. Why use a sensitivity analysis?

Answers

Answer 1

Answer:

 Sensitivity analysis is the method in which it basically predict the final outcome of the decision. It analysis each variable individually and identify the dependency of the output value on the particular value of the input.  

The advantage of the sensitivity analysis is that it reduce the overall risk of the particular strategy and also impact of the system.

It basically work on the basic principle that firstly changed the structure and model and then observe the particular behavior of the model.


Related Questions

A ____ is any manipulation of data, usually with the goal of producing information.

decision

process

problem

system

Answers

Answer: Process

Explanation: Processing data in the computing field is referred as the manipulation and transformation of data into useful output. The raw data is transformed machine language data.The processing also consist of the operations performed on data.

Other options are incorrect because decision is the final judgement made regarding computing,problem is issue in system and system is the complete unit in which processing takes place.Thus, the correct option is process.

Write a program that allows the user to enter a time in seconds and then outputs how far an object would drop if it is in free fall for that length of time. Assume that the object starts at rest, there is no friction or resistance from air, and there is a constant acceleration of 32 feet per second due to gravity. Use the equation: distance = acceleration x time-squared divided by 2

Answers

Answer:

// here is code inn c++.

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

// variable

   int t;

   double acc=32;

   cout<<"Enter the time in seconds:";

   // read the time in seconds

   cin>>t;

   // Calculate the distance=acceleration x time-squared divided by 2

   double dis=acc*(t*t)/2;

   // print the distance

   cout<<"distance is: "<<dis<<" feet."<<endl;

return 0;

}

Explanation:

Read the time in seconds from user and assign it to variable "t". declare and initialize variable "acc" with 32.Find the distance as "dis=acc*(t*t)/2". Print the distance.

Output:

Enter the time in seconds:10

distance is: 1600 feet.

Which of the following are not valid assignment statements? A) total = 9;
B) 72 = amount;
C) yourAge = myAge;

Answers

Final answer:

Option B (72 = amount;) is not a valid assignment statement because a constant value cannot be assigned to another value, whereas valid statements involve assigning values to variables.

Explanation:

The question is asking which of the given assignment statements in the context of a programming language is not valid. An assignment statement typically involves assigning a value to a variable.

The correct answer among the options provided is:

B) 72 = amount; This is not a valid assignment statement because in most programming languages, the value or expression on the right is assigned to the variable on the left. Since '72' is a constant value and not a variable, it cannot be assigned a value.

On the other hand, options A and C are valid assignment statements:

A) total = 9; - This is valid because 'total' is a variable that can be assigned the value of '9'.C) yourAge = myAge; - This is also valid as one variable, 'yourAge', is being assigned the value of another variable, 'myAge'.

A confidential number used as an authentication factor to verify a user’s identity is called a:

a,PIN

b.User ID

c.Password

d.Challenge

Answers

Answer: (A) PIN

Explanation:

 PIN is the personal identification number which is basically used to verify the identity of the users. It is confidential number which is used as the authenticating factor.

The PIN is the combination of the number that is also use to authenticate the banking system with the users.

On the other hand, the other given options are incorrect because these are not used to identify the users identification process.

Therefore, Option (A) is correct.

Program 1: I’m buyin’ a Ferrari! If you’ve ever travelled to another country, you know that working with different currencies takes a while to get used to. As of the date of making this assignment, there are 9,240.00 Guinean Francs to $1 USD. For this program, design (pseudocode) and implement (source code) a program that prompts the user for the amount of U.S. currency they have, and converts it into Ginean Francs.

Answers

Answer:

// here is code in c++.

