Computer processing work that is split between a desktop computer and a more powerful computer that processes and stores shared​ data, serves up web​ pages, or manages network activities is called​ ________ .

Answers

Answer 1

Answer:

Client-server is the correct answer for the above question.

Explanation:

Client-server is a model in which the server gives services and the client takes services. This model comes in the concept of the internet which is the connection of multiple computers to share the information. The client stands for the host computer which is connected to the network and takes the service from the server.The server is called that computer which gives services to many host computers.This model splits the work between a powerful computer (server) and a desktop computer (clients). The powerful computers process the data, store the data and give services to desktop computers.The above question-statement asked about that model which is the powerful computer and give services and the other is to take the services then the answer is the client-server model. Hence the answer is the client-server model.

Related Questions

There are certain parameters that administrators set (within a group policy or otherwise) to assist users in creating sufficiently unguessable and uncrackable passwords. One such parameter is complexity. To enforce the use of a range of complexity, what else must an administrator enforce to ensure that complex passwords are used?

Answers

Answer:

administrator must enforce a specific password length minimum

Explanation:

Based on the information provided within the question it can be said that in order to ensure that complex passwords are used the administrator must enforce a specific password length minimum. By placing a minimum on password length you are making sure that the password has a certain complexity and thus making it a lot harder for those passwords to be cracked by hackers.

Based on the current economic situation do you expect the employment demand for graduating engineers to increase or decrease? Explain the basis for your answer.


With a significant economic recovery, what do you think will happen to future enrollments in graduating engineering programs?

Answers

Answer: the employment demand would increase.

Explanation:

Several factors affect the employment demand especially in a field as peculiar as engineering, the cumulative build up of unemployed graduates and the skill set required to fit into the present working structure is also of Paramount importance. The evaluation method for recruitment seeks to function based on this rationale by selecting a few amongst many.

Final answer:

The economic situation points to an increase in employment demand for graduating engineers, tied to economic recovery and the trend of higher job growth for those with more education. Future enrollments in engineering programs are expected to increase with economic recovery. Countries like China and India have a high number of engineering graduates, reflecting their focus on technology and industry.

Explanation:

Based on the current economic situation, the employment demand for graduating engineers is likely to increase as economies recover from downturns and companies start to expand and invest in new technologies and infrastructure. This is supported by the trend that higher levels of education, including engineering degrees, are associated with higher job growth rates. For instance, those with a bachelor's degree have job growth expectations of 17 percent.

With a significant economic recovery, enrollments in graduating engineering programs are also expected to rise. This is because students may perceive engineering as a field with strong job prospects, which can lead to more secure and well-paying positions. Therefore, during economic recoveries, the allure of a promising career in engineering could attract more students to these programs.

In the context of global engineering graduates, countries with the most graduates can be indicative of their prioritization of technical education and their industrial and technological sectors' requirements. For example, countries like China and India have high numbers of engineering graduates due partly to their large populations and emphasis on engineering as a driver of economic growth.

An engineer plans to connect three switches (SW1, SW2, and SW3) in a lab. Before connecting the switches, he starts by configuring all three switches as VTP servers, with matching CTP domain name and password. He then configures some VLANs on each switch so that switch SW3 has a revision number of 10, switch SW2 has a revision number of 6, and switch SW1 has a revision number of 8. Only then does he engineer connect the switches with trunks: first SW1 to SW2, then SW2 to SW3, and then SW3 to SW1. Switch SW1 is elected the STP root switch in VLAN 1. Which answer most accurately states which VLAN configuration database is used, and why?

Answers

Answer:

c. All use SW3's database because SW3 has the highest revision number.

Explanation:

In this particular configuration, the three switches will definitely be connected to one another by the presence of some path with the specific trunks. As a result, the database with the most revision number will ultimately win. The process of the STP election does not have any influence on the selection of the VTP.

What is the starting point for a DHCP server?
Establishing a pool of addresses
Establishing A and AAAA records
Establishing address leases
Establishing reservations

Answers

Answer:

Establishing a pool of addresses

Explanation:

Regularly the first and the final IP address is configured automatically, but we can personalize these IP addresses, always that is the first step when we activate the DHCP server.

Then we must assign a time for the use of the IP in seconds, we enter the IP in the primary DNS, the second is optional, and we enter the domain name.

