stranger help( ◜‿◝ )​

Stranger Help( )

Answers

Answer 1

A AND B AND C:

FFFFFFFT

A OR B OR C:

FTTTTTTT

Related Questions

(C++) Write code to complete RaiseToPower(). Sample output if userBase is 4 and userExponent is 2 is shown below. Note: This example is for practicing recursion; a non-recursive function, or using the built-in function pow(), would be more common.4^2 = 16Given: #nclude using namespace std;int RaiseToPower(int baseVal, int exponentVal){int resultVal = 0;if (exponentVal == 0) {resultVal = 1;}else {resultVal = baseVal * //your solution goes here;}return resultVal;}int main() {int userBase = 0;int userExponent = 0;userBase = 4;userExponent = 2;cout << userBase << "^" << userExponent << " = "<< RaiseToPower(userBase, userExponent) << endl;return 0;}

Answers

Answer:

Following are the code to this question:

RaiseToPower(baseVal, exponentVal-1);//calling method RaiseToPower and in second parameter we subtract value  

resultVal = baseVal * RaiseToPower(baseVal, exponentVal-1);//defining resultVal variable that calculate baseVal and method value

Explanation:

In the above-given code inside the "RaiseToPower" method is defined that accepts two parameters, which are "baseVal and exponentVal" and inside the method, an integer variable "resultVal"  is defined, that holds a value that is 0.

In the next step, if the conditional statement is used, in if the block it checks the "exponentVal" variable value that is equal to 0, if it is true it assigns value 1 in "resultVal" otherwise it will go to else block in this block, the "resultVal" variable holds "baseVal" variable value and call the "RaiseToPower" method, and multiply the baseVal and method and store its value in resultVal and return the value. Inside the main method, two integer variable userBase, userExponent is defined that holds a value and calls the above method and prints its return value.

please find the attachment of the code file and its output.

(C++) Write code to complete RaiseToPower(). Sample output if userBase is 4 and userExponent is 2 is

In an interview, you are asked to explain how gamification contributes to enterprise security. How should you reply? a. Recreational gaming helps secure an enterprise network by keeping the attacker engaged in harmless activities. b. Instructional gaming in an enterprise keeps suspicious employees entertained, preventing them from attacking. c. Instructional gaming can train employees on the details of different security risks while keeping them engaged. d. Recreational gaming can train employees on how to contain a physical threat at an enterprise.

Answers

Gamification contributes to enterprise security because C. Instructional games can train employees in the details of different security risks while keeping them engaged.

Why Gamification can Improve the Security Awareness?

Gamification has been used by organizations to improve customer loyalty. For example, different levels of play can be reached by using the application to earn points, purchase certain products, or participate in the company's gamified programs. But elements of gamification can still be found in today's workplace. Gamification is used to improve HR functions (employee recruitment, onboarding, etc.) and to motivate customer service representatives or call center or similar department employees to increase productivity and engagement I can do it. Gamification not only increases employee motivation and engagement, but it also optimizes workflows and processes, attracts new talent, and can be used for educational purposes.

Learn more about gamification for security awareness https://brainly.com/question/29655904

#SPJ4

which part of the word application window should the user go to for "read the document"

Answers

Answer:

idk

Explanation:

41)

When creating a database field, we set ________ for each field to decrease data input mistakes.

Multiple Choice

data descriptions

data forms

data relationships

data types

Answers

When creating a database field, we set D. Data types for each field to decrease data input mistakes.

What to do when creating database ?

When it comes to creating a database field, selecting the appropriate data type is integral. Doing so ensures that input errors are minimized by verifying that the entered data matches the designated data type meant for the particular field.

For instance, if a field is expected to hold numerical values, setting the data type as "numeric" will hinder users from entering anything other than numeric characters while avoiding mistakes. Similarly, designating the data type of a date field as "date" prevents users from submitting unsuitable formats or unrelated content describing different data.

Find out more on databases at https://brainly.com/question/3714309

#SPJ4

Jackie wants to assign a value to the favorite food variable: favorite Food = "Tacos" but gets an error message. What does she need to fix for the code to work?

