Business ethics the intranet is a private piece of a company's internet network that is made available to computers and/or vendor partners on the basis of secured access by a unique password.A. True B. False

Answers

Answer 1

Answer:

The answer is "Option A".

Explanation:

In the private sector of communications offers intranets, it is also known as the area of business ethics, that share data within corporations. The purpose of this service is to improve communication, coordination, and data sharing within the organization for employees.

It allows you to make a free email account, that runs on a server.  It navigate emails when they have Internet speeds as well as a browser.

Related Questions

Which of the following is a high-speed network dedicated to storage that connects different kinds of storage devices, such as tape libraries and disk arrays so they can be shared by multiple servers? Select one: a. SSN b. ASP c. LAN d. SAN e. Grid

Answers

Answer:

SAN

Explanation:

A Storage Area Network (SAN) is a high-speed sub network of shared storage devices. A SAN's architecture works in a way that makes all storage devices available to all servers on a LAN or WAN. As more storage devices are added to a SAN, they too will be accessible from any server in the larger network.

The _____ is in effect when an interest group tries to mobilize large numbers of constituents to write, phone, or send e-mails and tweets to legislators or the president.

Answers

Answer:

Shotgun Approach

Explanation:

The shotgun approach is used in politics, marketing, and other areas as well.

In marketing, it is an approach to reach large populations or cover a wide area with product or service promotional campaigns.

In politics, however, it is considered more of a brute approach to handle certain issues. A large number of constituents are mobilized to reach the president or higher authorities (legislators) through different means, such as writing, phoning, sending emails or tweeting to emphasize their plight.

This approach is usually used when it is assumed that the legislator or president is not aware of what is going on with that location.

The Transmission Control Protocol (TCP) splits each message into multiple packets. It's possible for packets from the same message to arrive out of order.Which field in the IP packet helps computers put the packets in the original order?

Answers

Answer:

The header file

Explanation:

The 'header' of a packet contains two important information about the data being sent over a network,  number indicating the ordering of all the packets (This ensures that the packets are re-ordered corrected upon arrival at the destination). and information about the total number of packets that the data has been split into, this helps at the destination to know if all packets has arrived, or delayed or lost

"A user reports that the corporate web server cannot be accessed. A technician verifies that the web server can be accessed by its IP address. What are two possible causes of the problem? (Choose two.)"

Answers

Two possible causes for a corporate web server being inaccessible by its domain name but accessible by its IP address are DNS issues and web server configuration errors.

If a user reports that the corporate web server cannot be accessed but confirms that the web server can be accessed by its IP address, two possible causes of the problem are as follows:

A DNS Issue: The domain name system (DNS) may not be correctly translating the website's hostname into its IP address, which is necessary for browsers to locate the server on the Internet.A Web Server Configuration Error: The server hosting the website might be misconfigured to not recognize or respond to requests for the hostname in question, while still responding to direct IP address requests.

Both scenarios would prevent users from accessing the website through its domain name, despite the server itself being operational and accessible directly via its IP address.

Some early computers protected the operating system by placing it in a memory partition that could not be modified by either the user job or the operating system itself. Describe two difficulties that you think could arise with such a scheme.

Answers

Here are two difficulties that I think could arise with a scheme that protects the operating system by placing it in a memory partition that could not be modified by either the user job or the operating system itself.

What's the issue about?

The operating system would be difficult to update. Any changes to the operating system would require the entire operating system to be copied to a new memory partition. This could be a time-consuming and error-prone process.

The operating system would be vulnerable to hardware failures. If the memory partition containing the operating system were to fail, the entire operating system would be unavailable. This could cause a major disruption to the system.

Learn more about computer

https://brainly.com/question/24540334

#SPJ1

Placing the operating system in a non-modifiable memory partition poses two main challenges: difficulty in applying software updates and complications in system recovery. Both of these issues stem from the inability to modify the protected partition.

