______is a multimodal application software platform. the centrealized and shared database system ties the entire organization together, allowing information to be entered once and made available to all users.

Answers

Answer 1

Answer:

ERP.  

Explanation:

Enterprise Resource Planning Is the software platform for bidirectional applications. The main objective of  ERP it shared the database system and connects the enterprise as a whole so that data can be reached the once and made accessible to all users.

The main advantage of Enterprise Resource Planning is that Enterprise cycle parallelization or optimization it also the boost performance of the organization and saving the time.


Related Questions

As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?

Answers

Final answer:

The manager should use an Electronic Data Interchange (EDI) system to improve the inventory process, which allows vendors to review and adjust orders, thus increasing efficiency and reducing waste.

Explanation:

As the new manager at a local grocery store looking to improve your inventory processes, you should consider the implementation of an Electronic Data Interchange (EDI) system. EDI allows for the computer-to-computer exchange of business documents in a standard electronic format between business partners. This system would enable outside vendors and suppliers to review current inventory records and adjust their shipment orders accordingly, ensuring a more efficient inventory process and reducing product waste.

To further enhance the supply chain, advancements in technology, transportation methods, and robust policies during national emergencies should be considered. For example, Amazon utilizes highly computerized warehouses and economies of scale to lower costs per sale, which is a strategy worth considering. Additionally, the adoption of labor rights protections is crucial for the stability of supply chain operations.

By incorporating EDI technology and considering strategies employed by industry leaders like Amazon, your grocery store can achieve greater efficiency and reduce unnecessary expenses caused by outdated inventory management practices and congested transportation networks.

You just turned on a four port Ethernet switch (it hasn’t learned any addresses yet) and connected a host to each port. You send packet #1 from 00:11:22:33:44:55 to 66:77:88:99:00:11 which arrives at port 1 of your switch. Next, packet #2 is sent from 22:33:44:55:66 to 00:11:22:33:44:55 which arrives at port 3 of your switch. Which of the following are true?
1. Packet #1 is broadcast on all ports
2. After the first packet is received, the switch associates 66:77:88:99:00:11 with port 1
3. Packet #2 is only sent out on port 1
4. Packet #2 is sent out on ports 1, 2, 4

Answers

Answer:

Option 2 is correct.

Explanation:

When the user recently switched over that port Ethernet device, which is, no addresses have yet been acquired as well as a client has been linked on each port. He sends #1 packet from 00:11:22:33:44:55 to 66:77:88:99:00:11 arriving at the device's port 1. Next packet #2 is transmitted between 22:33:44:55:66 to 00:11:22:33:44:55 that appears at the switch's port 3.

So that the Package # 2 will be sent only through port 1 by the user who switched over the network.

__________ refers to the coupling of data stored in files and the specific programs required to update and maintain those files such that changes in programs require changes to the data.

Answers

I think it is good for the environment

You have just installed a new sound card in your system, and Windows says the card installed with no errors. When you plug up the speakers and try to play a music CD, you hear no sound. What is the first thing you should do? The second thing?

Answers

Answer:

1. Volume check

2. Manage Device

Explanation:

1. Verify the volume is turned up in Windows and on the speakers. This can be done easily by going to the volume control icon on the computer.

2. Check Device Manager to see if the sound card is recognized and has no errors. This can be done by navigating thus:

My PC (Right click) > Manage > Device manger

Cheers

The code snippet below checks whether a given number is a prime number. What will be the result of executing it? public static void main(String[] args) { int j = 2; int result = 0; int number = 0; Scanner reader = new Scanner(System.in); System.out.println("Please enter a number: "); number = reader.nextInt(); while (j <= number / 2) { if (number % j == 0) { result = 1; } j++; } if (result == 1) { System.out.println("Number: " + number + " is Not Prime."); } else { System.out.println("Number: " + number + " is Prime. "); }.A) The code snippet will not compile.
B) The code snippet will display the desired result.
C) The code snippet will display an incorrect result.
D) The code snippet will loop forever.

Answers

Answer:

B) The code snippet will display the desired result.

Explanation:

The code Snippet will give the expected result.

Prime numbers are numbers that are have only two divisors... That is 1 and itself

The while block:    

   while (j <= number / 2) {

           if (number % j == 0) {

               result = 1;

           }

           j++;

       }

ensures that whenever there is a remainder of dividing the variable number by j, then it is not a prime number, since prime numbers are only divisible by 1 and themselves. The result =1 is then tested in an if statement to give the expected output

Final answer:

The code snippet correctly determines if a number is prime and will display the desired result; however, the efficiency could be improved by checking divisors only up to the square root of the number.

