a computer networking system created to share resources within a facility or organization is also called a:

Answers

Answer 1

A computer networking system created to share resources within a facility or organization is also called a local area network (LAN).

A local area network (LAN) is a computer networking system that is designed to connect devices within a limited geographic area, such as a building, office, or campus. LANs are used to share resources, such as files, printers, and internet access, among connected devices. They typically use Ethernet or Wi-Fi technology to connect devices and can be configured with a variety of network topologies, including bus, ring, and star. LANs are widely used in businesses, schools, and government agencies, and they provide a cost-effective way to share resources and collaborate among users within an organization.

Learn more about   computer networking here;

https://brainly.com/question/13175896

#SPJ11

Answer 2

A computer networking system created to share resources within a facility or organization is also called a Local Area Network (LAN).

A Local Area Network (LAN) is a computer networking system that is designed to connect devices within a limited geographic area, such as a single building, campus, or office. LANs allow devices such as computers, printers, and servers to communicate with each other and share resources, such as files, applications, and internet access.

In a LAN, devices are typically connected to a central device, such as a switch or router, which manages the traffic between them. LANs may use wired or wireless connections to connect devices, depending on the needs of the organization and the available technology.

LANs are commonly used in businesses, schools, and other organizations to enable communication and collaboration between users. For example, a LAN may allow employees to share files, access common applications, and communicate with each other through email or instant messaging. This can increase productivity and efficiency by reducing the need for physical document transfer and improving information sharing.

Learn more about technology here:

https://brainly.com/question/9171028

#SPJ11


Related Questions

is this statement True or False?
A computer processes data using only 1s and 0s
A. True
B. False

Answers

Answer:

A. True. Computers only process using 1s and 0s

Trueeeeeeeeee is the answer

What is supposed to be in the blank?


The following loop is intended to print the numbers


2 4 6 8 10


Fill in the blank:


for i in ________:


print (i)

Answers

Answer:

12

Explanation:

Because

7.15 Ch 8 Custom lab for SNHU Online - Program: Sorting movies (Lists and Dictionaries) (Python 3)

(1) Build a dictionary that contains the movie collection below. Hint: Combine movie title and director into a list.

(2) Prompt the user for a single year and output the movie title(s) and director(s) from that year. Output N/Aif the year is invalid. (4 pts)

Answers

Using the knowledge in computational language in python it is possible to write a code that Build a dictionary that contains the movie collection below and Prompt the user for a single year and output the movie title(s) and director(s) from that year.

Writting the code:

movies={"Wonder Woman":7.9 , "Dunkirk":8.5 , "The Dark Tower":6.0 , "The Emoji Movie":1.8} # creating the dictionary of movies

ww_rating=movies=["Wonder Woman"] # getting the value of a key i.e, rating of Wonder Woman

shows= {"The Tick":6.3 , "The Walking Dead":8.5 , "Breaking Bad":9.5 , "Rick and Morty":9.3}

shows["The Tick"]=7.2 # changing the rating of show The Tick

See more about python at brainly.com/question/12975450

#SPJ1

7.15 Ch 8 Custom lab for SNHU Online - Program: Sorting movies (Lists and Dictionaries) (Python 3)(1)

Write a loop that reads strings from standard input where the string is either duck or goose.

Answers

The correct answer is goose  loop that reads strings from standard input where the string.

phrase. If someone is in the loop, they are either a member of the group that decides key matters or they are aware of these decisions. They do not make critical judgements or are unaware of them if they are not in the loop. [US-centric, casual] The vice president, in my opinion, was informed. The loop is used to repeatedly run the block of code in accordance with the condition stated in the loop. It entails repeated execution of the same code, which helps to traverse an array's items while also saving code.

To learn more about goose loop click the link below:

brainly.com/question/15198918

#SPJ4

Ken has discovered that a vice president of his company has been using his computer to send data about a new product to a competitor. Ken has identified an email from the vice president and has tracked the information to the person at the other company. Ken has archived the evidence that proves the data has been sent. What should Ken do next?a. Report the person through proper channels.b. Approach the VP and ask him about the email.c. Ignore the email

Answers

Report the person through proper channels

Which of the following statements is true?

