Instead of defect detection, the focus of Software Inspection is on logical and conceptual problems

Answers

Answer 1

Software Inspection is a well-structured review method aimed at detecting logical and conceptual problems early in the software development process. Instead of defect detection, the focus of Software Inspection is on identifying issues in the early stages of development.

This means that the goal of Software Inspection is not to find and fix errors but to identify potential issues before they become major problems.Software Inspection is a process where a group of people, usually developers or testers, analyze the code to detect any problems that could cause trouble. This method is an excellent way to identify issues before they become major problems.

By inspecting the code, the team can identify problems with the design, implementation, and functionality of the code. Once the issues are identified, the team can work on fixing them to ensure the code is of high quality and works as expected.Software Inspection is a method that is widely used in software development.

It is a valuable tool for ensuring that the code is of high quality and works as expected. In conclusion, instead of defect detection, the focus of Software Inspection is on identifying logical and conceptual problems early in the software development process.

To know more about Software visit:

https://brainly.com/question/32393976

#SPJ11


Related Questions

what do you use to navigate through a file by moving the view up and down or side to side?
a. Scroll bar
b. Title bar
c. Zoom controls
d. The ruler

Answers

Answer:

a. Scroll bar

Explanation:

In which place does essential computing of computer takes place at?
option
1]microprocessor
2]ram
3]motherboard
4]none

Answers

3.Mother board controls everything

Answer:

123456789-0\(\lim_{n \to \infty} a_n fffff\)

Explanation:

1A) Which phase of the SDLC is primarily responsible for understanding the proposed project, ensuring that the project will suport business requirements, and build a solid foundationa for future development of the system?
Preliminary investigation
Systems analysis
Systems design
Systems resource planning
1B)
This development method was created by IBM and utilizes a group structure with heavy user involvement. For example, a project leader, top management, managers, users, IT personnel and a recorder.
RAD
JAD
SDLC
SCRUM
1C
If you were tasked with creating a schedule of events, with sufficient detail, you would most likely use this type of chart?
Gantt
PERT
WBS
System Task Chart
1D
What is the first step of the interview process?
Establish objectives for the interview
Develop interview questions
Prepare for the interview
Determine people to interview

Answers

1A) The phase of the SDLC that is primarily responsible for understanding the proposed project, ensuring that the project will support business requirements, and build a solid foundation for future development of the system is: Systems analysis.

1B) The development method created by IBM that utilizes a group structure with heavy user involvement is:

JAD (Joint Application Development).

1C) If you were tasked with creating a schedule of events with sufficient detail, you would most likely use this type of chart:

Gantt chart.

1D) The first step of the interview process is:

Establish objectives for the interview.

Business refers to the activities involved in producing, buying, selling, or exchanging goods or services to earn a profit. It encompasses various aspects of commercial, industrial, and entrepreneurial activities conducted by individuals, organizations, or corporations. Here are some key points about business: Purpose: The primary purpose of a business is to create value by fulfilling the needs and wants of customers through the production or provision of goods and services.

Learn more about business here:

https://brainly.com/question/15073510

#SPJ11

1. Write code that prints a greeting in the following format:
Hi, xxx!
where xxx is the name of a person stored in the variable name. Assume that the name variable has been initialized.
2.Write code that produces the following line of output:
Jenny yelled "Run, Forrest, Run!"

Answers

Here's the code to print a greeting using the name stored in the name variable:

The Program

name = "Alice"

print("Hi, " + name + "!")

This will output:

Hi, Alice!

Here's the code to produce the given line of output:

print('Jenny yelled "Run, Forrest, Run!"')

This will output:

Jenny yelled "Run, Forrest, Run!"

Read more about programs here:

https://brainly.com/question/30508371

#SPJ1

Make the smallest
nonzero number
possible, in binary,
with your
Flipply Do Pro.
What is the decimal
(Base 10) equivalent?

Answers

Answer:

Whole Numbers:

0000 0001 (Binary) --> 1 (Decimal)

Real Numbers:

0000 0001 (Binary) -->  0.00390635 (Decimal)

Explanation:

In general, the smallest nonzero number that can be displayed in binary that is a whole number is 1.  Consider that as you increase by 1 in the binary system starting from 0, you will have the following:

0000 0000 == 0

0000 0001 == 1 (Smallest nonzero)

0000 0010 == 2

0000 0011 == 3

... etc.

