Why do engineers use design briefs?
a.Engineers use design briefs to advertise their invention or innovation.
b.Engineers use design briefs as a guide to build a mock-up of a product.
c.Engineers use design briefs to document their ideas.
d.Engineers use design briefs to explain the problem, identify solution expectations and establish project constraints.

Answers

Answer 1

Answer: D

Explanation: Design Brief A design brief is used in a design process to point out the goals and objectives for the designing. The Design Brief is a short paragraph describing the problem to be solved, establishing the need for the product, and then setting out the specifications within which the product is to be developed


Related Questions

Npesta kenos reaction

Answers

Answer:

? what's the question

Explanation:

???

What are you asking???

What is this?

Cam and Follower
Lead Screw
Bevel Gears
Rack and Pinion

We have a test on this in 10 minutes and we get this time to finish studying but I have NO IDEA WHAT THIS IS. Please help :D

What is this?Cam and FollowerLead ScrewBevel GearsRack and PinionWe have a test on this in 10 minutes

Answers

Answer:

It looks like a Lead Screw

answer: it looks like the thing u punch wholes with (i frogot what its called)

what plugs into this?

Answers

Into what ????????????

Huh plugs into what ?

An example of how a merge code would appear in a letter would be _____.

Answers

Answer:

Space blank

Explanation:

It means the question needs you to answer the question

Answer:

An example of how a merge code would appear in a letter would be C i.e. /University_Name/. Explanation: Merge codes help speed up the method of making letters by inserting data into your letters.

Explanation:

I hope this helps

(I made this up teehee) what anime is katski bakugo from

Answers

Scooby do because that is the best shower ever
MHA (My Hero Academia) or Boku no hero academia

When the prompt function is used in JavaScript, _____ appears.

A.
an error message

B.
a pop-up box

C.
a data warning

D.
a password request

Answers

Answer:

B

Explanation:

instructs the browser to display a dialog with an optional message prompting the user to input some text, and to wait until the user either submits the text or cancels the dialog

A pop up box to let you know the Java script is there and active

Lyla is using a computer repair simulator. This program can help her
A: determine the best brand of computer
B: find the fastest processor
C: identify the best operating system
D: learn the different types of hardware

Answers

Answer:

D. Learn the different types of hardware.

Explanation:

When Lyla is a computer repair simulator, she is learning the different types of hardware. After she has learned most of the types of hardware, she can repair her computer.

hope this helped.

Answer:
D. Learn the different types of hardware.
Explanation:
When Lyla is a computer repair simulator, she
is learning the different types of hardware.
After she has learned most of the types of
hardware, she can repair her computer.

Using the Adjust group, what can you control to affect an image? Check all that apply.
saturation
tone
sharpness
page breaks
compression
brightness
margins

Answers

Answer:

brightness tone compression sharpness

Explanation:

Using the Adjust group, we can control Saturation, tone, sharpness and brightness to affect an image.

Saturation refers to the intensity or purity of colors in an image. Adjusting the saturation allows you to make the colors more vibrant or muted.

Tone adjustments typically involve modifying the overall lightness or darkness of an image. It helps to balance the distribution of tones, such as adjusting shadows, midtones, and highlights.

Sharpness refers to the clarity and level of detail in an image. By adjusting the sharpness, you can enhance or reduce the level of detail to make the image appear sharper or softer.

Brightness controls the overall luminance or brightness level of an image. Increasing brightness makes the image brighter, while decreasing it makes the image darker.

To learn more on Image adjustments click:

https://brainly.com/question/33435568

#SPJ2

Write a small program that takes in two numbers from the user. Using an if statement and an else statement, compare them and tell the user which is the bigger number. Also, consider what to output if the numbers are the same.

Test your program in REPL.it, and then copy it to your Coding Log.

(If you’re up for an extra challenge, try extending the program to accept three numbers and find the biggest number!)

And only give me a good answer not some random letters plz. ty

Answers

Answer:

4. Conditionals

4.1. The modulus operator

The modulus operator works on integers (and integer expressions) and yields the remainder when the first operand is divided by the second. In Python, the modulus operator is a percent sign (%). The syntax is the same as for other operators:

>>> quotient = 7 / 3

>>> print quotient

2

>>> remainder = 7 % 3

>>> print remainder

1

So 7 divided by 3 is 2 with 1 left over.

