which one is not a social network? question 22 options: a) computer network b) knowledge network c) communication network d) information network

Answers

Answer 1

A computer network is not a social network. So, the correct option is A.

A social network is a platform or system where individuals can interact, share information, and create connections with others. A computer network is a group of interconnected computers that share resources and data, without necessarily involving social interactions.

A social network is a group of people who are linked by social relationships, such as friendship, colleagues, or other sorts of personal relationships. They connect with one another on a social network, whether virtually or in person.

Social networks are an essential component of our everyday lives. They provide us with a platform to connect with others and share our thoughts, feelings, and ideas.

Learn more about social networks https://brainly.com/question/6886851

#SPJ11


Related Questions

I have no errors in the code but for some reason it doesn't work... what i'm missing?

I have no errors in the code but for some reason it doesn't work... what i'm missing?

Answers

The JavaScript code that you have written is one that tends to retrieves data from a table that is called "Busiest Airports" . The corrected code is given below.

What is the getColumn code about?

In regards to the given code that was corrected, the user input is one that can be obtained from the text input element with the use of the ID "yearInputBox" via the act of getText function as well as been saved in a variable named inputYear.

Therefore, when there is a match that is found, the output is said to be made by the use of the corresponding elements that is obtained from the year, as well as country, and that of airport arrays, and later on set to the "outputBox" element via the use of the setText function.

Learn more about code from

https://brainly.com/question/26134656

#SPJ1

See text below



1

var year getColumn("Busiest Airports", "Year");

var country = getColumn ("Busiest Airports", "Country");

var airport = getColumn("Busiest Airports", "Airport");

onEvent("goButton", "click", function() {

/*call the "calculateOutput" function here,

*passing in the user input as a paremeter 10 */

calculateOutput (getText("year InputBox"));

function calculateOutput (years){

var output="";

for (var i = 0; i < year.length; i++) { /*write the list element being accessed*/ if (years[i] == "inputYear"){ output "In "

=

+ year + "the busiest airport was

11

+ country + "

in "airport[i];

21

}

}

setText("outputBox", output );

}

I have no errors in the code but for some reason it doesn't work... what i'm missing?

NEEDED ASAP
1. What are shortcut keys?
2. Mention 5 Examples of shortcut keys and their functions
3. Create a table and put the description for the following shortcut keys.
Shortcut Keys
i. Ctrl+Esc
ii. Ctrl+Shift+Esc
iii. Alt+F4
iv. Ctrl H
v. Ctrl E
4. Give three importance of shortcut keys
5. Are shortcut keys helpful? Explain your answer in not less than five lines.

Answers

Explanation:

1. special key combination that causes specific commands to be executed typically shortcut keys combine the ctrl or alt keys with some other keys.

2. 5 example of shortcut keys are:-

1. ctrl + A - select all2.ctrl + B - bold3. ctrl + C - copy 4. ctrl + U - under line 5. ctrl + v - paste

3. (i) open the start menu

(ii) open Windows task manager

(iii) close the currently active program

(iv) replace

(v) align center

4. the three importance of shortcut keys are :

efficient and time saving :- using shortcut make you more efficient at doing certain task on your computer .multi-tasking :- being a multi Tasker is something required in life.health benefit :- cutting down on your mouse usage by using keyboard shortcut can help reduce the risk of RSI (Repetitive Syndrome Injury).

5. shortcut keys are very helpful because it take less time. keyboard shortcuts are generally used to expedite common operation by reducing input sequence to a few keystrokes.

Answer:

all of the above is correct

Explanation:

I need help with this question.

I need help with this question.

Answers

Explanation:

Whilst it is impractical to convert all the numbers to binary, I will explain how binary works to you.

Binary is usually composed of eight bits, each representing a different number.

0000 0000

Each 0 represents a column in an 8-bit binary number. The far-right column starts at 1 and doubles each time you change to the left column.

128 64 32 16 8 4 2 1

 0    0   0   0 0 0 0 0

A number 1 means that there is a number in that column whereas a 0 means there isn't, like the normal "0 means off and 1 means on" system. When there is a 1 in every column:

1 1 1 1 1 1 1 1

There can be a maximum value of 255.