A.
Freelancers often charge high hourly rates to make up for the fact that their employers don't provide health care and other benefits.

B.
Freelancers automatically receive free health insurance.

C.
Freelancers are not reliable because there is no way to rate their work ethic or job performance.

D.
Freelancers must hire an accountant to handle their billing and payments.

Answers

Answer:

A.

Explanation:

The correct statement is: A. Freelancers often charge high hourly rates to make up for the fact that their employers don't provide health care and other benefits.

Freelancers often charge high hourly rates to make up for the fact that their employers don't provide health care and other benefits.

Freelancers typically have to factor in the costs of healthcare, retirement savings, and other benefits that are not provided by their clients or employers.

This can lead to higher hourly rates to ensure they can cover these expenses on their own.

Hence,

The statement that is true is A.

To learn more about skills of freelancing visit:

https://brainly.com/question/33779682

#SPJ3

let’s say the algorithm in (a) is alga. now, if we combine to construct a spanning tree with . can you qualitatively describe the tradeoffs of changing from 0 to 1? what types of trees do you get?

Answers

When changing the value of  from 0 to 1, the tradeoffs in constructing a spanning tree with the algorithm alga can be qualitatively described as follows:


1. With = 0: This means that the algorithm prioritizes finding the minimum weight edge when constructing the spanning tree. As a result, the tree obtained will have a smaller total weight but might not cover all the vertices. It could potentially be a sparse tree.
2. With = 1: In this case, the algorithm focuses on maximizing the number of covered vertices when constructing the spanning tree. It will select edges that connect previously unconnected components, ensuring that all vertices are included in the tree. However, the total weight of the tree might be larger compared to the = 0 case.

In summary, changing the value of  from 0 to 1 alters the priority of the algorithm in constructing the spanning tree. A smaller value prioritizes weight, resulting in a potentially sparse tree, while a larger value prioritizes coverage, leading to a tree that includes all vertices but with a potentially higher total weight.

To know more about algorithm visit:

brainly.com/question/32392316

#SPJ11

true/false. can you use data analysis and charting when discussing qualitative research results

Answers

Answer: false

Explanation:

True. While data analysis and charting are most commonly associated with quantitative research, they can also be used when discussing qualitative research results.

Qualitative research often involves the analysis of non-numeric data such as words, images, or observations. In this context, data analysis may involve identifying patterns and themes within the data, categorizing information into specific codes, and developing conceptual frameworks to explain relationships between different elements of the data.

Charting or visual representations of the data can also be helpful in conveying complex information to others and can be used to highlight key findings or illustrate connections between different aspects of the data.

Learn more about connections here:

https://brainly.com/question/29977388

#SPJ11

Can Anybody Define These Terms? Please Hurry

Can Anybody Define These Terms? Please Hurry

Answers

Answer:

1. Domain Name System - hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet or a private network

2. group of computers that can be administered under a certain set of rules

3. info stored by a computer

4. process of selecting a path for traffic in a network or between or across multiple networks

5. HyperText Transfer Protocol - standard application-level protocol used for exchanging files on the World Wide Web

6. Transmission Control Protocol - connection-oriented communications protocol that facilitates the exchange of messages between computing devices in a network

7. Internet Protocol Address - an identifying number that is associated with a specific computer or computer network

8. small segment of a larger message

9. HyperText Markup Language - formatting system for displaying material retrieved over the Internet

10. Uniform Resource Locator - reference to a resource on the internet

Based on the information in the table, which of the following tasks is likely to take the longest amount of time when scaled up for a very large company of approximately 100,000 customers

Based on the information in the table, which of the following tasks is likely to take the longest amount

Answers

Answer:

Task A

Explanation:

Hannah's prior status updates, pictures, and profile data will be hidden from view and deleted from servers 30 days after posting.

What amount of time when scaled up large company?

When a set of symbols is used to represent a number, letter, or word during coding, that symbol, letter, or word is said to be being encoded. The collection of symbols is referred to as a code. A set of binary bits is used to represent, store, and transmit digital data.

