You ask your secretary to send information on the meetings that you need to attend in the month. He provides you the details immediately, but he leaves out certain additional details that he deems to be surplus to your requirements. Judge your secretary's action.A) The information that your secretary provided was partly good as it was timely,but insufficient. B) The secretary provided adequate and timely information,but the information did not add value to you. C) The information that your secretary gave will be considered as good information. D) The infortation that you obtained through the secretary was not timely and worth its cost.

Answers

Answer 1

Answer:

Option A is correct

Explanation:

It was good because it was timely but insufficient because am in the position to dim any information surplus and I never directed the secretary to prone down on a need bases which makes it insufficient, but it can be rewritten and all information added before time of meeting that is why it's timeliness makes the report good.


Related Questions

An electronics store sends an email survey to all customers who bought tablets. The previous month, 570 people bought tablets. Surveys were sent to 300 of these people, chosen at random, and 138 people responded to the survey. Identify the population and the sample. The population is 570. The sample is 138. The population is 570. The sample is 300. The population is 300. The sample is 138. The population is 138. The sample is 570. The population is 138. The sample is 300.

Answers

Answer:

The answer is C.

Explanation:

Population and sample are terms used in researchs to describe the different sets of subjects and helps distinguish them.

In the example given in the question, the research is the email survey for the people who bought tablets. Although the total number of tablets sold is 570, the survey is only sent to 300 of them which were randomly selected so the total population of the survey is 300. And out of that 300, only 138 responded to the survey email and are the only ones that are qualified for observation and acquiring research data. Therefore the sample of the survey is 138.

I hope this answer helps.

including the direct and indirect costs, alcohol related collisions cost society _____billion dollars annually.
A.86
B.96
C.106.
D.201

Answers

Answer:

C.106.

Explanation:

Final answer:

The question is about the direct and indirect costs of alcohol-related collisions to society. The answer can vary and is dependent on current statistical data. Always refer to your study materials or instructor for the most current and accurate information.

Explanation:

The question is asking about the cost to society, both direct and indirect, of alcohol-related collisions on an annual basis. These costs can be incredibly high, encompassing not only the immediate expenses related to medical care and property damage, but also long-term costs such as ongoing healthcare needs, loss of productivity, and emotional trauma. There isn't a definitive answer as the costs can vary from year to year. However, for the purpose of this question, please refer to your study materials or your instructor for the correct current statistical data.

Learn more about Costs of Alcohol-Related Collisions here:

https://brainly.com/question/32190337

#SPJ2

A disaster recovery plan is a plan:
a. That describes how a businesses operates continuously at all times
b. To restore an organization's IT capability in the event that it's IT infrastructure is damaged or destroyed
c. That specifies how to resume not only IT operations but all business processes in the event of a major calamity
d. To restore an organization's IT capability in the event that files and data get corrupted through human error

Answers

The answer to your question would be B.

A disaster would usually cuase damage or destroy something. A recovery would be in this case in computer speech would be restore.

Final answer:

The correct answer is b, which defines a disaster recovery plan as a plan to restore an organization's IT capability if its IT infrastructure is compromised.

Explanation:

A disaster recovery plan is a comprehensive set of strategies and procedures to restore an organization's IT capabilities and business operations after a disaster. The correct answer to the student's question is option b, which states that a disaster recovery plan is 'To restore an organization's IT capability in the event that it's IT infrastructure is damaged or destroyed.'

This plan specifically focuses on IT systems and data, ensuring that they can be recovered or reconstructed to support business continuity. It may include steps such as data backups, recovery sites, and various IT infrastructure resiliency methods.

Use the ____ statement to execute one set of instructions if the condition is true, and another set of instructions if the condition is false.

Answers

Final answer:

The statement to execute one set of instructions if a condition is true and another if it is false is the 'if-else' statement. This statement is foundational in programming for controlling the flow based on conditions, representing the logical construct known as a conditional statement.

