with a credit card purchase, when users sign their name on a signature capture pad using a stylus, the retailer uses a signature verification system to authenticate the user. a. true b. false

Answers

Answer 1

Answer:

A.True

Explanation:

they use signature verification to make sure its really you who are signing


Related Questions

How to Find Duplicate Values in Excel Using Formula (9 Methods)

Answers

To find Duplicate Values in Excel Using Formula: Go to cell. Assign the formula =AND(COUNTIF($A$2:$A$6, A2),COUNTIF($B$2:$B$6, A2)) in the cell and Press Enter.

How to find duplicates in Excel using if formula?

Find and remove duplicates: Select the cells you want to check for duplicates. Click Home > Conditional Formatting > Highlight Cells Rules > Duplicate Values. In the box next to values with, pick the formatting you want to apply to the duplicate values, and then click OK.

How to find duplicates with multiple criteria in Excel??

Finding and Highlight Duplicates in Multiple Columns in Excel:

Select the data. Go to Home –> Conditional Formatting –> Highlight Cell Rules –> Duplicate Values. In the Duplicate Values dialog box, select Duplicate in the drop down on the left, and specify the format in which you want to highlight the duplicate values.

To learn more about Excel visit:

https://brainly.com/question/30245037

#SPJ4

sunny is interested in a career that involves designing systems, managing employees, and planning security for an organization. what career would be a good fit for sunny? (5 points) cybersecurity engineer security analyst cybersecurity consultant security architect

Answers

Security architect would be a good fit for Sunny as it involves designing systems, managing employees and planning security for an organization. The role of a security architect is to design, implement and maintain an organization's security infrastructure.

They are responsible for identifying and mitigating security risks, and ensuring compliance with industry standards and regulations. This role typically requires a combination of technical knowledge and management skills. Security refers to measures taken to protect people, property, and information from harm, loss, or unauthorized access. It encompasses a wide range of practices and technologies, including physical security, network security, and information security, and is used to protect against various types of threats such as theft, cyber attacks, and natural disasters.

Learn more about career, here https://brainly.com/question/30040900

#SPJ4

how can you protect yourself on social networking sites

Answers

Answer:

dont give away personal info

Explanation:

Please answer the following below:!!

Answers

Note that the program that performs the above operation in Phyton is;

length_of_song = int(input("Enter the length of the song in minutes: "))

price = float(input("Enter the price of the song: "))

cost = length_of_song * 500

if cost > price:

 print("You will not be able to break even with this price.")

else:

 copies_needed = cost / price

 print(f"You will need to sell {copies_needed} songs to break even.")

How does the above code work?

Note that the program calculates the cost to produce a song by multiplying the length of the song (in minutes) by 500.

If the cost is greater than the price the user enters, the program outputs that they won't be able to break even. Otherwise, it calculates the number of copies needed to sell to break even and outputs the result.

Learn more about Phyton:
https://brainly.com/question/16757242
#SPJ1

you downloaded a large important file, fortytwo.db, from your company's local website to your linux server but got interrupted by an emergency. now you cannot remember where you stored the file. what is the best first step to fix this problem?

Answers

The best first step to fix this problem would be to search for the file on your Linux server. You can use the search feature in the terminal to look for the file by typing "find fortytwo.db".

If you don't find the file in the results, you can also search for other file types, such as .db or .txt, with the same search terms.

Additionally, you can try searching in different folders, such as the downloads folder, to see if the file is stored there. If you still can't find the file, you can try restoring it from a backup, if one is available.

Learn more about programming:

https://brainly.com/question/28338824

#SPJ4

what windows cli command can be used to change a local user password?

Answers

Answer:

net user

Explanation:

Use the Net User Command to Change a Windows Password but you must have admin right to that PC

The CLI command used for 'net user'.

To change a local user password using the Windows command-line interface (CLI), you can utilize the net user command.

Here's how you can do it:

Open the command prompt: Press the Windows key, type "cmd," and hit Enter. This will open the Command Prompt window.

Type the following command and press Enter:

net user username newpassword

Replace "username" with the actual username of the user account for which you want to change the password.

Replace "newpassword" with the desired new password for that user.

For example, if you want to change the password for a user named "John" and set the new password as "MyNewPassword," the command would be:

net user John MyNewPassword

If the operation is successful, you will see a message stating, "The command completed successfully." This indicates that the password has been changed.