The modulus operator turns out to be surprisingly useful. For example, you can check whether one number is divisible by another—if x % y is zero, then x is divisible by y.

Also, you can extract the right-most digit or digits from a number. For example, x % 10 yields the right-most digit of x (in base 10). Similarly x % 100 yields the last two digits.

4.2. Boolean values and expressions

The Python type for storing true and false values is called bool, named after the British mathematician, George Boole. George Boole created Boolean algebra, which is the basis of all modern computer arithmetic.

There are only two boolean values: True and False. Capitalization is important, since true and false are not boolean values.

>>> type(True)

<type 'bool'>

>>> type(true)

Traceback (most recent call last):

 File "<stdin>", line 1, in <module>

NameError: name 'true' is not defined

A boolean expression is an expression that evaluates to a boolean value. The operator == compares two values and produces a boolean value:

>>> 5 == 5

True

>>> 5 == 6

False

In the first statement, the two operands are equal, so the expression evaluates to True; in the second statement, 5 is not equal to 6, so we get False.

The == operator is one of the comparison operators; the others are:

x != y               # x is not equal to y

x > y                # x is greater than y

x < y                # x is less than y

x >= y               # x is greater than or equal to y

x <= y               # x is less than or equal to y

Although these operations are probably familiar to you, the Python symbols are different from the mathematical symbols. A common error is to use a single equal sign (=) instead of a double equal sign (==). Remember that = is an assignment operator and == is a comparison operator. Also, there is no such thing as =< or =>.

4.3. Logical operators

There are three logical operators: and, or, and not. The semantics (meaning) of these operators is similar to their meaning in English. For example, x > 0 and x < 10 is true only if x is greater than 0 and less than 10.

n % 2 == 0 or n % 3 == 0 is true if either of the conditions is true, that is, if the number is divisible by 2 or 3.

Finally, the not operator negates a boolean expression, so not(x > y) is true if (x > y) is false, that is, if x is less than or equal to y.

4.4. Conditional execution

In order to write useful programs, we almost always need the ability to check conditions and change the behavior of the program accordingly. Conditional statements give us this ability. The simplest form is the ** if statement**:

if x > 0:

   print "x is positive"

The boolean expression after the if statement is called the condition. If it is true, then the indented statement gets executed. If not, nothing happens.

The syntax for an if statement looks like this:

if BOOLEAN EXPRESSION:

   STATEMENTS

As with the function definition from last chapter and other compound statements, the if statement consists of a header and a body. The header begins with the keyword if followed by a boolean expression and ends with a colon (:).

The indented statements that follow are called a block. The first unindented statement marks the end of the block. A statement block inside a compound statement is called the body of the statement.

Each of the statements inside the body are executed in order if the boolean expression evaluates to True. The entire block is skipped if the boolean expression evaluates to False.

There is no limit on the number of statements that can appear in the body of an if statement, but there has to be at least one. Occasionally, it is useful to have a body with no statements (usually as a place keeper for code you haven’t written yet). In that case, you can use the pass statement, which does nothing.

if True:          # This is always true

   pass          # so this is always executed, but it does nothing

Which type of cyber crime offender requires the highest percentage of risk management in terms of computer monitoring?
A) Sex offenders
B) Identity thieves
C) Low-Risk offenders
D) hackers

Answers

Answer: D

Explanation: Hackers are the only type of cyber criminal that monitors your computer

it would be D the hackers

what is 8 4/7 divided by 15

Answers

84/7 divided by 15 is 0.8

Answer: 4/7

Explanation:

8 4/7 ÷ 15

60/7× 1/15

=4/7

ok so...you first are going to convert the mix fraction 8 4/7 to improper fraction by multiplying the denominator and the whole number which is 56 then add the numerator 56 +4= 60 and put back the denominator which is going to be 60/7.

Then flip the fraction or the whole number 15 which is also 15/1 that is on the right which is going to be 1/15 and change the division sign to multiplication which is going to be 60/7 × 1/15.

then you can cancel, 15 go into 60, 4 times, so you are going to multiply 4 times 1 and 7 times one, which gives you 4/7.