Explanation:

Use the if-else statement to execute one set of instructions if the condition is true, and another set of instructions if the condition is false. In programming, a conditional is used to direct the flow of execution based on whether a condition is true or not. An example in a pseudocode format could be:

IF (condition is true) THEN
   execute these instructions
ELSE
   execute these other instructions
END IF

This structure allows you to perform different actions within a program based on whether a certain condition, such as "if the user is logged in" or "if the temperature is above 30 degrees Celsius", is met. In logical terms, the if-then construct represents a conditional statement that links a hypothesis with a conclusion. If the hypothesis is true (the condition), then the conclusion (the following set of instructions) follows. For example, translating the conditional 'If an animal is a dog, then it is a mammal' into pseudocode might look something like:

IF animal is 'dog' THEN

   animal is a mammal
ELSE

   animal is not a mammal (or the condition doesn't apply)
END IF

Describe the conventional criteria used in assessing risk in the software-development process.

Answers

Answer:

Like conventional criteria we have

cost

budget and schedule

Explanation:

The conventional criteria regularly are cost, budget and schedule, because these three factors are so important in a company, but we can add other criteria like social, political, and ethical issue.

For example

We create a new social media, all the information about our users, we share or sell this data or if we video content, but this content doesn't have any filter for children, we must evaluate social criteria and ethical criteria.

The conventional criteria used in assessing risk in the software-development process includes the software requirement review and Audits  of the actions performed in the software development process.

Other normal criteria used in assessing risk in the software-development process are:

By Identify the issue associated with software development process.Find out the likelihood of damage and its severity. Know and list out  actions needed to eliminate the issue/problem or control the risk using different risk control methods.

Why is risk assessment important in software development?

It is very vital to carry out a risk assessment as it is very important step in the preparation  against potential problems that may take place in software project.

Conclusively, In the risk assessment, when a notable risk is found, a solution or plan of action is said to be developed and analysis and plan is also done.

learn more about software development from

https://brainly.com/question/26135704

In this chapter, we use the metaphor of a blueprint and houses that are createdfrom the blueprint to describe classes and objects. In this metaphor, are classes theblueprint or the houses?

Answers

Answer:

The correct answer to the following question will be Classes.

Explanation:

Class:

Class and objects are the two basic concepts of Object-oriented programming language (Oops). A prototype by which an object can be created.A Class is a collection of data members and member functions.A Class is a user-defined blueprint on an object.Declaration of a class includes: Class names, modifiers, Super class, interfaces and body

Mrs. Johnson is here today to receive an intercostal nerve block to mitigate the debilitating pain of her malignancy. Her cancer has metastasized to her bones in her thoracic spine. What ICD-10-CM codes are reported?a.M54.6, C79.51, C80.1b.C79.51, G89.3, C80.1c.G89.3, C79.51, C80.1d.C79.51, G89.3, M54.6, C80.1

Answers

Answer:

The correct answer is:

a. M54.6, C79.51, C80.1

Explanation:

-  M54.6 Pain in thoracic spine. It is a billable/specific ICD-10-CM code that can be used to indicate a diagnosis for reimbursement purposes. The 2020 edition of ICD-10-CM M54.

- C79.51: Secondary malignant neoplasm of bone, it is a billable/specific ICD-10-CM code that can be used to indicate a diagnosis for reimbursement purposes.

- G89. 3 is a billable/specific ICD-10-CM code that can be used to indicate a diagnosis for reimbursement purposes. The 2020 edition of ICD-10-CM G89.

Malignant neoplasm of anus, unspecified

Neoplasm related pain (acute) (chronic)

Pain in thoracic spine. M54. 6 is a billable/specific ICD-10-CM code that can be used to indicate a diagnosis for reimbursement purposes. The 2020 edition of ICD-10-CM M54.

Malignant (primary) neoplasm, unspecified

- C80. 1 is a billable/specific ICD-10-CM code that can be used to indicate a diagnosis for reimbursement purposes. The 2020 edition of ICD-10-CM C80.