Incident damage ____ is the rapid determination of the scope of the breach of the confidentiality, integrity, and availability of information and information assets during or just following an incident.

Answers

Answer:

The answer is "assessment"

Explanation:

In the given question some information is missing, that is options that can be described as follows:

a) containment strategy.

b) assessment.

c) incident response.

d) disaster assessment.

Assessment also known as community risk, which is used for evaluations. It played a crucial role in the reaction and recovery after a dangerous incident in any organization.

In this process, the Information of the degree and the position, which is lost are included in the collected information by the Accident investigation Taskforce. This data is analyzed to evaluate the needs of members and the entire community, and other choices are wrong that can be described as follows:In option a, It is a part of world war II, that's why it is wrong.In option c, It is a method that is sort major incident, that's why it is wrong.In option d, It uses cost control and risk avoidance, that's why it is wrong.

Consider an application that transmits data at a steady rate (for example, the sender generates an N-bit unit of data every k time units, where k is small and fixed). Also, when such an application starts, it will continue running for a relatively long period of time.
Suppose that a packet-switched network is used and the only traffic in this network comes from such applications as described above. Furthermore, assume that the sum of the application data rates is less than the capacities of each and every link. Is some form of congestion control needed? Why?

Answers

Answer:

No

Explanation:

Because every link can handle the sum of the application data rate even when everyone is using the application ate the same time (worst scenario), there won't be any congestion to control. Because we have a good link capability the network doesn't require any congestion control mechanism.  

Note: When trying to solve this kind of problems always keep in mind the worst scenario, if the network is capable of withstanding the worst scenario and no information about the scalability of the network is given then you don't need congestion control.

Suppose your cell phone carrier charges you a monthly fee of $30.00 for up to 300 minutes and $0.45 for each additional minute after the first 300. Assuming you used your phone for x minutes with x > 300, the total monthly fee would be?

If you used your phone for <= 300 minutes then the charge is $30.00 Assume the user enters a positive value for the number of minutes

30 + (x -300) * .45ç correct answer

Use the following template

A = 300 #CONSTANT fee for <= 300 minutes

m = int(input("Enter the number of minutes "))

c = 0 # initialize cost variable

if (m>300): # minutes>300

# calculations here to compute the solution above

# use the correct answer provided

print(" the cost for ", m, " minutes is ", c )

else: # here m is <= 300# s <= 0

print(" the cost for ", m, " minutes is ", A )

Answers

Answer:

# 30 + (x -300) * .45ç correct answer

A = 30 #CONSTANT fee for <= 300 minutes

m = int(input("Enter the number of minutes "))

c = 0 # initialize cost variable

if (m>300):

   c = 30 + ((m - 300) * 0.45) #Cost when the minute is greater 300

   print("The cost for ", m, " minutes is $",c )

else:

   print("The cost for ", m, " minutes is $",A )

Explanation:

   c = 30 + ((m - 300) * 0.45) #Cost when the minute is greater 300

First 300 is subracted from the given minute to get the extra minute, and then the extra minute is multiplied by $0.45 after which it is added to the constant of $30 for the 300 minutes

This is a control structure that causes a statement or group of statements to repeat.

a. decision statement
b. constant loop
c. cout object
d0 None of these

Answers

Answer:

B. Constant Loop

Explanation:

Looping involves going over a block of code or statement infinitely or over a particular number of times. There are a number of loops, such as the infinite loop, while loop, do-while loop among others.

Infinite loop: All loops are expected to terminate after a few iterations, however, if that block of code is not available, the loop is said to be an infinite loop. This is because it will iterate continuously and indefinitely.

While loop: Also referred to as a Pretest loop, because before the statements are executed in its body, it verifies the boolean expression.

Do-while loop: Also referred to as a Posttest loop, because it tests the boolean expression after the block or statement is executed.

Answer:

D. None of these

Explanation:

The control structure that causes a statement or a group of statements to repeat is called a control loop, or simply, a loop.

In many programming languages, a loop contains a group of statements that are executed repeatedly based on a certain criterion (or condition). As long as this condition is true, the statements within the loop are executed.

Three types of control loop structure are the for, while and do...while loops.