Answers

Answer:

The food Variable.

Explanation:

Answer:

I

D

K

this doesn´t even make any sents

Explanation:

Hi Lesiana, After your presentation last week, the manager thinks an in-house solution is the way to go. Although our programmers have much experience with system integration and development, they have little experience with user design. You'll have to lay out all the pages of the system. For now, just create a hierarchical drawing of all the pages needed for this system. Think of the menu on the top of the screen and what you'd click on to move to the next screen.
Once you finish the hierarchy, I'll need you to draw out examples of a few of the screens. For example, show a screen with a menu, another which requests user input, one that has methods to contact us, and the last one as an informational page. The menu screen can be an opening page or even a page to decide on types of reports to run. The user input page can be one for any of the users, such as the appointment setters or technicians. Make sure that you outline all of the required validation rules for this input page. The informational page can either be a static page or results from a search. Make sure that you include navigation buttons on each of these example pages.

Answers

The Hierarchical drawing of the In- House solutions includes Four categories such as product, service, training, support and about.

What is Hierarchical drawing?

Hierarchical drawing is also known as Layered Graph Drawing which includes the drawing in the vertices and are made on the Horizontal rows and layers.

The complete solution is attached below.

The In-House solutions' hierarchical diagram covers four categories, including product, service, training, support, and about.

Learn more about Hierarchical drawing here:

https://brainly.com/question/26031625

#SPJ1

 

Hi Lesiana, After your presentation last week, the manager thinks an in-house solution is the way to

what types of packages are part of the image-editing software, also known as original equipment manufacturer (oem) software, that can typically be used to cut and paste, crop, enlarge, and retouch your images? (1 point) responses third-party software third-party software proprietary software proprietary software user-friendly software user-friendly software external watermark software

Answers

Proprietary software refers to the several programs that are included in original equipment manufacturer (OEM) software, which is used to cut and paste, crop, expand, and enhance your photographs.

software is a set of instructions that a computer may follow. The whole of the programs, processes, and practices involved in running a computer system is referred to as software. The phrase was created in order to distinguish these instructions from hardware, or the actual parts of a computer system. A program, or software program, is a set of instructions that instructs a computer's hardware to carry out a task.

The software can be divided into two basic categories: system software and application software. System software manages the internal operations of a computer, mostly through an operating system, and also manages peripherals like displays, printers, and storage devices. By contrast, application software, which can be referred to as any program that processes data, instructs the computer to carry out user-given orders.

Learn more about software here:

https://brainly.com/question/8062312

#SPJ4

Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and steal data through a VPN connection using the credentials assigned to a vice president in your organization. For security reasons, all individuals in upper management in your organization have unlisted home phone numbers and addresses. However, security camera footage from the vice president's home recorded someone rummaging through her garbage cans prior to the attack. The vice president admitted to writing her VPN login credentials on a sticky note that she subsequently threw away in her household trash. You suspect the attacker found the sticky note in the trash and used the credentials to log in to the network. You've reviewed the vice president's social media pages. You found pictures of her home posted, but you didn't notice anything in the photos that would give away her home address. She assured you that her smart phone was never misplaced prior to the attack. Which security weakness is the most likely cause of the security breach

Answers

Answer: Geotagging was enabled on her smartphone

Explanation:

The security weakness that is the most likely cause of the security breach is that geotagging was enabled on the vice president's smartphone.

Geotagging, occurs when geographical identification metadata are added to websites, photograph, video, etc. Geotagging can be used to get the location of particular place.

In this case, since geotagging was enabled on her smartphone, it was easy for the attacker to locate her house.

Which of the following decisions involve a choice between
internal and external production?
Repurchase order
Keep-or-drop
Sell-or-process-further
Special-order
Make-or-buy

Answers

One of the decisions that involve a choice between internal and external production is make-or-buy.