Binary code is another name for this category.The values of the subject attributes can be stored in numerous rows for large data subjects. Data from long data sets may span several columns.

Therefore, The only system that is adaptable enough to allow for the representation of data other than numbers is the binary number system.

Learn more about scaled up here:

https://brainly.com/question/28966944

#SPJ2

I need help with this question

What is the “digital divide”?

A. the gap between people who are very skilled using the Internet and people who are less skilled.

B. the gap between the time before Smartphones debuted and the time they became widely used.

C. the gap between people who have readily available Internet access and people who do not.

D. the gap between the time before the Internet debuted and the time it became popular.

Answers

Answer:

C IS YOUR ANSWERexplanation is available

Explanation:

The digital divide describes the gap between people who have access to affordable, reliable internet service (and the skills and gadgets necessary to take advantage of that access) and those who lack it. ... The Access Divide—This is the most visible digital divide.

Answer:

option c is the answer....

how many domains are there in the classification system?

Answers

Answer:

3 domains

Explanation:

There are three domains of life, the Archaea, the Bacteria, and the Eucarya.

here is the link to the explanation I got if I got this wrong I am so sorry but if you need more info the link has more for you.

https://link.springer.com/

<3

:)

A school is conducting a survey of students to learn more about how they get to school. Students were asked how they travel to school, how long it takes them to get to school, what time they arrive at school, and for a description of their most significant challenges when traveling to school. Several rows of the data collected are shown in the table below.
Which column is data will likely be most difficult to visualize or analyze?
A. How Travel
B. How Long
C. Time Arrive
D. Biggest Challenges

Answers

Answer: D.

Explanation: I can't say this is the correct answer for sure since the chart is not there but I'm pretty sure the answer is D. This video might help you out on the subject. https://youtu.be/dQw4w9WgXcQ

The column in which the data will likely be most difficult to visualize or analyze is Biggest Challenges. The correct option is D.

What is survey?

A survey is a research method that involves gathering information from a group of people through the use of pre-designed questions or structured interviews.

A survey's purpose is to collect information about people's opinions, beliefs, attitudes, behaviors, or experiences on a specific topic.

Biggest Challenges is the column in which the data will most likely be difficult to visualize or analyze.

The table's other columns, How Travel, How Long, and Time Arrive, all contain quantitative data that can be easily visualized and analyzed.

The How Travel column, for example, could be represented by a pie chart or bar graph depicting the percentage of students who walk, bike, drive, or take the bus to school.

Thus, the correct option is D.

For more details regarding survey, visit:

https://brainly.com/question/17373064

#SPJ3

The type of nut that is used to prevent contact with sharp edges of threads on a fastener is the _____.

Answers

The type of nut that is used to prevent contact with sharp edges of threads on a fastener is called a nylon insert lock nut.

Nylon insert lock nuts, also known as nylock nuts, are designed with a nylon ring inserted into the top of the nut. This nylon ring acts as a locking mechanism that helps to prevent the nut from loosening due to vibrations or other factors. When the nylon ring is compressed between the fastener and the nut, it creates friction that resists loosening. This makes nylon insert lock nuts ideal for applications where vibration or movement could cause traditional nuts to loosen over time.

Additionally, nylon insert lock nuts are easy to install and remove and can be reused multiple times. Overall, these nuts provide a reliable and cost-effective solution for preventing contact with sharp edges on threaded fasteners.

know more about Nylock nuts.

https://brainly.com/question/23368426

#SPJ11

The address entered into a web browser (firefox, safari, chrome, ie) is technically called a?

Answers

Answer: Website Bar

Explanation:

_______ uses individual atoms and molecules to create computer chips and other devices.
a. Virtualization
b. Nanotechnology
c. Quantum computing
d. A minicomputer
e. On-demand computing

Answers

b. Nanotechnology. Nanotechnology  uses individual atoms and molecules to create computer chips and other devices.