Explanation:

The code snippet provided checks whether a given number is prime. The result of executing this code snippet will be B) the code snippet will display the desired result. When the user enters a number, the program will divide that number by all integers from 2 up to the number divided by 2.

If any of these divisions result in a remainder of 0, the result variable is set to 1, indicating that the number is not prime. If none of the divisions have a remainder of 0, the result variable remains at 0, meaning the number is prime.

The only issue with this code is that it will continue checking until number/2 even though we could optimise it by only checking up to the square root of the number (number¹/²). However, this does not affect the accuracy for determining if a number is prime within the range checked.

what is the sentinel value in the following code snippet?
public static void main(String[] args)
{
int age = 0;
int sum_of_ages = 0;
int stop = 1;
Scanner reader = new Scanner(System.in);
System.out.println("Enter an age (-1 to stop): ");
age = reader.nextInt();
while (age != -1)
{
sum_of_ages = sum_of_ages + age;
System.out.println("Enter an age (-1 to stop): ");
age = reader.nextInt();
}
System.out.println("Sum of ages " + sum_of_ages);
return 0;
}

Answers

The answer to the problem is 5

The sentinel value in the following code snippet is 1.

What is sentinel value?

An algorithm that uses the presence of a sentinel value as a condition for termination, generally in a loop or recursive algorithm, is known as a sentinel value in computer programming.

For instance, the number "-1" can be used as the sentinel value in a loop algorithm that computes non-negative integers because the computation will never encounter that value as a valid processing output. Also known as a signal value or a flag value.

A while loop can also be used as a sentinel loop. Until it encounters a certain value that indicates the end, a sentinel loop keeps processing data. The sentinel is the name of the exceptional value. For the sentinel, any value is possible.

Therefore, in the following line of code, the sentinel value is set to 1.

To learn more about sentinel value, refer to the link:

https://brainly.com/question/28541937

#SPJ5

Alan is developing a business impact assessment for his organization. He is working with business units to determine the maximum allowable time to recover a particular function. What value is Alan determining? A. Recovery time objective (RTO) B. Recovery point objective (RPO) C. Business recovery requirements D. Technical recovery requirements

Answers

Answer:

A. Recovery time objective (RTO)

Explanation:

The recovery time is defined as the maximum length of time require to recover a system or any network from the failure.

Hence, to determine the recovery time of the function, one can use the RTO.

You are trying to build a spreadsheet model to determine what to bid on a construction project. If you are having difficulty constructing the spreadsheet model, what type of chart might you draw to help you set up the model?

Answers

Answer:

Influence

Explanation:

While the user attempts to create a prototype spreadsheet to decide how to offer on such a building plan. Unless he has trouble building the worksheet model, he draws an influence chart to encourage himself to build up the model.

An influencing chart seems to be an understandable graphical representation of a question in judgment. It portrays that elements as modules of different colors and patterns, such as choices, complexities, and targets. It features influences as bullets between them.

please help asap
Compare and contrast if-else and elif statements. Give examples.
What are the relational operators? How are they used?

Answers

Answer:

a. Comparison of if-else and elif:

if else follow as:

If (Condition)

{

In case if condition true, expression in this section executes

}

else

{

In case condition is false, expression in this section executes

}

elif Statement follows as:

If (Condition)

{

In case if condition true, expression in this section executes

}

{

in case, condition is false, move to elif block

elif (Condition)

{

In case elif condition true, expression in this section executes

}

else

{

In case elif condition is false, expression in this section executes

}

}

Explanation:

In if else, program first check the condition in "if statement", if condition is true it move into the body of "if " and execute the expression. If the condition is false it moves to the body of "else" and execute the expression.

elif is another block of condition in If else condition,It works as in "if statement" if the condition is true the program executes the expression of body of "if body". If the condition is false, it moves to another block of "elif", where it again check some other condition found in "elif statement". If the condition of "elif statement" is true it executes the expression of "elif body" otherwise in case of false condition it execute the expression in "else body".

It follows as: if - elif-else

Answer

b. the relational operators

Relation operators are the operators that are need in the expression to establish relationship between different operands of the expression.

Explanation:

In few expressions, their are some operators used to establish or show the relationship between different operands. These operator could be Equal (=), Greater than(>), Less than (<), Greater than equal to (>=) and Less than Equal to (<=).

These operators can be used in conditional statements that are used to check the relationship between operands and values through these operators.

