While configuring a computer, you find that you need to create, format, and manage the partitions and volumes on your hard drives. whichis the best command line utility to use?

Answers

Answer 1

The best command-line utility to create, format, and manage partitions and volumes on hard drives is "Diskpart."

Diskpart is a command-line utility available in Windows operating systems that allows users to manage disk partitions and volumes. With Diskpart, you can create new partitions, format existing partitions with different file systems (such as NTFS or FAT32), extend or shrink partitions, assign drive letters, and perform various other disk management tasks.

It provides a powerful and flexible way to interact with and manage storage devices via the command prompt or script files. Therefore, Diskpart is the recommended command-line utility for creating, formatting, and managing partitions and volumes on hard drives.

You can learn more about command-line utility at

https://brainly.com/question/32479002

#SPJ11


Related Questions

¿Qué algoritmos de encriptación utilizan una clave para cifrar los datos y una clave diferente para descifrarlos?

Answers

Answer:

Asimétrica

Explanation:

Los algoritmos de encriptación sirven para que solo el destinariario y receptor de los datos logren acceder a la información, es decir que inmediatamente que es enviada la información, solo puede ser legible para quien tenga un código de acceso, al mismo quien envía necesita una clave diferente para enviar lo datos. es un algoritmo asimétrico porqué el emisor y el receptor usan claves diferentes de encriptación.

The bootloader (GRUB/LILO) loads which of the following components into memory?(choose two)

The ramdisk
The root filesystem
The kernel
The init process

Answers

The bootloader (GRUB/LILO) loads the kernel and the ramdisk into memory.

What is a bootloader?

A bootloader is a piece of software that is usually stored in non-volatile memory, such as the device's read-only memory or bootable medium, and is intended to load and start software or operating system.

It is the first piece of software that runs when you turn on your computer and is responsible for loading the operating system.The bootloader loads the kernel and the ramdisk into memory, as stated in the question.

The kernel is the core component of the operating system that controls all hardware and software operations. A ramdisk is a portion of RAM that has been formatted with a filesystem, which can be used as a file storage device.

Learn more about  Bootloader at

https://brainly.com/question/30774984

#SPJ11

What is Boolean algebra

Answers

Answer:

Boolean algebra is a division of mathematics that deals with operations on logical values and incorporates binary variables.

Explanation:

What is the correct syntax to take the first five characters from the cell A2 and place it to its right in cell A3? =RIGHT(A3,5) =LEFT(A2,5) =RIGHT(A2,5) LEFT(A2,5)

Answers

Answer:=LEFT(A2,5)

Explanation:

Answer:

=LEFT(A2,5)

Explanation:

got it right on edge 2020 :)

the state machine model describes a system that is always secure no matter what state it is in. a secure state machine model system always boots into a secure state, maintains a secure state across all transitions, and allows subjects to access resources only in a secure manner compliant with the security policy. which security models are built on a state machine model?

Answers

The security models are built on a state machine model in Bell-Lapadula and Biba.

There are five kinds of security models used to describe the rules and policies that govern the integrity, confidentiality, and protection of data.

Bell-LaPadula Model.Biba Model.Clark Wilson Model.Brewer and Nash Model.Harrison Ruzzo Ullman Model.

The Bell–LaPadula Model (BLP) is defined as a state machine model used for enforcing access control in government and military applications. It was developed by David Elliott Bell and Leonard J. LaPadula, after strong guidance from Roger R.

You can learn more about The Security model at https://brainly.com/question/14896278

#SPJ4

Can anyone re-write this code in a way that still works but looks different to the reader? It is a single-player Tic Tac Toe game.


board = [' ' for x in range(10)]

def insertLetter(letter, pos):
board[pos] = letter

def spaceIsFree(pos):
return board[pos] == ' '

def printBoard(board):
print(' | |')
print(' ' + board[1] + ' | ' + board[2] + ' | ' + board[3])
print(' | |')
print('-----------')
print(' | |')
print(' ' + board[4] + ' | ' + board[5] + ' | ' + board[6])
print(' | |')
print('-----------')
print(' | |')
print(' ' + board[7] + ' | ' + board[8] + ' | ' + board[9])
print(' | |')

