4. the owner of csm tech publishing is always thinking about how he can use technology to improve the operation of his business. he read an article about cloud computing and has asked you to explain what cloud computing is and whether he needs it now or in the future for more efficient operations. write a memo explaining what cloud computing is and whether you recommend using any form of it now or in the future.

Answers

Answer 1

People typically have negative perceptions of disturbance when they hear it. Our access to electricity is disrupted by downed power lines, obnoxious neighbors, sunspots, and trains derailing, and sleep is disturbed by noisy neighbors.

What is Digital Disruption?The term "digital disruption" refers to a shift in expectations and behaviors brought on by or manifested through digital capabilities, channels, or assets that fundamentally transforms culture, market, industry, or process.Digital disruption is the term used to describe the change that occurs when new digital technologies, services, capabilities, and business models influence and alter the value of the sector's current services and products. These new factors alter or disturb the status quo, requiring companies to reevaluate the current market for goods and services and maybe make adjustments.The advancement of technology has frequently overthrown the status quo throughout history. Electric lights overtook candles and oil lamps, mobile phones eliminated the dominance of landlines, and radio stars were slain by video as the automobile supplanted the horse-and-buggy.In the end, disruption brought on by digital technology means change, which may be both good and negative. Although it is a distinct species, digital disruption is. Let's take a closer look at the components of digital disruption to better understand what makes it distinctive.

To Learn more About disturbance refer to:

https://brainly.com/question/1385379

#SPJ4


Related Questions

Jeff wants to create a website with interactive and dynamic content. Which programming language will he use?
A.
DHTML
B.
HTML
C.
CSS
D.
JavaScript

Answers

Answer:

b.HTML

Explanation:

HTML (Hyper-Text Markup Language) and it was the primary language for developing the websites those days. With the evolution of internet market, the transformation of simple, static HTML websites to dynamic websites was the first thing to come up.

Which of these is NOT a way that technology can solve problems?
Group of answer choices

sorting quickly through data

storing data so that it is easily accessible

making value judgments

automating repetitive tasks

Answers

Answer:

making value judgements

Explanation:

honestly this is just a guess if there is any others pick that but this is just what I'm thinking

List three types of charts/forms used in Aged care and the Disability sectors :

A brief description of the document(s)
When and how information should be recorded
Where the forms must be stored
How long must the documentation be kept according to the Health records Act 2001
The required response for the following is three (3) examples, approximately 50 – 100 words per response

Answers

In the aged care and disability sectors, there are several types of charts/forms that are commonly used to record and store information. Here are three examples: 1. Care Plans, 2. Incident Reports, 3. Medication Charts

1. Care Plans: Care plans are documents that outline the individualized care and support needs of a person receiving aged care or disability services. They contain information about the person's medical conditions, medications, treatment plans, goals, and any specific care requirements. Care plans are typically reviewed and updated regularly to ensure that the person's needs are being met appropriately. They should be stored securely in a confidential manner, such as in a locked cabinet or password-protected electronic system. According to the Health Records Act 2001, care plans should be retained for a minimum of 7 years after the last entry.
2. Incident Reports: Incident reports are forms used to document any incidents or accidents that occur within aged care or disability settings. This could include falls, injuries, medication errors, or any other unexpected events. The reports should include details of the incident, date and time, individuals involved, and any actions taken. Incident reports must be completed as soon as possible after the event and should be stored securely, usually alongside the person's care records. The Health Records Act 2001 requires incident reports to be retained for a minimum of 7 years.
3. Medication Charts: Medication charts are used to record and track the administration of medications to individuals in aged care or disability settings. They include details such as the name of the medication, dosage, administration times, and any specific instructions. Medication charts should be completed accurately and signed by the person administering the medication. They should be stored securely to maintain confidentiality and ensure easy access for authorized personnel. According to the Health Records Act 2001, medication charts should be retained for a minimum of 7 years.
Remember, the specific forms used and their storage requirements may vary between different organizations and jurisdictions. It is important to familiarize yourself with the policies and guidelines of your specific workplace to ensure compliance with the relevant regulations.


To learn more about Care Plans
https://brainly.com/question/33837230
#SPJ11

Not all visitors to a certain company's website are customers. In fact, the website administrator estimates that about 12% of all visitors to the website are looking for other websites. Assuming that this estimate is correct, find the probability that, in a random sample of 5 visitors to the website, exactly 3 actually are looking for the website.
Round your response to at least three decimal places. (If necessary, consult a list of formulas.)

