you suspect a password was not set for this account. what command should you use to investigate linux

Answers

Answer 1

Use the sudo getent shadowing Hansen7o9 command to check out this theory.

Why was Linux created?

Describe Linux. A Unix-like operating system (OS) for desktops, servers, mainframes, mobile devices, and microcontrollers, Linux is open source and user-developed. It is one of the most widely used operating systems and is suitable with almost all commonly used applications architectures, such as x86, ARM, & SPARC.

Where can I utilize Linux?

Currently, Linux-based operating systems are found on most computers, from embedded gadgets to practically all computing power, and they have a place in server configurations similar to the well-known Http application stack. Desktop PCs in home and organizations are increasingly being utilized with Linux distributions.

To know more about Linux visit:

https://brainly.com/question/25480553

#SPJ4

The complete question is-

A new user account, Hansen7o9, was created, but the user cannot log into the system. You suspect a password was not set for this account. What command should you use to investigate this suspicion?


Related Questions

Which of the following kinds of storage is NOT used by NAS and SAN solutions? A. tape memory. B. flash memory. C. RAID D. network storage

Answers

The kind of storage that is NOT used by NAS and SAN solutions is tape memory.

NAS (Network-Attached Storage) and SAN (Storage Area Network) are storage solutions that are designed to provide efficient and reliable access to data. Both of these solutions use different types of storage technologies such as flash memory and RAID for efficient data storage and retrieval. However, tape memory is not used in NAS and SAN solutions due to its slow access times and limited capacity compared to other storage options. Tape memory is mainly used for archival and backup purposes and is not suitable for quick access to data, which is the primary function of NAS and SAN solutions.

Learn more about  NAS and SAN here:

https://brainly.com/question/31195110

#SPJ11

The culture of the Internet is interlinked in dependence between technological advances and the way in which ____.


humans increased personal capacity by using these advances

humans have become entirely dependent on digital technology

humans increased their processing knowledge with technology

humans have become interdependent on various technologies

Answers

Answer: humans increased personal capacity by using these advances.

Explanation:

The culture of the Internet is interlinked in dependence between technological advances and the way in which humans increased personal capacity by using these advances.

Technological advancement has to do with how information is being generated which brings about the improvement and inventions regarding technology.

Answer:

C) humans increased personal capacity by using these advances

Which of the follow efficiencies would be considered unreasonable?

Answers

Answer:

Exponential or factorial efficiencies algorithms

Explanation:

In a computer engineering system, the efficiencies that would be considered unreasonable is the "Exponential or factorial efficiencies algorithms"

This is unlike Algorithms with a polynomial efficiency that is considered to have Reasonable Time.

From applications point of view, explain how and when the strength of material becomes more important than its' toughness For the toolbar, press ALT+F 10 (PC) or ALT+FN+F10 (Mac)

Answers

The microstructure and structural defects of a material determine its strength. Due to the procedure, residual stresses or microcracks inside the subsurface have an impact on the strength of machined component.

What role does material strength play in the construction industry?

For any building material, strength is a crucial quality. Hence, a factor of safety is supplied for materials and is chosen based on the nature of the task, the quality of the material, the economic situation, etc., in order to provide the maximum level of safety in strength.

Why is power the most important consideration?

Your life quality and capacity to do everyday duties may both improve as a result of strength training. Strength exercise can also protect your joints from damage. Adding muscle may help you balance better and maybe reduce your risk of falling. If you achieve this, you'll be allowed to age independently.

To know more about machined visit:

https://brainly.com/question/2641843

#SPJ4

A while loop is called a pretest loop because the condition is tested after the loop has had one iteration. True or false?.

Answers

Answer:

True

Explanation:

The while loop tests the condition first then performs iteration.