This decision refers to whether a company should manufacture a particular product or service in-house or outsource it to a third-party supplier. An organization can make-or-buy anything from raw materials to finished products, services, and software, depending on its strategic objectives, capabilities, and cost considerations.
In most instances, the decision to make-or-buy involves a trade-off between the costs and benefits of internal and external production. A company should consider various factors before making the decision, such as the availability of production capacity, the level of expertise required, the cost of production, the quality standards, the lead time, and the risk involved.
For instance, if a company has enough production capacity, technical expertise, and raw materials, it may prefer to make the product in-house. This decision can help the company maintain better control over the quality, timing, and cost of production. Moreover, it can leverage its core competencies and knowledge to create unique value for customers.
On the other hand, if a company lacks the production capacity, expertise, or raw materials, or if it faces a shortage of time or money, it may prefer to buy the product or service from an external supplier. This decision can help the company reduce its production costs, avoid capital investments, and focus on its core competencies.
In conclusion, make-or-buy is one of the critical decisions that companies face in managing their production activities. The decision requires a thorough analysis of the benefits and drawbacks of internal and external production and a consideration of various factors that influence the decision. Therefore, companies must make informed decisions that align with their strategic goals, market demands, and financial objectives.

Learn more about market demands :

https://brainly.com/question/29703449

#SPJ11

the member function int& hours(); provides read-write access to the hours property (however it is stored). true or false

Answers

False The member function int& hours(); does not provide read-write access to the hours property.

Does the member function int& hours(); provide read-write access to the hours property?

The statement is false. The member function int& hours(); does not provide read-write access to the hours property. The ampersand symbol (&) in the function declaration indicates that it returns a reference to an integer (int&).

This means that when the function is called, it returns a reference to the value of the hours property, allowing it to be modified. However, this function does not provide direct access to the property itself, and it is not responsible for storing or managing the hours data.

Member functions in C++ are class functions that operate on objects of the class. They can be used to manipulate the internal state of an object or provide access to its properties. In C++, access to class members can be controlled using access specifiers, namely public, private, and protected.

In the given case, if the int& hours() function were to provide read-write access to the hours property, it would typically be declared as a public member function within the class definition.

However, without further context or information about the class and its implementation, it is difficult to determine the exact behavior and purpose of the function.

It's important to note that the accessibility and behavior of member functions, as well as the design choices made for a particular class, can vary depending on the specific requirements and intentions of the programmer.

Learn more about hours property

brainly.com/question/29974476

#SPJ11

What is one way interpreted programming languages differ from compiled programming languages? (3 points)


Interpreted languages produce translated machine code that can be saved and run later, while compiled languages cannot be saved.

Interpreted languages translate all lines of code together and execute them all at once, while compiled languages translate one line of code at a time and then execute that line before moving on.

Programs written with interpreted languages are ready to be run, but programs written with compiled languages require interpreter software to be run.

Programs written with interpreted languages require the original source code, but programs written with compiled languages can be shared with others while keeping the source code private

Answers

Interpreted programming languages distinguish themselves from compiled programming languages in that they translate and execute code continuously.

Why is this so ?

Interpreted progra ming languages distinguish themselves from compiled programming languages in that they translate and execute code continuously while the program runs.

Whereas compiled languages transform code into machine code that computers can execute directly.

In contrast to compiled languages, interpreted languages lack a distinct executable file and interpret the language itself during runtime. Interpreted programming offers increased flexibility and reduced debugging complexity, while compiled programs create more efficient code with improved speed.

Learn more about compiled programming languages at:

https://brainly.com/question/30498060

#SPJ1

when you sort data in a query, the records in the underlying table are actually rearranged.
True or False

Answers

The records in the underlying table are not actually rearranged when you sort the data in a query, which proves the statement false.

a file that has the fields within each record separated by and each record displayed on its own line?

Discrete files A single character known as the delimiter divides the fields in a delimited file, which separates each record onto its own line. Any character that isn't present in the field values, such a tab, a semicolon, a comma, a space, etc., can be used as the delimiter.

Which Access query types modify data?

To add, modify, or delete information from an existing record in an Access database, use update queries.

To know more about sort data in a query visit:-

https://brainly.com/question/28257746

#SPJ4

Which way do you swipe in the android os to access shortcuts?

