a company no longer has to keep up with technological advances. high levels of and technology can be brought onto a project by using contracted services.

Answers

Answer 1

A company no longer has to keep up with technological advances. high levels of technology can be brought onto a project by using contracted services. Instead, it can focus on developing its core competencies and hire firms with the know-how to work on relevant segments of the project.

What is computer technology?
Technology is all designs, drawings, processes (including design, manufacturing, test, and maintenance procedures), specifications, software technology (other than that which is described within the meaning of the term "Software" defined elsewhere herein), printed circuit board artwork, integrated circuit masks, test equipment, tools, fixtures, documentation, training materials, and information, in whatever form, related to, useful, utilizable, or necessary in the design, manufacturing, testing, and maintenance of computers are considered to be computer technology.

To learn more about computer technology, use the link given
https://brainly.com/question/27960093
#SPJ4


Related Questions

what should you do if you want word to apply a coordinated set of styles to ensure there is consistent formatting across the entire document?

Answers

Answer:

I'm pretty sure you can right click on a style and add it to a preset, if that's what you're asking.

Explanation:

Pie charts are best used for

Pie charts are best used for

Answers

Answer:B

Explanation:Showing parts of a whole.

Describe two key features of project management software that Hugh could use to make sure the project is complete before the deadline.

Answers

Two key features of project management software that Hugh could use to ensure project completion before the deadline are -  

Task Scheduling and Tracking Gantt Chart Visualization

How  is this so?

1. Task Scheduling and Tracking  -  Project management software allows Hugh to schedule tasks, assign them to team members, and track their progress in real-time.

This feature helps him stay on top of task deadlines, identify bottlenecks, and take necessary actions to ensure timely completion of all project tasks.

2. Gantt Chart Visualization -   Gantt charts provide a visual representation of the project timeline, showing the duration of each task, dependencies, and critical path.

Hugh can use this feature to identify any potential delays or overlapping tasks, allowing him to make adjustments and allocate resources effectively to meet the project deadline.

Learn more about project management software at:

https://brainly.com/question/29646049

#SPJ1

An idea concerning what will happen in the future. (Crossword)

Answers

Answer:

Expectation

Explanation:

Expectation is  an idea concerning what will happen in the future

if someone downloads files from my business shared drive, can i see if they upload them to their personal drive?

Answers

If someone downloads files from your business shared drive, it's not possible for you to directly see if they upload those files to their personal drive. However, you can monitor and manage access to the shared drive and track activity within the business shared drive itself.

When someone downloads files from a business shared drive, it's possible for them to upload those files to their personal drive without being detected. However, to prevent unauthorized access and file sharing, it's crucial to have strict access controls in place for the shared drive. This involves setting up user permissions and roles to restrict access to sensitive files and folders. Additionally, implementing a robust data management policy can help identify and mitigate potential risks to your data. Regularly monitoring and tracking activity within the shared drive can provide insights into who is accessing what files and help identify any suspicious behavior. Overall, a combination of access controls and data management practices can help ensure the security of your shared drive and prevent unauthorized file sharing.

Learn more about  personal drive here;

https://brainly.com/question/2279578

#SPJ11

3. does the rfid tag have or not have a pre-programmed number that would be rendered redundant by unique library item number?

Answers

RFID tag  should not not have a pre-programmed number that would be rendered redundant by unique library item number.

Is Reprogramming RFID tags ever  possible?

The RFID chip's data is pre-programmed (pre-encoded) when it is manufactured, but it is simple to reprogram the chip. Before reprogramming an RFID tag, there are a few factors to take into account, including character restrictions, memory bank information, and memory format (how the data is displayed).

But the pre-programmed number on an RFID tag cannot be the same as a different library item number, making it redundant. RFID tags must include anti-collision features that enable for simultaneous reading of numerous tags.

Learn more about RFID tag from

https://brainly.com/question/3429081
#SPJ1

Post-production is the phase where all the film, audio, and other visuals come together to create the completed Input Answer .

