what user type is appropriate for non profit companies that need to provide reporting access to their board members

Answers

Answer 1

When it comes to managing a non-profit organization, it is important to ensure that your board members have access to all the necessary information to make informed decisions. Reporting access is crucial in this regard, as it allows the board members to keep track of the organization's performance and progress.

When it comes to user types, there are several options that non-profit companies can consider for providing reporting access to their board members. The most common ones include:

1. Administrator: This user type has full access to all the features and functionalities of the reporting system. They can generate reports, customize them, and share them with others as needed. However, this type of access is usually reserved for senior staff members who are responsible for managing the reporting system.

2. Editor: This user type can modify and update existing reports, but they cannot create new ones from scratch. This type of access is suitable for board members who need to review and update existing reports periodically.\

3. Viewer: This user type can only view the reports generated by others and cannot modify them. This type of access is suitable for board members who need to review the organization's performance periodically but do not need to make any changes to the reports.

In conclusion, the appropriate user type for non-profit companies that need to provide reporting access to their board members depends on the specific requirements of the organization. However, it is recommended to have a mix of user types to ensure that the reporting system is properly managed and monitored. By providing the right user type to the right people, non-profit organizations can ensure that their board members have access to the information they need to make informed decisions.

To learn more about non-profit organization, visit:

https://brainly.com/question/29795918

#SPJ11


Related Questions

Explain the function of cpu what are work done by cu ,alu,and mu

Answers

Answer:

The CPU processes instructions it receives in the process of decoding data.

An arithmetic logic unit (ALU) is a digital circuit used to perform arithmetic and logic operations. It represents the fundamental building block of the central processing unit (CPU) of a computer. Modern CPUs contain very powerful and complex ALUs. In addition to ALUs, modern CPUs contain a control unit (CU). While the memory unit (MU), is the primary memory for holding data. It tells the computer's memory, arithmetic/logic unit and input and output devices how to respond to a program's instructions.

Hope this helps! :)

Match each virtualization component on the left with the appropriate description on the
right. Each type of component may be used once, more than once, or not at all.
-Provides the hardware necessary to create a virtualized environment.
Host machine
-A thin layer of software that resides between the virtual machine and hardware.
Hypervisor
-A software implementation of a computer.
Virtual machine
-A file created to store data.
Virtual hard disk
-Allows virtual machines to interact with hardware.
Hypervisor

Answers

To answer the given question, you need to match each virtualization component on the left with the appropriate description on the right. Each type of component may be used once, more than once, or not at all.

The correct matches for each virtualization component are as follows:

Host machine - Provides the hardware necessary to create a virtualized environment.

Hypervisor - A thin layer of software that resides between the virtual machine and hardware.

Virtual machine - A software implementation of a computer.

Virtual hard disk - A file created to store data.

The Hypervisor component - allows virtual machines to interact with hardware. It is a software layer that runs on the host machine and creates a virtual environment in which the virtual machine can operate. The virtual machine itself is a software implementation of a computer that runs inside the hypervisor, while the virtual hard disk is a file used to store data for the virtual machine. The host machine provides the hardware resources necessary to create the virtual environment, including CPU, memory, and storage.

Learn more about Hypervisor here:

https://brainly.com/question/28258820

#SPJ11

help me cuz i foreal neda answer

help me cuz i foreal neda answer

Answers

I think it’s A

I’m pretty sure
I think it’s A. I’m not sure thought

By default, tables are sorted in ascending order by this.


What’s the answer?

By default, tables are sorted in ascending order by this.Whats the answer?

Answers

Answer:

Record number

Explanation:

It simply can't be "data type" as there cant be more than one data type in a field. It won't be "primary key field" either as primary keys only set the field as unique. You can test this by changing the primary key to a different field. But for simplicity's sake, I did this experiment for you.

As you can see in the first and second attachments, ID is the primary key, set default by the program.

But when I set Field 8 as the primary key, shown in the third attachment, field 8 doesn't sort, shown in the fourth attachment.

By default, tables are sorted in ascending order by this.Whats the answer?
By default, tables are sorted in ascending order by this.Whats the answer?
By default, tables are sorted in ascending order by this.Whats the answer?
By default, tables are sorted in ascending order by this.Whats the answer?