It's important to note that changing a user's password from the command line typically requires administrative privileges.

Therefore, you may need to run the Command Prompt as an administrator by right-clicking on the Command Prompt icon and selecting "Run as administrator."

Hence the CLI command used for 'net user'.

Learn more about Windows click;

https://brainly.com/question/33363536

#SPJ2

what is the minimum amount of ram required in order to support windows server 2016 with a gui desktop

Answers

Answer:

512 MB (2 GB for Server with Desktop Experience installation option)

How to fix excel ran out of resources while attempting to calculate error?

Answers

Excel ran out of resources: (1) PC restart, (2) Reinstall Office and Excel,

(3) Multi-threading was disabled under Options / Advanced / Formulas(4)

Reduced in Options/Advanced/Formulas to 1 processor.

Why does Excel claim that when trying to calculate, it ran out of resources?

While attempting to calculate one or more calculations, Excel ran out of resources. If you close all workbooks and add-ins that you aren't using, you might be able to prevent the error message about running out of resources. Using PivotTables instead of formulae when creating reports will also benefit you.

How can resources be made available in Excel?

Try disabling or removing any installed macros or add-ins if you have any. This might assist in clearing some memory. Additionally, you might try giving Excel more memory to work with. Increase the value in the "Memory Usage" field by going to File > Options > Advanced > Memory Usage.

To know more about Excel visit:

https://brainly.com/question/11995583

#SPJ4

unable to establish secure connection to zoom, what can do for case

Answers

Explanation:

1. check router

2.check app.

2.check subscription availability

Answer:

1. check router

2.check app.

2.check subscription availability

35. Veronica tried to retrieve a document file following allthe steps correctly. The filename did not appear in file list box. State three causes for this?

Answers

The file may have been deleted or moved to a different location.

The file may have been hidden or set to read-only.

The file may not be compatible with the software being used to open it.

what is the assurance that information is not disclosed to unauthorized individuals, processes, or devices.

Answers

Information that is protected against illegal access or disclosure is said to be confidential.

Is that person authorized to be there?

Any individual who accesses national data without having a job assignment who reasonably requires access or regardless of their work assignment for a cause not specified in the methods described in section 13.05, subdivision is considered an unauthorized person.

What does ATM unauthorized use mean?

Error number 050 could indicate unauthorized use of the account that users are accessing or the account that belongs to the card. Users should learn more about this by getting in touch with their corresponding bank. This is to prevent theft or loss of your money.

To know more about unauthorized visit:

https://brainly.com/question/13263826

#SPJ4

Which process requires automated builds and testing?

Answers

As stated in the preceding statement Automated builds and testing are necessary for the continuous integration process.

Autonomous equals automated, right?

Example: When a vehicle's automatic gearbox is in use, the driver does not need to change gears. Naturally, a motorist who is utilising a manual gearbox will change gears by hand. Automated emphasises using a gadget to perform tasks that were previously performed without it.

What does the term "automated job" mean?

The use of technologies to carry out routine or predictable activities without meaningful physical inputs is known as workplace automation. Automation may be used for both data-driven operations using facial recognition software as well as for physical chores utilising equipment or robots.

To know more about Automated visit:

https://brainly.com/question/14036184

#SPJ4

The Sound Department's main role is to_?

Answers

The sound department's main role is to create and manage all sound related elements for a production, including sound design, sound effects, foley, dialogue recording and mixing.

What is sound department's?

The sound department is a vital component of any production, whether it is for a film, a television show, a video game, or a theatre production. The sound department is responsible for recording, editing, and mixing sound for the production. This includes sound effects, dialogue, music, and Foley. The sound department also works with the director and other members of the production team to ensure the sound is consistent with the desired tone and atmosphere of the production.

To learn more about production
https://brainly.com/question/14971128
#SPJ1

What added functionality does a router have that an access point does not?
answer choices
Replaces the switch device.
Manages and secures the network.
Allows Wi-Fi devices to connect to a wired network.
Communicates with the network interface card.

Answers

That functionally added when a router does not have an access point is  manages and secures network.

A router can be described as a device that connects two or more packet-switched subnetworks or networks. It serves two primary use: allowing multiple devices to use the same Internet connection and managing traffic between these networks by forwarding data packets to their intended IP addresses.

There are many kinds of routers, but most routers pass data between and WANs (wide area networks) and LANs (local area networks). A LAN can be defined as a group of connected devices restricted to a specific geographic area. A LAN commonly requires a single router.

