the process of creating workable information systems in a very short period of time is called: prototyping. jad. rad. sdlc. end-user development.

Answers

Answer 1

The process of creating workable information systems in a very short period of time is called option B: Rapid Application Development (RAD).

What is the information systems?

RAD is a technique for developing software applications that places a strong emphasis on devising quick prototypes and frequent incremental modifications.

The goal is to expedite the development process by engaging users, stakeholders, and development teams in collaborative meetings referred to as Joint Application Development (JAD) sessions.

Learn more about information systems from

https://brainly.com/question/1521627

#SPJ1


Related Questions

How does air gap networking seek to keep a system secure? by taking extra steps to ensure the DMZ server is fully patched to deal with the latest exploits by physically isolating it from all unsecured networks, such as the internet or a LAN by focusing on the security of the system through detection devices and incident reports

Answers

Air gap networking seeks to keep a system secure by physically isolating it from all unsecured networks, such as the internet or a LAN  Thus, the correct option for this question is B.

What do you mean by the Air gap in networking?

The air gap in network security may be defined as a type of measure that is utilized in order to ensure a computer network is physically isolated in order to prevent it from establishing an external connection, specifically to the Internet.

According to the context of this question, this process is used in order to ensure the security of the computer and computer network by physically isolating it from unsecured networks such as the internet or a LAN.

Therefore, the correct option for this question is B.

To learn more about Air gap networking, refer to the link:

https://brainly.com/question/14752856

#SPJ1

Consider each step in the selling process. Which steps
could be conducted through technology (Internet, webinars, etc.)?
Which are most important to handle "face-to-face"?

Answers

In the selling process, there are several steps that can be conducted through technology, leveraging the internet, webinars, and other digital tools.

These steps include:

1. Prospecting: Technology can play a crucial role in identifying and reaching potential customers. Through online platforms, social media, and digital advertising, salespeople can effectively prospect and generate leads without the need for face-to-face interactions.

2. Initial contact and communication: The initial contact with prospects can be established through various digital means, such as email, online chat, or video conferencing. Salespeople can leverage these channels to introduce themselves, initiate conversations, and gather initial information about the prospect's needs and interests.

3. Presentations and demonstrations: Technology enables salespeople to conduct presentations and product demonstrations remotely through webinars, virtual meetings, or video conferences. These platforms allow for effective visual and audio communication, showcasing the features and benefits of the product or service to potential customers.

4. Proposal and negotiation: The process of creating and sharing proposals with prospects can be handled through technology. Salespeople can use email or online document-sharing platforms to send proposals, pricing details, and negotiate terms remotely.

5. Closing the sale: Depending on the complexity of the sale, closing can be facilitated through technology. Contracts and agreements can be signed electronically using e-signature tools, and online payment systems can be utilized for secure and efficient transactions.

Learn more about internet :

https://brainly.com/question/31546125

#SPJ11

Create code in HTML of a webpage that has an image that opens a page with the Wikipedia website when clicked. (Refer to Image)

Create code in HTML of a webpage that has an image that opens a page with the Wikipedia website when

Answers

Here is the Code.

you may need to change it a bit

Hopefully it Help you out :-)

Create code in HTML of a webpage that has an image that opens a page with the Wikipedia website when

Computer engineering is a career that......

Answers

Answer:

Computer engineering is a career that works on the development and research of new technology-related things.

Explanation:

What is mutual exclusion? List and explain busy waiting, spin lock.

Answers

It is to be noted that Mutual Exclusion is a concept in computer science that is used to describe the principle that only one process or thread can gaina ccess to a shared resource at a given time.

What is the explanation for the above response?

Note that Mutual Exclusion is usually done to prevent concurrent access to a resource where this could lead to an unwanted result or outcome.

Note that Busy waiting on the other hand can be explained as a technique of synchronization that is used to implement mutual exclusion.

Spin lock on the other hand is a tyhpe of busy waiting technique that uses repeated executution of a loop to ensure that there is availableity of resource.

Learn more about thread at:

https://brainly.com/question/13607822

#SPJ1

5. question 5 a data analyst inputs asterisks before a word or phrase in r markdown. how will this appear in the document?

Answers

If a data analyst inputs asterisks before a word or phrase in r markdown. the way that it will appear in the document is as a bullet point.

What does bullet point meaning?

It is used on a list item that has a big dot in front of it to indicate how important it is.

