Given a string, return a new string made of 3 copies of the last 2 chars of the original string. The string length will be at least 2. extra_end('Hello') → 'lololo' extra_end('ab') → 'ababab' extra_end('Hi') → 'HiHiHi'

Answers

Answer 1

Answer:

def extra_end(str):

return 3*(str[-2:])

Explanation:


Related Questions

I have sampled a trumpet note and keymapped it to MIDI notes 55 to 65. If I play MIDI note 60 and hear middle C, what will I hear if I play MIDI note 62?

Answers

Answer:

The answer is D.

Explanation:

The musical interval between two notes depends on the ratio of their frequencies. An octave is a ratio of 2:1, an octave comprises 12 equal semitones. Each semitone therefore has a ratio of:

[tex]2^{\frac{1}{12} }[/tex]≈ 1.059

Then by convention, A4 is often set at 440 Hz and has MIDI note 69.

MIDI note 68 wich is one semitone below A4, that is, G#:

G#= [tex]\frac{440}{1.059}[/tex]=415.3 Hz

MIDI note 67 wich is one semitone below G#, that is, G:

G= [tex]\frac{415.3 }{1.059}[/tex]=392 Hz

MIDI note 66 wich is one semitone below G, that is, F#:

F#= [tex]\frac{392 }{1.059}[/tex]=369.9 Hz

MIDI note 65 wich is one semitone below F#, that is, F:

F= [tex]\frac{369.9 }{1.059}[/tex]=349.23 Hz

MIDI note 64 wich is one semitone below F, that is, E:

E= [tex]\frac{349.23 }{1.059}[/tex]=329.63 Hz

MIDI note 63 wich is one semitone below E, that is, D#:

D#= [tex]\frac{329.63 }{1.059}[/tex]=311.13 Hz

Therefore MIDI note 62 wich is one semitone below D#, that is,D:

D= [tex]\frac{311.13 }{1.059}[/tex]=293.6 Hz

Final answer:

If MIDI note 60 corresponds to middle C, then playing MIDI note 62 will result in the note D4, which is two semitones higher.

Explanation:

The student is asking about the relationship between MIDI notes and the pitches they represent. When a student plays MIDI note 60 and hears middle C, they are referencing the standard tuning where MIDI note 60 corresponds to middle C, which is 261.63 Hz (slight discrepancy from the 263 Hz mentioned, but both are commonly used to represent middle C). If the student then plays MIDI note 62 on the same key-mapped trumpet sample, they should expect to hear a note that is two semitones higher than middle C, which is the note D4.

You’re trying to cast a video presentation from your tablet to a projector for a training session with some new hires. Although you tested it successfully yesterday, today the connection is not cooperating. You’ve closed apps you’re not using, and you’ve checked that the projector and the tablet are working otherwise. Of the following troubleshooting steps, which should you try first? Second?
1. Restart the projector
2. Restart the tablet
3. Reinstall the presentation app.
4. Verify that you have Internet access on the tablet.

Answers

Answer:

Troubleshooting steps to take:

Restart the tabletRestart the projector

Explanation:

When such problems occur, the basic and quick troubleshooting step is to restart the device or devices involved.

Restart the tablet: This could come in handy regarding this problem. The inability to connect to the projector could be due to the inability of a specific service or driver needed for the projector. Restarting the tablet will load up the drivers and services again to enable smooth connections. When a restart is done, bugs are fixed, internet connection is rectified, memory leaks are stopped, performance is aided, the RAM (Random Access Memory) is flushed or cleaned. This should resolve the problem, however, if not, try number 2.Restart the projector: There are driver software on projectors, and due to one system failure or another, these software may fail to load. This could affect its connection to another device. As done in (1), restarting the projector will fix those bugs and load up, which should solve the connection issue.

Due to ________, early file processing systems were difficult to maintain.
a. frequent software upgrades
b. data dependency between the programs and files
c. complicated tables and fields with no metadata
d. lack of database administrators and IT personnel.

Answers

Answer:

b-data dependency between programs and files

Explanation:

The close relationship between data stored in files and the software programs that update and maintain those files. Any change in data organization or format requires a change in all the programs associated with those files.  