#include <bits/stdc++.h>

using namespace std;

int main()

{

// initialize one Guinean_Francs

   double Guinean_Francs=9240.00;

   int u_s_d;

   double tot_Guinean_Francs;

   cout<<"enter the amount in U.S dollar:";

   // read the dollar

   cin>>u_s_d;

   // conver it into Guinean_Francs

   tot_Guinean_Francs=u_s_d*Guinean_Francs;

   print the output

   cout<<"total Guinean Francs is :"<<tot_Guinean_Francs<<endl;

return 0;

}

Explanation:

Declare and initialize a variable "Guinean_Francs" with 9240.00.Then read the  U S dollar from user and assign it to variable "u_s_d".Then multiply u_s_d  with Guinean_Francs and assign it to tot_Guinean_Francs. This will be the  total Guinean Francs.

Output:

enter the amount in U.S dollar:25                                                                                                                            

total Guinean Francs is :231000  

What is meant by ""responsive design""?

Answers

Answer:

Supported by all devices,screen sizes and orientation.

Explanation:

Responsive design mostly used in Web designs.It is the approach in which the design of the web app must respond to behavior of user and the environment also based on the platform,screen size and orientation.

This should be done by using flexible grids,layouts and some smart use of CSS .

You can also use Bootstrap for responsive designs.

. Dеclarе a onе-dimеnsional array of 30 doublеs (on thе stack) namеd rainfall

Answers

Answer:

double rainfall[30];

Explanation:

Here we are declared an onе dimеnsional array named " rainfall "  of size 30  and type double.To declared a onе dimеnsional array we can use the following syntax.

datatype array-name[size];

So double rainfall[30];

Following are the program in c++

#include<iostream> // header file

using namespace std; // namespace

int main() // main method

{

 double rainfall[30]={45.5,78.9,67.78}; // array declaration and storing values

for(int i=0;i<3;++i) // iterating loop

{

    cout<<rainfall[i]<<endl; // printing the array elements

}

   return 0;

}

Output:

45.5

78.9

67.78

A common measure of transmission for digital data is the number of bits transmitted per second. Generally, transmission is accomplished in packets consisting of a start bit, a byte (8 bits) of information, and a stop bit. Using these facts, answer the following:

a. Compute the time required to transmit an image of 1200x800 pixels with 8 bits for gray of each pixel using a 50 M bits/sec. modem?

b.What would the time be at 3 M bits/sec, a representative of download speed of a DSL connection?

(c) Repeat a and b when the image is RGB colored with 8 bits for each primary color. f 20 colored frames per second

Answers

Answer:  a) 0,19 seg. b) 3,2 seg. c) 11,5 seg.  d) 192 seg.

Explanation:

a)  For each pixel in the image, we use 8 bits + 1 start bit + 1 stop bit= 10 bits.

Number of Pixels: 800*1200= 960,000.Bits transmitted: 960,000 x 10 = 9.6 * 10⁶ bits = 9.6 Mbitsif  the modem is able to transmit up to 50 Mbits in a second, we can calculate how much time it will be needed to transmit 9.6 Mbits, using this equality:

50 Mbit = 1 sec9.6 Mbit = x  ⇒  t= 9.6 / 50 = 0.19 sec

b)  If the modem speed changes to 3 Mb/s, all we need to do is just use the same equality, as follows:

3 Mbit = 1 sec9.6 Mbit = x  ⇒  t= 9.6 / 3 = 3.2 sec

c) Now, if we need to transmit a colored image , at a rate of 20 f/sec, we need to calculate first how many bits we need to transmit, as follows:

1 Frame= 800*1200* (24 bits + 3 start bits + 3 stop bits)=  28.8  Mbits1 Second= 20 frames/ sec = 28.8 Mbits *20 = 576 Mbits.If the modem speed is 50 Mb/s, we can use the same formula that we used for a) and b), as follows: 50 Mbit = 1 sec576 Mbits = x  ⇒  t= 576 / 50 = 11.5 sec

d) Same as c) replacing 50 Mb/s by 3 Mb/s, as follows:

3 Mbit = 1 sec576 Mbits = x  ⇒  t= 576 / 3 = 192 sec

The time that's required to transmit an image of 1200x800 pixels with 8 bits for gray is 151.6 million seconds.

How to calculate the time taken?

