What are the benefits of using disk cleanup as part of regular maintenance on a computer? Check all of the boxes that apply.

Trash is emptied to clear space on the hard drive.

Files that are no longer needed are deleted to clear space and help the computer run faster.

Accumulated temporary files are deleted to help the computer run faster.

Unnecessary program files that may slow down the computer are deleted.

Answers

Answer 1

Answer:

all of the above

Explanation:

Answer 2

Answer:

Trash is emptied to clear space on the hard drive.

Files that are no longer needed are deleted to clear space and help the computer run faster.

Accumulated temporary files are deleted to help the computer run faster.

Unnecessary program files that may slow down the computer are deleted.

Explanation:

It's all of the above


Related Questions

an 80-year-old male presents to his gp complaining of difficulty breathing. pulmonary function tests reveal he has increased residual volume. the most likely cause of this disorder is:

Answers

The most likely cause of increased residual volume in an 80-year-old male presenting with difficulty breathing is chronic obstructive pulmonary disease (COPD).

Increased residual volume refers to the amount of air that remains in the lungs after a person exhales completely. In the context of an 80-year-old male with difficulty breathing, it is a common finding in COPD, a progressive lung disease that primarily affects older individuals with a history of smoking or exposure to respiratory irritants.

COPD is characterized by airflow limitation due to the narrowing of the airways and destruction of lung tissue. This leads to difficulties in exhaling air and trapping more air in the lungs, causing an increased residual volume. Other symptoms of COPD may include chronic cough, wheezing, and shortness of breath.

COPD is usually caused by long-term exposure to irritants, such as cigarette smoke, air pollution, or occupational hazards. The disease is typically irreversible and can significantly impact the quality of life. Management of COPD focuses on symptom relief, smoking cessation, medication, and pulmonary rehabilitation programs to improve lung function and overall respiratory health.Chronic obstructive pulmonary disease (COPD) is a common respiratory disorder that requires long-term management and care. Understanding the underlying causes, risk factors, and treatment options is crucial for effective diagnosis and support for individuals living with COPD.

Learn more about pulmonary disease

brainly.com/question/33594111

#SPJ11

When working with text boxes and shapes, which tab contains settings for applying shadows and 3-D rotation to objects?

Answers

Answer:

The answer is "Effects".

Explanation:

The effects and 3-D rotary features were included in the Home tab of Microsoft Presentation. It allows some special effects on the slides. In the presentation, it can animate text, images, forms, tables, SmartArt graphic-plural as well as other objects. The object could appear, disappear or travel through effects. You can change the size or color of an item.

which of the following is an html-supported kind of path?

Answers

An html-supported kind of path is D.Both A and B (absolute, and relative).

What is HTML, and what purposes does it serve?

The language used to describe the organization of Web pages is called HTML. Authors can publish online documents containing headings, text, tables, lists, images, etc. thanks to HTML. Click a button to quickly access internet content using hypertext links.

The set of markup symbols or codes entered into a file intended for display on the Internet is known as HyperText Markup Language (HTML). The markup instructs web browsers on how to display the text and pictures on a web page.

Learn more about html at;

https://brainly.com/question/17959015

#SPJ1

complete question;

which of the following is an html-supported kind of path?

A.absolute

B.relative

C.interpreted

D.Both A and B

How do you write a MLA format paper?

Answers

Answer: There is already a format called MLA in docs that you can use.

Explanation:

To write a paper in MLA format, you need to follow the guidelines outlined by the Modern Language Association (MLA).

What is MLA format ?

MLA format is a writing style developed by the Modern Language Association (MLA). It is used mainly in the humanities, particularly in English and other language-related studies. It is a style of formatting academic papers that includes guidelines for citing sources, structuring papers, and formatting citations. It also includes instructions on how to format the paper, including margins, font size, line spacing, title page, and the use of in-text citations. The primary purpose of MLA format is to make papers easier to read and understand, while also providing a consistent format for citing sources.