Which audio editing effect uses the option ""Get Profile"" to execute its function?

Answers

Answer: The audio editing effect that uses the option "Get profile" is used in removing background noises in an audio recording

Explanation:

"Get profile" or "get noise profile" as the case may be; depending on the software used, can be used to remove background noises when editing audios. This helps in making audio recordings noise free. The navigation processes are attached.

________ applications are software in which the vendor hosts the software online over the Internet and you do not to install the software on your computer. Select one: A. Platform as a Service B. Software as a Service C. Infrastructure as a Service D. Open Source as a Service

Answers

Answer:

B. Software as a Service

Explanation:

Software as a service (SaaS) is a cloud-based software in which the vendor hosts applications and make them available online for people to use without the need of installing them on their systems. Examples of Software as a service (SaaS) software include DocuSIgn, MailCHimp, Dropbox, BigCommerce, Salesforce etc.

Explain what a lookup table is (assembly). Write pseudo code

Answers

Answer: Lookup table

In computer science, a lookup table is an array that replaces runtime computation with a simpler array indexing operation. The savings in terms of processing time can be significant, since retrieving a value from memory is often faster than undergoing an "expensive" computation or input/output operation.[1] The tables may be precalculated and stored in static program storage, calculated (or "pre-fetched") as part of a program's initialization phase (memoization), or even stored in hardware in application-specific platforms. Lookup tables are also used extensively to validate input values by matching against a list of valid (or invalid) items in an array and, in some programming languages, may include pointer functions (or offsets to labels) to process the matching input. FPGAs also make extensive use of reconfigurable, hardware-implemented, lookup tables to provide programmable hardware functionality.

Business ethics the intranet is a private piece of a company's internet network that is made available to computers and/or vendor partners on the basis of secured access by a unique password.A. True B. False

Answers

Answer:

The answer is "Option A".

Explanation:

Intranets is a private network field, that enables you to efficiently share data within businesses. Its aim from an internal network is to improve communication, cooperation, and exchange of documentation for individuals inside the organization.

It offers a web site-operated email account. It enables people to access their e-mails because they have network and browser usage.

What is a "telescreen"? How is it different from the televisions we know? Is it possible to make a television that could see and hear everything in the room? Could such a device be used for discovering criminals and terrorists? Could it be used for political control? Would it be a good idea to instal?

Answers

Answer:

Telescreens are devices that operate as televisions, security cameras, and microphones.A television is an electronic communication medium that allows the transmission of real-time visual images, and often sound while a telescreen is a television and security camera-like device used to keep things or people under constant surveillance, thus eliminating the chance of secret conspiracies.It could be employed in secretly investigating criminals and terrorists.It could also play a major role in politics by investigating suspicious government officials and those that plan Ill towards a nation.It would definitely be a great idea to install one of such.

Explanation:

Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other platforms. Which of the following would make her job easiest and fastest?A. Develop different versions of the same app for different programs. B. Use cross-platform tools to write code that will translate the existing Android app code into different native formats. C. Feed the existing code into cross-platform tools to develop different versions of the same app. D. Use the same set of codes for different platforms.

Answers

Answer:

Option B is correct.

Explanation:

As such an application programmer, Shania recently began a new work. The first assignment was to create an earlier software available on certain devices, developed for Android.  

So, she using cross-platform software to compose application code that might convert the current android application code across various native versions to makes it much simpler and quicker for her job.

Other options are incorrect because they are not related to the following scenario.

Final answer:

The option that would make Shania's job easiest and fastest is option B: Use cross-platform tools to write code that will translate the existing Android app code into different native formats.

Explanation:

The option that would make Shania's job easiest and fastest is option B: Use cross-platform tools to write code that will translate the existing Android app code into different native formats. Cross-platform tools allow developers to write code once and then use it to create apps for multiple platforms, such as iOS and Windows. This approach saves time and effort compared to developing different versions of the app for each platform.


By using cross-platform tools, Shania can leverage her existing Android app code and modify it as needed to work on other platforms. This allows her to avoid starting from scratch and ensures consistency across different versions of the app.


