Postreading strategies are used

1)before reading a text.
2)when reading for specific information.
3)when reading for general meaning.
4)after reading a text.

Answers

Answer 1

Answer:

4) after reading a text

Answer 2

Answer:

After

Explanation:

Ed2021


Related Questions

what can be changed when a style is modified?
tables
spelling
text content
font

Answers

The options that can be changed when a style is modified is font.

What is the style  about?

When a style is modified, several elements of the text can be changed, including:

Tables: the format and appearance of tables, such as border style, cell padding, and background color can be modified.

Spelling: the spell checker settings can be adjusted, such as ignoring certain words or adding words to the dictionary.

Text content: the actual text content can be changed, including adding, deleting or modifying text.

Font: the typeface, font size, color, and other font-related attributes can be changed to reflect the desired style.

Learn more about style  from

https://brainly.com/question/1349453

#SPJ1

I'LL MARK BRAINLIEST!!! What is the difference between packet filtering and a proxy server?

A proxy filters packets of data; packets filter all data.
Packets filter packets of data; proxy servers filter all data.
Packets filter spam; proxy filters viruses.
A proxy filters spam; packets filter viruses.

Answers

A proxy operates at the application layer, as well as the network and transport layers of a packet, while a packet filter operates only at the network and transport protocol layer

Answer:

The Answer is B. Packets filter packets of data; proxy servers filter all data.

Explanation:

it says it in the lesson just read it next time buddy

given a string matrix we in that need to find the
number which is occured two times or more than two times and and
give the sum of those numbers
Sample input::
[1 3 4
3 6 8
8 6 8]
Output:
3+8=11"
Plea

Answers

Given a string matrix, we need to find the number that occurred two times or more than two times and give the sum of those numbers. In order to do this, we can take the following approach:We can convert the string matrix into an integer matrix. We can create an empty dictionary. We will iterate through each element in the matrix.

If the element is not present in the dictionary, we will add it with the value 1. If the element is already present in the dictionary, we will increment its value by 1. After iterating through the matrix, we will iterate through the keys of the dictionary and add the sum of the keys whose values are greater than or equal to 2. The sum of these keys will be the desired output.

Here is the implementation of the above approach in Python: matrix = [[1, 3, 4], [3, 6, 8], [8, 6, 8]]d = {}# Convert string matrix to integer matrix for i in range(len(matrix)):    for j in range(len(matrix[i])):        matrix[i][j] = int(matrix[i][j])# Populate dictionary with occurrences of each number for i in range(len(matrix)):    for j in range(len(matrix[i])):        if matrix[i][j] not in d:            d[matrix[i][j]] = 1        else:            d[matrix[i][j]] += 1# Calculate sum of numbers that occurred 2 or more times sum = 0for key in d:    if d[key] >= 2:        sum += key print(sum) In the given problem, we have a matrix of strings and we need to find the numbers that occurred two or more times and sum them up. To solve this problem, we first need to convert the string matrix into an integer matrix. We then need to iterate through each element in the matrix and populate a dictionary with occurrences of each number in the matrix.

To know more about matrix visit:

https://brainly.com/question/29132693

#SPJ11

Please write the commands for the following questions using sed. Use a file called datebook
5. Print all lines where the birthdays are in November and December.
6. Append three stars (***) to the end of the lines starting with Fred.
7. Replace the line containing Jose with JOSE HAS RETIRED.
8. Change Popeye's birthday to 11/14/46.
9. Delete all blank lines.
10. Write a sed script that will:
a. Insert above the first line the title PERSONNEL FILE
b. Remove the salaries ending in 500
c. Print the contents of the file with the last names and first names reversed
d. Append at the end of the file THE END

Answers

The question involves using sed commands on a file called datebook. The commands include printing specific lines, appending characters, replacing text, changing dates, deleting lines, and writing a script for various operations.

To perform the tasks using sed on the file datebook, the following commands can be used:

5. To print all lines where the birthdays are in November and December:
sed -n '/\(11\|12\)\/[0-9][0-9]\/[0-9][0-9][0-9][0-9]/p' datebook

