Explain one way that wartime advances in such areas as computers

Answers

Answer 1

Explanation:

If countries went to war right now, the counties that will be most successful to win are those that have the best technology. However, my answer will not discuss about wars, but will rather discuss how military technologies in the 20th and 21st centuries have caused technological advancements in areas such as computers, medicine, and air travel. Wartime advances brought about the internet that is commonly known as the World Wide Web. We use the internet in our everyday lives to work and co-exist. Without the internet right now, we would not be able to achieve a lot in our lives. Computers during the World War II helped win wars and kick started the modern digital era. The computers have since shrunk in size and are portable enough to fit right into our pockets. Many years later, we use computers a lot for survival. The emergence and discovery of various war craft and jet engines has brought about the planes in the skies above us that helps us travel from point A to B in this modern world.


Related Questions

You just turned on a four port Ethernet switch (it hasn’t learned any addresses yet) and connected a host to each port. You send packet #1 from 00:11:22:33:44:55 to 66:77:88:99:00:11 which arrives at port 1 of your switch. Next, packet #2 is sent from 22:33:44:55:66 to 00:11:22:33:44:55 which arrives at port 3 of your switch. Which of the following are true?
1. Packet #1 is broadcast on all ports
2. After the first packet is received, the switch associates 66:77:88:99:00:11 with port 1
3. Packet #2 is only sent out on port 1
4. Packet #2 is sent out on ports 1, 2, 4

Answers

Answer:

Option 2 is correct.

Explanation:

When the user recently switched over that port Ethernet device, which is, no addresses have yet been acquired as well as a client has been linked on each port. He sends #1 packet from 00:11:22:33:44:55 to 66:77:88:99:00:11 arriving at the device's port 1. Next packet #2 is transmitted between 22:33:44:55:66 to 00:11:22:33:44:55 that appears at the switch's port 3.

So that the Package # 2 will be sent only through port 1 by the user who switched over the network.

Alan is developing a business impact assessment for his organization. He is working with business units to determine the maximum allowable time to recover a particular function. What value is Alan determining? A. Recovery time objective (RTO) B. Recovery point objective (RPO) C. Business recovery requirements D. Technical recovery requirements

Answers

Answer:

A. Recovery time objective (RTO)

Explanation:

The recovery time is defined as the maximum length of time require to recover a system or any network from the failure.

Hence, to determine the recovery time of the function, one can use the RTO.

Write a class named Accumulator containing: An instance variable named sum of type integer. A constructor that accepts an integer parameter, whose value is used to initialize the sum instance variable. A method named getSum that returns the value of sum. A method named add that accepts an integer parameter. The value of sum is increased by the value of the parameter.

Answers

Answer:

The following are the code in the C++ Programming Language.

//define header file

#include <iostream>

// using namespace

using namespace std;

//define a class

class Accumulator

{

//set private access modifier

private:  

//declare integer type variable

int sum;

//set public access modifier

public:

//define constructor  

Accumulator (int sum)

{

//refer the same class as instance variable

this->sum = sum;

}

//define integer type function

int getSum()

{

//return the value of sum

return sum;

}

//define void type function

void add (int value)

{

//variable sum is increased by the argument value

sum += value;

}

};

Explanation:

The following are the description of the code.

Firstly, set the required header file and namespace then, define a class 'Accumulator' and inside the class. Set private access modifier then, declare an integer data type variable 'sum'. Declare a class constructor whose name is the same as the class name 'Accumulator()' and pass integer data type argument 'sum' in its parameter that refers to the same class as instance variable. Define a integer data type function 'getSum()' that return the value of the variable sum. Finally, define a void type function 'add()' and pass the integer data type argument 'value' in its parameter in which the variable sum is increased by the argument value .

A(n) _____ is an interactive information system consisting of hardware, software, data, and models (mathematical and statistical) designed to assist strategy makers in an organization.

Answers

Answer:

decision support system

Explanation:

A decision support system is a set of related computer programs and the data required to assist with analysis and decision-making within an organization.