Nanotechnology is a field of science and engineering that deals with manipulating matter at the atomic and molecular scale, typically with structures ranging from 1 to 100 nanometers in size. It involves the use of individual atoms and molecules to create new materials and devices with unique properties and functionalities. In the context of computer chips and other devices, nanotechnology enables the precise placement and manipulation of individual atoms and molecules to design and fabricate ultra-small electronic components with enhanced performance and efficiency. This technology has the potential to revolutionize various industries, including electronics, medicine, energy, and more, by allowing the creation of advanced materials and devices with unprecedented capabilities at the nanoscale.

learn more about computer here:

https://brainly.com/question/30529533

#SPJ11

refer to the exhibit. router r1 is configured with static nat. addressing on the router and the web server are correctly configured, but there is no connectivity between the web server and users on the internet. what is a possible reason for this lack of connectivity?

Answers

One possible reason for the lack of connectivity between the web server and users on the internet despite static NAT configuration on router R1 could be the absence of a corresponding access list that permits traffic to pass through.

It is important to note that static NAT is only responsible for the translation of the IP address of the web server to a public address that can be accessed from the internet. However, an access list is needed to permit traffic from the internet to access the web server. In this case, it is possible that the access list is not configured properly or is not present at all, thereby preventing internet traffic from accessing the web server despite the successful NAT translation. To address this issue, the access list should be properly configured to allow traffic from the internet to access the web server.

To learn more about NAT configuration
https://brainly.com/question/30583473
#SPJ11

what is a binary digit

Answers

one of two digits (0 or 1) in a binary system of notation.
(i looked it up)

The purpose of an operating system is to manage the flow of data between hardware components and allow the user to communicate with the computer. true false

Answers

The purpose of an operating system is to manage the flow of data between hardware components and allow the user to communicate with the computer is a true statement.

What is the purpose of operating systems?

The purpose of an operating system is known to be one that helps to give a background or a platform where any given system user can be able to work on as well as execute programs in an easier and efficient manner.

Note that  an operating system is seen as a piece of software that handles the sharing of computer hardware.

Therefore, The purpose of an operating system is to manage the flow of data between hardware components and allow the user to communicate with the computer is a true statement.

Learn more about operating system from

https://brainly.com/question/22811693

#SPJ1

Most companies employ a practice whereby personnel are given the rights and permissions to perform their jobs and nothing more. This is called A) access control B) confidentiality least privilege. D) system access

Answers

The practice you are referring to is called B) Least Privilege. Least Privilege is a security principle where personnel are given the minimum rights and permissions necessary to perform their job functions.

Access control is a practice that most companies use to ensure that their personnel only have the rights and permissions to perform their specific job duties.

This practice is also known as least privilege, which means that employees are only granted the minimum access necessary to perform their jobs and nothing more.The term confidentiality refers to the protection of sensitive information from unauthorized access or disclosure. This is another critical component of access control. Confidentiality ensures that only authorized personnel have access to sensitive data, preventing data breaches and other security incidents.System access is a term that refers to the process of logging into a computer system or network. System access is typically controlled through access control measures, such as passwords or biometric authentication. By limiting system access to only authorized personnel, companies can prevent unauthorized access and protect their sensitive data.In conclusion, access control and confidentiality least privilege are crucial components of any company's security strategy. These practices help ensure that sensitive information is protected from unauthorized access, and only authorized personnel have access to the information they need to perform their job duties.

Know more about the least privilege

https://brainly.com/question/27034248

#SPJ11


List out two ways to execute the script.​

Answers

Answer:

1) Execute Shell Script Using File Name. Use the shell script file name to execute it either by using it's relative path or absolute path as shown below

2) Execute Shell Script Using Source Command.

how can the government protect human rights​

Answers

Answer:

governments can: Create constitutional guarantees of human rights. Provide ways for people who have suffered human rights violations by the government to seek legal remedies from domestic and international courts. Sign international human rights treaties.

The bill of rights protects freedom of speech, freedom of religion, the right to keep and bear arms, the freedom of assembly and the freedom to petition.