The time required to transmit an image of 1200x800 pixels with 8 bits for gray will be:

= (1200 × 800 × 8) / 50

= 151.6 million seconds.

The time needed to be at 3 M bits/sec, a representative of download speed of a DSL connection will be:

= 7.68/3

= 2.56 seconds.

Learn more about time on:

https://brainly.com/question/4931057

Write c++ function that receives input a person’s first name and surname, and then just displays the initials. For example: John Peter Joe, the initials JPJ must be displayed

Answers

Answer:

void Initials(string firstName,string lastName)

{

   cout<<firstName[0];

   for(int i=1;i<firstName.length();i++)

   {

       if(firstName[i-1]==' ')

       {

           cout<<firstName[i];

       }

   }

   cout<<lastName[0];

    for(int i=1;i<lastName.length();i++)

   {

       if(lastName[i-1]==' ')

       {

           cout<<lastName[i];

       }

   }

   cout<<endl;

}

Explanation:

The above written code is the function Initials which prints the full name.Parameters provided in the function are firstname and lastname in the format of string.You should include string header file for this code to run.

Index addressing is for traversing arrays.

True

False

Answers

Answer:

False.

Explanation:

Index addressing is not for only traversing the arrays but to also access the element,manipulate them.Though indexing is also used in traversing but it is not solely for that.Indexing in an array starts from 0 to size-1.

for example:-

We have an array a of size 10.So to access the element at position 6.We have to write.

a[5];

Manipulating it

a[5]=6;

What is the difference between congestion control and flow control? Where are each managed in TCP?

Answers

Answer: The differences between the flow control and congestion control are as follows:-

Flow control's traffic is controlled in the direction from sender to receiver whereas traffic control in congestion control be handles from the entrance of the network.Sender is reason for the traffic in flow control while transport layer creates the traffic in congestion control.Transport layer and data link layer are used for managing the traffic whereas congestion control has transport and network layer for handling the traffic.

The TCP for the congestion control works as elimination of the congestion in the sender's field in network layer and transport layer.Flow control is used in TCP to make surety about the non-overwhelming nature of sender towards receiver in the transport layer and data link layer.

Summarize who you believe cyber criminals are, and why?

Answers

Answer:

 The cyber criminals are the people that are engaged with getting the data in an unapproved way and furthermore mischief to the association henceforth are considered as cyber criminals.

Cyber criminals are people or groups of individuals who use innovation to committed the malicious exercises on computerized frameworks or systems with the aim of taking the organization data or individual information and producing benefit.

There are many types of cyber criminals that are:

Internet stalkersCyber terrorist Identity thieves

What are the two possible stereotypes allowed for package: (Points : 6) framework and private
modelLibrary and protected
framework and modelLibrary
framework and protected

Answers

Answer: framework and modelLibrary

Explanation: Stereotypes helps in the providing the control action to the class that is providing support to the other class in the  UML(Unified modeling language) model. For the package as the model element the stereotypes allowed are framework and modelLibrary.

framework stereotype applied on the package for providing due to  reusable components it persist. modelLibrary is the stereotype for the package that has reusable model elements.

Other options are incorrect because "private" and "protected" are not the stereotypes for the model element package.Thus the correct option is framework and modelLibrary.

A type of security control that takes measures to help restore a system is referred to as:


A.

preventative


B.

detective


C.

corrective


D.

all of the above

Answers

Answer:

C.  corrective

Explanation:

Security controls

These are actions or measures taken to maintain and/ or restore the security of the system. Security controls are categorized as corrective, preventive and detective, which are discussed below.

Corrective

Security controls which help in taking the corrective steps after the malicious activity has done damage to the system or restoring the security of the system are called corrective security controls.

These controls also act as preventive measures for future risks.

These controls perform the healing and have remedial action for the damage done to the system.

Once the system has been recovered, appropriate measures are put in place to avoid further damage.

The damage can be done to the computer system, its hardware and software resources or the data.

Examples include restoring the database from the backup file.