Assume the market for DVD movies is initially at equilibrium. A decrease in the price of streamed movies, a substitute for DVD movies, will __________ the equilibrium price and ___________ the equilibrium quantity of DVD movies.

Answers

Answer:

The answer is "decrease; decrease".

Explanation:

DVD movies are used to short and a digital portable digital video, It uses a disc that stores much more data as compared to CD.

It is widely used for films and other data storage and display. It decreases the streaming video costs, as substitution for DVD videos, would increase the average demand and high the surplus in DVD films.

Given a string variable named "myString" of length 5, how could you access the first character and last character using a numeric index?

Answers

Answer:

The first index myString[0]

The last index myString[4]

Explanation:

Indexing starts at "0". so the first character in a string will be at index "0" and the last character will be at index "-1". But since we were given the length of this string to be 5, we know that the index of the last character will be "4".

The python code bellow will print character at the first and last index:

myString = "hello"

print("The First Index is "+myString[0])

print("The Last Index is "+myString[-1])

The art of secret writing that enables an individual to hide the contents of a message from all but the intended recipient is called ________.a. Steganography
b. Cryptanalysis
c. Cryptography
d. Key management

Answers

Answer:

The answer is "Option c".

Explanation:

Cryptography is a process, in which by using code we encrypt information and communication to be read and processed by only those expected, and the explanation of given option, that were not correct can be described as follows:

In option a, It is a process that encrypts data within the file, that's why it is not correct.In option b, It is used for text encryption, that's why it is not correct.In option d, It is a protocol which uses keys for encryption, that's why it is not correct.

Which key or key sequence pressed during the boot process will allow a user to start a Windows PC using the last known good configuration?

Answers

Answer:

F8

Explanation:

In Windows PC (e.g Windows 7), Last Known Good Configuration, is an option that helps users to start up their PC if it doesn't start normally. This option is only accessible at boot process by using the keyboard (mouse will not work at this point). So to access this option, the F8 key is pressed repeatedly or held down. This will display some start up menus where the user can use the arrow keys to access the option.

Congress is debating a proposed law to reduce tax rates. If the current tax rate is r%, then the proposed rate after x years is given by this formula: r 1 1 1 1 x . Rewrite this formula as a simple fraction.

Answers

Answer:

[tex]\frac{x+1}{2x+1}r%[/tex]

Explanation:

Congress is debating a proposed law to reduce tax rates. If the current tax rate is r%, then the proposed rate after x years is given by this formula: r 1 1 1 1 x . Rewrite this formula as a simple fraction

The formula can be rewritten as thus [tex]\frac{r}{1+\frac{1}{1+\frac{1}{x} } } \\\\\ 1+\frac{1}{x} \\\frac{x+1}{x} we have \\\frac{1}{x+1/(x)} \\\frac{x}{x+1} \\1+\frac{x}{x+1} \\\frac{2x+1}{x+1}[/tex]

r%*x+1/(2x+1)

[tex]\frac{x+1}{2x+1}r%[/tex]

What have simply done is to find the LCM of the lowest fraction at the bottom of the relation , then solve upward

compress into proper fraction. I then normalized by brionging the numerator downward and the denominator upward

How can the security information and event management system in a SOC be be used to help personnel fight against security threats?

Answers

Answer:

i think its A.

Explanation:

:)

When the computer is started, a bootstrap or IPL (Initial Program Load) begins testing the system. Where is this bootstrap program stored? A) RAM B) ROM C) Hard drive D) Virtual memory

Answers

Answer:

The correct answer to the following question will be Option B (ROM).

Explanation:

Bootstrap is the programming which initializes the OS during initialization. The bootstrap loader creates small operator programs that connect and monitor the various computer hardware components.

ROM is Read-only memory, which will be used to hold a computer's start-up commands, also recognized as firmware.

No other method was used to help save system startup. ROM, then, is the right answer.

Final answer:

The bootstrap program, necessary for starting the computer and initiating the operating system loading process, is stored in ROM (Read-Only Memory), not in RAM, hard drive, or virtual memory.

Explanation:

When the computer is started, a bootstrap or Initial Program Load (IPL) begins testing the system. This bootstrap program is stored in ROM (Read-Only Memory). Unlike RAM (Random Access Memory), which is volatile and requires power to maintain its data, ROM is non-volatile and retains its data even when the computer is powered off.