Early computers sometimes placed the operating system in a non-modifiable memory partition to protect it from being altered by user jobs or the operating system itself. This approach has notable difficulties:

Software Updates: By placing the OS in a memory partition that cannot be modified, applying updates or patches to address vulnerabilities becomes extremely difficult. This can render the system vulnerable to new threats as patching bugs or upgrading the OS requires access to modify the partition, which is restricted.System Recovery: In the event of an OS malfunction or corruption, restoring the system becomes challenging since the OS partition cannot be modified or rewritten. This may require physical intervention to replace the memory hardware or specialized tools to bypass the protection, leading to longer downtimes and more complex recovery processes.

These issues underline the balance modern operating systems must maintain between protecting their integrity and ensuring they remain flexible enough for updates and recovery.

For labs using high-end ____ servers or a private cloud (such as Dell PowerEdger or Digital Intelligence FREDC), you must consider methods for restoring large data sets.

Answers

Answer: RAID

Explanation: RAID now referred to a Redundant Array of Independent Disk are usually employed to improve general system performance, data redundancy, that is it allows storage of the additional or duplicate data in multiple disk areas which invariably increases overall system performance and may also be used in the control of silent data corruption. This is achieved by combining multiple disk drives into one or more logical unit.

Using high-end RAID servers or private cloud requires developing techniques for restoring large dataset in the scenarios of silent data corruption by providing measure of data redundancy.

Answer:

RAID

Explanation:

RAID redundancy array of independent/inexpensive disk is a collection of disk drive used to increase storage capacity and redundancy and to promote speed and performance of input/output device.

F.R.E.D.C or forensic recovery of evidence data center are high end data centers that provides high end services with raid functionalities and processing speed.

SP 800-14, Generally Accepted Principles and Practices for Securing Information Technology Systems, provides best practices and security principles that can direct the security team in the development of a security ________.

Answers

Answer:

blueprint.

Explanation:

Generally Accepted Principles and Practices for Securing Information Technology Systems, provides best practices and security principles that can direct the security team in the development of a security blueprint.

Answer:

The answer is blueprint.

Refer below for explanation.

Explanation:

Blueprint ia a guide that is made for something else, so it was originally made to copy.

Jack wants to store a large amount of data on his computer. He chooses to use a database for this purpose. What is a database? A database stores a large amount data in vertical and horizontal .

Answers

Answer:

1: Records

2: tables

Answer:Jack wants to store a large amount of data on his computer. He chooses to use a database for this purpose. What is a database? A database stores a large amount data in vertical Records and horizontal Tables.

Explanation:

Explain one way that wartime advances in such areas as computers

Answers

Explanation:

If countries went to war right now, the counties that will be most successful to win are those that have the best technology. However, my answer will not discuss about wars, but will rather discuss how military technologies in the 20th and 21st centuries have caused technological advancements in areas such as computers, medicine, and air travel. Wartime advances brought about the internet that is commonly known as the World Wide Web. We use the internet in our everyday lives to work and co-exist. Without the internet right now, we would not be able to achieve a lot in our lives. Computers during the World War II helped win wars and kick started the modern digital era. The computers have since shrunk in size and are portable enough to fit right into our pockets. Many years later, we use computers a lot for survival. The emergence and discovery of various war craft and jet engines has brought about the planes in the skies above us that helps us travel from point A to B in this modern world.

Information flows:
a. only back and forth between supply and external sources.
b. only into the supply group from external sources.
c. only into the supply group from other internal functions.
d. only back and forth between supply and other internal functions. between and among supply and other internal functions and external sources.

Answers

Answer:

e.

Explanation:

Information flow refers to the back and forth movement of information between different people and systems in order to communicate and perform different decision making processes. Information flows between and among supply and other internal functions and external sources. Information flow is used in just about everywhere in the world.

What machine learning technique helps in answering the question

Answers

i don’t know I need points :))))

Machine learning techniques like deep learning and reinforcement learning are pivotal for text analysis tasks, which require identifying and classifying patterns without explicit rules.