Updating or renewing antivirus software rectifies the security against virus.

For example, once the database has been restored, access control, antivirus and other measures are employed to prevent the database from being corrupted and to prevent system from being affected.

Preventive

Security controls which help in stopping the malicious activity from harming the system are called preventive security controls.

As per the name, these measures are employed to prevent any security breach.

These measures prevent any suspicious activity from taking place which may cause harm to the system.

Firewalls prevent unauthorized access.

Antivirus prevents malicious applications from running.

Login feature to give access only to authorized user.

Detective

Security controls which help in detecting the malicious activities and alerting the security personnel are called detective security controls.

As per the name, these measures are used to identify any suspicious activity and report them. Detective controls do not prevent or correct any security breach.

Alarms are employed to detect and alert any suspicious activity.

Intrusion detection system (IDS).

In an ideal situation, security controls are a combination of all the types mentioned above.

The type of security control involving measures that restore a system is referred to as: c. corrective.

What is Corrective Security Control?

A corrective security control can be defined as the type of security control measures that includes technical, administrative and physical measures which are initiated to help restore a system to its original state after a breach or an unauthorized activity has occurred.

Therefore, the type of security control involving measures that restore a system is referred to as: c. corrective.

Learn more about corrective security control on:

https://brainly.com/question/13484623

Write a paragraph on the orgin or development of ONE of the following elementss of the Internet:

a.) Usenet

b.) Listserv or mailing list

c.) BITNET

d.) IRC

e.) HYPERTEXT

f.) any computer hardware or device used to acces the Internet

Answers

Answer:

 (C) BITNET :

 BITNET is basically established in united state (US) in the 1981 and used in the cooperative world as wide area computer networking. The term BITNET is originally known as because it is time network.

It is also known as forward type of the networking and the BITNET can easily transfer the data of email and files from one network server to another server. The BITNET typically uses the RSCS protocol for the purpose of networking job and it is also use in the internal IBM, which is known as Virtual network (VNET).  

The BITNET is basically developed by the city university of the new York. It is used in the mainframe operating system for implementation the virtual memory system (VMS).  

A computer’s memory is composed of 8K words of 32 bits each. How many bits are required for memory addressing if the smallest addressable memory unit is a word?

13

8

10

6

32

Answers

Answer:

The minimum number of bits necessary to address 8K words is 13.

Explanation:

You have the number of words to address that is 8000 words, a word is the smallest addressable memory unit.  

8000 words can be addressed with [tex]2^{n}[/tex]  units. Now you have to find the value of n that approximates to the number of words.  

[tex]2^2=4\\2^4=16\\2^7=128\\2^{10}=1024\\2^{12}=4096\\2^{13}=8192[/tex]

So you can see that 13 bits are needed to address 8K words.

What are some steps in object-oriented design process? Explain with examples.

Answers

Answer:

The following are some steps for the object oriented designing process that are:

First, define the proper modes and the context use in the system. Then, design the process of the object oriented system architecture and define its main feature by using the architecture.Identify the given object from the object oriented system for construction of the model of the system.Then, finally specify the object interface in the system.

For example:

For implementing the flow of pipe, Firstly break the transformation into the different level of stages and then define the output and input properly between the pair of the stages. Then, differentiate the operation of each stage of the updates pipeline.

Subtract the following the Hex numbers:

67h

2Ah

Result is =

Answers

Answer:

3D ( in hexadecimal )

Explanation:

Converting the given hexadecimal numbers to decimal:

 67 (HEX) = 16*6 + 7 = 103 (Decimal)

 2A (HEX) = 2*16 + 10 = 42 (Decimal)

Subtracting the two numbers: 103 - 42 = 61 (Decimal)

Converting the result to Hexadecimal format:

61 = 16* 3 + 13

13 corresponds to D in hexadecimal.

So result in hex is 3D.

To summarize, the subtraction result for the two given hexadecimal numbers is 61 in decimal format or 3D in hexadecimal.