def isWinner(bo, le):
return (bo[7] == le and bo[8] == le and bo[9] == le) or (bo[4] == le and bo[5] == le and bo[6] == le) or(bo[1] == le and bo[2] == le and bo[3] == le) or(bo[1] == le and bo[4] == le and bo[7] == le) or(bo[2] == le and bo[5] == le and bo[8] == le) or(bo[3] == le and bo[6] == le and bo[9] == le) or(bo[1] == le and bo[5] == le and bo[9] == le) or(bo[3] == le and bo[5] == le and bo[7] == le)

def playerMove():
run = True
while run:
move = input('Please select a position to place an \'X\' (1-9): ')
try:
move = int(move)
if move > 0 and move < 10:
if spaceIsFree(move):
run = False
insertLetter('X', move)
else:
print('Sorry, this space is occupied!')
else:
print('Please type a number within the range!')
except:
print('Please type a number!')


def compMove():
possibleMoves = [x for x, letter in enumerate(board) if letter == ' ' and x != 0]
move = 0

for let in ['O', 'X']:
for i in possibleMoves:
boardCopy = board[:]
boardCopy[i] = let
if isWinner(boardCopy, let):
move = i
return move

cornersOpen = []
for i in possibleMoves:
if i in [1,3,7,9]:
cornersOpen.append(i)

if len(cornersOpen) > 0:
move = selectRandom(cornersOpen)
return move

if 5 in possibleMoves:
move = 5
return move

edgesOpen = []
for i in possibleMoves:
if i in [2,4,6,8]:
edgesOpen.append(i)

if len(edgesOpen) > 0:
move = selectRandom(edgesOpen)

return move

def selectRandom(li):
import random
ln = len(li)
r = random.randrange(0,ln)
return li[r]


def isBoardFull(board):
if board.count(' ') > 1:
return False
else:
return True

def main():
print('Welcome to Tic Tac Toe!')
printBoard(board)

while not(isBoardFull(board)):
if not(isWinner(board, 'O')):
playerMove()
printBoard(board)
else:
print('Sorry, O\'s won this time!')
break

if not(isWinner(board, 'X')):
move = compMove()
if move == 0:
print('Tie Game!')
else:
insertLetter('O', move)
print('Computer placed an \'O\' in position', move , ':')
printBoard(board)
else:
print('X\'s won this time! Good Job!')
break

if isBoardFull(board):
print('Tie Game!')

while True:
answer = input('Do you want to play again? (Y/N)')
if answer.lower() == 'y' or answer.lower == 'yes':
board = [' ' for x in range(10)]
print('-----------------------------------')
main()
else:
break

Answers

The re-written program for the Tic Tac Toe game is given as follows:

board = [' ' for _ in range(10)]

def insert_letter(letter, pos):

   board[pos] = letter

def space_is_free(pos):

   return board[pos] == ' '

def print_board(board):

   print(' | |')

   print(' ' + board[1] + ' | ' + board[2] + ' | ' + board[3])

   print(' | |')

   print('-----------')

   print(' | |')

   print(' ' + board[4] + ' | ' + board[5] + ' | ' + board[6])

   print(' | |')

   print('-----------')

   print(' | |')

   print(' ' + board[7] + ' | ' + board[8] + ' | ' + board[9])

   print(' | |')

def is_winner(bo, le):

   return (bo[7] == le and bo[8] == le and bo[9] == le) or (bo[4] == le and bo[5] == le and bo[6]

What is a Tic Tac Toe Game?

Tic-tac-toe, also known as noughts and crosses or Xs and Os, is a two-person paper-and-pencil game in which each player takes turns marking the spaces in a three-by-three grid with an X or an O.

The winner is the player who successfully places three of their markers in a horizontal, vertical, or diagonal row.

Learn more about games:
https://brainly.com/question/3863314
#SPJ1



Do you think that smart televisions are going to replace media players?

Answers

Answer:

yes because smart television give more information

Edhisive 4.9 lesson practice what variable is used to track the amount of loops that have been executed

Answers

Your question does not make clear which programming language you are interested in learning about, and the solution to a query about keeping track of loop iterations varies depending on the programming language and type of loop being used.

Define for loops.

A for-loop or for-loop in computer science is a control flow statement that specifies iteration. A for loop works specifically by constantly running a portion of code up until a predetermined condition is met. A header and a body are the two components of a for-loop.