This makes ROM an ideal storage medium for the bootstrap program, as it needs to be reliably accessed whenever the computer is powered on to start the operating system loading process. RAM is used as working memory for the CPU, storing data temporarily while the system is running, but not suitable for storing the bootstrap program due to its volatile nature.

You have been asked to implement enterprise software for a manufacturer of kitchen appliances. What is the first step you should​ take?

Answers

Answer:

Option E i.e., Select the functions of the system you wish to use is the correct answer.

Explanation:

In the above statement, some part of the question is missing that is options.

The first step is taken by the user is that they have been select those methods of the computer system which he wants to use firstly if he has to implement the software or an application for that manufacturers who sales the appliances of the kitchen. Then, it is necessary to take the following steps by the user according to its needs.

In the context of Web server performance evaluation, _____ is testing that is used to compare the performance of hardware and software.

Answers

Answer:

Benchmarking.

Explanation:

Web servers are platforms used in networking to provide resources for websites and software applications. Every end devices in a network request for website resources and applications from Web servers.

To maintain these resources, web server performance must be evaluated to prevent unexpected downtime of the server. One way of evaluating web server performance is the benchmarking test.

The benchmarking test is used to compare the performance of the hardware and software of the server system.

Desktop computers, laptops, tablets, smartphones and other devices are made by different companies, yet they are all able to access the Internet. This has led to widespread use of the Internet from many different kinds of devices.Which of the following makes this possible?

Answers

Answer:

Open standards and protocols.

Explanation:

A network is the platform on which two or more devices can share resources. The laptops, desktops, tablets, smartphones and other devices are end devices in a large wireless network called the internet.

They are able to communicate wireless, though they are of different brands and specifications. The information technology has evolved to promote this interconnection of devices by introducing open standards and protocols for generally agree use, rather than proprietary standards of individual companies that will not communicate.

The OSI and TCP/IP suite model of networking has been generally accepted by most companies (if not all) as the standard of communication.

Which of the following types of servers can be used to cache requested Internet resources so that they can be more quickly delivered to users requesting the same resource while at the same time reducing the burden on the external network connection to the Internet for an organization?
a. file serverb. DNS serverc. DHCP serverd. proxy server

Answers

Answer:

Proxy Server

Explanation:

Proxy server is a server that acts as a mediator between two systems.One system can be your computer and the other can be the server to which you are asking a service, such as requesting a web page.Lets suppose you request a web page from a server and you type a URL of a website to access a web page.This request goes to proxy server which sends this request on your behalf to the target server in order to retrieve that web page.Proxy server makes this request to the target server on the internet by using one of its IP addresses.When the proxy server gets that web page, it will forward that web page to your requesting computer.If you request a specific service such as a website frequently the proxy server saves that website on its cache.So if you request that website again, proxy server will forward it to you from its cache rather than requesting it again from the target server on your behalf resulting in quick response to the user's request. This speeds up the delivery of resources to the users.Proxy servers provide users with privacy to access the websites, and they can surf the internet anonymously .

In the Linux Bash shell, the ____ key combination deletes the content of the command line from the current cursor position to the end of the command line.A. Ctrl+bB. Alt+dC. Ctrl+kD. Ctrl+a

Answers

Answer:

C. Ctrl+k.

Explanation:

The bash shell is a command processor interface in Linux operating system as a default login shell. There are other versions for operating systems like Windows and Mac OS. A user can input a plain text command to the command line interface and use different key combinations to initiate different action.

The key combination used to delete the content of the command line from the position of the cursor is the Ctrl+k combination.

If our list called List is populated as [0, 1, 2, 3, 4], what happens if our code tries to access List [5] per the rules of the AP Computer Science Principles Reference Guide?

Answers

Answer:

The number 4 will be returned.

Explanation:

Given;

List = [0, 1, 2, 3, 4]

Using the AP Reference Guide;

The first element has an index of 1 and can be accessed using the same. i.e

=> List[1] = 0

The second element has an index of 2 and can be accessed using the same. i.e

=> List[2] = 1

Therefore, if our code tries to access List[5], then the number at index 5 will be returned. i.e

=> List[5] = 4

This implies that the last number 4 will be returned.