You should use lower case at the beginning of each bullet point, unless it begins with a proper name, and each one should be brief (no more than one line). You avoid using full stops in bullet points; instead, you should try to start a new one or extend with commas, dashes, or semicolons.

Therefore, A typographic sign or glyph known as a bullet or bullet point, •, is used to denote the first item in a list. For instance: Points 1, 2, and 3 The bullet symbol can be shaped in a number of different ways, including circular, square, diamond, and arrow. An .rmd file can have bullet points by using asterisks.

Learn more about bullet point from

https://brainly.com/question/29108821
#SPJ1

who decides how and when data in an organization will be used or controlled? who is responsible for seeing that these decisions are carried out?

Answers

In an organization, the process of deciding how and when data will be used or controlled is usually carried out by the data governance committee.

It is the governing body that decides how and when data will be used or controlled by the organization. It is responsible for creating, maintaining, and enforcing policies, procedures, and standards for data management across the organization.Data governance is important because it helps to ensure that an organization's data is accurate, complete, and secure. It also ensures that data is used in a way that complies with regulatory requirements and meets the needs of stakeholders.

The committee is responsible for overseeing the implementation of data policies and procedures across the organization. It also monitors data usage and quality to ensure compliance with data governance policies and regulations.In addition to the data governance committee, the Chief Data Officer (CDO) is responsible for overseeing data management across the organization. The CDO is responsible for ensuring that data is managed as an enterprise asset and that it is used to support the organization's strategic objectives.

Learn more about data governance committee: https://brainly.com/question/30886486

#SPJ11

Eli needs to export files from his mailbox into a single file that is portable and can be backed up to removable media. Which file type will he use?

Answers

Answer:

PST

Resource:

This question has already been answered here: https://brainly.com/question/18415952

Explanation:

PST is the personal storage table, which is a file built by Microsoft to store data from outlook and other services too.  Really quick, this may or may not be an option that you are looking for but, what I would do in my opinion would be to use the PST and export it on a removable USB, since USBs are removeable media.

what descriptions can be used for last,first,PR_ID and CID

Answers

Answer:

x r

Explanation:

this is the answer like it thank you

FILL IN THE BLANK. in a(n)___, the web becomes an integral part of the application, rather than just a communication channel, and systems analysts need new application development tools and solutions to handle the new systems.

Answers

In an internet-based system, the web becomes an intrinsic part of the program as opposed to merely a communication channel, necessitating new application development tools and solutions for systems analysts to manage the new systems.

INTERNET-BASED SYSTEM

Integrated, Internet-based business information systems, one of the newest Internet technologies meant to manage enterprise databases, are beginning to be implemented, particularly by corporations and other large businesses. The purpose of these systems is to provide complete data warehousing in a highly efficient manner. This implies that, in properly built systems, information is recorded just once, regardless of whether it pertains to a contact or a property record.

The Building Blocks

Internet-based systems integrate the Internet, intranet, and extranet as their primary information sources.

Internet

As nearly everyone is aware, the Internet hosts the publicly accessible portion of a company's website. It should include marketing information, general company details, service offerings, contact information, and market-specific data.

Intranet

In contrast, access to an intranet, which is the private portion of a company's website, is restricted to employees. Numerous applications, including contact management programs, company calendars, company rosters, commission management systems, and listing management programs, may be found in this field.

Extranet

The extranet is a secret section of a company's website that clients, external contractors, and business partners can access. Extranets are frequently password-protected and may also feature additional hardware- and software-based security mechanisms. This section should contain information that the organization deems proper to share with its external connections, such as corporate rosters and project management cabinets, which are central locations for sharing files and other project-related information.

Additionally, updating information in the database is simple. For instance, if a client's address changes, only one person is required to enter the new information, and the entire database is automatically updated. Similarly, if someone has a meeting with a client, the meeting's notes can be posted immediately. This is a significant change and improvement in company communications for the majority of organizations.

Learn more about Internet-Based System here:

https://brainly.com/question/28465205

#SPJ4

how to change default paper size in word 2016

Answers

To change the default paper size in Word 2016, you can follow these steps:

1. Open Microsoft Word 2016.

2. Click on the "File" tab in the top left corner of the screen.

3. Select "Options" from the drop-down menu. This will open the Word Options dialog box.

4. In the Word Options dialog box, click on "Advanced" in the left-hand sidebar.

5. Scroll down to the "Print" section.

6. Locate the "Paper Size" option and click on the drop-down menu next to it.

7. Select the desired default paper size from the available options, such as Letter, A4, Legal, etc.

8. Click on the "OK" button to save the changes and close the Word Options dialog box.

By following these steps, you can change the default paper size in Word 2016, and all new documents will use the selected paper size as the default.