Which of the following statements about BLE is not true? a. BLE has a two-way, push-pull communication capability b. BLE uses less power than traditional Bluetooth or GPS c. Only Apple iPhones can use BLE d. BLE is more accurate than targeting through Wi-Fi triangulation

Answers

Final answer:

Only the statement that 'Only Apple iPhones can use BLE' is false. BLE is available across many platforms and is known for its energy efficiency and communication capabilities.

Explanation:

The question is asking which statement about Bluetooth Low Energy (BLE) is not true. The false statement is c. Only Apple iPhones can use BLE. BLE is a wireless communication technology designed for short-range communication, which is used across various platforms, including iOS, Android, and Windows devices, not just Apple iPhones.

BLE is known for its low power consumption compared to traditional Bluetooth or GPS. It also has two-way, push-pull communication capability and is generally more accurate than Wi-Fi triangulation when it comes to indoor positioning, though the accuracy can depend on the environment and implementation.

If userA wants to send a secure message to userB using an asymmetric cryptographic algorithm, which key does userB use to decrypt the message?

Answers

Answer:

userB will use his/her private key.

Explanation:

The steps involved in using asymmetric cryptographic algorithm are as follow:

1. Each user generates a pair of keys to be used for the encryption and decryption of messages.

2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.

3. If UserA wishes to send a confidential message to UserB, UserA encrypts the message using UserB's public key.

4. When UserB receives the message, she decrypts it using her private key.

Janet is identifying the set of privileges that should be assigned to a new employee in her organization. Which phase of the access control process is she performing?

A. Identification
B. Authentication
C. Accountability
D. Authorization

Answers

Answer:

D-Authorization

Explanation:

Authorization assigns certain privileges to every employee of an organization while also limiting their privileges to certain sections of the organization. The employee having these privileges will authenticate himself and after that he/she can use these privileges.

Hence, the correct choice is authorization.

The web server administrator at your e-commerce company is concerned about someone using netcat to connect to the company web server to retrieve detailed information. What best describes this concern?

Answers

Answer:

Banner Grabbing

Explanation:

Banner grabbing is a reconnaissance technique to retrieve information about a computer or about a network and its services. This is used by administrators to take inventory of systems and services on their network.

Banner grabbing is used to gain information about a remote server and is intruders sometimes use this technique to retrieve information about remote servers.  divulge software version numbers and other system information on network hosts. This is a technique of getting software banner information. This information may include operating system information, version and certain services and this helps hackers to attack the network. Banner grabbing can disclose vulnerable applications which can result in service misuse and exploitation.

Banner grabbing is done manually or automatically by using tools. Tools commonly used to perform banner grabbing are Telnet, Wget, nmap, zmap and Netcat etc.

5. If a file does not exist and a program attempts to open it in append mode, what happens

Answers

Answer:

It create a new file in which writing of data begins.

Explanation:

A file can be open in the three mode:

-r (Read mode): open an existing file for the purpose of reading data from it.

-w (write mode): Create a new file for the purpose of writing data to it.

-a (append mode): open an existing file for the purpose of appending extra data to it but if the file does not exist, it create a new file and start writing data to it.

A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other.

A. network
B. switch
C. broadband
D. node

Answers

Answer:

Option A is the correct answer for the above question.

Explanation:

A network is said to the group of the connected computer used for the communication purpose in which information is transferring from one computer to another and vice versa. The computer is connected to a network with the help of some software or some hardware or both.

The question scenario also asked about that thing which is made for communication and being connected with the help of some software or hardware. Then the answer is a computer network that is described in the above paragraph. Hence the answer is option A  while the other option is not correct because--

Option B states about switch which is used to connect the network, not for the communication.Option C states about broadband which is also used to connect the network, not for the communication.Option D states about node which is called for the computer system when it is on the network.

What would the proper field type be to allow users to enter multiple paragraphs (Choose 2 answers):A. Text Area (Rich)B. Text AreaC. Text Area (Long)D. Text Area (Super Long)E. TextF. Text (Encrypted)

Answers

Answer:

Option A and C are the correct answer for the above question.

Explanation:

In sales-force language, the Text Area (Long) and Text Area (Rich) is used to take the 131,072 characters in the form of separate lines. This can help to enter multiple paragraphs.

