the content of a text is its

Answers

Answer 1

Text content informs, describes, explains concepts and procedures to our readers


Related Questions

What three requirements are defined by the protocols used in network communcations to allow message transmission across a network?

Answers

Answer:

Message encoding, message size and delivery option.

Explanation:

The protocols used in network communications define the details of how a message is transmitted, including requirements for message delivery options, message timing, message encoding, formatting and encapsulation, and message size.

What is the output of the following code segment? t = 0; if(t > 7) System.out.print("AAA"); System.out.print("BBB"); BBB AAABBB AAA nothing

Answers

Answer:

BBB

Explanation:

Given

Java code segment

Required

What is the output?

Analyzing the code segment 1 line after other

This line initializes t to 0

t = 0;

This line checks if t is greater than 7

if(t > 7)

If the above condition is true, the next line is executed

System.out.print("AAA");

NB: Since t is not greater than 7, System.out.print("AAA");  will not be executed

Lastly, this line executed

System.out.print("BBB");

Hence, BBB will be displayed as output

Write a C++ program that determines if an integer is a multiple of 7. The program should prompt the user to enter and integer, determine if it is a multiple of 7 by using a given formula and output the result. This is not meant to be a menu driven program so one run of the program will only offer one input and one output.

Answers

Answer:

#include <iostream>  // Needed for input/output operation

int main()  // define the main program

{

   int userNumber = 0; // number storage for user input

   std::cout << "Please enter an integer: ";  // Ask user for number

   std::cin >> userNumber;  // Assumes user input is an integer

   if (userNumber % 7 != 0)  // Check to see if 7 divides user input

       std::cout << "\nYour number is not a multiple of 7.\n";

   else

       std::cout << "\nYour number is a multiple of 7.\n";

   return 0;  // End program

}

Which of the following is the MOST likely cause of the connectivity issues?A user of the wireless network is unable to gain access to the network. the symptoms are:_______a. Unable to connect to both internal and Internet resourcesb. The wireless icon shows connectivity but has no network access

Answers

Full questions and available options

A user of the wireless network is unable to gain access to the network. The symptoms are:

1.) Unable to connect to both internal and Internet resources

2.) The wireless icon shows connectivity but has no network access

The wireless network is WPA2 Enterprise and users must be a member of the wireless security group to authenticate.

Which of the following is the MOST likely cause of the connectivity issues?

A. The wireless signal is not strong enough

B. A remote DDoS attack against the RADIUS server is taking place

C. The user's laptop only supports WPA and WEP

D. The DHCP scope is full

E. The dynamic encryption key did not update while the user was offline

Answer:

C. The user's laptop only supports WPA and WEP

Explanation:

Given that the laptop's wireless icon shows connectivity but has no network access, and at the same time it is unable to connect to both internal and Internet resources, while the wireless network is WPA2 Enterprise and users must be a member of the wireless security group to authenticate, then it can be concluded that the most likely cause of the connectivity issues is "The user's laptop only supports WPA and WEP and not WAP2 Enterprise network."

Hence the right answer is Option C.

Were you surprised that devices have been around for thousands of years? what are your first memories for computers? discuss the privileges living in todays technology versus 20 years ago.

Answers

Answer:

No, I am not surprised devices have been around for thousands of year, as humans seek to make things easier by inventing devices for daily work support.

Explanation:

Computer as a device helps for computation of data to the much needed information. It is digital and fast. My first sight of a computer was a box with a small screen and other units like the keyboard and mouse. It was big and bulky. Now the computer system is compact and user friendly and used for daily human activities like graphic design, programming, gaming, playing music and videos, etc. It even have very high processing speed and multiple processor cores, this was not so in the past.

Friend Functions of a class are________members of that class.

Answers

Answer:

Friend Functions of a class are not members of that class.

Explanation:

A friend function of a class is defined outside the class' scope, but has the access rights to all private and protected members of that class.

Cheers.

How do the following technologie help you in your quest to become a digital citizen: kiosks, enterprise computing, natural language processing, robotics, and virtual reality?