Notice the smallest value here is decimal 1.  With this in mind, you will need to "program" you Flippy Do Pro to display this value.  Alternatively, if you consider decimal numbers in binary with the Flippy Do Pro, you can have even smaller nonzero numbers.  Depending on where you decide to place the decimal, you can even have smaller nonzero values.

Let's assume that you say this is a fractional representation of binary on the Flippy Do Pro.  Then, you will say your decimal is infront of the display of the Flippy Do Pro, hence index 9 (which is not displayed).  From here, you will simply say the following:

0000 0000 == 0.0

0000 0001 == 0.00390635 (Smallest nonzero)

0000 0010 == 0.0078125

0000 0100 == 0.015625

... etc.

Note, in binary, as you move the value of 1 to the right of the decimal, you are doing (1 / 2^n), where n is the index value to the right of the decimal.

Hence, depending on if you are to consider just whole numbers or real numbers, the smallest value displayed can be different even though the number being displayed is still 0000 0001.

Cheers.

______________ refers to the practice of ordering extra inventory beyond expected demand to prevent stockouts while the ______________ refers to an inventory management technique where an incoming train unloads materials directly into outbound trucks.

Answers

Safety stock inventory management  refers to the practice of ordering extra inventory beyond expected demand to prevent stockouts.

What is Safety stock inventory?

Safety stock inventory management is known to be a kind of more or extra inventory that is said to have been ordered way above the expected demand.

Note that this technique is often used to stop or hinder any form of stockouts that is said to have been caused by incorrect forecasting or unforeseen events in customer demand.

Learn more about Safety stock inventory form

https://brainly.com/question/26954616

when was discord made

Answers

Discord now refers to May 13, 2015, as its official debut date because that was the day that actual use of the service by strangers began.

Although the initial Discord user's precise name is unknown, Vind was one of the very first users. The user and his pals decided to switch from TeamSpeak to Discord because they wanted something that provided a community in addition to a gaming platform. Thus, in 2015, Jason and Stan began to develop Discord. It was adored by people from all over the world. Discord made it simple to have actual conversations with friends that went beyond idle chatter. Friends were maintaining contact with the communities in which they lived.

Learn more about discord here-

https://brainly.com/question/21963991

#SPJ4

Which laptop has the larger non volatile storage capacity

Answers

There are many laptops available with different specifications and storage options. However, some of the laptops with larger non-volatile storage capacity include:

1. MacBook Pro (16-inch): This laptop offers storage options ranging from 512GB to 8TB.

2. Dell XPS 15: This laptop offers storage options ranging from 256GB to 2TB.

3. HP Spectre x360: This laptop offers storage options ranging from 256GB to 2TB.

4. ASUS ROG Zephyrus G14: This laptop offers storage options ranging from 512GB to 1TB.

5. Acer Aspire 5: This laptop offers storage options ranging from 256GB to 1TB.

It is important to note that the storage capacity of a laptop depends on the model and can vary.

how do i scan or check for computer virus?​

Answers

Answer:

what type of computer

Explanation:

Linux is a powerful and free OS®️
-True
-False

Answers

Answer:

TRUEE

Explanation:

It’s is true that Linux is powerful and free

Which mode specifier will open a file but not let you change the file or write to it?.

Answers

'r' is  mode specifier will open a file but not let you change the file or write to it.

What is mode specifier ?

An individual word value known as a mode specifier is used to specify a screen mode. This is how it is handled: It is presumed that a number in the range of 0 to 255 is a mode number. Otherwise, it is presumed to be a Sprite Mode if the bottom bit is set. Word (describing a RISC OS 3.5 or RISC OS 5 format sprite) (describing a RISC OS 3.5 or RISC OS 5 format sprite) 2

Which technique returns the contents of the file as a string?

In Java, reading material into a specified file is done using the readString() method of the File class. Value Returned The file's content, in String format, is returned by this method.

Learn more about mode specifier

brainly.com/question/16364860

#SPJ4

The project team identified the completion of the first module to be the first significant event. The completion of Module One is a _____.


requirement

risk

stakeholders

milestone

Answers

The completion of module one is a milestone

State 5 or more differences between an application and a website or webpage

Answers

The differences between an application and a website or webpage are:

Since a website is simply a collection of web pages, creating one is typically simple.