The question relates to machine learning (ML) to process textual data, where traditional rule-based systems fall short because of the complexity and variety of language. Such problems, like identifying references to a specific subject like the prophet Muḥammad in a corpus, require machine learning techniques to recognize patterns and infer rules that are not explicitly provided. ML techniques such as deep learning and reinforcement learning are especially potent in these scenarios, as they can learn from data to predict patterns and improve their performance over time, reducing bias and increasing the effectiveness of predictions.

Within the field of education, machine learning can help in the allocation of resources by analyzing data like satellite imagery combined with student enrollment information. This approach has been successfully used in international development efforts to predict poverty and mortality indicators, which demonstrates the potential utility of such techniques in helping answer complex questions and in making informed decisions.

The computer program that Josh is working on presents him with a sentence in which a word has been underlined. Josh has to indicate the part of speech represented by the underlined word. After receiving feedback about the correctness of his response, Josh is given another sentence with an underlined word. This description best illustrates what type of computer-based instruction (CBI) program?

Answers

Answer:

Drill and Practice

Explanation:

Drill and Practice is a type of Computer-based Instruction (CBI) program. In Drill and Practice, answered questions are given immediate feedback. These problems or exercises are structured and answered on the program to provide instant feedback to the person taking the test.

For instance, when going through an evaluation test but you are required to provide the correct answer before moving on. Once a question is answered, the program will indicate whether correct or wrong, if the question is correct, move to the next question but if wrong you start again. This is a typical example of Drill and practice.

This is exactly what is seen in our scenario in the question.

_______________ introduces the concept of memory cell which can process data within time lags.

Answers

Final answer:

Memory processing involves different stages, starting with short-term memory and moving into long-term memory as per Atkinson-Shiffrin's model. The dynamic nature of memory involves not only the consolidation at the synaptic level but also the capacity for memory construction and reconstruction. Baddeley and Hitch's working memory model further characterizes the complexity and dynamism in memory processing.

Explanation:

The concept that introduces the idea of a memory cell which can process data within time lags relates to the function of memory in biological organisms, particularly in the context of neuroscience and cognitive psychology. This concept illustrates how memories are not static but are instead continuously processed and consolidated over time. Two key types of memory are short-term memory (STM) and long-term memory (LTM). STM is a temporary storage that processes incoming sensory information and has limited capacity, as illustrated by research such as Miller's magical number seven, plus or minus two. In contrast, LTM has a seemingly unlimited capacity for storing information, and it includes processes of encoding, storing, and retrieving information. Before information can be stored as LTM, it goes through stages of memory, beginning with sensory memory, STM, and then LTM as per the Atkinson-Shiffrin model.



An ________ is essentially a collection of personal computers networked together with sophisticated software tools to help group members solve problems and make decisions through interactive electronic idea generation, evaluation, and voting.

Answers

Answer:

electronic meeting system

Explanation:

An electronic meeting system is essentially a collection of personal computers networked together with sophisticated software tools to help group members solve problems and make decisions through interactive electronic idea generation, evaluation, and voting.

Two employees are unable to access any websites on the internet, but can still access servers on the local network, including those residing on other subnets. Other employees are not experiencing the same problem. What should you do?

Answers

Answer:

In the Internet Options, define the name of the proxy server and the port number.

Explanation:

If the two staff  in the company are unable to reach the websites on the internet also  they are  able to access servers on the local area network also the Other staff members don't encounter the problem and they have to face the same problem because they do not define the name of the proxy server and the port number in the internet option.

If they do not define the proxy server and the post they have not accessing the website so to able the accessing it must properly define the proxy server and the port number.

Which operations security control prevents unauthorized intruders from internally or externally accessing the system and lowers the amount and impact of unintentional errors that are entering the system?

Answers

Answer:

The correct answer is Preventative controls.

Explanation:

Preventive Controls: Anticipate unwanted events before they happen.