Answers

Post-production is the conclusive procedure of film and video production whereby all the uncooked footage, audio recordings, as well as other visible components are amassed and altered together to construct the concluding product.

What is found in this process?

Included in this process comes activities such as color grading, jingling combinations, unique effects, adding tunes and other sonic touches.

The aim of post-production is to improve and accentuate the shots that were seized during production, attaining an exquisite, uniformity final item which holds the creative conception of the director and producers.

This point is crucial to the prosperity of the closing project, since it can unmistakably sway the viewers' full viewing knowledge.

Read more about Post-production here:

https://brainly.com/question/26528849

#SPJ1

Help me please with this

Help me please with this

Answers

Answer:

Explanation:

QUestion 2 is A

QUestion 1 is A i think

range paramters - for loop
question in picture

range paramters - for loopquestion in picture

Answers

Answer:

start,stop,step_size

Explanation:

Starting at 5 to for loop will count backward by 1 (hence the step_size being -1) until it reaches 0 (stop).

Answer each of the following questions.
Which of the following describes a hot spot?
Check all of the boxes that apply.
an unsecured wireless network
inherently vulnerable to hackers
private Wi-Fi networks available at airports,
hotels, and restaurants
susceptible to third-party viewing
DONE

Answers

Answer:

1)

a. an unsecured wireless network

b. inherently vulnerable to hackers

d. susceptible to third-party viewing

2)

Check All Boxes

Explanation:

The hotspot can be described by:-

a. An unsecured wireless network.

b. inherently vulnerable to hackers.

d. Susceptible to third-party viewing.

What is a hotspot?

A hotspot is a physical site where users can connect to a wireless local area network (WLAN) with a router connected to an Internet service provider to access the Internet, generally using Wi-Fi.

The internet is the network that set up communication between the different computers of the world by using internet protocols to share data in the form of documents, audio, and videos.

A computer network that uses wireless data links between network nodes is referred to as a wireless network. Homes, telecommunications networks, and commercial installations can all connect via wireless networking.

Therefore, an unsecured wireless network., inherently vulnerable to hackers, and susceptible to third-party viewing describe the hotspot.

To know more about hotspots follow

https://brainly.com/question/7581402

#SPJ2

E-commerce refers to the use of any networking technologies to transact business
True
False

Answers

E-commerce does not necessarily refer to using networking technologies to do business, which is a false statement.

Which statement best describes e-commerce?

E-commerce is described as the exchange of money and data to complete sales while purchasing or selling products or services online. It is often referred to as online commerce or electronic commerce.

An e-commerce easy response is what?

E-commerce refers to the exchange of products and services over the internet. On the information superhighway, your bustling city center or physical store is being transformed into zeros and ones. Ecommerce, usually referred to as electronic commerce or internet commerce, is the term for the online purchase and sale of products and services as well as the exchange of financial instruments.

To know more about networking technologies visit:-

https://brainly.com/question/7499316

#SPJ4

____ is a family of ieee standards that define a portable operating system interface to enhance the portability of programs from one operating system to another.

Answers

The family of IEEE standards that define a portable operating system interface to enhance the portability of programs from one operating system to another is known as POSIX.

To provide a Long Explanation, POSIX stands for Portable Operating System Interface for Unix and is a set of standards that defines an interface for software compatibility with Unix and Unix-like operating systems. The standardization of this interface allows software developers to write programs that can be easily ported from one system to another, thereby improving software interoperability across different platforms.

Additionally, POSIX provides a standardized set of APIs, utilities, and commands that enable software developers to write portable, efficient, and reliable applications.

To know more about operating system visit:-

https://brainly.com/question/6689423

#SPJ11

stem will help you learn to use ____skills to solve everyday life problems.

Answers

Answer:

science, technology, engineering,and math

Answer:

Science, Technology, Engineering, and Math

Your company emphasizes the important of conserving (not wasting)
resources. How can you support that value when you print an 8-page report
you were asked to bring to your department's monthly meeting?
A. Use the Save option to choose a format readers can open.
B. Post the report online before printing it.
C. Use the Print option to create extra copies.
D. Use the Print option for two-sided printing.
SUBMIT

Answers

Answer:

D. Use the Print option for two-sided printing.

Explanation:

ape x

Answer:

D

Explanation:

A system that began as a set of programs undertaken to increase the efficiency of the distribution channel that transfers products from a producer's facilities to the end user is known as the _____.

