2. question 2 a data analyst prepares to communicate to an audience about an analysis project. they consider what the audience members hope to do with the data insights. this describes establishing the setting. 1 point true false 3. question 3 when designi

Answers

Answer 1

The statement a data analyst prepares to communicate to an audience about an analysis project. They consider what the audience members hope to do with the data insights is false.

Who is a data analyst?

An expert or professional who is tasked with reviewing, transforming, analyzing, and modeling data in order to find relevant information, offer insights, and draw well-informed conclusions in order to support decision-making.

Audience engagement in data storytelling is a term used in computer technology to describe a process that is usually centered on taking into account. All the difficulties that audience members expect to do and achieve with the data insights offered by a data analyst.

Therefore, the statement is false.

To learn more about data analysis, refer to the link:

https://brainly.com/question/29564589

#SPJ1

The question is incomplete. Your most probably complete question is given below:

True

False


Related Questions

If you don't like the color of your code, press Ctrl+Shift+A, type Jump, and click Jump to Colors and Fonts. You will be taken to the settings page where you can modify the color of the code element at the caret. T/F?

Answers

True. In IntelliJ IDEA, you can modify the color and font settings for different code elements using the "Jump to Colors and Fonts" feature. To access this feature, you can press Ctrl+Shift+A, type "Jump",

and then click "Jump to Colors and Fonts" in the search results. This will take you to the settings page where you can modify the color of the code element at the caret or any other code element.

Once you are on the Colors and Fonts settings page, you can select the code element you want to modify from the list on the left and then use the options on the right to change its color, font, or other attributes. After making your changes, you can click "Apply" or "OK" to save the new settings and see the changes reflected in your code.

learn more about code    here:

https://brainly.com/question/31228987

#SPJ11

A text-editing application uses binary sequences to represent each of 200 different characters. What is the minimum number of bits needed to assign a unique bit sequence to each of the possible characters

Answers

The minimum number of bits that one needs to give a unique bit sequence to each of the possible characters is 8.

What are binary sequences?

A binary sequence is known to be also called a bitstream. This is regarded as is a string of ones and zeros.

The information in storage which can be in form of text message, a photograph, a song, a computer program, etc. may looks the same, like in a form or sequence of bits.

See options below

4

6

7

8

Learn more about bits from

https://brainly.com/question/19667078

EXPLAIN WHATS agri crop EXPLORATORY COURSE​

Answers

What is what ?? Can u say it correctly

1. prompt the user on which action they want to take: a. convert cubic feet to u.s. bushels b. convert miles to kilometers c. determine graduation with honors title d. exit program 2. programs at a minimum must have the following methods: a. convert cubic feet method that gets cubic feet and returns u.s. bushels. b. convert to kilometers method that gets miles and returns kilometers c. determine graduation with honors title method that gets

Answers

A menu-based application offers the user an operation and navigation guide, in this case, each menu option calls the execution of each program method.

What are the menu options in this program?

Create a main method in your program to tell the user what action you want to perform.Create a method to convert cubic feet to US bushels. This method should take cubic feet as an argument and return US bushels.Create a method to convert miles to kilometers. This method should take miles as an argument and return kilometers.Create a method to determine graduation with honors. This method must accept no arguments and return the title.Create a method to exit the program. This method must accept no arguments and must exit the program.