Answers

The probability that exactly 3 out of 5 visitors are looking for the website is approximately 0.014 (rounded to three decimal places).

The probability of exactly 3 out of 5 randomly selected visitors to the website actually looking for the website, given that 12% of all visitors are looking for other websites, can be calculated using the binomial probability formula.

The situation can be modeled as a binomial distribution, where the probability of success (p) is the proportion of visitors looking for the website (0.88) and the number of trials (n) is 5.

The probability mass function for the binomial distribution is given by the formula:

P(X=k) = C(n,k) * p^k * (1-p)^(n-k)

where C(n,k) is the binomial coefficient, representing the number of ways to choose k successes out of n trials.

To find the probability of exactly 3 visitors out of 5 looking for the website, we substitute the values into the formula:

P(X=3) = C(5,3) * (0.12)^3 * (0.88)^(5-3)

Calculating this expression will give the desired probability. Rounding the result to at least three decimal places will provide the final answer.

Learn more about probability  here:

https://brainly.com/question/31828911

#SPJ11

escribe un texto argumentativo donde expreses tu opinión acerca del acoso cibernético ​

Answers

Respuesta:
El acoso cibernético es uno de los problemas menos tratados por la sociedad y a la vez uno muy recurrente. Este tipo de acoso rastrea a la persona a través de redes sociales y la investiga con fines degradantes para el afectado, sin embargo, para prevenir este se deben tomar medidas de seguridad como no compartir toda tu vida en el internet y así evitar estos casos que generalmente terminan con abuso sexual o secuestro.

The purpose of a function that does not return a value is Group of answer choices to insert a temporary implementation of a function that can be refined later only used when the function needs to produce output to package a repeated task as a function even though the task does not yield a value to provide a function that can only be included in an assignment statement

Answers

Answer:

to package a repeated task as a function even though the task does not yield a value.

Explanation:

In Computer programming, a function can be defined as a group of organized, reusable sets of code that is used to perform a specific task i.e a single but related action. Thus, a function accepts data as an input, process the data and return a single result or a set of results.

Some of the notable characteristics of a function includes;

I. The name and arguments of the function must be specified by a function.

II. The implementation of a function is usually designed to be hidden from the caller.

IIII. A function define specific tasks that reusable at many points in a program.

A function that does not return a value after it executes is generally referred to as a void function. Thus, a void function uses the keyword "void" and has no explicit return statement in its body, with respect to a data type.

The purpose of a void function is to control returns back to the caller or package a repeated task as a function but, it doesn't yield a value.

Choose the correct term to complete the sentence.

A _ search can perform a search on the list [1, 10, 2, 3, 5].

Answers

Answer:

search can perform a search on the list

Answer:

linear

Explanation:

yes..

At this price of $128, will there be a shortage or a surplus of digital cameras?

Answers

At the price of $128, there will likely be a surplus of digital cameras.

To determine whether there will be a shortage or a surplus of digital cameras at a price of $128, we need to compare it to the equilibrium price in the market. The equilibrium price is the price at which the quantity demanded by consumers equals the quantity supplied by producers.

If the price of $128 is below the equilibrium price, it suggests that the price is lower than what the market equilibrium would dictate. At this lower price, consumers are more willing to purchase digital cameras, resulting in increased demand. However, suppliers may not be willing to produce and supply as many cameras at this price since it may not be as profitable for them.

As a result, there will likely be excess demand or a shortage of digital cameras in the market. Consumers will want to purchase more cameras at the lower price, but there won't be enough supply to meet that demand. This shortage indicates that the quantity demanded exceeds the quantity supplied at the given price.

It's important to note that without specific information on the equilibrium price and corresponding quantities, we can't determine the exact magnitude of the surplus or shortage. However, based on the price of $128 being below equilibrium, it is reasonable to expect a surplus of digital cameras.

Learn more about digital cameras here:-

https://brainly.com/question/12123357

#SPJ11

An idea concerning what will happen in the future. (Crossword)

Answers

Answer:

Expectation

Explanation:

Expectation is  an idea concerning what will happen in the future

You have been using PVST+ on your Cisco switches. You'd like to start using rapid spanning tree instead. What would you do?

