Which of the following can you read and write to many times?
A.CD-ROM
B.CD-R
C.CD-RW
D.DVD-ROM

Answers

Answer 1

Answer:

CD-RW

Explanation:

CD–Read Writable (CD-RW) refers to an optical CD that may be written and rewritten multiple times. CD-RW allows for data erasing during each rewritable session.

Answer 2

Answer:

CD

Explanation:

referstoan optical CD that my be written and rewritten multiple time CD-Rw allows

of data erasing during ech rewritble sesion


Related Questions

you notice that row labels in your spreadsheet are 1,2,3,8,9.Row labels 4 through 7 are missing.what could cause this?

Answers

Answer:

Rows 4 through 7 are hidden

Rows 4 through 7 are checked out to another user

Rows 4 through 7 contain invalid data

Rows 4 through 7 have been deleted

Explanation:

write an algorithm that reads two values determines the largest value and prints the largest value with an identifying message in Python​

Answers

Answer:

a = int(input("Input your first number: "))

b = int(input("Input your second number: "))  

maximum = max(a, b)

print("The largest value: ", maximum)

Explanation:

The function max() can be used to find the maximum of two values

The algorithm in Python is given by:

v1 = input("Enter the first value: ");

v2 = input("Enter the second value: ");

if (v1 > v2):

     print(v1, "is the largest value");

else:

     print (v2, "is the largest value");

------------------------

The first step is reading the two variables, which is done with the following code.

v1 = input("Enter the first value: ");

v2 = input("Enter the second value: ");

------------------------

Then, we have to verify which one is the largest, using the if command, along with the identifying message.

if (v1 > v2):

     print(v1, "is the largest value");

else:

     print (v2, "is the largest value");

A similar problem is given at https://brainly.com/question/14233103

What is the empty space inside the character 'O' called?

Answers

Answer:

In typography, a counter is the area of a letter that is entirely or partially enclosed by a letter form or a symbol (the counter-space/the hole of). The stroke that creates such a space is known as a "bowl".

List and explain five instances of issues that pertain to business ethics

Answers

Social Media. ...
Harassment and Discrimination. ...
Health and Safety. ...
Technology/Privacy

Disability. ...
Equal Pay. ...
Pregnancy. ...
Race/ Color. ...
Religion. ...

At what layer in the TCP/IP protocol hierarchy could a firewall be placed to filter incoming traffic by means of:

a) message content
b) source address
c) type of application​​

Answers

The answer is c) type of application

The most significant protocol at layer 3, often known as the network layer, is the Internet Protocol, or IP.The IP protocol, the industry standard for packet routing among interconnected networks, is the source of the Internet's name.  Thus, option C is correct.

What are the TCP/IP protocol hierarchy could a firewall?

Application-layer firewalls operate at the TCP/IP stack's application level (all browser traffic, or all telnet or ftp traffic, for example), and thus have the ability to intercept any packets going to or from an application. They stop different packets (usually dropping them without acknowledgment to the sender).

Firewalls are frequently positioned at a network's edge. An external interface is the one that is located outside the network, while an internal interface is the one that is located inside the firewall.

Therefore, The terms “unprotected” and “protected,” respectively, are sometimes used to describe these two interfaces.

Learn more about TCP/IP here:

https://brainly.com/question/27742993

#SPJ2

h) Choose suitable devices for each of the following applications. In each case, give a reasons for your choice. (i) A report 'in the field' sending data back immediately to head office. (ii) A person wishing to monitor their health/exercises while 'on the go' wherever they are.

Answers

(i) For sending a report 'in the field' back to the head office, a suitable device would be a smartphone or a tablet with internet connectivity.

(ii) For monitoring health/exercises while on the go, a suitable device would be a wearable fitness tracker or a smartwatch.

What is the smartphone?

To send a report from the field, use a smartphone or tablet with internet connectivity. Smart devices are portable, lightweight, and have communication capabilities. They can run apps and access email or cloud storage.

Wearable devices monitor health and fitness data. Devices track steps, distance, calories, heart rate, sleep, and offer exercise coaching. They sync wirelessly with smartphones for accessing data analysis, setting goals, and receiving notifications.