Here is an example:

Java code:

import java.io.*;

public class Main {

public static void main(String args[]) throws IOException {

 BufferedReader bufEntrada = new BufferedReader(new InputStreamReader(System.in));

 String ans, honorarytitle;

 double cubicfeet,gpavalue,kmvalue,milesvalue,usbushels;

 do {

  System.out.println("Choose an option (A-D)");

  System.out.println("*************************");

  System.out.println("(A) Convert Cubic Feet To U.S. Bushels");

  System.out.println("(B) Convert Miles To Kilometers ");

  System.out.println("(C) Determine Graduation With Honors Title ");

  System.out.println("(D) Exit Program ");

  ans = bufEntrada.readLine();

  ans = ans.toLowerCase();

  switch (ans) {

  case "a":

   System.out.print("Enter cubic feet value to convert: ");

   cubicfeet = Double.parseDouble(bufEntrada.readLine());

   usbushels = cubicfeettobushels(cubicfeet);

   System.out.println("U.S. Bushels: "+usbushels);

   break;

  case "b":

   System.out.print("Enter miles value to convert: ");

   milesvalue = Double.parseDouble(bufEntrada.readLine());

   kmvalue = milestokm(milesvalue);

   System.out.println("Kilometers: "+kmvalue);

   break;

  case "c":

   System.out.println("Enter GPA (grade point average): ");

   gpavalue = Double.parseDouble(bufEntrada.readLine());

   honorarytitle = honorstitlemethod(gpavalue);

   System.out.println("Honorary title: "+honorarytitle);

   break;}

 } while (!ans.equals("d"));}

public static double cubicfeettobushels(double cubicfeet) {

 double usbushels;

 usbushels = 0.803564*cubicfeet;

 return usbushels;}

public static double milestokm(double milesvalue) {

 double kmvalue;

 kmvalue = 1.60934*milesvalue;

 return kmvalue;}

public static String honorstitlemethod(double gpavalue) {

 String honorarytitle;

 int i;

 i = 0;

 if (gpavalue>=3.5 && gpavalue<=3.7) {

  i = 1;}

 if (gpavalue>=3.8 && gpavalue<=3.9) {

  i = 2;}

 if (gpavalue>=4.0) {

  i = 3;}

 switch (i) {

 case 1:

  honorarytitle = "CumLaude";

  break;

 case 2:

  honorarytitle = "MagnaCumLaude";

  break;

 case 3:

  honorarytitle = "SummaCumLaude";

  break;

 default:

  honorarytitle = "No honor title";}

 return honorarytitle;}}

For more information on Java programs see: https://brainly.com/question/26789430

#SPJ11

1. prompt the user on which action they want to take: a. convert cubic feet to u.s. bushels b. convert

Which keys should you press to insert a comment in OpenOffice Writer?
A.
Ctrl+Alt+I
B.
Ctrl+Alt+C
C.
Ctrl+Alt+O
D.
Ctrl+Alt+N
E.
Ctrl+Alt+M

Answers

Answer: Ctrl + Alt + C

Explanation:

Which tool can effectively increase the curl of the subject’s lips?

Answers

Blur tool can effectively increase the curl of the subject’s lips in photoshop.

What is blur tool?

You can paint a blur effect using the Blur Tool. By reducing the contrast between the pixels it affects, the Blur Tool's strokes blur the pixels' appearance.

All pertinent options for the Blur filter are displayed in the context-sensitive Options Bar, which is typically at the top of your workspace.

You can change the size and firmness of the brush using the brush option. The softness or featheriness of the brush's edges depends on how hard it is. Stronger in the center and weaker toward the edges, a soft blur brush will change pixels to varying degrees. It will create a stroke that melds well with the adjacent pixels.

Learn more about blur filters

https://brainly.com/question/20363744

#SPJ1

True or False? Using your traffic analytics report, you can see the source of traffic to your website

Answers

Answer:

True

Explanation:

The assignments option in my Microsoft Teams is not coming. What should i do?​

Answers

Answer:

drugs

Explanation:

:)

Write pseudocode for one or more selection statements to decide whether a year is a Leap year. The rules are:

A year is generally a Leap Year if it is divisible by 4, except that if the year is divisible by 100, it is not a Leap year, unless it is also divisible by 400. Thus 1900 was not a Leap Year, but 2000 was a Leap year.