To learn more about Dialog box - brainly.com/question/28655034

#SPJ11

please help Which of the following statements best explains how people may be heard by means of the Internet?

-All information on the Internet is freely accessible to everyone.
-Some information on the Internet is restricted, and some is available only to a specific audience.
-Some information on the Internet is restricted, though typically only to minors.
-All information on the Internet is accessible to everyone, though some of it must be purchased.

Answers

Answer:

The statement that best explains how people may be heard by means of the Internet is "Some information on the Internet is restricted, and some is available only to a specific audience." While it is true that there is a lot of freely accessible information on the Internet, there is also a significant amount of information that is restricted and only available to certain audiences. This can include things like password-protected websites, subscription-based content, or content that is restricted to certain geographic regions. Additionally, there are laws and regulations in place to protect minors from accessing certain types of content on the Internet. Therefore, the most accurate statement is that the Internet contains both freely accessible information as well as restricted information that is only available to specific audiences.

Mark me as brainliest!

brainly needs captcha before answering questions right?​

Answers

No, atleast I haven’t seen it

Which connection type is a wireless method of sending information using radio waves?
O Cable
O Wi-Fi Fiber
Otic cable
O Broadband
please i need help but dont put up a wed site​

Answers

Hoped that helped lol, but yeah, the rest of them need wires

Edit: CAN I HAVE BRAINLIEST.

Java Coding help please this is from a beginner's class(I AM DESPERATE)
The info is added in the picture

Java Coding help please this is from a beginner's class(I AM DESPERATE)The info is added in the picture

Answers

Answer:

import java.io.File;

import java.io.FileNotFoundException;

import java.util.*;

class Main {

 public static void main(String[] args) {

 try {

  Scanner scanner = new Scanner(new File("scores.txt"));

     int nrAthletes = scanner.nextInt();

     ArrayList<String> athletes = new ArrayList<String>();

     int winnerIndex = 0;

     Double highestAverage = 0.0;

     

  for(int i=0; i<nrAthletes; i++) {

       // Get the name of the athlete as the first item

       String athleteName = scanner.next();

       athletes.add(athleteName);

       

       // Start collecting scores

       ArrayList<Double> scores = new ArrayList<Double>();        

       while(scanner.hasNextDouble()) {

         scores.add(scanner.nextDouble());

       }

       

       // Remove lowest and highest

       scores.remove(Collections.min(scores));

       scores.remove(Collections.max(scores));

       

       // Calculate average

       double sum = 0.0;

       for(double score: scores) {

         sum += score;

       }

       Double averageScore = sum / scores.size();

       // Keep track of winner

       if (averageScore >= highestAverage) {

         highestAverage = averageScore;

         winnerIndex = i;

       }

       

       // Output to screen

      System.out.printf("%s %.2f\n", athleteName, averageScore );

  }

     // Output winner

     System.out.printf("Winner: %s\n", athletes.get(winnerIndex) );

  scanner.close();

 } catch (FileNotFoundException e) {

  e.printStackTrace();

 }

 }

}

Explanation:

Of course this code lacks error handling, but it shows an approach using the scanner object and array lists.

In the Metropolitan City of Deep State there are 5 hospitals (DS1 to DS5)
DS1’s revenue is $1 billion
DS2’s revenue is $2 billion
DS3’s revenue is $4 billion
DS4’s share is 2X the share of DS5.
Total revenue of all 5 hospitals in Deep State is $25 billion
Compute the HH Index.

Answers

The HH Index for Deep State is 0.28, which indicates a high level of market concentration in the healthcare industry. The top 3 hospitals control 28% of the market share.

Here is the HH Index for Deep State:

HH Index = (DS1 + DS2 + DS3) / (Total Revenue) = (1 + 2 + 4) / 25 = 0.28

This means that the top 3 hospitals in Deep State control 28% of the market share. This is considered to be a high HH Index, which suggests that there is a high level of market concentration in the healthcare industry in Deep State.

The HH Index for Deep State is 0.28, which indicates a high level of market concentration in the healthcare industry. The top 3 hospitals control 28% of the market share.