Overall, using cross-platform tools is the most efficient and effective way for Shania to make the old app available on other platforms.

An increasing concern for privacy and widespread availability of encryption products has led to the use of encryption for individual files and even entire devices. Briefly discuss the current state of encryption with respect to forensic investigation.

Answers

Answer:

As investigators, we are limited to the information on the device that we can access. If a hard drive is fully encrypted, we have no easy access to the stored data and our investigative options become limited. The first thing an investigator must do is to determine the level and extent of the encryption. Weak passwords can be cracked, but if the user has implemented a strong password it becomes almost impossible to access via brute force methods. It could be that just a few files are encrypted and there could be unencrypted copies elsewhere on the device. The user could also be a creature of habit and use the same set of passwords. These passwords can be quickly located in easily decipherable formats throughout the system. In all cases, though, I tell investigators that digital evidence is just one piece of the body of evidence in a case. Don’t fall into a trap where you spend too much time trying to decrypt a potentially probative item, when valuable unencrypted data may be found by simply continuing your examination

When sketching out your Web site you create a clear and straightforward site map that divides the Web site content into a logical set of topics and subtopics (pages and subpages). Which principle of Web design are you considering when you organize the user interface into a form that is clearly understandable for the user?

Answers

Answer:

Structure.

Explanation:

While drawing the user's site, the simple, as well as concise sitemaps, is created which separates the scope of that site into such a coherent collection for topics & sub-topics.  

So, the Structure concept in website development is regarded while designing a user interface in such a manner which is easily recognizable to the customer.

Why are some constraints automatically applied by the software

Answers

Answer:

Some constraint are automatically applied by the software while others must be entered manually because we have some shapes that just come with automatic constraint.

In instance can be given with square, this have all ot iits four sides equal with two set of parallel sides.

Explanation:

see Answer.

Business ethics the intranet is a private piece of a company's internet network that is made available to computers and/or vendor partners on the basis of secured access by a unique password.A. True B. False

Answers

Answer:

The answer is "Option A".

Explanation:

In the private sector of communications offers intranets, it is also known as the area of business ethics, that share data within corporations. The purpose of this service is to improve communication, coordination, and data sharing within the organization for employees.

It allows you to make a free email account, that runs on a server.  It navigate emails when they have Internet speeds as well as a browser.

Amy has created a new brand for her company's goldfish training materials. She knows that other companies train goldfish and it is a popular sport, but realizes that it is a niche market. She wants to use a Google Display Ads campaign to build awareness for her new brand.
Which Google Display ad targeting option can help Amy with her goal of creating awareness within her niche market?

Answers

Answer:

Custom Affinity audiences .

Explanation:

Amy recently developed the latest product for the following training materials of the corporation. She understands that many corporations educate them, so it's a common activity, however she admits that this is a small market.

She decides to use the Google Display Advertising program for increase knowledge of her latest product. Custom Affinity audiences will allow Amy to increase recognition in her target market.

Given the scenario, before leaving the office, you ask the CIO to provide which formal document authorizing you to perform certain activities on the network?1. Syslogs2. Network flows3. Certificate authority4. Authorization memo

Answers

Answer:4. Authorization memo

Explanation: Authorization memo is a document that gives a go ahead to perform certain activities on the network, gives you the opportunity to work on the network on behalf of the CIO, although you are as well reminded that you are only doing this on behalf of someone, therefore advised to take precautions. Authorization memo is a reminder formal document that gives you access to do something on behalf of your CIO.

If Peyton Manning, a professional football player, wanted to remember his 16-digit credit card number, which of the following memory techniques would you recommend? Group of answer choices He should think of the numbers as a sequence of football statistics. He should picture each of the numbers in his head printed in a bright color. He should first memorize a few other sequences of 16 digits to gain some practice. He should visualize the front of his credit card showing a picture of him dribbling a basketball.

Answers

Answer:

He should think of the numbers as a sequence of football statistics.

Explanation:

One of the most common mnemonic devices that researchers suggest is that of trying to link the thing we want to memorize to something that is relevant to our own life. In this example, Manning would benefit from linking the numbers to something that he finds revelant, such as football statistics. This increases the probability of him remembering these numbers.

