suppose you have algorithms with the five running times listed below. (assume these are the exact running times.) how much slower do each of these algorithms get when you (a) double the input size, or (b) increase the input size by one?

Answers

Answer 1

A specific method of organizing and storing data to enable it to be used effectively is called data structure.

What algorithm(s) are employed?

The process used to do a calculation or find a solution is known as an algorithm. Algorithms perform as a precise set of rules that carry out preset activities consecutively in either electronics or software-based routines. All areas of information technology heavily rely on algorithms.

What is a well-known algorithm?

The merge sort technique is one of the important ones now in use. It is an comparison-based ordering algorithm that uses the divide-and-conquer tactic to get over an O(n2) challenge. It was developed in 1945 by mathematician John von Neumann.

To know more about algorithm visit:
https://brainly.com/question/22984934

#SPJ4


Related Questions

In asymmetric key encryption, what is the next step when a client initiates a session with a web server that is configured with a certificate?

Answers

The  next step when a client initiates a session with a web server that is configured with a certificate in a ashymetric key encryption is the web server sends a certificate to the web browser.

A browser can be described as a software that displays and accesses  files and pages on the web. Browsers require a connection to the Internet (for example through  a direct Ethernet connection, a Wi-Fi or a cable modem). Popular web browsers include Safari, Firefox, and Internet Explorer. Firefox is available for both Mac computers and Windows. Internet Explorer is only available for Windows. Safari is available for Mac  iOS, OS X, and Windows.

A web browser takes you anywhere on the internet, letting you see text, images and video from anywhere in the world. The web is a powerful and fast tool. Over the course of a few decades, the internet has changed the way we play, the way we work,  and the way we interact with one another. Based on how it’s used, it bridges drives commerce,  nurtures relationships, nations, drives the innovation engine of the future and is responsible for more memes than we know what to do with.

Here you can learn more about browser in the link brainly.com/question/28504444

#SPJ4

Your Connection Was Interrupted - A Network Change Was Detected - ERR_NETWORK_CHANGED

Answers

Answer:

Simply reboot your model and make sure it is still plugged to your router

Identify the main systems involved:
Hormones move through the runner's bloodstream, stimulating her body
systems to work harder. (select 2 answers)
circulatory
digestive
endocrine
excretory
integumentary
immune/lymphatic
muscular
nervous
reproductive
respiratory
skeletal

Answers

The main systems involved in the runner's body are:

Endocrine systemMuscular system

What is the Endocrine system?

The endocrine system is responsible for releasing hormones into the bloodstream, which play a crucial role in regulating various bodily functions. The hormones stimulate the runner's body to work harder and respond to physical demands, such as those experienced during exercise.

Therefore, the muscular system, on the other hand, is responsible for providing the force needed for movement, including running. It works in tandem with the nervous system to coordinate muscle contractions and produce movement. As the runner's body responds to the hormones released by the endocrine system, the muscles are able to work harder, allowing the runner to perform at a higher level.

Learn more about Endocrine system from

https://brainly.com/question/4455660

#SPJ1

which component gets things running until the operating system takes over
a. BIOS
b. command line interface
c. virtualization
d. Microsoft

Answers

Answer:

A

Explanation:

The basic input/output system (BIOS) is software that is contained on a memory chip on the computer's motherboard and is the first software that is run whenever a computer is started. It gets things running until the operating system takes over

How to dispose of printer cartridges?

Answers

To disposed of printer cartridges, recycle them in-store, claims the statement.

What does a computer printer do?

A printer is a gadget that receives text and visual output from just a computer and prints the data on paper, often on sheets of paper that are standard size, 8.5" by 11". The size, speed, sophistication, and price of printers varies.

Does every computer and printer coexist?

A printer needs two things to operate with a computer: a good physical connectivity and the right software for the windows os to talk to the printer. The physical link will almost always be possible, but software connectivity won't always be feasible.

To know more about Printer visit:

https://brainly.com/question/17136779

#SPJ4

Which type of cloud model involves sharing of computing infrastructure in between organizations of the same group?

Answers

One organization purchasing visualized servers, storage, and networking equipment to benefit from cloud computing

A community cloud is a cloud computing service model that fosters cooperation between a number of organizations with shared opinions and issues (regarding security, compliance, and jurisdiction), in which infrastructure is shared among them from a particular community. It might be hosted domestically or outside, and managed in-house or by a third party. The costs are divided among fewer users because to the law of large numbers, and while though the cost savings aren't as great as they would be with a public cloud like Amazon Web Services, Microsoft Azure, IBM cloud, etc., they are still less expensive than buying a private cloud service. i.e., one organization purchasing visualized servers, storage, and networking equipment to benefit from cloud computing.