Cheers

Given the definition of the function one_year_older:def one_year_older(name, age): print('Name:', name) age = age + 1 print('Your age next year:', age) print()Which of the following statements will invoke the function one_year_older successfully?A. one_year_older(27, 'John')B. one_year_older()C. one_year_older('John', 27)D. one_year_older('John')one_year_older(27)

Answers

Answer:

C. one_year_older('John', 27)

Explanation:

The correct call to the function one_year_older() is the option C which is one_year_older('John', 27). This is because in the definition of the function, it was defined with two parameters name and age, so when this function is invoked, the argument for name and age must be passed to it in the function call. Hence option C which passes a string John (as the first argument name) and an int 27 (as the second argument age)

Often a successful attack on an information system is due to poor system design or implementation. Once such a vulnerability is discovered, software developers quickly create and issue which of the following, in order to eliminate the problema. patch
b. bot
c.logic bomb
d.Trojan horse

Answers

Answer:

Option A i.e., Patch.

Explanation:

The effective intrusion towards the data system is sometimes related to inadequate layout or execution of the system. Upon discovery of this flaw, application designers rapidly construct and release a patch to solve the issue.

A patch seems to be the series of improvements intended to modify, resolve or enhance a system program or even its associated information. It requires resolving protection problems as well as other defects, known patch corrections or bugfixes, and enhancing the accessibility, reliability, or efficiency of these patches.

The code snippet below checks whether a given number is a prime number. What will be the result of executing it? public static void main(String[] args) { int j = 2; int result = 0; int number = 0; Scanner reader = new Scanner(System.in); System.out.println("Please enter a number: "); number = reader.nextInt(); while (j <= number / 2) { if (number % j == 0) { result = 1; } j++; } if (result == 1) { System.out.println("Number: " + number + " is Not Prime."); } else { System.out.println("Number: " + number + " is Prime. "); }.A) The code snippet will not compile.
B) The code snippet will display the desired result.
C) The code snippet will display an incorrect result.
D) The code snippet will loop forever.

Answers

Answer:

B) The code snippet will display the desired result.

Explanation:

The code Snippet will give the expected result.

Prime numbers are numbers that are have only two divisors... That is 1 and itself

The while block:    

   while (j <= number / 2) {

           if (number % j == 0) {

               result = 1;

           }

           j++;

       }

ensures that whenever there is a remainder of dividing the variable number by j, then it is not a prime number, since prime numbers are only divisible by 1 and themselves. The result =1 is then tested in an if statement to give the expected output

Final answer:

The code snippet correctly determines if a number is prime and will display the desired result; however, the efficiency could be improved by checking divisors only up to the square root of the number.

Explanation:

The code snippet provided checks whether a given number is prime. The result of executing this code snippet will be B) the code snippet will display the desired result. When the user enters a number, the program will divide that number by all integers from 2 up to the number divided by 2.

If any of these divisions result in a remainder of 0, the result variable is set to 1, indicating that the number is not prime. If none of the divisions have a remainder of 0, the result variable remains at 0, meaning the number is prime.

The only issue with this code is that it will continue checking until number/2 even though we could optimise it by only checking up to the square root of the number (number¹/²). However, this does not affect the accuracy for determining if a number is prime within the range checked.

A security administrator is testing the security of an AP. The AP is using WPA2. She ran an automated program for several hours and discovered the AP's passphrase. Which of the following methods was she MOST likely using?
A. IV attack
B. Disassociation attack
C. WPS attack
D. Evil twin attack

Answers

Answer:

WPS attack

Explanation:

WiFi protected setup (WPS) is a convenient feature that allows the user to configure a client device against a wireless network by simultaneously pressing a button on both the access point and the client device (the client side “button” is often in software) at the same time. Since it has access to the Access point, it can get the passphrase.

A user complains because the social media apps on his mobile device always note his location. The user is worried about privacy, and would like to keep this information from being broadcast on his social media. Which of the following features should the user adjust in order to accomplish this?

Answers

Answer:

Geotracking

Explanation:

Geotracking is the feature that needs to be adjusted in order to keep this information from being broadcast on his social media.

A(n) ____________________ is a hardware device or software utility designed to intercept and prevent unauthorized access to a computer system from an external network.

Answers

Answer:

hardware device

Explanation:

Paul is playing a game when his computer shuts down unexpectedly. Paul has noticed recently that his fans are running very loud. When Paul turns his computer back on, it starts to boot and then shuts off again.What is a possible problem with Paul’s computer?

