5 PointsThe period before Independence is known as the _____ period.A. RomanticB. RealisticC. LiberatedD. ColonialReset SelectionMark for Review What's This?Question 5 of 100.5 PointsA conquistador was:A. An artist who explored Latin AmericaB. An artist involved in the conquest of the sublimeC. A Spanish explorer-soldier involved in the conquest of Latin AmericaD. A creole who sought independence from SpainReset SelectionMark for Review What's This?Question 6 of 100.5 Points_____ was a Creole involved in the struggle for Latin American independence.A. Simon BolivarB. Fidel CastroC. Che GuevaraD. Francisco GoyaReset SelectionMark for Review What's This?Question 7 of 100.5 PointsEuropeans referred to the native peoples of Latin America as:A. mestizosB. creolesC. IndiansD. LatinosReset SelectionMark for Review What's This?Question 8 of 100.5 PointsThe first academy of art in Latin America was located in:A. Mexico CityB. Buenos AiresC. LimaD. SantiagoReset SelectionMark for Review What's This?Question 9 of 100.5 PointsImmediately following Independence, art in Latin America was dominated by images of:A. Spanish horsesB. The King and Queen of SpainC. ConquistadorsD. The leaders of Independence movementsReset SelectionMark for Review What's This?Question 10 of 100.5 PointsStudents in Academies of Art trained by copying:A. Renaissance paintingsB. Greek and Roman stylesC. African masksD. Mayan stone carvingsReset SelectionPlease give me the answer for these!! An object moves in one dimensional motion with constant acceleration a = 5 m/s^2. At time t = 0 s, the object is at x0 = 2.7 m and has an initial velocity of v0 = 4.3 m/s. How far will the object move before it achieves a velocity of v = 6.4 m/s?Your answer should be accurate to the nearest 0.1 m. Creating an implementation plan, implementing the change, and monitoring the impact of the change are important parts of: A. Personal response to change B. Dealing with disgruntled employees C. The change process D. The Ladder of Inference There is an old saying that goes, Every time I go one step forward, I get bumped two steps backward. Taken literally, what would the person's forward prgess be after going through this process 23 times? Explain the Subtraction Property of Inequalities. Question 19 Which variable gas plays a major role in the formation of a) Nitrogen b) Oxygen c) Carbon Dioxide d) Water Vapor Why did white settlers see native Americans as a hurdle to us expansion