For example, the number 79 would be represented in binary as:

128 64 32 16 8 4 2 1

 0    1     0   0  1  1 1  1

64 + 8 + 4 + 2 + 1 = 79

Hope this helps!

After installing a new hard drive on a windows computer, Len tries to format the drive. Windows does not show the format option in disk management. What did Len forget to do first?A. Run CheckdiskB. Partition the driveC. Degfragement the driveD. Copy the system files

Answers

Len forgot to do the following first: Partition the drive. Before formatting a new hard drive in Windows, it needs to be partitioned to create a storage area that can be recognized by the operating system. So, the correct answer is B

Understanding Partitioning

Partitioning involves dividing the hard drive into separate sections or partitions, which can then be formatted and used for different purposes.

Without partitioning, the computer may not recognize the new hard drive or show the format option in disk management. It is important to partition the drive before formatting it to ensure that it is properly configured for use.

Checkdisk is used to scan and fix errors on a hard drive, defragmentation is used to optimize the performance of a hard drive, and copying system files is not necessary for formatting a new hard drive.Hence for this question, the answer is B.

Learn more about hard drive at

https://brainly.com/question/28413001

#SPJ11

Which of the following is NOT an agent of Socialization?
A. Your family
B. Kim Kardashian
C. Police officer
D. Your teacher
E. Your friends

Answers

C

is the answer you know why because it is okay I love you by the way

Answer:

C. Police officers

Why?

because they deal with people badly.

which piece of network hardware keeps a record of the mac address of all devices connected to it and uses this information to direct data packets to the appropriate port?a. serverb. busc. routerd. switch

Answers

A switch is piece of network hardware keeps a record of the mac address of all devices connected to it and uses this information to direct data packets to the appropriate port.

What is Direct data packets?

A network packet is a fundamental unit of data that is bundled and sent over a computer network, often a packet-switched network like the internet.

Each packet or block of data is a component of the entire message and contains necessary address information to help identify the sender computer and the message's intended recipient.

The header, payload, and trailer of a network packet are its three component pieces. The underlying network architecture or protocol employed determines the format and size of a network packet.

Therefore, A switch is piece of network hardware keeps a record of the mac address of all devices connected to it and uses this information to direct data packets to the appropriate port.

To learn more about network, refer to the link:

https://brainly.com/question/14403686

#SPJ1

Which characters are used in hump notion?

A Capitals

B Asterisk

C Periods

D Brackets

Answers

Hello petedelery2006!

Answer:

B.) Asterisk

Definition:

A symbol (*) used to mark printed or written text, typically as a reference to an annotation or to stand for omitted matter

- I Hope this Helps! Have an awesome day!

~ Chloe Marcus ❤

which is the default port of ip-winbox

Answers

The MikroTik RouterOS Winbox tool's default port is 8291. It is a TCP port used to access MikroTik Router devices remotely for management. It is used to remotely manage and configure the router from any computer with an internet connection.

A remote administration tool for setting up and controlling MikroTik Router devices is the MikroTik RouterOS Winbox programme. It is intended to enable users to access a MikroTik device from any internet-connected computer. Users can remotely control and manage their MikroTik devices using the safe and graphical Winbox interface. The remote administration port for MikroTik Router devices is TCP port 8291, which is the default port for Winbox. All correspondence between the client and the MikroTik device takes place over this port. The fact that this port is utilised for all communication, not simply access to the Winbox utility, should be noted. Opening this port is necessary to manage the MikroTik device from a distance.

Learn more about connection here-

brainly.com/question/14327370

#SPJ4

Someone help please I really need help

Someone help please I really need help

Answers

Answer:

Smallest value;

\(f(x) = { \sf{MIN}}(value)\)

Largest value;

\(f(x) = { \sf{MAX}}(value)\)

1. Is it really important for government leaders to visit their areas of
responsibility and to talk to their constituents? Some people argue that all of
these are trivial, empty ceremonies. Do these gestures really make a
difference? Explain your answer.​

Answers

Answer: Its important.

Explanation:

Without government leaders visiting their areas of responsibility would be bad. Because of the people may have different opinions of stuff and there can be chaos and big debates and protests.

