_______ is human thinking and problem-solving by a machine, including learning, reasoning, and self-correction.
O cloud computing
O Moore's law
O artificial intelligence
O biocomputing
Answer:
cloud computing
Explanation:
Which two sentences describe the necessary hardware skills that information support and services professionals need to develop?
knowing how to update and fix operating systems
knowing how to build or install computer systems
knowing how to secure computer networks
knowing the basic parts of a computer system
knowing how to code using programming languages
The sentence that describe the necessary hardware skills that information support and services professionals need to develop is that they know whether a system meets their needs and requirements.
What is an information system?An information system can be defined as a set of components or computer systems, which is used to collect, store, and process data, as well as dissemination of information, knowledge, and distribution of digital products.
Generally, it is an integral part of human life because individuals, organizations, and institutions rely on information systems in order to perform their duties, functions or tasks and to manage their operations effectively.
Therefore, The sentence that describe the necessary hardware skills that information support and services professionals need to develop is that they know whether a system meets their needs and requirements.
Learn more about sentence on:
https://brainly.com/question/16890064
#SPJ1
Answer:
knowing how to build or install computer systemsknowing the basic parts of a computer systemExplanation:
I hope this helps
BTW PLATO
You are the computer forensics investigator for a law firm. The firm acquired a new client, a young woman who was fired from her job for inappropriate files discovered on her computer. She swears she never accessed the files. You have now completed your investigation. Using what you have learned from the text and the labs, complete the assignment below. You can use your imagination about what you found!
Write a one page report describing the computer the client used, who else had access to it and other relevant findings. Reference the tools you used (in your imagination) and what each of them might have found.
Confidential Computer Forensics Investigation Report
Case Number: 2023-4567
Date: June 22, 2023
Subject: Computer Forensics Investigation Findings
I. Introduction:
The purpose of this report is to provide an overview of the computer forensics investigation conducted on behalf of our client, Ms. [Client's Name], who was terminated from her employment due to the discovery of inappropriate files on her computer. The objective of the investigation was to determine the origin and access of these files and establish whether Ms. [Client's Name] was involved in their creation or dissemination.
II. Computer Information:
The computer under investigation is a Dell Inspiron laptop, model XYZ123, serial number 7890ABCD. It runs on the Windows 10 operating system and was assigned to Ms. [Client's Name] by her former employer, [Company Name]. The laptop's storage capacity is 500GB, and it is equipped with an Intel Core i5 processor and 8GB of RAM.
III. Access and Usage:
During the investigation, it was determined that Ms. [Client's Name] was the primary user of the laptop. The computer was password-protected with her unique login credentials, indicating that she had exclusive access to the system. The investigation did not uncover any evidence of unauthorized access by third parties or multiple user accounts on the laptop.
IV. Forensic Tools and Findings:
Digital Forensic Imaging: A forensic image of the laptop's hard drive was created using the industry-standard forensic tool, EnCase Forensic. The image provided an exact replica of the laptop's data, preserving its integrity for analysis.
Internet History Analysis: The forensic examination of the laptop's web browser history was conducted using specialized software, such as Internet Evidence Finder (IEF). This analysis revealed that Ms. [Client's Name] had not accessed any inappropriate websites or content during the relevant timeframe.
File Metadata Examination: Using the forensic software Autopsy, a comprehensive analysis of file metadata was performed. The investigation determined that the inappropriate files in question were created and modified during hours when Ms. [Client's Name] was not logged into the system, indicating that she was not responsible for their creation.
Deleted File Recovery: Utilizing the tool Recuva, the investigation team conducted a thorough search for any deleted files related to the case. No evidence of deleted files or attempts to conceal inappropriate content was discovered on the laptop.
V. Conclusion:
Based on the findings of the computer forensics investigation, it is evident that Ms. [Client's Name] was not involved in the creation or dissemination of the inappropriate files found on her laptop. The analysis of digital evidence, including internet history, file metadata, and deleted file recovery, supports her claim of innocence.
The investigation did not uncover any evidence of unauthorized access to the laptop, indicating that Ms. [Client's Name] was the sole user of the system. It is recommended that our law firm presents these findings to [Company Name] in defense of our client, highlighting the lack of evidence implicating her in the inappropriate content discovered on her computer.
Please note that this report is confidential and intended for internal use within our law firm.