Example

if (a>5)

{

if value of is greater than 5 then body of if will execute.

}

else

{

If value of a is less or equal to 5, this section will execute.

}

What specific record type is found in every zone and contains information that identifies the server primarily responsible for the zone as well as some operational properties for the zone?

Answers

The SOA is the specific record type found in every zone and contains information that identifies the sever primarily responsible for the zone as well as some operational properties for the zone.

Explanation:

The Start of Authority Records (SOA) has the following information they are

Serial Number: This number is used to find when zonal information should be replicated.

Responsible person: The Email address of a person is responsible for managing the zone.

Refresh Interval: It specifies how often a secondary DNS server tries to renew its zone information.

Retry Interval: It specifies the amount of time a secondary server waits before retrying the zone information has failed.

Expires After: IT specifies the amount of time before a secondary server considers its zone data if it can't contact with the primary server.

Minimum TTL: It specifies the default TTL value for a zone data when a TTL is not supplied.

Which of the following is a disadvantage of using face-to-face communication over other communication channels? A) There is lag time between transmission and reception of the message. B) It is often difficult to schedule a time to meet face-to-face. C) Face-to-face communication reduces your ability to hold the receiver's attention. D) It is more difficult to develop effective relationships with individuals when you use face-to-face communication.

Answers

Answer:

Option B is correct.

Explanation:

The drawback to choosing face-to-face contact across certain platforms of interactions is that it is always impracticable to plan a schedule for face-to-face conversation because mostly the time of both participants should not be the same, sometime the one person wait for the other person or the other person wait for 1st one.

The following problems occur through the internet, the system configuration or the browsers, application configuration. So, the following are the reasons that describe the other options are not appropriate according to the scenario.

The answer choice which is a disadvantage of using face-to-face communication over other communication channels is that:

B) It is often difficult to schedule a time to meet face-to-face.

According to the given question, we are asked to state the answer choice which is a disadvantage of using face-to-face communication over other communication channels.

As a result of this, we can see that when a person is making use of face-to-face communication, then he is taking in real time with the person and the possible disadvantage of this is that it is often difficult to schedule a time to meet face-to-face

Therefore, the correct answer is option B

Read more about face-to-face communication here:

https://brainly.com/question/10002236

What process involves the changing of a program's internal structure without changing the way the program works?

Answers

Answer:

Code Refactoring

Explanation: Code Refactoring is

A systematic process of improving a code without changing its functionality. It can be used to change a "mess" into a clean code.

Refactoring is the process of restructuring an existing computer code, changing the factoring without changing its external behavior. It is intended to improve nonfunctional attributes of the software it is expected to achieve this by continuously improving the design of code, hence making it easier and easier to work with.

Therefore the process of "changing of a program's internal structure without changing the way the program works" Is Code Refactoring.

A junior administrator is having issues connecting to a router's console port using a TIA/EIA 568B standard cable and a USB serial to RJ-45 adapter, despite verifying terminal settings. What is the issue?

Answers

Answer:

Only rollover cables can be used in network device console management port.

Explanation:

Intermediate network devices are used for transmitting packets across networks. It has ports for connecting to other intermediate devices and end devices like the computer system.

Routers and switches are examples of intermediate network devices. They have management ports used to initially and periodically configure these devices. The console port is the main management port for device console. An administrator connects to the port using a rollover cable, which has a serial or USB connector on the computer end and a RJ45 on the network device end.

The ________, which employed a typewriter-like keyboard, was introduced in the 1800s and enabled printers to set type mechanically rather than manually.

Answers

Answer:

The answer is "linotype machine".

Explanation:

The Linotype is the model, that is also known as a "line casting" tool. It uses in during the production of the corporation and related businesses enthrallment linotype.  

In this model, a heated metal casting method is used that inserts a 90-character platform, which is used to casts metal frames for each use. It places matrix multiplication on one side, which are molds for word types.

A security administrator is testing the security of an AP. The AP is using WPA2. She ran an automated program for several hours and discovered the AP's passphrase. Which of the following methods was she MOST likely using?
A. IV attack
B. Disassociation attack
C. WPS attack
D. Evil twin attack

Answers

Answer:

WPS attack

Explanation:

WiFi protected setup (WPS) is a convenient feature that allows the user to configure a client device against a wireless network by simultaneously pressing a button on both the access point and the client device (the client side “button” is often in software) at the same time. Since it has access to the Access point, it can get the passphrase.