It is important that government leaders visit their areas of  responsibility to talk to their constituents because this will impress the fact that they care for and empathize with their constituents. These gestures make a difference because they show an interest in the people who are being led.

Who are the constituents?

The constituents are the people who elected the government personnels. Therefore, it is only expected that they be the center of attention of the government.

It is in no way trivial or empty ceremony to visit the constituents because communication between the leaders and the led will help to facilitate feedback.

This is important to growth. So visiting constituents is an important aspect of leadership.

Learn more about government reponsibility here:

https://brainly.com/question/25242169

Last question on my exam and i cant figure it out


You want to print only the string items in a mixed list and capitalize them. What should be in place of the missing code?

list = ["apple",1, "vaporization", 4.5, "republic", "hero", ["a", "b"]]
for item in list:
if item.isalpha():
item = /**missing code**/
print(item)

item.isupper()
item.upper
item.upper()
upper(item)

Answers

The thing that should be in place of the missing code is [list.upper() for name in list]

What is Debugging?

This refers to the process where a problem or error in a code is identified and solved so the code can run smoothly.

We can see that the original code has:

list = ["apple",1, "vaporization", 4.5, "republic", "hero", ["a", "b"]]

for item in list:

if item.isalpha():

item = /**missing code**/

print(item)

item.isupper()

item.upper

item.upper()

upper(item)

Hence, we can see that from the given python code, you want to capitalize the items in the mixed list and the thing that should be in place of the missing code is [list.upper() for name in list]

Read more about debugging here:

https://brainly.com/question/9433559

#SPJ1

PLEASE HELP!!! THIS IS DUE TODAY!! WILL MARK BRAINLIEST!!
Two examples of good digital citizenship, and provide your reasoning as to why they are good.

Answers

Answer:

1. Respecting rules and cookies while browsing a website.

2. Being kind and properly following the requirements the owner asks you to follow. Reporting any sort of comment or image that is hurtful/harmful.

Explanation:

1. By the rules and cookies for a website, you ensure the safety of your device  and are not putting any information at risk.

2.  Cyberbullying is a huge issue and you can reduce cyberbullying with the simple steps of being kind and respecting others.

Conclusion:

These rules are examples of good digital citizenship and following them will benefit you and your peers greatly.  

Example 1. Learning to type, use a mouse, and other computer skills.

Explanation: This is a good example of digital citizenship because by learning these skills it allows you to actively engage with others digitally and even give them pointers with their own learning.

Example 2. Avoiding harassment or hateful speech while conversing with others online.

Explanation: This is a good example of digital citizenship because by avoiding harassment or hateful speech you are contributing to making the digital world a safer place for everyone.

hopefully this deserves brainliest :)

Which of the following malware distribution techniques involves exploiting flaws in browser software to install malware just by visiting a webpage?
A spear-phishing sites
B social engineered click-jacking
C compromised legitimate websites
D drive-by downloads

Answers

A is the correct option D. drive-by download is a malware distribution technique that involves exploiting flaws in browser software to install malware just by visiting a webpage.

What is a drive-by download?

The malware distribution technique that involves exploiting flaws in browser software to install malware just by visiting a webpage is called "drive-by downloads."

In a drive-by download attack, a user visits a webpage that has been compromised by a hacker, often through the injection of malicious code. The malicious code exploits vulnerabilities in the user's web browser or plugins to silently download and install malware onto the user's computer, often without their knowledge or consent.

Drive-by downloads are a popular technique for distributing malware because they can infect large numbers of users with minimal effort or interaction on the part of the user. To protect against drive-by downloads, users should keep their browsers and plugins up to date, use antivirus software, and be cautious when visiting unfamiliar websites.