The question scenario also asked that what allows users to write multiple paragraphs, then the answer is Text Area (Long) and Text Area (Rich) as described above. Hence options A and C are the correct answer while the other is not because--

Option B states about 'Text Area', which is used to enter 255 character which is almost one paragraph only.Option D states about 'Text Area (Super Long)', which is not identified by the sales-force language. Option E states about 'Text', which is also not identified by the sales-force language.Option F states about 'Text Area (Encrypted)', which is used to store the written symbol and text in the encrypted form.

You have just starting working at Quantum Company. As a new programmer, you have been asked to review and correct various pseudocode. The following pseudocode is not working correctly. What code needs to be corrected? This is the call to the method: displayName() And this is the method: displayName(string name) output "My name is " name returnA. Change the method call to displayName("Sean")
B. Change the method call to displayName(Sean)
C. Change the return statement to return output
D. Change the return statement to return name

Answers

Answer:

Option A: Change the method call to displayName("Sean")

Explanation:

The function displayName(string name) expects an input string to be passed to its parameter name. The original pseudocode that call to the method, displayName() doesn't include an argument within the parenthesis. When the function is called, no value will be passed to the parameter name. This will make the name become undefined.

To fix the problem we need to include a string argument inside the parenthesis when calling the function displayName() so that the string argument (e.g. "Sean") will be passed to the parameter name and then the function will operate on the name and display it.

What is the printout of the following switch statement?
char ch = 'a';
switch (ch) {
case 'a': case 'A': cout << ch << endl; break;
case 'b': case 'B': cout << ch << endl; break;
case 'c': case 'C': cout << ch << endl; break;
case 'd': case 'D': cout << ch << endl;
}

Answers

Answer:

a

Explanation:

The switch statement in the question above is written in C++ programming language. Firstly a variable of type char is declared and assigned a value of a. The switch statement then checks this value and executes the statement that follows, observe that in all cases, it checkes both the upper and lower case letters, also the value that is printed is the value stored in the variable ch and not the string ch. The code has also been to print the same output when any of the values a,b,c or d are entered.

What do 3-D game programs use to send standard video commands to the device driver?

Answers

Answer:

The answer is "APIs".

Explanation:

APIs stands for application programming interface. It provides an interface between client and server. Several types of APIs are used web-based systems, databases, hardware, and software libraries.  

It is also known as an in-built program.  APIs interact in the most commonly used shares and embedded game content, libraries, operational systems, applications, etc.

Josh is designing a new network infrastructure that will allow unauthenticated users to connect from the Internet and access certain areas. The goal is to protect everything internal while still providing outside access. Josh decided to put the web server on a separate subnet that’s open to public contact. What is this subnet called?

Answers

Answer:

DMZ

Explanation:

DMZ also called delimitarized some r or perimeter network is a form of computer security that with a physical and logical subnetwork of an organization external site accessible by external untrusted users. It is meant to enhance security. It allows the access to the companies private local network copied to the delimitarized zone on the internet and make time to detect and expose breach of network.

Of the listed principles, which process would transpire if a user provides a correct username and password?

Answers

Answer:

then the system will automatically grant access to that individual

Explanation:

Regardless of the system, a username and password are credentials used in order to prevent unauthorized access to the system. Therefore if a user provides the correct username and password when prompted, then the system will automatically grant access to that individual, since the account that they have logged in correctly as is already registered as an authorized account within the system.

is a sophisticated printer used to produce high-quality drawings such as blueprints, maps, and circuit diagrams.

Answers

Answer:

Plotters printers

Explanation:

Plotters printers are sophisticated printer that uses pen, pencil, marker, or another writing tool instead of the regular toner for traditional printers to produce high-quality drawings such as vector graphics, blueprints, maps, and circuit diagrams etc.

Which Traffic Source dimensions does Google Analytics automatically capture for each user who comes to your site?A. Source, Keyword, Campaign nameB. Source, Medium, KeywordC. Source, Medium, Campaign nameD. Medium, Keyword, Campaign name

Answers

For each user who comes to your site the google analytics automatically capture the traffic source dimensions Source, Medium, Campaign name.