Debug big tower can someone help me

Debug big tower can someone help me

Answers

Answer:

2

Explanation:

2 is because that what i think

Answer:its c

Explanation:

because thts wht i thinl

Use Affordability, Quality, and Style as the only Values for your decision in finding the best computer for you among the 3 computers you have identified as your choices. Apply the Multi-Factor Evaluation Process by: (i) (5 points) assigning normalized weights to the Values, (ii) (10 points) assigning for each Value, ratings of individual computers, and normalizing these ratings for each Value. (iii) (15 points) computing the total score of each computer by multiplying the normalized weight to the normalized rating of each Value and summing the products for each Computer. Note: the total scores are automatically normalized, i.e., summing to 1 . The computer with the highest total score is the Best computer. You must follow the example on OV-20 to systematically show all normalized numerical results to receive full credits. 2. (20 points) Compute the following ratios: RWM1=Largest weight/smallest weight. RWM2=Largest weight/second largest weight RTM1= Largest total score/smallest total score. RTM2= Largest total score/second largest total score

Answers

The best computer can be determined by applying the Multi-Factor Evaluation Process, assigning normalized weights to the values of affordability, quality, and style, and computing the total score for each computer based on the ratings and weights.

To find the best computer among the three choices, we need to assign weights to the values of affordability, quality, and style. These weights reflect the relative importance of each value in the decision-making process. Once the weights are assigned, we can proceed to rate each computer on a scale and normalize these ratings for each value.

After assigning normalized ratings, we multiply the normalized weight by the normalized rating for each value and sum the products to compute the total score for each computer. The total scores are automatically normalized, meaning they will sum up to 1. The computer with the highest total score will be considered the best computer based on the given criteria.

Additionally, we need to compute certain ratios as part of the evaluation process. The ratios include RWM1, which is the largest weight divided by the smallest weight, and RWM2, which is the largest weight divided by the second largest weight. We also calculate RTM1, which is the largest total score divided by the smallest total score, and RTM2, which is the largest total score divided by the second largest total score. These ratios provide insights into the relative differences between weights and total scores.

By following this systematic approach and considering the assigned weights, normalized ratings, total scores, and ratios, we can make an informed decision and identify the best computer among the three options based on affordability, quality, and style.

Learn more about Multi-Factor

brainly.com/question/30407367

#SPJ11

the global configuration command ip default-gateway 172.16.100.1 is applied to a switch. what is the effect of this command?

Answers

Since the global configuration command ip default-gateway 172.16.100.1 is applied to a switch, the effect of this command is that the switch is one that can be remotely handled from a given host on another  given network.

So what exactly does an IP address mean?

An IP address is a series of integers that each computer or device connected to the internet has, to put it simply. For connecting with one another and talking, obtaining data, and transferring data, each device/computer unit will have a unique number.

Therefore, Note that A default gateway address is typically created so that all devices can connect only to networks outside of their own. It can also carry out the same job if the switch supports the ip-default-gateway/IP ADDRESS command.

Learn more about global configuration command from

https://brainly.com/question/29314590
#SPJ1

1)Which tool can you use to find duplicates in Excel?
Select an answer:
a. Flash Fill
b. VLOOKUP
c. Conditional Formatting
d. Concatenation
2)What does Power Query use to change to what it determines is the appropriate data type?
Select an answer:
a.the headers
b. the first real row of data
c. data in the formula bar
3)Combining the definitions of three words describes a data analyst. What are the three words?
Select an answer:
a. analysis, analyze, and technology
b. data, programs, and analysis
c. analyze, data, and programs
d. data, analysis, and analyze

Answers

The tool that you can use to find duplicates in Excel is c. Conditional Formatting

b. the first real row of datac. analyze, data, and programs

What is Conditional Formatting?

Excel makes use of Conditional Formatting as a means to identify duplicate records. Users can utilize this feature to identify cells or ranges that satisfy specific criteria, like possessing repetitive values, by highlighting them.

Using conditional formatting rules makes it effortless to spot repeated values and set them apart visually from the other information. This function enables users to swiftly identify and handle identical records within their Excel worksheets, useful for activities like data examination and sanitation.