A WAN can be defined as a huge network spread out over a vast geographic area. Huge companies and organizations  that operate in multiple locations across the country, instead of, will need separate LANs for each location, which then connect to the other LANs to form a WAN. Because a WAN is distributed over a large area, it often necessitates multiple routers and switches.

Here you can learn more about routers in the link brainly.com/question/29869351

#SPJ4

how do the four main oop principles (inheritance, encapsulation, abstraction, and polymorphism) work together to make a well-designed application? how do they allow a programmer to create more reusable and maintainable code?

Answers

In Java, there are four primary OOP concepts. They are: Abstraction. Using simple things to represent complexity is known as abstraction.

Even though we all know how to turn on the television, we don't need to understand how it works to enjoy it. In Java, "abstraction" refers to simple things like "objects," "classes," and "variables" that represent code and data that are more intricate beneath. This is important because it lets you avoid doing the same thing over and over again.

Encapsulation. This is the practice of making fields in a class private and then making public methods available to access them. It acts as a barrier that protects the code and data within the class. We are able to reuse objects like variables and code components in this manner without permitting widespread access to the system's data.

Inheritance. In Java, this is a unique feature of Object Oriented Programming. It makes it possible for programmers to create brand-new classes that share a few of the characteristics of existing classes. We are able to build on previous efforts without having to start from scratch.

Polymorphism. Programmers can use the same word to mean different things in different situations thanks to this Java OOP concept. Method overloading is one Java polymorphism type. That's when the code itself starts to mean different things. Method overriding is the other type. When the values of the provided variables are considered, the various meanings become apparent.

Learn more about encapsulation:

brainly.com/question/29036367

#SPJ4

how can user-defined operator overloading harm the readability of a program? group of answer choices programmers can define silly meanings to such operators, such as using * for addition of matrices program readers will not easily be able to determine the meanings of such operators

Answers

User-defined operator overloading harms the readability of a program as b) program readers will not easily be able to determine the meanings of such operators.

When it comes to programming, user-defined operator overloading can be a detriment to the readability of the code.

This is because it can be difficult to decipher the meaning of operators that have been redefined.

When overloaded operators are used, it can be challenging to follow the logic of the program and make it difficult to debug. Hence, option b is correct.

User-defined operator overloading can make a program difficult to read, as the meaning of these operators may not be immediately clear

Therefore, it is important to consider the impact of user-defined operator overloading on the readability of a program before implementing it.

The question will correctly be written as:

Howw can user-defined operator overloading harm the readability of a program? group of answer choices

a) programmers can define silly meanings to such operators, such as using * for addition of matrices

b) program readers will not easily be able to determine the meanings of such operators

To learn more about operators, click here:

https://brainly.com/question/29949119

#SPJ4

devaki is evaluating different biometric systems. she understands that users might not want to subject themselves to retinal scans due to privacy concerns. which concern of a biometric system is she considering?

Answers

Devaki is considering the privacy concerns of a biometric system that uses retinal scans. This is a valid concern, as retinal scans are invasive and may not be acceptable to some users.

Additionally, the data collected from retinal scans could be misused if it falls into the wrong hands.

Retinal scans are an invasive type of biometric system that can be used to identify an individual by scanning their eyes. The data collected from such scans can be extremely accurate and detailed, and can be used to identify someone even if they are wearing glasses or contact lenses.

Learn more about biometrics:

https://brainly.com/question/15711763

#SPJ4

If both the integers are negative, then their sum is?

Answers

You travel left in some kind of a negative direction because both variables are negative and the total is also negative.

What is the integer rule?

Division and Multiplication of Integers. Rule 1: A owing to better and a low integer cannot be added together. RULE 2: A positive number is the result of two positive integers. Rule three states that the amount of two integrand is affirmative.

What number of digits make up an integer?

An integer field can have 3, 5, 10, even 20 digits, with length being specified in terms of the number of digits. Storage requirements for 3-digit fields are one byte, for 5-digit fields two bytes, for 10-digit fields four bytes, and for 20-digit fields eight bytes.

To know more about Integers visit:

https://brainly.com/question/24128001

#SPJ4

imagine that you are designing a system which requires a user to complete an online form. one of the principles of good interface design is to offer informative feedback. how would you, the designer, handle invalid input entered by the user? select one.