6. To append three stars (***) to the end of the lines starting with Fred:
sed '/^Fred/ s/$/***/' datebook

7. To replace the line containing Jose with JOSE HAS RETIRED:
sed -i '/Jose/c\JOSE HAS RETIRED' datebook

8. To change Popeye's birthday to 11/14/46:
sed -i 's/Popeye:.*/Popeye: 11\/14\/46/' datebook

9. To delete all blank lines:
sed -i '/^$/d' datebook

10. To create a sed script with the following tasks:

a. Insert above the first line the title PERSONNEL FILE:
sed -i '1i PERSONNEL FILE' datebook
b. Remove the salaries ending in 500:
sed -i '/:.*500$/d' datebook
c. Print the contents of the file with the last names and first names reversed:
sed -n 's/\(.*\), \(.*\)/\2 \1/p' datebook
d. Append at the end of the file THE END:
sed -i '$a THE END' datebook

Note: The commands assume that the datebook file has the following format:
Lastname, Firstname: Birthday (MM/DD/YYYY) Salary

To learn more about Scripting languages, visit:

https://brainly.com/question/27608635

#SPJ11

The question involves using sed commands on a file called datebook. The commands include printing specific lines, appending characters, replacing text, changing dates, deleting lines, and writing a script for various operations.

To perform the tasks using sed on the file datebook, the following commands can be used:

5. To print all lines where the birthdays are in November and December:
sed -n '/\(11\|12\)\/[0-9][0-9]\/[0-9][0-9][0-9][0-9]/p' datebook

6. To append three stars (***) to the end of the lines starting with Fred:
sed '/^Fred/ s/$/***/' datebook

7. To replace the line containing Jose with JOSE HAS RETIRED:
sed -i '/Jose/c\JOSE HAS RETIRED' datebook

8. To change Popeye's birthday to 11/14/46:
sed -i 's/Popeye:.*/Popeye: 11\/14\/46/' datebook

9. To delete all blank lines:
sed -i '/^$/d' datebook

10. To create a sed script with the following tasks:

a. Insert above the first line the title PERSONNEL FILE:
sed -i '1i PERSONNEL FILE' datebook
b. Remove the salaries ending in 500:
sed -i '/:.*500$/d' datebook
c. Print the contents of the file with the last names and first names reversed:
sed -n 's/\(.*\), \(.*\)/\2 \1/p' datebook
d. Append at the end of the file THE END:
sed -i '$a THE END' datebook

Note: The commands assume that the datebook file has the following format:
Lastname, Firstname: Birthday (MM/DD/YYYY) Salary

To learn more about Scripting languages, visit:

https://brainly.com/question/27608635

#SPJ11

write the sql code to change the job code to 501 for the person whose personnel number is 107. after you have completed the task, examine the results, and then reset the job code to its original value.

Answers

To change the job code to 501 for the person whose personnel number is 107, you can use the following SQL code:
UPDATE employees
SET job_code = 501
WHERE personnel_number = 107;

After completing the task, you can examine the results by running a SELECT statement:

SELECT *
FROM employees
WHERE personnel_number = 107;

To reset the job code to its original value, you can use the same UPDATE statement but with the original job code value:

UPDATE employees
SET job_code = [original job code]
WHERE personnel_number = 107;

Note that you should replace [original job code] with the actual value that was originally assigned to the person with personnel number 107.

You can learn more about SQL code at: brainly.com/question/31045447

#SPJ11

Effective security measures are achieved through

Select 3 options.

employee education

O inefficient security systems

codes of conduct

. technology-use policies

0 difficult-to-use systems

Answers

Effective security measures are achieved through employee education, codes of conduct, and technology-use policies. Codes of conduct are also important in ensuring that employees understand what is expected of them in terms of security.

In order to have a strong security system in place, it's important to have employees who are aware of the potential risks and how to prevent them. This can be achieved through education and training programs that teach employees about security protocols, how to spot suspicious activity, and what to do in case of a security breach. This can include guidelines for password management, data protection, and physical security measures such as locking doors and securing sensitive documents.

Inefficient security systems and difficult-to-use systems are not effective security measures. Inefficient systems may have vulnerabilities that can be exploited by attackers, while difficult-to-use systems may be ignored or bypassed by employees who find them too frustrating to use. Therefore, it's important to have security systems that are efficient and user-friendly in order to achieve effective security measures.
To know more about technology visit:

https://brainly.com/question/9171028

#SPJ11

In how many ways can a list of students names from your class be organized?​

Answers

Answer:

It can be expressed in 2 ways horizontal and vertical ways.

make sure to follow me and mark me as the brainliest

3.1.1 What type of goods are car radio and remote control.​

Answers

Answer:

Radio Controlled cars .

A user is redesigning a network for a small company and wants to ensure security at a reasonable price. The user deploys a new application-aware firewall with intrusion detection capabilities on the ISP connection. The user installs a second firewall to separate the company network from the public network. Additionally, the user installs an IPS on the internal network of the company. What approach is the user implementing

Answers

"Layered approach" will be the appropriate response.