Answer:

By default, tables are sorted in ascending order by record number.

virtual conections with science and technology. Explain , what are being revealed and what are being concealed​

Answers

Some people believe that there is a spiritual connection between science and technology. They believe that science is a way of understanding the natural world, and that technology is a way of using that knowledge to improve the human condition. Others believe that science and technology are two separate disciplines, and that there is no spiritual connection between them.

What is technology?
Technology is the use of knowledge in a specific, repeatable manner to achieve useful aims. The outcome of such an effort may also be referred to as technology. Technology is widely used in daily life, as well as in the fields of science, industry, communication, and transportation. Society has changed as a result of numerous technological advances. The earliest known technology is indeed the stone tool, which was employed in the prehistoric past. This was followed by the use of fire, which helped fuel the Ice Age development of language and the expansion of the human brain. The Bronze Age wheel's development paved the way for longer journeys and the development of more sophisticated devices.

To learn more about technology
https://brainly.com/question/25110079
#SPJ13

List 5 applications for working with text

Answers

Answer:

TTSReader, Go2PDF, Free File Merge, Batch Text File Editor

Explanation:

Design a program that ask the user to enter a series of positive numbers. The user should enter a negative number to the series. After all the positive numbers have been entered the program should display their sum

Answers

Answer:

total = 0

while True:

   number = float(input("Enter a number: "))

   

   if number < 0:

       break

   

   total += number

   

print("The total of the positive numbers entered is", total)

Explanation:

*The code is in Python.

Initialize the total as 0

Create a while loop. Inside the loop:

Ask the user to enter a number. Check the number. If it is smaller than 0 (This means it is a negative number), stop the loop using break. Add the number to the total (cumulative sum). (This way your program keeps summing numbers until you enter a negative number)

When the loop is done, print the total

write an expression that attempts to read a double value from standard input and store it in an double variable , x, that has already been declared .

Answers

To write an expression that attempts to read a double value from standard input and store it in an double variable, x, that has already been declared, we can use the following syntax:

To use a Scanner class to read input from the user, which can then be stored in a variable. The Scanner class has a method named nextDouble(), which reads a double from standard input.Here is an example of how we can use this

:import java.util.Scanner;

public class Example {public static void main(String[] args) {Scanner input = new Scanner(System.in);

double x = 0.0;

System.out.print("Enter a double value: ");

if (input.hasNextDouble()) {x = input.nextDouble();

System.out.println("You entered: " + x);}

else {System.out.println("Invalid input.");}}}//

The code above reads a double value from standard input and stores it in the variable x. If the input is not a valid double, an error message is printed.

To know more about standard input visit:-

https://brainly.com/question/15682776

#SPJ11

Please help me with these short questions >..

Please help me with these short questions &gt;..

Answers

Answer:

bmjcmbbobnkpkkjkbk

Explanation:

vuvkopbbkvkhovjlplbkp

Please help me with these short questions &gt;..

WILL GIVE BRAIINLIEST AND WATER ICE FROM RITA'S!!!!!!!!!
Checking baggage and traveling to the destination are parts to this section of the transportation system:

Answers

Answer:

When you purchase a connecting flight, checked baggage is usually forwarded to your final destination, and will change planes when you do. ... In some cases if you purchased multiple tickets that are not all on the same carrier you may need to recheck your baggage

Explanation:

Discuss the database table options available when implementing subtype associations.
• Discuss the considerations you would use in choosing one design over the others
2.
Department
• Employee
• Project
Selected Semantics
• An employee must belong to one and only one department (if a Department is dissolved, the Employee instances must be assigned to another department or be terminated)
• A project need not have anyone assigned to it
• An employee need not be assigned to a project
3.
1. Subtype the entity "Stevens Community"; that is, the community
2. Identify the criteria for each subtype
3. Subtype to 2 or 4 levels
Hint: I'm asking you to subtype the Stevens community (i.e., people), not the Stevens physical structures or policies.

Answers

When implementing subtype associations in a database table, there are several options available. Here, we will discuss the considerations you would use in choosing one design over the others.



One table for all subtypes: In this design, you would have a single table that includes attributes for all the subtypes, such as Department, Employee, and Project. Each row would represent an instance of a subtype, and you would use a discriminator column to indicate the subtype.