This includes using a 12-point font size, double-spacing, 1-inch margins, page numbers, and including a header with your last name and page number. You also need to include a title page, which should include the title of your paper, your name, and the name of your teacher or professor. The body of the paper should include an introduction, body paragraphs, and a conclusion.

To learn more about MLA format
https://brainly.com/question/3405188
#SPJ4

How are hyperlinks created and used within a presentation? Check all that apply. Hyperlinks are set to open another source file. Linked files are stored in the same folder location. Hyperlinks are permanently embedded within a slide. Hyperlinks can open websites, files, or other presentations. Hyperlinked content typically cannot be opened by end users. Hyperlinks can be assigned to text, graphics, and other objects.

Answers

Hyperlinks are created and used within a presentation included with another source file. Linked files are stored in the same folder location. It can open websites, and files or be assigned to text, graphics, etc.

What do you mean by presentation?

Hyperlinks are created and can be used within a presentation. These are set to open another source file. Linked files are stored in the same folder location.

These can open websites, files, or other presentations and can be assigned to text, graphics, and other objects.

Learn more about Presentation here:

https://brainly.com/question/649397

#SPJ2

Answer:

A, B, D, F

Explanation:

right on edge22

what is the mass of a cookbook

Answers

Answer:

it varies on the size of the cookbook

Explanation:

Write a program that computes an integer's checksum. To compute the checksum, break the integer into its constituent digits and, working from right to left, doubling every second digit. If the product results in a number with two digits, treat those two digits independently. Then, sum all the digits for the final checksum. For example, 1496 has a checksum of 21. We compute this by first breaking 1496 into constituents and doubling the ever second digit => 6, 18, 4, 2. Then, the individual digits are summed as 6 + (1 + 8) + 4 + 2 = 21.

Answers

Answer:

def checksum(num):

   total = 0

   count = 0

   while num > 0:

       digit = num % 10

       count += 1

       if count % 2 == 0:

           digit *= 2

           while digit > 0:

               total += digit % 10

               digit //= 10

       else:

           total += digit

       num //= 10

   return total

   

num = int(input("Enter an integer: "))

print("Checksum:", checksum(num))

if there’s anything to amend, please let me know. thank you!


Name three major types of computer systems with which students are likely to be
engaged on a day-to-day basis.

Answers

Answer:

Analogue, digital, and hybrid computer systems.

What might you expect to find out about people who are described as credit risks?

Answers

What might you expect to find out about people who are described as credit risks? They have a history of not making their payments on time. Which is a long-term consequence of making late payments on your bills? It will be harder to secure a new loan at a low rate.

you are teaching a class about basic camera functions like power, basic date/time, menu navigation, and how to properly attach and remove lenses from a DSLR or hybrid camera. While you would likely do a lot more showing than telling while teaching, share a script of what you would say to properly explain how to perform these basic actions.

Answers

Answer: So, I would start the class off with this, “Camera’s are so crucial to life, why because they capture light and memories that are a once and a lifetime thing.” Then after the students dwelling on that statement, I would start with talking about how to set up a camera. I would pull out mine and pull up a diagram on the green screen and show them step by step what I do. First, you want to turn the camera on by turning the switch where the white line lines up with “on”, once you are, then you want to set up the time and date. To do so, you want to click on the menu button, once you are in, there should be a list of five options, you want to go to the setup menu. Once there you want to click on “World time” there you can change the date and time.  Once you have set up the time you want to go back to the menu screen, there are 5 options. The five options are called “playback menu”, “Shooting menu”, “Custom Setting menu”, “Setup menu” and “retouch menu”. These five have various purposes in which we will get to later on inside of the lesson. Now camera lenses are super easy, when you are changing or taking off lens, there should be a button on the left side of the camera right under your camera model name. Hold that button in with one hand and grab the lens with the other, then you want to twist the lens till it comes off. To put it back on you want to line up the white dots and it should slide in and then twist it back on.  