Write a small program basic c++, that defines a negative integer (between ‐1 and ‐255), converts it to a positive value and then displays it on the console window.

Answers

Answer:

#include <iostream>

using namespace std;

int main() {

int a=-156;//negative integer between -1 and -255.

a*=-1;//multiplying a to -1 so that it can become positive.

cout<<a;//printing a.

return 0;

}

Explanation:

The above written program is in C++ and in the program an integer a is defined with a negative value in the program it is -156.Then to convert it to positive integer we have to multiply a to -1 after that printing the value of a on the screen.

Wireshark is an example of what type of utility? A) Packet sniffer B) Port scanner C) Vulnerability scanner D) Content filter

Answers

Answer:A) Packer sniffer

Explanation: Wireshark is analyzer of packet which are open sourced.It helps in providing the services like troubleshooting, development analysis etc with the help of sniffing activity.The sniffing of the packet that a user owns is the technique for analyzing.

Other options are incorrect because port scanner provides data regarding the technique for network connection,vulnerability scanner scan the vulnerability of the network and content filter is used for filtering the excess web pages.Thus, the correct option is option(A).

Final answer:

Wireshark is a Packet sniffer used for capturing and analyzing network traffic in a readable format, making it different from port scanners, vulnerability scanners, or content filters.

Explanation:

Wireshark is an example of a Packet sniffer. Packet sniffers are tools used for network troubleshooting, analysis, software and protocol development, and education. Wireshark, specifically, captures packets in real-time and display them in human-readable format. It allows users to see the details of the packets being transmitted over the network, giving an in-depth understanding of the network traffic. This utility is not designed to scan ports, detect vulnerabilities, or filter content, which distinguishes it from options B, C, and D respectively.

Write a Scheme function called "sum" which takes an input function func and a nonnegative number n and outputs the value

func(1) + func(2) + .. + func(n)

Answers

Answer:

function sum(number) {

      if (number == 1) {

             return 1;

      }

      return number + sum(number -1);

}

Explanation:

This is a recursive function, it means that is a function that calls itself for example: if you call the function with sum(5) the process is :

sum(5)

   |______ 5 + sum(4)

                           |_______ 4 + sum(3)

                                                       |______ 3 + sum(2)

                                                                                   |_____2 + sum(1)

                                                                                                        |_____ 1

                                                                                                 

the result is 1+2+3+4+5 = 15

______The statement #include < math.h > defines the name of the current program you are writing as "math". (T/F)

Answers

Answer:

False.

Explanation:

The statement #include<math.h> means it is telling the compiler to include the the C language library math.h. It contains different math mathematical functions such as pow,ceil,floor,log,log10 etc.

#include is a preprocessor directive and it is used to paste the code the file that is provided in the #include to the current file.

Answer:

The statement #include<math.h> means it is telling the compiler to include the the C language library math.h. It contains different math mathematical functions such as pow,ceil,floor,log,log10 etc.

#include is a preprocessor directive and it is used to paste the code the file that is provided in the #include to the current file.

Explanation:

there is the link https://study.com/academy/lesson/variability-in-statistics-definition-measures-quiz.html

Which of the following is true of two-factor authentication?

A. It uses the RSA public-key signature based on integers with large prime factors.

B. It requires two measurements of hand geometry.

C. It does not use single sign-on technology.

D. It relies on two independent proofs of identity.

Answers

Answer: D)It relies on two independent proofs of identity.

Explanation: Two factor authentication is technique which uses two steps/stage for the verification or authentication.It is done for the extra security maintenance.IT is also known as 2FA. It consist of two different authentication component so that it penetrates through double protection layer .

Other options are incorrect because It RSA public key cannot be used for the authentication of private content. It does not use both hand geometry at same time for both the levels and It does not utilize only single sign-on technology. Thus, the correct option is option(D).

A level breach of security could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. А.low B. normal C, moderate D. high

Answers

Answer:

Option D is correct.

Explanation:

A high-level safety violation could be anticipated to have a serious or disastrous negative impact on organisational activities, organisational assets.

