charmaine was required to take an excel spreadsheet test as part of her application for an executive assistant position. this control is part of the area.

Answers

Answer 1

The PDCA cycle is a plan-do-check-act cycle that employs observed data to improve operations continuously.

Which of the following is not a component of Deming's PDCA cycle? The PDCA cycle is a plan-do-check-act cycle that employs observed data to improve operations continuously.The profit and loss (P&L) statement is a financial statement that outlines the revenues, costs, and expenses incurred for a specific time period.The profit and loss statement, together with the balance sheet and cash flow statement, is one of three financial statements issued by every public business quarterly and annually.Statisticians have determined that numbers with a plus or minus of 2 SD represent measures that are closer to the genuine value than those with a plus or minus of 2SD.Kaizen is a Japanese term that combines two terms that mean "positive transformation" or "improvement."However, Kaizen has come to mean "continuous improvement" through its relationship with lean methodology and ideals.

To learn more about PDCA cycle refer

https://brainly.com/question/10814825

#SPJ4


Related Questions

Please help me, I need to turn this in before 12am. :(

Take a few moments and ask yourself about the value of a database. Then develop no less than two paragraphs considering... What can they really accomplish? Can you think of any industries that are actively using them? Are they challenging to learn? (or any other information you feel is prudent to the discussion).

Answers

Databases are essential tools for storing, organizing, and managing large amounts of data, providing valuable insights and serving as a foundation for software systems across industries.

Write a short note on databases and their uses.

Databases are an essential tool for storing, organizing, and managing large amounts of data. They allow for efficient retrieval and manipulation of data and can provide valuable insights for businesses and organizations.

In today's data-driven world, databases can accomplish a wide range of tasks. They can store customer information, inventory data, financial records, and more. Databases can be used for analysis and decision-making, such as identifying trends, forecasting future performance, and optimizing operations. They can also provide a foundation for applications and software systems, such as e-commerce platforms, CRM systems, and inventory management software.

Many industries actively use databases, including healthcare, finance, retail, and government. Healthcare organizations use databases to manage patient records and medical information, while financial institutions use them to manage transactions and account information. Retail companies use databases to track inventory and sales data, while government agencies use them to manage citizen records and public services.

While databases can be complex and challenging to learn, there are many resources available to help individuals and organizations develop the skills needed to use them effectively. Online courses, tutorials, and certifications are available, as well as consulting and support services from database vendors and experts. With the right training and resources, anyone can learn to use databases to their full potential.

To learn more about Databases, visit:

https://brainly.com/question/6447559

#SPJ1

Assume you define a vector in the following way:

vector vec;

Assign the value 10 to the first element of this vector. What is the statement you would use?

Answers

Answer:

vec[0].push_back(10)

Explanation:

Given

Declaration: vector <int> vec

Required

Assign 10 to the first element

This can be done using the push_back keyword.

The syntax is:     vectorname[position].push_back(value);

In this case:

vectorname = vec

position = 0 i.e. first element

value = 10

So, we have:

vec[0].push_back(10)

You are the computer forensics investigator for a law firm. The firm acquired a new client, a young woman who was fired from her job for inappropriate files discovered on her computer. She swears she never accessed the files. You have now completed your investigation. Using what you have learned from the text and the labs, complete the assignment below. You can use your imagination about what you found!

Write a one page report describing the computer the client used, who else had access to it and other relevant findings. Reference the tools you used (in your imagination) and what each of them might have found.

Answers

Confidential Computer Forensics Investigation Report

Case Number: 2023-4567

Date: June 22, 2023

Subject: Computer Forensics Investigation Findings

I. Introduction:

The purpose of this report is to provide an overview of the computer forensics investigation conducted on behalf of our client, Ms. [Client's Name], who was terminated from her employment due to the discovery of inappropriate files on her computer. The objective of the investigation was to determine the origin and access of these files and establish whether Ms. [Client's Name] was involved in their creation or dissemination.

II. Computer Information:

The computer under investigation is a Dell Inspiron laptop, model XYZ123, serial number 7890ABCD. It runs on the Windows 10 operating system and was assigned to Ms. [Client's Name] by her former employer, [Company Name]. The laptop's storage capacity is 500GB, and it is equipped with an Intel Core i5 processor and 8GB of RAM.