Answers

Year = input()

isLeapYear= false
if Year%4 = 0
if Year%100 != 0 or Year%400 == 0
isLeapYear = true
print(isLeapYear)

In this exercise we have to use the knowledge of the python language to write the code, so we have to:

The code is in the attached photo.

So to make it easier the code can be found at:

Year = input()

isLeapYear= false

if Year%4 = 0

if Year%100 != 0 or Year%400 == 0

isLeapYear = true

print(isLeapYear)

See more about python at brainly.com/question/26104476

Write pseudocode for one or more selection statements to decide whether a year is a Leap year. The rules

PI
s
ne
poem for the
During reading: Work
on the following questions:
suggests
I
a
1
b
What do you predict the poem will be about?
How does the shape support what the titles
How many stanzas does the poem have?
b How many sentences does it have?
3 Read the poem aloud in your group.
2
a
m
Until I saw the Sea by Lilian Moore
ou the Sea​

Answers

Explanation:

As the qn was copy pasted from another document...the qn seems incorrect... and incomplete..

pls see to it and attach the correct qn...

sorry

In what way are high-level programming languages limited? (5 points)
a
They are less readable by humans because they are written in the computer's native machine code.
b
They are written for specific computers and will only work on that one type of computer.
с
They give more control over the hardware and execute tasks more quickly.
O
d
They must be translated into machine code by interpreting and compiling.

Answers

Answer:

low-level language is a type of programming language that contains basic instructions recognized by a computer. Unlike high-level languages used by software developers, low-level code is often cryptic and not human-readable. Two common types of low-level programming languages are assembly language and machine language.

Explanation:

High level-level programming language is limited in that They must be translated into machine code by interpreting and compiling.

What is a High-level programming Langauge?

High-Level Programming Langauge is a language that is written in human-readable form, in other words, they include normal human statements which makes it easy for programmers to understand.

For High-level programming Langauge to work effectively, a compiler is needed to transform these statements into machine codes.

Learn more about High-level programming Langauge here:

https://brainly.com/question/22695199

#SPJ2

What is mark in in premiere pro

Answers

Markers are an often underutilized tool in the Premiere Pro CC toolbox. They are little colored tabs you can apply to both your timeline and your source clips to indicate important points in time with a color or note.

2. When a business practices offensive behavior, you have many options. The option with the loudest voice is
starting a blog
telling your family about their business practice
beginning a lawsuit
choosing to do business anywhere else but with the business whose practices were offensive

Answers

—-_-__-____- _—-_- -__-_-____-__




___-_-_ _- —|

at what frequency range does the 802.11a-based wireless technology operate?

Answers

The 802.11a-based wireless technology operates in the 5 GHz frequency range, which allows for higher data transfer rates compared to the 2.4 GHz frequency range used by 802.11b/g/n.

This higher frequency range also results in a shorter range of coverage compared to 2.4 GHz, but it is less susceptible to interference from other devices using the same frequency. Overall, 802.11a is still used in some applications where high-speed data transfer is required and there are minimal obstacles or interference in the environment.

The frequency range at which the 802.11a-based wireless technology operates is in the 5 GHz band. To provide a concise explanation:
1. The 802.11a wireless technology is a standard developed by the Institute of Electrical and Electronics Engineers (IEEE).
2. This standard operates in the 5 GHz frequency band.
3. The 5 GHz band offers higher bandwidth and less interference compared to the 2.4 GHz band used by other wireless technologies like 802.11b/g/n.
In summary, the 802.11a-based wireless technology operates in the 5 GHz frequency range.