The method that divides the OS into multiple layers, is a layered approach. The latter empowers application developers to modify their internal functions as well as enhances adaptability.The network idea throughout this method is generally separated into multiple levels and a certain responsibility or activity is delegated to every other layer.

Thus the above is the right answer.

Learn more layered approaches here:

https://brainly.com/question/10105615

a parcel is thrown downward at a speed of v m/s from an airplane at altitude 11000 m. as it falls, its distance from the ground is given by the formula -4.9t2 - vt 11000, where t is the time in seconds since it was dropped. write a program to output the time it will take to reach the ground. the input to your program is the positive floating-point number v. the required time is given by the quadratic formula

Answers

We are only interested in the positive time it takes for the parcel to reach the ground, we can ignore the negative root. Therefore, the time it will take to reach the ground is t = (v + √(v² + 215600v)) / 9.8.

To find the time it will take for the parcel to reach the ground, we can use the given formula: -4.9t² - vt + 11000, where t is the time in seconds since the parcel was dropped.

We need to solve this quadratic equation for t.

First, let's rewrite the equation in the form ax² + bx + c = 0, where a = -4.9, b = -v, and c = 11000.

Using the quadratic formula, t = (-b ± √(b² - 4ac)) / (2a), we can substitute the values of a, b, and c into the formula.

t = (-(-v) ± √((-v)² - 4(-4.9)(11000))) / (2(-4.9))
t = (v ± √(v² + 215600v)) / 9.8

Since we are only interested in the positive time it takes for the parcel to reach the ground, we can ignore the negative root. Therefore, the time it will take to reach the ground is t = (v + √(v² + 215600v)) / 9.8.

Now, you can write a program that takes the input of the positive floating-point number v and calculates the time it will take for the parcel to reach the ground using the above formula. Don't forget to include the necessary imports and input/output statements in your program.
With proper conclusion, this program will output the time it will take for the parcel to reach the ground.

To know more about speed visit;

brainly.com/question/17661499

#SPJ11

Fill in the blank with the correct response.
identifies switches, etc., at the other end of a network segment.

Answers

Answer:

Switches are network devices the connect network lines or segments together

Explanation:

\(.\)

17. What kind of circuit selects binary information from one of many input lines and directs it to a single output line?

Answers

The kind of circuit that selects binary information from one of many input lines and directs it to a single output line is called a multiplexer (also known as a MUX).

A Multiplexer (MUX) is the kind of circuit that selects binary information from one of many input lines and directs it to a single output line. It acts as a switch that chooses the desired input based on a selection code provided to it. It is a gadget that chooses between a few simple or computerized input signals and advances the chosen contribution to a solitary result line. A separate set of digital inputs known as select lines direct the selection. This combinational circuit can have up to n data inputs, n selection lines, and a single output line. The values of the selection lines will be used to connect one of these data inputs to the output. There will be a total of n possible zero-to-one combinations because there are n selection lines.

learn more about multiplexer

https://brainly.com/question/29609961

#SPJ11

Create lookup functions to complete the summary section. In cell I6, create a formula using the VLOOKUP function to display the number of hours worked in the selected week. Look up the week number in cell I5 in the range A17:G20, and return the value in the 2nd column. Use absolute references for cell I5 and the range A17:G20.

Answers

Answer:

The vlookup formula is given below

(Vlookup,I5,A17:G20,9,1)

Please mark brainliest

Explanation:

In cell I6 write this formula (=Vlookup,I5,A17:G20,9,1)

While writing the formula press tab to select vlookup then select the value you want to look then add a comma then select the range of the data you want to look in then add comma then write the number of the column number you want the data from then add comma then there will be a choice of approximate or exact, select 1 or 2 accordingly and press enter.

assume a program requires the execution of 25 x 106 fp instructions, 55 x 106 int instructions, 40 x 106 l/s instructions and 8 x 106 branch instructions. the cpi for each type of instruction is 1, 1, 4, and 2, respectively. assume that the processor has a 4 ghz clock rate. by how much must the cpi of l/s instructions be improved if the program is to run two times faster?

Answers

To run the program twice as quickly, the CPI of l/s instructions must be increased by a factor of 2.5 (from 4 to 1.6).