Answers

Inform the user by highlighting invalid input on the form and prompting the user to make fixes is one of the principles of good interface design is to offer informative feedback.

Option C is correct.

What is user interface design?

The goal of user interface (UI) design is to anticipate what users might need to do and make sure the interface has elements that are simple to use, understand, and access to help them do so.

Interaction design, visual design, and information architecture are all incorporated into UI. Because users are accustomed to certain interface elements acting in a certain way, you should make an effort to be consistent and predictable in your selections and layout.

This will assist in task completion, efficiency, and contentment. There are times when content can be displayed using multiple elements. When this occurs, it is essential to take into account the consequences.

For instance, elements that can help you save space sometimes put more mental pressure on the user by requiring them to guess what the element or dropdown is.

Question incomplete:

Imagine that you are designing a system which requires a user to complete an online form. One of the principles of good interface design is to offer informative feedback. How would you, the designer, handle invalid input entered by the user? Select one.

A. Inform the user by rejecting their input

B. Inform the user by accepting their input

C. Inform the user by highlighting invalid input on the form and prompting the user to make fixes

D. Inform the user by accepting their input but letting them know that some of the data entered was invalid

Learn more about user interface:

brainly.com/question/17372400

#SPJ4

how did the fourteen points address the policy of isolationism?

Answers

The Fourteen Points address the policy of isolationism in favour of more open diplomacy.

What is isolationism?

Isolationism refers to a national foreign policy that advocates against becoming involved in the political issues, particularly wars, of other countries. As a result, isolationism is fundamentally opposed to joining military alliances and mutual defence treaties. In its purest form, isolationism opposes all relationships with other nations, including treaties and commercial agreements.

This distinguishes isolationism from non-interventionism, which also promotes military neutrality but does not always oppose treaties and international agreements in general. a strategy or doctrine that seeks to keep one's country out of the affairs of other countries by refusing to join alliances, make foreign investments, sign international treaties, and generally strive to make one's economy completely self-sufficient; it seeks to focus all of one's country's efforts on its own development.

To know more about isolationism visit:

brainly.com/question/1190697

#SPJ4

a cell in excel is being formatted with percentage style. you enter 10/50 in the cell. what is the displayed value and the actual value stored in the cell ?

Answers

DV - 20% AV - 0.2 is the displayed value and the actual value stored in the cell .

In an Excel workbook, how would you refer to a cell that is located on worksheet sheet 3 in the second column third row?

Put the worksheet name followed by an exclamation point (!) before the cell address to refer to a cell or range of cells in another worksheet in the same workbook. For instance, you would type Sheet2! A1 to refer to cell A1 in Sheet2.

What Excel function adds the specified amount of decimal places to the value?

Excel's ROUND function will return a value that has been rounded to a certain number of digits. A number can be rounded to the left or right of the decimal point. Therefore, the ROUND command will round to the nearest hundredth whether you wish to round to a certain number of decimals.

Learn more about ROUND Command:

brainly.com/question/15077869

#SPJ4

Complete question is here:

Displayed value -

A.)  20% Actual Value - 20%

B.) DV - 20% AV - 0.2

C.) DV - 0.2 AV - 0.2

D.) DV - 0.2 AV - 20%

how to stop verification required when installing free apps

Answers

Whether your App Store keeps asking for a password or wants to know how to download apps without a password on iPhone, don’t leave the article until the end of the line to know the App Store and iPhone basics.

How to stop verification required when installing free apps?

Go to Settings > iTunes & App Store > Apple ID and check your payment information is current. Even if you only want something that is free this will be required if you have any payment form on record.

Payment methods that you can use in the iTunes Store, App Store, and iBooks Store - https://support.apple.com/HT202631 (Discussions on this forum mention some countries do not accept debit cards, and even if they do some items cannot be purchased with debit cards.)

if your payment method is declined, or you have a billing issue with a previous purchase in the iTunes Store - https://support.apple.com/HT203005 - various reasons why payment method is declined.

If this abruptly started happening try removing and re-entering your payment information - Change or remove your Apple ID payment information - https://support.apple.com/HT201266

See the end of the document linked above for special measures that may be necessary for some cards, plus about contacting your financial institution to make sure your records match.

To learn more about stop verification refers to;

https://brainly.com/question/28561733

#SPJ1

the value that excel displays for a cell is always the precise value you enter in the spreadsheet or the precise value resulting from a formula in that cell that is stored by the software.