Learn more about drive-by download

brainly.com/question/3157986

#SPJ11

Consider a disk with block size B = 512 bytes. A block pointer is P = 6 bytes
long, and a record pointer is PR = 7 bytes long. A file has r = 30,000 EMPLOYEE
records of fixed length. Each record has the following fields: Name (30 bytes),Ssn (9
bytes), Department_code (9 bytes), Address (40 bytes), Phone (10 bytes), Birth_date (8
bytes), Sex (1 byte), Job_code (4 bytes), and Salary (4 bytes, real number). An additional
byte is used as a deletion marker.
a. Calculate the record size R in bytes.
Record length R = (30 + 9 + 9 + 40 + 9 + 8 + 1 + 4 + 4) + 1 = 115 bytes
b. Calculate the blocking factor bfr and the number of file blocks b, assuming an
unspanned organization.
Blocking factor bfr = floor (B/R) = floor (512/115) = 4 records per block
Number of blocks needed for file = ceiling(r/bfr) = ceiling (30000/4) = 7500
c. Suppose that the file is ordered by the key field Ssn and we want to construct a
primary index on Ssn. Calculate
(i) the index blocking factor bfri (which is also the index fan-out fo)
Index record size R i = (V SSN + P) = (9 + 6) = 15 bytes
Index blocking factor bfr i = fo = floor (B/R i) = floor (512/15) = 34
(ii) The number of first-level index entries and the number of first-level index
blocks
Number of first-level index entries r1 = number of file blocks b = 7500 entries
Number of first-level index blocks b1 = ceiling (r1 / bfr i) = ceiling (7500/34)
= 221 blocks
(iii) The number of levels needed if we make it into a multilevel index
Number of second-level index entries r2 = number of first-level blocks b 1=
221 entries
Number of second-level index blocks b2= ceiling (r2 /bfr i) = ceiling (221/34)
= 7 blocks
Number of third-level index entries r3 = number of second-level index blocks
b2 = 7 entries
Number of third-level index blocks b3 = ceiling (r3 /bfr i) = ceiling (7/34) = 1
Since the third level has only one block, it is the top index level. Hence, the
index has x = 3 levels
(iv) The total number of blocks required by the multilevel index
Total number of blocks for the index bi = b 1 + b 2 + b 3 = 221 + 7 + 1 = 229
blocks
(v) The number of block accesses needed to search for and retrieve a record from
the file—given its Ssn value—using the primary index
Number of block accesses to search for a record = x + 1 = 3 + 1 = 4

Answers

Number of block accesses to search for a record = x + 1 = 3 + 1 = 4 block accesses.

How to solve for the block

The number of block accesses needed to search for a record is equal to the number of levels in the index plus one (to fetch the actual data record from the disk after the key has been located in the index).

From the computations you provided, the index has 3 levels (x = 3). So, the total number of block accesses needed to search for and retrieve a record from the file given its Ssn value using the primary index would be:

Number of block accesses to search for a record = x + 1 = 3 + 1 = 4 block accesses.

This accounts for traversing each level of the index to locate the key and then one final block access to retrieve the actual record from the disk.

Read more on  index blocking factor   here https://brainly.com/question/28087779

#SPJ4

under which design specification category for interfaces and dialogues does time to learn appear?

Answers

Time to learn is a design specification category that falls under the broader category of "Usability" for interfaces and dialogues.

Time to learn is an important aspect of usability in interface and dialogue design. It refers to the amount of time it takes for users to understand and become proficient in using a system or application. Time to learn encompasses various factors such as the intuitiveness of the interface, the clarity of instructions, and the complexity of interactions.

Designers aim to minimize the time required for users to learn how to use a system effectively. By providing a user-friendly and easily understandable interface, designers can reduce the learning curve and enhance the overall user experience.

Considering time to learn as a design specification helps create interfaces that are accessible and efficient for users, ultimately leading to increased usability and user satisfaction.

Learn more about complexity of interactions here:

https://brainly.com/question/28715498

#SPJ11

Name the part of the computer that stores all information and software.

Answers

Answer:

Hard Drive

Explanation:

Answer:

The Hard drive

Explanation:

A photograph is created by what
A) Silver
B) Shutters
C) Light
4) Mirror

Answers

A photograph is created by Light.

What are photographs made of?

Any photograph created is one that is made up of Support and binders.

The steps that are needed in the creation of a photograph are:

First one need to expose or bring the film to light.Then develop or work on the imageLastly print the photograph.

Hence, for a person to create a photograph, light is needed and as such, A photograph is created by Light.