III. Access and Usage:

During the investigation, it was determined that Ms. [Client's Name] was the primary user of the laptop. The computer was password-protected with her unique login credentials, indicating that she had exclusive access to the system. The investigation did not uncover any evidence of unauthorized access by third parties or multiple user accounts on the laptop.

IV. Forensic Tools and Findings:

Digital Forensic Imaging: A forensic image of the laptop's hard drive was created using the industry-standard forensic tool, EnCase Forensic. The image provided an exact replica of the laptop's data, preserving its integrity for analysis.

Internet History Analysis: The forensic examination of the laptop's web browser history was conducted using specialized software, such as Internet Evidence Finder (IEF). This analysis revealed that Ms. [Client's Name] had not accessed any inappropriate websites or content during the relevant timeframe.

File Metadata Examination: Using the forensic software Autopsy, a comprehensive analysis of file metadata was performed. The investigation determined that the inappropriate files in question were created and modified during hours when Ms. [Client's Name] was not logged into the system, indicating that she was not responsible for their creation.

Deleted File Recovery: Utilizing the tool Recuva, the investigation team conducted a thorough search for any deleted files related to the case. No evidence of deleted files or attempts to conceal inappropriate content was discovered on the laptop.

V. Conclusion:

Based on the findings of the computer forensics investigation, it is evident that Ms. [Client's Name] was not involved in the creation or dissemination of the inappropriate files found on her laptop. The analysis of digital evidence, including internet history, file metadata, and deleted file recovery, supports her claim of innocence.

The investigation did not uncover any evidence of unauthorized access to the laptop, indicating that Ms. [Client's Name] was the sole user of the system. It is recommended that our law firm presents these findings to [Company Name] in defense of our client, highlighting the lack of evidence implicating her in the inappropriate content discovered on her computer.

Please note that this report is confidential and intended for internal use within our law firm.

Sincerely,

[Your Name]

Computer Forensics Investigator

[Law Firm Name]

I hope this helps. Cheers! ^^

10 disadvantages of Edp​

Answers

The  disadvantages are:

High initial investmentTechnical complexitySecurity risksDependence on technologyWhat is the  Electronic Data Processing?

EDP (Electronic Data Processing) alludes to the utilize of computers and other electronic gadgets to prepare, store, and recover information.

Therefore,  Setting up an EDP framework requires a noteworthy speculation in equipment, computer program, and other hardware, which can be a obstruction for littler businesses.

Learn more about  Electronic Data from

https://brainly.com/question/24210536

#SPJ1

what is the use of buffer?​

Answers

Answer:

pH buffer or hydrogen ion buffer) is an aqueous solution consisting of a mixture of a weak acid and its conjugate base, or vice versa. ... Buffer solutions are used as a means of keeping pH at a nearly constant value in a wide variety of chemical applications.

Explanation:

there is your answer i got this one correct

hope it is helpful

Answer:

Limits the pH of a solution

Explanation:

A P  E X

Assume a 2^20 byte memory:

a) What are the lowest and highest addresses if memory is byte-addressable?

b) What are the lowest and highest addresses if memory is word-addressable, assuming a 16-bit word?

c) What are the lowest and highest addresses if memory is word-addressable, assuming a 32-bit word?

Answers

a) Lowest address: 0, Highest address: (2^20) - 1. b) Lowest address: 0, Highest address: ((2^20) / 2) - 1. c) Lowest address: 0, Highest address: ((2^20) / 4) - 1.

a) If memory is byte-addressable, the lowest address would be 0 and the highest address would be (2^20) - 1.

This is because each byte in the memory requires a unique address, and since there are 2^20 bytes in total, the highest address would be one less than the total number of bytes.

b) If memory is word-addressable with a 16-bit word, each word would consist of 2 bytes.

Therefore, the lowest address would be 0 (representing the first word), and the highest address would be ((2^20) / 2) - 1.

This is because the total number of words is equal to the total number of bytes divided by 2.

Subtracting 1 gives us the highest address, as the addresses are zero-based.

c) If memory is word-addressable with a 32-bit word, each word would consist of 4 bytes.

In this case, the lowest address would still be 0 (representing the first word), and the highest address would be ((2^20) / 4) - 1.

Similar to the previous case, the total number of words is equal to the total number of bytes divided by 4.

Subtracting 1 gives us the highest address.

