what is the deffinition of a bus network topology. along with a list of benifits and disadvantages of using a bus topology with many devices attatched. will give brainliest if answer is complete and good.

Answers

Answer 1

Answer:

all nodes in the network are connected directly to a central cable that runs up and down the network. When there is a tiny network, it works quite well. The needed wire length is smaller than in a star topology. It's simple to add or delete devices from this network without affecting others. When compared to other network topologies such as mesh and star, it is quite cost-effective.

Explanation:


Related Questions

Whats the difference between Input and Output? Give and example of an example on a M:B​

Answers

Answer:

Entrar en algún lugar no es como irse de algún lugar, o qué tipo de pregunta significa para mi acción

why does low air pressure usually indicate bad weather?

Answers

Areas with high pressure typically have calm, fair weather. Areas with low pressure have comparatively thin atmospheres.

Why does poor weather typically signal low air pressure?

Low pressure causes active weather. The atmosphere becomes unstable when the air rises since it is lighter than the surrounding air masses. When the air pressure increases, water vapor in the air condenses, creating clouds and rain, among other things. Both severe weather and active weather, such as wind and rain, are brought on by low pressure systems.

What type of weather lowers air pressure?

Low-pressure areas are typically associated with bad weather, while high-pressure areas are associated with calmer winds and clear skies (such as cloudy, windy, with potential for rain or storms).

To know more about low air pressure visit:-

https://brainly.com/question/2194071

#SPJ4

Please Help!

Assume that you have an array named items containing 100 integers, and an integer named numItems that represents the number of valid integers currently used in the array. All elements from items[numItems] to items[items.length-1] have values of 0.


The following code is designed to calculate and print the average of the valid array elements:

int sum=0, count;
for (count = 0; count < items. length; count++)
{
statement 1
}
statement 2


Which of the following substitutions for and will cause this code to correctly print the average of the valid array elements in items?


A. Statement 1:
sum += items[count];

Statement 2:
System.out.println((double)sum / count);

B. Statement 1:
sum += items[count];

Statement 2:
System.out.println((double)sum / items.length);

C. Statement 1:
sum += items[count];

Statement 2:
System.out.println((double)sum / numItems);

D. Statement 1:
sum += items[items.length-1];

Statement 2:
System.out.println(sum / 100);

E. Statement 1:
sum += items[items.length-1];

Statement 2:
System.out.println((double)sum / numItems);

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This question is about calculating the sum and average of the elements in the given array.

The code is given below:

int sum=0, count;

for (count = 0; count < items. length; count++)

{

statement 1

}

statement 2

Then this question is asked that which of the following substitutions for and will cause this code to correctly print the average of the valid array elements in items?

So, The correct answer is A. Because the first statement counts the sum of all the given elements in the array. And, the second statement print the average (sum/count) and store result in double.

A. Statement 1:

sum += items[count];  

Statement 2:

System.out.println((double)sum / count);

So that the correct and complete program is given below:

int sum=0, count;

for (count = 0; count < items. length; count++)

{

sum += items[count];  

}

System.out.println((double)sum / count);

determining the context of a text or media piece helps ypu:

Answers

also but if always two point eight eighty

Binary is represented by two digits, write out each and describe what each means:

Answers

Answer:

binary is represented by 1 and 0

Explanation:

the binary of 1 means it has value, and the binary of 0 means it has no value. with a combination of 1s and 0s, you can get a complex program to run, like this platform :) what it basicly does is a true or false kinda think. just think of it that way: true or false, value or no value, and yes or no. the 1 is a positive value and the 0 is a negative value that has no value.

I hope this helps you :D

In binary, the 0s and 1s signify OFF and ON, respectively.

What do the binary numbers 1 and 0 represent?

In binary, the 0s and 1s signify OFF and ON, respectively. A "0" in a transistor indicates that no electricity is flowing, while a "1" indicates that electricity is flowing.

Numbers are physically represented inside the computing equipment in this fashion, allowing calculations.