Learn more about A community cloud here:

https://brainly.com/question/13934016

#SPJ4

How to promote information sharing

Answers

Encourage and promote a culture of knowledge sharing. Create areas where knowledge can be shared. Encourage the exchange of knowledge Set a good example. Have professionals impart their knowledge.

What exactly is full computer information?

A pc is a piece of electronic equipment used to manipulate data or information. You may already be aware of the fact that you're able to use a machine to surf the Internet, send emails, type documents, and play games.

How can I locate my computer's data?

Click the Microsoft Right click, then select Settings to view your computer's hardware specifications (the gear icon). Go to System under the Settings menu. After you scroll down, select About. You ought to see your processor and memory specifications on this screen (RAM).

To know more about information visit:

https://brainly.com/question/15709585

#SPJ4

What process involves placing one PDU inside of another PDU?A.encapsulationB.encodingC. segmentationD. flow control

Answers

Encapsulation involves placing one PDU (protocol data unit) inside of another PDU.

Yes, encapsulation is the process of placing one PDU inside of another PDU. This is done as data travels down the stack from one layer to the next in the OSI model. The outer PDU, called the encapsulating PDU, contains the original PDU, called the encapsulated PDU, as well as additional header information specific to the current layer. This allows for the data to be properly formatted and understood by the next layer in the stack, as well as providing information for routing and error detection.

A protocol data unit (PDU) refers to the specific format and structure used to organize data in a particular protocol. In the OSI (Open Systems Interconnection) model, a PDU is the unit of data that is exchanged between layers of the protocol stack. Different protocols have different types of PDUs, such as packet, frame, segment, or datagram, each with their own unique format and fields. Encapsulation is the process of wrapping one PDU inside another, as the data travels down the stack from one layer to the next.

Learn more about OSI model here:

https://brainly.com/question/22709418

#SPJ4

THIS IS THE QUESTION AS IS FROM EDMENTUM. Now, choose a programming language to code a program based on the algorithm. Keep in mind the applications to which each language is suited and the type of program design it supports.
In the space below, explain your choice of language in terms of application and program design. WHAT LANGUAGE SHOULD I USE. PLEASE ANSWER RIGHT

Answers

The programming language you choose for your program will depend on the specific requirements of the algorithm and the application for which it will be used. Some popular languages that are well-suited for a wide range of applications include Python, Java, and C++.

What is the programming  about?

Python is a high-level, interpreted language that is widely used for web development, machine learning, and data science. It is known for its simplicity, readability, and ease of use. Java is a popular choice for enterprise applications, such as web-based systems, and is known for its portability and security features. C++ is a powerful, low-level language that is widely used for system programming and game development.

When choosing a programming language, it is important to consider the specific needs of your algorithm and the type of program design it requires. For example, if the program requires a lot of data manipulation, a language with strong support for data structures, such as Python or Java, would be a good choice. If the program requires a lot of computational power, a low-level language like C++ may be a better choice.

In all, the best programming language for your program will depend on your specific use case and the requirements of your algorithm.

Learn more about programming  from

https://brainly.com/question/26535599

#SPJ1

many of the safety devices for the robot are designed to protect the human interaction with the robot. which device can detect when a person is near the robot arm or is the arm has touched a person?

Answers

A force/torque sensor is typically used to detect when a person is near the robot arm or if the arm has touched a person.

What is sensor?

A sensor is an electronic device that detects and responds to a physical phenomenon. It is used to measure and interpret signals from the environment around it, such as temperature, light, sound, pressure, and motion. Sensors are used in many different applications, such as in robotics, automation, and medical devices. Sensors can provide information to control systems, allowing them to respond to their environment and make decisions. Sensors come in many different shapes and sizes and are used in a variety of industries, including automotive, medical, industrial, and consumer electronics. They can be used to detect changes in temperature, pressure, vibration, and other physical phenomena.

Force/torque sensors measure the amount of force applied to the robot arm, allowing the robot to sense and react to physical contact. This can be used to detect if the robot arm has made contact with a person or object and can be used to shut down the robot arm in order to prevent injury.