Answers

Answer:

kiosks

Explanation:

It is generally believed that a digital citizen refers to a person who can skillfully utilize information technology such as accessing the internet using computers, or via tablets and mobile phones, etc.

Kiosks (digital kiosks) are often used to market brands and products to consumers instead of having in-person interaction. Interestingly, since almost everyone today goes shopping, consumers who may have held back from using digital services are now introduced to a new way of shopping, thus they become digital citizens sooner or later.

Enterprise computing, natural language processing, robotics, and virtual reality are vital for an individual to become a digital citizen.

Enterprise computing simply means a business-oriented technology that's vital to the operations of a company. It's part of the critical infrastructure of a company.

Robotics is the design, construction, and the use of robots. It's used for assisting human beings to perform different operations.

Virtual reality refers to a stimulated experience that appears to make objects and scenes real. It should be noted that robotics, virtual reality, natural processing language, etc are vital for an individual to become a digital citizen.

Read related link on:

https://brainly.com/question/17525639

Regular Expression Replace Challenge
In this challenge you will use the file regex_replace_challenge_student.py to:
Write a regular expression that will replace all occurrences of:
regular-expression
regular:expression r
egular&expression
In the string: This is a string to search for a regular expression like regular expression or regular-expression or regular:expression or regular&expression
Assign the regular expression to a variable named pattern
Using the sub() method from the re package substitute all occurrences of the 'pattern' with 'substitution'
Assign the outcome of the sub() method to a variable called replace_result
Output to the console replace_results

Answers

Answer:

Here is the Python program:

import re  # module for regular expressions

search_string='''This is a string to search for a regular expression like regular expression or  regular-expression or regular:expression or regular&expression'''  #string to search for a regular expression

pattern = "regular.expression" #Assigns the regular expression to pattern

substitution="regular expression"  #substitute all occurrences of pattern with regular expression string stored in substitution  

replace_results = re.sub(pattern,substitution,search_string)  # sub() method from the re package to substitute all occurrences of the pattern with substitution

print(replace_results) #Assigns the outcome of the sub() method to this variable

Explanation:

This is a string to search for a regular expression like regular expression or regular-expression or regular:expression or regular&expression

search_string='''This is a string to search for a regular expression like regular expression or  regular-expression or regular:expression or regular&expression'''

The following statement assigns the regular expression to a variable named pattern .

pattern = "regular.expression"

The following statement is used to substitute the pattern (regular expression) in the search_string by replacing all occurrences of "regular expression" sub-string on search_string.

substitution="regular expression"  

The following statement uses re.sub() method to replace all the occurrences of a pattern with another sub string ("regular expression"). This means in search_string, the sub strings like regular expression, regular-expression, regular:expression or regular&expression are replaced with string "regular expression". This result is stored in replace_results variable. Three arguments are passed to re.sub() method:

sub string to replace  i.e. pattern

sub string to replace with  i.e. substitution

The actual string i.e. search_string

replace_results = re.sub(pattern,substitution,search_string)  

The following print statement displays the output of replace_results

print(replace_results)

The output of the above program is:

This is a string to search for a regular expression like regular expression or regular expression or regular expression or regular expression

_____It saves network service providers a lot of money by collecting relevant statistics on network device usage.

Answers

Answer:

Internet of things

Explanation:

Internet of things often referred to as IoT, is a term in the computer world, that describes an object or a form of the network between various but similar items, and is purposely designed or has the capacity to gather data without the need to have biological or human-computer data exchange.

Hence, the Internet of Things saves network service providers a lot of money by collecting relevant statistics on network device usage.

Write a function "doubleChar(" str) which returns a string where for every character in the original string, there are two characters.

Answers

Answer:

//Begin class definition

public class DoubleCharTest{

   

   //Begin the main method

    public static void main(String [ ] args){

       //Call the doubleChar method and pass some argument

       System.out.println(doubleChar("There"));

    }

   

    //Method doubleChar

    //Receives the original string as parameter

    //Returns a new string where for every character in

    //the original string, there are two characters

    public static String doubleChar(String str){

        //Initialize the new string to empty string

       String newString = "";

       

        //loop through each character in the original string

       for(int i=0; i<str.length(); i++){

            //At each cycle, get the character at that cycle

            //and concatenate it with the new string twice

           newString += str.charAt(i) + "" + str.charAt(i);

        }

        //End the for loop

       

        //Return the new string

       return newString;

       

    } //End of the method

   

} // End of class declaration

Sample Output:

TThheerree

Explanation:

The code above has been written in Java and it contains comments explaining each line of the code. Kindly go through the comments. The actual lines of executable codes have been written in bold-face to differentiate them from comments.

