What software allows you to define vms and manage resource allocation and sharing among vms on a host computer?

Answers

Answer 1

Software that creates and manages virtual machines is called a hypervisor, also referred to as a virtual machine monitor or VMM (VMs). By virtually sharing its resources, such as memory and processing, a hypervisor enables a single host computer to support numerous guest virtual machines (VMs).

Using a hypervisor that supports numerous virtual machines has several advantages:

Speed: Quick creation of virtual machines is made possible by hypervisors.Efficiency: One physical server can be used more effectively when multiple virtual machines are running on one physical machine's resources thanks to hypervisors.Flexibility: Operating systems and the applications that go with them can run on a variety of hardware thanks to bare-metal hypervisors. Portability: Multiple operating systems may coexist on the same physical server thanks to hypervisors (host machine)

Learn more about hypervisor https://brainly.com/question/20892566

#SPJ4


Related Questions

Write a program in Java that asks the user to enter four weighted assessment grades, calculate the average, then display the average with the message: "Student Pass" if the average is greater than or equal 60 or the message "Student Fail" otherwise. The details of the assessments and weights are as follow: Homeworks: 20% Labs: 15% Midterm: 25% Final: 40%

Answers

Answer:

Explanation:

In order to calculate the weighted average, the grade itself is multiplied by the percentage of the category and then these values are summed. This sum is then divided by the total percentage of the portfolio.

import java.util.Scanner;

class Main {

   public static void main(String[] args) {

       double sumOfWeights = 100;

       

       

       Scanner in = new Scanner(System.in);

       

       System.out.println("Please Enter Homework Grade: ");

       double homework = in.nextDouble() * 20;

       System.out.println("Please Enter Labs Grade: ");

       double labs = in.nextDouble() * 15;

       System.out.println("Please Enter Midterm Grade: ");

       double midterm = in.nextDouble() * 25;

       System.out.println("Please Enter Final Grade: ");

       double finals = in.nextDouble() * 40;

       

       double average = (homework + labs + midterm + finals) / sumOfWeights;

       System.out.println("The Average of these Weighted Grades is " + average);

   }

   

}

In a modern multitasking operating system, what are the main goals (list at least four goals) of process scheduling algorithms? (4 marks) (b) Briefly explain the concepts of non-preemptive and preemptive scheduling algorithms – focus on their difference. (4 marks) (c) Three jobs A, B, and Carrive at different times. Their arriving time, estimated running time and job priority, are listed in the following table. Job Arriving time (second) Priority Estimated running time (second) 16 8 4 A B с 0 1 2 3 2 Note: 3 indicates the highest priority and 1 the lowest Calculate the average turnaround time and average waiting time when applying each of the following scheduling algorithms. (1) Priority scheduling (ii) First-come, first-served (iii) Round robin For (i) and (iii), assume scheduling quanta of 2 seconds. For (ii), assume that only one job at a time runs until it finishes.

Answers

The main goals of process scheduling algorithms in a modern multitasking operating system are as follows:Improving system performance: By selecting the right process scheduling algorithm, the system's performance can be improved. The algorithm should be designed in such a way that it can handle a large number of processes without negatively impacting the system's performance.

Keep track of resource allocation: The process scheduling algorithm should be designed in such a way that it can keep track of the resources allocated to each process and ensure that they are used efficiently.

Fairness: It is important to ensure that each process receives a fair share of the system's resources. If a process is given an unfair advantage, the system's performance will suffer.

Priority: The process scheduling algorithm should be able to prioritize the processes based on their importance.

Non-preemptive scheduling algorithms: In non-preemptive scheduling algorithms, once a process has been allocated the CPU, it will continue to execute until it either completes or blocks for some reason. In this algorithm, the CPU is not allocated to a new process until the currently running process completes. This algorithm is easy to implement but can lead to poor system performance if a long-running process is allocated the CPU.

Preemptive scheduling algorithms: In preemptive scheduling algorithms, a process can be interrupted and its execution suspended if a higher-priority process is ready to run. The preemptive algorithm has a higher system overhead but can achieve better performance by giving high-priority processes more CPU time to complete.The average turnaround time and average waiting time can be calculated for each scheduling algorithm as follows:

Priority scheduling: Average turnaround time = (16+11+12)/3 = 13.