For example, you might have a column called "subtype" with values like "Department", "Employee", or "Project". The considerations for this design include simplicity and ease of querying, as all the data is in one table. However, it can lead to a lot of null values in the table, which may impact performance and storage efficiency.
To know more about implementing visit:

https://brainly.com/question/32093242

#SPJ11

if a rectangular prism has a volume of 36 cubic units, what might be the height, width and length​

Answers

The volume of a rectangular prism is calculated by multiplying its length, width, and height. Since we know the volume of the rectangular prism is 36 cubic units, we can use the equation V = lwh to solve for the values of the height, width, and length.

What is prism?

Prism is an open-source software that allows users to analyze data and create visual representations of it. It is a powerful tool for data analysis, providing users with the ability to create high-quality graphs and charts quickly and easily.

Since 36 is a product of two integers, there are several combinations of length, width, and height values that would meet the given volume requirement. For example, the prism could have a length of 6, a width of 3, and a height of 2 (or any combination of these values multiplied together to equal 36). It could also have a length of 4, a width of 4, and a height of 3 (or any combination of these values multiplied together to equal 36).

To learn more about prism

https://brainly.com/question/30454255

#SPJ1

3. When the heart is contracting, the pressure is .highest. This is called the
a. blood pressure. b. systolic pressure.
c. heart pressure.
d. diastolic pressure.
4. What is the balance between heat produced and heat lost in the body?
a. pulse rate
b. body temperature C. respiratory rate
d. blood pressure
5. This type of thermometer uses mercury and, therefore, is considered unsafe to use.
a. ear thermometer b. infrared thermometer c. digital thermometer d. clinical
Activit ? (Day 2)​

Answers

Answer:

3. b. Systolic pressure

4. b. Body temperature

5. d. Clinical

Explanation:

3. During the systole, the pressure of the blood in when the heart contracts is increased and it is known as the systolic blood pressure

4. Temperature is a measure of heat available in a body for transfer depending on the heat capacity of the body, therefore, the balance between heat produced and total heat lost is body temperature

5. The clinical thermometer is made up of mercury contained in a bulb at the end of a uniform and narrow glass tube. The increase in temperature of the mercury when the thermometer is in contact with an elevated temperature results in the expansion of the mercury which is observed when the mercury moves up the thermometer.

What is fish processing?

Answers

Fish processing involves preparing fish and seafood for delivery to consumers. Once fish is harvested, it must undergo several steps before it’s ready to be sold in the market. The process includes gutting, filleting and packaging of the product. Fish is a highly perishable food, so it must be carefully handled from the moment it’s caught until it’s sealed in packaging material

ms. danvers is designing a set of virtual machines for her company, miracle. currently, her host machine uses lvm but only has enough disk space for 1 tb of data. her three vms will need 200 gb of disk space immediately but are projected to grow to 300 gb each within the next year. what should she do?

Answers

Ms. Danvers has a task ahead of her in designing a set of virtual machines for Miracle, her company. She has already identified that her host machine uses LVM but only has enough disk space for 1 TB of data. This implies that she needs to be prudent with the space allocation for the virtual machines.

Considering that her three virtual machines require a total of 200 GB of disk space immediately, Ms. Danvers has a few options. One option is to allocate all the space available to the virtual machines and then expand the disk space as the VMs grow. However, this may not be practical, given that the VMs will grow to 300 GB each within the next year, and this could result in insufficient space. Another option is to split the available space into smaller partitions, but this may not be ideal since she may end up with unused disk space on one or more VMs.
Ms. Danvers may also consider using a cloud-based solution, which would provide scalability and flexibility in terms of disk space. Cloud providers often offer scalable and customizable disk space options, allowing Ms. Danvers to adjust the disk space according to her company's needs. This option may, however, come with added costs, depending on the service provider.
In conclusion, Ms. Danvers needs to consider her options carefully before designing the virtual machines. She should look for ways to optimize the disk space available, while also ensuring that there is room for growth in the future. The cloud-based solution is a viable option to consider, although she needs to weigh the costs against the benefits it provides.

Learn more about designing here:

https://brainly.com/question/30225107

#SPJ11

how many computers are hacked every year

Answers

Only in 2017 ALONE, there were more than 317 million new pieces of malware – computer viruses or other malicious software created. :(

Answer:

Well NSA Data Center Experiencing 300 Million Hacking Attempts Per Day – The Council of Insurance Agents & Brokers. So that would round up to about 109,500,000,000

Explanation:

Because 300 million times how many days in a year witch is about 365 days in a year will equal a total of 109 billion 500 million computers hacked each year 109,500,000,000.