Read more about Conditional Formatting here:

https://brainly.com/question/30652094

#SPJ4

How much would it cost to get the screen replaced on a Moto G7?

Answers

If you know enough about tech you can buy a replacement screen online for like $40.00 and do it yourself or might be around like $100 to get it fixed, depends on the place you go too.

CALCULATE THE MECHANICAL ADVANTAGE (M.A.).

DATA: R= 85 Kg; a= b/3; L= 8 m

The answer has 2 decimals.

Answers

The mechanical advantage (M.A.) of the lever system is calculated to be approximately 0.33.

To calculate the mechanical advantage (M.A.) of the lever system,

Given that the effort arm (a) is equal to one-third of the distance (b), we can express it as: a = b/3.The total length of the lever is 8 meters, so the resistance arm (b) can be calculated as: b = 8 - a.Substitute the value of a from step 1 into the equation from step 2: b = 8 - (b/3).Solve the equation for b: multiply both sides by 3 to eliminate the fraction and simplify: 3b = 24 - b.Combine like terms: 4b = 24.Solve for b: divide both sides by 4: b = 6.Now that we know the value of b, we can calculate the mechanical advantage using the formula: M.A. = a/b.Substitute the values of a = b/3 and b = 6 into the formula: M.A. = (6/3) / 6.Simplify: M.A. = 2/6 = 1/3 = 0.33 (rounded to two decimal places).

Therefore, the mechanical advantage (M.A.) of the lever system is approximately 0.33.
For more such question on system
https://brainly.com/question/28551792

#SPJ8

The complete question may be like:

A lever system consists of a resistance (R) of 85 kg, an effort arm (a) equal to one-third of the distance (b), and a total length (L) of 8 meters. Calculate the mechanical advantage (M.A.) of the lever system, rounding the answer to two decimal places.




Which type of operating system is best for a personal computer?

Answers

The answer is MS-Windows
windows is the answer! hope this helped

When is it most appropriate to send an automatic reply? Check all that apply.

when you are at the office and available during normal hours
when you are out of the office and want to let all senders know
when you are on a lunch break and want to let all senders know
when you are going on vacation and want to let all senders know
when you only want to respond to senders within the organization
when you only want to respond to senders outside the organization

Answers

Answer:

2, 4, 5, 6 are correct

Explanation:

1 and 3 are wrong on edg

Answer:

2, 4, 5, 6

Explanation:

Took the test, I hope this helps! :)

if you are entering a cell address in to excel for cell f26 and you want to copy the formula that contains this address and have the row and the column stay locked, which of the follow is correct?

Answers

if you are entering a cell address in to excel for cell f26 and you want to copy the formula that contains this address and have the row and the column stay locked and it is Option 2.  F26 .

What is the cell address?

A reference is known to be a term that is used for a cell's address. It is known to be that which tends to identifies a cell or scope  of cells trough the use of  the column letter as well as row number of the cell(s).

Note that for a person to enter a cell address into a formula in Excel, one must:

Make use of cell references in a formulaSelect  the cell in for you want to input the formula.In the formula bar. , input = (equal sign).Then select the cell that has the value you want or type its cell reference and click.

Therefore, if you are entering a cell address in to excel for cell f26 and you want to copy the formula that contains this address and have the row and the column stay locked and it is Option 2.  F26 .

learn more about cell address from

https://brainly.com/question/11683350

#SPJ1

See full question below

Listen If you are entering a cell address in to Excel for cell F26 and you want to copy the formula that contains this address and NOT have the row and the column stay locked, Which of the follow is correct? $F$26 F26 OF$26 O$F26

which of the following are the two main components of a systems design?

Answers

The two main components of a systems design are hardware and software.

Systems design involves the process of defining and specifying the architecture, components, and functionality of a system. It encompasses both hardware and software components.

1. Hardware: Hardware refers to the physical components of a system, including computer devices, peripherals, servers, storage devices, and network infrastructure.