To learn more about sensor
https://brainly.com/question/23618894
#SPJ4

How do you use the drag-and-drop method to move text?

Answers

When moving text, select it with the mouse while holding down the Ctrl or Option keys (OS X). Drag and drop the text into to the new destination after selecting it.

Ctrl—what is it?

When the Control key is pressed in conjunction with other keys on a computer keyboard, other keys just on keyboard can execute additional tasks. Ctrl is the usual designation for it.

Describe OS X ?

Apple created the operating system known as OS X. You are only able to utilise a computer thanks to the operating system. All brand-new Apple Macintosh computers, or Macs, come preloaded with OS X.

Version 13.1 is now in use by Ventura..

To know more about OS X visit :

https://brainly.com/question/4236590

#SPJ4

perez is exploring different password cracking tools. a friend has told him about ophcrack. ophcrack depends on the attacker doing what?

Answers

The password cracking tool named "Ophcrack" depends on the attacker attempting to get physical access to the machine.

In the context of cyber security , phcrack is an extremely fast password cracker tool because it uses a special algorithm known as rainbow tables.

In the given scenario where Perez is analyzing different password-cracking tools; a friend has told him about such a tool which is named "ophcrack". The ophcrack mainly depends on the cyber attacker attempting to get physical access to the machine.

You can learn more about password crackers at

https://brainly.com/question/29310020

#SPJ4

Which type of input device can identify users based on their voice?​

Answers

The first computer mouse was publicly unveiled by Douglas C. Engelbart in 1968 at the fall joint computing conference in San Francisco.

A computer is a device that performs a variety of tasks, including processing data, storing information, and conducting arithmetic and logical operations, among others. Input devices are the hardware components in charge of delivering data to the computer system, where it is processed. Input is the term used to describe the information that a computer processes. There are many different types of input devices, including a mouse, keyboard, scanner, and joysticks. The first computer mouse was publicly unveiled by Douglas C. Engelbart in 1968 at the fall joint computing conference in San Francisco. The computer mouse was really created in 1964.

Learn more about Input devices here:

https://brainly.com/question/13014455

#SPJ4

infrastructure focuses on the nonprocess features and capabilities of an organization. this does not include the area of

Answers

Infrastructure focuses on an organization's nonprocess features and capabilities. The field of value chain organization is excluded from this.

What is Value Chain?

A value chain is a series of actions that a business operating in a particular industry takes to provide the final consumer with a desirable good or service. Michael Porter first introduced the idea in his 1985 best-seller Competitive Advantage: Creating & Sustaining Competitive Advantage, which is based on business management. Value chains were incorporated into Porter's competitive strategies paradigm, which he developed in 1979, as decision support tools. Uncertain - discuss Inbound logistics, operations, freight forwarding, marketing and sales, and services are grouped as major activities in Porter's value chains. Sourcing, HR management, technological development, and infrastructure are examples of secondary activities.

To know more about Value Chain visit:

https://brainly.com/question/28025779

#SPJ4

How do I fix ImportError attempted relative import without known parent package?

Answers

Without using the pip command, we may download this package from pypi.org and run the setup file via Python to install any Development tool.

Is learning Python difficult?

No, most people don't find learning Python difficult. Python is really regarded as one of the simplest programming languages to understand. Even if you have never produced a line of Program code before, you can learn to program in Python, but it will require awhile, and there will probably be frustrating times along the way.

Why is Python used? What is Python?

Python is today among the most well-known and frequently used languages for programming around the world, despite having its origins as a side project bearing the moniker Monty Python. Python is used for more than just web and software development.

To know more about Python visit:

https://brainly.com/question/18502436

#SPJ4

Order the steps to find the Formatting Rule dialog box.

Answers

The steps to find the Formatting Rule dialog box are:

1. Home Tab2. Conditional Formatting3. New Rule4. Formula

What are formatting rules?

Choose a cell or cells from a Pivot Table report, range, table, or another object. Select the arrow next to Conditional Formatting in the Styles group on the Home page, and then click Manage Rules.

A dialog box called Conditional Formatting Rules Manager opens. Select the arrow next to Conditional Formatting in the Styles group on the HOME tab, and then click Manage Rules.

Therefore, the steps to find the Formatting Rule dialog box are:

Home TabConditional FormattingNew RuleFormula

To learn more about formatting rules, refer to the link:

https://brainly.com/question/16014701

#SPJ1

Answer:

Click the Home tab, Go to the Styles group, Click Conditional Formatting, Click New Rule.