To know more about technology operates visit:-

https://brainly.com/question/32172266

#SPJ11

Write 3 places clay can be found

Answers

Answer:

sediments , volcanic deposits

Explanation:

For this assignment, you will select a digital media career that you would be interested in pursuing. You will need to do some research to identify the right career for you. Next, you will research and discover what kind of training you will need to land your dream job. Finally, you will find available jobs in your career and select a job that you would want. After doing some research and some thinking, you will:

Select a career that is right for you. Write at least 150 words describing the career and why you believe it would be a good fit for you. Keep in mind your interests and talents.
Research and learn about what training the career requires. After you research, write at least 150 words describing the training. You can include what types of course you would take. How long the training program is, and how much it might cost you.
Finally, you will find a job! Research available jobs in your career and select a job you would want. Provide a copy of the job posting. You can snapshot this, copy and paste it, or copy it word for word. Make sure you include where you found the job posted. You will include at least 75 words on why you selected this particular position. Some helpful sites for job hunting are Indeed, Dice, Career Builder, and Monster.

Answers

A digital media career involves using technology to create and distribute various forms of digital content, such as video, audio, graphics, and multimedia. This can include roles such as graphic designers, web developers, social media specialists, digital marketers, and video producers.

How long the training program is, and how much it might cost you.

To land a career in digital media, you will typically need a combination of technical skills and creativity, as well as a strong understanding of digital media platforms and technologies. Depending on the specific career path you choose, you may need to have skills in areas such as graphic design, web development, video editing, or social media management.

Training for a digital media career can vary depending on the specific path you choose, but often involves completing a degree or certificate program in a related field such as digital media, graphic design, or marketing. These programs can range in length from a few months to several years, and can cost anywhere from a few thousand dollars to tens of thousands of dollars.

Job opportunities in digital media can be found on job search sites such as Indeed, Dice, Career Builder, and Monster. One example of a job posting for a digital media position is:

Position: Social Media Specialist

Company: XYZ Digital Agency

Location: New York, NY

Job Type: Full-time

Responsibilities:

Develop and execute social media strategies for client accounts

Create engaging social media content, including graphics and video

Monitor social media channels for trends and insights

Analyze social media metrics and adjust strategies as needed

Why I selected this particular position:

I am interested in pursuing a career in social media management, and this position seems like a good fit for my skills and interests. I am drawn to the opportunity to create engaging content and develop strategies to help clients achieve their social media goals. Additionally, the location and job type align with my preferences.

Read more on digital media career here https://brainly.com/question/29363025

#SPJ1

Please give answers between 500 words.
What have been the major issues and benefits in
Electronic Data Interchanges (EDI) and Web-Based/Internet
Tools?

Answers

The major issues and benefits of electronic data interchange (EDI) and web-based/Internet tools, such as compatibility and standardization, privacy, cost, dependence on internet connectivity, etc.,

One of the challenges of EDI is that it is ensuring compatibility between different systems and  also establishing standardized formats for data exchange. It requires agreement and coordination among trading partners in order to ensure the seamless communication, while there are many benefits that include EDI and web-based tools that enable faster and more efficient exchange of information, eliminating manual processes, paperwork, and potential errors. Real-time data exchange improves operational efficiency and enables faster decision-making. Apart from this, there are many other benefits to these.

Learn more about EDI here

https://brainly.com/question/29755779

#SPJ4

there could be a small number of deaths that didn’t take place in 2016. just in case, filter out the deaths that didn’t take place in 2016. -- name the new dataframe as "df 2016"

Answers

Bro what I don’t understand what you saying

Which office setup would be difficult to host on a LAN?
hardware.

RAM.

storage.

software.

Answers

The office setup would be difficult to host on a LAN  is option C: storage.

What is the office LAN setup like?

A local area network (LAN) is a network made up of a number of computers that are connected in a certain area. TCP/IP ethernet or Wi-Fi is used in a LAN to link the computers to one another. A LAN is typically only used by one particular establishment, like a school, office, group, or church.

Therefore, LANs are frequently used in offices to give internal staff members shared access to servers or printers that are linked to the network.

Learn more about LAN   from

https://brainly.com/question/8118353
#SPJ1

A(n) ____________________ is a light-sensing input device that reads printed text and graphics and then translates the results into a form the computer can process.