Explanation: That is the answer

It should be noted that a camera simply means an optical instrument that's used to capture images or to record moving images.

A camera simply consists of a lens that focuses light from the scene. In a camera, the viewfinder is vital in viewing and framing the subject.

The flash is vital in producing light. The camera lens is important to shift between focal lengths. The shutter button is used to capture it record images.

Learn more about camera on:

https://brainly.com/question/609508

How do ACLs work on a router?

Answers

Answer:

An ACL is a list of permit or deny rules detailing what can or can't enter or leave the interface of a router. Every packet that attempts to enter or leave a router must be tested against each rule in the ACL until a match is found. If no match is found, then it will be denied.

Explanation:

PLEASE MARK ME AS BRAINLIEST

how can your knowledge about the different materials and tools in making fashion accessories help you in your daily living during this pandemic time?​

how can your knowledge about the different materials and tools in making fashion accessories help you

Answers

Answer:

https://brainly.com/question/28492454?utm_source=android&utm_medium=share&utm_campaign=question

Explanation:

please help me

Who has gotten a random file link from someone? What file does it contain?

Answers

Answer:

those are bots , just report those

Explanation:

I got it but I didn’t download it cuz it looks sketchy he literally posted that same link to everyone who has made a question so I would advise not to download it

in a basic program with 3 IF statements, there will always be _________ END IIF's.
a)2
b)3
c)4

Answers

Answer:

c)4

Explanation:

Hope it could helps you

To generate a control break report, your input records must be organized in ____ order based on the field that will cause the breaks.

Answers

To generate a control break report, your input records must be organized in directory order based on the field that will cause the breaks.

What is directory?

Directory serves as guide in locating a particular item.

The directory is written in a way for an individual or an employee to understand and be able to retrieved needed information.

Therefore, to generate a control break report, your input records must be organized in directory order based on the field that will cause the breaks.

Learn more on directory below

https://brainly.com/question/14364696

#SPJ1

Implement the frame replacement algorithm for virtual memory
For this task, you need to perform the simulation of page replacement algorithms. Create a Java program which allows the user to specify:
the total of frames currently exist in memory (F),
the total of page requests (N) to be processed,
the list or sequence of N page requests involved,
For example, if N is 10, user must input a list of 10 values (ranging between 0 to TP-1) as the request sequence.
Optionally you may also get additional input,
the total of pages (TP)
This input is optional for your program/work. It only be used to verify that each of the page number given in the request list is valid or invalid. Valid page number should be within the range 0, .. , TP-1. Page number outside the range is invalid.
Then use the input data to calculate the number of page faults produced by each of the following page replacement algorithms:
First-in-first-out (FIFO) – the candidate that is the first one that entered a frame
Least-recently-used (LRU) –the candidate that is the least referred / demanded
Optimal – the candidate is based on future reference where the page will be the least immediately referred / demanded.

Answers

To implement the frame replacement algorithm for virtual memory, you can create a Java program that allows the user to specify the total number of frames in memory (F), the total number of page requests (N), and the sequence of page requests.

Optionally, you can also ask for the total number of pages (TP) to validate the page numbers in the request list. Using this input data, you can calculate the number of page faults for each of the three page replacement algorithms: First-in-first-out (FIFO), Least-recently-used (LRU), and Optimal.

To implement the frame replacement algorithm, you can start by taking input from the user for the total number of frames (F), the total number of page requests (N), and the sequence of page requests. Optionally, you can also ask for the total number of pages (TP) to validate the page numbers in the request list.

Next, you can implement the FIFO algorithm by maintaining a queue to track the order in which the pages are loaded into the frames. Whenever a page fault occurs, i.e., a requested page is not present in any frame, you can remove the page at the front of the queue and load the new page at the rear.