For more questions on address

https://brainly.com/question/30273425

#SPJ8

como hacer una suma de numeros binarios

Answers

Answer:

Suma de números Binarios

Operamos como en el sistema decimal: comenzamos a sumar desde la derecha, en nuestro ejemplo, 1 + 1 = 10, entonces escribimos 0 en la fila del resultado y llevamos 1 (este "1" se llama arrastre).

Question 2(Multiple Choice Worth 5 points)
(2.02 LC)
When asking the user for input of a numeric value that is negative and has decimal, use the function
float()
int()
print ()
str()

Answers

Answer:

float()

Explanation:

where was this taken

where was this taken

Answers

Answer:

Mostar city

Explanation:

look at the architecture

Answer:

rome:)

Explanation:

Means having a current knowledge and understanding of computer mobile devices the web and related technologies

Answers

Answer:

"Digital literacy" would be the appropriate solution.

Explanation:

Capable of navigating and understanding, evaluating as well as communicating on several digital channels, is determined as a Digital literacy.Throughout the same way, as media literacy requires the capability to recognize as well as appropriately construct publicity, digital literacy encompasses even ethical including socially responsible abilities.

Describe any special considerations unique to Oracle that must be addressed?

Answers

When working with Oracle, there are a few special considerations that must be addressed:

1. Licensing: Oracle has specific licensing requirements, and it's important to ensure compliance with their licensing policies. This includes understanding the licensing models, user licenses, and potential costs associated with Oracle products.

2. Performance Tuning: Oracle databases require careful performance tuning to optimize their efficiency. This involves monitoring and adjusting various parameters, such as memory allocation, disk I/O, query optimization, and indexing strategies.

3. High Availability and Disaster Recovery: Implementing robust high availability and disaster recovery solutions is crucial for critical Oracle systems. This may involve using technologies like Oracle Real Application Clusters (RAC), Data Guard, or GoldenGate to ensure data availability, minimize downtime, and support business continuity.

4. Security: Oracle databases store sensitive data, so implementing strong security measures is essential. This includes setting up proper access controls, authentication mechanisms, encryption, auditing, and regularly applying security patches and updates.

5. Oracle-specific Features: Oracle offers a wide range of advanced features and functionalities that may require specific considerations. These include partitioning, advanced analytics, Oracle Advanced Compression, Oracle Enterprise Manager, and more. Understanding and leveraging these features can enhance the performance and capabilities of Oracle systems.

It's worth noting that the specific considerations may vary based on the version and edition of Oracle being used, as well as the specific requirements of the project or organization.

How would you rate this answer on a scale of 1 to 5 stars?

Explain what Sguil can do for IT personnel trying to guard their systems. What is the benefit to having Sguil running?
What is the purpose of the rkhunter application? Explain the different options available for what it can scan and how this would be useful to IT personnel.

Answers

Designed "by analyzers, for analysts," Sguil is indeed a cross-platform program that combines alert, session, and includes comprehensive data streams into a single graphical user interface.

What makes sguil so crucial?

Sguil has tools that the analyst can use to verify shady behaviour. It is crucial to confirm any suspicious behavior because this enables the administration to take the necessary precautions to reduce the hazard.

What data is accessible with Sguil?

The core feature of Sguil is an easy-to-use GUI that gives users access to session data, real-time events, and raw packet grabs. Information security monitoring and event-driven analysis are made easier by Sguil.

To know more about sguil visit:

https://brainly.com/question/27856378

#SPJ1

Programming CRe-type the code and fix any errors. The code should convert non-positive numbers to 1.
if (userNum > 0)
printf("Positive.\n");
else
printf("Non-positive, converting to 1.\n");
user Num = 1;
printf("Final: %d\n", userNum);
1 #include Hem
int main(void) {
int userNum;
scanf("%d", &userNum);
return 0;

Answers

Answer:

Given

The above lines of code

Required

Rearrange.

The code is re-arrange d as follows;.

#include<iostream>

int main()

{

int userNum;

scanf("%d", &userNum);

if (userNum > 0)

{

printf("Positive.\n");

}

else

{

printf("Non-positive, converting to 1.\n");

userNum = 1;

printf("Final: %d\n", userNum);

}

return 0;

}

When rearranging lines of codes. one has to be mindful of the programming language, the syntax of the language and control structures in the code;

One should take note of the variable declarations and usage

See attachment for .cpp file

True or false? A process flow diagram is used to identify the steps an employee takes to complete a job

Answers

the answer is false because……….