This question has two parts : 1. List two conditions required for price discrimination to take place. No need to explain, just list two conditions separtely. 2. How do income effect influence work hours when wage increases? Be specific and write your answer in one line or maximum two lines.

Answers

Keep in mind that rapid prototyping is a process that uses the original design to create a model of a part or a product. 3D printing is the common name for rapid prototyping.

Accounting's Business Entity Assumption is a business entity assumption. It is a term used to allude to proclaiming the detachment of each and every monetary record of the business from any of the monetary records of its proprietors or that of different organizations.

At the end of the day, we accept that the business has its own character which is unique in relation to that of the proprietor or different organizations.

Learn more about Accounting Principle on:

brainly.com/question/17095465

#SPJ4

Sales Process: With Figure 2 as a guide combined with your knowledge of the fulfilment process from Week 7 map the fulfilment process using BPMN. You must include at least 10 activities. In mapping the sales order process, you need to make logical considerations on key decisions (customer credit limits, stock availability with consideration of material type, receipt of payment possibilities, relevant internal and external stakeholders depicted). Note: failure to include logical considerations will mean that the diagram does not faithfully reflect the fulfilment process and will result in a failing grade for this task. Sales Order Entry Receipt of Payment Check Availability Invoice Customer Pick Materials Post Goods Pack Materials Figure 2: Sales Order Process

Answers

Sales Order Entry: This activity represents the entry of the sales order into the system, where the customer provides the necessary information to initiate the order.

Customer Credit Check: This decision gateway checks the customer's credit limit to ensure that they have sufficient credit to proceed with the order. If the customer's credit limit is not sufficient, the process flows to the "Credit Limit Exceeded" path, where appropriate actions can be taken (e.g., contacting the customer, offering alternative payment options).

Stock Availability Check: This decision gateway verifies the availability of the requested stock. If the stock is not available, the process flows to the "Stock Unavailable" path, where appropriate actions can be taken (e.g., contacting the customer, suggesting alternative products).

Pick Materials: This activity represents the picking of the materials from the inventory based on the order details.

Pack Materials: This activity involves packaging the picked materials for shipment, ensuring they are appropriately protected and labeled.

Check Availability (Material Type): This decision gateway checks the availability of specific material types. If the requested material type is not available, the process flows to the "Material Type Unavailable" path, where appropriate actions can be taken (e.g., contacting the customer, suggesting alternative material types).

Invoice Customer: This activity generates an invoice for the customer based on the order details.

Receipt of Payment: This decision gateway checks if the payment has been received. If the payment has not been received, the process flows to the "Payment Pending" path, where appropriate actions can be taken (e.g., sending payment reminders, initiating follow-up communication).

Post Goods: This activity represents the process of posting the goods for shipment, including preparing necessary shipping documentation.

Order Fulfillment Complete: This is the end event indicating that the order fulfillment process has been successfully completed.

The diagram includes the necessary decision gateways to handle different scenarios and logical considerations such as credit limits, stock availability, material types, and payment status. It also incorporates key activities involved in the fulfillment process and relevant stakeholders involved at each step.

Learn more about Sales Order Entry Here.

https://brainly.com/question/32227518

#SPJ11

Business Process Model and Notation (BPMN) is a standardized graphical language for representing business processes. BPMN represents various elements in a process, including activities, events, gateways, and flows.BPMN can be used to model complex business processes. It offers a comprehensive set of notations that enable business users and developers to represent processes graphically. The fulfillment process can be mapped using BPMN as shown below:

Explanation:

Here are the activities involved in the fulfillment process with the use of BPMN:

Customer places an order: This is the first step in the fulfillment process. Once the customer has placed an order, it is sent to the sales team for processing.Verification of Customer's Credit Limits: This is an important step in the fulfillment process. It is important to verify the customer's credit limits to ensure that they can pay for the goods or services that they are ordering.Check Stock Availability: Once the customer's credit limit has been verified, the sales team will check to see if the goods are in stock.Receive Payment: Once the stock availability has been confirmed, the customer will make a payment for the goods. This payment can be made via a variety of methods, including cash, check, or credit card.Pick Materials: Once the payment has been received, the sales team will pick the materials needed to fulfill the order.Post Goods: After the materials have been picked, they will be posted to the customer. This can be done via a variety of methods, including mail, courier, or hand delivery.Pack Materials: Before the goods are shipped, they must be packed to ensure that they are safe during transit.Check Invoice: After the goods have been shipped, the customer will check the invoice to ensure that everything is correct. If there are any discrepancies, they will be addressed.Customer Receipt of Goods: Once the invoice has been checked, the customer will receive the goods. This completes the fulfillment process.