A pedometer treats walking 1 step as walking 2.5 feet. Define a function named FeetToSteps that takes a double as a parameter, representing the number of feet walked, and returns an integer that represents the number of steps walked. Then, write a main program that reads the number of feet walked as an input, calls function FeetToSteps() with the input as an argument, and outputs the number of steps.

Answers

In computing, it should be noted that a program is a specific set of ordered operations that is given to the computer to perform. The program based on the information given is illustrated below

How to depict the program?

The program will be:

import java.util.Scanner;

public class LabProgram {

   public static int feetToSteps(double userFeet){

       return (int) (userFeet/2.5);

   }

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       double userFeet = in.nextDouble();

       int steps = feetToSteps(userFeet);

       System.out.println(steps);

   }

}

In conclusion, the program is shown above.

Learn more about programs on:

https://brainly.com/question/1786465

#SPJ1

WHAT IS A COMPUTER ????

Answers

A piece of technology

Answer:

A device for storing and processing data, a computer can perform sets of operations, called programs. These programs enable computers to perform an extremely wide range of tasks.

True or false: Most Brainly users are saltier than the ocean. If false, explain why.

Answers

Explanation:

btw I'm not salty........

which of the following types of software is for organizing analyzing and storing data in a table A spreadsheet software B database software C desktop publishing software D multimedia software ​

Answers

Answer:

spreadsheet software

Explanation:

A student entering high school is pursuing STEM education. What can you infer about this student?

Answers

Answer: according to my calculations, we can infer that the student is pursuing a STEM education

Explanation:

Answer:

he likes Science, technology, engineering, and mathematics

Explanation: beacause it makes sense

Kiara is doing a'report on corrections in the United States. She finds it interesting that part of the subculture that forms in prison includes prison argot. To what does this term refer? A. B. C. D. obtaining goods and services in prison a unique vocabulary used by prisoners a form of prison weapon a subculture that prisoners are introduced to ​

Answers

Kiara is doing a'report on corrections in the United States. She finds it interesting that part of the subculture that forms in prison includes prison argot. The term Prison Argot refers to the unique vocabular used by prisoners.

What is a Prison Argot?

Prison lingo is a colloquialism used mostly by criminals and inmates in correctional facilities. It is an example of anti-language. Many of the terminology are related to criminal activity, incarceration, court proceedings, street life, and various sorts of inmates. Prison jargon differs by institution, area, and nation.

Prison argot, often known as prison slang or prison jargon, is a language established inside the confines of correctional facilities. It is a specialized language comprised of terms and phrases specific to prison culture that are frequently used to describe various elements of life behind bars.

Learn more about prison argot at:

https://brainly.com/question/2663000

#SPJ1

Answer:

a unique vocabulary used by prisoners

Explanation:

I did it js trust me i got it wrong but now i got it right on my first attempt i got yall its b

USB 3.0 can plug into a 2.0 port, but will only transmit at the speed of a USB 2.0 true or false

Answers

Answer:

true

Explanation:

USB 3.0 backwards is compatible—meaning it's designed to work with older USB versions including USB 2.0 and USB 1.1. You can plug a USB 2.0 device into a USB 3.0 port and it will always work, but it will only run at the speed of the USB 2.0 technology.

Write a reflection about what you have learned about MS Word. Do you think the skills you learned during the IBC prep will be
useful to you in the future? How do you think having an Industry Based Certification will help you? Do you have any concerns about
taking the IBC?

Answers

The thing that I have learned about MS Word is that  When creating content with a large volume, Microsoft Word is quite helpful. Without a question, Word allows you to create customized documents, newsletters, and mailing lists. It enables you to send documents to a group of people for feedback.

Yes, I do think the skills you learned during the IBC prep will be useful to you in the future.

The reason I think having an Industry Based Certification will help you is that it will boast my CV and increases the chance of people hiring me.

No, I do not have any concerns about taking the IBC.

What is an IBC?

A credential that is accepted by business and industry at the local, state, or national level is called an industry certification. It could be a test, an evaluation, or a license that is managed and approved by a governing body or third party in the business.