Read more about market share here:

https://brainly.com/question/15530466

#SPJ4

write a statement that calls the recursive function backwards alphabet() with input starting letter. sample output with input: 'f' f e d c b a

Answers

Using the knowledge in computational language in python it is possible to write a code that write a statement that calls the recursive function backwards alphabet() with input starting letter.

Writting the code:

def backwards_alphabet(n):

 if ord(n) == 97:

   return n

 else:

   return n + backwards_alphabet(ord(n-1))

See more about python at brainly.com/question/12975450

#SPJ1

write a statement that calls the recursive function backwards alphabet() with input starting letter.

Angela wrote some lines of code that she wants to test. She will need to use __________. IDLE open source a prompt a file path

Answers

Answer:

Python Interpreter

Explanation:

Angela wrote some lines of code that she wants to test. She will need to use a python interpreter. IDLE open source a prompt a file path

A python interpreter helps a programmer to debug his/her codes line by line i.e to check if there are any error present in the code for necessary adjustment. Codes cannot be understood ordinarily by computer because they are are machine languages hence the reason why python interpreter is needed to translate the line of codes of the programming language.

Note that python interpreter will be used to interpret the lines of code due to the learning environment/filepath used which is IDLE.

There are different options to use in programming. Angela wrote some lines of code that she wants to test. She will need to use an  IDLE.

IDLE is known to be a short term for Integrated Development and Learning Environment. This is defined as is an integrated development environment mainly for  Python, which has been compressed together with the default implementation of the language.

IDLE is meant to be a simple IDE and can be used by any beginners, most those from the educational sector or environment.

Learn more about  IDLE from

https://brainly.com/question/16074586

Airports and distances between them would best be represented by what type of graph, assuming you wanted to keep track of customers' flown miles? A. Directed, weighted B. Undirected, unweighted C. Directed, unweighted D. Undirected, weighted

Answers

The best type of graph to represent airports and distances between them while keeping track of customers' flown miles would be a) directed, weighted graph.

The directed aspect of the graph would show the one-way nature of flights between airports, while the weighted aspect would allow for the representation of the varying distances between each airport pair. A directed graph allows us to represent the direction of flights between airports. Since flights are one-way, it is important to distinguish the direction of each flight.

For example, we can represent a flight from airport A to airport B with a directed edge pointing from A to B. This allows us to determine the origin and destination of each flight. So the answer is: a) directed, weighted graph.

Learn more about airport track:https://brainly.com/question/29061245

#SPJ11

Can someone help me on a 60 second ringtone :(

Can someone help me on a 60 second ringtone :(

Answers

Answer:

If you have an apple phone, its as easy as importing it into Garage Band, cutting it to size, and exporting it as a ringtone or even a text tone. My text tone is now Megalovania.

Although there are specific rules for furniture placement that should generally be followed, sometimes you will need to bend the rules a little bit. When might it be acceptable to bend the rules for furniture spacing?

Answers

However, it might be acceptable to bend the rules for furniture spacing in certain situations such as:

1. Limited space: If you have a small room, you may need to move furniture closer together than recommended to make the most of the available space.

2. Personal preferences: If you prefer a certain arrangement that may not follow the standard rules, it is acceptable to adjust the spacing to suit your taste and style.

3. Unique room layout: Sometimes, the shape and layout of a room may require you to adjust the furniture spacing to fit the space properly.

4. Multifunctional spaces: If a room serves multiple purposes, such as a living room that also serves as a home office, you may need to modify the furniture placement to accommodate the different functions.

Regardless of the situation, it's crucial to ensure that the furniture arrangement still provides a comfortable and functional space.

What is Ce stands for?
O Carbon character
O Carbon calender
Carbon copy
O character change​

Answers

Explanation:

hello I don't know ok sorry

Write an interactive program to calculate the volume and surface area of a three-dimensional object

Answers

Answer in Python:

# Define program constants

PI = 3.14

# Welcome the user to our program

print("### Welcome to the Sphere Volume Calculator")

# Ask for the Radius (r) input and store it as a float

radius = float(input("Type the Radius of your sphere in meters: "))

# Calculate the volume

volume = 4 / 3 * PI * radius ** 3

# Print the result

print("Your sphere volume is:", volume, "m³")

References:

https://www.w3schools.com/python/python_variables.asphttps://www.w3schools.com/python/python_casting.asphttps://www.w3schools.com/python/python_user_input.asphttps://www.w3schools.com/python/python_operators.asphttps://www.w3schools.com/python/ref_func_print.asp

Decimal numbers are based on __________.

letters (a and b)
16 digits
10 digits
two digits (1s and 0s)

Answers

They are based on 10 digits.