You are developing an application to ingest and process large volumes of events and data by using Azure Event Hubs.
You must use Azure Active Directory (Azure AD) to authorize requests to Azure Event Hubs resources.

Answers

Note that it is TRUE to state that you must use Azure Active Directory (Azure AD) to authorize requests to Azure Event Hubs resources.

How is this so?

Azure Event Hubs, a   data streaming platform,can be integrated with Azure Active Directory (Azure AD) for authentication and authorization purposes.

This ensures that requests to access and utilize Event Hubs resources are authorized and controlled through Azure AD, providing secure and authorized access to the application.

Learn more about Azure Active Directory at:

https://brainly.com/question/28400230

#SPJ1

You are developing an application to ingest and process large volumes of events and data by using Azure Event Hubs.

You must use Azure Active Directory (Azure AD) to authorize requests to Azure Event Hubs resources.

True or False?

Write a class Bug that models a bug moving along a horizontal line. The bug moves either to the right or left. Initially, the bug moves to the right, but it can turn to change its direction. In each move, its position changes by one unit in the current direction. Provide a constructor

Answers

Answer:

Following are the constructor to the given code:

Bug(int position) //defining a constructor that defines a integer parameters

{

       this.position = position;//use this key word to hold parameter value

       right = true;//defining a variable right that hold a boolean value

   }

Explanation:

In this code, a constructor is declared that defines integer parameters with it, Inside the constructor, this keyword is used to holds the "position" parameter value and defines a boolean variable "right" that holds a boolean value.

Full program:

public class Bug //declaring a class Bug

{

   private int position;//declaring integer variable position

   private boolean right;//declaring boolean variable

   public Bug(int position) //defining a parameterized constructor

   {

       this.position = position;//use this to hold position value

       right = true;//holding boolean value

   }

   public void turn() //defining a method turn

   {

       right = !right;//holding value

   }

   public void move() //defining method move

   {

       if(right)//use if to check boolean value

       {

           position++;//incrementing position value

       }  

       else//else block

       {

           position--;//decreasing position value

       }

   }

   public int getPosition()//defining method getPosition  

   {

       return position;//return position value

   }

   public static void main(String[] args) //main method

   {

       Bug bug = new Bug(10);//creating class object

       System.out.println("Expected = 10, Actual = " + bug.getPosition());//calling method with printing value

       bug.move();//calling method

       System.out.println("Expected = 11, Actual = " + bug.getPosition());//calling method with printing value

       bug.move();//calling method

       bug.move();//calling method

       bug.move();//calling method

       System.out.println("Expected = 14, Actual = " + bug.getPosition());//calling method with printing value

       bug.turn();//calling method

       bug.move();//calling method

       bug.move();//calling method

       System.out.println("Expected = 12, Actual = " + bug.getPosition());//calling method with printing value

       bug.turn();//calling method

       bug.move();//calling method

       System.out.println("Expected = 13, Actual = " + bug.getPosition());//calling method with printing value

   }

}

Output:

Please find the attached file.

Write a class Bug that models a bug moving along a horizontal line. The bug moves either to the right

Hello,

It is difficult for me to trouble everyone, but I need a lot of help and I am doing this practically on my own. This is only my second week and a half in a python or OOP course. I've tried to type this in python, but I need help, can someone please support me? I am trying to understand how to type my codes in the proper format for the correct output. Thanks truly. Here is the question and the input:

Given a line of text as input, output the number of characters excluding spaces, periods, exclamation points, or commas.
Ex: If the input is: Listen, Mr. Jones, calm down. the output is: 21

Here is the code I have been inputting in python/python3:

user_text = input()
char_count = 0
for char in user_text:
if char.isalpha():
char_count+=1
print(char_count)


I wish I could hug whoever helps and say thanks. I'd greatly appreciate anyone's support truly.

Warm regards,

Lily

Answers

Answer:

Explanation:

Your code is correct. The right way to indent this is as in the attached image. It is also a good idea to have a message when asking for user input so that the user knows what is expected.

I have added that feature and also some extra stuff in the output messages for clarity

Hello,It is difficult for me to trouble everyone, but I need a lot of help and I am doing this practically

Using the knowledge in computational language in python it is possible to write a code that given a line of text as input, output the number of characters excluding spaces, periods, exclamation points, or commas.

What is the input () in Python?

In Python, we use input() function to take input from the user. Whatever you enter as input, the input function converts it into a string. If you enter an integer value still input() function convert it into a string.