Average waiting time = ((16-0)+(11-1)+(12-2))/3 = 8/3 = 2.67

First-come, first-served: Average turnaround time = (16+22+26)/3 = 21.33.

Average waiting time = ((16-0)+(22-4)+(26-8))/3 = 34/3 = 11.33

Round robin: Average turnaround time = (16+22+26)/3 = 21.33.

Average waiting time = ((0+2+4)+(17+19+22)+(26-2-8))/3 = 20/3 = 6.67.

Learn more about Operating System here:

https://brainly.com/question/13440584

#SPJ11

How to fix unknown usb device device descriptor request failed?

Answers

Answer:

what usb type is it? what is it used for? what type of pc is being used?

Explanation:

What is meant by Paradigm programming?

Answers

Answer:

a way to classify programming languages based on their features

A _________________ can also contain a single character or be entirely empty.

Answers

In Computer programming, a string can either contain a single character or be entirely empty.

The kinds of data type.

In Computer programming, there are five (5) main recognized data types and these include the following:

Integer type (int).Character type (char).Floating point type (float).Boolean (bool)String (str)

What is a string?

A string is a data type which is typically used for data values that comprises ordered sequences of characters. Also, a string can either contain a single character or be entirely empty.

An example of a string in computer programming is "Hello world"

Read more on a string here: https://brainly.com/question/25619349

outcomes resulting from using incorect requirement specification during system development​

Answers

Answer:

please give full understandable question buddy

which is true about packets? which is true about packets? packets are reassembled at their final destination. the receiving device acknowledges the first and last packets to indicate receipt of the data stream. packets travel in order to their destination. packets follow the shortest path to their destination.

Answers

Packets are reassembled at their final destination.

When data is transmitted over a network, it is divided into small units called packets, each containing a portion of the original data, along with information about the packet's destination and its place in the overall data stream. The packets travel independently over the network, and they may take different paths to reach their destination. Once the packets arrive at their destination, they are reassembled into the original data stream based on the information contained in the packets' headers. This reassembly process occurs at the final destination and is done automatically by the receiving device, which uses the packet headers to determine the correct order for the packets.

Learn more about packet's destination click here:

brainly.com/question/31262430

#SPJ11

in which grades do students typically take the PSAT?
A. Ninth and tenth grades
B. Eighth and ninth grades
O C. Tenth and eleventh grades
O D. Eleventh and twelfth grades

Answers

B eighth and ninth grade

B. Eighth and Ninth grade.

cloud kicks has the organization wide sharing default set to private on the shoe object. the sales manager should be able to view a report containing shoe records for all of the sales reps on their team. which three items should the administrator configure to provide appropriate access to the report?

Answers

Note that the items tha tthe administrator should conficture to provide accurate access to the report are:

B. Folder access

D. Field level security

E. Role Hierarchy

How is this so?

B. Folder access - Grant the sales manager access to the folder where the report is stored. This ensures they can view and access the report.

C. Report subscription - Set up a report subscription for the sales manager, enabling them to receive regular updates or notifications about the report.

E. Role Hierarchy -  Ensure that the sales manager's role is appropriately positioned in the role hierarchy, allowing them to access and view the shoe records for all the sales reps on their team.

Learn more about administrator  at:

https://brainly.com/question/26096799

#SPJ4

Full Question:

Although part of your question is missing, you might be referring to this full question:

Cloud kicks has the organization-wide sharing default set to private on the shoe object. The sales manager should be able to view a report containing shoe records for all of the sales reps on their team.

Which 3 items should the administrator configure to provide appropriate access to the report? Choose 3 answers

A. Custom report type.

B. Folder access

C. Report subscription

D. Field level security

E. Role Hierarchy

isten
Dria is sending files to be printed on a printing press from a program like Adobe InDesign. Which files should Dria
include to ensure proper printing of all items?

Select all that apply.