Explanation:

Those are the correct answers, I took the assignment on Edge 2023.

when replacing a system board on a server using liquid cooling in place of traditional heat sinks to cool the cpus, what facts are true?

Answers

When replacing a system board on server to cool the CPUs, It is not necessary to remove the processor or break the thermal material bond from the cold plate, instead, simply transfer cold plate/processors to the new system board.

What does CPU mean?

A central processing unit or CPU is an electronic machine that executes instructions from programs that enable a computer or other device to perform its tasks. The main types of CPUs are categorized into single-core, dual-core, quad-core, hexa-core, octa-core, and deca-core processors

What defines computer's performance?

A processor, also called a CPU, provides the instructions and processing power a computer needs to do its job. The more powerful and updated the processor, the faster the computer can complete its tasks.

To learn more about CPU  visit:

https://brainly.com/question/9479562

#SPJ4

what is the result of redundant data in the database? a. enforced data integrity that lead to data anomalies b. increased data security that leads to data access c. lack of data sharing among database users d. data anomalies that lead to data inconsistencies

Answers

The result of redundant data in the database is D. Data anomalies that lead to data inconsistency

A database can be described as an organized collection of structured  data or information, typically stored electronically in a computer system. A database is usually controlled by a database management system (DBMS). With them, the data and the DBMS, along with the applications that are associated with them, are referred to as a database system, mostly shortened to just database.

Data within the most general types of databases in operation today is typically modeled in columns and rows in a series of tables to make data and processing querying efficient. The data can then be easily managed,   accessed, updated, modified, controlled, and organized. Most databases use structured query language (SQL) for querying data and writing.

Here you can learn more about database in the link brainly.com/question/29412324

#SPJ4

What added functionality does a router have that an access point does not? answer choices ... a. Computer
b. Access Point
c. Internet
d. Modem

Answers

Answer:

C

Explanation:

The router acts as a hub that sets up a local area network and manages all of the devices and communication in it. An access point, on the other hand, is a sub-device within the local area network that provides another location for devices to connect from and enables more devices to be on the network.

The table shows the estimated number of deer living in a forest over a five-year period. Are the data best represented by a linear, exponential, or quadratic model? write an equation to model the data.

Answers

This equation shows that each year the number of deer is being multiplied by 1.4.

What is equation?

An equation is a mathematical statement that shows the equality of two expressions. It consists of two expressions, such as 3x + 5 = 2y, separated by an equals sign (=). Each side of the equation is called a term. The left-hand side of the equation is often referred to as the LHS and the right-hand side as the RHS. To solve an equation, one must determine the value of the unknown variable by using the properties of equality and the operations of arithmetic.

The data is best represented by an exponential model due to the fact that it is increasing exponentially over the five year period. An equation that could be used to model this data is y=50*1.4^x, where x is the year and y is the number of deer. This equation shows that each year the number of deer is being multiplied by 1.4.

To learn more about equation
https://brainly.com/question/15125550
#SPJ4

in some implementations, the canary value is a 64-bit integer that is randomly generated each time the program run. why does this prevent the basic bufferoverflow attack discussed in lecture?

Answers

The canary value is a security feature that is used to prevent buffer overflow attacks. In some implementations, the canary value is a 64-bit integer that is randomly generated each time the program runs.

What function does a canary serve in buffer overflow protection?

The arrangement of data in the stack frame of a function call is typically changed by buffer overflow protection to include a "canary" value that, when destroyed, signals that a buffer before it in memory has been overfilled. This has the advantage of shielding against an entire class of assaults.

A canary variable's mechanism for spotting buffer overflow attacks

The canary is rewritten when a stack-buffer overflows into the function return address. The canary value is checked upon function return, and if it has changed, the program is terminated. code execution would then be reduced to a simple denial of service attack.

To know more about Buffer Overflow visit:

https://brainly.com/question/14369388

#SPJ4

Which rhetorical appeal or device does president johnson use here to push for the passing of the civil rights bill?.

Answers

Answer:

The rhetorical appeal President Johnson uses is Pathos.

Explanation:

which layer of hadoop is responsible for data storage? group of answer choices the hadoop resource layer (hrl) the hadoop distributed file system layer (hdfs) the application layer the workload management layer

Answers

The HDFS (Hadoop Distributed File System) is in charge of storing data. To achieve high dependability, data is kept in blocks of 128 MB or more, and each block is replicated.