Learn more about smartphone  from

https://brainly.com/question/25207559

#SPJ1

Which of the following would be used to communicate a high level description of a major change

Answers

A Change Proposal would be used to communicate a high-level description of a major change that involved significant cost and risk to the organization. Thus option D is correct.

What are a cost and risks?

The price of mitigating risk and suffering losses. The sum of all costs associated with a firm's activities that are linked to risk, such as retention costs and associated less any charges

To convey a high-level summary of a patch, utilize a change proposal. Typically, the service portfolio method produces this encouragement and inspiration, which is then forwarded to deal with different situations for approval.

Therefore, option D is the correct option.

Learn more about cost and risks, Here:

https://brainly.com/question/2149007

#SPJ1

The question is incomplete, the complete question will be :

Which of the following would be used to communicate a high-level description of a major change that involved significant cost and risk to the organization?

1) Service Request

2) Change Policy

3) Risk Register

4) Change Proposal


Using the in databases at the , perform the queries show belowFor each querytype the answer on the first line and the command used on the second line. Use the items ordered database on the siteYou will type your SQL command in the box at the bottom of the SQLCourse2 page you have completed your query correctly, you will receive the answer your query is incorrect , you will get an error message or only see a dot ) the page. One point will be given for answer and one point for correct query command

Using the in databases at the , perform the queries show belowFor each querytype the answer on the first

Answers

Using the knowledge in computational language in SQL it is possible to write a code that using the in databases at the , perform the queries show belowFor each querytype.

Writting the code:

Database: employee

       Owner: SYSDBA                        

PAGE_SIZE 4096

Number of DB pages allocated = 270

Sweep interval = 20000

Forced Writes are ON

Transaction - oldest = 190

Transaction - oldest active = 191

Transaction - oldest snapshot = 191

Transaction - Next = 211

ODS = 11.2

Default Character set: NONE

Database: employee

       Owner: SYSDBA                        

PAGE_SIZE 4096

...

Default Character set: NONE

See more about SQL at brainly.com/question/19705654

#SPJ1

Using the in databases at the , perform the queries show belowFor each querytype the answer on the first

Which feature in Access is used to control data entry into database tables to help ensure consistency and reduce errors?

O subroutines
O search
O forms
O queries

Which feature in Access is used to control data entry into database tables to help ensure consistency

Answers

The answer is: Forms

To control data entry into database tables to help ensure consistency and reduce errors will be known as forms in data entry.

What are forms in data entry?

A form is a panel or panel in a database that has many fields or regions for data input.

To control data entry into database tables to help ensure consistency and reduce errors will be forms.

Then the correct option is C.

More about the forms in data entry link is given below.

https://brainly.com/question/10268767

#SPJ2

Adding effects that move your text or pictures in your presentation is called:

Answers

the answer should be it’s a transitionl

Stem assessment 4: divisible by

Answers

Explanation:

4 IS DIVISIBLE BY 2,4,1

IF MY ANSWER IS USEFUL MARK ME AS BRILLINT

Explain information systems and its components and provide examples of how each
component is applied

Answers

An information system (IS) refers to a set of interconnected components that collect, process, store, and disseminate data and information to support decision-making, coordination, and control in an organization.

How to explain the system

The key components of an information system are:

Hardware: The physical components of the computer system that enable the processing, storage, and communication of data. Examples of hardware components include the computer itself, storage devices such as hard drives and flash drives, input devices such as keyboards and scanners, and output devices such as monitors and printers.

Example: A Point of Sale (POS) system used by retailers uses hardware components like cash registers, barcode scanners, and card readers to capture data and process transactions.

Software: The programs and applications that run on the computer hardware and enable users to perform various tasks. Examples of software include operating systems, word processors, spreadsheets, and database management systems.

Example: Customer Relationship Management (CRM) software used by businesses to track customer interactions and manage customer data.

Data: The raw facts and figures that are processed by the information system. Data can be in various forms, such as text, images, audio, and video.