Answers

A system that began as a set of programs undertaken to increase the efficiency of the distribution channel that transfers products from a producer's facilities to the end user is known as the supply chain management system.

Supply chain management (SCM) refers to the coordination and management of various activities involved in the production, distribution, and delivery of goods or services from suppliers to end customers. It includes processes such as procurement, production, inventory management, logistics, transportation, and customer service.

The mentioned system, which aims to increase efficiency in the distribution channel, aligns with the objectives of supply chain management. By utilizing technology and implementing software programs, companies can optimize their supply chain operations, streamline processes, minimize costs, enhance visibility, and improve overall customer satisfaction. Therefore, the term that best describes this system is the supply chain management system.

To know more about management click the link below:

brainly.com/question/30998101

#SPJ11

What do you understand by memory word?​

Answers

Answer:

Explanation:

a 5-bit memory in which the individual memory bits are content5_4 , content5_3 , content5_2 , content5_1 , and content5_0

PC Shopping Network may upgrade its modem pool. It last upgraded 2 years ago, when it spent $115 million on equipment with an assumed life of 5 years and an assumed salvage value of $15 million for tax purposes. The firm uses straight-line depreciation. The old equipment can be sold today for $80 million. A new modem pool can be installed today for $150 million. This will have a 3 -year life, and will be depreciated to zero using straight-line depreciation. The new equipment will enable the firm to increase sales by $25 million per year and decrease operating costs by $10 million per year. At the end of 3 years, the new equipment will be worthless. Assume the firm's tax rate is 35 percent and the discount rate for projects of this sort is 12 percent. What are the Free Cash Flows, the NPV and IRR of the replacement project? Note: There is double jeopardy on this problem. If you miss a free cash flow, you will miss the NPV and the IRR. (6 points) FCF 0

= FCF 1

= FCF 2

= FCF 3

= NPV= IRR=

Answers

The replacement project involves upgrading the modem pool of PC Shopping Network. The old equipment was purchased 2 years ago for $115 million, has a 5-year assumed life, and a salvage value of $15 million.

The old equipment can be sold today for $80 million. The new equipment can be installed for $150 million and has a 3-year life. The new equipment is expected to increase sales by $25 million per year and decrease operating costs by $10 million per year. The tax rate is 35% and the discount rate is 12%. We need to calculate the Free Cash Flows (FCFs), the Net Present Value (NPV), and the Internal Rate of Return (IRR) of the replacement project.

To calculate the FCFs, we need to determine the cash inflows and outflows associated with the project. In this case, the cash inflows are the increase in sales ($25 million) and the decrease in operating costs ($10 million) each year. The cash outflows include the initial investment in the new equipment ($150 million) and the tax savings resulting from depreciation expense. By subtracting the cash outflows from the cash inflows for each year, we can calculate the FCFs.
The NPV of the project is the present value of the FCFs, discounted at the given rate of 12%. By summing up the present values of the FCFs, we can calculate the NPV. If the NPV is positive, the project is considered financially viable.
The IRR is the discount rate at which the NPV of the project becomes zero. It represents the project's internal rate of return or the rate of return that the project is expected to generate. The IRR is calculated iteratively until the NPV reaches zero.
To obtain the specific values of FCF0, FCF1, FCF2, FCF3, NPV, and IRR, the calculations need to be performed based on the given information and formulas for each year.

learn more about salvage value here

https://brainly.com/question/28387066



#SPJ11

Once the reaction time experiment in your MakeCode micro:bit program is
complete, what should you do next?
A. Click the "Export data" button to save a file to your computer.
B. Review the tutorial video to make sure you've completed all the
steps correctly.
C. Add the call reaction Test block to your on logo pressed block.
D. Set up your events and create a function that contains the entire
reaction time experiment.