I hope this help you to understand

If you want text to appear sequentially, or one line after another, on a slide, you can add a(n)

A.
font color.
B.
font face.
C.
animation.
D.
slide design.

Answers

Answer: Animation

Explanation: I took the practice assessment this was the correct answer! ^^

When adjusting the shutter speed, which shutter speed will allow you to capture motion? A)1 Minute B)2 to 1/2 second C)10 to 30+ seconds D)1/250 to 1/500 second

Answers

Answer:

D) 1/250 to 1/500 second

Explanation:

The faster the shutter speed the clearer it will be and you will capture motion.

Can i get a brainliest

D) 1/250 to 1/500 second

List the different computer industries, and what they do.
(Like the part makers, people who assemble it and stuff not the companies)

Answers

Answer:

There are several different industries that are involved in the production and use of computers. These industries include:

Hardware manufacturers: These companies design and produce the physical components of computers, such as the motherboard, processor, memory, storage, and other peripherals.Software developers: These companies create the operating systems, applications, and other programs that run on computers.System integrators: These companies assemble and configure computers, often using components from multiple manufacturers, and sell them to consumers or businesses.Service providers: These companies provide support and maintenance services for computers, including repair, installation, and training.Data centers: These companies operate large facilities that host and manage the data and computing resources of other companies.Internet service providers: These companies provide access to the internet for businesses and consumers.Cloud computing providers: These companies offer computing services, such as storage, networking, and software, over the internet.Consulting firms: These companies provide advice and expertise on the use of computers and technology for business and organizational goals.

Answer:

Hardware Manufacturers

Software Developers

System Integrators

Service Providers

Data Providers

ISP

Cloud Computing Providers

Consulting Firms

Explanation:

It is in order..

Hi, ik this isn't really a school related but I need help with this little tab that opens whenever I try to type. This is what it looks like pls respond if you know whats going on.
Thanks and have a nice day.

Hi, ik this isn't really a school related but I need help with this little tab that opens whenever I

Answers

It looks like you are using a chrome book. Try going to the settings and searching keyboard.
go to your settings and turn it off or take it to your tech person at school and see if they can help its really hard to explain the other ways

Walt needs to ensure that messages from a colleague in another organization are never incorrectly identified as spam. What should he do?

A.Configure a safe recipient.
B.Configure a blocked sender.
C.Configure a safe sender.
D.Do nothing.

Answers

Answer:

C. Configure a safe sender

Explanation:

It’s dabest thing to do

As per the given scenario, Walt should need to configure a safe sender. The correct option is C.

What is configuration?

A system's configuration in communications or computer systems refers to how each of its functional elements is organised in relation to their nature, number, and distinguishing features.

Configuration frequently involves picking the right hardware, software, firmware, and documentation.

A person, group, or organisation that starts the communication is known as the sender. The success of the message stems primarily from this source.

The communication is influenced by the sender's experiences, attitudes, knowledge, competence, perspectives, and culture.

Walt must take care to prevent messages from a colleague in a different organisation from ever being mistakenly classified as spam. He ought to set up a secure sender.

Thus the correct option is C.

For more details regarding configuration, visit:

https://brainly.com/question/13410673

#SPJ2

ANSWER ASAP PLEASE! I'M TIMED <3
Which of the following are forms of repetitive strain injury? Choose 3 options.

neck spasms

concussion

overexertion

back issues

carpal tunnel syndrome

Answers

please give brainliest

Answer:

The three options that are forms of repetitive strain injury are:

Neck spasms: Repetitive movements or sustained poor posture can strain the neck muscles, leading to spasms and discomfort.

Overexertion: Overexertion refers to excessive or repetitive use of certain muscles or body parts, which can result in strain and injury over time.

Carpal tunnel syndrome: Carpal tunnel syndrome is a specific repetitive strain injury that affects the hands and wrists. It occurs when the median nerve, which runs through the carpal tunnel in the wrist, becomes compressed or irritated due to repetitive hand and wrist movements.