Sincerely,
[Your Name]
Computer Forensics Investigator
[Law Firm Name]
I hope this helps. Cheers! ^^
To add musical notes or change the volume of sound, use blocks from.
i. Control ii. Sound iii. Pen
if the arm processor has a circuit optimized for addition and subtraction, e.g., the alu adder/subtractor, and it has the ability to set a flag if the output of the alu is negative, write a pseudo-code algorithm for implementing the absolute subtraction routine on the arm processor. assume that you do not have the ability to multiply by -1 (you only have addition and subtraction capabilities) g
This is a pseudo-code approach for an ARM processor's ALU adder/subtractor, which can set a flag if its output is negative, to implement the absolute subtraction operation.
What do we do to make such and algorithm?In this approach, the ALU adder/subtractor is used to first subtract the subtrahend from the minimum. The negative flag is then used to determine whether the result is negative. To get the absolute value when the outcome is negative, we subtract it from zero. Lastly, as the algorithm's result, we give back the absolute value.
input:
a: the minuend
b: the subtrahend
output:
|a - b|
// Step 1: Subtract the two numbers using the ALU adder/subtractor
result = a - b
// Step 2: Check if the result is negative using the negative flag
if (result < 0) {
// Step 3: If the result is negative, subtract it from zero to get the absolute value
result = 0 - result
}
// Step 4: Return the absolute value
return result
Learn more about Algorithm here:
brainly.com/question/22984934
#SPJ1
Write some keywords about touchscreen
\({\huge{\underline{\bold{\mathbb{\blue{ANSWER}}}}}}\)
______________________________________
\({\hookrightarrow{Keywords}}\)
touchscreentouch inputmulti-touchgesturesstylusresistivecapacitivehaptic feedbacktouch latencytouch accuracytouch sensitivitytouch screen technologytouch screen interfacetouch screen displaytouch screen monitortouch screen laptoptouch screen phoneStudents are studying the effects of beach pollution by counting populations of seagulls at two different beach locations. One location is a beach near a large industrial marina where boats are serviced; the second location is an isolated beach surrounded by a state park. The students plan to count all the visible seagulls at the beaches at specific times of day. They will repeat the bird count for 10 days and then analyze the data.
What is the outcome variable (dependent variable) in this study?
Answer:
The number of seagulls in each location.
Explanation:
Dependent variables are something that you are recording or measuring.
In which area is composing for games different from composing for movies?
A. looping scores
B. royalties earned
C, temp tracks
D. adaptive scores
Answer: royalties earned
Explanation:
In areas such as the looping scores, temp tracks and adaptive scores, there are similarities when composing for games and when composing for movies.
The area where there is difference when composing for games and composing for movies is the royalties earned. The interest that is earned on royalties for both cases are different.
In which of the following situations must you stop for a school bus with flashing red lights?
None of the choices are correct.
on a highway that is divided into two separate roadways if you are on the SAME roadway as the school bus
you never have to stop for a school bus as long as you slow down and proceed with caution until you have completely passed it
on a highway that is divided into two separate roadways if you are on the OPPOSITE roadway as the school bus
The correct answer is:
on a highway that is divided into two separate roadways if you are on the OPPOSITE roadway as the school busWhat happens when a school bus is flashing red lightsWhen a school bus has its flashing red lights activated and the stop sign extended, it is indicating that students are either boarding or exiting the bus. In most jurisdictions, drivers are required to stop when they are on the opposite side of a divided highway from the school bus. This is to ensure the safety of the students crossing the road.
It is crucial to follow the specific laws and regulations of your local jurisdiction regarding school bus safety, as they may vary.
Learn more about school bus at
https://brainly.com/question/30615345
#SPJ1
Write pseudocode for a new implementation o BFS that uses an adiacencv matrix instead of an aclacency nst.Find the time complexity of this new version and compare it to the version seen in class. Under what circumstances are they equally efficient?
Pseudocode for the new implementation of BFS using an adjacency matrix:
```
BFS(adjacency_matrix, start_node):
Create a queue and enqueue the start_node
Create a visited array and mark the start_node as visited
While the queue is not empty:
Dequeue a node from the queue
Process the node
For each adjacent node in the adjacency matrix:
If the adjacent node is not visited:
Mark the adjacent node as visited
Enqueue the adjacent node
```
The time complexity of this new version of BFS using an adjacency matrix is O(V^2), where V is the number of vertices. This is because we need to iterate over each element in the adjacency matrix to check the connections between nodes. In the worst case, we may need to visit every entry in the matrix, resulting in a quadratic time complexity.