For the LRU algorithm, you can use a data structure, such as a linked list or a priority queue, to keep track of the most recently used pages. Whenever a page fault occurs, you can remove the least recently used page from the data structure and load the new page.

For the Optimal algorithm, you need to predict the future references of the pages. This can be done by analyzing the remaining page requests in the sequence. Whenever a page fault occurs, you can replace the page that will be referenced farthest in the future.

After processing all the page requests, you can calculate and display the number of page faults for each algorithm. The page fault occurs when a requested page is not present in any of the frames and needs to be loaded from the disk into memory.

By implementing these steps, you can simulate the frame replacement algorithm for virtual memory using the FIFO, LRU, and Optimal page replacement algorithms in your Java program.

To learn more about virtual memory click here:

brainly.com/question/30756270

#SPJ11

Question 8 Assign strings to the names you and this so that the final expression evaluates to a 10-letter English word with three double letters in a row. Essentially we're starting with the word 'beeper' and we want to convert this to another word using the string method replace. Hint: The call to print is there to print out the intermediate result called This should be an English word with two double letters in a row. Hint 2: Run the tests if you're stuck. They'll give you some hints. you = .. this = ..' a = 'beeper' the = a. replace('p', you) print('the:', the) the. replace('bee', this) check('tests/q8.py') Question 9 Use len to find out the number of characters in the very long string in the next cell. (It's the first sentence of the English translation of the French Declaration of the Rights of Man.) The length of a string is the total number of characters in it, including things like spaces and punctuation. Assign sentence_length to that number. a_very_long_sentence = "The representatives of the French people, organized as a National Assembly, believing that the ignoran sentence_length =⋯ sentence_length check('tests/q9.py')

Answers

Question 8: In this case, 'beeper' will be transformed to 'bookkeeper',
Question 9: We use the len() function after assigning the value to sentence_length.

Question 8:
you = "lll"
this = "leelll"
a = 'beeper'
the = a.replace('p', you)
print('This:', the)
final_word = the.replace('bee', this)
print('Final word:', final_word)

you = 'r'
this = 'o'
a = 'beeper'
the = a.replace('p', you)
print('the:', the)
result = the.replace('bee', this)
print('result:', result)
Question 9:
a_very_long_sentence = "The representatives of the French people, organized as a National Assembly, believing that the ignoran"
sentence_length = len(a_very_long_sentence)
print('Sentence length:', sentence_length)

a_very_long_sentence = "The representatives of the French people, organized as a National Assembly, believing that the ignoran"
sentence_length = len(a_very_long_sentence)

To learn more about len() function, click here:

brainly.com/question/18437552

#SPJ11

one challenge presented by the volume of big data is that _____.

Answers

Big data mostly refers to data collections that are too vast or complex for software used for traditional data processing to manage.

What problems does huge data that is abundant present?

Analyzing this data is necessary to improve decision-making. Big Data can provide some issues for businesses, though. Data quality, storage, a shortage of data science experts, validating data, and gathering data from many sources are a few of these.

What does "volume" in the context of big data mean?

Volume. The volume refers to the volume of data that needs to be saved. As an example, Walmart makes advantage of big data. They manage more than 1 million customer transactions while adding more than 2.5 petabytes of data to their database per hour.

To know more about  big data visit:-

https://brainly.com/question/15000382

#SPJ1

Select the correct answer.
Janet composed a poster with this image. Which rule of composition is significant in this image?
O A. alignment
OB.
contrast
OC. hierarchy
OD. rhythm
O E symmetry

Select the correct answer.Janet composed a poster with this image. Which rule of composition is significant

Answers

Answer:

The answer i think is c tell me if it is right

Answer:

B- Contrast

Explanation:

Which menu or tab contains the command to SHOW or hide the ruler? File View . Format Insert​

Answers

Answer:

If you're asking for Microsoft Word, then you press File View to show and hide the ruler.