It involves selecting and configuring the appropriate hardware components that meet the system's requirements and support its intended functionality. Hardware considerations include factors such as processing power, memory, storage capacity, connectivity, and scalability.

2. Software: Software represents the set of programs, applications, and operating systems that run on the hardware infrastructure. It includes both system software, such as the operating system, drivers, and utilities, and application software, which serves specific purposes and provides desired functionalities.

Software design involves defining the software architecture, modules, interfaces, algorithms, and user interfaces to ensure the system's smooth operation and meet user requirements.

Together, hardware and software form the foundation of a system design. They work in tandem to enable the system to perform its intended functions, process data, and deliver desired outcomes to users. Proper integration and alignment of hardware and software components are essential for an effective and efficient system design.

learn more about modules here:

https://brainly.com/question/30187599

#SPJ11

you need to find all files in the /home/gshant directory that are larger than 300k. you change your directory to /home/gshant. what would you enter at the command prompt to find these files?

Answers

You can search for a file or directory on your file system with the locate command. Matches, which can be files, directories, symbolic links, system devices, etc., can be found and immediately processed within the same command by using the -exec flag (find -exec).

What does locate command mean?A UNIX command line tool for traversing a file hierarchy is the find command. It can be used to look for files and folders and then operate on them in the future. It allows for searching by name, creation date, modification date, owner, and permissions for files and folders.Using the criteria you specify, the find command searches and locates the list of files and directories for files that match the inputs. Use the find command to locate files according to a number of criteria, including permissions, users, groups, file kinds, dates, and sizes.You can search for a file or directory on your file system with the locate command. Matches, which can be files, directories, symbolic links, system devices, etc., can be found and immediately processed within the same command by using the -exec flag (find -exec).

To learn more about UNIX command line tool refer to:

https://brainly.com/question/9362230

#SPJ4

The open source movement makes _____ available to everyone in an effort to continue to build and improve the functionality of open source software.

Answers

Answer: the source code

Explanation:

For this assignment, you will select a digital media career that you would be interested in pursuing. You will need to do some research to identify the right career for you. Next, you will research and discover what kind of training you will need to land your dream job. Finally, you will find available jobs in your career and select a job that you would want. After doing some research and some thinking, you will:

Select a career that is right for you. Write at least 150 words describing the career and why you believe it would be a good fit for you. Keep in mind your interests and talents.
Research and learn about what training the career requires. After you research, write at least 150 words describing the training. You can include what types of course you would take. How long the training program is, and how much it might cost you.
Finally, you will find a job! Research available jobs in your career and select a job you would want. Provide a copy of the job posting. You can snapshot this, copy and paste it, or copy it word for word. Make sure you include where you found the job posted. You will include at least 75 words on why you selected this particular position. Some helpful sites for job hunting are Indeed, Dice, Career Builder, and Monster.

Answers

A digital media career involves using technology to create and distribute various forms of digital content, such as video, audio, graphics, and multimedia. This can include roles such as graphic designers, web developers, social media specialists, digital marketers, and video producers.

How long the training program is, and how much it might cost you.

To land a career in digital media, you will typically need a combination of technical skills and creativity, as well as a strong understanding of digital media platforms and technologies. Depending on the specific career path you choose, you may need to have skills in areas such as graphic design, web development, video editing, or social media management.

Training for a digital media career can vary depending on the specific path you choose, but often involves completing a degree or certificate program in a related field such as digital media, graphic design, or marketing. These programs can range in length from a few months to several years, and can cost anywhere from a few thousand dollars to tens of thousands of dollars.