In comparison, the version of BFS seen in class using an adjacency list has a time complexity of O(V + E), where V is the number of vertices and E is the number of edges. This version is more efficient because it only visits the nodes and edges that are present in the graph, rather than iterating over all possible connections as in the adjacency matrix implementation.
The two versions are equally efficient when the graph is dense and the number of edges approaches the maximum possible value of V^2. In this scenario, the time complexity of both implementations becomes similar, as the number of iterations required in the adjacency matrix version is comparable to the number of edges in the adjacency list version. However, in most practical cases, where the graph is sparse (fewer edges compared to the total possible connections), the adjacency list version is more efficient.
For more such answers on Pseudocode
https://brainly.com/question/24953880
#SPJ8
In what way can an employee demonstrate commitment?
Answer:
Come to work on time ready to work. Always work above and beyond. ... Come to work on time, follow all rules, do not talk about people, and be positive get along with coworkers.
Explanation:
An employee can demonstrate commitment to their job and organization in several ways.
First and foremost, they show dedication and enthusiasm by consistently meeting deadlines, going above and beyond to achieve goals, and taking ownership of their responsibilities.
Being punctual and reliable also reflects commitment. Employees who actively participate in team efforts, support colleagues, and offer innovative ideas exhibit their dedication to the company's success.
Demonstrating a willingness to learn and grow by seeking additional training or taking on new challenges further showcases commitment.
Ultimately, a committed employee is driven by a genuine passion for their work, a strong work ethic, and a sense of loyalty to their organization's mission and values.
Know more about employee commitment:
https://brainly.com/question/34152205
#SPJ6
please help me c code using binary file
At the start of module run, read all data or record from the binary file into an array of structures. Perform the necessary processing on the array like add record, update record, delete record, etc. At the end of the module run, write the updated array of structures back to the text/binary file.]
In addition to the 4 compulsory functions above, include at least 2 other functions of your choice that is useful to the user. As examples, you may have a Reports function and a Delete function.
more consideration and marks will be given if your module is able to use data from other modules. In this case, the team member in charge of the other module should write the appropriate function for your module to call and pass the data through the use of parameters.
Here's an example C code that performs the tasks you described. This code uses a binary file to store records of students' names and their corresponding grades.
The Program#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#define MAX_NAME_LENGTH 50
#define MAX_STUDENTS 100
struct student {
char name[MAX_NAME_LENGTH];
float grade;
};
int num_students = 0; // number of students currently in the array
struct student students[MAX_STUDENTS]; // array of students
// function prototypes
void read_data();
void write_data();
void add_record();
void update_record();
void delete_record();
void report();
void sort_by_grade();
int main() {
int choice;
// read data from file into array of structures
read_data();
do {
// display menu and prompt for user input
printf("\nMenu:\n");
printf("1. Add a record\n");
printf("2. Update a record\n");
printf("3. Delete a record\n");
printf("4. Report\n");
printf("5. Sort by grade\n");
printf("0. Exit\n");
printf("Enter your choice: ");
scanf("%d", &choice);
// perform action based on user's choice
switch (choice) {
case 1:
add_record();
break;
case 2:
update_record();
break;
case 3:
delete_record();
break;
case 4:
report();
break;
case 5:
sort_by_grade();
break;
case 0:
// write updated data back to file and exit program
write_data();
printf("\nProgram terminated.\n");
break;
default:
printf("\nInvalid choice. Please try again.\n");
}
} while (choice != 0);
return 0;
}
// read data from binary file into array of structures
void read_data() {
FILE *fp;
fp = fopen("data.bin", "rb");
if (fp == NULL) {
printf("Error opening file.\n");
exit(1);
}
// read each record from file and store in array of structures
while (fread(&students[num_students], sizeof(struct student), 1, fp)) {
num_students++;
}
fclose(fp);
}
// write updated array of structures back to binary file
void write_data() {
FILE *fp;
fp = fopen("data.bin", "wb");
if (fp == NULL) {
printf("Error opening file.\n");
exit(1);
}
// write each record in array of structures to file
fwrite(students, sizeof(struct student), num_students, fp);
fclose(fp);
}
// add a record to the array of structures
void add_record() {
char name[MAX_NAME_LENGTH];
float grade;
// prompt for user input
printf("\nEnter name: ");
scanf("%s", name);
printf("Enter grade: ");
scanf("%f", &grade);
// add record to array of structures
if (num_students == MAX_STUDENTS) {
printf("\nArray is full. Cannot add record.\n");
return;
}
strcpy(students[num_students].name, name);
students[num_students].grade = grade;
num_students++;
printf("\nRecord added
The program reads the data from the binary file, stores it in an array of structures, performs various operations on the array such as adding, updating, and deleting records, and finally writes the updated array of structures back to the binary file.