Explanation:

To see the ruler, you go into Files, then Options, and then Advanced. In there, will be "Show Vertical Ruler", in the Print Layout View.

A measuring cylinder is used to measure the volume of an irregular
solid object.​

Answers

Answer:

Yes it is used for measuring the volume of irregular solid objects for example a peice of stone, rubber etc.

Explanation:

what is the minimum amount of available buffer space advertised at the received for the entire trace? does the lack of receiver buffer space ever throttle the sender? g

Answers

The minimum amount of available buffer space advertised at the receiver  Information  for the entire trace is zero. Yes, the lack of receiver buffer space can throttle the sender if the receiver does not have enough buffer space to handle the incoming traffic.

The minimum amount of available buffer space advertised at the receiver for the entire trace is zero. This means that at some point in the trace, the receiver buffer was completely filled, and no more data could be accepted. When the receiver buffer is full, the sender will be throttled and will need to reduce their transmission rate in order to allow the receiver to process the data in their buffer. This can cause a decrease in performance if the sender is sending data faster than the receiver can handle. In the case of buffer overflow, the sender will be forced to decrease the transmission rate until the receiver is able to keep up with the data stream. The lack of receiver buffer space can also cause packet loss if the sender is unable to reduce their transmission rate fast enough to prevent the buffer from overflowing.

Learn more about Information here:

brainly.com/question/12947584

#SPJ4

Which code segment results in true being returned if a number is even?

Answers

The code segment that results to true if a number is even is:

def is_even(num):

   if num % 2 == 0:

       return True

   else:

       return False

You can call the function is_even(num) and pass any number as an argument to check if it's even or not. It will return true if the number is even and false if it's odd.

Another way to check this is;

def is_even(num):

   return num % 2 == 0

You can also use a shorthand form for this, i.e.,

def is_even(num):

   return not num%2

It will also give the same result.

The output of the code would be "true" if the input number is even and nothing if the input number is odd. As the output of this code is only returning true if the number is even.

To learn more about code segment:

brainly.com/question/20063766

#SPJ4

Find the equation of a line which has 10 points the following two coordinates: (4, 0) and (3, 4)​

Answers

Answer:

The equation of the line is y = -4·x + 16

10 points on the line include;

(0, 16), (1, 12), (2, 8), (3, 4), (4, 0), (5, -4), (6, -8), (7, 12), (8, -16), (9, -20), and (10, -24)

Explanation:

The given points through which the line passes are;

(4, 0) and (3, 4)

The slope, 'm', of the line is given as follows;

\(Slope, \, m =\dfrac{y_{2}-y_{1}}{x_{2}-x_{1}}\)

Therefore, the slope of the line is (4 - 0)/(3 - 4) = -4

In point and slope form we can get;

\(\dfrac{y-0}{x-4} = -4\)

The equation of the line in point and slope form is therefore;

y = -4·(x - 4) = -4·x + 16

The equation of the line in slope and intercept form is

y = -4·x + 16

10 points on the line are obtained using the equation of the line and the desired x-values input into cells on MS Excel and presented here as follows;

(0, 16), (1, 12), (2, 8), (3, 4), (4, 0), (5, -4), (6, -8), (7, 12), (8, -16), (9, -20), and (10, -24)

Find the equation of a line which has 10 points the following two coordinates: (4, 0) and (3, 4)

Cookie Scenario:public int removeVariety(String cookieVar)

Answers

The method removeVariety(String cookieVar) in the Cookie scenario would likely be a public method used to remove all cookies from the cookie jar that match the given variety.

This method would likely take a String parameter representing the variety of cookie to be removed and return an integer representing the number of cookies that were removed from the jar. The method would likely use a loop to iterate over the cookies in the jar and check if each cookie's variety matches the given cookieVar parameter. If a match is found, the cookie would be removed from the jar and a counter would be incremented. The method would then return the final count of cookies that were removed.