Answers

Answer:

You can swipe from right to left to access shortcuts or the notification bar in Android OS.

Explanation:

So you can swipe in the android os and do it from the home screen of any smartphone.

The way through which you can swipe in the android OS to access shortcuts from right to left in the notification bar. You can swipe from right to left for more shortcuts.

How can one access shortcuts on Android?

One can access shortcuts on Android in the following ways:

On your device, open the Settings app.Tap Accessibility.Select the application that you want to use with a shortcut.Select the shortcut setting, like the TalkBack shortcut or Magnification shortcut.Choose a shortcut.

The option of gestures and navigation in the android would definitely assist you in this process of accessing shortcuts through swiping. Swipe from right to left for more shortcuts in the notification bar. You can swipe from right to left for accessing more shortcuts in androids OS.

Therefore, you can swipe from right to left for more shortcuts is the way through which you can swipe in the android OS to access shortcuts.

To learn more about Android OS, refer to the link:

https://brainly.com/question/4121093

#SPJ6

Why did the editors choose to rearrange the intercutting between Luke’s story and the Imperials? What effect did this have on the final film?

Answers

Answer:

Though it has its merit, know that the rule is not mandatory. ... A jump cut is a cut in film editing in which two sequential shots of the ... An intercut is a type of edit where two or more actions in distinct ...

Give one reason why a telephone number would be stored as the text data type. [2 marks]

Answers

Answer:

Telephone numbers need to be stored as a text/string data type because they often begin with a 0 and if they were stored as an integer then the leading zero would be discounted.

The other reason is that you are never likely to want to add or multiply telephone numbers so there is no reason to store it as an integer data type.

Explanation:

A text data type can hold any letter, number, symbol or punctuation mark. It is sometimes referred to as 'alphanumeric' or 'string'.

The data can be pure text or a combination of text, numbers and symbols.

People often assume that a telephone number would be stored as an 'integer' data type. After all, they do look like numbers don't they!

1)Which tool can you use to find duplicates in Excel?
Select an answer:
a. Flash Fill
b. VLOOKUP
c. Conditional Formatting
d. Concatenation
2)What does Power Query use to change to what it determines is the appropriate data type?
Select an answer:
a.the headers
b. the first real row of data
c. data in the formula bar
3)Combining the definitions of three words describes a data analyst. What are the three words?
Select an answer:
a. analysis, analyze, and technology
b. data, programs, and analysis
c. analyze, data, and programs
d. data, analysis, and analyze

Answers

The tool that you can use to find duplicates in Excel is c. Conditional Formatting

b. the first real row of datac. analyze, data, and programs

What is Conditional Formatting?

Excel makes use of Conditional Formatting as a means to identify duplicate records. Users can utilize this feature to identify cells or ranges that satisfy specific criteria, like possessing repetitive values, by highlighting them.

Using conditional formatting rules makes it effortless to spot repeated values and set them apart visually from the other information. This function enables users to swiftly identify and handle identical records within their Excel worksheets, useful for activities like data examination and sanitation.

Read more about Conditional Formatting here:

https://brainly.com/question/30652094

#SPJ4

An ordinary office environment needs computers that have multiple user account settings where each user is allocated private data storage. What type of workstations would you build for this environment

Answers

Answer:build a thick client

Explanation:

Which of the following is the correct subnet mask for a network that will use 20 hosts on each subnet while borrowing the fewest bits and wasting the fewest host addresses?

Answers

The correct subnet mask for a network that will use 20 hosts on each subnet while borrowing the fewest bits and wasting the fewest host addresses is 255.255.255.240.

To determine the correct subnet mask, we need to find the minimum number of bits required to accommodate 20 hosts per subnet while minimizing wastage. Since we need 20 host addresses, the closest power of 2 greater than 20 is 32 (2^5). This means we need at least 5 bits to represent the host addresses. However, we must also consider the network and broadcast addresses, which cannot be assigned to hosts. The network address is the first address in the subnet, and the broadcast address is the last address. Therefore, we have two addresses that cannot be used for hosts.