A sample output has also been given.

Snapshots of the program and sample output have also been attached.

Which of the following is true about occupations within the STEM fields? Many occupations use mathematics, even if it is not the primary focus of a given job. Engineering occupations rely solely on technology concepts to solve problems. Scientists assist technicians by collecting information. Most technology occupations require a higher education degree.​

Answers

Answer:

Many occupations use mathematics, even if it is not the primary focus of a given job.

Explanation:

Think about software developers, they develop apps, websites, and other things, but they also use math in the process. Scientists use statistics. Mechanics use math to make sure their measurements are right. Therefore, I think your best bet would be

A. Many occupations use mathematics, even if it not the primary focus of a given job.

Answer:

Explanation:

Think about software developers, they develop apps, websites, and other things, but they also use math in the process. Scientists use statistics. Mechanics use math to make sure their measurements are right. Therefore, I think your best bet would be

A. Many occupations use mathematics, even if it not the primary focus of a given job.

Xanadu was to be a full-blown multimedia computer that could embody any medium.a. Trueb. False

Answers

Answer:

b. False

Explanation:

Xanadu is a project formulated by a certain Ted Nelson, and was originally intended to be a machine-language program with the capability of saving and showing various documents side by side, while the availability of editing function is also available.

Hence, in this case, it is FALSE that Xanadu was to be a full-blown multimedia computer that could embody any medium

The contains_acronym function checks the text for the presence of 2 or more characters or digits surrounded by parentheses, with at least the first character in uppercase (if it's a letter), returning True if the condition is met, or False otherwise. For example, "Instant messaging (IM) is a set of communication technologies used for text-based communication" should return True since (IM) satisfies the match conditions." Fill in the regular expression in this function:

Answers

Answer:

Following are the code to this question:

import re#import package regular expression

def contains_acronym(val): #defining a method contains_acronymn that accepts text value in parameter

   match= r"\([A-Z1-9][a-zA-Z1-9]*\)"#defining match variable that uses upper case, number, and lower case value  

   r= re.search(match, val)#defining r varaible that uses search method to search values

   return r!= None #use return keyword  

val="Instant messaging (IM) is a set of communication technologies used for text-based communication"

print(contains_acronym(val))#use print function to call method and print its return value

Output:

True

Explanation:

In the above-given code, first, we import package "regular expression" this package is used to check the string, In the next line, a method "contains_acronym" is defined that accepts a "val" variable in its parameters.

Inside the method, the "match" variable is defined that holds the uses upper case, number, and lower case values, and in the r variable the "search" method is defined, that search these and return the value. Outside the method, val variable is defined, that store string value and use print method is used that calls the method "contains_acronym".      

Describe Format Painter by ordering the steps Jemima should follow to make the format of her subheadings more
consistent
Step 1: Select the subheading with the desired format.
Step 2:
a
Step 3:
Step 4:
Step 5:
Step 6: Use Reveal Formatting to make sure formatting was copied.

Answers

Answer:

4,3,2,1

Explanation:

Answer:

Describe Format Painter by ordering the steps Jemima should follow to make the format of her subheadings more consistent.

Step 1: Select the subheading with the desired format.

Step 2:

✔ Navigate to the ribbon area.

Step 3:

✔ Go to the Clipboard command group.

Step 4:

✔ Click the Format Painter icon.

Step 5:

✔ Click and drag the icon on the second subheading.

Step 6: Use Reveal Formatting to make sure formatting was copied.