The total amount of clock cycles needed must be cut in half to run the program twice as quickly. 128 x 106 instructions were carried out in all. (sum of all instructions). The total number of clock cycles needed is (25 x 106 x 1) + (55 x 106 x 1) + (40 x 106 x 4) + (8 x 106 x 2) = 332 million using the CPI values that have been provided. The CPI of l/s instructions, which make up 40/128 of the instructions, must be increased from 4 to 1.6 in order to reduce this amount in half. (i.e., by a factor of 2.5). To run the program twice as quickly, the CPI of l/s instructions must be increased by a factor of 2.5 (from 4 to 1.6).

learn more about instructions here:

https://brainly.com/question/15279910

#SPJ4

I really need this done Thank you!!

I really need this done Thank you!!

Answers

Answer:

10

Explanation:

the interval in the printed numbers is 10.

assume planets is an arraylist of strings and it currently contains several elements. also assume a string variable named first has been declared. write a statement that will assign the first element of the arraylist to the first variable. planets[0]

Answers

Use the get (index) method to obtain the first element of an array list by specifying index = 0. Utilize the get (index) method to obtain the last element of an array list by passing index = size – 1.

What assign first element array list to the first variable?

The element of the current Array List object at the provided index is returned by the get() function of the Array List class, which accepts an integer indicating the index value. As a result, if you supply 0 or list to this method, you can obtain the first element of the current Array List.

Therefore, The first item in an array is indexed as 0 when using zero-based array indexing, while the first item in an array using one-based array indexing is indexed as 1.

Learn more about array list here:

https://brainly.com/question/29309602

#SPJ1

which keyboard shortcut pastes information from the clipboard?

Answers

Answer:

control V or ctrl v

Explanation:

Answer:

command/control + V

Explanation:

if you press these 2 at the same time you'll paste whatever you copied. you can also left click and click on paste, this only works if you copied something first.

The iferror function allows the user to specify his/her own text when an error is encountered rather than returning the standard excel error message.a. Trueb. False

Answers

The given statement "The if error function allows the user to specify his/her own text when an error is encountered rather than returning the standard Excel error message" is true.

This can be particularly helpful in situations where the user wants to make the error message more understandable or provide additional context.For example, let's say that a user has a formula that divides one cell by another, but one of the cells is blank. Normally, Excel would display the #DIV/0! error message, indicating that a division by zero had occurred. However, if the user wraps the formula in an IFERROR function and specifies a custom message to display, they could make the error message more user-friendly. They might choose to display a message like "Please enter a value in both cells to complete this calculation" instead.Another potential use for the IFERROR function is to return a specific value when an error occurs, rather than displaying a message. For example, the user could use the function to return a zero instead of an error value, allowing them to continue using the result of the formula in subsequent calculations.Overall, the IFERROR function is a useful tool for managing errors in Excel formulas and making them more user-friendly. By allowing the user to customize the error message or return a specific value, it helps to streamline workflows and make data analysis more efficient.

For more such question on specifies

https://brainly.com/question/28900908

#SPJ11

When you rehearse timings you should

Answers

Answer:

i tink is slide

Explanation:

Answer:

is this the question? sorry im just confused it looks like you typed it wrong or sum

Explanation:

Think about how you view your emails—either the email service you use yourself or an email service you would choose to use. Describe that email service and then explain whether you use POP3 or IMAP to access your email. How do you know it’s POP3 as opposed to IMAP?

Answers

Answer:

and POP3, followed in later years. POP3 is still the current version of the protocol, though this is often shortened to just POP. While POP4 has been proposed, it's been dormant for a long time.

IMAP, or Internet Message Access Protocol, was designed in 1986. Instead of simply retrieving emails, it was created to allow remote access to emails stored on a remote server. The current version is IMAP4, though most interfaces don't include the number.

The primary difference is that POP downloads emails from the server for permanent local storage, while IMAP leaves them on the server while caching (temporarily storing) emails locally. In this way, IMAP is effectively a form of cloud storage.

Think about how you view your emails is either the email service you use yourself or an email service you would choose to use POP3, followed in later years.

What is POP3?

POP3, followed in later years as the POP3 is still the current version of the protocol, though this is often shortened to just POP. While POP4 has been proposed, it's been dormant for a long time.

IMAP, or Internet Message Access Protocol, was designed in 1986. Instead of simply retrieving emails, it was created to allow remote access to emails stored on a remote server. The current version is IMAP4, though most interfaces don't include the number.

The primary difference is that POP downloads emails from the server for permanent local storage, while IMAP leaves them on the server while caching (temporarily storing) emails locally. In this way, IMAP is effectively a form of cloud storage.