To know more about Business Process Model and Notation (BPMN)
https://brainly.com/question/30323950
#SPJ11

Select the correct answer from each drop-down menu.
Complete the sentence about uses of spreadsheets.

Two of the most common uses of spreadsheets are to _____ data and _____ data.

First blank
1. Create new
2. Search for
3. Store available

Second blank
1.Sort
2. Classify
3. Download

Answers

I think it’s 1, 2 and if im wrong im sorry

Two of the most common uses of spreadsheets are to create new data and classify data. Thus, the correct options for this question are A and B respectively.

What are the uses of Spreadsheet?

The uses of spreadsheets are as follows:

It is used to collect and store data that is systematically organized.It authorizes users in order to make calculations with the stored data.Spreadsheets are also used to make charts and graphs.It actively supports users in data sifting and cleanup.

According to the context of this question, apart from the above top uses of spreadsheets, there are other various uses that can be delivered by this platform to the user that make their professional work more efficient, organized, and attractive.

Therefore, the most common uses of spreadsheets are to create new data and classify data. Thus, the correct options for this question are A and B respectively.

To learn more about Spreadsheets, refer to the link:

https://brainly.com/question/26919847

#SPJ2

Which of the following is an advantage of algorithmic thinking? Select all that apply.

ill give all my points

Answers

Answer:

yield is good and Jerry brown is a letter from the meaning of his life

Continuing with the same data set. Use Microsoft Excel or Tableau or one of the other visualization tools and create 3 visuals(graphs/charts): First chart should at-least use 2 data columns Second chart should at-least use 3 data columns Third chart should also use at-least 3 data columns These charts should show the legends correctly. Take screens shots and explain the dependencies that you have shown in these visuals in your report to submit.

Answers

Visuals using Microsoft Excel or Tableau and explain the dependencies you can show in the visuals. If you have specific data and requirements, please provide them, and I'll assist you in creating the visuals and explaining their dependencies in a report format.

For the first chart, you can create a bar chart that compares data from two columns. For example, you could compare the sales figures of two different products over a specific time period. The x-axis can represent the time period, and the y-axis can represent the sales figures. The legend can show the two products, distinguishing them by different colors or patterns. In the second chart, you can create a line chart that displays data from three columns. For instance, you could plot the temperature, humidity, and rainfall data over different months. The x-axis can represent the months, while the y-axis can represent the respective measurements.

Learn more about Microsoft Excel here:

https://brainly.com/question/32584761

#SPJ11

according to the internet protocol (ip), what information is contained in a packet?the entirety of the data being transmittedthe entirety of the data being transmitted, as well as control information for routing the dataa small chunk of the data being transmitteda small chunk of the data being transmitted, as well as control information for routing the data

Answers

According to the Internet Protocol (IP), a packet contains a small chunk of the data being transmitted, as well as control information for routing the data. In IP communication, data is divided into smaller units called packets to facilitate transmission over the network.

Each packet consists of a header and a payload. The header contains control information, including the source and destination IP addresses, protocol information, and sequencing information. The payload contains a portion of the actual data being transmitted.

By breaking the data into packets, IP allows for efficient and reliable transmission over the network, as packets can take different routes and be reassembled at the destination.

Learn more about Internet Protocol, here:

https://brainly.com/question/30547558

#SPJ1

The US government appropriates less than one million dollars in funding each year to STEM education programs. True False

Answers

Answer:

False.

Explanation:

A STEM course typically comprises of science, technology, engineering and mathematics.