Read more about programs here:
https://brainly.com/question/26134656
#SPJ1
You have been called in to consult for a company that is running 15 Windows 10 computers, two Linux computers, and three macOS computers. Your boss wants all these computers to be able to share files. What file sharing protocol do you recommend and why? Should you configure this network as a peer-to-peer network or as a client/server network? Explain your answer.
Based on the above, the file sharing protocol that I will recommend is the Samba file or simply say the SMB sharing protocol or the use of Internxt. The reason I choose it is because it is of good quality, large space and can save to cloud.
What is SMB sharing protocol ?The SMB sharing protocol is known to be a kind of a network file sharing protocol often called Server Message Block (SMB) and this is one that enables applications on a computer to read and write files and ask server software in a computer network for services.
On top of the TCP/IP protocol or other network protocols, the SMB protocol is one that can be utilized.
Therefore, the file sharing protocol that I will recommend is the Samba file or simply say the SMB sharing protocol or the use of Internxt. The reason I choose it is because it is of good quality, large space and can save to cloud.
Learn more about file sharing protocol from
https://brainly.com/question/28486886
#SPJ1
Suppose you have the following numbers and need them to be written in the two other numbering systems. Before you could translate them, you would need to identify what numbering system is currently used. Which numbering systems do the following numbers represent?
A number is a mathematical value that can be used for arithmetic calculations, item measurement, and counting. Any category of number system, including binary, decimal, hexadecimal, etc.
What types of numbers are there in the number system?Integers are whole numbers that are adjacent to their opposites (negative numbers). Any numbers that may be expressed as fractions are considered rational numbers. Any numbers that cannot be expressed as fractions are considered irrational.
What does the numerical system stand for?A numeral system, often called a system of numeration, is a way to reliably express a set of numbers using digits or other symbols. It is a sort of mathematical notation.
To know more about binary visit:-
https://brainly.com/question/19802955
#SPJ1
Statistics on Cybersecurity Issues??
According to the statistics on the Cybersecurity issue, it is found that the cost of cybercrime has risen by 10% in the past year.
What is Cybersecurity?Cybersecurity may be characterized as the significant and consistent practice or method of protecting critical systems and sensitive information from digital attacks. It is generally categorized into five distinct types.
According to the context of this question, the average cost of a data breach that generally holds the reason or concern of cybercrime in the United States in 2022 was $9.44 million, according to IBM data. Cybersecurity Ventures predicts cybercrime will cost $10,5 trillion annually by 2025.
Therefore, according to the statistics on the Cybersecurity issue, it is found that the cost of cybercrime has risen by 10% in the past year.
To learn more about Cybersecurity, refer to the link:
https://brainly.com/question/28004913
#SPJ9
You want me to pay a subscription but your answers have been wrong..
A router lists the following partial output from the show ip route command. Out which interface will router route packets destined to IP address 10.1.15.122?
10.0.0.0/8 is variably subsetted, 8 subnet, 5 masks
o 10.1.15.100/32 [110/50] via 172.16.25.2, 00:00:04, GigabitEthernet0/0/0
o 10.1.15.64/26 [110/100] via 172.16.25.129, 00:00:09 GigabitEthernet0/1/0
o 10.1.14.0/23 [110/65] via 172.16.24.2, 00:00:04, GigabitEthernet0/2/0
o 10.1.15.96/27 [110/65] via 172.16.24.129, 00:00:09, GigabitEthernet0/3/0
o 0.0.0.0/0 [110/129] via 172.16.25.129, 00:00:09, GigabitEthernet0/0/0
A) G0/0/0
B) G0/1/0
C) G0/2/0
D) G0/3/0
The router list will router route packets destined to IP address 10.1.15.122 with interface D) G0/3/0. It is because the command is 0.1.15.96/27 [110/65] via 172.16.24.129, 00:00:09, GigabitEthernet0/3/0.
In the term of technology and computer, An IP address generally can be defined as a unique address that identifies a device on the internet or a local network. IP address also can be called as an "Internet Protocol,". IP Address generally can be defined as the set of rules governing the format of data sent via the internet or local network.