Therefore, Think about how you view your emails is either the email service you use yourself or an email service you would choose to use POP3, followed in later years.

Learn more about emails on:

https://brainly.com/question/14666241

#SPJ2

add the appropriate cellular structures to complete the epithelial cell

Answers

saromere

The saromere is the appropriate cellular structures to complete the epithelial cell.

What is cellular structures?

Cell structure theories have evolved significantly over time. Cells were once thought to be simple membranous sacs containing fluid and a few floating particles, according to early biologists. Biologists now understand that cells are infinitely more complex than this.

The body's cells come in a variety of sizes, shapes, and types. The concept of a "generalized cell" is introduced for descriptive purposes. It incorporates characteristics from all cell types. A cell consists of three components: the cell membrane, the nucleus, and the cytoplasm that lies between the two. The cytoplasm contains intricate arrangements of fine fibers as well as hundreds or even thousands of tiny but distinct structures known as organelles.

To know more that Fibre, visit: https://brainly.com/question/28902486

#SPJ1

Select the correct word to complete the sentence.
_______connections tend to be more reliable, secure, and faster than______
connections.
______connections tend to be more convenient than_______
allowing users to be more mobile.

Answers

Answer:

Wired, Wireless, Wireless, Wired

Explanation:

Answer:

Wired connections tend to be more reliable, secure, and faster than wireless connections. While wireless connections tend to be more convenient, allowing users to be mobile. Many businesses and homes use a combination of wired and wireless.

Explanation:

Edge 2022

Select the correct word to complete the sentence._______connections tend to be more reliable, secure,

What term refers to a hacker that uses
technology to announce or deliver a social,
ideological, religious. or political message?

Answers

Answer:

Hacktivist

Explanation:

A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denialof- service attacks.

The Fed: decreases the money supply when the economy contracts. performs banking services for commercial banks in districts where it operates. calculates the expected expenditure for the federal government every year. outlines expected revenue that is due from the collection of taxes and fees.

Answers

Answer:

performs banking services for commercial banks in districts where it operates.

Explanation:

The Federal Reserve System ( popularly referred to as the 'Fed') was created by the Federal Reserve Act, passed by the U.S Congress on the 23rd of December, 1913. The Fed began operations in 1914 and just like all central banks, the Federal Reserve is a United States government agency.

Generally, it comprises of twelve (12) Federal Reserve Bank regionally across the United States of America.

Hence, the Fed performs banking services for commercial banks in districts where it operates, as well as providing services to the general public.

Answer the following question in 1-2 complete sentences. The Guggenheim Museum Bilbao, a silver building with random curves. What computer software program was used to create the design for the structure above? What is the main advantage to this program?

Answers

Answer:

It was created using CATIA, and the main advantages to this program are that CATIA allows the architect to create a three-dimensional image that can be traveled through via the computer, which allows the architect to see problems or areas that would not have been noticed without the software until after the construction was complete.

Explanation:

Answer:

This design was created using CATIA. CATIA allows the architect to create a three dimensional image that can be traveled through via the computer, which allows the architect to see problems or areas that would not have been noticed without the software until after the construction was complete.

Explanation:

Answer the following question in 1-2 complete sentences. The Guggenheim Museum Bilbao, a silver building

Change height to 400 px, width to 500 px

Answers

Change height to 400 px, width to 500 px

Bill Gates was nominated at the 11th annual Streamy Awards for the crossover for his personal channel.

Change height to 400 px, width to 500 px
Change height to 400 px, width to 500 px
Change height to 400 px, width to 500 px

Examples of the many different ways an app can be used are called use

Answers

Answer:

Different Types of Application Software

Explanation:

Word Processing Software. This software enables users to create and edit documents. The most popular examples of this type of software are MS-Word, WordPad and Notepad among other text editors.

Database Software. Database is a structured collection of data. A computer database relies on database software to organize data and enable database users to perform database operations.

Spreadsheet Software. Excel, Lotus 1-2-3 and Apple Numbers are some examples of spreadsheet software. These software allow users to perform calculations using spreadsheets.

Hope this helped

Answer:

Different Types of Application Software

Explanation:

I hope this helps

Which statement best describes one reason why assembly
language is easier to use than machine language?
O A. It allows programmers to easily calculate prime numbers.
O B. It uses the simplest form of code, also known as binary
code.
O c. It is the best way to tell a computer to complete a
single task.
O D. It allows programmers to write abbreviations instead of
repeating calculations

Answers

Answer:

D. It allows programmers to write abbreviations instead of repeating calculations

Which group often works as part of a team to secure an organization's computers and networks?