Answers

Answer:

there is a lot of heat in his computer he should let the computer rest for some time and then use it again

When computer manufacturers overcame the enormous 13,000 Chinese character barrier by creating a workable keyboard through voice and handwriting recognition, PCs became more accessible to the Chinese. What was the predicted effect of the events on equilibrium price and quantity of PCs sold in China

Answers

Answer:

Check the explanation

Explanation:

The effect of the events on equilibrium price and quantity is that the Price and quantity of PCs sold soared, the innovation which later made PCs more robust and able to utilize the Chinese language shifts the demand curve for computers to the right.

The price and number rose.

__________ refers to the coupling of data stored in files and the specific programs required to update and maintain those files such that changes in programs require changes to the data.

Answers

I think it is good for the environment

As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?

Answers

Final answer:

The manager should use an Electronic Data Interchange (EDI) system to improve the inventory process, which allows vendors to review and adjust orders, thus increasing efficiency and reducing waste.

Explanation:

As the new manager at a local grocery store looking to improve your inventory processes, you should consider the implementation of an Electronic Data Interchange (EDI) system. EDI allows for the computer-to-computer exchange of business documents in a standard electronic format between business partners. This system would enable outside vendors and suppliers to review current inventory records and adjust their shipment orders accordingly, ensuring a more efficient inventory process and reducing product waste.

To further enhance the supply chain, advancements in technology, transportation methods, and robust policies during national emergencies should be considered. For example, Amazon utilizes highly computerized warehouses and economies of scale to lower costs per sale, which is a strategy worth considering. Additionally, the adoption of labor rights protections is crucial for the stability of supply chain operations.

By incorporating EDI technology and considering strategies employed by industry leaders like Amazon, your grocery store can achieve greater efficiency and reduce unnecessary expenses caused by outdated inventory management practices and congested transportation networks.

Local-area network (LAN) A It interconnects locations scattered throughout a metropolitan area. 2 Wide-area network (WAN) B It is a network whose scale is even smaller than a LAN. An example of this type of network is a connection between a PC and a digital camera via a universal serial bus. 3 Metropolitan-area network (MAN) C It interconnects network components within a local region. 4 Personal-area network (PAN) D It interconnects network components that are geographically dispersed between two locations.

Answers

Answer:

Local-area network (LAN - It interconnects network components within a local region

Metropolitan-area network (MAN)- It interconnects locations scattered throughout a metropolitan area

Wide-area network (WAN) -  It interconnects network components that are geographically dispersed between two locations.

Personal-area network (PAN) -  It is a network whose scale is even smaller than a LAN. An example of this type of network is a connection between a PC and a digital camera via a universal serial bus

Explanation:

Local-area network (LAN - It interconnects network components within a local region, it is smaller compared to a WAN

Metropolitan-area network (MAN)- It interconnects locations scattered throughout a metropolitan area

Wide-area network (WAN) -  It interconnects network components that are geographically dispersed between two locations.it uses routers to link between the geographical locations

Personal-area network (PAN) -  It is a network whose scale is even smaller than a LAN. An example of this type of network is a connection between a PC and a digital camera via a universal serial bus

You are adding new wires in your building for some new offices. The building has a false ceiling that holds the lights and provides an air path for heating and air conditioning. You would like to run your Ethernet cables in this area.

Answers

Answer:

Plenum rate cable.  

Explanation:

The Plenum rated cable has an unique coating with the low fire resistance and smoke. The main reason to used the Plenum rate cable in the office because it allowing the intense cooling of the  servers also  for the safety purpose we used the Plenum rate cable.  

In the office we used Plenum rate cable wires because The house has a false ceiling housing the lights and supplying air-conditioning and ventilation routes.

The ________, which employed a typewriter-like keyboard, was introduced in the 1800s and enabled printers to set type mechanically rather than manually.

Answers

Answer:

The answer is "linotype machine".

Explanation:

The Linotype is the model, that is also known as a "line casting" tool. It uses in during the production of the corporation and related businesses enthrallment linotype.  

In this model, a heated metal casting method is used that inserts a 90-character platform, which is used to casts metal frames for each use. It places matrix multiplication on one side, which are molds for word types.

what is the sentinel value in the following code snippet?
public static void main(String[] args)
{
int age = 0;
int sum_of_ages = 0;
int stop = 1;
Scanner reader = new Scanner(System.in);
System.out.println("Enter an age (-1 to stop): ");
age = reader.nextInt();
while (age != -1)
{
sum_of_ages = sum_of_ages + age;
System.out.println("Enter an age (-1 to stop): ");
age = reader.nextInt();
}
System.out.println("Sum of ages " + sum_of_ages);
return 0;
}

Answers

The answer to the problem is 5

The sentinel value in the following code snippet is 1.