People who are regular visitors to SyFy (a website maintained by a science fiction cable network) and those who are regular visitors to BHG (a website maintained by the producers of BHG-TV and the publishers of a women's magazine) belong to different ________ segments.

Answers

Answer: Psychographic Segments

Explanation:

Psychographics is the qualitative method of studying consumers or people based on their psychological characteristics and traits. When values, aspirations, goals, desires, interests, and lifestyle choices of people are utilized to in other to know exactly what to bring into the market, then you are using Psychographics in marketing focus which is usually focused on understanding the consumer's emotions and values, to market whatever it is more accurately.

From the question, those who visit Syfy and those that regularly visit BHG are from different psychographic segments because they have different interests and/or values. And the owners of these sites upload contents that will make them to continue to visit the site and enrich the site owners. (Market)

You have designed a serverless learning management system and you are ready to deploy your code in to a test/dev environment. The system uses a combination of Lambda, API Gateway, S3 and CloudFront and is architected to be highly available, fault-tolerant and scalable. What are the three different ways you can deploy your code to Lambda?

Answers

Answer:

Lambda is a cloud computing platform developed by Amazon. It provides the opportunity to run without any form of administration. Clients pay based on computing power consumption.

To deploy your code to Lambda, the following options can be used. They are:

Inside Lambda, you can copy and paste your code to the IDE (Integrated Development Environment).

You can upload the zipped file of your code via the Lambda console

You can also write a cloud formation template to help ensure code and environment deployment.

You have a web application hosted in AWS cloud where the application logs are sent to Amazon CloudWatch. Lately, the web application has recently been encountering some errors which can be resolved simply by restarting the instance. What will you do to automatically restart the EC2 instances whenever the same application error occurs?

Answers

Answer/Explanation:

In this scenario, you can:

- look at the existing CloudWatch logs for keywords related to the application error to create a custom metric;

- create a CloudWatch alarm for that custom metric which invokes an action to restart the EC2 instance;

- create alarms that automatically stop, terminate, reboot, or recover your EC2 instances using Amazon CloudWatch alarm actions;

- use the stop or terminate actions to help you save money when you no longer need an instance to be running; and

- use the reboot and recover actions to automatically reboot those instances or recover them onto new hardware if a system impairment occurs.

Cheers

You are managing an FTP server installed in Ubuntu Server. The server has created a very large log file, vsftpd.log. Which command is appropriate to search the log file for activity of the user charlie?

Answers

Answer:

sudo grep "charlie" /var/log/vsftpd.log

Explanation:

Whenever the user becomes running and configured the FTP server within the following Server. That network generated a quite wide logging file, called vsftpd.log. Therefore the sudo grep "charlie" /var / log / vsftpd.log commands seems to be suitable towards searching the log document regarding user charlie operation.

So, the following command is correct according to the given statement.

A virus that remains dormant until a specific condition is met, such as the changing of a file or a match of the current date is known as what type of malware?

Answers

Answer:Logic bomb

Explanation:

A logic bomb is a malicious program that is triggered when a logical condition is met, such as after a number of transactions have been processed, or on a specific date (also called a time bomb). Malware such as worms often contain logic bombs, behaving in one manner, then changing tactics on a specific date and time.

Common malicious actions that logic bombs are able to commit include data corruption, file deletion or hard drive clearing. Unlike other forms of malware that break into a secure system, logic bomb attacks tend to be cyber sabotage from a person within an organization who has access to sensitive data.

Yesterday you installed a new game on your computer. When you ran the computer, you noticed that the application was running very slow. After you exited the game and restarted it, you received an error message saying, "Insufficient memory or disk space." You checked your hard drive and saw that you had more than 250GB of free space.What should you check next in Task Manager?

Answers

Answer:

Performance tab - Memory available

Explanation:

Based on the scenario being described within the question it can be said that the next thing you should check in the task manager would be the memory available in the performance tab. This tells you the amount of RAM memory that certain applications are using. Sometimes applications such as games, may have a memory leak in the coding causing the game to take up an excess amount of memory to run, which would cause the game to crash.