Example: A spreadsheet used to track sales data by a sales manager.

Learn more about information on;

https://brainly.com/question/4231278

#SPJ1

How many NOTS points are added to your record for not completely stopping at a stop sign?

Answers

The number of NOTS points added to your record for not completely stopping at a stop sign can vary depending on the location and laws of the jurisdiction where the traffic violation occurred. It is important to note that not stopping fully at a stop sign is a serious safety violation, and it can result in a traffic ticket, fines, and possible points on your driver's license record.

In some jurisdictions, failing to stop at a stop sign can result in a citation for running a stop sign or a similar violation. In other jurisdictions, it may be categorized as a failure to obey traffic signals or a similar violation. The number of NOTS points added to your record, if any, will depend on the specific violation charged and the point system used by the jurisdiction in question.

It's important to note that NOTS points are used to track and measure the driving record of a driver, and they may impact insurance rates and license status. It's always a good idea to familiarize yourself with the laws and regulations in your area and drive safely to reduce the risk of violations and penalties.

We can sell the Acrobat Reader software to the other users”. Do you agree with this statement? Justify your answer.

Answers

No, as a User, one CANOT sell Acrobat Reader software to the other users.

What is Adobe Reader?

Acrobat Reader   is a software developed by Adobe and is generally available as a free   PDF viewer.

While individuals can use Acrobat Reader for free,selling the software itself would be in violation of   Adobe's terms of use and licensing agreements.

Therefore, selling Acrobat Reader to other users would not be legally permissible or aligned with Adobe's distribution model.

Learn more about Adobe Reader at:

https://brainly.com/question/12150428

#SPJ1

in the situation above, what ict trend andy used to connect with his friends and relatives​

Answers

The ICT trend that Andy can use to connect with his friends and relatives​ such that they can maintain face-to-face communication is video Conferencing.

What are ICT trends?

ICT trends refer to those innovations that allow us to communicate and interact with people on a wide scale. There are different situations that would require a person to use ICT trends for interactions.

If Andy has family and friends abroad and wants to keep in touch with them, video conferencing would give him the desired effect.

Learn more about ICT trends here:

https://brainly.com/question/13724249

#SPJ1

In this problem, we consider sending real-time voice from Host A to Host B over a packet-switched network (VoIP). Host A converts analog voice to a digital 64 kbps bit stream on the fly. Host A then groups the bits into 56-byte packets. There is one link between Hosts A and B; its transmission rate is 10 Mbps and its propagation delay is 10 msec. As soon as Host A gathers a packet, it sends it to Host B. As soon as Host B receives an entire packet, it converts the packet’s bits to an analog signal. How much time elapses from the time a bit is created (from the original analog signal at Host A) until the bit is decoded (as part of the analog signal at Host B)?

Answers

Approximately 10.0448 milliseconds elapse from the time a bit is created at Host A until it is decoded at Host B.

How to solve

To calculate the time elapsed from the creation of a bit at Host A until it is decoded at Host B, we need to consider several factors:

Conversion of analog voice to a digital 64 kbps bit stream: This process happens on the fly and takes negligible time.

Grouping of bits into 56-byte packets: Since each packet contains 56

Since a byte comprises 8 bits, a packet would have 56 bytes, or 448 bits in total.

The link between Hosts A and B has a specified transmission rate of 10 Mbps, which is measured in megabits per second.

The delay in propagation is specified as 10 milliseconds.

Based on these variables, we are able to determine the amount of time that has passed in the following manner:

Time to transmit one packet = (448 bits) / (10 Mbps) = 44.8 microseconds

Note: We divide by the transmission rate to convert the number of bits into time.

Time for propagation = 10 msec

Therefore, the total time elapsed from the creation of a bit at Host A until it is decoded at Host B is:

Total time = Time to transmit one packet + Time for propagation

= 44.8 microseconds + 10 msec

≈ 10.0448 milliseconds

So, approximately 10.0448 milliseconds elapse from the time a bit is created at Host A until it is decoded at Host B.

Read more about packet network here:

https://brainly.com/question/30812347

#SPJ1

Hello.