Answers

Answer: "Scanner"

Explanation: brainliest please

after a user downloads a free software product, the computer’s browser automatically opens and jumps to random product pages. what kind of malicious software is this?
a. adware
b. virus
c. spyware
d. rootkit

Answers

Answer:

A = Adware

Explanation:

Adware is the computer’s browser automatically opens and jumps to random product pages.

Thus, option (a) is correct.

Adware is a type of software that displays unwanted advertisements to the user, often in the form of pop-up windows or browser redirects. It is commonly bundled with free software downloads and may be installed without the user's explicit consent.

A virus is a malicious program that infects and spreads to other files or systems. While viruses can cause various types of unwanted behavior on a computer, such as data corruption or system damage, the specific behavior you described is not characteristic of a virus.

Spyware is another type of malicious software that secretly collects user information, such as browsing habits or personal data, without the user's knowledge or consent.

A rootkit is a type of malicious software that allows unauthorized access to a computer or network while hiding its presence from detection.

Thus, option (a) is correct.

Learn more about Adware here:

https://brainly.com/question/29786861

#SPJ4

Question 1 What are the four things that all computers need configured in order to operate on a modern network

Answers

The four things that all computers need configured in order to operate on a modern network are IP address, subnet mask, default gateway, and DNS server settings. These settings are essential to ensure that the computer can communicate with other devices on the network.

IP address: Every device on a network must have a unique IP address. This address identifies the device and allows it to communicate with other devices on the network. The IP address is usually assigned by a DHCP server. Subnet mask: The subnet mask is used to determine the network portion of the IP address and the host portion of the IP address. The subnet mask is usually set to 255.255.255.0 for small networks. Default gateway: The default gateway is the IP address of the device that is used to connect to the internet or another network.

This address is used to forward traffic that is destined for devices outside of the local network. DNS server settings: The DNS server settings are used to translate domain names to IP addresses. This allows the computer to access resources on the internet using a friendly domain name instead of a hard-to-remember IP address. The DNS server settings are usually provided by the DHCP server or can be manually configured.

To know more about IP address visit:

https://brainly.com/question/31171474

#SPJ11

Describe the indicators and hazards of a metal deck roof fire in an unprotected steel joist warehouse as well as the techniques to deal with the problem.

Answers

Answer:

Explanation:

Joist mansory building is a type of building with the exterior wall of mansory, which is capable of withstanding combustion or fire for nothing less than an hour.

Therefore, the best method to deal with fire is to build with materials that are fire resistant.

Based on the information given, it's vital to make the construction with materials that are fire resistant.

Within the fire service, building construction can simply be defined as the study of how buildings can be put together. It's also how materials and connections are used.

From the information given, it's stated that the metal deck roof is in an unprotected steel joist warehouse. Therefore, in order to prevent hazard, it's important to make the construction with materials that are fire-resistant.

Read related link on:

https://brainly.com/question/17050293

Dr. Garcia is a business professor at a large state college. At the start of each workday, he opens a Web browser on his office computer and accesses the university’s Web site. From there, he logs into his institution’s "MyCollege" portal with his username and password. From the portal he can access his email, Web pages for each of his courses, and confidential information about the students he advises. Most likely, Dr. Garcia is using what kind of network when using the portal?

Answers

Answer:

b. Intranet

Explanation:

An intranet refers to the private network that used to sharing the information, for collaboration, connecting the servcies, etc. It can be accessed by only the users who are authorized to use it. Plus, it only used inside the outside organization

So according to the given situation, since Dr Garcia has his credentials that represents the confidential information so it is an intranet netwrok

Kelly is fond of pebbles, during summer, her favorite past-time is to cellect peblles of the same shape and size

Answers

The java code for the Kelly is fond of pebbles is given below.