Answers

To start using Rapid Spanning Tree Protocol (RSTP) instead of PVST+, the first step is to globally enable RSTP on all switches in the network. This can be done by issuing the "spanning-tree mode rapid-pvst" command on each switch. This command will enable RSTP and ensure that it uses the same instance IDs as PVST+, allowing for a smooth transition.

After enabling RSTP, the next step is to ensure that all switches have successfully switched to the RSTP mode. This may be accomplished by using the "show spanning-tree" command and looking for RSTP information in the output.

It is also worth noting that RSTP offers several extra capabilities that PVST+ does not, such as port roles and port states. As a result, current port configurations may need to be reviewed and adjusted to maintain RSTP compatibility.

Overall, as long as the appropriate processes are followed and settings are checked, the shift from PVST+ to RSTP should be a pretty simple process.

To learn more about Spanning Tree Protocol, visit:

https://brainly.com/question/29414584

#SPJ11

you are troubleshooting a problem in which several users have called the help desk to report problems connecting to parts of the wan. they were able to access the entire wan earlier in the day, but when they returned from their lunch breaks they were not able to access parts of the wan. you have been able to gather information about the problem, duplicate the problem, question the users, and adequately establish the symptoms of the problem. what should you do next?

Answers

After gathering information, duplicating, and establishing symptoms of the problem, the next step in troubleshooting the issue of users not being able to access parts of the WAN after lunch break is to investigate the root cause by checking the network infrastructure and verifying if any changes were made during lunchtime.

Since the problem occurred after the lunch break, it is possible that someone made changes to the network infrastructure, such as reconfiguring the router or adding a new device. It is important to investigate and verify any changes made during lunchtime, as they could be the cause of the issue. Additionally, it is important to check the network infrastructure, including the routers, switches, and cabling, to ensure that they are functioning correctly and that there are no hardware issues. It may also be helpful to analyze network traffic to identify any anomalies or issues that could be causing the problem. Finally, it is important to communicate with the affected users and provide regular updates on the status of the investigation and resolution of the issue.

Learn more about WAN here:

https://brainly.com/question/31115335

#SPJ11

Which feature in PowerPoint is used to correct common capitalization and text formatting issues but can also be modified for more robust and personalized corrections?

Grammar Checker
Insights
Spelling Checker
AutoCorrect

Answers

Answer:

AutoCorrect: D on edge

Explanation:

Answer:

D.AutoCorrect

Explanation:

a software function that automatically makes or suggests corrections for mistakes in spelling or grammar made while typing.: a computer feature that attempts to correct the spelling of a word as the user types it The iPad boasts an autocorrect system that will try to figure out what you mean to type even when you don't quite tap the right keys.

Python Project Worksheet
Print | Save
Output: Your goal
You will write a program that asks a user to fill in a story. Store each response in a variable, then print the story based on the responses.

Part 1: Plan and Write the Pseudocode
Use the following guidelines to write your pseudocode for a fill-in story program.

Decide on a list of items the program will ask the user to input.
Your program should include at least four interactive prompts.
Input from the user should be assigned to variables and used in the story.
Use concatenation to join strings together in the story.
Print the story for the user to read.


Write your pseudocode here:











Part 2: Code the Program
Use the following guidelines to code your program.

Use the Python IDLE to write your program.
Using comments, type a heading that includes your name, today’s date, and a short description.
Set up your def main(): statement. (Don’t forget the parentheses and colon.)
Conclude the program with the main() statement.
Include at least two print statements and two variables.
Include at least four input prompts.
Use concatenation to join strings.
Follow the Python style conventions regarding indentation in your program.
Run your program to ensure it is working properly. Fix any errors you may observe.
Example of expected output: The output below is an example of a “Favorite Animal” message. Your specific results will vary depending on the choices you make about your message.

Output

The kangaroo is the cutest of all. It has 5 toes and a beautiful heart. It loves to eat chips and salsa, although it will eat pretty much anything. It lives in New York, and you must be super sweet to it, or you may end up as its meal!


When you've completed writing your program code, save your work by selecting 'Save' in the Python IDLE. When you submit your assignment, you will attach this Python file separately.

Part 3: Post Mortem Review (PMR)
Using complete sentences, respond to all the questions in the PMR chart.