The US government appropriates more than one million dollars in funding each year to STEM education programs. The government of the United States of America create scholarship opportunities for its citizens in order to assist students develop a career in STEM-related field.

Educate to Innovate campaign is an example of STEM education programs developed and established by the US government to fund STEM education programs.

Answer: False

Explanation:

I have this assignment

What are the most common types of risk that can impact projects?

Answers

The chance that tasks in your project will take longer than anticipated is referred to as time risk or project schedule risk.

Timelines that are delayed may have an effect on your budget, delivery date, or overall performance. As a project manager, you might encounter this regular risk. strategic risk, such as a new competitor entering the market. Risk related to compliance and regulations, such as the introduction of new laws or regulations.

Financial risk, such as an increase in interest rates on your business loan or a customer who doesn't pay.

operational risk, such as the failure or theft of important machinery.

Learn more about operational here-

https://brainly.com/question/28335468

#SPJ4

Other Questions
Most current mining/quarry activities in california are for quarrying sand and gravel. why?? why are sand and gravel so ubiquitously needed and for what are they needed? Test question #23 (4 points)Tell your friends what to do using the verbs below and the ustedes command.________ (aprender) el vocabulario.__________ (ir) a la oficina. identifying subjects and verb why do you like that cold ? What beans are valued for their high quality protein and versatility in producing meat substitutes? Create a fictitious product. Be creative it can be anything you want, including clothing, a beverage, food, a gadget, a video game, or whatever.Using the ten advertising strategies that are discussed in this chapter, think of a way you could use each strategy in a commercial to sell your product. Explain in detail how you would go about using each strategy to sell the product. solve this equation 1/3y-12=2/9y. What is the importance of the Supreme Court case Reynolds v. Sims?(A) The Supreme Court case established the requirements for people who want torun for state governor.(B) The Supreme Court case established that all state judges must be approved bytheir state senate.(C) The Supreme Court case established that seats in state legislatures areapportioned according to population.(D) The Supreme Court case established that the state and federal governmentboth share the power to do things like maintain roads and highways. differnce between hospital and health post ____ is a keyboard shortcut that repositions the insertion point at the start of the document. 8.39 Emotional empathy in young adults. According to a theory in psychology, young female adults show more emotional empathy toward others than do males. The Journal of Moral Education (June 2010) tested this theory by examining the attitudes of a sample of 30 female college students. Each student completed the Ethic of Care Interview, which con- sisted of a series of statements on empathy attitudes. For the statement on emotional empathy (e.g., "I often have tender, concerned feelings for people less fortunate than me"), the sample mean response was 3.28. Assume the population standard deviation for females is .5. [Note: Empathy scores ranged from 0 to 4, where 0 = "never" and 4 = "always".] Suppose it is known that male college students have an aver- age emotional empathy score of = 3. a. Specify the null and alternative hypotheses for testing whether female college students score higher than 3.0 on the emotional empathy scale.b. Compute the test statistic.c. Find the observed significance level (p-value) of the test. d. At a = .01, what is the appropriate conclusion?e. How small of an a-value can you choose and still have sufficient evidence to reject the null hypothesis? Which of the following shows the correct way to connect two ideas with a coordinating conjunction People perceive women and evaluate their behavior less favorably whenthey are in leadership positions. Women are regarded as less competentthan men and in group interactions, and people give men moreopportunities to speak than women.TrueFalse If a good is normal, then a decrease in price will cause a substitution effect that is? If $500 is placed in a savings account paying 10 percent per year compounded annually, what will the account balance be at the end of the year?a.$550b.552.36c.$505d.$600 Factor the polynomial completely 25a^2-10a+1 Is Miranda a powerful character or a weak character . For x,y,z(0,1) with x+y+z=2, prove that (1x)(1y)(1z) xyz/8 Draw the following angle in standard position.45Then do the following.(a) Name a point on the terminal side of the angle.(1, 1)(1, 1)(1, 1)(1, 0)(1, 1)(b) The level of interest rates tends to _____ during periods of economic expansion and _____ during periods of economic contraction. What metal wil not react with hydrochloride acid? Please help