What is sentinel value?

An algorithm that uses the presence of a sentinel value as a condition for termination, generally in a loop or recursive algorithm, is known as a sentinel value in computer programming.

For instance, the number "-1" can be used as the sentinel value in a loop algorithm that computes non-negative integers because the computation will never encounter that value as a valid processing output. Also known as a signal value or a flag value.

A while loop can also be used as a sentinel loop. Until it encounters a certain value that indicates the end, a sentinel loop keeps processing data. The sentinel is the name of the exceptional value. For the sentinel, any value is possible.

Therefore, in the following line of code, the sentinel value is set to 1.

To learn more about sentinel value, refer to the link:

https://brainly.com/question/28541937

#SPJ5

You are trying to build a spreadsheet model to determine what to bid on a construction project. If you are having difficulty constructing the spreadsheet model, what type of chart might you draw to help you set up the model?

Answers

Answer:

Influence

Explanation:

While the user attempts to create a prototype spreadsheet to decide how to offer on such a building plan. Unless he has trouble building the worksheet model, he draws an influence chart to encourage himself to build up the model.

An influencing chart seems to be an understandable graphical representation of a question in judgment. It portrays that elements as modules of different colors and patterns, such as choices, complexities, and targets. It features influences as bullets between them.

A junior administrator is having issues connecting to a router's console port using a TIA/EIA 568B standard cable and a USB serial to RJ-45 adapter, despite verifying terminal settings. What is the issue?

Answers

Answer:

Only rollover cables can be used in network device console management port.

Explanation:

Intermediate network devices are used for transmitting packets across networks. It has ports for connecting to other intermediate devices and end devices like the computer system.

Routers and switches are examples of intermediate network devices. They have management ports used to initially and periodically configure these devices. The console port is the main management port for device console. An administrator connects to the port using a rollover cable, which has a serial or USB connector on the computer end and a RJ45 on the network device end.

You have just installed a new sound card in your system, and Windows says the card installed with no errors. When you plug up the speakers and try to play a music CD, you hear no sound. What is the first thing you should do? The second thing?

Answers

Answer:

1. Volume check

2. Manage Device

Explanation:

1. Verify the volume is turned up in Windows and on the speakers. This can be done easily by going to the volume control icon on the computer.

2. Check Device Manager to see if the sound card is recognized and has no errors. This can be done by navigating thus:

My PC (Right click) > Manage > Device manger

Cheers

SELECT vendor_name, COUNT(*) AS number_of_invoices, MAX(invoice_total - payment_total - credit_total) AS balance_due FROM vendors v JOIN invoices i ON v.vendor_id = i.vendor_id WHERE invoice_total - payment_total - credit_total > (SELECT AVG(invoice_total - payment_total - credit_total) FROM invoices) GROUP BY vendor_name ORDER BY balance_due DESC (Please refer to the code example above.) When this query is executed, the rows will be sorted by:________.a. balance_due in descending sequence b. invoice_id c. vendor_id

Answers

Answer:

Option a is the correct answer for the above question.

Explanation:

The above question asked about the order of the result which is derived from the above query. The above query holds an order by clause in desc order which is used to produce the result in descending order.The descending order result is produced on the behalf of balance_due attributes and the option a also states the same. Hence option a is correct while the other is not because:-Other is not states that the result is produced on the behalf of descending order.

Answer:a

Explanation:

True or False: Unity can apply multiple textures to a single object or terrain

Answers

This is very true unity is what u said and it is the definition of this

Answer:

True

Explanation:

please help asap
Compare and contrast if-else and elif statements. Give examples.
What are the relational operators? How are they used?

Answers

Answer:

a. Comparison of if-else and elif:

if else follow as:

If (Condition)

{

In case if condition true, expression in this section executes

}

else

{

In case condition is false, expression in this section executes

}

elif Statement follows as:

If (Condition)

{

In case if condition true, expression in this section executes

}

{

in case, condition is false, move to elif block

elif (Condition)

{

In case elif condition true, expression in this section executes

}

else

{

In case elif condition is false, expression in this section executes

}

}

Explanation:

In if else, program first check the condition in "if statement", if condition is true it move into the body of "if " and execute the expression. If the condition is false it moves to the body of "else" and execute the expression.

elif is another block of condition in If else condition,It works as in "if statement" if the condition is true the program executes the expression of body of "if body". If the condition is false, it moves to another block of "elif", where it again check some other condition found in "elif statement". If the condition of "elif statement" is true it executes the expression of "elif body" otherwise in case of false condition it execute the expression in "else body".