I’m not sure.

Answer:

They are based on 10 digits.

Explanation:

I just did the test and got the answer right.

Can someone please help with this thanks luvs c

Can someone please help with this thanks luvs c

Answers

Answer:

HELLO, be nice spread love... DO NOT HATE ON OTHERS

░░░░░▐▀█▀▌░░░░▀█▄░░░

░░░░░▐█▄█▌░░░░░░▀█▄░░

░░░░░░▀▄▀░░░▄▄▄▄▄▀▀░░

░░░░▄▄▄██▀▀▀▀░░░░░░

░░░█▀▄▄▄█░▀▀░░

░░░▌░▄▄▄▐▌▀▀▀░░ This is Bob

▄░▐░░░▄▄░█░▀▀ ░░

▀█▌░░░▄░▀█▀░▀ ░░ Copy and paste him so he can take over brainly.

░░░░░░░▀███▀█░▄░░

░░░░░░▐▌▀▄▀▄▀▐▄░░

░░░░░░▐▀░░░░░░▐▌░░

░░░░░░█░░░░░░░░█░

COPY AND PASTE LETS DEFEAT BRAINLY

Explanation:

True or false. The send e-mail feature, listed under tools, will allow you to send an e-mail to your instructor and to fellow students directly from your online course in blackboard.

Answers

Answer:

TRUE

Explanation: please mark me brainliest

Match the image to its type.


Rgb messes up taking pics from a iPhone 11 to a computer sorry it looks bad

Match the image to its type.Rgb messes up taking pics from a iPhone 11 to a computer sorry it looks bad

Answers

Warm Colors:

Red flowersOranges

Cool Colors:

Blue skiesPurple butterflies

Neutral Colors:

Brown woodWhite birds

Reds, oranges, and yellows are considered warm, and greens, teals, blues, and purples are considered cool. Colors such as white, black, brown, or gray are all neutral.

How are the waterfall and agile methods of software development similar?

Answers

The waterfall and agile methods of software development are similar in that they both aim to develop software in an organized and efficient manner. However, they differ in the approach they take to achieve this goal.

The waterfall method is a linear, sequential method of software development. It follows a defined process with distinct phases, such as requirements gathering, design, implementation, testing, and maintenance. Each phase must be completed before the next phase can begin, and changes to the software are not allowed once a phase is completed.

On the other hand, Agile method is an iterative and incremental approach to software development. It emphasizes on flexibility, collaboration, and customer satisfaction. Agile method encourages regular inspection and adaptation, allowing for changes and improvements to be made throughout the development process. Agile methodologies, such as Scrum and Kanban, follow an incremental approach, where the software is developed in small chunks called iterations or sprints.

Both Waterfall and Agile approach have their own advantages and disadvantages and are suitable for different types of projects and teams. It is important to choose a method that aligns with the specific needs and goals of the project and the team.

OSPF was conceived as the successor to RIP and as such has a number of advanced features. Discuss 3 (three) such advances of OSPF ( 6 marks) 3.4 Are interior routing protocols suitable for exterior routing? Motivate answer. ( 3 marks) Examine the sample router configuration session below (line numbers added for reference), and answer the following questions: Router >enable Router\#configure terminal Router (config)\#line vty 09 Router (config-line)\#no login Router (config-line)\#exit Router (config)\#enable secret passwd 999 NOP Router (config)\#hostname exam WNEH (a) What is the purpose of the commandsin lines 1,2, and 5-whyare they necessary? (b) What is the purposeof line 3 ? (c) What is the purposeof line 4 ? ( d) Which privileged access level password (line 6) has been configured here? Copy the letter of the correct answer to your exam pad. (a) 999 (b) passwd 999 (c) secret 999 (d) secret passwd 999 (e) passwd Router Windhoek has the following routing table: C10.0.0.0/8 is directly connected, Serial 1R 5.0.0.0/8 [120/1] via 172.16.0.1, Serial 2 R 192.168.0.0/24 [120/2] via 172.20.0.1, Serial 3 (a) Assuming that Windhoek is applying the Split Horizon principle, what is the content of Windhoek's next routing update... 1....sent out of interface Serial 2?2....sent out of interface Serial 3 ? (b) Assuming that Windhoek is applying the Poison Reverse principle, what is the content of Windhoek's next routing update... 1....sent out of interface Serial 2? 2...sent out of interface Serial 3 ?