Explanation:

Source:

There cannot be any reference to a website without an origin source. The source is basically the origin of your traffic such as a search engine (google) or a domain (ex: Twitter).

Medium:

Every referral to a website also has a medium along with the source.examples are -:  unpaid search, "cost per click", referral, mail.

Campaign name:

The campaign Name is the name referring to the google ads campaign.

How many bits are used to direct traffic to specific services running on a networked computer?

Answers

Answer:

The correct answer is 16 bit.

Explanation:  

The main role of the transport layer provided the communication channel of the process which are running in a different host. When the information flows there is always traffic that is arisen but the transport layer aimed is that process will go at the correct node and received at the proper destination. The 16-bit number specifies that the process or node is running in the networked traffic.

An additional factor in how an element is rendered is that properties are passed from a parent element to its children in a process known as ____.

Answers

Answer: Style inheritance

Explanation:

Style inheritance is used to design style sheets. It is a process in which properties are inherited by children from a parent element. For example you wish that all text on a page use same font color i.e. red. You can apply they following style for <body> tag like {body color:red;}. All the elements in the web page will inherit this font color. This is better to use than to create styles for each tag. Every heading and paragraph will be displayed in this font color until you define different color for particular element.

Which of the following is true? a. The ListIterator interface is a subinterface of the Iterator interface b. The ListIterator interface is a superinterface of the Iterator interface c. The ListIterator interface extends the List interface d. None of the above

Answers

Answer:

Option (A) is the correct answer.

Explanation:

Iterator’ is an interface that allows to give access to the data member, traverse any collection and remove the data member from the collection. ListIterator interface is used to extend the Iterator interface before it has been used by the user because it is an interface defined in the "Iterator" interface. This line is also said by the option "a" in the question. hence option a is the right answer. Another option is not valid because-

Option b says that the Iterator interface is defined in the ListIterator interface which is wrong.Option c suggests that the ListIterator interface is defined in the List interface which is also wrong.Option d suggests that the given option is not correct but the option "a" is correct.

Mrs. Dunn shows her students a data range, which has been named "Goals,” covering cells A14 to A25. She tells her students that the data range needs to expand to include additional cells. The range should cover A14 to A45. She tells her students to record the steps needed to extend the range, as shown in the chart.

Answers

Answer:

In this case, Riko and hina made the correct steps.

Explanation:

Rin y Sakura made a wrong step because the range A14 to A25 already exist, and they have selected the option Define name, with this option we can make a new range with a new name.

Riko and Hina have selected the option name manager, with this option we can select the range A14 to A25 with the name "Goals", and to expand it to the new range A14 to A45.

Answer:

~A~

Explanation:

Which of the following can help a search engine understand what your page is about?

Answers

Answer:

The title tag  is the correct answer.

Explanation:

In the following question there is some detail that is the options are missing:

The number of images used The title tag The date it was published The total number of words

The title tag of the pages or the websites helps the search engines to know what types of details contained in your pages or the website. The title of the page of the website can help the users and the search engines is what type of information or data on your page. So, that's why the following option is true.

Final answer:

One way a search engine understands what your page is about is through the information provided about the organization that authored the page. This includes details about the organization's purpose or history.

Explanation:

One of the ways a search engine can understand what your page is about is through the information provided about the organization that authored the page and/or site. This includes information about the purpose or history of the organization. For example, if you run a baking blog and your About page provides details about your passion for baking and your experience as a professional pastry chef, a search engine can infer that your page is about baking and related topics.

// In this exercise, you will be given a variable, it will be called: value
// You will also be given a variable named: greaterThanFive // Using an 'if' statement check to see if the value is greater than 5. If it is, re-assign greaterThanFive the boolean true.

Answers

Answer:

import java.util.Scanner;

public class Solution {

   public static void main(String args[]) {      

     Scanner scan = new Scanner(System.in);

     System.out.println("Enter your value");

     int value = scan.nextInt();      

     greaterThanFive(value);

   }  

   public static void greaterThanFive(int userInput){

       System.out.println(userInput > 5);

   }

}

Explanation:

The first line import the Scanner which is use to enable to accept user input.