Note: Many programming languages (such as Java) actually start their collection (array, list) index from 0 rather than 1. But since we are using the AP Computer Science Principles Reference Guide, the index has to start from 1.

You are capturing packets with a network sniffer and notice a number of packets that are flagged by the sniffer and described as TCP retries. Which layer of the OSI model should you investigate?

Answers

Answer:

Transport Layer                                    

Explanation:

Transport layer is responsible for correcting data transmission errors which is done by requesting retries also called re-transmission of packets in case of data loss or corrupted data.Transport layer ensures end to end delivery of data making sure that the data is received correctly and in same order in which it was sent.Transmission Control Protocol (TCP) is a protocol in this layer that continues to transmit data packets securely from sender to receiver, identifying packet losses. Transport layer works on packet loss issues and corrects data transmission errors.It has flow control and error control services manage data transmission rate and ensures data is received without error. So in case of transmission errors and re-transmission requests transport layer should be investigated.

Danielle is looking for information on an accounting principle for class. She does not want to sift through a lot of information to find it, but wants to know the exact location. What area of the CRS results will she look at?
a) sections
b) topic
c) paragraph
d) subtopics

Answers

Answer:

Correct answer is (c) paragraph

Explanation:

Paragraph contained all the necessary information that Danielle is needed. Its enables one to identify and source for information easily.

Match each type of software license with the appropriate definition.
Each answer choice is used only once.
Part A
1. Software distributed for a multitude of users
2. Software you must purchase before using
3. Software distributed with a limited license
4. Software distributed free of charge
Part B
a. Freeware
b. Shareware
c. Network
d. Buyware

Answers

Answer:

1- Software distributed for a multitude of user: network

2- Software you must purchase before using:  buyware

3- Software distributed over a limited license: shareware

4- Software distributed free of charge: freeware

Explanation:

The software which we have to buy before using it is called buyware. The software which is only provided to the people who have lisence to use it, is called shareware. The software which can be used by many users is called the network. software which can be used without purchasing is called freeware.    

Final answer:

Software licenses can be categorized based on how the software is distributed and used. Freeware refers to software that is distributed free of charge, while shareware is distributed with a limited license. Network software is distributed to a multitude of users, and buyware requires a purchase before use.

Explanation:

Part A:

Software distributed for a multitude of users - NetworkSoftware you must purchase before using - BuywareSoftware distributed with a limited license - SharewareSoftware distributed free of charge - Freeware

Part B:

a. Freeware - Software distributed free of chargeb. Shareware - Software distributed with a limited licensec. Network - Software distributed for a multitude of usersd. Buyware - Software you must purchase before using

When people use Web browser software to become part of the Web, their computers become Web client computers on a worldwide client/server network.

A. True
B. False

Answers

Answer:

A. True.

Explanation:

The internet or the world wide web (www) is a global network of interconnected networks. It has a wide range of dedicated servers, intermediate network devices like routers and switches, and end devices to access data.

The website is a collection of web pages hosted on web servers on the internet. Web browsers are application softwares used by end devices to request for web pages. There are two types of network connection, peer to peer and client/server connection.

The peer to peer network involves computers serving as client ( requesting for data) and server (transmit data) at the same time. The client/server network one has a dedicated server that transmits data and a client that request for data.

This makes computer running web browsers, clients to web servers on the internet.

A(n) ________ network is a computer network that spans a relatively small area, allowing all computer users to connect with each other to share data and peripheral devices, such as printers.
A) enterprise
B) wide area
C) campus area
D) local area
E) value-added

Answers

Answer:

D) local area

Explanation:

Is a computer network that links devices within a building or group of adjacent buildings, especially one with a radius of less than 1 km.

Final answer:

A 'local area' network is a small-scale network for connecting devices to share resources and data, commonly enabled by Wi-Fi technology, which can be managed by connection software or mobile VPNs for secure connectivity.

Explanation:

A local area network is a computer network that spans a relatively small area, allowing all computer users to connect with each other to share data and peripheral devices, such as printers. Connection manager software or a mobile VPN can be utilized to manage multiple connections securely. Wi-Fi is a supporting technology for LANs, allowing portable computing devices to connect to the Internet with speeds approaching wired Ethernet. It is often used in homes, offices, and public hotspots, and can be a paid or free service depending on the business model.