Learn more about binary numbers here:

https://brainly.com/question/13371877

#SPJ4

Consider the following program:

01 y = input("enter a number")
02 x = y MOD 5
03 if x == 0 then
04 print (True)
05 endif

Which programming constructs are not used in this program?
Selection
Sequence
Iteration

Answers

Answer:

Iteration is not used in the program

Explanation:

Analysing the program one line at a time.

The first two lines are:

y = input("enter a number")

x = y MOD 5

The above lines show a sequential control structure. This is so because the first line is executed before the second (i.e. in sequence).

The third to the last lines are:

if x == 0 then

print(True)

endif

When a program includes at least one if statement or condition, this means that the program contains a selection program control structure.

The above lines may or may not be executed depending on the condition  (if x == 0 then)

If the value of x is 0 then, True will be printed. If otherwise, True will not be printed

The program does not use iteration control structure because no part of the code were looped or repeated.

Gino has purchased a secondhand laptop. It came preinstalled with various application software and system tools. Which tools can he use for these situations? disk cleaner data recovery utility diagnostic program antivirus Gino's system is acting odd after browsing the internet, and he needs to scan the system. arrowRight Gino needs to check the operational status of the computer's hardware and software. arrowRight Gino notices many corrupted files and wants to extract good data from them. arrowRight Gino needs to locate unnecessary files that are taking up a considerable amount of space. arrowRight

Answers

Answer:

The answer to this question is given below in the explanation section

Explanation:

This question is about matching the column. So, Gino used the various preinstalled application software and system tools for the following purposes.

Disk cleaner: Gino needs to locate unnecessary files that are taking up a considerable amount of space.

Data recovery:  Gino notices many corrupted files and wants to extract good data from them.

Utility diagnostic program: Gino needs to check the operational status of the computer's hardware and software.

Antivirus: Gino's system is acting odd after browsing the internet, and he needs to scan the system.

Adjust the code you wrote for the last problem to allow for sponsored Olympic events. Add an amount of prize money for Olympians who won an event as a sponsored athlete.

Sample Run 1
Enter Gold Medals Won: 1
For how many dollars was your event sponsored?: 5000
Your prize money is: 80000
Sample Run 2
Enter Gold Medals Won: 2
For how many dollars was your event sponsored?: 25000
Your prize money is: 175000
Sample Run 3
Enter Gold Medals Won: 3
For how many dollars was your event sponsored?: 15000
Your prize money is: 240000
Sample Run 4
Enter Gold Medals Won: 4
For how many dollars was your event sponsored?: 1
Your prize money is: 300001
The Get_Winnings(m, s) function should take two parameters — a string for the number of gold medals and an integer for the sponsored dollar amount. It will return either an integer for the money won or a string Invalid, if the amount is invalid. Olympians can win more than one medal per day.

Answers

The code wrote for the last problem to allow for sponsored Olympic events is given below:

What is code?

Code is a set of instructions, written using a programming language, that tell a computer what tasks to perform. It is a set of commands and instructions that allow a computer to perform specific tasks. Code can be used to create software applications, websites, games, and even mobile applications.

def Get_Winnings(m, s):

 """

 Calculate the prize money for an Olympic event sponsored by a given dollar amount.

 

 Parameters:

   m (string): The number of gold medals won.

   s (int): The amount of money sponsored for the event.

 

 Returns:

   int: The prize money won by the athlete.

   string: "Invalid" if the sponsored amount is invalid.

 """

 if s <= 0:

   return "Invalid"

 else:

   medal_value = s * 8  # Each gold medal is worth 8x the sponsored amount

   winnings = int(m) * medal_value

   return winnings

To learn more about code
https://brainly.com/question/29330362
#SPJ1

a user is hiking in a city park. the user wants to make a call home but cannot get a reliable cellular signal. what are two possible causes for the bad cellular coverage? (choose two.)

Answers

We can see here that the two possible causes for the bad cellular coverage are:

B. The user is located between coverage areas of the carrier.

E. There are not enough cell towers in the area.

What is cellular coverage?