The class is defined as Solution in the next line. The main method is declared in the next line which signify the beginning of the program.

Then, a scanner object is declared called scan in the next line. Then a prompt is display to the user to input a value. The user input is stored in the variable value. The value is then passed to the method greaterThanFive.

The method greaterThanFive is declared and have just one parameter, the userInput. Inside the method, we output if the userInput is greater than 5 using the logical operator (>).

What problems could occur if a system allowed a file system to be mounted simultaneously at more than one location?

Answers

Answer:

The correct answer is, if a file mounted at more than one location, it will give support to mistakes confuse the users.

Explanation:

Mounting: A process by which operating system makes directories on hard drive, floppy disk, CD-ROM or network share (types of storage devices), which are access via file system of computer and available for the users.

So, if a system is performing these type of tasks continuously at the same time, the user will get confused and a lot of mistakes will occur at that time.

Final answer:

Mounting a file system at multiple locations can cause confusion with file paths, security and permissions issues, increased maintenance complexity, and the risk of a cascading effect similar to file lock failure in distributed systems.

Explanation:

If a file system is mounted simultaneously at more than one location, several issues can arise. One significant problem is the confusion it could cause regarding file paths and versions. Users or programs may not be certain of which mounted path contains the current version of a file, leading to inconsistencies and data integrity issues.

Moreover, there would be challenges related to permissions and security. If different mount points have different access controls, the system might face difficulties enforcing the correct permissions uniformly. This can result in unauthorized access or accidental exposure of sensitive data.

Another important aspect is the complexity of maintenance. Having multiple mount points for the same file system increases the difficulty of managing the system, as any changes made need to be accurately reflected across all mount points to prevent data loss or corruption.

A potential real-world consequence of such a configuration could be a cascading effect similar to the one that occurs when file locks fail in a distributed system, resulting in multiple systems stalling due to being unable to access the necessary data.

Dynamic alliance networks work best in industries: a. that are mature and stable in nature. b. where the coordination of product and global diversity is critical. c. that are characterized by predictable market cycles and demand. d. characterized by frequent product innovations and short product life cycles

Answers

Answer:

The correct answer is D.

Explanation:

An "Alliance Network" is a process that is used very frequently in almost every industry today. It is used in a situation where two or more firms collaborate to manufacture a single end product. It is like the division of labor but on a bigger scale. An example to this can be given as all iPhone screens are produced by a different company and shipped to Apple's factories only to be assembled to form the final end product.

Therefore Dynamic Alliance Networks can be said to work best in industries that have frequent innovations and short product life cycles such as in almost all aspects of technology. Continuing from the Apple example again, they get their screens from another company because they simply do not want to make a lot of investments to produc their own screens because the technology is developing too quickly and the products have short life cycles as stated in the answer. This is why they use Dynamic Alliance Networks to decrease the cost of their products and increase their revenues.

I hope this answer helps.

A developer has made a change to an Automation Anywhere TaskBot using the Enterprise Client interface. When running the bot from the Control Room, the developer is surprised to see the previous version of the TaskBot. What must be done to overcome the issue?

Answers

Answer:

Copy the Task Bot from the client device to the control room server.

Explanation:

First, we need to understand what we mean by Automation Anywhere: This is a web based controlled and  popular robotic process automation (RPA) vendors offering powerful & user-friendly RPA capabilities to automate any complex tasks. It is one of the "Revolutionary Technology" that changes the way the enterprise operates. This tool combines conventional RPA with intellectual elements like natural language understanding and reading any unstructured data.

Automation Anywhere allows organizations to automate the processes which are performed by the humans. It is a Web-Based Management System which uses a Control Room to run the Automated Tasks. Automation Anywhere tool can automate ends to end business operations for companies.