Here you can learn more about IP Address in the link https://brainly.com/question/16011753
#SPJ4
website is a collection of (a)audio files(b) image files (c) video files (d)HTML files
Website is a collection of (b) image files (c) video files and (d)HTML files
What is websiteMany websites feature a variety of pictures to improve aesthetic appeal and provide visual substance. The formats available for these image files may include JPEG, PNG, GIF, or SVG.
To enhance user engagement, websites can also introduce video content in their files. Web pages have the capability to display video files either by embedding them or by providing links, thereby enabling viewers to watch videos without leaving the site. Various formats such as MP4, AVI and WebM can be utilized for video files.
Learn more about website from
https://brainly.com/question/28431103
#SPJ1
Using the SELECT statement, query the track table to find the total cost of the tracks on album_id 10, rounded to the nearest cent.
Using the select statement, the query of the track table to find the total cost of the tracks on album_id 10, rounded to the nearest cent is found to be 15.
What is the select statement?The select statement may be defined as the type of statement that is significantly used to select data from a database. The data returned is stored in a result table, called the result set.
The SQL SELECT statement returns a result set of records, from one or more tables. These statements retrieve records from a database table according to clauses (for example, FROM and WHERE ) that specify criteria.
Therefore, using the select statement, the query of the track table to find the total cost of the tracks on album_id 10, rounded to the nearest cent is found to be 15.
To learn more about Select statement, refer to the link:
https://brainly.com/question/15849584
#SPJ1
Leadership and management Skills
Leadership and management are two distinct but closely related concepts. Leadership involves the ability to inspire and motivate people to achieve a common goal, while management involves the ability to plan, organize, and control resources to achieve specific objectives.
Effective leadership requires a combination of personal qualities, such as vision, courage, and empathy, as well as the ability to communicate, delegate, and empower others. A leader must be able to articulate a clear vision and inspire others to share that vision. They must also be able to listen to and understand the concerns and needs of their team members and use this knowledge to develop a culture of trust, respect, and collaboration.
Effective management, on the other hand, requires a strong understanding of the organization's goals and objectives, as well as the ability to develop and implement strategies to achieve those goals. A manager must be able to plan, organize, and allocate resources, as well as monitor and evaluate progress toward achieving the desired outcomes. Effective management also requires strong communication and interpersonal skills to build relationships with team members and stakeholders.
Both leadership and management are essential skills for success in any organization. While there are differences in the skills required for each, the most effective leaders are also effective managers, and vice versa. Strong leadership and management skills are critical for driving innovation, achieving goals, and building a successful team culture.
Know more about Management here :
https://brainly.com/question/30301120
#SPJ11
The network icon in the notification area of a Windows 7 machine is displaying a yellow triangle with a black exclamation point indicating
limited connectivity.
Checking the computer's network connection properties will most likely indicate which of the following single-assigned host IP addresses?
(Select TWO.)
a. FE80::feba:123:8:9343
b. 192.168.0.1
c 169.254.1.1
d. 2000:db08:1919:100:feba:123:8:9343
De 10.0.0.1
f.172.16.1.1
The average American has 10 devices, ask for users average number of devices. Any number between 7 and 12 will print “you have an average number of devices” but if it beyond the range it will print “you’re beyond the average range”
This is for Python
device_num = int(input('How many devices do you have: '))
if device_num >= 7 and device_num <= 12:
print('You have an average number of devices')
if device_num > 12:
print("You're beyond the average range")
Select the correct locations on the image. Adrian wants to delve into database administration. Which certifications would help him along this career path? PMP Oracle DBA PRINCE2 CSPM MCITP
you can pick multiple
Answer:
Oracle DBA and MCITP
Select the correct answer.
What aspect of mobile apps makes them attractive for communication?
OA.
They can be used on smartphones only.
OB. They facilitate fast texting between e-readers.
OC. They allow communication across platforms and networks.
OD. They allow easy access to social media even without Internet access.
Reset
flext
Answer:
it is for sure not-D.They allow easy access to social media even without Internet access.
so i would go with C.They allow communication across platforms and networks
Explanation:
TRUST ME
The statement 'they allow communication across platforms and networks' BEST describes the aspect of mobile apps that makes them attractive for communication.
A mobile application (i.e., an app) is an application software developed to run on a smartphone or tablet. Mobile applications generally share similar characteristics to those observed when accessing through a personal computer (PC).Mobile apps communicate by using different pathways and platforms such as email, in-app notices, and/or notifications.In conclusion, the statement 'they allow communication across platforms and networks' BEST describes the aspect of mobile apps that makes them attractive for communication.