Cellular coverage is the area where a cellular network can provide service to mobile devices.

When a user is located between coverage areas of the carrier, the signal from the nearest cell tower may be weak or intermittent. This can cause dropped calls, poor reception, and slow data speeds.

If there are not enough cell towers in the area, the signal from the nearest cell tower may also be weak or intermittent.

Learn more about cellular coverage on

#SPJ4

The complete question is:

A user is hiking in a city park. The user wants to make a call home but cannot get a reliable cellular signal. What are two possible causes for the bad cellular coverage? (Choose two.)

A. The distance to the nearest Wi-Fi access point is too far.

B. The user is located between coverage areas of the carrier.

C. The location service is turned off.

D. The Bluetooth headset is unpaired.

E. There are not enough cell towers in the area.

true/false: in c and other object oriented programming languages, adt's are normally implemented as classes

Answers

True. In C and other object-oriented programming languages, Abstract Data Types (ADTs) are typically implemented as classes.

Classes in these languages provide a mechanism for encapsulating data and behavior into a single entity. An ADT defines a high-level abstraction of a data structure along with the operations that can be performed on it, while hiding the internal implementation details.

By implementing ADTs as classes, developers can define the structure, properties, and behavior of the data type. Classes allow for data encapsulation, information hiding, and the ability to define methods that operate on the data within the ADT. This approach promotes modularity, code reusability, and enhances the organization and maintenance of the codebase.

However, it's worth noting that in C, which is not purely object-oriented, ADTs can also be implemented using structures and functions. The use of classes is more prevalent in languages like C++, Java, and C#.

Learn more about object-oriented programming here:

https://brainly.com/question/31741790

#SPJ11

why key logger are essential for computer system

Answers

Answer:

This question kind of confusing but I'm gonna try to answer it:

Keyloggers are activity monitoring software programs that provide hackers access to your data.

So its not really good to have on you're computer since is a spyware and they can access to your personal data

explain the look of a document which contains several different font sizes and font colors​

Answers

Answer:

Colorful and dynamic?

Explanation:

The  look of a document that has several different font sizes and font colors​ is one that has undergone editing to give it a kind of uniqueness.

What is name of the document?

A document file name is said to be the name that  is given to an electronic file copy of a document.

The document file name  is one that can be written in different ways. The HTML style is known to be an element that is often used to add a lot of styles to an element, such as color, font of a document.

Learn more about document  from

https://brainly.com/question/16650739

If you mistakenly undo an action, how do you correct your mistake?
a. press CTRL+R
b. click the redo button in the quick access toolbar
c. click the undo button in the quick access toolbar
d. press CTRL+Z

Answers

If you mistakenly undo an action  press CTRL + Z in order to correct your mistake.

Option D is correct.

What functions do the undo and redo commands serve?

Press Ctrl + Z to undo an action; press Ctrl + Y to redo an undone action. The Undo and Redo features allow you to remove or repeat single or multiple typing actions; however, you can only undo or redo actions in the order in which you did them; you are unable to skip actions.

Undo :

Undo is a method of interaction that is used by many computer programs. It restores the document to an earlier state by erasing the most recent modification. Undo will overwrite the last command that was executed on the file that is being edited in some more advanced programs, like graphic processing software.

Learn more about CTRL + Z:

brainly.com/question/29386414

#SPJ4

Which of the following is true? Select all that apply.
User intent refers to what the user was trying to accomplish by issuing the query

Answers

The option which is true is: User intent refers to what the user was trying to accomplish by issuing the query.

What is a query?

In database management, a Query (often issued with Structured Query Language - SQL) a kind of programming language for storing and processing informatin in a database that is relational is used to interact with data to present useful information for decison making.

Hence, it is is a true statement to indicate that the User's Intent (in this context) is what the user was trying to attain when they issue Queries.

Learn more about query at:

https://brainly.com/question/30900680

#SPJ1

How does the brain influence your emotions, thoughts, and values? A) it rejects sensory signals. B) It controls your reaction to emotions C) It assesses the cost sensory signals D) It makes you forget any prior memories

Answers

The brain influence your emotions, thoughts, and values as it rejects sensory signals. The correct option is A.