True or False: Unity can apply multiple textures to a single object or terrain

Answers

This is very true unity is what u said and it is the definition of this

Answer:

True

Explanation:

When computer manufacturers overcame the enormous 13,000 Chinese character barrier by creating a workable keyboard through voice and handwriting recognition, PCs became more accessible to the Chinese. What was the predicted effect of the events on equilibrium price and quantity of PCs sold in China

Answers

Answer:

Check the explanation

Explanation:

The effect of the events on equilibrium price and quantity is that the Price and quantity of PCs sold soared, the innovation which later made PCs more robust and able to utilize the Chinese language shifts the demand curve for computers to the right.

The price and number rose.

Given the definition of the function one_year_older:def one_year_older(name, age): print('Name:', name) age = age + 1 print('Your age next year:', age) print()Which of the following statements will invoke the function one_year_older successfully?A. one_year_older(27, 'John')B. one_year_older()C. one_year_older('John', 27)D. one_year_older('John')one_year_older(27)

Answers

Answer:

The answer is "Option C".

Explanation:

Method Definition:

In the given python code, a method "one_year_older" is defined, which accepts two parameters "name and age", in which name accepts string value and age accepts integer value. Inside the method the print method is used, that print name variable value then increments the value of age variable by 1 and print its value, in this question except "Option C"  all were wrong, which can be described as follows:

In option A, In method calling first, it passes integer value, then string value that's why it is wrong. In option B, In this method calling there is no parameter is used. In option D, This type of method calling is illegal.  

Write a class named Accumulator containing: An instance variable named sum of type integer. A constructor that accepts an integer parameter, whose value is used to initialize the sum instance variable. A method named getSum that returns the value of sum. A method named add that accepts an integer parameter. The value of sum is increased by the value of the parameter.

Answers

Answer:

The following are the code in the C++ Programming Language.

//define header file

#include <iostream>

// using namespace

using namespace std;

//define a class

class Accumulator

{

//set private access modifier

private:  

//declare integer type variable

int sum;

//set public access modifier

public:

//define constructor  

Accumulator (int sum)

{

//refer the same class as instance variable

this->sum = sum;

}

//define integer type function

int getSum()

{

//return the value of sum

return sum;

}

//define void type function

void add (int value)

{

//variable sum is increased by the argument value

sum += value;

}

};

Explanation:

The following are the description of the code.

Firstly, set the required header file and namespace then, define a class 'Accumulator' and inside the class. Set private access modifier then, declare an integer data type variable 'sum'. Declare a class constructor whose name is the same as the class name 'Accumulator()' and pass integer data type argument 'sum' in its parameter that refers to the same class as instance variable. Define a integer data type function 'getSum()' that return the value of the variable sum. Finally, define a void type function 'add()' and pass the integer data type argument 'value' in its parameter in which the variable sum is increased by the argument value .

You are adding new wires in your building for some new offices. The building has a false ceiling that holds the lights and provides an air path for heating and air conditioning. You would like to run your Ethernet cables in this area.

Answers

Answer:

Plenum rate cable.  

Explanation:

The Plenum rated cable has an unique coating with the low fire resistance and smoke. The main reason to used the Plenum rate cable in the office because it allowing the intense cooling of the  servers also  for the safety purpose we used the Plenum rate cable.  

In the office we used Plenum rate cable wires because The house has a false ceiling housing the lights and supplying air-conditioning and ventilation routes.

Kamilla is creating a pet adoption website, and is currently learning about her options using the position property.
If Kamilla wants an element to remain in the same location in a browser window, even as the user scrolls through the Web page, she would use the ____ position property.
a. absolute
b. fixed
c. relative
d. float

Answers

Answer:

B. Fixed position property.

Analyze the following code. public class Test { public static void main(String[] args) { double radius; final double PI= 3.15169; double area = radius * radius * PI; System.out.println("Area is " + area); } }

Answers

Answer:

The output of the given code as follows:

Output:

Area is: 12.60676

Explanation:

In the given code some information is missing so, the correct code to this question can be described as follows:

Program:

public class Test //defining class  

{

   public static void main(String[] args)//defining the main method

   {

       double radius= 2; //defining double variable radius

       final double PI= 3.15169; //defining double variable PI

       double area = radius * radius * PI; //defining double variable area that calculates values

       System.out.println("Area is: " + area); //print values

   }  

}

Explanation:

In the given java code a class "Test" is defined, in which a double variable "radius" is defined, which holds a value, that is 2. In the next step, a double constant variable, that is PI is defined, that holds a value, that is "3.15169". Then another double variable area is defined, that calculates the area value, and prints its value.