They are more profitable They must be incorporated into the systems Avoid correction or reprocessing costs

Example: Security software that prevents access to unauthorized personnel, to try to prevent the production of errors or fraudulent events.

Climax Medical Technology, a fast-growing global research firm, has accumulated so much client information that conventional database management systems cannot handle its customers’ needs. Therefore, Climax purchased very sophisticated analysis software and supercomputing-level hardware. Climax Medical Technology is tapping the power of:____________.

Answers

Answer: Big data

Explanation:Big data is a term used to describe data that are large,they can be structured or unstructured which Organisations handle and deal with on daily basis as they conduct business with other Organisations. The analysis of this large volume of data is a main and most important factor to consider in handling big data.

By adopting better and Sophisticated approach to handle the large volume of Information which it receives, Climax Medical Technology is TAPPING THE POWER OF BIG DATA.

A page break can be prevented from being added before or after a heading by using the keyword _____ in the page-break-before or page-break-after properties.

Answers

Answer:

avoid

Explanation:

Fill in the blank

A page break can be prevented from being added before or after a heading by using the keyword avoid  in the page-break-before or page-break-after properties.

A __________ is an entity that manages the use, performance, and delivery of cloud services, and negotiates relationships between CSPs and cloud consumers.

Answers

Answer:

Cloud Broker is the correct answer of this question.

Explanation:

A cloud broker is a person or industry government entity acting as an operator between the buyer of a cloud computing service and the buyers of that software

In a cloud broker would be someone who operates as an interpreter during negotiation involving two or more organizations.A cloud broker is a technology platform which utilizes function transmission between multiple third party service suppliers.

Jose is working on a project on engineering. Which site can he use to connect with an experienced engineer?


A) Spoke

B) Meetup

C) Tagged

D) Face Book

Answers

Answer:

The answer is "Option C".

Explanation:

The Meetup is a site, which is used to provide global learning. It is also encouraged informal interactions of people, who have met online. These people are connected with a shared offline connection online, and wrong choices can be described as follows:

In option A, It is a networking function, that provides connecting resources between local nodes and networks. In option C, It is an online dating site. In option D, It is a social networking site, that provides communication.

Climax Medical Technology, a fast-growing global research firm, has accumulated so much client information that conventional database management systems cannot handle its customers’ needs. Therefore, Climax purchased very sophisticated analysis software and supercomputing-level hardware. Climax Medical Technology is tapping the power of:____________.

Answers

Answer: Big Data

Explanation:

Big data is type of treatment for complex and large data through analyzing huge amount of data , arranging in certain trend or sets and then extracting the information or data from it in appropriate order.

It can store and process extremely huge amount of data.It us commonly used for storage of customer-related data,mobile data, web data etc.According to the question, Climax Medical technology is turning towards usage of big data. They are using big data to analyze, arrange the huge client information data into a certain pattern for extracting it systematically.

You need to synchronize your mobile device data with your desktop computer. for security reasons, your organization prohibits syncing devices over wireless connections or the internet. which connection(s) could you use to perform the synchronization?

Answers

Answer:

USB

Explanation:

WHile trying to sync your mobile device data with your desktop computer, and Trying to avoid syncing your device over wireless connections or the internet, the best possible solution that comes to mind is to make use of USB.

Here you simply connect your phone to a USB cable and plug it to the USB port on your computer, you will be able to carry out the necessary syncing without violating the promotions from your organization concerning syncing devices over wireless connections or the internet.

The three tasks within data harmonization, namely: data consolidation, data cleansing, and data formatting use techniques called harmonization rules that implement those tasks. True False

Answers

The three tasks within data harmonization, namely: data consolidation, data cleansing, and data formatting use techniques called harmonization rules that implement those tasks -The statement is true

Explanation:

Data harmonization refers to the process of combining the data of varying files and formats ,name conventions and columns and transforming the same into one data set.