What are sensory signals?

A sensory activation tends to occur when a physical or chemical stimulus is processed by a sensory receptor into a neural signal (sensory transduction).

Chemical messengers such as serotonin and dopamine are used to send signals across the network.

These signals are received by brain regions, resulting in us recognizing objects and situations, assigning emotional value to them to guide behavior, and making split-second risk/reward assessments.

Thus, the correct option is A.

For more details regarding sensory signals, visit:

https://brainly.com/question/12031863

#SPJ1

Identify the tips to create a well-designed digital portfolio.
Felicity consulted her professor at her university for help in creating a digital portfolio. Her professor told her about the importance of creating a well-designed digital portfolio. She finally began work on the same.

A. She accessed a computer to build a digital portfolio.
B. She created a personal website with a unique URL for her online portfolio.
C. She took out the text that described her images from her portfolio.
D. She accessed a printer with could print high resolution images.

Answers

Answer:

B. She created a person website with a unique URL for her online portfolio

Explanation:

firewall rules evaluate from top to bottom. the rule creators intended to block access to a website hosted at 10.15.1.2, except from hosts located on the 10.20.0.0/16 subnet. however, users on that subnet report that they cannot access the site. what is wrong?

Answers

The reason users cannot access the site is: The rules are misordered.

About Firewall:

A firewall is a type of network security device used in computing that keeps track of and regulates incoming and outgoing network traffic according to pre-set security criteria. A firewall often creates a wall between a reliable network and an unreliable network, like the Internet.

Firewall Rules:

The access control method employed by firewalls to protect your network from malicious apps and illegal access is called the firewall rules. Your firewall's acceptance and denial of different types of traffic are controlled by firewall rules. The firewall access policy is a set of firewall rules. Each network packet's control information is examined, and based on the standards you specify, they are either blocked or allowed. Each package is first assessed from top to bottom, and its constituent parts are contrasted with those of the policy regulations. Then, all of the steps specified in the stated parameters of the first matching rule's configured action are carried out.

Every firewall rule matches packet characteristics against a collection of shared rule elements. The packet's source address (Source), destination address (Destination), protocol and port numbers (Service), the interface it travels across (Interface), the direction it is traveling in (Direction), and the time of arrival are among the rule components that are displayed as fields (Time).

User can fix this mistake by reversing the order of rules 2 and 3. Any communication from the network 10.20.0.0/16 also matches rule 2, which blocks it, thus rule 3, which allows access, will never be activated.

To learn more about firewall rules visit:

https://brainly.com/question/13132276

#SPJ4

The question is incomplete. Below is the complete question:

The firewall rule creators intended to block access to a website hosted at 10.15.1.2 except from hosts located on the 10.20.0.0/16 subnet. However, users on that subnet report that they cannot access the site. What is wrong?

A.The protocol is incorrect.

B.The rules are misordered.

C.The source port is not specified.

D.There is no error in the rule, and Travis should check for other issues.

vceguide an important aspect of scrum are timeboxes. select two ways in which timeboxing reinforces the creation of value

Answers

The goal of timeboxing is to define and limit amount of time dedicated to an activity. In Scrum, timeboxing is critical component of all five events. Some Scrum teams also use timeboxing during Sprint to concretely define open-ended tasks.

Time-boxes ensures that the Development Team commits to completing the items in the SprintBacklog by the end of the Sprint. B. Time-boxes encourage the ones closest to the problem make best possible decisions within thetime-frame given the current situation.

There are five types of scrum timeboxed events:

Sprint timebox. This is where time boxing measures the length of the sprint

Sprint Planning timebox. Sprint planning meetings last for 8 hours maximumDaily Scrum timeboxSprint Review time boxSprint Retrospective timebox

This ensures that Scrum Team members do not take up too much or too little work for a particular period of time and do not expend their time and energy on work for which they have little clarity. Some of benefits of Time-boxing are: Efficient development process. Less overheads.

learn more about timeboxes at

https://brainly.com/question/29508600

#SPJ1

Vicky is investigating multiple hacking attempts on her cloud-based e-commerce web servers. She wants to add a front-end security system that can actively deploy countermeasures that shuts down the hacking attempts. What application would you suggest that Vicky deploy?