Once the reaction time experiment in your MakeCode micro:bit program iscomplete, what should you do next?A.

Answers

Once the reaction time experiment in your MakeCode micro:bit program is complete, Review the tutorial video to make sure you've completed all the steps correctly.

What is reaction time experiment?

A  reaction time experiment is known to be one that has different set of neural processes. This experiment is known to be one that has been set up to measure or look into the response time for something that one can see.

Note that when the reaction time experiment in your MakeCode micro:bit program is complete, it is better to go over the tutorial video to be sure you that you have completed all the steps correctly.

learn more about reaction time from

https://brainly.com/question/6167212

charts are useful for multiple select question. providing detailed background information. presenting complex data in a simple format. communicating numerical data. presenting a memorable visual image.

Answers

Yes, bar charts are useful for multiple select questions, providing detailed background information, presenting complex data in a simple format, communicating numerical data, presenting a memorable visual image, and providing explanations.

What is bar charts ?

A bar chart is a graphical representation of data where the data is represented by bars with different heights. It is used to compare values between different categories and to illustrate the differences between them. Bar charts can be used to represent data of different types, such as numerical data, categorical data, or a combination of both. Bar charts are a great way of visually displaying data and can be used to compare different groups or to show changes over time.

Bar charts are a great tool to visualize data, making it easier to understand and analyze. They are often used to compare different categories or to track changes over time.

To learn more about bar charts
https://brainly.com/question/14783468
#SPJ4

HELP ASAP WILL GIVE BRAINLY Question 19 Multiple Choice Worth 5 points) (05 03 MC) Network technologies specialist Hannah has been asked allow several machines on different subnets to communicate with each other using broadcasts What does she need to configure? RIP version 1 using Internet Protocol Version 4 (TCP/IPv4) O RIP version 1 using Internet Protocol Version 6 (TCP/IPV6) RIP Version 2 using internet Protocol Version 4 (TCP/IPv4) RIP Version 2 using internet Protocol Version 5 (TCP/IPV6)​

Answers

Network technologies specialist Hannah would need to configure: C. RIP version 2 using Internet Protocol Version 4 (TCP/IPv4).

What is RIP?

RIP is an acronym for Routing Information Protocol and it can be defined as an intradomain routing protocol which is typically designed and developed based on distance vector routing.

The types of RIP.

In Computer networking, there are two main types of Routing Information Protocol (RIP) and these include:

RIP version 1.RIP version 2.

RIP version 2 are generally designed and developed to include subnet masks unlike RIP version 1. Thus, Hannah would need to configure RIP version 2 using Internet Protocol Version 4 (TCP/IPv4) allow several machines on different subnets to communicate with each other using broadcasts.

Read more on routing protocol here: https://brainly.com/question/24812743

You are the IT Director for Stormwind training studios. Your company has decided to start using Microsoft Intune for all of their software deployments. You want to set up a notification system so that you see all alerts and your IT Manager only gets notified for Critical alerts. How do you accomplish this

Answers

Answer:

Well, if the IT Manager gets only critical alerts on a phone, then the IT Manager has to go to settings and make sure to have all alerts on.  

Explanation:

The IT Manager, probably has his notifications, critical alerts, on only. So the IT Manager should have his notifications to ALL. Where he will be able to see all of the alerts.

After establishing a long term goal and understanding what it entails, the best next step is

Answers

Answer:

plan numerous intermediate short-term goals.

Explanation:

Assignment 4: Divisible by Three
ProjectSTEM
hello! I have no clue at all how to do this and need help.

Assignment 4: Divisible by Three ProjectSTEMhello! I have no clue at all how to do this and need help.
Assignment 4: Divisible by Three ProjectSTEMhello! I have no clue at all how to do this and need help.

Answers

For iterating through a series, use a for loop. This functions more like an iterator method seen in other object-oriented programming languages and is less like the for keyword found in other programming languages.

How to write program in loop ?