The effect of the violation on an organisation may be staggering, and sometimes unknown until the outcomes are achieved. It is strange that, owing to harmful or neglectful acts, the greatest incidents of compromise come from within the business ; it requires time for an organisation to recover.

A high-level security breach might have a serious or catastrophic impact on an employee's performance, assets, or people.

High-level security breach:

The impact of a violation on such an organization may be enormous, and the consequences are often unclear until they are realized.

It's odd that the majority of incidences of breach occur within the company as a result of damaging or negligent behavior; it takes time for an organization to recover.

Find out more information about 'Impact of a violation':

https://brainly.com/question/4543526?referrer=searchResults

To copy a list you can use this. list2 = list1[ : ]

True or False

Answers

Answer:

True.

Explanation:

The colon in square brackets is used to subsetting the list.

for example list1=[1,2,4,6,2,5]

print(list1[3:5])

This will print 6 ,2

Because it means the list from index 3 to 4 the last value is not inclusive.So if you write [:] it means the whole list and in the question we are assigning it to list2.So all the values from list1 will be copied to list2.

Add a script element into your HTML page that prints ‘hello’ to the browser’s JavaScript developer console.

Answers

Answer:

<!DOCTYPE html>

<html>

<body>

<h2>My Webpage</h2>

<script>

console.log("hello");

</script>

</body>

</html>  

Explanation:

The above written is the HTML code which contains a script tag in which javascript code is written to print hello on the javascript developer console.The script element contains the statement console.log("hello"); which is used to print the argument provided in the console.log on the console of the  javascript.

To see hello on the console you have open javascript console in the browser.Otherwise it will not be visible to you.

Create a single line comment that says ""Print results to screen""

Answers

Answer:

//""Print results to screen""

Explanation:

In c,c++,java,javascript // is used for the single line comment.

syntax:- // comment.

Whatever text that is followed after // is commented means this line will not get executed by the compiler.

Comments are used to explain the code to other person who is working on the code or trying to understand that code.

If the variable letter has been defined as a char variable, which of the following are not valid assignment statements to assign letter w to the variable?
A) letter = w;
B) letter = 'w';

C) letter = "w";

Answers

Answer:

The correct answer for the given question is option(A) and option(C) .

Explanation:

To declared any variable of character we using following syntax

char variable=' value';

char  letter='w';

In option(A)  their is no single quotes between character w .So this is not a valid assignment.

In option(C) their is double quotes between character w,no single quotes  between character w .So this is not a valid assignment.

In option(B) their is single quotes between character w .So this is a valid assignment.

So option(A) and option(C) are are not valid assignment statement.

A) Valid if `w` is a `char` variable.

B) Valid (`'w'` is a `char` literal).

C) Invalid (`"w"` is a `String`, not a `char` literal).

In Java, a `char` variable can only be assigned a single character enclosed in single quotes (e.g., `'a'`, `'b'`, `'w'`). Therefore, valid assignment statements must adhere to this rule.

Let's analyze each option:

A) `letter = w;`

- This statement assumes `w` is a variable holding a `char` value. If `w` is not declared as a `char` and does not represent a valid character literal, this assignment will cause a compilation error.

B) `letter = 'w';`

- This is a valid assignment statement. `'w'` is a character literal representing the character 'w'. It matches the type `char`.

C) `letter = "w";`

- This statement uses double quotes, which in Java denote a `String` literal, not a `char` literal. Therefore, this assignment will cause a compilation error because you cannot directly assign a `String` to a `char` variable.

Conclusion:

The assignment statement that is not valid to assign the letter 'w' to a `char` variable in Java is **C) `letter = "w";`**.

Which of the following is a/are question(s) that you should ask before you create an Access report?

What is the purpose of the report?
Who will use the report?
How will the report be distributed?
All the above questions should be asked

Answers

Answer: All the above questions should be asked

Explanation:  Access report are the reports in access which provides the summarized and formatted information display in database. The information in the database is extracted from tables.The access report requires purpose of the report before preparation and the accessing users information to be known .