Review Question Response
What was the purpose of your program?
How could your program be useful in the real world?
What is a problem you ran into, and how did you fix it?
Describe one thing you would do differently the next time you write a program.

Part 4: Save Your Work
Don't forget to save this worksheet. You will submit it for your assessment.

Print | Save

Answers

Answer:

I will do it and send it in a pic

Explanation:

give me a sec

Using the Internet comes with certain risks that you should be prepared for. True False​

Answers

True true and true u can get catfished or be talking to a 78 y/o man like me am I a person or a old piece of hag

HELP MEEE PLEASE!!!
Match the description with the information system it represents.

1. The use of a computer program to determine the diagnosis of a patient

2. The use of a computer program to forecast an earthquake

3. The use of a computer program to create a presentation

Decision support systems
Knowledge-based system
Office automation system

Answers

Answer:

b goes with 1 c goes with 3 and a goes with 2

Explanation:

We found 10 travel apps to make the most of any vacation. which app from our list has walking tours of hundreds of cities worldwide, all usable without network service or wi-fi?

Answers

"Maps" is the name of the travel app from the list that offers walking tours of hundreds of places across the world, all of which can be used without network coverage or wi-fi.

When you download the app, you can save maps and guides for your destination to your phone, so you can use them even without an internet connection. With Maps.Me, you can search for restaurants, hotels, and other attractions, as well as create custom routes and bookmark your favorite places. In addition to walking tours, the app also offers driving and cycling directions.

Travel apps are a source of inspiration and extremely useful for booking and managing logistics — even making restaurant reservations or finding a great fitness class wherever in the world you’re flying to next.

From apps that help with everything from day-of hotel bookings and last-minute flight changes to those that serve as guidebooks and foreign-language dictionaries, travel is infinitely easier thanks to technology.

Apps can help you navigate a new city, make currency conversions, pack a perfect suitcase and even provide on-the-ground local expertise. Whatever you need when you hit the road, there’s an app for that.

To know more about travel apps: https://brainly.com/question/31253442

#SPJ11

The ______ moving air alone will charge suspended particles and cause the buildup of static electrical charges on people and objects in the environment​

Answers

Answer:

friction

Explanation:

the resistance that one surface or object encounters when moving over another. Alsothe action of one surface or object rubbing against another.

java, visual basic, python and c++ are examples of what type of programming language?

Answers

Let me do my research and I’ll send you the Link

What is bit of analytics

Answers

The goal of bit-width analysis is to determine how few bits are required for each program variable in order to assure correct execution and resource efficiency.

Bit refers to binary numbers. In a computer, the smallest unit of data is called a bit (short for binary digit). One of the binary values, 0, or 1, represents a bit. In a computer, a bit is a binary digit and represents the smallest unit of data. Only one of two possible values—0 or 1, which represent the electrical states of off or on, respectively—can be stored in a bit. You hardly ever work with information one bit at a time because bits are so little.

Learn more about computer here-

https://brainly.com/question/11941925

#SPJ4

calculate the information gain when splitting on a and b. which attribute would the decision tree induction algorithm choose?calculate the gain in the gini index when splitting on a and b. which attribute would the decision tree induction algorithm choose?entropy and the gini index are both monotonously increasing on the range [0, 0.5] and they are both monotonously decreasing on the range [0.5, 1]. is it

Answers

By deducting the gain ratio of the splitting from the index of both the parent node, it is possible to determine the increase in the gain coefficient when dividing on a and b.

What is algorithm?

An algorithm is a set of instructions or steps that are designed to solve a problem or accomplish a task. It is an effective way of performing a task that can be repeated, with the same results each time. Algorithms are commonly used in computer programming and can range from simple to complex. They can be used to solve simple tasks such as sorting a list, to complex tasks such as playing a game of chess. Algorithms are also used in everyday life, such as when a person follows a recipe or drives to a destination. Algorithms help to make tasks easier and more efficient by breaking them down into smaller, manageable steps.
The information gain when splitting on a and b can be calculated by subtracting the entropy or gini index of the split from the entropy or gini index of the parent node. The attribute with the highest information gain would be chosen by the decision tree induction algorithm. The gain in the gini index when splitting on a and b can be calculated by subtracting the gini index of the split from the gini index of the parent node. The attribute with the highest gain in the gini index would be chosen by the decision tree induction algorithm. Yes, entropy and the gini index are both monotonously increasing on the range [0, 0.5] and monotonously decreasing on the range [0.5, 1].