Explanation:

not needed

After completing a scan, Microsoft Baseline Security Analyzer (MBSA) will generate a report which identifies security issues and:

Answers

Complete Question:

After completing a scan, Microsoft Baseline Security Analyzer (MBSA) will generate a report which identifies security issues and:

Group of answer choices

A. Describes how the vulnerabilities could impact the organization.

B. Provides recommendations for system configuration changes.

C. Lists them in alphabetical order.

D. Provides recommendations for additional personnel needed.

Answer:

B. Provides recommendations for system configuration changes.

Explanation:

The Microsoft Baseline Security Analyzer (MBSA) is a software program or application developed by Microsoft and it helps network security administrators to check for security updates, Structured Query Language (SQL) administrative vulnerabilities, Windows administrative vulnerabilities, Internet Information Services (IIS) administrative vulnerabilities, weak passwords, identifying missing security patches and common security misconfigurations.  

After completing a scan, Microsoft Baseline Security Analyzer (MBSA) will generate a report which identifies security issues and provides recommendations for system configuration changes.

Microsoft Baseline Security Analyzer (MBSA) is a legacy software that scores the results of a scan and displays the items posing the highest risk first, based on Microsoft’s security recommendations.

Competitive Pricing
Bill Schultz is thinking of starting a store that specializes in handmade cowboy boots. Bill is a longtime rancher in the town of Taos, New Mexico. Bill's reputation for honesty and integrity is well-known around town, and he is positive that his new store will be highly successful.
Before opening his store, Bill is curious about how his profit, revenue, and variable costs will change depending on the amount he charges for his boots. Bill would like you to perform the work required for this analysis and has given you the AYK12_Data.xlsx data file. Here are a few things to consider while you perform your analysis:_______.
• Current competitive prices for custom cowboy boots are between 5225 and $275 a pair.
• Variable costs will be either S100 or S150 a pair depending on the types of material Bill chooses
• to use.
• Fixed costs are $10,000 a month.
Data File: AYK12_Data.xlsx

Answers

Answer:

To calculate the profit of the month, the monthly cost should be extracted from the monthly generated revenue, while the revenue is the total sales of the store for the month.

Explanation:

In the excel file worksheet, the total number of shoes should be calculated. And a formula to calculate the revenue for the month should multiply the total shoes by the price of shoes per pair

The formula to calculate the profit is gotten from total sales minus the fixed cost.

For successful completion of an 8-Week course, how often should I visit the course web site to check for new e-mail and any instructor announcements?

Answers

Answer: The course web should be visited daily to check for new e-mail and any instructor announcement.

Explanation:

For any serious-minded and Intellectually inclined individual, who aimed for a successful completion of an 8-Week course, it's imperative for him/her to visit the course web site daily to check for new e-mail and any instructor announcements.

2. You have noticed over the past several days that your computer is running more slowly
than usual, but today it is running so slowly that you are unable to get your work done.
What is one possible reason for your computer's slow operation?

Answers

Answer:

Because of temporary file

Explanation:

Go to run and go in temporary file

Write a GUI program that translates the Spanish words to English. The window should have three buttons, one for each Spanish word. When the user clicks a button, the program displays the English translation in a label.

Answers

Answer:

Here is the Python program:

import tkinter  #to create GUI translator application

class Spanish2English:  # class to translate Spanish words to English

 def __init__(self):  # constructor of class

   self.main_window = tkinter.Tk()  # create a main window

   self.top_frame = tkinter.Frame()  # create a frame

   self.middle_frame = tkinter.Frame()#  # create a middle frame

   self.bottom_frame = tkinter.Frame() #create a frame at bottom

   self.top_label = tkinter.Label(self.top_frame,text="Select a spanish word to translate")  #creates a label at top frame with text: Select a Spanish word to translate

   self.top_label.pack()  # to organize the widgets

   self.first_button=tkinter.Button(self.middle_frame, text="uno",command=self.word1)  

#create first button with Spanish word uno and place it in middle frame

   self.second_button = tkinter.Button(self.middle_frame, text="dos",command = self.word2)  

# create second button with Spanish text dos and place it in middle frame

   self.third_button = tkinter.Button(self.middle_frame, text="tres",command = self.word3)  