It follows as: if - elif-else

Answer

b. the relational operators

Relation operators are the operators that are need in the expression to establish relationship between different operands of the expression.

Explanation:

In few expressions, their are some operators used to establish or show the relationship between different operands. These operator could be Equal (=), Greater than(>), Less than (<), Greater than equal to (>=) and Less than Equal to (<=).

These operators can be used in conditional statements that are used to check the relationship between operands and values through these operators.

Example

if (a>5)

{

if value of is greater than 5 then body of if will execute.

}

else

{

If value of a is less or equal to 5, this section will execute.

}

Analyze the following code. public class Test { public static void main(String[] args) { double radius; final double PI= 3.15169; double area = radius * radius * PI; System.out.println("Area is " + area); } }

Answers

Answer:

The output of the given code as follows:

Output:

Area is: 12.60676

Explanation:

In the given code some information is missing so, the correct code to this question can be described as follows:

Program:

public class Test //defining class  

{

   public static void main(String[] args)//defining the main method

   {

       double radius= 2; //defining double variable radius

       final double PI= 3.15169; //defining double variable PI

       double area = radius * radius * PI; //defining double variable area that calculates values

       System.out.println("Area is: " + area); //print values

   }  

}

Explanation:

In the given java code a class "Test" is defined, in which a double variable "radius" is defined, which holds a value, that is 2. In the next step, a double constant variable, that is PI is defined, that holds a value, that is "3.15169". Then another double variable area is defined, that calculates the area value, and prints its value.

What process involves the changing of a program's internal structure without changing the way the program works?

Answers

Answer:

Code Refactoring

Explanation: Code Refactoring is

A systematic process of improving a code without changing its functionality. It can be used to change a "mess" into a clean code.

Refactoring is the process of restructuring an existing computer code, changing the factoring without changing its external behavior. It is intended to improve nonfunctional attributes of the software it is expected to achieve this by continuously improving the design of code, hence making it easier and easier to work with.

Therefore the process of "changing of a program's internal structure without changing the way the program works" Is Code Refactoring.

Kamilla is creating a pet adoption website, and is currently learning about her options using the position property.
If Kamilla wants an element to remain in the same location in a browser window, even as the user scrolls through the Web page, she would use the ____ position property.
a. absolute
b. fixed
c. relative
d. float

Answers

Answer:

B. Fixed position property.

Which of the following is a disadvantage of using face-to-face communication over other communication channels? A) There is lag time between transmission and reception of the message. B) It is often difficult to schedule a time to meet face-to-face. C) Face-to-face communication reduces your ability to hold the receiver's attention. D) It is more difficult to develop effective relationships with individuals when you use face-to-face communication.

Answers

Answer:

Option B is correct.

Explanation:

The drawback to choosing face-to-face contact across certain platforms of interactions is that it is always impracticable to plan a schedule for face-to-face conversation because mostly the time of both participants should not be the same, sometime the one person wait for the other person or the other person wait for 1st one.

The following problems occur through the internet, the system configuration or the browsers, application configuration. So, the following are the reasons that describe the other options are not appropriate according to the scenario.

The answer choice which is a disadvantage of using face-to-face communication over other communication channels is that:

B) It is often difficult to schedule a time to meet face-to-face.

According to the given question, we are asked to state the answer choice which is a disadvantage of using face-to-face communication over other communication channels.

As a result of this, we can see that when a person is making use of face-to-face communication, then he is taking in real time with the person and the possible disadvantage of this is that it is often difficult to schedule a time to meet face-to-face

Therefore, the correct answer is option B

Read more about face-to-face communication here:

https://brainly.com/question/10002236

What specific record type is found in every zone and contains information that identifies the server primarily responsible for the zone as well as some operational properties for the zone?

Answers

The SOA is the specific record type found in every zone and contains information that identifies the sever primarily responsible for the zone as well as some operational properties for the zone.

Explanation:

The Start of Authority Records (SOA) has the following information they are

Serial Number: This number is used to find when zonal information should be replicated.