Because it has more security, a wider range of functionalities based on data processing, and different sorts of users than a website, a web application is more difficult to create.

What are the differences?

A webpage is a single web page with a specific URL, whereas a website is a collection of various webpages with information on various topics connected together under a single domain name.

Therefore, A website offers text and graphic content that visitors may view and read without having any interaction. With a web application, the user can do more than just view the page's content.

Learn more about website from

https://brainly.com/question/25817628
#SPJ1

Why should we not underestimate the widespread of mass media?
Select one:

a.
While we do not seem to be aware of it, media has always been a useful and influential part of our lives.

b.
Media's span of influence knows no bounds

c.
All of the given choices are correct

d.
The media could reach almost anywhere in the world

Answers

C. A false statement by a good media source can go a long way

We should not underestimate the widespread of mass media because C. All of the given choices are correct.

It should be noted that media has always been a useful and influential part of our lives and its span of influence knows no bounds.

Also, it's important for one not to underestimate mass media because media could reach almost anywhere in the world. Therefore, all the options are correct.

Read related link on:

https://brainly.com/question/23270499

What does the -m switch do when used with the useradd command? type useradd -h or useradd --help at the prompt to answer the question.

Answers

Regardless of the system settings, the home directory is not created when the -m switch is used with the useradd command.

What is the useradd option?

Linux and other Unix-like operating systems employ a low-level programme called "useradd" to add or create user accounts. The useradd command is quite similar to "adducer," which is essentially just a symbolic link to it. In order to add users to a system, a low-level utility called useradd is utilized.

The majority of the time, adduser is preferable because it is more user-friendly. Before using useradd to create new accounts, review your documentation because your operating system might have a slightly different version.

Hence,  Regardless of the system settings, the home directory is not created when the -m switch is used with the useradd command.

To learn more about useradd, refer to:

https://brainly.com/question/24290640

#SPJ4

I need help with this as soon as possible pls.

Complete the pseudocode for the following grading scale, following the style of the existing pseudocode.

Numerical Grade

Letter Grade

100 - 90

A

89 - 80

B

79 - 70

C

69 - 60

D

<= 59.4

F



/*IF grade >= 90

/* PRINT “A”

/*ELSEIF grade >=80 AND grade <= 89

/* PRINT “B”

/*

/* PRINT “C”

/*ELSEIF grade >=60 AND grade <= 69

/* PRINT “D”

/*ELSE

/* PRINT “F”

(It is not/*ELSEIF grade>=70 AND <=79)

Answers

Answer:

/*ELSEIF grade >=70 AND grade <= 79

Explanation:

You have to have the variable grade in both parts of the ELSEIF statement >=70 and <=79

The hint says t is not/*ELSEIF grade>=70 AND <=79 since this statement has the variable grade only at the >= part not the <= part

Social media marketers need the ability to do what?
Code in JavaScript
Collaborate across teams
Communicate with customers
Make a website useful

Answers

Communication with customers
I believe the answer is communicate with customers

Select the correct answer from each drop down menu

What computing and payment model does cloud computing follow?

Cloud computing allows users to ____ computing resources and follows the ___________ payment model


First blank choices are
1. Buy
2. Own
3. Rent
4. Sell
Second blank choices are
1. Pay as you go
2. Pay anytime anywhere
3. Pay once use multiple times

Answers

Answer:

buy and pay as you go

Explanation:

Once a business determines that change needs to occur, what ahould the
business create?
A. Business operation
B. Business analysis
C. Business model
D. Business strategy

Answers

Answer:

D. Business strategy

Explanation:

Kono Dio Da!!

how long is the ap computer science principles exam

Answers

Answer: The exam is 2 hours long.

Explanation:

Answer:

Approx. 2.05 hours long. Brainliest is appreciated + good luck on all your tests and exams! :( <3

Illustrate the operation of HEAPSORT on the array A = {15, 113, 12, 125, 17, 117, 120, 18, 14}. Show, visually, the binary tree just after the BUILD-HEAP is called and at the end of each of the HEAPIFY operation

Answers

The operation of build-heap on heap array {12, 5, 13, 3, 11, 15}  is max-heapify(heap, 3); max-heapify(heap, 2); max-heapify(heap, 1).