A high-level, all-purpose programming language is Python. Code readability is prioritised in its design philosophy, which makes heavy use of indentation. Python uses garbage collection and has dynamic typing. It supports a variety of programming paradigms, such as functional, object-oriented, and structured programming.

A while loop in Python is used to repeatedly run a block of statements up until a specified condition is met. And the line in the programme that follows the loop is run when the condition changes to false.

We can write the code in a simple way like this below :

n = int(input("How many numbers do you need to check? "))

divisible  = 0

notdivisible  = 0

for x in range(n):

 num = int(input("Enter number: "))

 if num % 3== 0:

     divisible += 1

     print(str(num)+" is divisible  by 3")

 else:

     notdivisible += 1

     print(str(num)+" is not divisible by 3")

print("You entered "+str(divisible )+" even number(s).")

print("You entered "+str(notdivisible )+" odd number(s).")

To learn more about Python refer :

https://brainly.com/question/26497128

#SPJ1

Answer:n = int(input("How many numbers do you need to check? "))

divisible  = 0

notdivisible  = 0

for x in range(n):

num = int(input("Enter number: "))

if num % 3== 0:

    divisible += 1

    print(str(num)+" is divisible  by 3.")

else:

    notdivisible += 1

    print(str(num)+" is not divisible by 3.")

print("You entered "+str(divisible )+" number(s) that are divisible by 3.")

print("You entered "+str(notdivisible )+" number(s) that are not divisible by 3.")

Explanation:

For that one that's I'm on python <3

what is this called?

what is this called?

Answers

Answer:

Fender Champion 40

Explanation:

....

..

To change the color of an entire page, apply a page color in the _____ tab.

Answers

Answer:

setting tab hope it helps

Explanation:

thanks bye

Answer: File tab

Explanation: I am referring to google docs. Hope I helped

According to HFSD Ch2, how many iterations of the planning game are required?
Select one:
a. One - take the average of the team's estimates
b. Two - need to narrow the spread before averaging
c. As many as required to remove as many assumptions possible.

Answers

C. As many as required to remove as many assumptions possible. The planning game is an iterative process, according to HFSD Ch2, and it entails several rounds of estimates and debate to arrive at a more precise estimate for the labour needed.

Answer c is the right one. As many as necessary to disprove all presumptions. The planning game is an iterative process that comprises several rounds of estimating and debate to arrive at a more precise estimate for the labour needed, according to HFSD Ch2 (Head First Software Development book, Chapter 2). Prior to beginning work, it is important to eliminate as many presumptions as you can and find any potential obstacles and fix them. As a result, the planning game needs as many iterations as necessary to get a more precise estimate and get rid of as many presumptions as feasible.

Learn more about game here:

https://brainly.com/question/3863314

#SPJ4

dan wants to implement reconnaissance countermeasures to help protect his dns service. which of the following actions should he take? answer limit the sharing of critical information in press releases, annual reports, product catalogs, or marketing materials. install patches against known vulnerabilities and clean up out-of-date zones, files, users, and groups. review company websites to see which type of sensitive information is being shared. implement policies that restrict the sharing of sensitive company information on employees' personal social media pages.

Answers

Dan can effectively protect his DNS service from reconnaissance attacks and maintain a secure environment.

Dan can implement reconnaissance countermeasures to help protect his DNS service by taking several actions. First, he should limit the sharing of critical information in press releases, annual reports, product catalogs, and marketing materials. This will prevent attackers from gathering valuable data for their attacks.

Second, Dan should install patches against known vulnerabilities and clean up out-of-date zones, files, users, and groups. This will reduce the potential attack surface and increase the security of the DNS service.

Third, he should review company websites to see which type of sensitive information is being shared. Identifying and removing unnecessary sensitive information will decrease the chances of a successful attack.

Lastly, Dan should implement policies that restrict the sharing of sensitive company information on employees' personal social media pages. This will further minimize the risk of unintentional disclosure of crucial information.

By taking these steps, Dan can effectively protect his DNS service from reconnaissance attacks and maintain a secure environment.

To Learn More About DNS

https://brainly.com/question/27960126

SPJ11

the it manager has tasked you with installing the new wireless lan controller (wlc). where should you install the controller?