To learn more about algorithm.
https://brainly.com/question/24953880
#SPJ4

What is string literal in Java?

variable type that allows more than one character
group of printable characters enclosed within double quotation marks
group of printable characters enclosed within curly brackets
variable type that only allows for one character

Answers

Answer:

A string literal in Java is basically a sequence of characters from the source character set used by Java programmers to populate string objects or to display text to a user. These characters could be anything like letters, numbers or symbols which are enclosed within two quotation marks.

Explanation:

Ross is running a small data entry back office, for which he has contracted you for network management. Ross has made it very clear that because he has just started the company he wants to cut down on expenses wherever he can. One such option involves the router-he wants to exchange the router with a similar but less expensive alternative. Which of the following will you refer to Ross in such a situation?
a. A layer 3 switch
b. An SDN controller
c. Storm control
d. A root port

Answers

The right option that I can refer to Ross in such a situation is called a  A layer 3 switch.

What is a layer 3 switch?

This is known to help make switch packets by looking at IP addresses and also MAC addresses.

Note that Layer 3 switches helps to separate ports into virtual LANs (VLANs) and carry out the routing between them and as such, The right option that I can refer to Ross in such a situation is called a  A layer 3 switch.

Learn more about  switch from

https://brainly.com/question/17245000

#SPJ4

What's not an computer characteristic ??

Answers

Answer:

A computer is an electrical machine

The computer cannot think at its own

The computer processes information error-free

The computer can hold data for any length of time

Explanation:

The computer is an electrical machine is not a computer characteristic option (A) a computer characteristic is correct.

What is a computer?

A computer is a digital electronic appliance that may be programmed to automatically perform a series of logical or mathematical operations. Programs are generic sequences of operations that can be carried out by modern computers. These apps give computers the capacity to carry out a broad range of tasks.

The question is incomplete.

The complete question is:

What's not a computer characteristic?

A computer is an electrical machineThe computer cannot think on its ownThe computer processes information error-freeThe computer can hold data for any length of time

As we know,

The characteristics of a computer are:

The computer is unable to think for itself.

Information is processed by the computer without error.

The computer has unlimited storage capacity for data.

Thus, the computer is an electrical machine is not a computer characteristic option (A) a computer characteristic is correct.

Learn more about computers here:

https://brainly.com/question/21080395

#SPJ2

9
10
1
2
3
4
5
Which is a valid velocity reading for an object?
45 m/s
45 m/s north
O m/s south
0 m/s

Answers

Answer:

Maybe 45 m/s north I think I'm wrong

Answer:45 ms north

Explanation:

1. What is material science?

Answers

Answer:

Explanation:

The study of the properties of solid materials and how those properties are determined by a material’s composition and structure is material science.

Answer:

The scientific study of properties and applications of materials of construction or manufacture.

Explanation:

Information below:

1. What is material science?

What is a characteristic of tasks in Outlook?
The Tasks view can be seen by clicking the View tab.

New tasks are created in the Appointments form

Tasks are an action item in Outlook and are basically a to-do list.

Old tasks are automatically deleted from your list​

Answers

Answer:

C. Tasks are an action item in Outlook and are basically a to-do list.

Explanation:

A to-do List is just a list of tasks.

and I took the test and got it right

Answer:

C. is correct

Explanation:

edg 2021

A few risks that do NOT arise when we connect to the Internet are
O stolen PII or credit card data
O spam
O viruses
O farming

Answers

The correct answer would be farming
the answer is farming because that has nothing to do w the internet

"3.24.2 Make Button"
Does anyone have the script for CodeHS Make Button? It may be different for you but mines is 3.24.2.
(I had to change some things so it all could fit)
Heres my code so far:

html
head
style
#textbox{
margin: 10px;
border: 1px solid black;
height: 200px;
}
style
head
body
div id = 'keyBoard'>
div
div id = 'textbox'>
div
body
script
//create function makeButton
//call makeButton twice to test.
script
html

Answers

Attached is an example code for creating a button using JavaScript in HTML, which you can use as a reference for your Make Button CodeHS exercise:

What is the script  about?