To learn more about variety  click on the link below:

brainly.com/question/3544037

#SPJ11

what are the three parts of the ecrime ecosystem that crowdstrike highlighted in their report?

Answers

In their report, CrowdStrike highlighted three key parts of the eCrime ecosystem: cybercriminals, infrastructure, and targets.

CrowdStrike's report on the eCrime ecosystem identifies three crucial components. First, the report focuses on cybercriminals, who are the individuals or groups responsible for carrying out malicious activities online. These cybercriminals employ various tactics, such as malware distribution, phishing, and ransomware attacks, to exploit vulnerabilities and gain unauthorized access to systems and data. They often operate in organized groups or syndicates and may have diverse skill sets, ranging from technical expertise to social engineering abilities.

Second, the report highlights the importance of infrastructure in the eCrime ecosystem. This refers to the tools, resources, and networks that cybercriminals utilize to launch their attacks. Infrastructure components include botnets, command-and-control servers, hosting platforms, and underground forums. Cybercriminals rely on these elements to facilitate their operations, communicate with each other, distribute malware, and monetize their activities through various means, such as selling stolen data on the dark web.

Lastly, the report emphasizes the targets of eCrime. These can be individuals, businesses, government agencies, or any entity that possesses valuable information, assets, or resources. Cybercriminals select their targets based on factors such as potential financial gain, geopolitical interests, or ease of exploitation. High-profile targets may include financial institutions, healthcare organizations, critical infrastructure providers, or multinational corporations. By infiltrating these targets, cybercriminals aim to steal sensitive data, extort money, disrupt operations, or gain unauthorized access to valuable assets.

Overall, CrowdStrike's report underscores the interconnected nature of the eCrime ecosystem, involving cybercriminals, infrastructure, and a wide range of potential targets. Understanding these components is crucial for organizations and cybersecurity professionals in developing effective strategies to mitigate the risks posed by cybercrime.

learn more about crowdstrike here:

https://brainly.com/question/31639389

#SPJ11

6.3.6: Create your own Encoding on codehs be confusing.

6.3.6: Create your own Encoding on codehs be confusing.
6.3.6: Create your own Encoding on codehs be confusing.

Answers

A general example of an encoding scheme that contains A-Z and space is given below.

How to illustrate the information

In this example, we can assign the following binary codes to each character:

A: 00

B: 01

C: 10

...

Z: 10101

Space: 10110

Using this encoding scheme, the phrase "HELLO WORLD" would be represented as:

00010101100101100110000010101011001010000001101

As you can see, this encoding scheme requires a varying number of bits to represent each character, with shorter codes assigned to more commonly used letters and longer codes assigned to less commonly used letters. This can help to minimize the total number of bits required to encode a message.

Learn more about encoding on

https://brainly.com/question/3926211

#SPJ1

Yael would like to pursue a career where she helps design office spaces that are comfortable and help workers avoid injuries. What should she study? plsss help me with this question.

A. ergonomics

B. semantics

C. botany

D. genomics

Answers

The option that that  Yael should study is A. Ergonomics.

What is the study about?

Ergonomics is the scientific study of designing products, systems, and environments to optimize human comfort and health, including the design of office spaces.

Therefore, Yael could study ergonomics to gain the skills and knowledge necessary to design office spaces that are safe, efficient, and comfortable for workers. An ergonomist might work with architects, interior designers, and other professionals to ensure that the design of an office space takes into account the needs of the workers who will be using it.

Learn more about injuries from

https://brainly.com/question/19573072

#SPJ1

Which of these expressions is used to check whether num is equal to value?
num ? value
num = value
num – value
num == value

Answers

Answer:

num-value

Explanation:

is should equal to zero if it is correct.

Answer:

It is num - value

Explanation:

I got it right on the test

5. aim to prevent buffer overflows by hardening programs when they are created. a. compile-time defenses b. shellcodes c. run-time defenses d. all the above choose the best answer and explain.