Other Questions
Robert decides to go for a run when he gets home from school. As he begins running, his breathing rate starts to increase. What are the mechanisms that cause his breathing rate to increase?A. The respiratory control center senses the need for more oxygen, which causes the trachea to push and pull air more forcefully.B. The diaphragm senses the need for more oxygen, which causes it to expand and contract more quickly in order to inflate and deflate the lungs.C. When carbon dioxide levels in the blood decrease, the respiratory center sends signals to the alveoli to increase the volume that they expand.D. When oxygen levels in the blood decrease, the respiratory center sends signals to the diaphragm to increase the rate at which it contracts and relaxes. According to the text, which of the following is not a childhood risk factor for persistent delinquency?a.parental psychopathologyb.small family sizec.low intelligenced.neighborhood disadvantage What does Bierce's vivid and precise description of the setting reveal about the plot?A A soldier falls asleep on his lookout, jeopardizing his infantry's mission.B Due to the treacherous rocks, the soldiers decide to cancel their mission.C The terrain was wooded, with steep cliffs, and overlooked a deep valley.D On a sunny autumn afternoon, a soldier lay dead in a clump of laurel. when solving for concentration, you divided mass by:1.)weight 2.)volume3.)distance A Baker's Dozen David Matherne 1 I ain't no valedictorian. I'll give you that. But I'm certainly not the loser my step-father Johnnie likes to think I am, either. Mr. oh-so-famous local Johnnie Pipehead of "Johnnie on the Spot Plumbing." (Real clever name, huh?) Just because he only took the requisite twelve years to make it through school and graduate from his alma mater, and I took slightly longer, that doesn't make me a loser. So what if I took "the road less traveled by" and added a one-year, scenic detour to my journey--thanks to Algebra, Physical Science, and well...Latin. Did I mention Chemistry? Let's just say I liked Latin but Latin didn't much care for me. Just because I took thirteen years in all to get out of Melancholy High with a diploma doesn't make me some loser. Being nothing at all, now THAT would make me a loser.2 I am something. But what I am, and what I'll be, are two countries at war at present. Battles, I've had them. Many battles. Literal ones...figurative ones...too many. Figurative language...see there? At least I did learn a few somethings in Mr. J's English class.3 I could've been the valedictorian. Of somewhere. Of some school that had a bunch of unmotivated kids like me. Then, maybe I would have gone to those Physical Science study halls. Maybe I would have actually done my homework in Mr. Pugnacious' class. Real name, Pugliese. Wrestling coach. Don't you just love that moniker? For a wrestling coach...Pugnacious. Funny stuff, huh? Made that up. It stuck. Guy's got a bulldog face but a little tail-wagging personality. Had everything but the panting. And the drool. Too much caffeine I suppose. Too happy. Loved his math, that Pugnacious.4 Yeah, I could've been the valedictorian somewhere. I would've shown everyone how determined I can truly be. As it turned out, I showed 'em anyway. Counselors were shown that I didn't have to graduate with my class, like they so earnestly wished for me to. I showed the teachers who said, "Conrad, your sophomore year will be two of the best years of your life, son." My retorts were always something cleverly snide as well, like: "Yeah, but half the sophomores around here don't even know how to spell s-o-p-h-o-m-o-r-e...they leave out the 'o' on all their cheesy, self-absorbed class election posters, and they certainly don't have a clue that it's a combination of two latinaic roots, 'sopho' and 'more,' meaning 'wise fool.' At least I'm a fool with a bit of wisdom."5 I could've impressed Mr. Johhnie come-lately, my Mom's most recent convenience among a revolving door of Pops rejects. Yeah, Mr. Johnnie would've loved me being the valedictorian, giving that big speech, the one Angel Ramirez so properly gave tonight...'Members of the School Board, Mr. Wilson, Parents, Faculty and Students, blah, blah, yuck, blah, blah, blah.' I could've given my version instead, only to have Mr. Johnnie Joint-Compound listen, then sending me off to some trade school on a full ride to cut pipe and be his apprentice who wipes his nose and kisses his bu-- and goes on cigarette or burger runs or grabs some rusty tool from the truck. Not gonna fight that part of the war.6 I was the valedictorian tonight. I do know what I'm going to be. I have graduated from Meloncamp High School