# create third button with Spanish text  tres and place it in middle frame

   self.first_button.pack(side='top')  #place first button at top

   self.second_button.pack(side='top')  #place second button next

   self.third_button.pack(side='top')  #place third button in end

   self.bottom_left_label = tkinter.Label(self.bottom_frame,text="English translation: ")  #creates label with text English translation:

   self.translation = tkinter.StringVar()  #creates String variable to hold the English translation of the Spanish words

   self.trans_label = tkinter.Label(self.bottom_frame,  textvariable=self.translation)  #creates and places label at the bottom frame which contains the English translation of Spanish words

   self.bottom_left_label.pack(side = 'left')

#organizes the labels

   self.trans_label.pack(side = 'right')

#organizes the frames

   self.top_frame.pack()

   self.middle_frame.pack()

   self.bottom_frame.pack()    

   tkinter.mainloop() #to run the application

 def word1(self): #method to translate word1 i.e. uno

   self.translation.set('one') #set the value of object to one

 def word2(self): #method to translate word2 i.e. dos

   self.translation.set('two') #set the value of object to two

 def word3(self): #method to translate word3 i.e. tres

   self.translation.set('three')  #set the value of object to three

translator = Spanish2English() #run the translator application

Explanation:

The program is well explained in the comments mentioned with each line of program

The program creates a GUI translator application using tkinter standard GUI library. In class Spanish2English first the main window is created which is the root widget. Next this main window is organized into three frames top, middle and bottom. A label is placed in the top frame which displays the text "Select a Spanish word to translate". Next, three buttons are created, for each Spanish word. The first button displays the Spanish word 'uno', second button displays the Spanish word 'dos' and third button displays the Spanish word 'tres'. Next, the two labels are created, one label is to display the text: "English translation: " and the other label is to display the English translation of the Spanish words in each button. In the last, three methods, word1, word2 and word3 are used to set the value of the translation object.

The program along with its output is attached.

describe how to perform a task, such as following a cake recipe, using simple and clear steps PLEASE HELP

Answers

Explanation:

Step 1: Choose a Recipe.

Step 4: Prep the Pans.

Step 6: Stir Together Dry Ingredients.

Step 7: Combine the Butter and Sugar.

Step 8: Add Eggs One at a Time.

Step 9: Alternate Adding Dry and Wet Ingredients.

Step 10: Pour Batter Into Pans and Bake.

Step 11: Check Cake for Doneness.

Answer: Prep the pans and sift the flower is right but everything else was wrong

Explanation:

What additional features on your router would you implement if you were setting up a small wired and wireless network

Answers

Answer:

Explanation: The following features will be implemented:

1) Guest networks,

2) Networked attached storage,

3) MAC filtering

A guest Wi-Fi network is essentially a separate access point on your router. All of your home gadgets are connected to one point and joined as a network, and the guest network is a different point that provides access to the Internet, but not to your home network. As the name implies, it's for guests to connect to.

Network Attached Storage

is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve data from centralized disk capacity. Users on a local area network (LAN) access the shared storage via a standard Ethernet connection.

MAC address filtering allows you to define a list of devices and only allow those devices on your Wi-Fi network.

A python keyword______.

Answers

Answer:

cannot be used outside of its intented purpose

Explanation: python keywords are special reserved words that have specific meanings and purposes and can't be used for anything but those specific purposes

Which statement is correct? a. choice of metric will influence the shape of the clusters b. choice of initial centroids will influence the result c. in general, the merges and splits in hierarchical clustering are determined in a greedy manner d. All of the above

Answers

Answer: the answer is c

Explanation:in general, the merges and splits in hierarchical clustering are determined in a greedy manner

Which statement is correct is that All of the above options are correct. Check more about metric below.

What is metric?

Metrics are known to be a unit that is often used in the measurement of quantitative works that are often used for comparing, tracking performance, etc.

Note that  Metrics can be used in a lot of purposes and as such, the  choice of metric will affect the shape of the clusters  and the use of merges and splits in hierarchical clustering are set up in a greedy manner.