Answers

Answer:

IPS

Explanation:

Intrusion Prevention System can track suspicious activities such as policy violation and actively take preventive measures to prevent and minimize the intrusion impact. It is referred to the network protection technology that analyses the flows of network traffic to identify and mitigate exploits of vulnerability. Vulnerabilities generally come to a specific service in the form of malicious inputs, which attackers use to disrupt and seize the power of a particular application. As per the question, Vicky needs an IPS to counter the hacking attempts.

you are looking for the best protection against data loss. which of the following will you use?

Answers

Peferably you should use archival backup as the best choice to prevent data loss on your device.

An archival backup is one that is conducted on any files or data that have been altered since the last backup. Backups and archival data can take several forms. Examples include external hard drives, DVDs, and backup tapes.

The main reason to archive your data is to avoid data loss. All files are at risk of being wiped or damaged (if digital), whether purposefully, accidentally, or as a result of a natural accident such as a flood or fire. Security risks can compromise electronic documents.

Learn more about backup strategy here https://brainly.com/question/28282607

#SPJ4

what is the set of protocols for transmitting data over the internet?

Answers

The set of protocols for transmitting data over the internet includes:

-TCP/IP (Transmission Control Protocol/Internet Protocol)

-HTTP (Hypertext Transfer Protocol)

-FTP (File Transfer Protocol)

-SMTP (Simple Mail Transfer Protocol)

-IMAP (Internet Message Access Protocol)

-POP3 (Post Office Protocol)

What is protocol?

Protocol is a set of rules that govern communications between different devices over a network. It is a standard of communication that defines the syntax, semantics, and synchronization of communication, and error detection and correction capabilities. Protocols allow devices to communicate regardless of the underlying hardware. Common protocols include TCP/IP, HTTP, FTP, SMTP, and SSH. They are designed to ensure that all devices are able to communicate with each other in a reliable and secure manner. Protocols also ensure that data is transferred efficiently and without any loss or corruption.

To learn more about protocol
https://brainly.com/question/17820678
#SPJ4

Explain how access restrictions on a folder or directory can block a user’s access to a file, even if the file itself may be readable by that user.

Answers

To access restrictions: Click Edit. The safety tab opens in a brand new window. The Select Users, Computers, or Groups conversation field appears. In the Enter the item names to pick out textual content field, kind the call of the consumer or organization with a purpose to have get admission to to the folder.

Access regulations can manipulate the analyzing and enhancing of database items. The modern-day consumer is capable of study or edit a database item best if the get admission to regulations permit them to carry out those actions. Otherwise, a study or edit operation will now no longer be performed at the database item.

It is essential to keep in mind that once database item fields are accessed the use of the homes of implemented items from 1С:

Enterprise script, the whole item is study and now no longer simply the cost of the specified field. The exception right here is acquiring a presentation, wherein best the values of the fields that participate in producing the presentation are study.

Access regulations are saved in roles, they may be precise for maximum metadata items. Access regulations are written in a unique language that could be a subset of the question language.

The essential a part of a limit is a circumstance which, while actual for a database item, method that the modern-day consumer is entitled to study or edit this item. Editing a report is taken into consideration allowed if the report does now no longer contradict any edit regulations both earlier than and after the alternate is implemented.

Know more about access here:

https://brainly.com/question/28388830

#SPJ4

 

How are computers located on a network

Answers

Answer:

When computers connect on the same network, it is called a local area network, or LAN.

Explanation:

The router is given the IP address for your connection to the Internet and then assigns local IP addresses to each device in your network.

Hope this can help you

What do production designers have to have extensive knowledge of when they are involved in the production of a motion picture?