Data harmonization refers to the process of integrating multiple data source into a single data set.

By adopting the Data harmonization technique we can reduce the problem of redundant data and conflicting standard

The name harmonization is an analogy to the process to harmonizing discordant music.

The goal of data harmonization is to find commonalities, identify critical data that need to be retained, and then provide a common standard.

Final answer:

The statement regarding the use of harmonization rules in data consolidation, data cleansing, and data formatting tasks within data harmonization being true is correct. These rules are essential for integrating, analyzing, and utilizing data effectively.

Explanation:

The statement that the three tasks within data harmonization, namely: data consolidation, data cleansing, and data formatting use techniques called harmonization rules that implement those tasks is true. Data harmonization is a critical process in ensuring that data from various sources can be effectively integrated, analyzed, and utilized for decision-making.

The process involves several key steps, including data consolidation, which is the merging of data from different sources; data cleansing, which involves identifying and correcting errors or inconsistencies; and data formatting, which ensures that data from different sources adhere to a common format for seamless integration.

Harmonization rules are sets of guidelines or algorithms that help automate these tasks, ensuring accuracy and efficiency in the data harmonization process.

Design a program that lets the user enter the total rainfall for each of 12 months into a list. The program should calculate and display the total rainfall for the year, the average monthly rainfall, and the months with the highest and lowest amounts.

Answers

Answer:

import java.util.Arrays;

import java.util.Scanner;

public class num12 {

   public static void main(String[] args) {

       double [] rainfall = new double[12];

       Scanner in = new Scanner(System.in);

       System.out.println("Enter the rainfall for the first month");

       rainfall[0]= in.nextDouble();

       for(int i=1; i<rainfall.length-1; i++){

           System.out.println("Enter rainfall for the next month");

           rainfall[i]= in.nextDouble();

       }

       System.out.println("Enter the rainfall for the last month");

       rainfall[11]=in.nextDouble();

       System.out.println(Arrays.toString(rainfall));

       int totalRainfall = 0;

        for(int i=0; i<rainfall.length; i++){

            totalRainfall += rainfall[i];

        }

       System.out.println("Total Rainfall is "+totalRainfall);

       System.out.println("The Average Monthly Rainfall is "+(totalRainfall/12));

       double minRain = rainfall[1];

       int monthLowest =0;

       for(int i =0; i<rainfall.length; i++){

           if(minRain>rainfall[i]){

               minRain = rainfall[i];

               monthLowest =i;

           }

       }

       System.out.println("The Minimum Rainfall is: "+minRain+ " In the "+(monthLowest+1) +" Month");

       double maxRain = rainfall[1];

       int monthHighest =0;

       for(int i =0; i<rainfall.length; i++){

           if(maxRain<rainfall[i]){

               maxRain = rainfall[i];

               monthHighest =i;

           }

       }

       System.out.println("The Maximum Rainfall is: "+maxRain+" In the "+(monthHighest+1)+" Month");

   }

}

Explanation:

Using Java programming Language

An Array is created to hold the list of total monthly rainfall.Scanner is used to prompt user to enter the monthly rainfallUsing a for loop the user is prompted to repetitively enter rainfall for each monthThe list is displayed using Java's Arrays.toString MethodThe total rainfall is created by adding elements at index 0-11 using a for loopThe montly average is calculated by dividing total rainfall by 12 totalRainfall/12Using a combination of  for loops and if statements and creating variables for Min and Max rainfall we determine the maximum and minimum months of rainfall and output them

Howard’s In The Process Of Creating A Google Display Campaign And Decides To Use Custom Intent Audiences As A Targeting Option. He’d Like To Influence Customer Consideration, But His Niche Audience Isn’t Covered By An In-Market Audience Segment. Which Two Data Inputs Can Howard Submit To Best Represent His Audience? (Choose Two.)
1. January 28, 2020 Admin0
2. Negative keywords
3. URLs4. Keywords
5. Topics6. Offline conversions

Answers

Answer:

Option 3 and Option 4 i.e., URLs and Keywords are correct.