Answer: neck spasms, carpal tunnel syndrome, overexertion

Explanation:

In a minimum of 250 words, discuss the technological problems that can occur when consumers emphasize on speed over security.

Answers

When consumers prioritize speed over security, several technological problems can arise, leading to potential risks and vulnerabilities. While speed is undoubtedly important for a seamless and efficient user experience, neglecting security measures can have severe consequences. Here are some of the technological problems that can occur when consumers emphasize speed over security:

1. Vulnerabilities and Breaches: Emphasizing speed often means sacrificing robust security measures. This can lead to vulnerabilities in software, applications, or systems that attackers can exploit. Without adequate security measures, data breaches become more likely, exposing sensitive information such as personal data, financial records, or trade secrets. The aftermath of a breach can be detrimental, including reputational damage, legal consequences, and financial losses.

2. Malware and Phishing Attacks: When speed takes precedence, consumers may overlook potential malware or phishing attacks. By rushing through security checks or bypassing cautionary measures, they inadvertently expose themselves to malicious software or fraudulent schemes. These attacks can compromise personal information, hijack devices, or gain unauthorized access to networks, resulting in financial losses and privacy violations.

3. Inadequate Authentication and Authorization: Speed-centric approaches might lead to weak or simplified authentication and authorization mechanisms. For instance, consumers may choose easy-to-guess passwords or reuse them across multiple platforms, making it easier for attackers to gain unauthorized access. Additionally, authorization processes may be rushed, granting excessive privileges or overlooking necessary access controls, creating opportunities for unauthorized users to exploit system vulnerabilities.

4. Neglected Updates and Patches: Prioritizing speed often means neglecting regular updates and patches for software and systems. By delaying or avoiding updates, consumers miss out on critical security fixes and vulnerability patches. Hackers actively exploit known vulnerabilities, and without timely updates, devices and systems remain exposed to these threats, making them easy targets.

5. Lack of Secure Development Practices: When speed becomes the primary concern, secure development practices might take a backseat. Security testing, code reviews, and quality assurance measures may be rushed or ignored, leading to the inclusion of vulnerabilities in the software or application itself. These vulnerabilities can be exploited by attackers to gain unauthorized access or execute malicious activities.

To mitigate these problems, it is essential to strike a balance between speed and security. Consumers should prioritize security measures such as using strong passwords, enabling multi-factor authentication, regularly updating software, and being cautious of suspicious links or emails. Service providers and developers must also prioritize security in their products and services by implementing secure coding practices, conducting thorough security assessments, and promptly addressing vulnerabilities. Ultimately, a comprehensive approach that values both speed and security is crucial for maintaining a safe and efficient technological ecosystem.

Explanation:

--> used brainly simplify :D

Consumers prioritizing speed over security can lead to several technological problems. This includes vulnerabilities and breaches where attackers can exploit weaknesses in software or systems. Malware and phishing attacks become more likely when security measures are overlooked. Weak or simplified authentication and authorization methods can make it easier for unauthorized users to gain access. Neglecting updates and patches leaves devices and systems vulnerable to known threats. Lastly, rushing through secure development practices may result in the inclusion of vulnerabilities in the software itself. To address these issues, consumers should use strong passwords, update their software regularly, and be cautious of suspicious links or emails. Service providers and developers should prioritize security by conducting thorough security assessments and promptly addressing vulnerabilities. Striking a balance between speed and security is crucial for a safe and efficient technological environment.

All of the data in a digital book (letters, punctuation, spaces, etc) are stored and processed in a computer as binary. Break down how this works (hint: Ascii) . Explain in three or more sentences: Please Answer ASAP, Brainiest for Best and most In detail answer!!!!!

Answers

Can I have the Brainiest pls pls pls

Did the ANSI developed the A series, B series, or the Arch series?​

Answers

Answer:

ANSI developed the B series.

Explanation:

Change Unit. An ANSI B piece of paper measures 279 × 432 mm or 11 × 17 inches. ANSI B is part of the American National Standards Institute series, with an aspect ratio of 1:1.5455. ANSI B is also known as 'Ledger' or 'Tabloid'.