Therefore, An industry-accepted independent third-party credential known as a "industry-based certification" is the outcome of a process in which a person's knowledge and/or competence in a particular field is examined against a list of pre-established standards.

Learn more about Industry Based Certification from

https://brainly.com/question/13605171
#SPJ1

Select the correct answer.
Jack is part of the software quality assurance team in a company. Which activity should Jack perform as a part of software quality assurance?
O A.
billing
ОВ.
recruiting
OC.
testing
OD
installing
O E.
accounting

Answers

Answer:

E

Explanation:

After you have solved the Tower of Hanoi at least three times, write an algorithm with clear, numbered steps that would guide another player through the steps of solving the puzzle.

Answers

Answer:

def tower_of_hanoi(n , source, auxiliary, destination):  

   if n==1:  

       print("Move disk 1 from source",source,"to destination",destination )

   else:

       tower_of_hanoi(n-1, source, destination, auxiliary)  

       print("Move disk",n,"from source",source,"to destination",destination )

       tower_of_hanoi(n-1, auxiliary,  source, destination)  

         

n = 3

tower_of_hanoi(n,'A','B','C')  

Explanation:

The python function "tower_of_hanoi" is a recursive function. It uses the formula n - 1 of the n variable of recursively move the disk from the source rod to the destination rod.

Finally, the three disks are mounted properly on the destination rod using the if-else statement in the recursive function.

Answer:

C. 127

Explanation: edge 2022

The term wiki refers to a(n): Group of answer choices type of short-message blogging, often made via mobile device and designed to provide rapid notification to their readership. Web site that can be modified by permitted users, from directly within a Web browser. online community that allows users to establish personal profiles and communicate with others. record of online journal entries, usually made in a reverse chronological order. link in a blog post that refers readers back to cited sources.

Answers

Answer:

Web site that can be modified by permitted users, from directly within a Web browser.

Explanation:

A website refers to the collective name used to describe series of web pages linked together with the same domain name.

Wiki is an abbreviation of the domain name Wikipedia and it's a website that provides a detailed background information about people, places, countries, things, etc.

The term wiki refers to a website that avails permitted users the ability to modify or edit its contents, especially from directly within a web browser.

In conclusion, wiki is a web-based service that provides information about virtually everything in the world.

if i want a word to be keyed in all capital letters, which is the correct proofreader's mark?

Answers

----
----
---
Three lines under a lowercase letter mean to make it a capital.

codehs python 4.7.6 Powers of Two
it says I'm wrong because I need

codehs python 4.7.6 Powers of Two it says I'm wrong because I need
codehs python 4.7.6 Powers of Two it says I'm wrong because I need

Answers

\(\huge\fbox\orange{A} \huge\fbox\red{N}\huge\fbox\blue{S}\huge\fbox\green{W}\huge\fbox\gray{E}\huge\fbox\purple{R}\)

\(\huge\underline\mathtt\colorbox{cyan}{in attachment}\)

codehs python 4.7.6 Powers of Two it says I'm wrong because I need

Following are the program to calculate the power of two:

Program Explanation:

Defining an integer variable "i" that hold an integer value.Defining a for loop that checks "i" value in between 20, inside this it calculates power of two.At the last use print method to print its value.

Program:

i=1#holding integer value in i

for i in range(20):#defining a for that starts 1 to 20    

   i = 2 ** i#calculate power of 2 in i variable

   print(i)#print value

Output:

Please find the attached file.  

Learn more:

brainly.com/question/23170807

codehs python 4.7.6 Powers of Two it says I'm wrong because I need

write around 600 words discussing the role of IT in Jumia operational applications

Answers

Jumia is an e-commerce platform that operates in various African countries, and it relies heavily on technology to run its operations. Information technology (IT) plays a critical role in enabling Jumia to process transactions, manage inventory, track deliveries, and provide customer support. In this essay, we will discuss the role of IT in Jumia's operational applications and how it helps the company to achieve its business objectives.

Jumia uses a range of IT systems and tools to support its operations, including its website, mobile application, customer relationship management (CRM) software, order management system (OMS), warehouse management system (WMS), and logistics management system (LMS). These systems work together seamlessly to provide a comprehensive end-to-end solution for Jumia's e-commerce operations.