It is asked to make sure about that no unauthorized access of the report can take place. Distribution of the report among the other user or client is also a major question to be asked as to keep the record of the accessing of access report..Thus, all the question mentioned in the options are correct.

.What are signals, how can they be used?

Answers

Answer:

 The signal is the function which that carry information about the particular phenomenon in the signal processing. A signal is also define as the change in the quantity which is observable.

In terms of telecommunication, a signal is the varying current, voltage and the electromagnetic wave which basically carries data or information. Signal can be in the form of audio, image and radar related.

A signal can be used be various signal processing system and telecommunication fr the transmission of information from one device to another device.    

Other Questions
Think of "sh" words for the following. 1.a place where things are sold________. A man weighs 180lbf at a place where g=32.1 ft/s2. What is his weigh(in lbf) on the moon where g=5.47ft/s2? what is his mass(in lb how did the success of the chruch lead to problems and calls for reform If you could photograph any event, place, animal, etc. in order to tell a story, what would youchoose to photograph? Why? assume that an avarage cell has a diameter of 7 micrometers (7x10^10 meter) which means it has a volume of 200 cubic micrometers. How many cells are ther in a cubic centimeter A division of the Gibson Corporation manufactures bicycle pumps. Each pump sells for $10, and the variable cost of producing each unit is 60% of the selling price. The monthly fixed costs incurred by the division are $50,000. What is the break-even point for the division? (Round your answers to the nearest whole number.)(x,y)= Which of these is true regarding prokaryotes?a. It takes about 6-8 hours to duplicate DNAb. Microtubules bind to the centromeres and pull the chromosomes apartc. Separated DNA is attached to the cell membrane before the cell dividesd. The nucleus dissolves this is really hard and I need help A train leaves the station at 6 pm traveling west at 80 mph. On a parallel track, a second train leaves the station 3 hours later traveling west at 100 mph. At what time will the second train catch up with the first? List two things you should not do when giving a presentation His son too was buried in the magazine he was reading "what type of figurative expression is this? Which of the following most likely caused the erosion in the [pictures:ClickPop:O A.desalinationO B. global warmingO c. urbanizationOD. deforestation Read the following story excerpt and answer the question that follows: "Come on James!" Nick called him from the street. "Let's get to the court. The guys are waiting." James looked down at his list of assignments on the computer. "Nick, I can't go today," he yelled regretfully out his window. "I am behind on my work. You are, too! You should come over and we can study together." No response from Nick. James sighed and opened his website. A short time later he heard a loud knock at the door. It was Nick. "You were right. Let's finish up and then go shoot hoops." What does this dialogue reveal about James? A. James is reckless about his schooling. B. James is a responsible person. C. James cares more about basketball than school. D. James likes to study alone. The competitive moves and business approaches a company's management is using to grow the business, compete successfully, attract and please customers, conduct operations, respond to changing economic and market conditions, and achieve organizational objectives is referred to as its - mission statement -business model -strategy-strategic intent Skin, nails, hair, muscles, and organs are mostly______A. carbohydrateB. proteinC. ovacytesD. fatty tissue Describe one potential negative effect for patients when healthcare professionals don't understand and correctly apply knowledge of medical terminology What results when there is very heavy competition between two species? A) interspecific competition B) competitive exclusion C) coexistence D) evolution You earn $65,000 a year, are married, and claim your spouse, yourself, and two children. What amount is withheld weekly for federal income tax? A $111.00 b $115.00 c $125.00 d $120.00 e $110.00 . In a high school graduating class of 100 students, 47 studied mathematics, 61 studied physics, and 25 studied both mathematics and physics. If one of these students is selected at random, find the probability that (a) the student took mathematics or physics. (b) the student did not take either of these subjects. (c) the student took physics but not mathematics. Are studying mathematics and physics mutually exclusive events? Why or why not? Which part of the cable is used to carry data?