How do you code things to make shapes out of them and add color

Answers

Answer:

go to KhanAcademy and search "Coloring with code" and it should be the first thing at the top

what is the answer i need them now pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls

what is the answer i need them now pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls

Answers

Answer: Insert ribbon > table drop down menu  

Explanation:

Answer:Insert ribbon > table drop down menu  

Explanation:

To save a presentation to the hard drive on your computer, you should choose

A. Rename
B. Print
C. Download As
D. Share
30 Points!!

Answers

Answer:

C should be the answer, Hope this helps :) Pls mark me brainliest.

Explanation:

If you choose A then you will just rename the presentation so this is not it.

If you choose B then you would just print the file onto paper so this is not it.

If you chose D you would just share the presentation to other people but it won't save on your hard drive.

So C is the answer because your downloading the file into your hard drive.

Answer:

C) downlload As

Explanation:

PLEASE HELP ITS DUE SOON!!
How do software and hardware work together

A. As a function

B. As a program

C. As a system

D. As a standard

Answers

Answer:

C. As a system.

Explanation:

Software and hardware work together as a system to perform a specific task or a set of tasks. Hardware refers to the physical components of a computer system, such as the processor, memory, hard drive, keyboard, and mouse, while software refers to the instructions, data, and programs that are stored on the hardware and used to perform specific tasks. The hardware provides the platform and resources for the software to run, and the software controls and utilizes the hardware to execute tasks. The two work together in a coordinated manner to achieve the desired outcomes

C.As a system
This is answer

what are some basic commands to remember in terminal? windows 10

please help if you know

Answers

Answer:

If you just need a few, maybe this can help.

Explanation:

Cat - The cat command means 'Concatenate'. It prints the contents of a file or files to stdout. It's frequently used in Linux commands.

Touch - Using the 'Touch' command, you can create a file, or possibly just modify or generate a timestamp.

Move - The 'mv' command stands for 'Move'. As the name says, we can use this command to move files and directories from one place to another.

Chsh - The chsh command changes a user's login shell attribute. If you want to change the shell of another user, execute the command with root permissions.

Sudo - 'Sudo', or 'super user do', is a command that allows you to elevate your user privileges while executing the command to administrator privileges.

1.Assoc

Most files in Windows are associated with a specific program that is assigned to open the file by default. At times, remembering these associations can become confusing. You can remind yourself by entering the command assoc to display a full list of filename extensions and program associations. You can also extend the command to change file associations. For example, assoc .txt= will change the file association for text files to whatever program you enter after the equal sign. The assoc command itself will reveal both the extension names and program names, which will help you properly use this command.

In Windows 10, you can view a more user-friendly interface that also lets you change file type associations on the spot. Head to Settings (Windows + I) > Apps > Default apps > Choose default app by file type

2.Cipher

Deleting files on a mechanical hard drive doesn't really delete them at all. Instead, it marks the files as no longer accessible and the space they took up as free. The files remain recoverable until the system overwrites them with new data, which can take some time. The cipher command, however, lets you wipe a directory on an NTFS-formatted volume by writing random data to it. To wipe your C drive, for example, you'd use the cipher /w:d command, which will wipe free space on the drive. The command does not overwrite undeleted data, so you will not wipe out the files you need by running this command.

When you run the cipher command by itself, it returns the encryption state of the current directory and the files it contains. Use cipher /e: to encrypt a file, cipher /c: to retrieve information about encrypted files, and cipher /d: to decrypt the selected file. Most of these commands are redundant with the Windows encryption tool BitLocker.

3.file Compare

You can use this command to identify differences in text between two files. It's particularly useful for writers and programmers trying to find small changes between two versions of a file. Simply type fc and then the directory path and file name of the two files you want to compare.

You can also extend the command in several ways. Typing /b compares only binary output, /c disregards the case of text in the comparison, and /l only compares ASCII text.

So, for example, you could use the following:

fc /l "C:\Program Files (x86)
The above command compares ASCII text in two Word documents.

4.Ipconfig

This command relays the IP address that your computer is currently using. However, if you're behind a router (like most computers today), you'll instead receive the local network address of the router.