Learn more about photograph from

https://brainly.com/question/25821700

#SPJ1

Edhesive unit 4 test answers

Answers

Answer:

Can you show the questions?

Explanation:

Create a secure password (10 points)
Ask the user how long they want their password to be, then return a randomized password that includes all the letters of the alphabets, capitalization, numbers, and special characters.

Answers

Answer:

python

Explanation:

import random

secret_length = input("how long you want the secret to be?\n")

secret_length = int(secret_length)

characters = r"abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789$%^&*("
secret = ""

for i in range(secret_length):

   secret = secret + random.choice(characters)

print(secret)

what trends do you see pushing innovation in televisions? why are these important to consumers?

Answers

Several trends are driving innovation in televisions. Firstly, the advancement of display technology, such as OLED and QLED, is leading to higher resolution, improved color accuracy, and enhanced contrast, providing consumers with a more immersive viewing experience. Secondly, the integration of smart features, including internet connectivity and streaming services, allows users to access a wide range of content and personalized entertainment options.

Additionally, the increasing popularity of larger screen sizes and thinner bezels contributes to a more visually appealing and space-efficient design.

These trends are important to consumers for several reasons. Firstly, improved display technology enhances the overall picture quality, resulting in more vibrant and lifelike visuals. This makes watching movies, shows, and sports events more enjoyable and engaging. Secondly, the integration of smart features provides convenience and flexibility, allowing users to easily access their favorite content and customize their viewing experience. Lastly, the availability of larger screen sizes and sleeker designs caters to the growing demand for home theater setups and aesthetically pleasing living spaces. Overall, these innovations enhance the entertainment value, convenience, and visual appeal of televisions, meeting the evolving needs and preferences of consumers.

To know more about OLED ,

https://brainly.com/question/14312229

#SPJ11

Once a tester has penetrated a network and gained access, what is the tester's next step?
Attempt to pivot or move around inside the network to other resources.
End the test and present the findings to the contracted company.
Close the vulnerability for the target company.
Disconnect from the network and attempt to regain entry using a different method.

Answers

Once a tester has successfully penetrated a network and gained access, the next step is typically to attempt to pivot or move around inside the network to other resources.

This involves looking for additional vulnerabilities or weaknesses in the network that could be exploited to gain further access to sensitive information or systems. The ultimate goal of a penetration test is to identify as many vulnerabilities as possible so that the target company can address them and improve their security posture. Once the test is complete, the tester will typically present their findings to the contracted company, including details on the vulnerabilities that were identified and recommendations for how to address them. It is not ethical for the tester to close the vulnerability for the target company without their permission or knowledge, and it is also not appropriate to disconnect from the network and attempt to regain entry using a different method without authorization.

To know more about network visit:

https://brainly.com/question/29350844

#SPJ11

Mark is the network administrator in his building and is responsible for training all the new technicians on various troubleshooting techniques. He is instructing them on documenting their actions at the end of the troubleshooting process. What should he NOT encourage them to document at that time

Answers

Answer:

See answer below

Explanation:

He should not encourage his new technicians to document theories that were followed at the end of the troubleshooting process. This because the theory might not add to their knowledge about troubleshooting. What is paramount and needed to be documented for future references are their findings, actions taken by them and the outcome achieved through the whole troubleshooting process.

In trouble shooting, a technician aims at solving problems on computer system by following a set of steps such as establishing theory of probable cause, testing the theory to determine the cause, establishing a plan of action and implementing the solutions; in order to determine and solve the problem.

The theories here are the steps that were followed in determining and solving the observed issues hence should not be documented except the findings, actions taken and the final outcomes that were achieved.

python language
You work at a cell phone store. The owner of the store wants you to write a program than allows the
owner to enter in data about the cell phone and then calculate the cost and print out a receipt. The code
must allow the input of the following:
1. The cell phone make and model
2. The cell phone cost
3. The cost of the cell phone warranty. Once these elements are entered, the code must do the following:
1. Calculate the sales tax – the sales tax is 6% of the combined cost of the phone and the warranty
2. Calculate the shipping cost – the shipping cost is 1.7% of the cost of the phone only
3. Calculate the total amount due – the total amount due is the combination of the phone cost, the
warranty cost, the sales tax and the shipping cost
4. Display the receipt:
a. Print out a title
b. Print out the make and model
c. Print out the cell phone cost
d. Print out the warranty cost
e. Print out the sales tax
f. Print out the shipping cost
g. Print out the total amount due

Answers

Python is an interpreted, high-level, general-purpose programming language that is widely used for developing web applications, data science, machine learning, and more.