Responsible person: The Email address of a person is responsible for managing the zone.

Refresh Interval: It specifies how often a secondary DNS server tries to renew its zone information.

Retry Interval: It specifies the amount of time a secondary server waits before retrying the zone information has failed.

Expires After: IT specifies the amount of time before a secondary server considers its zone data if it can't contact with the primary server.

Minimum TTL: It specifies the default TTL value for a zone data when a TTL is not supplied.

Given the definition of the function one_year_older:def one_year_older(name, age): print('Name:', name) age = age + 1 print('Your age next year:', age) print()Which of the following statements will invoke the function one_year_older successfully?A. one_year_older(27, 'John')B. one_year_older()C. one_year_older('John', 27)D. one_year_older('John')one_year_older(27)

Answers

Answer:

The answer is "Option C".

Explanation:

Method Definition:

In the given python code, a method "one_year_older" is defined, which accepts two parameters "name and age", in which name accepts string value and age accepts integer value. Inside the method the print method is used, that print name variable value then increments the value of age variable by 1 and print its value, in this question except "Option C"  all were wrong, which can be described as follows:

In option A, In method calling first, it passes integer value, then string value that's why it is wrong. In option B, In this method calling there is no parameter is used. In option D, This type of method calling is illegal.  

Other Questions
Overton Company has gathered the following information. Units in beginning work in process 21,200 Units started into production 178,800 Units in ending work in process 25,700 Percent complete in ending work in process: Conversion costs 60 % Materials 100 % Costs incurred: Direct materials $100,000 Direct labor $373,074 Overhead $186,600(a) Compute equivalent units of production for materials and for conversion costs. (b) Determine the unit costs of production. (c) Show the assignment of costs to units transferred out and in process. 2. A 1.00 x 103 kg sports car accelerates from rest to 25.0 m/s in 7.50 s. What is theaverage power output of automobile engine?a. 20.8 kWb. 30.3 kWC. 41.7 kW Mike and Sam Tun laps. Mike runs a lap in 5 minutes and Sam runs a lap in 6 minutes. If Mike and Sam begin running at the same time, after how many minutes will they cross the starting line at the same time? Locate the participle and the word it modifies. Dressed in white, the bride walked down the aisle What causes Mrs. Susan b. anthony Explain three causes of the Spanish-American War of 1898. A highly agitated client paces the unit and states, "I could buy and sell this place." The clients mood fluctuates from fits of laughter to outbursts of anger. Which is the most accurate documentation of this clients behavior? What goes in the blank? Recuerdas ______ te dije del sof nuevo ayer? A 3-kg block rests on top of a 2-kg block supported by, but not attached to, a spring of constant 40 N/m. The upper block is suddenly removed. Determine (a) the maximum speed reached by the 2-kg block, (b) the maximum height reached by the 2-kg block. You want to teach your dog to stop scratching at the door when he wants to go out. You do so by swatting his nose with a newspaper each time he scratches the door. By creating consequences for your dogs behavior, you have used ________ to train him. . Peoples conquered by the Romans had a choice between peaceful occupation orA. High taxesB. Mandatory Latin classesC.Bloody resistanceD. Neutrality Aristotles famous golden mean method for knowing where Virtue can be found give the degree of the polynomial -3w+x^6y^5-2+5y^4w^3x^2 Whats the horizontal line and vertical line?-use X=blank and Y=blank. The choroid layer of the eye is avascular.TrueFalse Replace the underlined words with the appropriate interrogative pronoun.De quelle banque viens-tu?a. Duquelb. Auquelc. De lequeld. De laquelle Check your knowledge of the characters in The Tragedy of Julius Caesar through act 3.Who is part of the conspiracy that killed Caesar? Who warns Caesar to beware the ides of March? Who fears for Caesar's safety because of omens? Who gives funeral orations after Caesar is murdered? Which linkages would you expect to find at a branch point in glycogen or amylopectin? Dana wants to give Fleesum's employees more freedom to schedule when they begin and end their work days. Her plan still requires employees to work eight hours per day, but allows them to start as early as 7:00 a.m. or as late as 9:00 a.m., and leave as early as 4:00 p.m. or as late as 6:00 p.m. Her plan also requires all workers to be on the job between 9:00 a.m. and noon, and between 2:00 p.m. and 4:00 p.m. The type of plan Dana wants to implement is known as a: what is c- 1/2 + 16=36