Answers

The precise value you enter into the(excel) spreadsheet or the precise value produced by a formula in that cell that is saved by the program is always the value that Excel displays for that cell is Flase.

There are two types of cell references: absolute and relative. Relative and absolute references behave in different ways when copied and entered into other cells. When a formula is copied to a different cell, its relative references are changed. In contrast, absolute references are valid everywhere they are used. By default, all cell references are relative references. When reproduced across numerous cells, they alter based on the relationship between rows and columns. For instance, if you move the formula from row 1 to row 2, =A1+B1 will become =A2+B2. Relative references must be used if the same calculation is repeated.

To learn about about "excel spreadsheet" Click on below link

brainly.com/question/12339940

#SPJ4

what are the disadvantages of plasma display technology (select two)?

Answers

The gasses inside the cells of a plasma display are more sensitive to changes in air pressure than other types of displays because they produce more heat.

What does display technology entail?

Burn-in, which occurs when the same image is displayed on the screen for an extended period of time and results in the formation of a faint but persistent shadow image, is one of the most significant drawbacks of plasma displays.

Consumption of power: Plasma displays can consume a lot of power compared to other display technologies like LED/LCD displays. Plasma displays may not be as energy-efficient as they could be, making them less suitable for portable devices or other applications that require a lot of power.

Viewing position: Because plasma displays only have a limited number of viewing angles, the image quality may suffer greatly when viewed from an angle.

Learn more about plasma display technology:

brainly.com/question/28305491

#SPJ4

the specified queue does not exist for this wsdl version.

Answers

Answer:

This is usually due to an incorrect queue name or client configuration. Please make sure the client you are using is set to the right region, and that the queue name you specified is exactly correct from SQS.

Explanation:

Object Oriented Databases (OODBs) were once considered a competitor to relational databases until what limitation was discovered?

Answers

Object-oriented databases (OODB) were considered competitors to relational databases until the limitations discovered: The complexity of the OOB model

Why did object-oriented databases fail?

Object-oriented databases failed because they failed to meet the need for easy access to raw data, but they continued to use object-oriented languages ​​and thinking tools, all the while continuing to transform data in all interfaces. Unfortunately, the advent of microservices has exacerbated this problem.

What's the problem with OODBMS?

OODBMS have the following drawbacks: No universal data model: OODBMS do not have a universally accepted data model, and most models lack a rationale. This shortcomings are considered significant shortcomings and are comparable to per-relational systems.

To learn more about Object Oriented Database visit:

https://brainly.com/question/29642352

#SPJ4

You are in a cement room with no windows and doors and you have a piece of wood and a mirror. How will you escape?

Answers

It is not possible to escape the cement room with only a piece of wood and a mirror as these items do not have the ability to create an opening in the walls or floor of the room.

The mirror could be used to signal for help by reflecting sunlight or other light sources if any available, but it would not provide a means of escape. The piece of wood could be used as a tool to break the mirror and create a signal for help, but it would not provide a means of escape.

In this case, it would be best to find another way to signal for help, such as making noise or using the mirror to reflect light to a nearby window or door.

It would also be important to stay calm and think critically about the situation in order to find any potential weaknesses or hidden exits in the room. Additionally, it would be important to remember that there might be some emergency exit or a phone, in the room to contact the authorities.

In summary, with the given objects, it's not possible to escape the room physically, but signaling for help is possible. It's important to use the objects creatively and to be resourceful in order to signal for help and increase the chances of rescue.

To learn more about escape:

brainly.com/question/29740243

#SPJ4

internally, the central processing unit (cpu) consists of two parts: question 2 options: a) input devices and output devices. b) software and hardware. c) the arithmetic and logic unit (alu) and the control unit. d) single-task devices and multi-task devices. e) the compiler and the linker.

Answers

The two internal components of the central processing unit (cpu) are: c) the control unit and the arithmetic and logic unit (alu).

What exactly is a CPU (central processing unit)?

A computer's "control center" is the primary component known as the Central Processing Unit (CPU). The CPU, also known as the "central" or "main" processor, is a complicated collection of electronic circuits that runs the operating system and applications on the machine. The instructions that are given to the CPU are interpreted, processed, and carried out, typically by the device's software and hardware applications.