Explanation:

Howard through the Phase for developing the following display project as well as determines to still use specific Purpose Viewers As just the targeting tool. He would prefer to affect consumer attention, however his limited demographic is not served by such an in-market client group.  

Thus, URLs, as well as keywords, are data inputs that Howard sends to better serve his viewer. So, the following are the reason that describe the other options are not appropriate according to the scenario.

java
Create a do-while loop that asks the user to enter two numbers. The numbers should be added and the sum displayed. The loop should ask the user whether he or she wishes to perform the operation again. If so, the loop should repeat; otherwise it should terminate
Sample Run1
Enter two numbers: 3 15
Do you want another operation: Yes
Enter two numbers: 45 56
Do you want another operation: No
Output1: Sum = 119
Sample Run2
Enter two numbers: 33 150
Do you want another operation: Yes
Enter two numbers: -56 56
Do you want another operation: Yes
Enter two numbers: 58 15
Do you want another operation: Yes
Enter two numbers: 123 87
Do you want another operation: No
Output2: Sum = 466

Answers

Answer:

import java.util.Scanner;

public class num3 {

   public static void main(String[] args) {

     Scanner in = new Scanner(System.in);

       System.out.print("Enter two numbers: ");

       int num1 = in.nextInt();

       int num2 = in.nextInt();

       int sum = num1+num2;

       System.out.print("Do you want another operation: ");

       String ans = in.next();

       while(ans.equalsIgnoreCase("yes")){

           System.out.print("Enter two numbers:");

           num1= in.nextInt();

           num2 = in.nextInt();

           System.out.println("Do you want another operation: ");

           ans = in.next();

           sum = sum+(num1+num2);

       }

       System.out.println("sum = "+sum);

   }

}

Explanation:

In the program written in Java Programming language,

The scanner class is used to prompt and receive two numbers from the user which are stored as num1 and num2. Another variable sum is created to hold the sum of this numbers

Then the user is prompted to answer yes or no using Java's equal.IgnoreCase() method.

If the user enters yes, he/she is allowed to entered two more numbers that are countinually added to sum

If the user eventually enters a string that is not equal to yes. The loop terminates and the accumulated value of sum is printed.

Write an if statement that prints the message ""The number is not valid"" if the variable distance is outside the range 100 through 2000(both inclusive).

Answers

Answer:

The solution code is written in Python:

if(distance < 100 or distance > 2000):        print("The number is not valid")

Explanation:

In this question either one of the two conditions (distance < 100 or distance > 2000) is met, the error message should be generated. Python offers the "or" keyword as a logical operator. The "or" keyword will join two conditions and so long as one of them is True, the final outcome will be evaluated to True. For example, if distance = 90 the error message will be printed. If distance is 2500, the error message will also be printed.

Why would an administrator lower an RF signal on a wireless access point?
Increase QoS
Lower interference
Lower the signal to keep it in the building
Make it harder for guests to access the network

Answers

1. Increase QoS

Explanation:

The radio bands with lower frequency have relatively large wavelengths that are not as affected by objects such as building, trees, weather events or other features in the troposphere as the higher frequency radiation. General rule for radiation is that the lower the frequency, i.e. the longer the wavelength, the further a signal can penetrate through solid objects or liquids. Hence, when the frequency is lowered on a wireless access point, the signals can travel farther and smoother. Thus, increasing the quality of service.

The two major types of system software programs are utility programs and the ________. Select one: A. user interface B. supervisor programs C. application software D. operating system

Answers

Answer:

operating system

Explanation:

System software are those programs that many refer to as computer programs. The most basic function of system software is to manage the computer systems. It acts as an interface between the computer’s hardware and the end user. System software converts instructions that end users give to the computer into a machine understandable language. Examples of system software include operating systems, utility programs, device drivers, and windows systems. The operating system is responsible for the functioning of all the computer’s hardware parts. It is the software loaded into the system when the computer boots up. It manages everything, from the memory, to the CPU, and many other different tasks.