A. The era in which the story happens
B. The place in which the story is set
C. The movie’s characters
D. All of the above

Answers

Answer:

The correct option is;

D. All of the above

Explanation:

The role of a production designer in film and television production involves portraying the generally perception and appearance of the narrative. The production designer is responsible for addressing the viewer perception of the location, the period in time of the narrative about the leading character, the depiction of the acts of the and experiences of the characters and the reason for their acts and experiences.

The production designer have an essential role in movie production and television programming and they work first hand with the motion picture cinematographer, director and producer.

Answer:

All of the above

Explanation:

edg2021

The production designer must have a solid understanding of many aspects of the film’s production. Location and time period of a film are especially important from a production design perspective, as is the amount of money available for production design. This means A and B are 100% correct, so all of the above is the only one.

What challenges do internet browsers face in the marketplace? in a paragraph

Answers

The challenge that Internet Browsers face in the market can be categorized into two:

Race for Superior adoption;Race for superior protection.Why are the above problems the biggest challenges of Internet Browsers?

Suerior Adoption by Internet Users: In order to stay relevant, internet users must want to access the internet via a browser. If nobody is using a browswer, the browswer spends more money than they are making to get people on board. Hence, there is a challenge to stay relevant. One of the factors that drive adoption is how secure users feel.

Superior Secrity:

Security is paramount in the mind of any internet user to the extent that people are not paranoid to some extent about how to access the internet. Security is so important that Antivirus makers now have products that cater to this need. Hence it's important.

Learn more about Internet browswers:
https://brainly.com/question/22650550
#SPJ1

Children’s toymaker AlgosRUs is creating a stacking puzzle where n oddly shaped discs need to be placed on k pegs, and has employed you to help with the task. Each disc can either be placed directly on a peg or must be placed on top of another disc that is strictly larger than it in all directions. Your task is to decide whether n given shapes can be assembled into k "stacks" to be placed on the pegs

Answers

In the given problem, children’s toymaker AlgosRUs is creating a stacking puzzle where n oddly shaped discs need to be placed on k pegs, and has employed you to help with the task.

Each disc can either be placed directly on a peg or must be placed on top of another disc that is strictly larger than it in all directions. Your task is to decide whether n given shapes can be assembled into k "stacks" to be placed on the pegs.A stacking puzzle is a classic problem that involves placing various discs with different diameters onto a set of pegs. However, there is a twist: a smaller disc must always be on top of a larger disc.

A simple algorithm to solve this problem is to perform a recursive backtracking search, but it will have a time complexity of O(2^n). Here is a method to solve the problem with dynamic programming. Using a two-dimensional matrix DP[n+1][k+1], where DP[i][j] represents the minimum number of steps to solve the problem with i discs and j pegs, we can initialize the base cases as DP[1][i]=1, DP[i][1]=i and DP[i][j]=inf.

To know more about toymaker visit:

https://brainly.com/question/8572085

#SPJ11


Give 5 comparisons of the three employees with the highest net pay



pls someone helppp mee

Give 5 comparisons of the three employees with the highest net paypls someone helppp mee

Answers

Answer:

this is wot u get for not paying attiention on class

Explanation:

Answer:

Uhm you should Of payed attention in class

Explanation:

use g00gle I would of helped u but because of wut u are commenting on others questens this is what you get this website is litrally for people to help don't always just comment use g00gle your welcome :))

For a Python program that reads every third integer in a list, which arguments of the range function should you specify?

A start, a stop, and a step argument
A start and a stop argument
No arguments
One stop argument

Answers

Answer:

A start, a stop, and a step argument

Explanation:

the range function takes three arguments: a start, a stop, and a step.