Final answer:

The next step in troubleshooting the error message is to open Task Manager and check the memory usage of your system in both the 'Performance' and 'Processes' tabs to identify if RAM is fully utilized and if any applications are consuming too much memory.

Explanation:

When you encounter the error message 'Insufficient memory or disk space' despite having ample free hard drive space, the issue is likely related to RAM (Random Access Memory) and not storage space. The next step to troubleshoot in the Task Manager is to check the memory usage of your system. You can open Task Manager by pressing Ctrl + Shift + Esc or by right-clicking on the taskbar and selecting Task Manager.

Once opened, click on the 'Performance' tab to see if the RAM is being fully utilized. If it is, you may need to close some programs that are using a high amount of memory, or consider adding more RAM to your computer if possible. It can also be helpful to check the 'Processes' tab to see if any applications besides the game are consuming a disproportionate amount of memory.

Your desktop computer has DVI and HDMI video ports. If a DVI monitor does not work on your system and yet you know the monitor is good, what is the best solution?

Answers

Answer:

The best possible and cost effective solution is that, Use DVI to HDMI converter to use the DVI monitor.

Explanation:

In above mentioned case, as the DVI port is not working, but DVI monitor is working properly. There are few solutions to use this monitor with the system. For example, a new monitor can be purchased that support HDMI port or replace the old DVI port or card with newer one. Both of the methods are too much costly and time consuming.

The best possible solution is just buy a DVI to HDMI converter and use it with DVI monitor and the system. It is most cost effective and time saving solution.

Answer:

Use a DVI to HDMI adapter to use the current DVI monitor and cable

Explanation:

DVI connections are becoming obsolete by the day. DVI and HDMI cables are both able to stream HD videos and are the same in various ways. In this case, however, it is most likely that the DVI ports on the monitors are somehow not compatible. The solution to this is to use a DVI to HDMI adapter or cable. DVI to HDMI adapter has DVI pins on one end and HDMI port on the other end. You connect using this cable and you will have picture and sound.

A _____ utilizes standard business software, such as Microsoft Word or Microsoft Excel, which has been configured in a specific manner to enhance user productivity.

Answers

Answer:

User application

Explanation:

A user application is a program that is created by using a standard software that is adjusted to the user's needs that can't be fulfilled by an existing system. According to this, the answer is that a user application utilizes standard business software, such as Microsoft Word or Microsoft Excel, which has been configured in a specific manner to enhance user productivity.

To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for behavior, often called ____.

Answers

Answer:

Codes of conduct

Explanation:

Codes of conduct are a set of rules or norms established by an organization for all employees, students or users, to ensure individual responsibilities and proper practices. The code of conduct can cover overall behaviour of individuals in an organization, but a specific code of conduct can be developed for proper computer use in order to establish what is appropriate and available to use in the organization´s computers, and also to restrict or avoid non related content.

Answer:

Code of conduct.

Explanation:

Code of conduct is a documented set of rules that govern the activities in an organization based on the needed ethics and culture of all the departments in the organization.

It shows the dos and don'ts of the company. It could also outline the acceptable Computer system use and behaviors of it's members.

Phobas Inc. offers an online service which stores notes made by customers on the cloud. When a customer enters notes on one device, it gets updated in all the devices he/she owns. Which of the following cloud-based offerings is being provided to the customers?

Answers

Answer:

Software as a service (SaaS)

Explanation:

Software as a service (SaaS) is a software licensing and release model in which the subscription basis of software licensing is done on a subscription basis and is centrally hosted. It is occasionally referred to as "on-demand software", and was in earlier times referred to as "software plus services" by Microsoft.

For instance, a company can write or build its own software packages and use the SaaS provider's APIs to incorporate those tools with the SaaS offering.

Wireshark capture files, like the DemoCapturepcap file found in this lab, have a __________ extension, which stands for packet capture, next generation.

Answers

Answer:

The answer is ".pcapng"

Explanation:

Wireshark format includes a "dump" with data packets, which is collected over a channel and sometimes a common folder to store, that data in the PCAP Next Iteration file system.