The central processing unit (CPU) transforms input data into information that is more usable by carrying out a variety of arithmetic, logic, and other operations. Although the CPU must have at least one core for processing, many have multiple cores. There will be a total of 12 processors on a server with two hexa-core CPUs, for instance.

To learn more about CPU visit :

https://brainly.com/question/16254036

#SPJ4

your company uses computer-controlled machine tools on the factory floor as part of its assembly line. this morning, you've discovered that somebody erased a key set of machine control parameter files, and the backups you have will need to be updated and verified before you can use them. this may take most of the day to accomplish. what information security attribute is involved here?

Answers

The information security attribute that involved there is integrity.

Nevertheless it is clear that the necessary parameter files are not available, this seems to have been caused because somebody could violate the integrity requirements of those files—deleting them does not seem to have been an authorized change.

Security can be described as  a fungible, a tool, and negotiable one that offers a monetary value. This is necessarily a certificate signifying ownership of a particular asset in a variety of forms. Its very nature makes it tradable for example transferring its ownership from person to person.

Here you can learn more about security in the link brainly.com/question/28070333

#SPJ4

on a linux system, which file contains information about group memberships?

Answers

On a Linux system, the file that contains information about group memberships is / etc /group. The / etc /group' file on a Linux system is used to store information about the different groups on the system.

Each line in the file represents a single group and contains several fields separated by colons. These fields include the group name, the group's password (which is usually set to an asterisk or x to indicate that the password is stored in the / etc /gshadow file), the group's numerical ID (GID), and a list of the users that are members of the group. It's worth noting that the / etc / group file is used by the system to determine group membership when a user logs in or when a user attempts to access a file or directory that is protected by group permissions.

Learn more about linux system, here https://brainly.com/question/28443923

#SPJ4

Other Questions
which would a quantitative sociologists use to gather data? ANSWER ASAP GOR BRAINLIEST Michaela believes that the middle class is being squeezed by too many taxes while wealthier citizens are enjoying tax breaks. She has decided to run for mayor in the next local election. When Michaela starts her campaign, how should Michaela classify herself?as a Republicanas a Tea Party memberas an Independentas a Democrat after an earthquake, there were a large number of deaths and casualties who required acute care for several days in the field. which teams activated by state and federal government authorities would the nurse consider to be the most suitable in managing the event? select all that apply. one, some, or all responses may be correct. what are three things that made justinian a good ruler? __________ cells are formed as a result of Mitosis calculate the allele frequencies in the iguana population following the mutation event. What is the value of x?O 12 unitsO 15 unitsO 20 unitsO24 units how does rousseaus the social contract describe liberty? find a recurrence relation for the number of ways to parenthesize an expression of n variables fully What is a different common denominator you could use in problem 2? Describe how you would add the fractions using this different common denominator. Is the result equivalent to the sum found in problem 2? Theres problem 2 How do you translate a graph vertically and horizontally? in a class of 30 students 3 of the 16 boys are left handed and 2 of the 14 girls are left handed one student is chosen at random which of the following represents a conditional probability IM BEGGING PLEASE I NEED HELP PLEASE ANSWER ALL QUESTIONS WILL GIVE BRAINLIEST!! Jada has a vegetable Garden. Two-thirds of the garden is made up of tomato plants. Four-fifths of the tomato plants are beefsteak tomatoes. This model represents Jadas Garden. Shade the model to show the portion of the garden that is made up of beefsteak tomatoes. >>A square. The square is divided into 15 horizontal rectangles that are arranged in 5 rows and 3 columns. The relationship between the temperature of a system and the total energy of the system depends on what factors? What is the answer for 2/3 x 18 What's one way to show respect when others are speaking?wait to speak until others are finished with their thoughtsinterrupt the speaker while they're speakinglook at your phone while they're.speakingO talk over the speaker to make sure your idea is heard what country sponsored the expedition of christopher columbus where he discovered the americas? 17. VACATION RENTAL Angelica is comparing vacation prices in Boulder, Colorado, and Sarasota, Florida. In Boulder, she can choose a 1- or 2-week stay in a 1- or 2-bedroom suite. In Sarasota, she can choose a 1-, 2-, or 3-week stay in a 2- or 3-bedroom suite, on the beach or not.a. How many outcomes are available in Boulder?b. How many outcomes are available in Sarasota?c. How many total outcomes are available? Who is or was the father of turfgrass science who began at msu in 1961 and then went to texas a&m in 1975?