Heap-array is an array structure that is designed to store data in a specific order, such that any element can be quickly retrieved or removed in a constant amount of time. It is implemented using a binary tree, where the value of each node is greater than or equal to the values of its children.

To build a heap-array, first build a binary tree from the given array elements. Then, for each node in the tree, compare the value of the node with the values of its children. If the parent node is greater than or equal to both of its children, then the node is in the correct position and can be left as is.

 

Now, we will move up to the top of the heap array at index 1 and call max-heapify. This will compare the element at index 1 (15).

To learn more about heap-array refer to:

brainly.com/question/29567727

#SPJ4

What is the monitoring delay in cw mode on the sunsdr2 dx?.

Answers

The monitoring delay in CW mode on the SunSDR2 DX is approximately 10-15 milliseconds. The SunSDR2 DX is a high-performance SDR transceiver that operates on HF, VHF, and UHF frequencies.

The device uses Direct Sampling technology, which allows it to achieve excellent dynamic range and sensitivity. It is designed to be used with a PC running software such as ExpertSDR2, which provides full control of the device's features. In CW mode, the SunSDR2 DX has a monitoring delay of around 10-15 milliseconds. This is the amount of time between when a signal is received by the device and when it is displayed on the screen.

The delay is caused by the processing required to decode the CW signal and display it in real-time. While a 10-15 millisecond delay may seem small, it can be noticeable to experienced CW operators who are used to hearing the signal in real-time. However, most users will find that the delay is negligible and does not affect their ability to operate the device.

To know more about transceiver visit:

https://brainly.com/question/9940557

#SPJ11

1.Choose the best answer.:
 a) Broadly, computers are of ................ purpose and ................ purpose
     (i) specific, general     (ii) specific, broad    (iii) precise, broad     (iv) None of them
 b) .................. computers works on continuous signals
 (i) Analog     (ii) Digital    (iii) PS/2        (iv) None of them
 c) ................ computers are the largest and most expensive digital computers.
 (i) Mainframe        (ii) Mini    (iii) Super        (iv) Apple 
d) .................. is the example of mainframe computer.
 (i) CYBER 205    (ii) IBM 3081        (iii) VAX        (iv) IBM 9375
 e) Macintosh is the OS used in .................. computer.
 (i) IBM        (ii) mainframe        (iii) super    (iv) apple
 f) .............. was mainframe computer brought first time to process census data in Nepal.
 i) IBM 1400        ii) IBM1401        iii) IBM1402 
g) ……… computer are used in hospital for Ultra Sound.
 i) Analog    ii) Digital        iii)Laptop    iv) Hybrid 
h) Nowadays, most powerful super commuter is Sunway taihulight from .......................
 i) India    ii) Germany         iii) China    iv) Nepal

Answers

Answer:

specific, generaldigitalminiCYBER 205IBMIBM1401digitalGermany

a hacker has discovered a system vulnerability and proceeds to exploit it to gain access to the system. the vulnerability is not yet known to the developer so no fix is available. what type of attack is this?

Answers

Vulnerability - This is an example of a zero-day attack.

What is vulnerability?
Vulnerabilities
are weaknesses in a computer system that reduce its overall security. Vulnerabilities might be flaws in the hardware itself or the software that uses it. A malicious actors, such as an attacker, can use vulnerabilities to breach privilege restrictions and carry out illegal actions on a computer system. An attacker needs at least one tool or technique that really can connect to a system flaw in order to exploit a vulnerability. In this context, the attack surface is another name for vulnerabilities. Discover all assets, prioritise assets, assess or do a full vulnerability scan, report on results, fix vulnerabilities, confirm remediation, and repeat are all frequent steps in the cyclical practise of vulnerability management.

To learn more about vulnerability
https://brainly.com/question/25633298
#SPJ4

what policy document describes the initial settings and functions of your freshly hardened network? choose the best response: A)Security posture B)Snapshot C)Baseline configuration D)Remediation policy

Answers

The best response is C) Baseline configuration. A baseline configuration document describes the initial settings and functions of a freshly hardened network.