A "For" Loop is employed to repeatedly run a given block of code a certain number of times. We loop from 1 to that number, for instance, if we wish to verify the grades of each student in the class. We utilize a "While" loop when the number of repetitions is unknown in advance.

To learn more about for-loop, use the link given
https://brainly.com/question/19706610
#SPJ1

The ________ function accepts two or more logical tests and displays TRUE if all conditions are true or FALSE if any one of the conditions is false. (5 points) NOT NOR AND OR

Answers

Answer:

brianary system function

What are enterprise messaging solutions most often used by business teams
for?
A. Cataloging and printing shipping labels for product deliveries
B. Sorting through and deleting a large number of company emails
C. Working on projects and communicating with each other to stay
updated
D. Distributing and tracking the use of computers in the workspace

Answers

Answer:

C. Working on projects and communicating with each other to stay updated

Explanation:

Working on projects and communicating with each other to stay

updated. Therefore, the correct answer is option C.

An corporate Messaging System (EMS) is a system that allows "program-to-program" messaging across corporate applications and systems.

Company messaging is typically used to integrate several company systems. It is a software interface that allows one programme to send loosely connected asynchronous data (messages) and store it in a message queue until the receiving programme can process it.

Typically, enterprise messaging falls under two categories:

Enterprise Messaging is classified into two types: promotional and transactional.

Bulk SMS messages are used to market a company's products and services. Bulk uploads, templates, phonebooks, scheduling messages, viewing delivery reports, and importing text and excel files are all common capabilities.Transactional SMSs: The SMS is typically sent by the sender's name (brand name) and is available 24 hours a day, seven days a week.

Advantages of deploying an EMS:

Secure Messaging - The secure transmission of critical information and files to smartphones or feature phones.Notifications, reminders, and alerts are delivered globally.Two-way interactive SMS is commonly used for appointment confirmation, business process automation, surveys, and voting campaigns.Campaign Control/Management - Marketing programmes can be readily managed and measured in terms of performance.Delivery Assurance - Access to detailed message delivery can be gained.Customer preferences can be used to create customised messaging programmes using intelligent analytics and reporting.

Therefore, the correct answer is option C.

Learn more about the enterprise messaging solutions here:

https://brainly.com/question/32271386.

#SPJ3

An analysis of how businesses can adopt this digital trend using the APAA framework: Which quadrant of the APAA framework best suits the digital trend and why? the digital trend is Artificial Intelligence. APAA FRAMEWROK means Authority,Paid, Earned and Owned Media Framework.

Answers

When considering the digital trend of Artificial Intelligence (AI) in the APAA framework (Authority, Paid, Earned, and Owned Media Framework), the quadrant that best suits this trend is the **Authority** quadrant.

The Authority quadrant focuses on establishing credibility, thought leadership, and expertise in a specific domain. AI is a rapidly growing and evolving field, and businesses can leverage AI to position themselves as authorities in their industry.

By adopting AI technologies and showcasing their expertise in AI-driven solutions, businesses can establish themselves as leaders in the field. This can be done through various means, such as publishing research papers, contributing to industry conferences, speaking at events, or providing thought leadership content on AI-related topics.

The Authority quadrant allows businesses to demonstrate their knowledge, showcase their AI capabilities, and build trust among their target audience. It enables them to position themselves as trusted advisors and go-to resources for AI-driven solutions.

Overall, by embracing the digital trend of AI and focusing on the Authority quadrant of the APAA framework, businesses can establish themselves as authorities in the AI domain and gain a competitive edge in the market.

Learn more about Artificial Intelligence here:

https://brainly.com/question/23824028

#SPJ11

Using a pointer, complete this function that replaces all zero array values with the given value. Do not use an integer index. = pointers.cpp 1 void replace_zeroes (int* values, int size, int replacement) 2 { 3 int* p = values; 4 int* end 5 while (. ..) 6 { 7 8 } 9 }

Answers

Here is the finished function replace zeroes(int* values, int size, int replacement) is a void function. while (p end) (int* p = values; int* end = values + size; If (*p == 0), then *p = replacement, p++.