Critical Thinking Questions
You learned that there are many different programming languages, just like there are many different spoken languages throughout the world. And programming languages have certain syntax, or rules, they have to follow in order for the computer to understand the commands. Give one example of syntax for one of the programming languages listed in the unit. Then give two examples of syntax from a language you know. Describe what will happen if you do not follow these rules in your language.
What are the four main components of programming languages, and why is each one needed?
Give your own examples for how list and dictionary data structures could keep track of some common information you might need. Your examples should be different from the ones in the unit.
Why would a programmer use a flowchart?
Finish identifying the data types of each of the following pieces of data:

TABLE Identify data types
Data Data Type
“Hermione” String
13.5
-6
“18 Mingle Lane”
False
-20.4
“Bonjour”
12345

Answers

Answer:

I only have three answered but I hope this helps.

Explanation:

1. You learned that there are many different programming languages, just like there are many different spoken languages throughout the world. And programming languages have certain syntax, or rules, they have to follow in order for the computer to understand the commands. Give one example of syntax for one of the programming languages listed in the unit. Then give two examples of syntax from a language you know. Describe what will happen if you do not follow these rules in your language.

In python, when we declare a float or an integer, we declare like this:

a=2 for int

b=2.0 for float

4. Why would a programmer use a flowchart?

Programmers use flowcharts because the help the programmer see where the data will end up. Flow charts help programmers figure out where a potential problem area is and helps them with debugging or cleaning up code that is not working.

5. Finish identifying the data types of each of the following pieces of data:

Data Data Type

“Hermione” String

13.5 Float

-6 Integer

“18 Mingle Lane” String

False Boolean

-20.4 Float

“Bonjour” String

12345 Integer

Which type of word processing programs enables users to include illustrations within the program?

Answers

Answer:

 full featured

Explanation:

Answer:

Full Featured

Explanation:

Other Questions
In photosynthesis, carbon dioxide is reduced and h2o is oxidized. What type of chemical reaction is this?. They heard Date L terrifying noise to construct questions pls help complete the sequence what are the main events of chapters 27 and 28 in to kill a mockingbird? plzzzzzzzz help for a brainly how Margarita Cabrera's work affected you? 5 hours on Monday, 4.5 hours on Tuesday, and 2.5 hours on Wednesday. What is the mean number of hours she worked over the three-day period? Sarah has to travel 60 miles to see her friend. Her dad drives at 30 mph and her uncle drives at 40 mph. How much time does she save if she travels with her uncle rather than her dad Just a simple question (that I can't even answer) Kannitha is concerned about union organizing activities among her employees. She knows that one employee, Joao, is anti-union and not attending any of the organizing meetings. Kannitha asks Joao to start attending and to report back to her on what is happening so they can keep the union from forming. Joao does so and lets Lauren know what is being said at the meetings. It appears Lauren violated which of the NLRBs NO TIPS rules regarding what management cannot do during labor elections.A) no threats.B) no interrogations.C) no promises.D) no spying. virtual teams consist of people in different locations, and are often formed to take advantage of distributed expertise or time. which of the following statements is true about managing virtual teams? Is 3x 5y is a polynomial? Which statement best describes how the Medici provided patronage in Florence?They appointed new rulers.They became popular artists.They paid artists for their work.They established banking centers. of all the sexual minorities, which group is most subject to violent assault and emploment discrimination How did treaties with Native Americans help America economically? How is a game designer different from a writer? a client in labor is transported to the delivery room and is prepared for a cesarean delivery. the client is positioned on the delivery room table and the nurse places the client in which position? please dont make so much noise. i (study) correct tense Clinical researchers are interested in gaining insight into the causes of abnormal behavior. One way that they do this is to delve deeply into the histories of patients with a common diagnosis, interviewing family, friends, teachers, therapists, physicians, babysitters, and others who can provide rich details about the patients lives. Then, researchers try to see if there are any common themes in the information gathered. What research method does this strategy represent?. LIST THE ADJECTIVESOn a snowy morning I woke up and I was very cold. I felt like I was in an ice room and I walked downstairs to turn on the heater and noticed it wasnt working. I then walked downstairs to try to make some hot tea since I was so cold and noticed the microwave wasnt working either. I looked in my phone and noticed that the power cut out in many neighborhoods including mine due to the winter storm. I told my parents and my sister and they were shocked and cold as well. We were now wondering how we were gonna get heat and electricity.