Using the formula 2^n - 2, where n is the number of borrowed bits, we can calculate the number of usable host addresses. In this case, 2^5 - 2 = 30, which is greater than the required 20 hosts. The subnet mask is represented in binary form as 11111111.11111111.11111111.11110000, which translates to 255.255.255.240 in decimal notation. This subnet mask provides 16 address spaces per subnet, with 14 usable host addresses, while wasting the fewest host addresses and borrowing the fewest bits.

Learn more about host addresses here-

https://brainly.com/question/32090631

#SPJ11

please help me please(python btw im in gr 11)

please help me please(python btw im in gr 11)

Answers

Answer:

See explanation

Explanation:

This is the pseudocode:

def findNextSquare(n):

   if \(\sqrt{n}\) is an integer:

       return \({(\sqrt{n}+1) } ^{2}\)

   else:

       return -1

this site isn't letting me add my ans and wut should I do?

Answers

You can probably refresh or log out or something.

The architectural layer responsible for displaying web pages to the user and accepting user input is known as the _________ tier.

Answers

The architectural layer responsible for accepting user input and displaying web pages to the user is known as the presentation tier.

In the architectural layer design of web applications, it is the presentation tier that accepts the input from users and displays the web pages to users.  The presentation tier is the highest-level tier in the web applications where the interface is placed through which the user interacts directly with the web applications. That is why it is also known as the communication layer.

The presentation tier defines the format of the web pages, where the information/data is to be displayed and accepted. This tier runs on a web-based application or web browser and is usually built using JavaScript, CSS, and HTML etc.

You can learn more about the three tiers of web applications at

https://brainly.com/question/12627837

#SPJ4

Where are 'if' and 'else' statements shown when printing a document in a word processor?

Answer the question and then your task is to:

Write an algorithm or sequence of instructions that include the IF statement for the document being printed.

Answers

Explanation:

cpt price

Adam’s cousin, John, has a utility function given by V (B, W) = 3B 2 + W2 . (d.1) Are John’s preferences monotone? Are they strictly monotone? Justify your answers. (3 marks) (d.2) Are John’s preferences convex? Are they strictly convex? Justify your answers. (3 marks) (d.3) Do John’s preferences satisfy the diminishing marginal rate of substitution property? Explain. (2 marks) (d.4) Assume that the prices are as indicated above (PB = 5 and PW = 40), and John’s income is I > 0. Obtain John’s optimal bundle. (4 marks)

Answers

Optimal bundle = B* = [(1700/3)/(5+8(40/3))] = (680/11)The optimal bundle is B* = (680/11) units and W* = (13600/99) units.

Adam’s cousin John has the utility function given by V (B, W) = 3B 2 + W2, where B and W are bundle quantities of two goods. John’s preferences are analyzed and discussed below:d.1) Are John’s preferences monotone? Are they strictly monotone? Justify your answers.John's preferences are monotone, which means more of either good is preferred to less. However, his preferences are not strictly monotone since he has the ability to have indifference curves.d.2) Are John’s preferences convex? Are they strictly convex? Justify your answers.John's preferences are convex, which means he prefers an average bundle to an extreme one. However, his preferences are not strictly convex since he has the ability to have indifference curves.d.3) Do John’s preferences satisfy the diminishing marginal rate of substitution property? Explain.John's preferences satisfy the diminishing marginal rate of substitution (MRS) property since the MRS of one good for the other decreases as the quantity of that good increases. John’s preferences satisfy the diminishing MRS property because the marginal utility of W decreases as the quantity of W increases while the marginal utility of B remains constant. Mathematically, MRS = MUW/MUB = 2W/6B = W/3B, where the MRS decreases with the increase in the quantity of B.d.4) Assume that the prices are as indicated above (PB = 5 and PW = 40), and John’s income is I > 0. Obtain John’s optimal bundle.John's optimal bundle will be determined using the MRS equation because he has perfect information about the prices and his income. Let's solve for W in terms of B: MRS = PW/PB = 40/5 = 8W/2(3B2)W = 40B/3John's income = PB x B + PW x W = 5B + 40(40B/3) = (1700/3)BWe can now substitute the value of John's income into the equation to obtain the optimal bundle.