So I have been using this online therapist bot named Dr. Sbaitso, but recently his program has been very slow. Are there any alternatives for online therapists? I don't feel comfortable with video calling therapists or having a meeting with them, so that's why I am looking for a bot therapist thats free.

Answers

Answer:

:P

Explanation:

❤*: .。. o(≧▽≦)o .。.:*❤

A vendor conducting a pilot program with your organization contacts you for
organizational data to use in a prototype. How should you respond?

Answers

Since the  vendor is conducting a pilot program with your organization contacts you for organizational data to use in a prototype, The way that you  can respond is to  Refer the vendor to the right personnel.

What is an example of a reference vendor?

A report outlining the payment history between a company customer and its supplier or vendor is known as a supplier reference (or trade reference). It helps a supplier to evaluate your creditworthiness and determine whether you're a trustworthy customer before extending credit to you.

You can determine whether you are prepared to undertake the project fully by running a pilot program. It might highlight unforeseen difficulties that must be resolved, providing you the chance to change and improve in a way that lessens the effects of those difficulties.

Hence, An organization can discover how a large-scale project might function in practice by conducting a small-scale, brief experiment known as a pilot program, also known as a feasibility study or experimental trial.

Learn more about pilot program from

https://brainly.com/question/28920126
#SPJ1

a triangular number is a number that is the sum of the integers from 1 to some integer n. thus 1 is a triangular number because it is the sum of the integers from 1 to 1; 6 is a triangular number because 1 + 2 + 3 = 6.given the non-negative integer n, create a list of the first n triangular numbers. thus if n was 5, the list would be: {1, 3, 6, 10, 15}.assign the list to variable traingulars

Answers

Answer:

def triangular_numbers(n):

triangulars = []

sum = 0

for i in range(1, n+1):

sum += i

triangulars.append(sum)

return triangulars

# Test the function

print(triangular_numbers(5)) # Output: [1, 3, 6, 10, 15]

Explanation:

To create a list of the first n triangular numbers, you can use a for loop to iterate from 1 to n, and for each iteration, add the current number to the sum of the previous numbers.

This function will create a list of the first n triangular numbers and return it. You can then assign the returned list to the variable triangulars.

Data analytics benefits both financial services consumers and providers by helping create a more accurate picture of credit risk.
True
False

Answers

Answer:

True

Explanation:


Which of the following is an example of a pro-social deception

Answers

It is to be noted that the option that speaks to prosocial behavior is "saving puppies from a burning building only because you know the puppies need help"

Lying about a surprise party is also an example of pro-social deception.

How is this so?

Prosocial lying is a typical occurrence in everyday conversation. For example, an employee may tell a colleague that they gave an amazing presentation when they did not, or a gift giver may congratulate them for a gift they would prefer not have gotten.

Prosocial conduct, also known as the purpose to benefit others, is a type of social activity that "benefits other people or society as a whole," such as "helping, sharing, donating, cooperating, and volunteering." Obeying the norms and complying to socially acceptable behaviour are also considered prosocial.

Learn more about pro-social deception at:

https://brainly.com/question/10552505

#SPJ1

Full Question:

Although part of your question is missing, you might be referring to this full question:

Which of the following is an example of prosocial behavior?

O helping a car accident victim only because you know you will be featured on the 5:00 p.m. news

O erasing the board for Angela (she has two broken arms and can't do it by herself) only because you know you will get extra credit if you help her

O saving puppies from a burning building only because you know the puppies need help

O stopping a fight between other people only because you know you will get in trouble if you don't stop it

O all of these are examples of prosocial behavior

Which of the following is an example of a pro-social deception

HS: 9.1.7 Checkerboard, v2
I got this wrong, and I can't get the correct answer.