Python is easy to learn and use, and it has a large and active community of developers who constantly contribute to its libraries and modulesWe then calculate the sales tax, shipping cost, and total amount due based on the input values. Finally, we print out the receipt, which includes the phone make and model, phone cost, warranty cost, sales tax, shipping cost, and total amount due. The program also formats the output to include the dollar sign before the monetary values.

Python is a high-level, interpreted programming language that is easy to learn and use. It has a wide range of applications, including web development, data science, machine learning, and more. Python is widely used in the industry due to its ease of use, readability, and robustness. Python's standard library is vast and includes modules for a variety of tasks, making it easy to write complex programs. Python's syntax is simple and easy to read, which makes it easy to maintain. Python is also an interpreted language, which means that code can be executed directly without the need for a compiler. Overall, Python is an excellent language for beginners and experienced developers alike.

To know more about Python visit:

https://brainly.com/question/30776286

#SPJ11

What is important in the gaming industry and why?

Answers

Answer:

The gaming industry is considered to be one of the most exciting industries in tech because of its importance to culture, entertainment and technological advancement. ... Gaming is pushing the boundaries of entertainment by providing a totally immersive experience across anything that has a screen.

WAS THIS ANSWER HELPFUL?

MARK ME AS A BRAINLIEST

Answer:

the gaming industry is important because if you have a good game you can make sequels and get more money and also without gaming many people in the world would be bored

Explanation:

Kyra is protesting corruption in the mayoral office. She is afraid that the mayor has access to her emails where she discusses his wrongdoings. Which of the following laws protects her electronic communication from being accessed by the government or law enforcement agencies?

Answers

Answer:i don’t know sorry

Explanation:

Sue is installing a printer. What program will she need to get the printer to work with her computer?​

Answers

Answer:

Utility software tool

Explanation:

After connecting the printer and turning it on, you'll need to install the printers software and drivers. Every printer should come with the software used to install a printer in Windows or your operating system.

Answer: it would be utility sofeware tool

Explanation:

my mom works with alot of printer stuff

Security Technology Incorporated (STI) is a manufacturer of an electronic control system used in the manufacture of certain special-duty auto transmissions used primarily for police and military applications. The part sells for $61 per unit and STI had sales of 24,300 units in the current year, 2021. STI had no inventory on hand at the beginning of 2021 and is projecting sales of 26,900 units in 2022. STI is planning the same production level for 2022 as in 2021, 25,600 units. The variable manufacturing costs for STI are $22, and the variable selling costs are only $0.40 per unit. The fixed manufacturing costs are $128,000 per year, and the fixed selling costs are $560 per year.
Required:
1. Prepare an income statement for each year using full costing.
2. Prepare an income statement for each year using variable costing.

Answers

1. Under full costing, STI's income statement for the current year shows sales revenue of $1,486,300, cost of goods sold of $779,500, and a net income of $259,800. For the projected year, sales revenue is estimated to be $1,641,400, cost of goods sold to be $812,800, and a net income of $328,800.

2. Under variable costing, STI's income statement for the current year shows sales revenue of $1,486,300, variable expenses of $657,900, and a net income of $294,200. For the projected year, sales revenue is estimated to be $1,641,400, variable expenses to be $712,600, and a net income of $342,800.

Under full costing, all manufacturing costs, both variable and fixed, are included in the cost of goods sold. This means that the income statement reflects the complete cost of producing each unit, including the allocation of fixed costs. In the current year, STI had sales of 24,300 units, which generated sales revenue of $1,486,300 (24,300 units x $61 per unit). The cost of goods sold was $779,500, calculated as (24,300 units x $22 variable manufacturing cost) + $128,000 fixed manufacturing costs. Subtracting the cost of goods sold from sales revenue gives a net income of $259,800.