One of the key roles of IT in Jumia's operational applications is to provide a platform for customers to browse and purchase products online. The Jumia website and mobile application are designed to be user-friendly and easy to navigate, with a search function that allows customers to find products quickly and easily. The website and mobile application also allow customers to view product details, check prices, and make payments securely using a range of payment options.

Another critical role of IT in Jumia's operational applications is to support order management and fulfilment. The order management system (OMS) allows Jumia to manage customer orders, allocate inventory, and track order fulfilment. The OMS also integrates with Jumia's warehouse management system (WMS), which helps Jumia to manage inventory levels, track product movement, and fulfil orders efficiently.

IT also plays a role in Jumia's customer support operations. Jumia uses a CRM system to manage customer interactions and provide support to customers. The CRM system allows Jumia to track customer orders, manage customer inquiries, and provide post-sale support. The CRM system also integrates with Jumia's website and mobile application, allowing customers to access support directly from these channels.

To know more about various  visit:

https://brainly.com/question/32260462

#SPJ11

Other Questions
Choose all of the ABIOTIC factors Question 1 options: humidity oxygen content light plants salinity Paints A and B are on opposite sides of river. To find the distance between the points out is located on the same side of the river point, a third point C is locatedon the same side of the river as point A. The distance between A and C feet, ACB is determined to be 48 and, BAC is 110 . Find the distance between A and B. (Round your answer to one decimal place.) blessed are those who mourn for they will be comforted Simplify each expression.1) 7w + 2w - 6w2) 9x - 3x + 2x 3) 8p + 3p - p4) 6b-3b+5b (Change this sentence into active )My wallet was taken by a thief How did the economic changes described above contribute to the closing of the frontier in the late 1800s?A Increasing shipping costs weakened the western economy and spurred out migrationB Transportation connections among communities across the West led to a roughly even regional population distributionC The spread of new ideas to formerly isolated parts of the country eased relations with American IndiansD Fast and affordable travel across the continent encouraged western settlementSend What is the potential difference across the resistor? Vanya inc. charter authorizes 1000 shares of stock at a stated value of $1 per share. Vanya sells 50 shares of stock at its initial offering for $10 [er share. The journal entry to record this transaction? A boy weighs 47 pounds. How many kilograms does the boy weigh Implement a function with signature transfer(S, T) that transfers all elements from stack S onto stack T, so that the element that starts at the topof S is the first to be inserted onto T, and the element at the bottom of Sends up at the top of T. Use Euler's method with n = 4 steps to determine the approximate value of y(5), given that y(2) = 0.22 and that y(x) satisfies the following differential equation. Express your answer as a decimal correct to within +0.005. dy/dx = 2x+y/x Can yall give me 5 facts about this What was the most destructive English "weapon" that devastated the native population? for time, , in hours, 01, a bug is crawling at a velocity, , in meters/hour given by 4 / 2 t.Use t=0.2 to estimate the distance that the bug crawls during this hour. Use left- and right-hand Riemann sums to find an overestimate and an underestimate. Then average the two to get a new estimate. Grouper, Ltd. manufactures boats and personal watercraft. The company operates three separate divisions: yachts, sailboats, and jet skis. The company's latest income statement is presented by product Find the midpoint of side EF. (4 points)Figure EFGH is shown. E is at negative 2, 3. F is at 1, 6. G is at 4, 3. H is at 1, 0. (1, 4) (0.75, 4.25) (0.5, 4.5) (0.25, 4.75) question 7 a stakeholder objects to the steps of your analysis. what are some appropriate ways to respond to this objection? select all that apply. 1 point communicate the assumptions you made in your analysis defend the results of your analysis explain why you think any discrepancies exist take steps to investigate your analysis question further On January 1, 2019, Wasson Company purchased a delivery vehicle costing $47,550. The vehicle has an estimated 7-year life and a $4,500 residual value. Wasson uses the units-of-production depreciation method and Wasson estimates that the vehicle will be driven 105,000 miles. What is the vehicle's book value as of December 31, 2020, assuming the vehicle was driven 10,500 miles during 2019 and driven 18,500 miles during 2020 When you keep your audience in suspense or say something in your speech that is different from the expected, you are creating _____. Group of answer choices confusion cadence clarity drama Which of the following is an example of a flat bone?A) sternumB) tarsalC) mandibleD) femur