Code I Used:


def board():

myGrid=[]

for i in range(8):

if i == i//2*2:

myGrid.append([0,1]*4)

else:

myGrid.append([1,0]*4)

for i in range(8):

print(myGrid[i])

board()

HS: 9.1.7 Checkerboard, v2I got this wrong, and I can't get the correct answer.Code I Used:def board():

Answers

Note that the corrected code is given as follows:

def board():

   myGrid = []

   for i in range(8):

       if i == i//2*2:

           myGrid.append([0, 1] * 4)

       else:

           myGrid.append([1, 0] * 4)

   for i in range(8):

       print(myGrid[i])

board()

What is the rationale for the above response?

Note that the corrected code has the following changes:

Indentation: All lines inside the board function are indented to show that they belong to the function.

Whitespace: Added whitespace after the function name, after the opening parenthesis in the function definition, after the opening square bracket in the append method, and after the comma between the 0 and 1 and between the 1 and 0.

Colon: Added a colon at the end of the if statement to indicate the start of a new block of code.

Parentheses: Added parentheses around the arguments to the print function.

These changes should make the code run without errors and produce the desired output, which is an 8x8 checkerboard pattern with alternating black and white squares.


Learn more about code:

https://brainly.com/question/28848004

#SPJ1

A __________ infrastructure is made available to the general public or a large industrygroup and is owned by an organization selling cloud services.

a. community cloud
b. hybrid cloud
c. public cloud
d. private cloud

Answers

\(\Huge{\fbox{\red{Answer:}}}\)

A public cloud infrastructure is made available to the general public or a large industrygroup and is owned by an organization selling cloud services.

\(<font color=orange>\)

a. community cloud

b. hybrid cloud

c. public cloud

d. private cloud

Write a flowchart and C code for a program that does the following: Uses a do...while loop. Prints the numbers from 1 to 10 with a blank line after each number. (Hint: You'll need to use the newline character \n .)

Answers

Answer:

create the integer variable and initialize it to one, with the do statement, increment the variable by one and print it, then the while statement checks if the variable is less than or equal to 10.

#include <iostream>

using namespace std;

int main(){

   int i = 1;

   do {

       cout<< i << "\n";

       i++;

   }

   while (i <= 10);

}

Explanation:

The C++ source code initializes the integer variable i to one and increments and print the value if the value is less than or equal to ten. The do-while statement executes a block of code before the condition is implemented.

The flowchart and the program illustrate the use of do while loop.

The do while loop is used to perform repetitive operations

The C code where comments are used to explain each line is as follows:

#include <stdio.h>

int main () {

//This initializes the number to 1

   int a = 1;

//This begins the loop

   do {

//This prints the current number

       printf("%d\n", a);

//This increments the number by 1

       a = a + 1;

   }

//The loop is repeated as long as the number is less than or equal to 10

   while( a <= 10 );

   return 0;

}

See attachment for the flowchart

Read more about loops at:

https://brainly.com/question/14592816

Write a flowchart and C code for a program that does the following: Uses a do...while loop. Prints the

Select the feature in Windows Server 2016 that has the ability to support resource records of a type unknown to the DNS server on Windows Server 2016.
a. advanced record support
b. primary record support
c. unknown record support
d. secondary record support

Answers

On Windows Server 2016, there is a feature known as "unknown record support" that allows for resource records of a type the DNS server is unaware of to be supported.

Which DNS security feature in Windows Server 2016 can be set up to permit source port randomization for DNS queries?

When a DNS server executes DNS queries, source port randomization is made possible by the security feature of the DNS socket pool.

Which DNS resource record type is employed to provide the IP address for the email server for a zone?

Name Server records (NS Record) specify that a DNS Zone, like "example.com," is assigned to a particular Authoritative Name Server and indicate the name server's address.

To know more about DNS server  visit :-

https://brainly.com/question/13852466

#SPJ4

Explain TWO examples of IT usages in business (e.g.: application or system) that YOU
have used before. Discuss your experience of using these system or applications. The
discussions have to be from YOUR own experience

Answers

Answer:

(DO NOT copy from other sources). Discuss these systems or applications which include of:

Introduction and background of the application or system. Support with a diagram, screenshots or illustration.

Explanation:

List and describe four services that comprise IT infrastructure, beyond physical devices and software applications.

Answers

The four services that comprise IT infrastructure are:

Telecommunications services. Data management services . Application software services.Physical facilities management services.