When trying to remember a list of words, a person may choose a word to which they "hang" their memories on. This type of mnemonic device is called the _____ technique.

Answers

Answer:

Peg

Explanation:

This is known as the "peg technique." The name comes from the fact that we usually employ pegs to hang clothes to dry. In this memory aid, the person who wants to memorize something creates mental associations between two concrete objects. This is done in a one-to-one fashion that links all the words together.

Other Questions
as a salesperson, jonathan is paid $50 per week of the total amount he sells. this week, he wants to earn at least $100. write an inequality with integer coefficients for the total sales needed to earn at least $100 and describe with a solution represents what is 45 times 35 divided by 344 Find the amount of money accrued at the end of 5 years when $5000 is deposited in a savings account drawing 5 1 4 % annual interest compounded continuously. (Round your answer to the nearest cent.) 5. Compare and Contrast Compare theexperiences of African Americans with those ofwhite Americans during the Great Depression. what position were Lincoln and Douglas trying to win in the election of 1858 PNEWTONWhat is the ist law of motion? Terri, age 16, is a dependent of her parents. During 2018, Terri earned $5,000 in interest income and $3,000 from part-time jobs. Click here to access the 2018 tax rate schedule and 2018 Estate and Trust Tax Rate Schedule. a. What is Terri's taxable income Expand and simplify 4(2x+4)+5(4x+3) The tables show the books read by two different students. Explain how to determine which student read faster. The mass luminosity relation L M 3.5 describes the mathematical relationship between luminosity and mass for main sequence stars. It describes how a star with a mass of 2 M would have a luminosity of _____________ L while a star with luminosity of 3,160 L would have an approximate mass of ________________ M. Regarding the formula AI2 O3 which of the following is accurate According to a book by a Harvard Business School professor, some organizational cultures simply cannot meet the challenges posed by innovation and must respond to threats from new technologies by building outside ventures. Digital Equipment is described as having one of those organizational cultures. The company squandered the opportunities presented by the PC revolution even though it was well equipped to build cheap PCs. The company did not have ____.(A) adaptability(B) synergy(C) a formula for success laddering(D) knowledge management(E) comprehension What is the authors purpose in the article A reason that some African Americans in New England in the early 1800swere allowed to vote was that: There was a special on sweatshirts is sweatshirt was on sale for $9.69 if a customer bought three striped shirt at the regular price of $12.95 a fourth sweatshirt was free which is the better buy for sweatshirts at 9.69 each or three sweatshirts at $12.95 in a fourth one free? Which superficial landmarks could help a health professional locate the pancreas in the body? A physics class has 40students. Of these, 10students are physics majors and 17students are female. Of the physics majors, fourare female. Find the probability that a randomly selected student is female or a physics major.The probability that a randomly selected student is female or a physics major is___. (Round to 3 decimal places) While waiting in the checkout line at Essentials, Autumn spotted a nail care kit displayed amongst the candy and batteries. She liked it and asked the cashier to add it to her bill. Which form of limited problem solving did Autumn engage in?A. Planned purchasingB. Cross-shoppingC. Psychological problem solvingD. Impulse buyingE. Contemplation "Makers Corp. had additions to retained earnings for the year just ended of $213,000. The firm paid out $183,000 in cash dividends, and it has ending total equity of $4.88 million. The company currently has 110,000 shares of common stock outstanding."What are earnings per share?What are dividends per share?What is the book value per share?If the stock currently sells for $63 per share, what is the market-to-book ratio?What is the price-earnings ratio?If the company had sales of $3.52 million, what is the price-sales ratio? Nestor cuts a cake with a 12-inch dameter One of the pleces he cuts has a central angle of 24 What is the area of the sice of cake? What fraction of the entire cake is this? Explain pleces he cuts has a central angle of 24 s