Answers

Network administrators are group often works as part of a team to secure an organization's computers and networks.

What is a network administrator do?

Network and computer systems administrators are known to be people that are said to be responsible for the daily  running of the  operation of these networks.

Hence, Network administrators are group often works as part of a team to secure an organization's computers and networks.

Learn more about Network administrators from

https://brainly.com/question/5860806

#SPJ1

im timed!!!!!!!!!!!!!!!!!!

I NEED HELP ASAP
THANK YOU SO MUCH

im timed!!!!!!!!!!!!!!!!!!I NEED HELP ASAPTHANK YOU SO MUCH

Answers

Answer:

C.

Explanation:

Other Questions
How does free enterprise capitalism differ from social-market capitalism?A: Free enterprise capitalism uses government-owned land to produce goods that are sold privately.B: Social-market capitalism creates more jobs for workers than a free enterprise system.C: Free enterprise capitalism allows businessmen more freedom since there are no laws to protect workers.D: Social-market capitalism is easier to maintain than free enterprise capitalism. Maria has 9 boxes that each weigh 78 pound. How many pounds do the boxes weigh altogether? The Earth ________ is a group of parts that include air, water, land, and life 1.1 How can an adult help teenagers to cope with adapting change? What is the law of conservation of energy? Which is one condition that must be present for an inverse relation to be a function?A. The function must be a straight line. The function must be a straight line.B. The function must pass the vertical line test. The function must pass the vertical line test.C. The inverse relation must be a straight line. The inverse relation must be a straight line.D. The inverse relation must pass the vertical line test. PLEASE HELP FOR PHYSICS!All objects exert a gravitational force on all other objects. This force is given by, F = GMm r2 , where the value of G = 6.673 1011 Nm2/kg2 , M is the mass of the heavier object, m is the mass of the lighter object, and r is the distance between the two objects.What is the force of gravity between two balls of mass 50 kg each if the distance between them is 25 m. Assume that there is no interference from any other gravitational field. NEED TO SHOW ALL THE STEPS1. Convert the following numbers to IEEE 754 single precision floating point. Note that single precision floating point numbers have 8 bits for the exponent field and 23 bits for the significand.(a) 1.25(b) -197.515625(c) 213.75 The floor of a storage unit is 3 meters long and 2 meters wide. What is the distance between two opposite corners of the floor? If necessary, round to the nearest tenth. As your final project for this course, reflect on what you have learned about yourself this term, choices and actions you have takengood ones andbad ones. Design and present your personal plan for success, which details what you have learned this term about success and how you will createit in school and in life. The purpose of this is to define the success strategies that you will use for years to come. A solid presentation will:- Reflect your careful consideration and examination of what you have learned this term- Incorporate specific examples and details from the course and text- Include neatly prepared visuals to support your presentation- Be effectively prepared and presented Find the missing value of x. Show your work. How could scientists use radioisotopes to study the function of the golgi apparatus?. listen to the audio and then answer the question based on what you hear. when does marta learn another language? The series 1 (4n + 3)3 n=1 is convergent. (A). According to the Remainder Estimate for the Integral Test, the error in the approximation s sn (where s is the value of the infinite sum and sn is the n-th partial sum) is Is < S (B). Find the smallest integer value of n such that this upper bound is less than 0.00002 . n = q+p-3; use p = 2, and q = -1 the owners of an office building want to borrow money against the cash flow of their property. that property shows $452,159 gross rental income, with a 6% vacancy factor and total operating expenses of $325,750. would the lender find the cash flow from this property satisfactory using a 1.25x dscr and with a monthly debt service of $8,278? 12. Solve 3y2 17y + 10 = 0 byfactoring. What pattern of relatedness can you infer among four inividuals based only on the following sequences from the same place in their chromosomes? In this case which individual is least closely relate to the others?D1: AAAATTTT D2: AAACTTTT D3: ACCCTTTT D4: CCCCGGTT What method of phylogenetic reconstruction are you using when you do this? Name the method of phylogenetic reconstruction that proposes that the fewest number of character stato changes is the most likely? Charcoal is primarily carbon. Determine the mass of CO2 produced by burning enough carbon to produce 5.00 x 102 kJ of heat. C(s) + O2(g) = CO2(g) DH = -393.5 kJ The IT infrastructure is comprised of _______ and ________.a) IT components, IT personnelb) IT components, IT servicesc) IT services, IT personneld) IT personnel, computer-based information systemse) Computer-based information systems, IT personnel