Learn more about optimal bundle here :-

https://brainly.com/question/30790584

#SPJ11

patulong po need na po ngayon 20 pts po ibibigay ko thanks​

patulong po need na po ngayon 20 pts po ibibigay ko thanks

Answers

4 this is really all you need to hear it’s very not compliant EE I hope this helpped and the bro above is not a hot tutor at all!

the unicode coding scheme supports a variety of characters including those for chinese, japanese, and arabic languages.

Answers

It also supports symbols from a variety of other languages, including mathematical symbols, and other symbols used in various cultures.

The Unicode coding scheme is used to represent text in a variety of languages and scripts, as well as a wide range of symbols. It is the most widely used character encoding scheme in the world and is used to support a wide range of languages, including those for Chinese, Japanese, and Arabic.

Unicode also supports symbols for mathematics, technical symbols, and symbols from other cultures. Unicode is the standard for encoding text on computers and other digital devices and is used in many webpages, software applications, and databases.

Learn more about Unicode: https://brainly.com/question/5230447

#SPJ4

PLS HELP ILL GIVE BRAINLY) enter the answer) desktop publishing software enables users to create products for print or __________ distribution

Answers

Answer:

Electronic

Explanation:

the last part of an sql query to be read is the ________ statement.

Answers

The last part of an SQL query to be read is the FROM statement.

The FROM statement specifies the table or tables from which the data will be retrieved in the query. It defines the source of the data for the query and identifies the tables that will be involved in the query's operation. The tables specified in the FROM statement are where the database engine looks for the requested data. After the FROM statement, other parts of the SQL query such as WHERE, GROUP BY, HAVING, ORDER BY, and LIMIT may follow, depending on the specific requirements of the query.

The ORDER BY statement is typically placed at the end of the query, after the SELECT, FROM, WHERE, and other clauses. It ensures that the result set is presented in a desired order, making it easier to interpret and analyze the data. For example, if you have a table of employees and you want to retrieve their names in alphabetical order, you would use the ORDER BY statement like this: "SELECT * FROM employees ORDER BY name ASC".

Learn more about SQL query here:

https://brainly.com/question/31663284

#SPJ11

What type of communication takes place between two individuals or parties and involves the use of encryption so that only the desired individuals have access to what is being said or heard

Answers

Answer:

private

Explanation:

What is the term used to designate that a particular operating system will no longer be supported by its manufacturer or managing entity?

Answers

The term that is used to designate that a particular operating system will no longer be supported by its manufacturer or managing entity is End-of-life.

What is an Operating System?

This refers to the interface that is used to connect the application and system software in a computer and enables it to function.

Hence, we can see that when a particular operating system will no longer be supported by its manufacturer or managing entity, this is known as End-of-life.

Read more about operating systems here:

https://brainly.com/question/1763761

#SPJ1

Consider using merge-join to join two relations (student and takes) on a single attribute, say, ID. Further assume that the records are not sorted by ID but each relation has a secondary index on ID. Explain why merge-join is not a good idea and propose a better join algorithm

Answers

merge-join is not a good idea because Non-indexed data from the table is utilized in this relationship. Hash Join is preferable to merge-join for unsorted, big, and non-index data. In certain circumstances, Hash Join is recommended.

The merge join is used to connect two separate data sources represented in a table. On larger tables, it performs better.

Both the student and the taker have an ID in this connection. A secondary Index ID is assigned to each relation.

As a result, hash join outperforms merge join in unsorted and non-indexed input data. It is made up of the probe phase and the construction phase.

It creates a hash table and inserts the probe hash value into the second-row entries. The key is computed based on the join clause key, and the outer relation record is returned.