Answers

In order for a WLC to be able to communicate with and manage the wireless access points, it needs be installed in the networking closet and linked to a switch.

What is WLC?

WLC stands for wireless LAN controller. It is defined as a part of the network that controls wireless network access points and enables wireless devices to connect to it. The network administrator uses a wireless LAN controller, or WLC, together with other devices to monitor and manage access points in bulk.

The data center, to which all of the network's wireless APs are directly or indirectly connected, typically houses the wireless LAN controller as a centralized device.

Thus, in order for a WLC to be able to communicate with and manage the wireless access points, it needs be installed in the networking closet and linked to a switch.

To learn more about WLC, refer to the link below;

https://brainly.com/question/13406128

#SPJ1

Using MATLAB, write a Newton's algorithm to solve f(x) = 0. Hence your algorithm should have the message:
(1) Please input your function f(x)
(2) Please input your starting point x = a
After solving, your algorithm should give the message:
"Your solution is = "
If your algorithm does not converge (no solution) write the message:
"No solution, please input another starting point".
Test your algorithm using a simple function f(x) that you know the answer

Answers

The following MATLAB algorithm implements Newton's method to solve the equation f(x) = 0. It prompts the user to input the function f(x) and the starting point x = a. After convergence, it displays the solution. If the algorithm does not converge, it displays a message indicating no solution.

% Newton's method algorithm

disp("Please input your function f(x):");

syms x

f = input('');

disp("Please input your starting point x = a:");

a = input('');

% Initialize variables

tolerance = 1e-6; % Convergence tolerance

maxIterations = 100; % Maximum number of iterations

% Evaluate the derivative of f(x)

df = diff(f, x);

% Newton's method iteration

for i = 1:maxIterations

   % Evaluate function and derivative at current point

   fx = subs(f, x, a);

   dfx = subs(df, x, a);    

   % Check for convergence

   if abs(fx) < tolerance

       disp("Your solution is = " + num2str(a));

       return;

   end    

   % Update the estimate using Newton's method

   a = a - fx/dfx;

end

% No convergence, solution not found

disp("No solution, please input another starting point.");

To test the algorithm, you need to provide a function f(x) for which you know the solution. For example, let's solve the equation x^2 - 4 = 0.

When prompted for the function, you should input: x^2 - 4

And when prompted for the starting point, you can input any value, such as 1. The algorithm will converge and display the solution, which should be 2.

Please note that the provided algorithm assumes the input function is valid and converges within the maximum number of iterations. Additional error handling and convergence checks can be implemented to enhance the algorithm's robustness.

Learn more about MATLAB here:

https://brainly.com/question/30763780

#SPJ11

Which statement correctly calls calcArea() with two int arguments?
Question options:
calcArea(4, 12);
public void calcArea(int w, int h);
calcArea(int w, int h);
calcArea( );

Answers

The radius value is passed to the calcArea() function, which subsequently returns the area. You must supply calcArea an argument in order to accomplish this ().

What does Mac's Fn key do?

While pressing a function key, press and hold the Function (Fn)/Globe key. For instance, hitting Fn and F12 (the speaker icon) simultaneously causes the F12 key to carry out its intended function rather than increasing the speaker level.

On a Mac, what does F4 do?

The F4 key on a Mac is typically used for system functions like launching the Launchpad app or adjusting the screen's brightness. In the "System Preferences" menu, you can discover a setting that allows you to use the F4 keyboard shortcut to play and pause audio in MAXQDA for Mac.