Still, ipconfig is useful because of its extensions. ipconfig /release followed by ipconfig /renew can force your Windows PC into asking for a new IP address, which is useful if your computer claims one isn't available. You can also use ipconfig /flushdns to refresh your DNS address. These commands are great if the Windows network troubleshooter chokes, which does happen on occasion.

5.Netstat

Entering the command netstat -an will provide you with a list of currently open ports and related IP addresses. This command will also tell you what state the port is in; listening, established, or closed.

This is a great command for when you're trying to troubleshoot devices connected to your PC or when you fear a Trojan infected your system and you're trying to locate a malicious connection.

6.Ping

Sometimes, you need to know whether or not packets are making it to a specific networked device. That's where ping comes in handy.

Typing ping followed by an IP address or web domain will send a series of test packets to the specified address. If they arrive and are returned, you know the device is capable of communicating with your PC; if it fails, you know that there's something blocking communication between the device and your computer. This can help you decide if the root of the issue is an improper configuration or a failure of network hardware.

7.PathPing

This is a more advanced version of ping that's useful if there are multiple routers between your PC and the device you're testing. Like ping, you use this command by typing pathping followed by the IP address, but unlike ping, pathping also relays some information about the route the test packets take.

Why isn't my brainly post being answered?

Answers

Try deleting then reposting, it may not always pop up in new questions, I will have a look at the question anyway.

Sometimes they don’t pop up on the feed try reposting again or possibly updating the app if you can. Or it may be an issue within the question itself like if it is worded correctly.
Hope this helps!

Digital and analog audio recordings have pros and cons. Do you think the pros of digital recordings outweigh the cons and therefore prefer digital audio recordings? Or, do you think the cons outweigh the pros and therefore you prefer analog audio recordings? Explain. ( USE C.E.R *Claim, Evidence, Reasoning* )

Answers

I think the pros of digital recordings outweigh the cons! I prefer digital audio recordings over analog audio recordings because analog recordings require more financing and preservation. Compared to digital recordings, analog recording equipment is more expensive and the tape deteriorates over time. Which to me personally, doesn't seem to be worth the amount of effort since it's such a process to go through. You can possibly go into debt due to that. Digital recording equipment, on the other hand, is more affordable. It's less time-consuming and although it does have its disadvantages, they're minor. Digital recordings can be stored online. Its data get corrupted? You can get it back! It won't cost you anything.

I think the pros of digital recordings outweigh the cons! I prefer digital audio recordings over analog audio recordings because analog recordings require more financing and preservation. Compared to digital recordings, analog recording equipment is more expensive and the tape deteriorates over time. Which to me personally, doesn't seem to be worth the amount of effort since it's such a process to go through. You can possibly go into debt due to that. Digital recording equipment, on the other hand, is more affordable. It's less time-consuming and although it does have its disadvantages, they're minor. Digital recordings can be stored online. Its data get corrupted? You can get it back! It won't cost you anything.

In a complex model, scientists use _____ to simplify calculations?

variables
factors
assumptions
inputs

Answers

Answer:

factors

Explanation:

because it explains it in pieces

Answer:

In a complex model, scientists use variables to simplify calculations.

Explanation:

Variables are values or quantities that can change within a model. They allow scientists to represent complex relationships and systems with a smaller number of inputs. By using variables, scientists can perform mathematical operations and make predictions about the behavior of the system being modeled. For example, in a model of a population, a variable might represent the number of individuals in the population, while another variable might represent the birth rate. By manipulating these variables, scientists can make predictions about how the population will change over time.

How does a resident virus differ from a non-resident virus? !!!25 POINTS!!!!!

A) Resident viruses simply disrupt operations while non-resident viruses will control hosts.

B)Resident viruses will control hosts while non-resident viruses simply disrupt operations.

C)Resident viruses find networks to infect while non-resident viruses load themselves into memory.

D)esident viruses load themselves into memory while non-resident viruses find networks to infect.

Answers

Answer:

The correct answer is **D)** Resident viruses load themselves into memory while non-resident viruses find networks to infect. A resident virus is a type of computer virus that’s deployed and resides within a computer’s random access memory (RAM). A non-resident computer virus, on the other hand, is a type of computer virus that doesn’t reside within a computer’s RAM. Non-resident computer viruses can still be deployed within RAM, but they don’t stay there.