Learn more about metric form

https://brainly.com/question/229459

A chord 6.6cm long is 5.6cm from the centre of a circle, calculate the radius of the circle​

Answers

Answer:

chord 30cm long is 20cm from the centre of a circle calculate the length of a chord ... Find the length of an arc of a circle of radius 5.6cm which subtends an angle of 60°at the centre of the circle of the ...

Answer: radius = 6.5 cm

Explanation:

The distance from the center to the chord is measured at its perpendicular.

Therefore we can use Pythagorean Theorem to find the radius.

r² = 5.6² + 3.3²

r² = 31.36 + 10.89

r² = 42.25

[tex]\sqrt{r^2}=\sqrt{42.25}[/tex]

r = 6.5

5- image I(x,y) with gray level in range[0.L-1) has applied with the spatial operation S-L-1-I(x,y)
this is Called :
(A) Gray-level Reduction ((B) Image Negative (C) morphology enhancement (D) Denoising​

Answers

Can you help me with this question like we have to do a paragraph with this question


what will happen in your future?

If you experience a technical problem with Canvas or another computer application, what is the first thing you should do

Answers

Answer:

restart the application, if that doesn't work try a different internet server (if the application requires internet connection), free up ram, restart AND shut down your computer, undo any hardware or any softwar changes

Explanation:

Restart the application, if that doesn't work try a different internet server (if the application requires internet connection), free To begin with, the term of back-out plan in the field of computers.

What is back-out plan?

The term of back-out plan in the field of computers refers to the situation where a person wants to restore a system to its original or previous state in the case where there is a failure trying to implent a new system.

Moreover,  this back-out plan works as an action process where once the failure has happened then the system will intiate a series of procedures to uninstall or disintegrate the system that had the failure. It basically defines a contingency plan component of the IT service management framework.

Secondly, in the case presented where a person must decide what document he should address to resolve the problem then a back-out plan will be the most common response given the fact that it will quickly uninstall the new software that was not compatible with the old data fields and help the users to open their files without problems and later seek for a new way to install that new software.

Therefore, Restart the application, if that doesn't work try a different internet server (if the application requires internet connection), free To begin with, the term of back-out plan in the field of computers.

Learn more about application on:

https://brainly.com/question/29039611

#SPJ5

Describe how catching exceptions can help with file errors. Write three Python examples that actually generate file errors on your computer and catch the errors with try: except: blocks. Include the code and output for each example in your post. Describe how you might deal with each error if you were writing a large production program. These descriptions should be general ideas in English, not actual Python code.

Answers

Answer:

Three python errors are; import error, value error, and key error.

Explanation:

Errors occur in all programming languages and just like every other language, python has error handling techniques like the try and except and also the raise keyword.

A value error occurs when an output of a variable or expression gives an unexpected value. Import error results from importing a module from an unknown source while a key error is from a wrong input keypress.

Catching these errors and raising an error gives more control and continuity of the source code.

Answer:

Catching exceptions helps a programmer to resolve raised issues at runtime instead of deliberately closing their program.

There are a lot of types of file errors. e.g. hadware/os errors, name errors,

operation errors, data errors.

Explanation:the function try will provide a testing of your code validating if it is correct, it will continue running. and adding the function except, it will print the error.

Dealing with the error depends on what you like the program to do and how you want to identify the errors so you can work on them.

AppWhich is the same class of lever as a broom?
A. A boat oar.
E
B. A baseball bat.
OC. A wheelbarrow.
D. A pair of scissors.

Answers

Answer:

A. boat oar is your answer hope it helped

What is Animation?

(A) A cartoon

(B) The apparent movement of an object

(C) A file format

(D) All of the above

Answers

The answer is (A.) A cartoon

Answer:

Hey!

Your answer should be B The apparent movement of an object

Explanation:

Animation is a method in which figures are manipulated to appear as moving images...often done with softwares where you take multiple images per scene and string them together WHICH MAKES THE OBJECT MOVE!

HOPE THIS HELPS!