Writting the code:

# Defining a function named as concept

def concept():

   # Taking user input using input function and storing that in varibale named as "user_input"

   user_text = input("Enter String: ")

   # Initializing a variable char_count to 0

   char_count = 0

   # Now we have to parse through input string , for that we have used for loop

   for char in user_text:

       # This statement is checking whether a single character in string is alphabet or not

       if char.isalpha():

           # If it is alphabet , then we are incrementing the value of char_count

           char_count+= 1

   # returning the value of char count

   return char_count

# Now we have to call the function , for that

result = concept()

# now printing the result

print("The output is: "+str(result))

See more about python at brainly.com/question/16757242

#SPJ1

b. Read in the data from the hours.csv file and call it “hours”. Make a histogram of the variable hours_studying. (Include the code to generate the histogram and the histogram itself in your lab report.) Comment on the symmetry or skew of the histogram.
c. Use the t.test() function that your used in lab to test the hypotheses to answer the question if this sample indicates a significant change in the number of hours spent studying. (Include your
R code and the output from t.test() in your lab report.)
i. What is the value of the test statistic?
ii. What is the p-value?
iii. Are the results significant at the α = 0. 05 level?
d. Write a conclusion for this test in APA format (as illustrated in lecture and lab).

Answers

After performing a one-sample t-test, it was determined that the test statistic held a value of t = 6.3775 (d.f.=63). The p-value calculated to be 1.128e-08, a figure insignificantly beneath the critical level of 0.05.

How to explain the Statistics

This establishes that the resulting data holds significance, as confirmed by the α=0.05 criterion given that the p-value is inferior toward the stated limit.

The average weekly study time for the students in question resulted in M = 14.18 hours; this signifies statistical variance when contrasted with sigma distribution variable values equating to SD = 5.10 (t(63) = 6.38, p < .001, 95% CI [12.95, 16.39]). Consequently, the null hypothesis cannot be sustained and must therefore be rejected.

Learn more about statistic on

https://brainly.com/question/15525560

#SPJ1

All of the different devices on the internet have unique addresses.

Answers

Answer:

Yes

Explanation:

Just like a human fingerprint, no 2 computers are the same.

What would be an ideal scenario for using edge computing solutions?

Answers

Answer:

An ideal scenario for using edge computing solutions would be a situation where data needs to be processed quickly and efficiently, without the need for a central server

Explanation:

Data analytics benefits both financial services consumers and providers by helping create a more accurate picture of credit risk.
True
False

Answers

Answer:

True

Explanation:

True or False: An application package is the most expensive alternative

Answers

Answer:True

Explanation: The price of it is more then the original product

Database systems are exposed to many attacks, including dictionary attack, show with implantation how dictionary attack is launched?(Java or Python) ?

Answers

A type of brute-force attack in which an intruder uses a "dictionary list" of common words and phrases used by businesses and individuals to attempt to crack password-protected databases.

What is a dictionary attack?

A Dictionary Attack is an attack vector used by an attacker to break into a password-protected system by using every word in a dictionary as a password for that system. This type of attack vector is a Brute Force Attack.

The dictionary can contain words from an English dictionary as well as a leaked list of commonly used passwords, which, when combined with common character replacement with numbers, can be very effective and fast at times.

To know more about the dictionary attack, visit: https://brainly.com/question/14313052

#SPJ1

all flowcharts begin with me.i am elliptical in shape.

Answers

Note that it is FALSE to state that "all flowcharts begin with me.i am elliptical in shape."

How is this so?

While it is common for flowcharts to start with a shape, typically represented as an oval or rounded rectangle, it is not always an elliptical shape.

The starting point of a flowchart can vary depending on the specific system or process being depicted.

The purpose of the initial shape is to indicate the beginning or initiation of the flowchart, and it can take various forms depending on the conventions and preferences of the flowchart designer.

Learn more about flow charts at:

https://brainly.com/question/6532130

#SPJ1

Full Question:

Although part of your question is missing, you might be referring to this full question:

All flowcharts begin with me.i am elliptical in shape. True or False?

Why is it beneficial to convert to a decimal numbering system when working in a programming language?
Working in the binary number system makes it easier to spot incorrect numeric data values.
The decimal number system is easier to read and understand.
The decimal number system takes up less space.
The decimal number system stores numbers in bits.
DONE

5 of 8

Answers

Answer:

Why is it beneficial to convert to a decimal numbering system when working in a programming language? Working in the binary number system makes it easier to spot incorrect numeric data values. The decimal number system is easier to read and understand. The decimal number system takes up less space.