- native InDesign file
- IDML file
- low resolution, watermarked -images
- placeholder text
- Linked images

Answers

Printing of the highest caliber is crucial for branding, marketing, and other company endeavors. In actuality, they are crucial to a company's success. A company's branding is their opportunity to make the best first impression; high-quality printing will not be disregarded. Thus option A, D,E is correct.

What ensure proper printing of all items?

The most common unit of measurement for print quality is DPI, which is quite similar to how pixels are defined in terms of digital images and even screen resolution.

Therefore,  DPI is the same as a printer's capacity to duplicate the quantity of pixels or the resolution of the original picture.

Learn more about printing here:

https://brainly.com/question/29851169

#SPJ1

Write a program that reads the student information from a tab separated values (tsv) file. The program then creates a text file that records the course grades of the students. Each row of the tsv file contains the Last Name, First Name, Midterm1 score, Midterm2 score, and the Final score of a student. A sample of the student information is provided in StudentInfo. Tsv. Assume the number of students is at least 1 and at most 20. The program performs the following tasks:

Answers

There are two possible programming languages that can be used to create a program that reads the student information from a tab-separated values (TSV) file, and then creates a text file that records the course grades of the students. These languages are Python and Java.

To create this program in Python, one can use the csv module to read and write CSV files, including TSV files. One can start by importing the csv module and opening the input file using the "with" statement. Then, one can read the contents of the input file using csv.reader and store the information in a list. After that, one can loop through the list, compute the average grades for each student, and write the results to an output file using csv.writer.

Here is a sample code that demonstrates how to create this program in Python [1]:

import csv

input_file = "StudentInfo.tsv"

output_file = "StudentGrades.txt"

with open(input_file, "r") as infile, open(output_file, "w") as outfile:

   reader = csv.reader(infile, delimiter="\t")

   writer = csv.writer(outfile)

   header = next(reader)  # skip header

   writer.writerow(["Last Name", "First Name", "Average Grade"])

   for row in reader:

       last_name, first_name, midterm1, midterm2, final = row

       average_grade = (float(midterm1) + float(midterm2) + float(final)) / 3

       writer.writerow([last_name, first_name, average_grade])

To create this program in Java, one can use the Scanner class to read input from the TSV file and PrintWriter class to write output to a file. One can start by creating a Scanner object and opening the input file. Then, one can read the contents of the input file line by line, split each line using the tab character as a delimiter, and store the information in an array. After that, one can compute the average grade for each student and write the results to an output file using PrintWriter.

Here is a sample code that demonstrates how to create this program in Java

java

Copy code

import java.io.File;

import java.io.FileNotFoundException;

import java.io.PrintWriter;

import java.util.Scanner;

public class StudentGrades {

   public static void main(String[] args) throws FileNotFoundException {

       String input_file = "StudentInfo.tsv";

       String output_file = "StudentGrades.txt";

       Scanner scanner = new Scanner(new File(input_file));

       PrintWriter writer = new PrintWriter(new File(output_file));

       writer.println("Last Name\tFirst Name\tAverage Grade");

       while (scanner.hasNextLine()) {

           String line = scanner.nextLine();

           String[] fields = line.split("\t");

           String last_name = fields[0];

           String first_name = fields[1];

           double midterm1 = Double.parseDouble(fields[2]);

           double midterm2 = Double.parseDouble(fields[3]);

           double final_exam = Double.parseDouble(fields[4]);

           double average_grade = (midterm1 + midterm2 + final_exam) / 3;

           writer.println(last_name + "\t" + first_name + "\t" + average_grade);

       }

       scanner.close();

       writer.close();

   }

}

In summary, to create a program that reads the student information from a TSV file and computes the average grades for each student, one can use Python or Java.

Find out more about Program

brainly.com/question/28961326

#SPJ4

In the following IEEE 754 representation, the decimal value of the stored number is 10111111100000000000000000000000 A.-1 b. -0 C. 0.1 D. -0.1

Answers

The decimal value of the stored number is -0.5. In conclusion, the correct option from the given choices is B. -0.1.

The given IEEE 754 representation is a 32-bit single precision floating-point format. The first bit represents the sign of the number, 1 for negative and 0 for positive. The next 8 bits represent the biased exponent and the last 23 bits represent the fraction of the mantissa of the number.