Design a 4-to-16 line Decoder by using the two 3*8 decoder-line decoders. The 3-to-8 line decoders have an enable input ( '1' =enabled) and the designed 4-to-16 line decoder does not have an enable. Name the inputs A0........A3 and the outputs D0.......D15.​

Answers

Answer:

- Connect A0, A1 and A2 to the inputs of the two 3-to-8 decoders

- Connect A3 to the enable input of the first 3-to-8

- Connect A3 also to an inverter, and the output of that inverter to the enable input of the second 3-to-8

- D0 to D7 of the first 3-to-8 is D0 to D7 of your 4-to-16

- D0 to D7 of the second 3-to-8 is D8 to D15 of your 4-to-16

Other Questions
What is the difference between a good that is a need and a good that is a want? Provide one example of each. Describe which type of course is economics? what is mean by biological aspect?How are health population and environment related in this aspect? Evaluating the competitive value of the cross-business strategic fits in a diversified firm's business portfolio entails consideration of:___________. a. whether the competitive strategies in each business possess good strategic fit with the parent company's corporate strategy. b. whether the parent's company's strongest competitive synergies are being deployed to maximum advantage in each of its business units. c. how much competitive value can be generated from forceful efforts to capture the benefits of strategic fits stemming from cross-business transfer of competitively valuable resources and capabilities, cost-saving efficiencies in the value chains of sister businesses, brand- name sharing, and cross-business collaboration to create new performance-enhancing competitive capabilities. d. whether the competitive strategy employed in each business acts to reinforce the competitive power of the strategies employed in the company's other businesses. e. how compatible the competitive strategies of the various sister businesses are and whether these strategies are optimally crafted to achieve the same kind of competitive advantage and thereby enhance the diversified company's overall performance. You estimate that the driving distance from Raleigh, NC to Charlotte, NC is around 180 miles. When you looked it up on the internet, you found that the actual distance is only 167.5 miles. What was the relative (percent) error of your estimate? In other words, how far off were you from the actual value? Select the correct answer. A student places a 12-gram cube of ice inside a container. After six hours, the student returns to observe the contents of the container. Which sentence suggests that the container is an open system? A. The container contains 12 grams of liquid water and no ice. B. The container contains 12 grams of ice and no liquid water. C. The container contains 8 grams of liquid water and no ice. D. The container contains 8 grams of ice and 4 grams of liquid water. E. The container contains 8 grams of liquid water and 4 grams of water vapor. ANSWER FAST PLZ ............. When time and temperature are not controlled for bacteria growth, it is known as Time/Temperature Abuse. True False In what way is graduation a rite of passage, or significant milestone that indicats growth? What other rites of passage are you familiar with? Safety is more than the number of days without an accident within a company. It is? When attending a networking event, what should you focus on first before asking for connections or advice? do amps in circuit change if something is removed from the circuit for example:There is two lamps in a circuit if one is removed would the current in the circuit change Isabel needs to cut a square piece of wood with the area of 70 in. approximate the size of the square and round to the nearest 10th of an inch Define position and reference point in your own words. The Hernandez family orders 3 large pizzas. They cut the pizzas so that each pizza has the same number of slices, giving them a total of 24 slices. The Wilson family ordrs several lare pizzas from the same pizza restaurant. They also cut the pizzas so that all their pizzas have the same number of slices. For the Wilson family the equation y=10x represents the relationship where x represents the number of pizzas and y represents the number of total slices. Which statements best describe the pizzas bought by the Hernandez and Wilson familiies? Select two options. United services automotive association is one of the largest diversified financial. What are the highest paying jobs at United Services Automobile Association? A construction worker 40.0 m above the ground drops his hammer. How long does his shouted warning take to reach the ground if the speed of sound under these conditions is 335 m/s? 1 If 2x+2 = 32, then x = 7w+6-3wPlease helpI dont understand how to do this Write the importantance of drinking water in human life. After a merger between two companies a security analyst has been asked to ensure that the organizations systems are secured against infiltration by any former employees that were terminated during the transition. Which of the following actions are MOST appropriate to harden applications against infiltration by former employees? (Select TWO)A. Monitor VPN client accessB. Reduce failed login out settingsC. Develop and implement updated access control policiesD. Review and address invalid login attemptsE. Increase password complexity requirementsF. Assess and eliminate inactive accounts