The function requires three arguments: the array's size, a pointer to the array's start, and the value to use in lieu of any zero values. We define a pointer p to point to the array's beginning and a pointer end to refer to the array's end inside the function (one element past the last element). After that, we iterate through the array using a while loop. If the value referred to by p is not zero, we replace it with the new value inside the loop. provided with replacement value. In order to move to the following element in the array, we finally increment the pointer p. We then repeat this process until we reach the end of the array.

learn more about pointer  here:

https://brainly.com/question/19570024

#SPJ4


Pauline is a manager of a team in a large website design firm. Her team members come from diverse cultural backgrounds. The performance of
her team sometimes suffers due to internal conflicts. As a manager, how can Pauline resolve these conflicts?

Answers

Answer: Pauline is a manager of a team in a large website design firm. Her team members come from diverse cultural backgrounds. The performance of her  team sometimes suffers due to internal conflicts. As a manager, how can Pauline resolve these conflicts?

Explanation: Pauline can resolve the conflicts by changing the subject by talking about something else when that happens they tend to forget what they were arguing about.

Which visual novels do you recommend and why?

Answers

Answer:

I rec recommend Fate/Stay Night. It's honestly so good!

Explanation:

what are the advantages of saving files in a cloud?
Please help!! ​

Answers

When using cloud storage, one of its main advantages is the accessibility and its ability to not get deleted as easily. Once a file is uploaded to the cloud, you can access it from almost any device as long as you have connection. And it’s not as easy from something to get accidentally deleted, as there is a backup.

what messages do we get about ourselves from rap and hip hop

Answers

The lyrics let us know that we have reached a very low point in the music industry

you need to listen to some YEEEE YEEEEE music

What is the missing line of code? >>> >>> math.sqrt(16) 4.0 >>> math.ceil(5.20) 6

Answers

Answer:

A math.pow reference

Explanation:

Answer:

from math import ceil

Explanation:

yes

Which rule for distributed databases states that users should feel as if the entire database is stored locally?

Answers

The rule for distributed databases notes that users should feel as if the whole database exists stored locally exists named Location transparency.

What is the advantage of distributed databases?

An advantage of a distributed database exists that the database can handle additional complex query processing. When relational databases store complex objects, these special data kinds exist comprehended as BLOBs.

The distributed databases, data exists physically kept across multiple sites and independently operated. The processors on each site exist joined by a network, and they don't contain any multiprocessing configuration. A common misconception exists that a dispersed database exists as a loosely attached file system.

In computer networks, location transparency exists the usage of phrases to determine network resources, sooner than their actual location. For instance, files exist accessed by a special file name, but the actual data exists kept in physical sectors scattered about a disk in either the local computer or in a network.

To learn more about distributed databases refer to:

https://brainly.com/question/13073549

#SPJ4

In Microsoft Windows 10,

In Microsoft Windows 10,

Answers

Answer: Cancel all Print Jobs

Explanation: Whoever gave you this clearly doesn't know how to themselves cause the exact wording to cancel all print jobs is as follows

"Cancel All Documents". if this was a teacher tell them to read up on their technology skills before they give the next test. I'm currently working on my Master's in computer Programming and have been working with Computers for over 15 years. I could put a better multiple choice quiz together in less than 10 mins. I wonder how long it took this idiot to put that quiz together.

The tree is at (2, 4) and the range is 3 meters. The bush is at (7, 5) and the range is 2 meters. Finally, the pond is at (5,7) and the range is 3 meters – what is the robot’s position?

Answers

Answer:

32

Explanation:

There is no Chapter 5, nor is there a section on tangents to circles. The curriculum is problem-centered, rather than topic-centered.

virtual conections with science and technology. Explain , what are being revealed and what are being concealed​

Answers

Some people believe that there is a spiritual connection between science and technology. They believe that science is a way of understanding the natural world, and that technology is a way of using that knowledge to improve the human condition. Others believe that science and technology are two separate disciplines, and that there is no spiritual connection between them.

What is technology?
Technology is the use of knowledge in a specific, repeatable manner to achieve useful aims. The outcome of such an effort may also be referred to as technology. Technology is widely used in daily life, as well as in the fields of science, industry, communication, and transportation. Society has changed as a result of numerous technological advances. The earliest known technology is indeed the stone tool, which was employed in the prehistoric past. This was followed by the use of fire, which helped fuel the Ice Age development of language and the expansion of the human brain. The Bronze Age wheel's development paved the way for longer journeys and the development of more sophisticated devices.