Job opportunities in digital media can be found on job search sites such as Indeed, Dice, Career Builder, and Monster. One example of a job posting for a digital media position is:

Position: Social Media Specialist

Company: XYZ Digital Agency

Location: New York, NY

Job Type: Full-time

Responsibilities:

Develop and execute social media strategies for client accounts

Create engaging social media content, including graphics and video

Monitor social media channels for trends and insights

Analyze social media metrics and adjust strategies as needed

Why I selected this particular position:

I am interested in pursuing a career in social media management, and this position seems like a good fit for my skills and interests. I am drawn to the opportunity to create engaging content and develop strategies to help clients achieve their social media goals. Additionally, the location and job type align with my preferences.

Read more on digital media career here https://brainly.com/question/29363025

#SPJ1

The following are examples of common workplace injury except O Falls
O Strains
O Following instructions
O Electrical accident

Answers

Answer:

O Following instructions

Explanation:

Upgrading the______ usually speeds up the computer, while adding a(n) ______ will increase the system’s storage capacity. Additional ______ can improve the sound or video quality.

Answers

Upgrading the RAM usually speeds up the computer, while adding a(n) hard drive will increase the system's storage capacity. Additional graphics card can improve the sound or video quality.

What is RAM?

Random-access memory (RAM) is a type of computer memory that may be read and modified in any sequence, and it is commonly used to store working data and machine code.

RAM is an abbreviation for random-access memory, but what exactly does it mean? Your computer RAM is essentially short-term memory where data is stored when needed by the CPU. This is not to be mistaken with long-term data stored on your hard disk, which remains even after your computer has been switched off.

Learn more about RAM:
https://brainly.com/question/13186587
#SPJ1

Katie is a professional photographer. For a wedding season shoot, she chose an outdoor location to shoot her models wearing different kinds of
wedding gowns. She used natural lighting, and she kept the focus on the models with a blurry background. Which kind of focusing technique did
Katie use?

A- rack focus
B- silhouette focus
C- follow focus
D- selective focus

Answers

Answer:

D- selective focus

Explanation:

In photography the phrase 'selective focus' introduces a procedure where the photographer selectively concentrates on the subject of an illustration, basically neglecting all other characters of the scene.  The contrast of the intense subject toward the delicate image background formulates powerful, meditative images.

Answer:

Selective focus

Explanation:

can direct the viewers' attention to a subjectt by focusing on the subject and burring the background

use of concave mirrors​

Answers

Explanation:

concave lens use for shaving mirrors and satellite

Write a Java program which declares and populates an array with some values (at least 5 values). Then it should call a method passing it the array. The method should modify the array values using a loop. Lastly, after the program calls the method, it should display the modified array contents to the console.

Answers

Answer:

CODE IN JAVA :

import java.util.*;

public class Main

{

public static void modifyArray(int[] arr, int n){

for(int i = 0; i < n; i++){

arr[i] = -1; // each value is modified to -1

}

}

public static void main(String[] args) {

int n;

System.out.print("Enter size of array(atleast 5): ");

Scanner sc = new Scanner(System.in);

n = sc.nextInt();

int array[] = new int[n]; // array with size n declared

// populating the array

System.out.print("Enter array elements: ");

for(int i = 0; i < n; i++){

array[i] = sc.nextInt();

}

// modifying array via a function

modifyArray(array, n);

// printing array values after modifiction

System.out.print("Array after modification: ");

for(int i = 0; i < n; i++){

System.out.print(array[i] + " "); // space separated

}

}

}

Explanation:

For the CART model, if my three terminal node's deviation are
100,200,300. So can I know the deviation of the estimated model? If
yes, what's the value of deviation of the estimated model.

Answers

Yes, you can calculate the deviation of the estimated model for the CART model if the deviation of the three terminal nodes are 100, 200, and 300.

CART stands for Classification and Regression Trees and it is a machine learning technique used for classification and regression analysis of complex data by creating decision trees.

Decision trees are constructed by splitting a dataset into smaller subsets and repeating the process recursively until a termination condition is met

1:Deviation = 100Mean of the node = x1Standard deviation of the node = σ1Therefore,100 = ∑(xi - x1)² / n1where ∑(xi - x1)² is the sum of the squared deviations of the data points from the mean of the node and n1 is the number of data points in the node.