Explanation:

Answer:

The decimal number system is easier to read and understand.

Explanation:

Which of the following keys on the keyboard is used to quickly indent text

Answers

you have to use tab on the keyboard

Which word or phrase refers to an increasingly common method of computing and storing files?

A.
Virtual downloads

B.
Outsourcing

C.
Digital technologies

D.
Cloud computing

Answers

The answer is Cloud computing
Hope this helps-

Answer:

cloud computing

Explanation:

Which of these statements are true? Select 2 options.

1) If you open a file in append mode, Python creates a new file if the file named does not exist.
Python can only be used with files having ".py" as an extension.
If you open a file in append mode, the program halts with an error if the file named does not exist.
In a single program, you can read from one file and write to another.
The new line character is "\newline".

Answers

The statement that is true is in a single program, you can read from one file and write to another. The correct option is d.

What is programming?

A collection of written instructions that the computer follows is known as computer programming. Different languages can be used to write these instructions.

Each programming language has its own syntax or the way the commands are put together. You can use several programming languages to tackle a single programming issue.

Therefore, the correct option is D. In a single program, you can read from one file and write to another.

To learn more about programming, visit here:

https://brainly.com/question/25780946

#SPJ1

The capability solution productization

Answers

Function of innovation / innovation function

What is the IP address and TCP port number used by the client computer (source) that is transferring the file to gaia.cs.umass.edu

Answers

Answer:

Explanation:

ae

Other Questions
PLEASE NOTE: I want o to prove that ONLY THE EXPONENTIAL DISTRIBUTION satisfies the memoryless condition. The proof that this condition holds for exponential distribution is trivial. Will get a dislike if this proof is done and about 20 likes from college students combined if you are able to prove let X be a nonnegative continuous random variable such that for all s,t >=0, P(X>s+t|(Bonus) Let X be a non negative, continuous random variable such that Vset > 0 P(X > s+t|X > 5) = P(X > t). Show that X is exponentially distributed. A juice manufacturing company designed a carton as shown below. What is the name of the three-dimensionalfigure it creates? A generator makes electricity from _____.chemical reactionskinetic energyheatfriction Solve the given equation for x.8-6/5x=10 what is the equation to determine the force of a hydraulic system? f = p / a f = p * a f = p - a f = p a determine the mass in grams of each in each of the following 6.00 mol Al can someone solve this asap please The nurse is preparing to change the dressing of a client's subclavian central venous catheter using a chlorhexidine gluconate (CHG)- impregnated patch and transparent adhesive dressing. Place the procedural steps in the correct order. All options must be used The mass of an object on earth is 20 kg what will be the mass of that object on moon? And why? If DF and GI are parallel lines and mGHE = 47, what is mIHE? during their initial visit to the prenatal clinic, a couple asks the nurse whether the woman should have an amniocentesis for genetic studies. which factor indicates that an amniocentesis may be indicated collate all the scenes listed below and write a short story What concentration of stock solution is needed if 25.0 mL of it are diluted to the final concentration of 0.502 M and final volume of 50.6 ml? What is the final concentration of solution if 32.5 ml of 4.0 M stock solution are diluted to a final volume of 100 mL? .6. Let I = (-1,1) and B(I) = {f: IR|f is bounded}. (a) Define the concept of uniform convergence of a sequence of functions in B(1). [4 points) (b) Define the concept of pointwise convergence of a sequence of functions in B(1). [4 points) A balanced diet includes fewer ________ foods and more ________ foods. group of answer choices Two balls collide head-on in a perfectly inelastic collision. The first ball has a mass of 0.75 kg and an initial velocity of 5.0 m/s to the right. The second ball has a mass of 0.40 kg and an initial velocity of 3.5 m/s to the left. What is the decrease in kinetic energy during the collision? suppose that the required reserve ratio is 9.00 %. what is the simple money (deposit) multiplier? round to two decimal places. Miriam works more than 40 hours a week. h > 40A number line going from 0 to 80. Find the solutions of the inequality and complete the statements. The solutions of the inequality include all numbers ______. There are _______ solutions of the inequality. What is the diameter of a circle of circumference 31.4 cm take 3.14 )? *? explain why engineering design calls for good research skils.