This code creates two buttons with IDs "button1" and "button2", and adds click event listeners to them using addEventListener(). When the buttons are clicked, the event listener functions set the content of the #textbox element to a message indicating which button was clicked.

Therefore, You can copy this code and modify it to meet the requirements of your Make Button CodeHS exercise.

Read more about script here:

https://brainly.com/question/26121358

#SPJ1

What is a botnet attack and how does it work?

Answers

A botnet attack is a malicious attack using a network of devices, known as bots, that are remotely controlled by a malicious actor. A botnet is formed when a malicious actor uses malware or malicious code to infect computers, mobile phones, and other devices with the intention of using them to perform malicious activities such as sending spam, conducting Distributed Denial of Service attacks,or stealing sensitive information.

In a botnet attack, the malicious actor will use a bot to send commands to the infected devices, which can be used to take control of them. The bots then follow the commands of the malicious actor, allowing them to spread malicious code, launch attacks, and steal information. This type of attack is extremely difficult to defend against since the bots can be spread across a wide network of devices.

the botmaster can use encryption and other techniques to hide their activities from security researchers and law enforcement agencies. To protect against botnet attacks, it is important to keep your software up to date, use strong passwords, and be cautious when opening emails or downloading files from unknown sources.

For such more questions on botnet attack:

brainly.com/question/29905595

#SPJ11

ASAP please
What is an algorithm?
1. a way to make an informed judgment
2. used only on a computer
3. used only with map directions
4. a set of directions for problem solving

Answers

I think it’s 4


a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.

Answer:

Answer is D :)

Explanation:

Other Questions
if you were the director of my children my africa what would you tell thami to do when saying this line Why should you not touch an electric air socket? Explain If a second planet were of the same radius R and made of the same material but had a hollow center of radius 0.50 R , what would be the acceleration of gravity at its surface According to david hume in 'Of the Standard of Taste' what is beauty? is beauty a quality of things in themselves ? trigonometry problems help pls someone pleaseeee answer!!! In policy announcements made last year the RBA indicated that itwas unlikely to raise the cash rate until 2024 at the earliest. Howhas the RBAs assessment of the situation changed since then? What are the specialized structures made from microtubules that are involved in cellular motility? Which words should be capitalized in the title "a journey to the world above"? Check all that applyjourneytotheworldabove There are 3966 students at a particular college, and 3450 students are taking math. What percentage of the students at the college are taking math? A refrigerator is to cool 50 kg of water from 250C to 50C. The specific heat of water is 4.2 kJ/kgK. If the COP of the refrigerator is 2.0 and has a power input of 500 W, find the time taken to cool the water. How large a sample is needed if we wish to be 96% confident that our sample proportion in Exercise 9.53 will be within 0.02 of the true fraction of the voting population? HURRY ASAPThe table shows conversions of common units of length. Unit of Length Customary System Units Metric System Units 1 inch 2.54 centimeters 1 foot 0.3048 meters 1 mile 1.61 kilometers About how many inches are equivalent to 3 meters? Round the number(s) needed in the table to the nearest tenth to find the approximate answer. 10 inches, 75 inches ,100 inches ,or 120 inches If a particular utility burned 9.80 million tons of coal that was 2.00% sulfur by weight, how many tons of sulfur dioxide was emitted?Enter your answer in scientific notation. I would like some help please Which sentence from Nicholass Diary: April 2 and 3 contains an analogy? suddenly I noticed a patch of leaves that was disturbed and a log that looked like it had been moved. "The forest was like a statue; it was still and covered in damp moss and dead leaves; it didn't even seem alive." When I asked Dad about it, his eyes lit up, and he said he saw the treasure. It appeared that no one had been there for a long time so I knew that this treasure must be old and far under the ground. distinguish between climate and atmosphere. Facts about French revolution In Stalins rhetorical situation what was the main issue he addressed The information below relates to the Cash account in the ledger of Vaughn Company.Balance september 1-$17,060cash deposit-$64,330Balance september 30-$17,784check written _ $63,606The September bank statement shows a balance of $16,802 on September 30 and the following memoranda. CreditCollection of $1,684 not plus interest $36$1,720Interest earned on checking account $51DebitsNfs check: richard nance$615Safety deposit box rent$71At September 30 , deposits in transit were $4,640, and outstanding checks totaled $2,573