2:Deviation = 200Mean of the node = x2Standard deviation of the node = σ2100 = ∑(xi - x2)² / n2For terminal node

3:Deviation = 300Mean of the node = x3Standard deviation of the node = σ3100 = ∑(xi - x3)² / n3

Now, we can calculate the deviation of the estimated model as follows :d = (n1σ1² + n2σ2² + n3σ3²) / (n1 + n2 + n3)Substituting the values of n1, n2, n3, σ1, σ2, σ3, we get :d = (1(100²) + 1(200²) + 1(300²)) / (1 + 1 + 1)d = 166.67

Therefore, the deviation of the estimated model is 166.67.

To know more Deviation  visit:

brainly.com/question/31835352

#SPJ11

this attribute specifies a css file's relationship with the html document

Answers

The attribute that specifies a CSS file's relationship with an HTML document is the "rel" attribute. This attribute is used to define the relationship between the HTML document and the linked resource, such as a CSS file.


In the context of CSS, the "rel" attribute is used to define the type of relationship between the HTML document and the CSS file. Specifically, the value of the "rel" attribute is set to "stylesheet" to indicate that the linked resource is a CSS file.The "rel" attribute is typically used in conjunction with the "href" attribute, which specifies the location of the CSS file. For example, the following code links an external CSS file to an HTML document:
This code specifies that the linked resource (styles.css) is a stylesheet that is related to the HTML document using the "rel" attribute. The "href" attribute specifies the location of the CSS file.In summary, the "rel" attribute is used to specify the relationship between an HTML document and a linked resource, such as a CSS file. In the context of CSS, the "rel" attribute is set to "stylesheet" to indicate that the linked resource is a CSS file.

Learn more about CSS here

https://brainly.com/question/28544873

#SPJ11

Write a program noonsnooze.java that takes an integer command-line argument snooze and prints the time of day (using a 12-hour clock) that is snooze minutes after 12:00pm (noon).

Answers

A program noonsnooze.java that takes an integer command-line argument snooze and prints the time of day (using a 12-hour clock) that is snooze minutes after 12:00pm (noon) is given below:

The Code

public class NoonSnooze

{

public static void main(String[] args)

{

 int snooze = Integer.parseInt(args[0]);

 int hour = 12 + (snooze / 60);

 int minutes = 00 + snooze % 60;

 

 

 String ampm;

 if(hour%24 < 12) ampm="pm";

 else    ampm="am";

 

 hour=hour%12;

 if (hour==00) hour=12;

 

 String time = hour + ":" + minutes + " " +  ampm;

 System.out.println(time);

 

}

}

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

Some fashion designers use this type of technology to produce clothing.

Select one:

a. 3-D printing

b. dot matrix printing

c. color printing

d. inkjet printing

Answers

Answer:

The answer is A. 3-D printing.

Explanation:

As with other industries, 3D printing in fashion offers clothing manufacturers the chance to produce prototypes and final products in a way that saves time, money and manpower. 3D printing in the world of fashion is still very much in the primary stages, but it's certainly something to watch.

Risks for standing up for the one who is being bullied

Answers

You, in turn, might end up getting hurt or bullied.

why is it important to put specific conditionals first?

Answers

Answer:

i dunno

Explanation:

Answer:

Explanation:

First conditional is used to talk about actions/events in the future which are likely to happen or have a real possibility of happening. If it rains tomorrow, I'll stay at home.

which functions are performed by server-side code??​

Answers

Answer:

The answer is explained below

Explanation:

Server side code is a code built using the .NET framework so as to communicate with databases which are permanent. Server side code is used to store and retrieve data on databases, processing data and sending requested data to clients.

This type of code is used mostly for web applications inn which the code is being run on the server providing a customized interface for users.