To learn more about technology
https://brainly.com/question/25110079
#SPJ13

Which type of infrastructure service stores and manages corporate data and provides capabilities for analyzing the data

Answers

Answer:

Data management.

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.

Hence, a database management system (DBMS) is a software that enables an organization or business firm to centralize data, manage the data efficiently while providing authorized users a significant level of access to the stored data.

In conclusion, data management is a type of infrastructure service that avails businesses (companies) the ability to store and manage corporate data while providing capabilities for analyzing these data.

What tool is similar to devmanview and is already present in microsoft windows systems?

Answers

A tool similar to DevManView that is already present in Microsoft Windows systems is Device Manager.

Device Manager is a built-in Windows utility that allows users to view and manage the hardware devices installed on their computer. It provides a comprehensive interface to handle device-related tasks, such as updating drivers, enabling or disabling devices, troubleshooting hardware issues, and viewing device properties.

To access Device Manager in Windows, you can follow these steps:

Open the "Start" menu.

Search for "Device Manager" and click on the corresponding result.

The Device Manager window will open, displaying a hierarchical list of hardware categories and the devices installed under each category.

Within Device Manager, you can expand the categories to view the devices and their properties, including their status, driver information, and other relevant details. It offers similar functionality to DevManView by providing an interface to manage and monitor the hardware devices connected to your Windows system.

To learn more about Microsoft Windows

https://brainly.com/question/30023405

#SPJ11

What is the key sequence to copy the first 4 lines and paste it at the end of the file?

Answers

Press Ctrl+C after selecting the text you want to copy. Press Ctrl+V while holding down the cursor to paste the copied text.

What comes first in the copy and paste process for a slide?

Select the slide you wish to copy from the thumbnail pane, then hit Ctrl+C on your keyboard. Move to the location in the thumbnail pane where you wish to paste the slide, then hit Ctrl+P on your keyboard.

What comes first in the copying process of a segment?

The secret to copying a line segment is to open your compass to that segment's length, then mark off another segment of that length using that amount of opening.

To know more about copy visit:-

https://brainly.com/question/24297734

#SPJ4

An application is to be written that would allow students to find out their GPA(double) and their total number of credits (an integer) gives the student number(an integer) Which field will be tthe key field?

Answers

Answer:

the key is = rand(the numbers of an integer)

What system do businesses use to ensure products work correctly?
A. Access control
B. File management
C. Quality control
D. Quality procedures

Answers

Answer:

i believe it should be quality control

Explanation:

it kind of says it in the name quality control makes sure that the products are working and functioning correctly

Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional questions.
Online Content: Site 1

Explain how to determine if an online source is credible. (site 1)

Answers

Determining if an online source is credible is an important skill for research and academic purposes. There are many factors that can help you evaluate the reliability and trustworthiness of a website or an article.

What are some common criteria to check source credibility?

Origin: Check to see if the website was created by a reputable organisation or author. The URL or copyright information can be used to identify the author. Trustworthy websites usually end in .org, .edu, .gov, or any recognizable web address.

Currency: Check if the information is up-to-date and current. You can look at the date of publication or update on the website or article. Outdated information may not reflect the latest developments or research on a topic.

Relevance: Check if the source is relevant to your research topic and purpose. You can look at the title, abstract, introduction, and conclusion of an article to see if it matches your research question and scope.

Authority: Check if the author and publication are a trusted authority on the subject you are researching. You can look at their credentials, affiliations, publications, citations, and reputation in their field.

Accuracy: Check if the information is factual, verifiable, and supported by evidence. You can look at the sources that the author cited and see if they are easy to find, clear, and unbiased. You can also cross-check with other sources to confirm the accuracy of the information.

Purpose: Check if the source has a clear purpose and audience. You can look at the tone, language, style, and bias of the source to see if it is objective, informative, persuasive, or entertaining. You should avoid sources that have hidden agendas, conflicts of interest, or misleading claims.

These are some general guidelines that you can follow when evaluating online sources for credibility. However, you should also use your own critical thinking skills and judgment when deciding whether a source is suitable for your research.