SELECT vendor_name, COUNT(*) AS number_of_invoices, MAX(invoice_total - payment_total - credit_total) AS balance_due FROM vendors v JOIN invoices i ON v.vendor_id = i.vendor_id WHERE invoice_total - payment_total - credit_total > (SELECT AVG(invoice_total - payment_total - credit_total) FROM invoices) GROUP BY vendor_name ORDER BY balance_due DESC (Please refer to the code example above.) When this query is executed, the rows will be sorted by:________.a. balance_due in descending sequence b. invoice_id c. vendor_id

Answers

Answer:

Option a is the correct answer for the above question.

Explanation:

The above question asked about the order of the result which is derived from the above query. The above query holds an order by clause in desc order which is used to produce the result in descending order.The descending order result is produced on the behalf of balance_due attributes and the option a also states the same. Hence option a is correct while the other is not because:-Other is not states that the result is produced on the behalf of descending order.

Answer:a

Explanation:

Local-area network (LAN) A It interconnects locations scattered throughout a metropolitan area. 2 Wide-area network (WAN) B It is a network whose scale is even smaller than a LAN. An example of this type of network is a connection between a PC and a digital camera via a universal serial bus. 3 Metropolitan-area network (MAN) C It interconnects network components within a local region. 4 Personal-area network (PAN) D It interconnects network components that are geographically dispersed between two locations.

Answers

Answer:

Local-area network (LAN - It interconnects network components within a local region

Metropolitan-area network (MAN)- It interconnects locations scattered throughout a metropolitan area

Wide-area network (WAN) -  It interconnects network components that are geographically dispersed between two locations.

Personal-area network (PAN) -  It is a network whose scale is even smaller than a LAN. An example of this type of network is a connection between a PC and a digital camera via a universal serial bus

Explanation:

Local-area network (LAN - It interconnects network components within a local region, it is smaller compared to a WAN

Metropolitan-area network (MAN)- It interconnects locations scattered throughout a metropolitan area

Wide-area network (WAN) -  It interconnects network components that are geographically dispersed between two locations.it uses routers to link between the geographical locations

Personal-area network (PAN) -  It is a network whose scale is even smaller than a LAN. An example of this type of network is a connection between a PC and a digital camera via a universal serial bus

A user complains because the social media apps on his mobile device always note his location. The user is worried about privacy, and would like to keep this information from being broadcast on his social media. Which of the following features should the user adjust in order to accomplish this?

Answers

Answer:

Geotracking

Explanation:

Geotracking is the feature that needs to be adjusted in order to keep this information from being broadcast on his social media.

Tiffany is writing a program to help manage a bake sale. She writes the following code which prompts the user to enter the total number of items a person is buying and then a loop repeatedly prompts for the cost of each item. She wrote the code but there is a problem: it runs in an infinite loop. How can Tiffany change her code so it doesn't loop forever?

Answers

Answer:

Add the following code after the line 3 that is:

numItems = numItems - 1;

Explanation:

In the following question, some information in the question is missing that is code block.

0 var numItems = promptNum("How many items?");

1 var total = 0;

2 while (numItems > 0){

3 total = total + promptNum("Enter next item price");

4 }

5 console.log("The total is" + total);

In the following scenario, Tiffany is developing a program to help with the handling of bake sales and she not write that part which is essential.

There would become an incorrect condition that requires any increment/decrement operations stating that perhaps the condition variable will be incorrect. Because there has to be the variable "numItems" operation because it engages in the while loop condition.

A(n) ____________________ is a hardware device or software utility designed to intercept and prevent unauthorized access to a computer system from an external network.

Answers

Answer:

hardware device

Explanation:

A(n) _____ is an interactive information system consisting of hardware, software, data, and models (mathematical and statistical) designed to assist strategy makers in an organization.

Answers

Answer:

decision support system

Explanation:

A decision support system is a set of related computer programs and the data required to assist with analysis and decision-making within an organization.

Cheers

Given the definition of the function one_year_older:def one_year_older(name, age): print('Name:', name) age = age + 1 print('Your age next year:', age) print()Which of the following statements will invoke the function one_year_older successfully?A. one_year_older(27, 'John')B. one_year_older()C. one_year_older('John', 27)D. one_year_older('John')one_year_older(27)

Answers

Answer:

C. one_year_older('John', 27)

Explanation:

The correct call to the function one_year_older() is the option C which is one_year_older('John', 27). This is because in the definition of the function, it was defined with two parameters name and age, so when this function is invoked, the argument for name and age must be passed to it in the function call. Hence option C which passes a string John (as the first argument name) and an int 27 (as the second argument age)

Often a successful attack on an information system is due to poor system design or implementation. Once such a vulnerability is discovered, software developers quickly create and issue which of the following, in order to eliminate the problema. patch
b. bot
c.logic bomb
d.Trojan horse

Answers

Answer:

Option A i.e., Patch.