The .pcapng stands for the file system, this file system compatible with the recorded data transmission packet. It includes several data blocks. It is quite robust, but it should not be helped by the other devices. Wireshark allows the libpcap system as well.

When configuring inter-VLAN routing using the router-on-a-stick model, the physical interface of the router must be connected to a ___________________ on the adjacent switch.

Answers

Answer:

vlan

Explanation:

it has the switch on it I think

When configuring inter-VLAN routing using the router-on-a-stick model, the physical interface of the router must be connected to a trunk on the adjacent switch.

What is inter-VLAN routing?

VLAN routing can be used to extend a VLAN across different physical networks, provide additional segmentation or security, or let more than one physical port to existing on the same subnet.

VLANs operate on switches, whereas subnets require a router to execute. Setting up a routed network is more challenging than one that is switched. A switched network doesn't produce different broadcast domains unless you utilize VLANs, whereas a routed network does.

Therefore, the physical interface of the router needs to be linked to a trunk on the neighboring switch in order to configure inter-VLAN routing using the router-on-a-stick paradigm.

To learn more about inter-VLAN routing, refer to the link:

https://brainly.com/question/14530025

#SPJ2

Sara is writing a program to input her monthly phone bills and output the month name and amount for the month with maximum amount. She has defined an array to hold the month names. Complete the pseudocode program. [6] # Program to output maximum month's phone bill MonthName ["January", "February", "March", "April", "May", "June", "July", "August", "September", "October", "November", "December"] # Define an array to hold the phone bills for each month

Answers

Answer:

double [] phoneBills = new double[12];

Explanation:

Since the question has requested that an array be difined to hold phone bill for each month. Above declares an array that will hold floating point number (double) and it has been created to hold 12 values representing the months January to December

Values can be added in the array as shown in the program below.

public class PhoneBill {

   public static void main(String[] args) {

   String []  MonthName = {"January", "February", "March", "April", "May", "June", "July", "August",

           "September", "October", "November", "December"};

   double [] phoneBills = new double[12];

       phoneBills[0] = 4.5;

       phoneBills[1] = 4.5;

       phoneBills[2] = 5.5;

       phoneBills[3] = 6.5;

       phoneBills[4] = 3.5;

       phoneBills[5] = 5.5;

       phoneBills[6] = 6.5;

       phoneBills[7] = 7.5;

       phoneBills[8] = 8.5;

       phoneBills[9] = 4.5;

       phoneBills[10] = 3.5;

       phoneBills[11] = 7.5;

       System.out.println("Months and corresponding phone bill");

       System.out.println(Arrays.toString(MonthName));

       System.out.println(Arrays.toString(phoneBills));

   }

}

The output of this program is attached:

Final answer:

To complete Sara's pseudocode for identifying the month with the highest phone bill, an array to hold the phone bill amounts is defined and iterated through to find the maximum bill and its associated month.

Explanation:

Sara is trying to write a program to track her monthly phone bills and identify the month with the highest bill. To complete Sara's pseudocode, you would need to define an array to hold the phone bill amounts for each month, similar to how she has defined an array for MonthName.

The pseudocode might look something like this:

Define an array PhoneBills to hold the monthly phone bill amounts

Initialize a variable maxBill to hold the maximum bill amount

Initialize a variable maxMonth to hold the month of the maximum bill

Use a loop to iterate through the PhoneBills array

Inside the loop, compare each bill to maxBill and update maxBill and maxMonth if the current bill is higher

After the loop, output maxMonth and maxBill

Here is a more detailed version:

   maxBill = 0
   maxMonth = ""
   For i = 0 to PhoneBills.length - 1
       If PhoneBills[i] > maxBill Then
           maxBill = PhoneBills[i]
           maxMonth = MonthName[i]
       End If
   Next i
   Output "The month with the highest bill is " + maxMonth + " with an amount of $" + maxBill

This pseudocode will identify the month with the highest phone bill and output the result.

What is the system that consists of nonproprietary hardware and software based on publicly known standards that allow third parties to create add-on products to plug into or interoperate with the system?