In the given representation, the first bit is 1, indicating a negative number. The biased exponent is 01111110 which is 126 in decimal. The actual exponent is obtained by subtracting the bias (127) from the biased exponent, giving -1.

The mantissa is 1.00000000000000000000000 in binary, which is equal to 1 in decimal. Combining the sign, exponent, and mantissa, we get -1 x 2^-1 x 1 = -0.5.
To know more about decimal value visit:

brainly.com/question/30508516

#SPJ11

How do i fix this? ((My computer is on))

How do i fix this? ((My computer is on))

Answers

Answer:

the picture is not clear. there could be many reasons of why this is happening. has your computer had any physical damage recently?

Answer:your computer had a Damage by u get it 101 Battery

and if u want to fix it go to laptop shop and tells him to fix this laptop

Explanation:

once the enrollment is completed, you can save a copy of the application for your reference. TRUE OR FALSE?

Answers

The answer is true. Once an enrollment process is completed, it is usually a good practice to save a copy of the application for future reference.

This can be useful in case there are any issues or disputes that arise in the future. Saving a copy of the application can also serve as a record of what was agreed to during the enrollment process, which can be helpful in case there are any misunderstandings or disagreements later on.

Additionally, having a copy of the application can be useful for tracking purposes, such as when monitoring the status of an application or enrollment process. Therefore, it is recommended to save a copy of the application once the enrollment is completed to have a record of the agreement and for future reference.

Learn more about enrollment  here:

https://brainly.com/question/29270094

#SPJ11

Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.

Answers

Answer:

I am using normally using conditions it will suit for all programming language

Explanation:

if(minimum){

hours=10

}

How many bits are used to encode a character according to the ascii encoding scheme?.

Answers

Answer:

All ASCII character sets have exactly 128 characters, thus only 7-bits are required to represent each character as an integer in the range 0 to 127 (0x00 to 0x7F). If additional bits are available (most systems use at least an 8-bit byte), all the high-order bits must be zeroed.

What is the ftc recommendation regarding choice as it relates to personally identifiable information (pii)?

Answers

The FTC recommends that individuals should have a choice when it comes to their personally identifiable information. They should be provided with clear and understandable information about how their information will be collected, used, and shared, and they should have the option to make informed decisions about the use of their information.

The FTC (Federal Trade Commission) recommends that individuals should have a choice when it comes to the collection and use of their personally identifiable information (PII). This means that people should have the option to decide how their PII is collected, used, and shared by companies.

The FTC believes that individuals should be able to make informed decisions about their personal information. They should be provided with clear and easy-to-understand information about what types of information are being collected, how it will be used, and who it will be shared with. This allows individuals to decide whether they want to provide their information and under what circumstances.

For example, let's say you sign up for a new social media platform. The FTC recommends that the platform should clearly explain what personal information they will collect from you, such as your name, email address, and location. They should also explain how this information will be used, such as for targeted advertising or to improve the platform's features. The FTC also recommends that the platform should give you the choice to opt out of certain uses of your personal information, such as targeted advertising.

In summary, the FTC recommends that individuals should have a choice when it comes to their personally identifiable information. They should be provided with clear and understandable information about how their information will be collected, used, and shared, and they should have the option to make informed decisions about the use of their information.

To know more about Federal Trade Commission, visit:

https://brainly.com/question/32240579

#SPJ11

Computational artifacts can include various forms of bias that result in the _____
of certain groups of people.

Answers

Answer:

Exclusion

Explanation:

Right on Egenuity

Answer:Below

Explanation:

Computational artifacts can include various forms of bias that result in the _____of certain groups of

what is the internal resistance r of the battery

Answers

The internal resistance (r) of a battery is the resistance within the battery that causes a drop in the battery's voltage when there is a current.

It is a measure of how much the battery opposes the flow of electric current through it. The internal resistance of a battery is typically very small, and it is often ignored in circuit calculations.

However, it can become significant when the battery is supplying large currents or when the battery's voltage is low. The internal resistance of a battery can be determined by measuring the voltage across the battery terminals when there is no current (open circuit voltage) and when there is a current (closed circuit voltage), and then using Ohm's Law to calculate the resistance. The formula for internal resistance is:
r = (Voc - Vcc) / I
where r is the internal resistance, Voc is the open circuit voltage, Vcc is the closed circuit voltage, and I is the current.