Answers

Three advances of OSPF include: Fast Convergence: OSPF uses a link-state database and Dijkstra's algorithm to calculate the shortest path,  OSPF can handle large networks due to its hierarchical design.Support for Classless Inter-Domain Routing (CIDR): OSPF supports CIDR, which allows for more efficient utilization of IP addresses by enabling variable-length subnet masks.

OSPF's fast convergence is achieved by utilizing a link-state database, which contains information about the network's topology. Each router floods updates about its directly connected links to other routers in the network, allowing them to build and maintain an accurate picture of the network.

The hierarchical design of OSPF enhances scalability. By dividing the network into areas, OSPF limits the exchange of routing information to routers within the same area, reducing the overall complexity and traffic overhead. This design enables OSPF to handle larger networks with improved efficiency.

The support for CIDR in OSPF allows for more efficient utilization of IP address space. With CIDR, variable-length subnet masks can be used, enabling more flexible allocation of IP addresses. This helps conserve address space and provides greater flexibility in network design. CIDR support is particularly crucial in today's internet, where the depletion of IPv4 addresses necessitates efficient address allocation and management.

learn more about CIDR here

brainly.com/question/29427390

#SPJ11

assume the average memory access time is 3 cycles and a cache hit is 1 cycle. what is the maximum hit rate we can have for the average access time to be 3 cycles if a cache miss takes 120 cycles? you answer should not include the % character - just a number.

Answers

The maximum hit rate for the average access time to be 3 cycles is approximately 0.0167.

We can use the following formula to calculate the average memory access time with cache:

Average Access Time = Hit Time + Miss Rate x Miss Penalty

where Hit Time is the time it takes to access the cache when there is a hit, Miss Rate is the probability of a cache miss, and Miss Penalty is the time it takes to access memory when there is a cache miss.

Given that the average access time is 3 cycles, the Hit Time is 1 cycle, and the Miss Penalty is 120 cycles, we can rearrange the formula to solve for the maximum hit rate:

Miss Rate = (Average Access Time - Hit Time) / Miss Penalty

Substituting the given values, we get:

Miss Rate = (3 - 1) / 120 = 0.01666666667

Therefore, the maximum hit rate for the average access time to be 3 cycles is approximately 1.67%.