To learn more about website, visit: https://brainly.com/question/28431103

#SPJ1

I figured out the secret message in Dad feels good, I can connect the dots

It was morse code of blinking lights. Here is my translation

Andan
come in
this is base

Luietanat Emily Ridley
this is base
come in

This makes sense.

Dad's base wasn't on CFBDSIR, it was on 22B

Dad said not to forget 22B, Kepler 22B is the base. I think Kepler 22B is the base that some lifeform took over

Can you guys correct me if I am wrong

Answers

Answer:

Nope you figured it out

Explanation:

Type the correct answer in the box. Spell all words correctly.
Since the Internet, information has become easy to access quickly. This has lead to difficulty verifying this information and requires you to have
what attitude toward it?
A healthy(blank)
is required when attempting to verify information on the Internet.

Answers

Answer: search

Explanation:

Answer:

A healthy Skepticism is required when attempting to verify information on the Internet.

Explanation:

1.44 lab: divide by x write a program using integers usernum and x as input, and output usernum divided by x three times. ex: if the input is: 2000 2

Answers

Here's an example of a program in Python that takes two integer inputs (usernum and x) and outputs the result of dividing usernum by x three times:

For the given example with input 2000 and 2, the program will output:Please note that the program assumes valid integer inputs and performs floating-point division, resulting in decimal values in the output. If you want to perform integer division and get integer results, you can use the // operator instead of / for division. divide by x write a program using integers usernum and x as input, and output usernum divided by x three times. ex: if the input is: 2000 2

To know more about program click the link below:

brainly.com/question/21661364

#SPJ11

Other Questions
Please help soon algebra 1 problem in screenshot who ever gets this will get a brainlest and a good rating. 6. On Saturday, you bowl at Mar Vista Bowl, where renting shoescosts $2 and each game bowled is $3.50. On Sunday, you bowl atPinz where the shoe rental is $5 and each game bowled is $3.25. Ifyou spent the same amount each day, how many games, g, werebowled? Define variables. In order for a goal to be scored in field hockey where on the field must the ball be hit or touched from?. If oyu answer ill mark you as a brainlest it gives you 70 points and i will follow and answer any questions you have i promise. Read the passage from Beowulf.The hero arose, surrounded closelyby his powerful thanes. A party remainedunder orders to keep watch on the arms;the rest proceeded, led by their princeunder Heorots roof.And standing on the hearthin webbed links that the smith had woven,the fine-forged mesh of his gleaming mail-shirt,resolute in his helmet, Beowulf spoke:Which word from the passage is a feature of Anglo-Saxon culture?powerfulthanesroofgleaming actual output3,000unitsraw materials used in production11,370gramsactual direct labor-hours1,910hourspurchases of raw materials12,100gramsactual price of raw materials purchased$ 1.20per gramactual direct labor rate$ 11.40per houractual variable overhead rate$ 2.10per hour the company applies variable overhead on the basis of direct labor-hours. the direct materials purchases variance is computed when the materials are purchased. the labor efficiency variance for july is: please help answer these two i beggg Conjugate the verbs (in parenthesis) based on the subject or subject pronoun.You have multiple attempts to get a perfect score. Yes, it has to be spelled correctly. What factors prompted the transition from Fordism to post-Fordism in the US in the 1970s/80s? why might white South Africans fear democracy? What is the vantage point in the painting? Even if we reject the null hypothesis as our decision in the test, there is still a small chance that it is, in fact, true. True O False For each of the following nitrogenous base sequences, write the complimentary sequence on the line provided. a) A T C C T A G A A G G T __________ b) C G T T G C A G A A C T __________ c) T A C G G A T C G T C A __________ Which of the following describes a type of view that is based on a subquery that retrieves or derives data from one or more tables, and may also contain functions or grouped data?A - simple viewB - complex viewC - inline viewD - "TOP-N" analysis When ecologists study the way energy is distributed over a food chain or the rate at which nutrients are recycled, they're engaged in _____ in an effort to understand how the whole system works. a) habitat ecology b) systemic analysis c) ecosystem ecology d) biosphere studies Evaluate the following expression when x = 1 and y = 2 and z = 6 -3y2-4y + 5 What are the 5 major categories of control measures? Solve the expression (-3) (-2)(3)(4) use the relative frequency table . Out of all the lunch orders , what percent are sandwiches?