What is the purpose of the MapReduce programming model in Hadoop?

The MapReduce programming model in Hadoop is used to process and analyze large amounts of data stored in HDFS. It is designed to handle parallel processing of data and is composed of two main tasks: the Map task, which filters and sorts data, and the Reduce task, which performs a summary or aggregation operation on the filtered and sorted data.

How does Hadoop handle data replication and distribution?

Hadoop handles data replication and distribution by creating multiple replicas of data blocks and distributing them across different nodes in the cluster. This ensures that data is available even if a node in the cluster fails, and it also improves the performance of data read operations.

To know more about Hadoop visit:

https://brainly.com/question/30023314

#SPJ4

jordan is given the read permission to folder1. the group engineers is given the full control permission to the folder1 share. jordan is a member of this group. what are her resulting share permissions to folder1?

Answers

Before granting access to secured networks and systems, a verified user or process must first have their identity verified through authentication.

Where is my folder located?

File Explorer search: A location can be chosen first from left pane for search for or explore in by opening Disk Utility from the prompt or by right-clicking on the Home screen and selecting File Explorer. For instance, choose This PC to search through all of your computer's disks and gadgets, or choose Documents to search only the items kept there.

What distinguishes a folder from a file?

All computer programs and information are "written" into files and "read" from files, which serve as the fundamental storage unit of a computer. One or so more files are stored in a folder, and

To know more about folder visit:

https://brainly.com/question/14472897

#SPJ4

What three key sequence will bring up the task manager?

Answers

Answer:

ctrl-shift-esc

Explanation:

Simply press Ctrl+Shift+Escape on your keyboard to bring up Task Manager. On the keyboard, press "Ctrl + Alt + Delete," you will see few options. To open Task Manager, select "Task Manager." To open Task Manager, right-click the Start button on the taskbar.

how to delete text messages on iphone for both sides

Answers

Answer:

simple answer dont send it

Explanation:

what covers maintaining the consistency, accuracy, and trustworthiness of data throughout its lifecycle?

Answers

Data governance covers maintaining the consistency, accuracy, and trustworthiness of data throughout its lifecycle.

What does Data governance entail?

Data governance is the overall management of the availability, usability, integrity, and security of the data used in an organization. It includes the processes, roles, standards, and metrics that ensure that data is effectively used and protected throughout its lifecycle. Data governance is responsible for maintaining the consistency, accuracy, and trustworthiness of data, through establishing and enforcing policies and procedures for data management, including data quality, data security, data privacy, and data archiving.

It also ensures that data is properly classified and managed according to its level of sensitivity and criticality to the organization. In summary, data governance is a set of practices, processes, and procedures that are used to ensure the effective and efficient management of data throughout its lifecycle, with the goal of maintaining its consistency, accuracy, and trustworthiness.

To know more about Data governance, visit:

brainly.com/question/23702492

#SPJ4

The Installer encountered an error that caused the installation to fail. Contact the software manufacturer for assistance.

Answers

When you trying to install a PKG installer package, sometimes you have  run into an issue where it refuses to finish installing. The issue is "The Installer encountered an error that caused the installation to fail.

Contact the software manufacturer for assistance."  The solutions for that issue is:

Go to application menuSet the log window to "show all logs"

Issue is a term that have many perseption.

Issue is something that people are thinking about and talking about. for example : an important subject or topicThe act of giving something to people to be used : the act of issuing something or officially making something availableIssue also can be described as a problem or concern

Here you can learn more about issue in the link brainly.com/question/1674717

#SPJ4

Question 4 of 10
Which scenario is an example of the "Model" step in the engineering design
process?
OA. After choosing one solution to try, the team develops a prototype
so it can be tested.
B. After generating several possible solutions, the team chooses one
solution to try.
C. After finding and improving a solution, the team communicates
the solution to other people in the organization.
O D. After testing a solution, the team changes some components to
improve on the original design.
SUBMIT

Answers

Note that the scenario that is an example of the "Model" step in the engineering design process is: "After generating several possible solutions, the team chooses one solution to try." (Option B)

What is Engineering Design?

Engineering design is a continuous decision-making process in which basic sciences, mathematics, and engineering sciences are used to optimally convert resources to achieve a given goal.

The primary goal of engineering design is to apply science expertise to technological problem-solving. While engineers give a technical answer, it is critical to remember that engineering design implies an aesthetic solution as well.