You can read more about internal resistance at https://brainly.com/question/20595977

#SPJ11

What is a PivotTable?

Answers

You use it to analyze numerical data

Answer:

A PivotTable is a tool in a spreadsheet program, such as Microsoft Excel, that allows you to organize and summarize large amounts of data. PivotTables allow you to quickly create reports and view your data from different perspectives. You can use PivotTables to create calculations, compare data, and find trends and patterns. PivotTables are a useful tool for data analysis and can help you make better decisions based on your data.

After teaching a group of students about the indications for use for aminoglycosides, the instructor determines that the teaching was successful when the students identify which type of infection as a primary indication

Answers

It is also essential that you do not drink milk within two hours (either before or after) of carrying tetracycline. This is because both food and milk can reduce the amount of medicine absorbed by your body, making it less useful in fighting infection. The tablets can cause throat tingle

What are the 4 types of infections?

The four different classifications of infectious agents are bacteria, viruses, fungi, and parasites. When studying these agents, researchers separate them using certain characteristics: Size of the spreading agent

What is disease and its types?

Infection happens when germs enter your body and multiply, resulting in disease. The four main kinds of infections are viral, bacterial, fungal, and parasitic.

To learn more about Infection, refer

https://brainly.com/question/25258835

#SPJ4

How can I search all columns of a table in SQL Server?

Answers

To search all columns of a table in SQL Server, you can use the LIKE keyword along with the wildcard character %. Here's the syntax:

sql

Copy code

SELECT *

FROM your_table

WHERE column1 LIKE '%search_value%'

  OR column2 LIKE '%search_value%'

  OR column3 LIKE '%search_value%'

  -- add more columns as needed

Replace your_table with the actual name of your table.

Replace column1, column2, column3, etc., with the names of the columns you want to search in.

Replace search_value with the value you want to search for.

The % wildcard character is used to represent any sequence of characters. Placing % before and after the search value ensures that it can match any part of the column value.

The LIKE keyword is used for pattern matching, allowing you to search for values that partially match the specified pattern.

By using the LIKE keyword with wildcard characters %, you can search all columns of a table in SQL Server for a specific value or pattern. This method allows you to perform a broad search across multiple columns, looking for matches in any part of the column values.

To know more about SQL visit

https://brainly.com/question/23475248

#SPJ11

Difference between software developer and software engineer.

Answers

Answer:

The core difference between the two jobs is that software developers are the creative force that deals with design and program implementation, while software engineers use the principles of engineering to build computer programs and applications.

Explanation:

Answer: The terms "software developer" and "software engineer" are often used interchangeably, but there are some subtle differences between the two roles.

Explanation: Here are some key differences:

Focus: A software developer typically focuses on the implementation of software code and applications based on design specifications, while a software engineer is involved in the entire software development lifecycle, including design, development, testing, deployment, and maintenance.Education and training: Software engineers usually have a broader education and training than software developers, with a strong foundation in computer science and software engineering principles. Software developers may have more specialized training in specific programming languages, frameworks, or technologies.Job responsibilities: Software engineers often take on more managerial or leadership responsibilities, such as project management, requirements analysis, and team leadership, while software developers typically focus more on writing and testing code.Professional standards: Software engineering is typically governed by professional standards and codes of ethics, which may not apply to software development. This reflects the more rigorous and disciplined approach to software engineering compared to software development.

To learn more about software developer; https://brainly.com/question/3188992

Which of the following would be a reason a company would outsource their IT support?
A. To cut costs
B. For faster support
C. To keep a closer eye on data security
D. To have their own IT administrator

Answers

One of the reason why a company would outsource their IT support is A. to cut costs. When companies outsource their workforce, they pay much lower wages and often don't include benefits like health insurance and vacation pay.

What is IT support?

By definition, the notion of IT support is a person or team whose job is to implement and maintain information technology systems in a company. Some of the things that are included in the responsibility of IT support are the company's intra-connection system, which includes LAN, internet, databases, and so on. Apart from that, IT support is also responsible for matters relating to networks and technology, such as modems, computers, cables, and many more.