It serves as a reference point for the desired state of the network's security measures and operational settings. The baseline configuration includes details such as firewall rules, access controls, user privileges, software versions, security patches, and other relevant settings. It outlines the standard configuration that needs to be implemented on the network to ensure security and compliance. By adhering to the baseline configuration, organizations can establish a secure starting point for their network and maintain a consistent security posture.

To learn more about  describes click on the link below:

brainly.com/question/31480709

#SPJ11

The layout strategy that deals with low-volume, high-variety production is
fixed-position layout
process-oriented layout
retail layout
warehouse layout

Answers

The layout strategy that deals with low-volume, high-variety production is the fixed-position layout. So, the first option is correct.

In a fixed-position layout, the product or project remains stationary while the necessary resources and equipment are brought to it. This layout is commonly used in industries where the product is large, complex, or customized, making it impractical or impossible to move it through a production line or assembly process.

Examples of industries that commonly employ fixed-position layouts include shipbuilding, aerospace manufacturing, construction, and large-scale infrastructure projects.

In low-volume, high-variety production scenarios, the emphasis is on flexibility and customization rather than mass production. Each product or project may have unique requirements, specifications, and assembly processes.

With a fixed-position layout, the necessary resources, tools, and equipment are brought to the work area to accommodate the specific needs of each product or project.

In contrast, process-oriented layout strategies are more suitable for high-volume, low-variety production scenarios.

Process-oriented layouts, such as product layouts or assembly lines, are designed to maximize efficiency and minimize material handling by arranging workstations in a sequence that optimizes the flow of materials and components.

Retail layouts and warehouse layouts are distinct from production layouts. Retail layouts involve the arrangement of shelves, displays, and aisles in a store to optimize customer flow and product placement.

Warehouse layouts focus on the efficient storage and movement of goods within a warehouse facility, considering factors such as inventory management, picking and packing processes, and transportation logistics.

So, the first option is correct.

Learn more about layout:

https://brainly.com/question/29518188

#SPJ11

________ attack countermeasures such as antivirus signature files or integrity databases.A. Retro virusesB. Stealth virusesC. Polymorphic virusesD. Slow viruses

Answers

Antivirus signature files or integrity databases are countermeasures against retro viruses, stealth viruses, polymorphic viruses, and slow viruses.

Antivirus software is designed to detect and remove viruses from computer systems. It uses various techniques, including signature-based detection and heuristic analysis, to identify and remove viruses. Signature-based detection involves searching for specific patterns or signatures of known viruses in files or memory. Antivirus software uses signature files, which contain information about known viruses, to perform signature-based detection. Integrity databases, which contain information about files on the system, can also be used to detect changes to files that may indicate the presence of a virus. Retro viruses are viruses that can modify the antivirus software itself to evade detection. Stealth viruses are viruses that can hide their presence on a system by intercepting and modifying system calls. Polymorphic viruses are viruses that can change their appearance to avoid detection by signature-based detection techniques. Slow viruses are viruses that infect a system gradually, making them difficult to detect. In order to counteract these types of viruses, antivirus software must be updated regularly with new signature files and must use heuristic analysis to detect unknown viruses. Integrity databases can also be used to detect changes to files that may indicate the presence of a virus.

Learn more about viruses here:

https://brainly.com/question/15843964

#SPJ11

what spreadsheet tool allows you to control what can and cannot be entered in your worksheet in order to avoid typos? 1 point data validation find vlookup list

Answers

The spreadsheet tool allows you to control what can and cannot be entered in your worksheet in order to avoid typos is option A: data validation

What does validation mean in data?

Spreadsheet software is a type of computer program that can store, organize, and analyze data in tabular form. The software is capable of simulating paper accounting worksheets digitally. They may also contain several interconnected sheets.

Before using, importing, or otherwise processing data, data validation refers to verifying the quality and accuracy of the source data. Depending on the limits or aims of the destination, many methods of validation can be carried out. Data cleansing also includes data validation.

Therefore,  the work of Data quality and accuracy are ensured through a procedure known as data validation. In order to assure the logical consistency of input and stored data, it is implemented by including a number of checks in a system or report. Data is entered into automated systems with little to no human oversight.