What is the java code about?

import java.util.Arrays;

public class PebbleBuckets {

   public static int minBuckets(int numOfPebbles, int[] bucketSizes) {

       // Sort the bucket sizes in ascending order

       Arrays.sort(bucketSizes);

       // Initialize the minimum number of buckets to the maximum integer value

       int minBuckets = Integer.MAX_VALUE;

       // Loop through the bucket sizes and find the minimum number of buckets needed

       for (int i = 0; i < bucketSizes.length; i++) {

           int numBuckets = 0;

           int remainingPebbles = numOfPebbles;

           // Count the number of buckets needed for each size

           while (remainingPebbles > 0) {

               remainingPebbles -= bucketSizes[i];

               numBuckets++;

           }

           // Update the minimum number of buckets if needed

           if (remainingPebbles == 0 && numBuckets < minBuckets) {

               minBuckets = numBuckets;

           }

       }

       // If the minimum number of buckets is still the maximum integer value, return -1

       if (minBuckets == Integer.MAX_VALUE) {

           return -1;

       }

       return minBuckets;

   }

   public static void main(String[] args) {

       // Test the minBuckets function

       int numOfPebbles = 5;

       int[] bucketSizes = {3, 5};

       int minBuckets = minBuckets(numOfPebbles, bucketSizes);

       System.out.println("Minimum number of buckets: " + minBuckets);

   }

}

Learn more about java code from

https://brainly.com/question/18554491

#SPJ1

See full question below

Write a java code for the following Kelly is fond of pebbles. During summer, her favorite past-time is to collect pebbles of same shape and size. To collect these pebbles, she has buckets of different sizes. Every bucket can hold a certain number of pebbles. Given the number of pebbles and a list of bucket sizes, determine the minimum number of buckets required to collect exactly the number of pebbles given, and no more. If there is no combination that covers exactly that number of pebbles, return -1. Example numOfPebbles = 5 bucketSizes = [3, 5] One bucket can cover exactly 5 pebbles, so the function should return 1.

In PKI, the CA periodically distributes a(n) _________ to all users that identifies all revoked certificates.

Answers

Answer:

" CRL (certificate revocation list)" is the appropriate answer.

Explanation:

A collection of such subscriber bases containing accreditation or certification status combined with the validation, revocation, or outdated certification within each final customer is known as CRL.Only certain subscribing workstations with a certain underlying cause authentication system should have been duplicated.

Technician A states that in a brake-by-wire system, the computer detects a
panic stop if the driver quickly releases the accelerator. Technician B states
that brake-by-wire systems are not efficient in detecting panic stops. Who is
correct?
O a. Technician A
O b. Technician B
O c. Both Technician A and Technician B
O d. Neither Technician A nor Technician B

Answers

The brake-by-wire system can detect panic stops if the driver abruptly releases the accelerator, so Technician A is only partly accurate. Technician B is mistaken because panic stops can be accurately detected by brake-by-wire devices.

How well do brake-by-wire devices work at spotting panic stops?

That period of time and distance can be cut down in a brake-by-wire device. The driver's abrupt release of the accelerator can be detected by the computer, which could be a sign of a panic halt.

What does an anti-lock braking device (MCQ) do?

In order to keep tractive contact with the road surface and give the driver more control over the car, ABS works by preventing the wheels from locking up when braking.

To know more about panic stops visit:

https://brainly.com/question/28779956

#SPJ9

You configure a router interface with the IP address 192. 168. 10. 62 255. 255. 255. 192 and receive thefollowing error:Bad mask /26 for address 192. 168. 10. 62Why did you receive this error?

Answers

Ip subnet-zero was not enabled on the router, which is why this error happened. Zero Subnet If a network address is provided, subnet zero refers to the initial subnet created after subnetting the network address.

An networking device called a router is used to forward data packets between computer networks. On the worldwide Internet and between networks, routers handle traffic directing. Data packets are the unit of data delivered via a network, such as an email or a web page. A node or host on a communications network can be identified by their network address. Network addresses are intended to be unique identifiers across the network, yet some networks permit local, private, or locally controlled addresses that might not be unique.