What does these services do?

Telecommunications services is known to help in terms of giving data, voice, and video network.

Data management services helps to save , manage, and analyze all data. Application software services helps to give firms-wide range capabilities.

The Physical facilities management services helps to make and handle physical installations of technology.

Therefore, The four services that comprise IT infrastructure are:

Telecommunications services. Data management services . Application software services.Physical facilities management services.

Learn more about  IT infrastructure from

https://brainly.com/question/869476

#SPJ1

based on your review of physical security, you have recommended several improvements. your plan includes smart card readers, ip cameras, signs, and access logs. implement your physical security plan by dragging the correct items from the shelf into the various locations in the building. as you drag the items from the shelf, the possible drop locations are highlighted. in this lab, your task is to: install the smart card key readers in the appropriate locations to control access to key infrastructure. install the ip security cameras in the appropriate locations to record which employees access the key infrastructure. install a restricted access sign in the appropriate location to control access to the key infrastructure. add the visitor log to a location appropriate for logging visitor access.

Answers

Deploy smart card readers at all access points to critical infrastructure locations, including server rooms, data centres, and any other locations that house sensitive data or essential equipment.

What three crucial elements make up physical security?

Access control, surveillance, and testing make up the three key parts of the physical security system. The degree to which each of these elements is implemented, enhanced, and maintained can frequently be used to measure the effectiveness of a physical security programme for an organisation.

What essentials fall under the category of physical security?

Three crucial aspects of physical security are testing, access control, and surveillance. In order for physical security to successfully secure a structure, each element depends on the others.

To know more about access points visit:-

https://brainly.com/question/29743500

#SPJ1

Which programming language uses objects? C++ ALGOL Pascal BASIC

Answers

Answer:

C++

Explanation:

I am a c++ dev

Answer:

its A

C++

Explanation:

Youre amazing

Determine the total number of votes and the percentage of the total votes by each candidate. The sample output of your program is shown below. It incudes the winner of the election. Use methods from the System.out stream for your output.

Determine the total number of votes and the percentage of the total votes by each candidate. The sample

Answers

The program that yeilds the above output is given as follows.

public class VoteCounter {

   public static   void main(String[] args) {

       int candidate1Votes = 500;

       int candidate2Votes = 300;

       int candidate3Votes = 200;

       

       int  totalVotes = candidate1Votes + candidate2Votes + candidate3Votes;

       

       double candidate1Percentage = (double) candidate1Votes / totalVotes * 100;

       double candidate2Percentage = (double) candidate2Votes / totalVotes * 100;

       double   candidate3Percentage = (double) candidate3Votes / totalVotes * 100;

       

       System.out.println("Total   votes: " + totalVotes);

       System.out.println("Candidate 1 votes: " + candidate1Votes + " (" + candidate1Percentage +   "%)");

       System.out.println("Candidate 2 votes:   " + candidate2Votes + " (" + candidate2Percentage +   "%)");

       System.out.println("Candidate 3 votes: "   + candidate3Votes + " (" + candidate3Percentage + "%)");

   }

}


  How does this  work?

In this program,we have three candidates,   and the number of votes for each candidate is given.

We calculate the total   votes by summing up the votes for all candidates. Then,we calculate the percentage   of votes for each candidate by dividing their votes by the total votes and multiplying by 100.

Finally,we use the System.out.println() method   to display the total votes and the votes and percentages for each candidate.