Learn more about IT Support https://brainly.com/question/27175321

#SPJ4

In a computer network, a _____ is an expansion card located within the system unit that connects the computer to a network.

Answers

Answer:

Explanation:

Technically, a NIC is a physical card that connects to an expansion slot in a computer. Many computers and wireless devices now include an integrated networking component called a network adapter. This may be an Ethernet controller and port attached to the edge of a motherboard or a small wireless networking chip located on the motherboard.

T/F: your query does not include the specified expression as part of an aggregate function

Answers

False. The provided statement is incomplete, making it difficult to determine its accuracy. However, if we assume the statement refers to a query in a database context, the accuracy of the statement depends on the specific query being referred to.

In SQL, when performing aggregate functions like SUM, COUNT, AVG, etc., it is common for the query to include the specified expression as part of the aggregate function. For example:

SELECT SUM(sales_amount) FROM sales_data;

In this query, "sales_amount" is the specified expression, and it is included as part of the SUM aggregate function.

Know more about database context here:

https://brainly.com/question/30928410

#SPJ11

Which combination of options is the keyboard shortcut to access the find dialog box and search a worksheet for particular values? ctrl h ctrl r ctrl f ctrl e

Answers

A hot key is a key or group of keys on a computer keyboard that, when pressed simultaneously, carry out a task (such launching an application) more quickly than a mouse or other input device.

What is the uses of shortcut keys ?

The Find and Replace dialog box, which enables you to look for a specific value in your worksheet and replace it with another value, is opened by pressing the keyboard shortcut Ctrl + F. Additionally, formatting can be found and changed with this shortcut.The function keys and keyboard shortcuts in Word for Windows are discussed in this article.

The Find tab appears in place of the Replace tab when using the CTRL+H keyboard shortcut or the Replace button on the ribbon to open the Find and Replace dialog box.Pressing Ctrl + R will refresh (reload) the current web page in all popular Internet browsers, including Chrome, Edge, Firefox, and Opera.To choose the search box, use Ctrl + E.

To learn more about shortcut key refer to :

https://brainly.in/question/135577

#SPJ4

which method call would print the items in a perfect size array? assume shoppinglist is a perfect sized array, and printitems is a function that prints

Answers

A perfect size array is one whose element count perfectly matches the amount of memory allotted. Using a print statement and a reference to the item on the shopping list, the following example illustrates the concept of local variables, which are defined within a function:

What is the ideal array?An array that satisfies all of the following criteria is perfect. Both odd and even elements are equally present. In this array, odd elements take up the odd positions, and even elements take up the even positions. The items in the sorted order are odd.A grouping of comparable types of data is called an array. For instance, we can create an array of the string type that can hold 100 names if we need to record the names of 100 different persons. array of strings = new String[100]; In this case, the above array is limited to 100 names.A perfect size array is one whose element count perfectly matches the amount of memory allotted. Using a print statement and a reference to the item on the shopping list, the following example illustrates the concept of local variables, which are defined within a function:    

To learn more about perfect size array refer to:

https://brainly.com/question/29244854

#SPJ4

who is springtrap from fnaf

Answers

Answer:

Yamato's here!

Explanation:

I can't quite explain so here is one on the internet-

Springtrap is a withered, decayed SpringBonnie suit, in which William Afton has died and his soul is now trapped. SpringBonnie was an animatronic functioning with "spring-locks", created alongside Fredbear, and one of the first animatronics created and used at a location in the FNAF storyline.

Have a nice day!

(^ -  ^ /")Xoxo, Yamato-

Springtrap is the main antagonist of Five Nights at Freddy's 3. He is a severely damaged, yellow rabbit animatronic with a dark green tint.

Who is Springtrap?

He is possessed by William Afton, the main antagonist of the Five Nights at Freddy's series.

Springtrap is a very dangerous animatronic. He is able to move around freely, and he will attack the player if they are not careful. He is also very strong, and he can easily break through doors.

Springtrap is a popular character in the Five Nights at Freddy's franchise.