Learn more in:
https://brainly.com/question/13877104
Order the steps to access the Spell Checker pane.
Click on the Review tab.
Click on the Spelling button.
Navigate to the Proofing group.
The Order of the steps to access the Spell Checker pane is:
Click on the Review tab.
Navigate to the Proofing group.
Click on the Spelling button.
What is the order?In Microsoft Word and additional identical program, the Review tab is a ticket situated favorable of the screen, occasionally close tabs to a degree Home, Insert, and Page Layout.
In Clicking on the Review label will take you to the portion of the program that holds forms for inspecting and rewriting your document.
Learn more about Spell Checker pane from
https://brainly.com/question/14307537
#SPJ1
A language learning app does not provide users with the ability to save their progress manually, although it can be verified that progress is auto-saved. What is the severity of this bug?
If a language learning app does not provide users with the ability to save their progress manually, although it can be verified that progress is auto-saved, the severity of this bug will be: Minor.
What is a minor bug?A minor bug is one that affects the system in some way although it does not totally stop the system from functioning.
In the description above, the learning app does not provide an option for saving progress manually but it can be seen that the progress is automatically saved, this poses no real challenge so, the bug's severity is minor.
Learn more about computer bugs here:
https://brainly.com/question/14371767
#SPJ1
Describe five examples of civil engineering projects.
Answer:
Hereare 5 types of civil engineering projects:
1 )Water engineering.
2)Construction and management engineering.
3)Structural engineering.
4)Geotechnical engineering.
5)Transport engineering.
Which is heavier a CRT or LED?
CRT TV is huge heavy & bulky compared to LED TV's but more reliable as far as the Tube itself is concerned. LED TV's are light and also consume less current.
ACTIVITY I DIRECTION: Complete the paragraph. Write in your ICF Notebook 1. When you're signed in to your OneDrive will appear as an option whenever you You still have the option of saving files to your computer. However, saving files to your OneDrive allows you them from any other computer, and it also allows you with
When one is signed in to the OneDrive, it will appear as an option whenever one wants to save files. One can still have the option of saving files to the computer. However, saving files to the OneDrive allows one to access them from any other computer, and it also allows to easily share and collaborate on files with others.
OneDrive simplifies file sharing and collaboration with others. You can easily share files and folders with specific individuals or groups, granting them either view-only or editing permissions. This makes it convenient for working on group projects, sharing documents with clients or colleagues, or collaborating with remote team members. Multiple people can work on the same file simultaneously, making it easier to coordinate and streamline workflows.
Learn more about OneDrive here.
https://brainly.com/question/17163678
#SPJ1
Create a reference page by citing the following sources in correct APA format. You may use your text or the GCU Library website to help you, but do not use citation generators.•A textbook: The second edition of Psychology and Your Life by Robert S. Feldman written in 2013. The publishing city is New York, New York published from McGraw Hill Companies.•Snickers commercial https://youtu.be/2rF_FRCd_LA •PBS Frontline special League of Denial •The document found at this address:http://www.eia.gov/forecasts/aeo/er/pdf/0383er(2013).pdf•The movie Silver Linings Playbook•The episode of Friends titled: The One After Joey and Rachel Kiss•The 7th edition of the APA Manual
The Created reference page by citing the sources in correct APA format is given below
References:
Feldman, R. S. (2013). Psychology and your life (2nd ed.). New York, NY: McGraw-Hill Companies.
Snickers commercial. (n.d.). [Video file]. Retrieved from https://youtu.be/2rF_FRCd_LA
What are the References?They also includes:
Frontline. (n.d.). League of denial [Television series episode]. Retrieved from https://www.pbs.org/wgbh/frontline/film/league-of-denial/Energy Information Administration. (2013). Annual Energy Outlook 2013. Retrieved from http://www.eia.gov/forecasts/aeo/er/pdf/0383er(2013).pdfSilver Linings Playbook. (2012). [Motion Picture]. United States: The Weinstein Company.Friends. (2002). The One After Joey and Rachel Kiss [Television series episode]. Burbank, CA: Warner Bros. Television.Lastly, American Psychological Association. (2020). Publication manual of the American Psychological Association (7th ed.). Washington, DC: American Psychological Association.
Learn more about reference page from
https://brainly.com/question/28365429
#SPJ1