Learn more about program:
https://brainly.com/question/23275071
#SPJ1

Other Questions
Chou Company uses the aging approach to estimate bad debt expense. The balance of each account receivable is aged on the basis of three time periods as follows: (1) not yet due, $295,000, (2) up to 120 days past due, $55,000, and (3) more than 120 days past due, $18,000. Experience has shown that for each age group, the average loss rate on the amount of the receivables at year-end due to uncollectability is (1) 2.5 percent,(2) 11 percent, and (3) 30 percent, respectively. At December 31, 2015 (end of the current year), the Allowance for Doubtful Accounts balance is $100 (credit) before the end-of-period adjusting entry is made. Required: 1. Prepare the appropriate bad debt expense adjusting journal entry for the year 2015. (If no entry is required for a transaction/event, select "No journal entry required" in the first account field.) 2. Show how the various accounts related to accounts receivable should be shown on the December 31, 2015, balance sheet. (Amounts to be deducted should be indicated by a minus sign.) How do I compute the balance sheet? 1. Find the equation of a line that passes through the point (4,1) and is perpendicular to theline that contains the points (3,-7) and (-1,9). whats the difference between a good annotation and a bad annotation? state two ways by which the principles of osmosis are applied in life Data were collected that included information on the weight of the trash (in pounds) on the street one week and the number of people who live in the house. The figure shows a scatterplot with the regression line. Complete parts (a) through (d) below. Click the icon to view the scatterplot and the regression line a. Is the trend positive or negative? What does that mean? The trend is positive. As the number of people per household increases, the weight of trash tends to increase b. Now calculate the correlation between the weight of trash and the number of people. (Use R-Sq from the figure and take the square root of it.) r0.91 (Round to two decimal places as needed.) c.Report the slope. For each additional person in the house, there are, on average, how many additional pounds of trash? The slope is 10.11. For each additional person in the house, there are, on average, 10.11 additional pounds of trash. (Type integers or decimals. Do not round.) d. Either interpret the intercept or explain why it is not appropriate to interpret it. Select the correct choice below and fill in the answer box(es) to complete your choice. Type integers or decimals. Do not round.) O A. The predicted weight of trash is times the number of people living in the household. O B. For each additional pound of trash, there is/are, on average, additional person/people per household OC, One would expect a household with person/people to generate pound(s) of trash. OD. It is inappropriate to interpret the intercept because it does not make sense to think of a household with person/people generating trash. Predicted Trash 5.62410.11 People a 100 82.8% 80 3 60 E 40 R-sq 20 0 123 4 56 7 People per Household 2. What has happened to Turner since the last time we saw him? | If a car is driven down a hill, the driver must put more pressure on the brakes to make the car stop than if it was on level ground. Explain your answer. Rectangle A and rectangle B are similar. Rectangle A has a width of 5cm and length of 8cm. Rectangle B has a width of 10cm. What is the length of rectangle B?(with explanation please) Why is it that enterprises will need to adapt in regard to human capital trends? Oceanside Bike Rental Shop charges a 15 dollar fixed fee plus 9 dollars an hour for renting a bike. Sandy paid 78 dollars to rent a bike. How many hours did she pay to have the bike checked out ? In a three server set-up, three separate lines form, each line handled by an individual server. The average arrival rate for each server is 11 customers/hr, while the average service rate = 13 customers/per hr/per server. What would be the approximate average # customers in line if they switch to a single pooled line that uses all 3 servers at the same time? 4.13 4.43 5.26 4.82 NOT 4.43 The measurement of ________ compares the density of urine to the density of water. When neither a direct cause-and-effect relationship between revenues and expenses, nor a systematic and rational allocation basis can be established, the proper recognition treatment for an expense is which of the following? A network of tubules that synthesize and transport materials needed for cellular growth and other functions. Which two things are most directly responsible for the cause of the seasons on Earth?Explain your reasoning. your pricing strategy should allow for a good margin while addressing target segment pricing. which of the following would be an appropriate pricing strategy? sacrifice your 50% margin to allow a lower sales price that incentivizes a purchase. adjust the price to below the target. make sure the pricing is in the lower end of the target range to incentivize the outdoor enthusiasts. if necessary, adjust the backpack design to allow a 50% margin but lower the backpack price. charge a higher price if the features meet the demands of the target segment. In January, Company A received 3,845 letters. In February, the company received 20% more letters than January. In March, they received 5,460 letters. What is the percent increase in letters received from February to March? Identify the non-finite verb forms in this sentence: 1. She was looking for her sister. Find the constant of proportionality given s = kt,and s = 60 when t = 6. How long will it take to travel 432 kilometres at an average speed of96 kilometres per hour?