Explanation:

The effective intrusion towards the data system is sometimes related to inadequate layout or execution of the system. Upon discovery of this flaw, application designers rapidly construct and release a patch to solve the issue.

A patch seems to be the series of improvements intended to modify, resolve or enhance a system program or even its associated information. It requires resolving protection problems as well as other defects, known patch corrections or bugfixes, and enhancing the accessibility, reliability, or efficiency of these patches.

Other Questions
12.The perimeter of a garden is 82 feet. The lengthis 5 more than twice the width. What is the widthof the garden?A.29feetC.24 feetB. 25 feet and 2/3D. 12 feet We are under a Constitution, but the Constitution is what the judge says it is. Please help !!What role might an antibiotic factor such as temperature play in the evolution of a species ? 42. Which matrix represents the image of the triangle with vertices at (-2,0), (1,5), and (4,-8) when dilated by a scale factor of 3? Write a class named Employee that holds the following data about an employee in attributes: name, ID number, department, and job title.Once you have written the class, write a python program that creates 3 Employee objects to hold the following data:Name: Susan Meyers, ID number: 47899, Department: Accounting, Job Title: Vice PresidentName: Mark Jones, ID Number: 39119, Department: IT, Job Title: ProgrammerName: Jon Rogers, ID Number: 81774, Department: Manufacturing, Job Title: EngineerThe prgram should store this data in the 3 objects and then display the data for each employee on the screen. What is the meaning of the word organism Which of the following statements is inaccurate?a) There is substantial agreement about how and when markets fail.b) There is substantial agreement about whether government improves market outcomes. c) Voters are quick to blame government meddling for many economic woes. d) Ideally, the market mechanism will lead an economy to the optimal mix of output. Consider P(x) = x4(x 2)3(x + 1)2. For each zero, determine if the graph crosses the x-axis. How do you know? Excerpted from "The Children's Hour"by Henry Wadsworth LongfellowDo you think, o blue-eyed banditti,Because you have scaled the wall,Such an old mustache as I amIs not a match for you all!Which word describes the poet's feelings in these lines from "The Children's Hour"?A.amusedB.feebleC.competitiveD.exasperated 3/5 times what equals 2 2/3 What makes some teens more resilient and better able to handle adolescent stress than others? Offer an example of a common teen stressor, and consider Erik Eriksons ideas about identity development during adolescence, cultural influences, and peer and family relationships. Support your reasoning with information from the text and other course materials. 6. Write the following multiplications as exponential abbreviations.a. 5x5b. 7 x 7 x 7 x 7c. 2 x 2 x 2d. 9 x 9 x 9 x 9 9 2.0 L of gas A at 1.0 atm and 1.0 L of gas B at 1.0 atm are combined in a 3.0 L flask. The flask is sealed and over time they react completely to give gas C according to the following chemical equation: 2A(g) + B(g) C(g) Assuming the temperature stays constant, what will be the pressure after the reaction goes to completion? what is the meaning of the saying "the power of a lens is 1 dioptre " (17 letter answer) breaking an unconstitutional law to bring attention to the problem is __________. Which of the following factors would be a top down strategy for improving a visual search task? a. Reducing the number of distractors b. Adding motion c. Increasing the size of the target d. Alphabetizing a list e. (a) and (d) f. All of the above Mr. S. has stage IV lung cancer and was admitted to your unit yesterday because of shortness of breath. His breathing has improved with treatment and you tell him you are hoping to get to know him better so you can provide the best care possible. Which of the following statements reflects your interest in getting to know him? A) "Can you tell me what has given your life meaning?" B) "Do you know much about your disease?" C) "Is your cancer treatment helping you?" D) "If I can do anything to help you, let me know." what type of forage is cut and dried until it contains low moisture ? Erica is driving to work when she hears a loud police siren. She automatically turns off her car radio and looks for the siren so she can pull over if needed. How is this an example of nonassociative learning? Virginia is known for its hot springs. Recently, the number of destination spas and wellness centers has increased tremendously worldwide. What could the rise in spas and wellness centers in Virginia be attributed to?