Answers

compile-time defenses aim to prevent buffer overflows by hardening programs when they are created. Here, the global variable (static) section of memory is affected by a buffer overflow, and this sort of defense seeks to fortify programs to fend off attacks in fresh programs.

What is buffer overflow?

A buffer overflow, also known as a buffer overrun, is an anomaly that occurs when a computer sends data to a buffer past the buffer's boundary and overwrites nearby memory locations. All kinds of software can be impacted by buffer overflows. They frequently happen as a result of incorrect inputs or an insufficient amount of buffer space being allocated. If the transaction overwrites executable code, the software may perform erratically, produce false results, make memory access mistakes, or crash.

To learn more about buffer overflow, use the link given
https://brainly.com/question/15122085
#SPJ4

Other Questions
many model organisms in microbiology reproduce in minutes, not hours. for example, e. coli, one of the most popular bacteria to study in the lab, divides every 20 minutes. with this in mind, do you think this makes research on tb more difficult than studying some other bacterial diseases? explain why in 1-2 sentences. Stitches - RUs is considering purchasing a sewing machine which will automate its processes. The company could sell more products; however, their old sewing machine cannot produce products fast enough. As a result, if the new sewing machine were purchased, sales would increase. The company has two purchase options: a brand-new machine or a refurbished machine. Details on each purchase is as follows (the brand-new machine is more efficient and can produce more units and therefore generate more infiows per year). Compute the present value of the refurbished machine. Retailing and Omoichannel Marketing Research (Chapter 16) 1) Consider Tillamook Maker's Reserve 2018 Extra Sharp Cheddar. Which one of the retailers below would be the best fit this product? (Highlight one answer) a. 7-11 b. New Seasons C. Walmart d. Amazon Explain your answer using course concepts: Carbon dioxide is a greenhouse gas, if atmospheric concentrations increased rapidly what is a possible outcome?. as listed in a table of standard electrode potentials, the reactants in the half-reactions are potential _____ agents, while the products of the half-reactions are potential _____ agents. The sum of two numbers is 34. The smaller number is 12 less than the larger number. What are the numbers? PLEASE!!!!! HELP!!!!!!! 11. What does it mean for a design to be content driven? (1 point)O The design focuses on visual appeal over functionality.O The design contains more decoration than information.O The design focuses on functionality over visual appeal.O The purpose(s) for the design are all equally important. Given the definitions of f(x) and g(x) below, find the value of g(f(-3)). 9. Which of the following group techniques allows group members to meet together, but at the same time facilities independent decision making? A) brainstorming B) nominal group technique C) large meetings of over 50 individuals D) small meetings of less than 10 individuals 10. The use of ringisei in Japanese organizations reflects which of the following values in Japanese culture? A) tradition-following B) consensus-seeking C) risk taking D) go-it-alone 15 POINTSUsing Pythagoras' theorem, calculate the lengthof XY.Give your answer in centimetres (cm) to 1 d.p. in the small town of wellsville, there is only one grocery store. given that everyone needs food, we would expect that this grocery store: a. prices competitively. b. charges exorbitant prices. c. faces a perfectly inelastic demand. d. is a monopoly and hence highly profitable. what transportation intermediary is a nonprofit cooperative which arranges for members' shipments? A places distance above or below sea level is its __________. A. projection B. distortion C. estimation D. elevation Please select the best answer from the choices provided A B C D ANSWER QUICK!!Use the frequency polygon to work out an estimate for the mean rounded to 1 DP. Let me give ............. advice dont marry him! a) some b) a piece of c) an d) the Help me with this question!! Write an article for publication in one of the national newspaper on the topic the usefulness of mobile phone this days father is 20 years older than to win. if the aim of their age is 40 years . find the answer What happens to an atom of sulfur (S) if it loses an electron?Question options:A) It becomes an anion.B) It becomes inert.C) It becomes a cation.D) It becomes a molecule.