about 115th out of class of 126. Thing is, I've seen the fear in the eyes of four score and seven more of those classmates of mine that don't have a rat's chance of knowing what they are going to be. I do. I'm going to be a writer. Mr. J taught me more than English. He taught me what Pops taught me before his passing...love.7 So here's my Valedictory: "Good evening, everyone. Thanks for coming out to sit on hard, uncomfortable stadium concrete on an unseasonably warm evening and wearing clothes and shoes you can't wait to get home to get out of. Here's what I have. Time is NOT money. Time is convenience. And when one gives up Time, he does pay for it. Yes. But if he trades Time for Opportunity, then he gets credit. So, in conclusion, Time is NOT money, but it CAN be spent. How will you spend yours?! Thank you, good night.Latin vale- = farewelldict- = to say Based on the Latin roots in the words valediction and valedictory, what is the MOST LIKELY definition for these words as used in the passage? A) a speech or statement made to say goodbye B) a salutation to end a letter or written message Eliminate C) a proclamation of the end of a specified period of time D) a closing statement to wrap up a meeting or other event Carol Gilligan has criticized Lawrence Kohlberg's theory of moral development because: A. it is based on a male norm that puts abstract principles above relationships.B. it does not recognize higher-level moral reasoning in certain cultural groups.C. Kohlberg underestimated the contribution of family relationships to moral development.D. it places too much emphasis on moral thought and not enough emphasis on moral behavior. For the radial speed of an astronomical object to be determined, what must the objects spectrum contain? what is 6x - 3y if x = 5 and y = 3 which statement is an enlightment idea that jefferson used in the declaration of independence Need some help with this . Aster Company is considering an investment in technology to improve its operations. The investment will require an initial outlay of $800,000 and yield the following expected cash flows. Management requires investments to have a payback period of two years, and it requires a 10% return on its investments. Period Cash Flow 1 $300,000 2 350,000 3 400,000 Why is it important to look at the verbs used to explain a writing assignment?The verbs help the writing process.The verbs identify the paper's purpose.The verbs must be used in the thesis.The verbs are the entire writing prompt. Assume that the following confidence interval for the difference in the mean length of male (sample 1) and female babies (sample 2) at birth was constructed using independent simple random samples. What does the confidence interval suggest about the difference in length between male babies and female babies? 0.2 in. < 1- 2 Helene invested a total of 1,200 $ 210 = 15Please help I did it on my calculator and i cant find it 43. Egyptologist Howard Carter discovered the tomb of Tutankhamun in: (2 points)The Cheops PyramidThe Valley of the Kingsunder the ruins of MemphisO The Temple of Isis Several years ago, Sarah purchased a structure for $150,000 that was originally placed in service in 1929. In the current year, she incurred qualifying rehabilitation expenditures of $200,000. The amount of the tax credit for rehabilitation expenditures, and the amount by which the building's basis for cost recovery would increase as a result of the rehabilitation expenditures are the following amounts:_________ a. $20,000 credit, $180,000 basis. b. $20,000 credit, $200,000 basis. c. $20,000 credit, $350,000 basis. d. $40,000 credit, $160,000 basis. e. none of these. If a new source of lumber is found, what is likely to happen to the price oflumber, and why?OA. The price is likely to increase because costs of production willincrease.OB. The price is likely to decrease because supply has increased.OC. The price is likely to decrease because demand will decrease.OD. The price is likely to increase because demand will increase.SUBMIT This is the most flexible way to create a query. Used to create queries that displays only the records that match criteria entered in the Query Design view. Thomsen Computer Company produces three products: Earth, Wind, and Fire. Earth requires 80 machine setups, Wind requires 60 setups, and Fire requires 180 setups. Thomsen has identified an activity cost pool with allocated overhead of $960,000 for which the cost driver is machine setups. How much overhead is assigned to each product? Earth Wind Fire Select one: A. $320,000 $320,000 $320,000 B. $200,000 $150,000 $450,000 C. $240,000 $180,000 $540,000 D. $180,000 $320,000 $460,000 Steam Workshop Downloader