To know more about function visit:-

brainly.com/question/28939774

#SPJ1

Other Questions
a garden that is 5 feet by 6 feet has a walkway that is 2 feet wide around it. what is the amount of fencing needed to surround the walkway? If an asset is intended to be sold in the ordinary course of business and but it may not be immediately ready for sale, then it is considered to be ________. Which of the following techniques should you use when you are communicating with a patient who has autism? Exaggerate your lip movements. Speak normally and provide simple, one-step directions. Speak loudly into the patients ear. You and your partner should talk to the patient together At the time of her grandson's birth, a grandmother deposits $3000 in an account that pays 5% compounded monthly. What will be the value of the account at the child's twenty-first birthday, assuming that no other deposits or withdrawals are made during this period? The value of the a If u #0 and if u xv=uxw and u.v=u.w, then does v=w? Give reasons for your answer. Choose the correct answer below. O A. No, v #w. For example, uxv=uxw and u.v=Uw implies that u. (v-w) = 0 and ux (v-w)= 0. This implies that u is parallel to (v-w) and u is perpendicular with (v -w). So, u = - 1 or (v - w)= 0. O B. Yes, v #w. For example, u +v# - u + v, but u x(u + v) = u xu+uxy = 0 + w=w and ux(-u + v) = - uxu +uxy = 0 + w=w. O C. No, viw. For example, u +v* -u+v, and ux (u + v) = uxu +uxy = 0 + w=w and ux(-u + v) = -uxu +uxy = 0 + w = -w. O D. Yes, v = w. For example, uxy=uxw and u.v=u.w implies that u. (v-w) = 0 and ux (v -w) = 0. This implies that u is perpendicular to (v-w) and u is parallel to (v-w). So, u = 0 or (v-w)= 0. climbing trees gives her (1) captivity(2) happiness(3) exhausted (4) active 4/7 divided by 2 1/3 Find the value of 4a - 3for a = 4 Copper compounds are used in large amounts to control the growth of algae and other aquatic plants. copper interferes with photosynthesis in these organisms. what would be the most likely result of an accidental spill of these compounds in an aquatic environment? an anti-smoking campaign features former tobacco users who are visibly and audibly sick. which type of framing did this campaign use? Someone help and please make sure the answer right pls, pls help Im confused Charles Darwin didnt want to publish his ideas because he was afraid a out te reaction of the scientific community interactivity measures advertising effectiveness by counting visitor interactions with the target ad, including time spent viewing the ad, number of pages viewed, and number of repeat visits to the advertisement. group of answer choices false true Henry has a portfolio of $3,000 in Biocircle Inc and $7,000 in Woodlight IncExpected return for Biocirle Inc: 0.15Expected return for Woodlight Inc: 0.35Standard Deviation for Biocircle Inc: 0.20Standard Deviation for Woodlight Inc: 0.40Correlation is : 0.201) Identify the expected return, variance, and standard deviation of the following.2) How should Henry reallocate his portfolio to achieve a return of 30%? Explain Find the vertical and horizontal asymptotes of f(x)= x+1/x-1 Select the correct answer.Read these lines from Matthew Arnold's "Dover Beach":The sea is calm to-night.The tide is full, the moon lies fairUpon the straits;-on the French coast, the lightGleams and is gone; the cliffs of England stand,Glimmering and vast, out in the tranquil bay.What is the significance of the fact that the light flickers rather than stays constant?OA. It echoes the loss of faith that characterizes the poet's post-Romantic age.OB. It reflects the power of the ocean waves that constantly agitate the light.. It comments on how profoundly difficult it is to sustain a good marhage. PLSSS SOMEONE HELP ME I JUST NEED HELP PLEASEE!! IM OFFERING 40 PTS FOR THIS!! IM BEGGING YOU!!Match each description with its corresponding value for the system below:y = 4 x + 1 and y = -2 x + 7-2 -1 -7 -5 The y -intercept of the exponential function.The y -value of the solution in Quadrant I.The number of points of intersection.The y -intercept of the linear function. -13=m-7 how can i get my answer A debt covenantA. serves to give assurance to a creditor that the debtor will have the ability to pay interest and principal at maturity.B. serves to give assurance to the debtor that the interest rate is reasonable.C. allows the creditor to become an owner of the company if the covenant is violated.D. allows the debtor to forego any interest on the debt. BRAINLIEST IF U CAN ANSWER IN 5 MINUTESUse scientific notation to find the product of 7.13 10 ^-3 and 40. Include all of your calculations in your final answer.