Other Questions
what are the three crisis levels in which bodley feels the environmental crisis are taking place All of the following climate regions are labeled on the map above exceptA humid subtropicalB. tropical wetC. highlandD. aridPlease select the best answer from the choices providedAB WILL MARK BRAINLIEST Read each title carefully, then select a likely purpose for reading that text. Beloved, a novel by Toni Morrison: Hole in My Life, a memoir by Jack Gantos: Team of Rivals: The Political Genius of Abraham Lincoln, a history by Doris Kearns Goodwin: Herb Gardening for Beginners: How to Grow Fresh Herbs at Home, Including over 50 Varieties, Recipes and Crafts, a guide by Janet Williams: You have been called to a residence of a diabetic patient who is confused. A family member states she could not reach the patient by telephone, so she came over and found the patient awake but confused. The patient can remember his name and address, but cannot remember the day or year. He refuses to go to the hospital, but consents to an assessment. Of the following physical exam findings, which one is MOST concerning?A) Blood glucose level of 77 mg/dLB) Bruise to the left templeC) Heart rate of 62 beats per minuteD) SpO2 at 96 percent A 2000 kg car skids to a halt on a wet road where mk= 0.70. How fast was the car traveling if it leaves 75m long skid marks? If I lose 20 cents an hour, and I make 10. 50 an hour. How much money do I lose every 10 dollars?This is the simplest way I could figure out how to put it, sorry A) Identify ONE aspect of the status of empires in the region that might have influenced Wellss conclusion that the Mongols' conquests were without parallel What term describes the first time moreAmericans lived in cities than farms,which occurred in 1920? In this phase of the project, you no longer want to hard-code the room descriptions, as done in Part 1 of the project via the variables room1, room2, room3,. , room7. Instead, the descriptions of the rooms will be stored in a file called ProjectData. Txt. Start by downloading this file here and storing it on your computer in the same directory/folder as your program. Examine the file. First, notice that each line in the file contains a series of items separated by commas. Each item is either a string or the word "None". The first seven items correspond to the seven items you saw previously in Project 1: the name of the room, followed by the room you would reach by traveling each of the directions from the current room, in the same order as they appeared in Project 1. Then notice that some lines have more than seven items. Any additional items in the l What does the phrase I began to nod once more mean?1.) started falling asleep2.) started looking down3.) started understanding4.) started shaking her headIts between 3 and 4 I just cant choose which one it is ?? Help please What is the answer for 6(5x-3) opposite of -1oposite of 0the opposite of the opposite of -7 can you help me with my work If an electronics manufacturer were to acquire a chain of retail electronic stores to sell its products, this would be an example of a ________ merger. In which of these does convection only occur in? gases fluids liquids solids you want to order posters to advertise your band. a company charges $109.95 for the first 100 posters and $65 for each additional 100 posters. a. write the equation where $y$ represents the total cost (in dollars) as a function of $x$ , the number (in hundreds) of posters ordered. A market penetration strategy involves seeking growth in current markets with current products or services. True False Most organizations find that assessing their is easier than assessing their strengths; weaknesses o weaknesses; strengths O opportunities; threats threats: opportunities Alternative solutions range from the known and well defined to the untried and ambiguous. True False The application of knowledge management has three natural targets: an organization's teams, customers, and workforce True False If gloria received a 10 percent raise and is now making $25300a year, what was her salary before the raise? Round to the nearest dollar if necessary Osprey Corporation manufactures wool socks. The following information is related to the month of July 2020. Units Direct Materials Work-in-process inventory, July 1 200 $40,000 Started during the month 400 Completed during the month 400 Work-in-process inventory, July 31 200 Costs added during the month $720,000 Beginning work-in-process inventory was 40% complete for direct materials. Ending work-in-process inventory was 75% complete for direct materials. What were the equivalent units for direct materials for the month using the FIFO method 1. Give five reasons research objectives must be established before customer research is conducted. 2. Why are both qualitative and quantitative research methods needed in a service marketing research program?