Learn more about router here

https://brainly.com/question/29869351

#SPJ4

A user is unable to access websites and has reported connectivity issues with pop-ups on the screen. A technician removes malware, and then is able to ping the router and access the websites. Which of the following NEXT steps should the technician perform in troubleshooting this issue? (Choose two.)
A. Documents findings, actions, and outcomes.
B. Reboot the device to verify the fix.
C. Reconnect the device to the network.
D. Verify the settings in IPConfig.
E. Research the problem based on symptoms.
F. Run a virus scan.

Answers

Answer:

A. Document findings, actions, and outcomes.

F. Run a virus scan.

Explanation:

I’ll give Brainly if u answer all please
ASAP

Ill give Brainly if u answer all please ASAP

Answers

Answer:

Answers are: 38, 135, 23, 209, 53 & 181 respectively

Explanation:

Other Questions
Eventually, these differences led to a 30-year war between the two city-states. Athens surrendered, but its important ideas remained what is the answer for x Please i will give big reward you are runnig a reaction to make a carboxylic acid, but what appears to be the product spot is too low on the tlc plate and is elongated, i.e., it isn't a nice circle but is stretched out a lot. to make this spot rounder and move a little farther, which of the following is most likely to A small, test batch of lemonade used 1/4 cup of sugar added to 1 cup of water and 1/4 cup of lemon juice. After confirming it tasted good, a larger batch is going to be made with the same ratios using 10 cups of water. How much sugar should be added so that the large batch tastes the same as the test batch?Hint: there is extra information in this. Solve for x.7x/10=42/5 All of the following are examples of 2D art EXCEPT - A logo- a statue - an emoji - a painting Who was the first wife of heracles, whom he killed in a fit of rage? Which of the following is NOT an example ofa convergent boundary?A. continental crust to continental crust collisionB. mantle to core collisionC. continental crust to oceanic crust collisionD. oceanic crust to oceanic crust collision Use the diagram below for 13-16 Zol Find mC i MAD = 35 (6.12A-S) A 45 B. 55 C 225 D. 125? Create an inventory management system for a fictional company -. Make up the company Make up the products and prices Be creativeYou do not need to create UI, use scanner input The inventory management system is to store the names, prices, and quantities of products for the company using methods, loops, and arrays/arraylists Your company inventory should start out with a 5 products already in the inventory with prices and quantities The program should present the user with the following options as a list -Add a product to inventory (name and price) -Remove a product from inventory (all information) -Add a quantity to a product list -Remove a quantity from a product list -Calculate the total amount of inventory that the company has In total and By product-Show a complete list of products, prices, available quantity Make it present in a neat, organized, and professional way-End the program Does anyone know what the answer to this would be? Calculate the Net Incomebased on the amount given.Gross Income = $2000Vacation Pay = 4%EI = 1.03%CPP = 2.76%Federal Tax = 15.90%Provincial Tax = 8.08%a.$1,364.60b. $635.40c. $1,346.60d. $653.40e. NONE of the ANSWERS are CORRECT DEFINE scholarship. Based on what criteria are scholarships awarded? (2 points) If p(x)= x^4-x^3+kx^2-x+8, determine the value of k such that (x-8) is a factor of P(x). Please help I really need thisThe average normal body temperature for a snake is 86.0 F. What is the corresponding temperature in degrees Kelvin? Which function is best represented by this graph? Statistics question:You are designing a new AI system which is aimed at measuring workplace performance. However, you are concerned that this system will discriminate on the basis of disability. Explain how you will evaluate this system, including your data collection strategy and procedure for data analysis, including statistical testing. in a shipment of 62 vials, only 14 do not have hairline cracks. if you randomly select 3 vials from the shipment, what is the probability that none of the 3 vials have hairline cracks? nowwwwwwwill name brainliest