Learn more about spreadsheet tool from

https://brainly.com/question/22719337
#SPJ1

brandon is helping fred with his computer. he needs fred to enter his username and password into the system. fred enters the username and password while brandon is watching him. brandon explains to fred that it is not a good idea to allow anyone to watch you type in usernames or passwords. which type of social engineering attack is fred referring to?

Answers

Fred is likely referring to a "shoulder surfing" social engineering attack. Shoulder surfing is a type of social engineering attack in which an attacker tries to obtain sensitive information

The attacker can then use the information for nefarious purposes, such as stealing money or identity theft. In this scenario, Brandon is cautioning Fred that allowing anyone to watch him enter his username and password could put his sensitive information at risk of being stolen. This is an important reminder to always be aware of who is around when entering sensitive information, and to take steps to protect that information from prying eyes. Social engineering is a technique used by cybercriminals to manipulate and trick people into giving away sensitive information or performing actions that could compromise their security. There are several types of social engineering attacks, including: Phishing: Phishing is a type of social engineering attack in which an attacker sends an email, text message, or other communication that appears to be from a legitimate source (such as a bank or other trusted organization) in order to trick the recipient into revealing sensitive information. Spear phishing: Spear phishing is a more targeted form of phishing in which the attacker uses information about the victim (such as their name, job title, or interests) to craft a personalized message that is more convincing.

Learn more about Phishing here:

https://brainly.com/question/24156548

#SPJ11

Shoulder surfing attack:

Fred is referring to the social engineering attack known as "shoulder surfing". Shoulder surfing is when an attacker looks over someone's shoulder to obtain sensitive information such as usernames, passwords, credit card numbers, or other confidential data.

In this scenario, Brandon is cautioning Fred about the dangers of shoulder surfing and the importance of keeping sensitive information private. Attackers who engage in shoulder surfing can use the information they obtain to gain unauthorized access to systems or steal personal and financial information.

It's always a good practice to be aware of your surroundings when entering sensitive information and to take steps to protect your data from shoulder surfers, such as shielding the screen with your body, using privacy screens or keyboard covers, and being mindful of who is around you when entering passwords or other sensitive data.

Learn more about social engineering attack:

https://brainly.com/question/30627645

#SPJ11

In this programming project, you will develop an n-node distributed system that implements a vector clock. The distributed system uses a logical clock to timestamp messages sent/received among the nodes. You can use any programming language. To simplify the design and testing, the distributed system will be emulated using multiple processes on a single machine. Each process represents a machine and has a unique port number for communication.

Implement the vector clock for your distributed system. You can create two threads for each process, one for sending messages to other nodes and one for listening to its communication port. Communication among nodes can be done using RPC or using sockets. Once a process sends a message, it should print its vector clock before and after sending a message. Similarly, once a process receives a message, it should print its vector clock before and after receiving the message. You can assume that the number of processes (machines) is fixed (equal to or larger than 3) and processes will not fail, join, or leave the distributed system

Answers

This programming project involves implementing a distributed system with a vector clock. The system consists of multiple processes that communicate with each other using sockets or RPC.

Each process has a unique port number for communication and is represented by a thread for sending messages and a thread for listening to its communication port.

The vector clock is used to timestamp messages sent and received by the nodes. When a process sends a message, it prints its vector clock before and after sending the message. Similarly, when a process receives a message, it prints its vector clock before and after receiving the message.

The project assumes a fixed number of processes (equal to or larger than 3) and that processes will not fail, join, or leave the distributed system. The implementation can be done in any programming language.