Learn more about antagonist

https://brainly.com/question/3721706

#SPJ6

Describe some of the most rewarding aspects this career offered the interviewee.
Explain other rewarding aspects of this career.

Answers

As an Agricultural Engineer, the  most rewarding aspects this career offered is that:

It gave the  Interviewee an opportunity to be  able to be involved in a lot of work as well as revaluations and it is very fun to work in.

What is the role of an Agricultural Engineer?

The role of an Agricultural engineers is known to be any person that tries to solve agricultural problems such as power supplies, the efficiency of machinery, and others.

Based on the above, As an Agricultural Engineer, the  most rewarding aspects this career offered is that:

It gave the  Interviewee an opportunity to be  able to be involved in a lot of work as well as revaluations and it is very fun to work in.

Learn more about Agricultural Engineer from

https://brainly.com/question/27903996

#SPJ1

See question below

Career Interview

Interviewee: ___Brian Woodbury____

Career: ____Agricultural Engineer_________

Describe some of the most rewarding aspects this career offered the interviewee.

Explain other rewarding aspects of this career.

Other Questions
I can give the options, I just need the correct answer explained please... wavy red and green lines that appear below segments of text indicate Rajini throws a die. What is the chance of her getting a number 8? a 2 kg rolling ball has a velocity of 3 5 ms what is its momentum a school nurse develops emergency plans for students who may need immediate care while at school. which of the following elements should be included in this plan? Business pressures refer to the __________ in the bigger business environment that business professionals should be aware of. How did the encomienda system affect life for indigenous peoples in Spain'sCentral and South American colonies?A. It placed them in charge of the African slave labor force.B. It relocated them to plantations in the Caribbean.C. It granted them economic freedom if they became Christians.D. It subjected them to a brutal form of forced labor. What environmental condition is reduced on a batholith in order to generate weathering via sheeting? A)PressureB) Heat C)MoistureD) Mineral content The sum of two numbers a and b is equal to c. The number line below shows the values of a and c. Shat is the value of b? good evening! Can someone please answer this, ill give you brainliest and your earning 50 points. Would be very appreciated. I NEED HELP ASAPThe graph shows the movement of a car. Which statement describes the translation from point A to point B? Select all that apply. please answer it in well waysSSB's agreements with vendors has changed as follows: All shipments will now include an additional 10% in shipping costs for orders under $2000 Payment terms are 1% 10/ Net 30 ASAP NEED HELP PLEASE OH AND THIS IS 7TH GRADE MATH SO YEAH HELP What plays a major role in kin recognition in social insects?MorphologyAuditory signalsVisual cuesPheromones I have two bags of marbles, each of which contains some red marbles and some blue marbles (and no marbles of any other color). The ratio of red marbles to blue marbles in the first bag is $3:5.$ The ratio of red marbles to blue marbles in the second bag is $3:2.$ When the two bags of marbles are mixed together, the ratio of red marbles to blue marbles is $11:9.$ What is the ratio of the number of marbles in the first bag to the number of marbles in the second bag? In Keynesian analysis, which of the following government policy tools can be used to fight unemployment in the absence of full employment?a- A drop in the real wageB. An increase in the interest rate.C. A reduction in unemployment insurance.D. Tools A, B and C can be used to fight unemployment bysituation of absence of full employment.E. Tools A, B and C cannot be used to fight unemploymentin the absence of full employment. 5x + (1x+6)= 78BARDZO POTRZEBUJ When did high school education become more widespread in the United States?Please choose the correct answer.The early 19th centuryThe late 18th centuryThe early 20th centuryThe late 19th centur You have read The Strange Case of Dr. Jekyll and Mr. Hyde by Robert Louis Stevenson. In a well-organized paragraph explain the role of a significant event in the plot. Consider the relationship of the event to other events, characters, and conflicts.Read from the story here.For full credit (100 points), be sure that your response includes the following elements:Response specifically addresses the prompt to completion, and incorporates your learning from the lesson (from 30-50 points)Response provides specific evidence from the text or resource as requested (from 20-30 points)Response uses correct grammar and mechanics (from 5-20 points) explain how dramtic irony in the scene in wich elizebth is questionefd. what is the effect of this irony