For the projected year, STI estimates sales of 26,900 units, which would generate sales revenue of $1,641,400 (26,900 units x $61 per unit). The cost of goods sold is estimated to be $812,800, calculated as (26,900 units x $22 variable manufacturing cost) + $128,000 fixed manufacturing costs. Subtracting the cost of goods sold from sales revenue gives a projected net income of $328,800.

Under variable costing, only the variable manufacturing costs are included in the cost of goods sold, while fixed manufacturing costs are treated as period costs and are not allocated to the units produced. In the current year, the variable expenses amounted to $657,900, calculated as 24,300 units x $22 variable manufacturing cost. Subtracting the variable expenses from sales revenue gives a net income of $294,200.

For the projected year, the variable expenses are estimated to be $712,600, calculated as 26,900 units x $22 variable manufacturing cost. Subtracting the variable expenses from sales revenue gives a projected net income of $342,800.

Learn more about income statement

brainly.com/question/14890247

#SPJ11

[JAVA] 30 points to write the program

[JAVA] 30 points to write the program

Answers

The text document I added has all the code needed to complete this problem. Best of luck.

what type of storage device is a removal hard drive?​

Answers

Hello :D

A removal hard drive is a second storage device.

I hope this helps :DD

The computer on the internet that operates like the traditional post office is called

Answers

Answer:

Email is a form of communication that acts as a traditional post office in a virtual sense

Other Questions
A deep sea diver descends below the surface of the water at a rate of 60 feet each minute. What is the depth of the diver after 10 minutes. When Harry mixes different materials to pave a road, he knows that they must be kept at the following temperatures in degrees Fahrenheit. Calculate the temperatures in degrees Celsius. A). Bituminous material must be between 200F and 260F. B). Water solution must be between 65F and 100F. C). The mixing gel must be between 160F and 210F. HELP ASAP THIS IS DUE AT 12 AM AND ITS 9 PM FOR ME HELPPP Calculate the number of moles of Cu(NO3)2in 250mL of 0.500 M solution URGENT! Positive integers B and C satisfy b^2 - bC-23=0. What is the value of C.A. 21 b. 22 c.23 d.24 write a function that takes two parameters, a list and an atom, and returns a list identical to the first parameter except with all instances of the given atom deleted. Which of the following theory is not considered one of the three mainstream theories of criminology?1) Differential association theory2) Anomie-strain theory3) Labeling theory4) Control theory what is the slope of the line that passes through the points (-7, -7) and (-7, 1) ? A block of cheese has a volume of 187 cm3 and a mass of 140 g.What is the density of the cheese in g/cm3 rounded to 2 decimal places? Consider the problemmin x1 x2subject to x1 + x2 >= 4x2>=x1What is the value of *2? The outcome of the 1677 treaty which operation results in a trinomial. (4x5-8x) (3x2-8x+9) When might a company price below full cost?Question content area bottomPart 1Select all that apply.A.The company has idle capacityB.A competitor puts similar products on saleC.To be in line with market-based pricingD.The company wants more inventory There are three categories used to describe cloud shape: stratus, ________ and cirrus. A nimbus B nucleus C cumulus D cirrostratus In egalitarian society, the most important distinctions are those of...A)sexB)educationC)only two of these options are correctD)age Please help ASAP PLEASEEEEEE ITS MATH Masha bought red, green, and yellow balloons for a party. She bought 40 red balloons. The number of green balloons Masha bought is 3/5 of the number of red balloons. The number of green balloons is also 2/3 of the number of yellow balloons. You are standing at Hanover College (longitude 87 W) and note that the Sun transits according to your watch at exactly noon (1200). You friend is located at a longitude of 117. At what time, according In a football game, Team A defeated Team B by a score of 31 to 14. The total points scored came from a combination of touchdowns, extra-point kicks, and field goals, worth 6, 1, and 3points, respectively. The numbers of touchdowns and extra-point kicks were equal. There were six times as many touchdowns as field goals. Find the number of touchdowns, extra-pointkicks, and field goals scored. The box-and-whisker plot represents the lengths (in minutes) of movies being shown at a theater.