To know more about programming project click this link -

brainly.com/question/32018839

#SPJ11

Other Questions
How did the arrival of the Mongols affect Russia? A) Russia quickly defeated and ousted the Mongols B) The Mongols brought Asia models of leadership and government to Russia C) The Mongols brought Christianity to Russia D) The Mongols had no effect on Russian culture what do you think is the most significant threat that the metaverse poses in terms of financial crime (DeFi, NFTs, ICOs, ...) 1 paragraph maxExplain why the terror funding cycle differs from the organized crime funding cycle, and why the use of the financial system might differ for terror groups versus criminal organizations Like other animals, humans respond to changes in temperature. All BUT one response is a human response to a change in environmental temperatures. That is A) moving B) shedding. C) shivering D) sweating Calculate the volume occupied by 4.2g of nitrogen at STP? I am making a dating profile for the organelle, Cilia, and I need a pick-up line and a hashtag. Please help!! On average, lighting accounts for _____ of a home's electrical costs.Please choose the correct answer from the following choices, and then select the submit answer button.Answer choices40 percent50 percent25 percent10 percent 1. Home equity credit loans and credit lines are very popular sources of consumer credit. Identify and explain 2 advantages and 2 disadvantages of borrowing againta home equity. (*50 words*)2. What other options might a consumer contemplate before borrowing against their homes equity? Explain...(*50 words) for a random sample of 85 such pairs, what is the (approximate) probability that the sample mean courtship time is between 95 min and 120 min? (round your answer to four decimal places.) Dakota saw an advertisement for a loan that offered a 0% APR for 18 months.If he takes the loan, which of these scenarios is most likely to occur?A. Dakota won't be charged interest for the first 18 months of theloan, but h will have to make payments for the first 18 months.B. Dakota won't be charged interest for the first 18 months of theloan, nor will he have to make payments for the first 18 months.C. Dakota will be charged interest for the first 18 months of the loan,but he won't have to make payments for the first 18 months.D. Dakota will be charged interest for the first 18 months of the loan,and he will also have to make payments for the first 18 months. Which process does not add carbon to the atmosphere? A piezometer was drilled 200 metres from a saline river. The height of the groundwater (which was non-saline) in the hole was 0.2 metres above the level of the river. (a) Estimate how many years it takes for the water to flow from the hole to the river. Use a porosity of 25 % and a hydraulic conductivity of 20 metres/day. (b) What will happen to the groundwater system if groundwater abstraction results in the water level in the piezometer being 1 m below that of the river? (15 marks) Which of these questions would NOT need the help of a forensic anthropologist? Which of these questions would NOT need the help of a forensic anthropologist? How tall was the person? What was the person's sex? How many fingerprints were discovered? What was the cause of death? Suppose that there are two types of tickets to a show: advance and same-day. Advance tickets cost $30 and same-day tickets cost $35. For one performance, there were 55 tickets sold in all, and the total amount paid for them was $1825. How many tickets of each type were sold? Write a compound sentence that uses the conjunction or to join the two main clauses. Either we clean the waterfront, or we tend to the compost in the garden. -16 x 3/4 =A. -12B. 1/2C. -1/12D. 12 what value of y makes the equation below true?8y-1=31a)1b)4c)8d)20 uHhH sHe mEaNt 'diseases', Idrk what to say to put it in words, can someone help c': Laura runs 6 miles in 50 minutes. At the same rate,how many miles would she run in 35 minutes? URGENT PLEASE ANSWER I NEED THE HELP IM GIVING LOTS OF POINTS!!!Read the passage.excerpt from "The Masque of the Red Death" by Edgar Allan PoeIt was in this apartment, also, that there stood against the western wall, a gigantic clock of ebony. Its pendulum swung to and fro with a dull, heavy, monotonous clang; and when the minute-hand made the circuit of the face, and the hour was to be stricken, there came from the brazen lungs of the clock a sound which was clear and loud and deep and exceedingly musical, but of so peculiar a note and emphasis that, at each lapse of an hour, the musicians of the orchestra were constrained to pause, momentarily, in their performance, to hearken to the sound; and thus the waltzers perforce ceased their evolutions; and there was a brief disconcert of the whole gay companyRefer to Explorations in Literature for a complete version of this story.Which statements best explain how the sensory language affects the tone in this excerpt?Select each correct answer.ResponsesWords like musical and gay create a positive and welcoming tone.Words like musical and gay create a positive and welcoming tone.Refer to Explorations in Literature for a complete version of this story.Which statements best explain how the sensory language affects the tone in this excerpt?Select each correct answer.ResponsesA: Words like musical and gay create a positive and welcoming tone.B: The sensory language creates a suspenseful tone; everyone pauses as the clock chimes disrupt their waltz.C: The sensory language creates a joyful tone; the guests are elated at the lavish party and beautiful music.D: The use of words like dull, clang, and monotonous create an ominous tone. HELP ASP ILL GIVE WHOEVER IS RIGHT BRAINLEST AND MORE POINTS!!