It should be noted that engineering design is a wide phrase that encompasses processes like architectural design, mechanical design, industrial design, and software engineering.

Learn more about Engineering Design:
https://brainly.com/question/18564178
#SPJ1

Please Hurry
Unsupervised learning in an artificial training system improves
A) by using virtual reality scenarios.
B) without being given specific data examples.
C) by using training data.
D) by using augmented reality data.,

Answers

The requirement for access to dynamic, adaptable, and tailored information in real time is a result of the rapid technological advancements and the development rates of today's society.

With the help of augmented reality, users may quickly access information that is always changing and becoming more meaningful and "alive" as it is placed in the right spatial and temporal context. Users can now engage in real time with the actual and digital worlds thanks to augmented reality. Additionally, as a result of the exponential growth in data volume brought on by the digitization of daily life, new opportunities and potentials have emerged in addition to new requirements and constraints. In order to provide semantically connected information, knowledge graphs and semantic web technologies take advantage of data growth and web content representation.

Learn more about information here-

https://brainly.com/question/15709585

#SPJ4

Other Questions
who is credited with inventing the printing press in 1450? How do you write a first paragraph in an essay? What helps determine the price of goods and services when there is no set price in the marketplace? which joints allow the arytenoid cartilages to rock anteriorly,posteriorly, medially, and laterally, enabling the vocal folds to abduct? According to the segment, how are businesses classified? small hairlike projections that cover the cells surface which type of formula has the actual number of atoms in the molecule? URGENT PLEASE HELPf(x)=x + 7. Find the inverse of f(x). What is the equation of a line that passed through the points 3/6 and 8 4? How do these lines help establish themes in the poem?They serve as an invitation to find peace and tranquility in nature. They express natural beauty and the healing powers of nature. They suggest sickness in the modern world and the inability to act. They establish an optimism about healing the world and forming meaningful connections What is the least common multiple of 12 and 16? 48 28 16 12 Summarize Rimland Theory in 2 sentences I believe that even amid today's mortar bursts and whiningbullets, there is still hope for a brighter tomorrow. I believethat wounded justice, lying prostrate on the blood-flowingstreets of our nations, can be lifted from this dust ofshame to reign supreme among the children of men. I havethe audacity to believe that peoples everywhere can havethree meals a day for their bodies, education and culturefor their minds, and dignity, equality and freedom for theirspirits. I believe that what self-centered men have torndown men other-centered can build up.-Martin Luther King Jr., Nobel Prize acceptance speech,1964Which rhetorical strategy is King using by repeating the phrase "I believe" inthis passage? ANSWER ASAP PLEASE!!! I WILL GIVE YOU A BRAINLIEST AND POINTS!!!!!!!!!!!! PLEASE ONLY ANSWER IF YOU ARE 100% SURE. Please don't answer just to get points. What does William Wordsworth mean by "wealth" in the following bolded line?I wandered lonely as a cloudThat floats on high o'er vales and hills,When all at once I saw a crowd,A host, of golden daffodils;Beside the lake, beneath the trees,Fluttering and dancing in the breeze.Continuous as the stars that shineAnd twinkle on the milky way,They stretched in never-ending lineAlong the margin of a bay:Ten thousand saw I at a glance,Tossing their heads in a sprightly dance.The waves beside them danced; but theyOut-did the sparkling waves in glee:A poet could not but be gay,In such a jocund company:I gazedand gazedbut little thoughtWhat wealth the show to me had brought:For oft, when on my couch I lieIn vacant or in pensive mood,They flash upon that inward eyeWhich is the bliss of solitude;And then my heart with pleasure fills,And dances with the daffodils. 1. The time spent walking 2. The cost of daffodils 3. The lesson he learned 4. The long day ahead A number ,a, rounded to 1.d.p is 49.3Another number ,b, rounded to 1.d.p is 7.6 what are the lower and upper bounds of a - b Which of the following limits onfreedom of the press is least likelyto be allowed by a court?Please choose the correct answer.O Libel lawsO Prior restraintSlander laws which of these is not a reason relationship marketing is good for a business? a. reduces costs b. increases profits c. develops long-term customers who continue to purchase from the company d. improves production efficiency what is Treasury stock ?write the accounting entries of treasuring stock What happens when oxygen reacts with sodium? How many oxygen atoms are there in 1 mole of CO2?