D is the correct answer! :)

A human would do a better job determining the shortest route between twenty cities than a computer.
True
False

Answers

Answer:

that is false I think so it true

Answer:

true

Explanation:

hope this helps:)

Other Questions
Write a letter to the Mayor of your municipality or the Chairperson of your rural municipality requesting him/her to involve the representatives of children in the decision making process related to children's issues your municipality/ruralmunicipality. HELP PLEASE!!!Adam sketches plans for a small wooden table. The side view shows the two legs on one side of the table. Answer the following questions:.Which two pairs of angles are alternate interior angles?.If Adam builds the table and does not make those pairs of angles congruent, what will be wrong with his table? Time allocation budget line 180 When Charmaine's wage decreases, what happens to her hours of work and leisure? She works more hours but consumes less. She works more and consumes more, There is not enough information in the graph to tell She consumes more leisure. 140 120 Quantity consumed (5) 100 BO co 9 10 ty Please I Need The Answer. 1.describe how each of these countries mobilize for war? soviet union- the united states- germany- japan- 2.how did each of these countries deal with bombings on the home front? britain- germany- japan- The Persian Empire and Alexander the Great both conquered parts of Pakistan and India. TrueFalse Morrison Manufacturing produces casings for sewing machines: large and small. To produce the different casings, equipment must be set up. The setup cost per production run is $18,000 for either casing. The cost of carrying small casings in inventory is $6 per casing per year; the cost of large casings is $18 per unit per year. To satisfy demand, the company produces 2,400,000 small casings and 800,000 large casings. Required: 1. Compute the number of small casings that should be produced per setup to minimize total setup and carrying costs. 2. Compute the setup, carrying, and total costs associated with the economic order quantity for the small casings. 3. What data analytic type was used in Requirement 1 (descriptive, diagnostic, predictive, or prescriptive)? Justify your selection. See Exhibits 2.5 and 2.6, pp. 37, 40, for a brief review of data analytics. 4. Suppose that Morrison's production engineer indicates that he has a method to reduce setup time; consequently, he predicts the setup cost will be reduced to $180. What will be the EOQ if this method works as predicted? Now indicate what data analytic type is being used. At the end of the Civil War, Lincoln faced tremendous challenges, as did newly freed Black people seeking a way to fend for themselves in their new situation: trying to earn a living, buy or lease property on which to do it, and protect themselves and their families from the brutalities of vengeful former slave owners. Read the brief correspondences identifying these needs and challenges, and write a brief personal response. Although Mr. Yanagita has recently learned to play poker quite well, he cannot consciously remember ever having played poker. It is likeely that he has suffered damage to his:hippocampus 5.Which of the following best describes how the speaker feels about a woman's role?A. Being a mother is a woman's greatest purpose.B. Women should raise their sons to lead their women when they are adults.C. A woman could never be a leader because her morals are too pure.D. Children often seek guardianship from others because women are too weak. In a study by judge et. al., the big five factor most strongly associated with leadership was ______ and the factor most weakly associated with leadership was ______. 2. The terminal arm of an angle, o in standard position passes through B (-3, 4). a. Sketch a diagram for this angle in standard position. b. Determine the length of OB. c. Determine the primary trigonometric ratios to three decimal places. Application ( 13 ) 3. Sketch the triangle, then calculate the indicated angle. [A3 Cl] In ANPQ, p = 5', q = 7', and Q = 90. Determine the measure of P. Which is an emotional consequence of engaging in sexual activity as a teen? Which statement summarizes advantages that Dutch East India Company traders had over Portuguese and Spanish traders? Find the absolute extrema of g(x)=1/2 x^2 + x2 on [2,2]. How u find the radius its 64/x=210/360 right? Suppose there are 3 molecules in a container. If each molecule has a 1-in-2 chance of being in the left half of the container, what is the probability that there are exactly 2 molecules in the left half of the container? marahhas started a software development firm. she does not have the resources to package and market the software, so she partnered with zenith llc. what is the financial relationship between marah and zenith? Circuit pruning occurs only before puberty.O TrueO False