Learn more about Data Base Systems and Apps here: https://brainly.com/question/24027204

#SPJ4

Other Questions
please help i only have an hour!!! i need help with both of the following questions Whose limeade has a weaker like flavor? Jerome solved the equation below by graphing. log subscript 2 baseline x log subscript 2 baseline (x minus 2) = 3 Mhanifa Please help find angle 1,2,3,4 and 5 thanks! The simulator allows you to add the same amount of heat energy to different materials e. G. Water, oil, iron, brick. If you are able to measure the temperature of these materials as you are heating them would you predict that each will have the same temperature changes? Help PLEAZE with all theses PLEASE HELP ASAP!!!!! The Reefs By Marcella Morris She clutched her lab work to her side walking briskly towards school. The snow fell in typical New York flurries and the ground was still icy from last nights freeze. Careful not to slip, she climbed the steps and crossed the campus towards the science building. What am I doing? she murmured. Sophies worse habit was talking to herself in public. I have been warned.You are just a high school kid, Sophie, they warned. What makes you think you are capable of solving this crucial environmental issue? Stop wasting your time. The professors would not give her laboratory time to complete research nor would they share their expertise with her. But, she could not stop. After that snorkeling trip she took with her aunt to the coral reefs, she felt that something had shifted inside her. The snorkeling guide made one fact very clear- these colonies of tiny organisms would not last. In fact, wed be lucky if they lasted 5 more years. She cared about the safety of these coral reefs more than she has cared about anything for a long, long time. She had to do something for the fragile, endangered habitat with its fish, mollusks, worms, crustaceans and many more. So, she used her money to create a lab at her aunts house. She worked tirelessly endlesslysleeping only when she had to. Its what mom and dad would have done, she thought. Her best friend Sam, would hang out with her everydayeating pizza, fries, and whatever else he could get his hands on, keeping her company with his humor while Sophie worked on her experiments. And now, she has a biological solution in her hands. She hesitated at the door to the labs. Nervously, she shifted her lab report from one hand to the other. I know that have an innovative approach to solving the coral reef issue and I know I can help, she said to no one. The image of being ridiculed by these professors, delayed her entry. She stood outside the door, wanting to run back- wanting to hide- glued to the icy spot. Hey, Sophie! She turned at the unexpected sound of Sams voice. Ive been... trying to catch up with you, he panted- out of breath. Lets go in and... show them... what youve got. Sophie tilted her head, smiled at Sam and opened the door. She walked confidently to the front, laid out her research on the podium and began her presentation. When her presentation ended, it was to the enthusiastic sound of the scientists applause.' Write a one paragraph summary of the story that explains how theme develops in, The Reefs. Oil is also known as Help! Urgent! its due in 2 hours You are required to source suppliers for a digital decoder for radio signals for rural people. Several suppliers have been identified to source and supply decoders. Carry out a supplier development programme for identified suppliers. 4.1 Explain the steps in supplier development. 4.2 Develop an ethical code of conduct for the selected suppliers. 4.3 Explain Ethical issues relating to suppliers what is the formula for number of moles? Tubaugh Corporation has two major business segments--East and West. In December, the East business segment had sales revenues of $380,000, variable expenses of $205,000, and traceable fixed expenses of $45,000. During the same month, the West business segment had sales revenues of $1,050,000, variable expenses of $536,000, and traceable fixed expenses of $201,000. The common fixed expenses totaled $310,000 and were allocated as follows: $155,000 to the East business segment and $155,000 to the West business segment. A properly constructed segmented income statement in a contribution format would show that the segment margin of the East business segment is:____________. a. $205,000 b. $130,000 c. $(23,000) d. $(20,000) list the steps for snf payment determination 4. Which concept best identifies American attitudes about World War I when thwar began in Europe?O isolationismO imperialismO militarismO nationalism which ordered pair would be plotted in quadrant 3 On an island with pineapples, why would trade be important? On an island with only smart phones, potatoes, and clothes, why would trade be important? pls solve some question and pls check wether answer is right or not? A frequency polygon shows the shape of a distribution and is similar to:- frequency table- pie chart- bar chart The local grocery store is having a sale on sports drinks. For a particular brand of sports drink, a 6-pack of 20-ounce bottles costs $4.96. What is the unit price (per ounce) for the sports drink? Round your answer to the nearest cent. the expression 2L+2w is used to find the perimeter of a rectangle with length L and width w. What is the perimeter of a rectangle with length 15cm and width 4cm?