Answers

Answer:

Open systems

Explanation:

Open systems are very different from Open Source applications or software, it should not be confused.

Open systems work with the blend of open software standards, portability, and interoperability. Computer systems that interoperate among multiple standards and vendors to ensure that computer resources (hardware and software) are not allotted to a particular vendor. Such computer systems are considered as open systems.

For instance, computer systems that run a Microsoft Windows OS can be considered as an Open system. This is because of their capability to run different versions of the Microsoft Windows OS on that particular computer system. More clearly, A computer with Windows 10 OS, can be used to install Windows 8 OS without any issue. That same computer system can run the Windows 7 OS. This makes the computer system and open system.

Other Questions
Certain economic principles are of considerable importance in the valuation of real estate. The principle that "no buyer will pay more for a product than the price he can pay for a reasonable duplicate" is known as the principle of: An equiangular triangle can be scalene You want to use the motherboard with DDR3 to triple channel the RAM in order to increase performance. When you open your computer, you notice that four RAM slots are available. How can you use the increased performance of triple channel with four slots available? Microsociology focuses on social interaction while macrosociology focuses on __________. Angle a and angle b are complementary angles. The measure of a is 42.Which equation represents this situation with x representing the measure of b ?A) 90+42=xB) 42+x=90C) 42x=90D) 90+x=42 Which of the following athletic programs are associated with special needs? A. Special Olympics B. US Youth Soccer TOPSoccer C. Miracle League D. all of the above Please select the best answer from the choices provided. A B C D what is 2+4 in the world today Which of the following is an advantage of internal recruitment? a. It leads to the generation of new ideas through tunnel vision thinking. b. It reduces competition among employees and political infighting for promotions. c. It improves organization fit because current employees understand the company's culture. d. It saves time and effort on training employees for the new role. Which ordered pair is the solution to the system of linear equations y = negative 7 x + 2 and y = 9 x minus 14? (negative 5, 1) (1, negative 5) (5, negative 1) (Negative 1, 5) Choose the appropriate term for each statement. Word Choices:(A) income(B) interest rate(C) expectations(D) wealth(E) household debt(F) taxes1. Keynesian economists think that _____ is the key determinant of consumption and spending.2. Classical economists think that the higher the _____, the more people will save, which means that they will consume less.3. A person's _____ about how much income he/she will earn in the future as well as future prices could shape how much he/she spends and saves today.4. The more _____ the person has, the less current consumption he/she undertakes.5. A person's total income can be divided into three components: consumption, savings, and _____.6. Savings, which is total income minus consumption and taxes, can be used to create more _____. How many moles of calcium carbonate-CaCO3 = 4.15 g "Assume the following information: Also assume that a U.S. exporter denominates its New Zealand exports in NZ$ and expects to receive NZ$600,000 in 1 year. You are a consultant for this firm. Using the information above, what will be the approximate value of these exports in 1 year in U.S. dollars given that the firm executes a money market hedge Type the correct answer in the box. Use a decimal number instead of words.Find the sum of a finite geometric series.A ball is dropped from a height of 10 meters. Each time it bounces, it reaches 50 percent of its previous height. The total vertical distance down the ball has traveled when it hits the ground the fifth time is meters. Is {(-5,1),(4,9),(6,10)} a function Strategic planning is long-range, formulated by top management, and made as if the company operated in a vacuum Group of answer choices True False An officer stops a car for speeding. After approaching the vehicle, he detects the distinct scent of marijuana. He notices a baggy that appears to contain marijuana on the dashboard. Can he seize the bag? Find the values of x and y A building is being knocked down with a wrecking ball, which is a big metal sphere that swings on a 15-m-long cable. You are (unwisely!) standing directly beneath the point from which the wrecking ball is hung when you notice that the ball has just been released and is swinging directly toward you. You are sleeping at the station while on shift. The tones go off loudly and lights instantly come on. You jump out of bed and quickly put on your clothes and run out to the apparatus bay. Your heart rate is elevated, you are breathing faster, and wide awake. What stage of the stress response are you experiencing Which scientist most inspired Darwin to pursue his studies of evolution?