Learn more about The Average Access Time: https://brainly.com/question/29908120

#SPJ11

Other Questions
Given the ellipse : (x-3)? 16 + (y-1) 9 = 1 (a) Graph the ellipse and label the coordinates of the center, the vertices and the end points of the minor axis on the graph Vous savez parler anglais ? Write an explicit formula for an,the nthterm of the sequence 4, 1, 2, .... Exercises about Present Continuous Tense1. Pass the sentences to PRESENT CONTINUOS.a) Jane rides a bike all the weekends.b) I jump in all the parties that I go.c) My friend does the school's work at night.d) My mother make cake all the weekends.My friends and I ride a bike every weekend. We enjoyed it very much.f) George have a long hair.g) I bring a snack to school all the day.h) I sleep until late every day.i) I think to go to London next year.j) I play computer games in my bedroom. f(x)=10x2+19x-29 f(23) A spherical model of planet Earth has a radius of 3 ft. What is the approximate volume of the model of planet earth? Use 3. 14 to approximate pi. Round to the nearest hundredth if necessary. Enter your answer as a decimal in the box. Ft. How many structural isomers does C5H12 have?a. twob. threec. oned. five Barbara is going to buy a shirt for 15.00$ and a pair of pants for 25.00$. She has to also pay 7% sales tax. If Barbara pays with a 50$ bill, how much change will she get back? uring 2008, college work-study students earn a mean of $1478. Assume that a sample consisting 45 of the work-study students at a large university was found to have earned a mean of $1503 during that year with a standard deviation $210. At 5% significance level does the average earning of work-study students were significantly higher than the national mean? Can some1 pls help me summarize these 2 pages pls c. Cul es el propsito del emisor con este mensaje? Explicamos.d. Identificamos los argumentos plateados en el texto.e. Cul es nuestra opinin sobre el tema? Argumentamos Give an example, from any biome, of how two types of organisms may interact with each other in the following ways: predator/ prey a married couple friends $3,500 support for their unmarried daughter aged 18, during the year. in june, the daughter borrowed $4,000 from the bank under a federally insured loan program. she is the money to pay for her college tuition. she had no other income and no one else provided any of her support. her parents would like to claim the daughter as a dependent but they cannot because she fails which one of the dependency tests? age gross income member of household or relationship support kjhlkjlijeASRLQJSFDLJASLDFJALSKDJFLKASKJDF Help Me Please this is due in like 15 Minutes!!!!! An oncology laboratory conducted a study to launch two drugs A and B as chemotherapy treatment for colon cancer. Previous studies show that drug A has a probability of being successful of 0.44 and drug B the probability of success is reduced to 0.29. The probability that the treatment will fail giving either drug to the patient is 0.37.Give all answers to 2 decimal placesa) What is the probability that the treatment will be successful giving both drugs to the patient? b) What is the probability that only one of the two drugs will have a successful treatment? c) What is the probability that at least one of the two drugs will be successfully treated? d) What is the probability that drug A is successful if we know that drug B was not? What type of faulting would you expect to see in central California? thrust strike-slip faulting reverse normal Question 2 What type of fault is the Anatolia fault in Turkey? All of the other answers are correct, and thus this is the best answer. right-lateral strike-slip fault left-lateral strike-slip fault right-lateral normal fault Why are stream channels offset as they cross a strike-slip fault zone? Underground water pathways are often shifted by fault movements. All of the ground shaking from a series of earthquakes makes the fault jump to the side. Horizonal movement along the fault zone moves the downstream channel to the right or the left (depending on the type of strike-slip faulting). All of the ground shaking from a series of earthquakes makes the stream channel jump to the side. Question 4 0.34 pts What type of a fault is the San Andreas fault? right-lateral normal fault left-lateral strike-slip fault left-lateral normal fault right-lateral strike-slip fault Even though predicting earthquakes is not possible, studies along the San Andreas fault zone reveal that the recurrence interval between major earthquakes is about years. Instructions: fill in the blank with the best answer. 20,000 2500 200 10 if you drive through a red traffic light, you may get a ticket. if the light is green, you will not get a ticket. in operant conditioning terms, the red and green lights serve as Jan Hunt was a football coach at the University of Oklahoma. Hunt attended an invitational secondary school track meet that his son was participating in. Sometime in the afternoon, Hunt laid down on a row of bleachers to sunbathe while waiting for his sons next event. Nearby, Geoff a member of the board of directors of Eagle Resources Company (Eagle), told his spouse that he wanted to dispose of or liquidate Eagle, that several companies were bidding on Eagle, and that an announcement of a "possible" liquidation of Eagle might occur the following week. Geoff told this to his spouse in the context of his anticipated business schedule the following week in order to make necessary childcare arrangements.Unbeknownst to Geoff, Hunt overheard the conversation about Eagle. After the track meet, Hunt purchased Eagle stock based on the overheard information. The Securities and Exchange Commission (SEC) learned of the trades and filed an action against Hunt claiming that he committed insider trading.Geoff would be treated as an outsider in regard to Eagle and possessed a fiduciary duty to the company. Assessment question An individual who receives tips from an insider is known as a tippee and is liable for insider trading if the following requirements are met: 1) There is a breach of a duty not to disclose , 2) The disclosure is made in exchange for personal benefit, and 3) The tippee knows or should know of this breach and benefits from it. Assessment question When Geoff told his wife about Eagle in the context of arranging childcare, Geoff did not breach his fiduciary duty to the company not to disclose inside information. Geoff inadvertent disclosure to Hunt did not occur in exchange for personal benefit. Assessment question Hunt, the tippee, did not know or should have known there had been a breach by the insider when Hunt overheard the conversation. Given the facts above, Hunt is likely not guilty of insider trading.Assessment question What If the Facts Were Different? Assume that Geoff and Hunt were close friends, and Geoff told Hunt about the pending liquidation of Eagle in exchange for 50% of the profits that Hunt made from the trade. In this case, Geoff is likely be found guilty of insider trading because Geoff did breach a duty not to disclose inside information. The disclosure was made for Geoff personal benefit. Hunt is likely to be found guilty of insider trading. A court would likely find that Hunt knew or should have known about the breach of duty by Geoff and also received personal gain.Are bolded words correct? Number ranges: What is the range of a 7-bit number using the following representations? (a) unsigned binary (b) two's complement (c) sign/ magnitude