Which feature of SQL Server 2012 provides a failover environment consisting of a group of primary user databases with up to four replicas?

Answers

Answer:

(always on) availability group

Explanation:

Availability group of SQL server 2012 provides replicated alternatives for multiple databases.

In case of a disaster situation, this feature recovers the system by using replicated environments.

This feature is an alternative solution to database mirroring

The __________ supports the primary system components (such as the CPU and RAM) necessary for all digital electronics devices such as 1. desktop PCs2. notebook PCs3. mobile phones4. iPads4. servers

Answers

Answer:

Computer System unit.

Explanation:

The computer system unit holds all the other components together and protect them outside elements. The components include motherboard, CPU, hard drive, RAM, video card and power supply.

Jason is using TCPdump to capture traffic on his network. He would like to review a capture log gathered previously. What command can Jason use?

Answers

Answer:

tcpdump -r capture.log

Explanation:

Based on the information provided within the question it can be said that the command that will allow Jason to do this would be the following : tcpdump -r capture.log . This command (like mentioned in the question) will allow provide Jason with previously captured network traffic logs in order for him to be able to thoroughly review those logs.

A user is claiming a host can be reached via the IP address but not through the name. What should a technician do first to resolve the problem?
Add an entry to the HOSTS file
Restart the client device
Restart the DNS server
Restart the DNS service

Answers

Answer:

Add an entry to the HOSTS file

Explanation:

A file that is used to add the host name along with their IP addresses is called Host file. In this file all the IP addresses are mapped with their respective host names. Whenever some user tries to access some website, he may use the name of website to access it. The website have both name and IP address of the server, both of these information stored in host file. On GUI the user only see the information of Host name.

If some user only access the IP address of the website instead of the host name. The technician should add the name and IP address of the host in Host file. He should follow the following steps to resolve the problem.

Access the host file by following the given path of file in Windows operating system.open the host file edit the file with new host name and relevant IP address save the changes

Other Questions
An engineering team has members from Egypt, Malaysia, Australia, Argentina, and the U.S. They communicate by email and videoconferencing. The work of this globalized team is made easier because of A soft-drink bottler purchases glass bottles from a vendor. The bottles are required to have internal pressure strength of at least 150 pounds per square inch (psi). A prospective bottle vendor claims that its production process yields bottles with mean internal pressure strength of 157 psi and standard deviation of 3 psi. The bottler strikes an agreement with the vendor that permits the bottler to sample from the vendor's production process to verify the vendor's claim. The bottler obtains a random sample of 64 bottles. If the mean internal pressure strength of the sample falls below K, the bottler will conclude the vendor's claim about the mean internal pressure strength to be false. Suppose the bottler is willing to risk a 2% chance of concluding the vendor's claim to be false even if the claim is true. Find the value of K. PLEASE HURRY! ;)Which statements are true?A;When triangle ABC is reflected over the y-axis to create triangle A'B'C' , the coordinates for B' are(1, -1) .B;When triangle ABC is rotated 90 degrees clockwise about point A to create triangle A'B'C' , the coordinates for B' are (3,3]CWhen triangle ABC is dilated from the origin by a scale factor of 1\4 to create triangle A'B'C', the coordinates for B'are (4,4)DWhen triangle ABC is translated 2 units to the left and 1 unit down to create triangle A'B'C' , the coordinates for B' are (-1, 0)EWhen triangle ABC is dilated from the origin by a scale factor of 5 to create triangle A'B'C', the coordinates for B' are (5,5) During a science lab investigating chemical reactions, Mr Grace students place an antacid tablet in a ziplock bag. They recorded the mass of the tablet, 25 g, in the bag, 60 grams. Then they carefully added 50 g of water and quickly seal the bag. The tablet began at this and soon disappeared. The bag was filled with gas. If the total mass of the bag+tablet+water was 135 grams before the reaction, what was the total mass of the bag+liquid+gas after the reaction was completed? A) 60 grams B) 75 grams C) 135 grams D) 270 grams You are advising a local nonprofit on strategy. The nonprofit supports cancer research and relies entirely on donations. You recommend that the nonprofit engage in marketing activities. The executive director tells you that because it is a nonprofit that does not engage in selling activities and has a small budget, the nonprofit has no use for marketing. You disagree and explain that marketing is not just for for-profit organizations. You explain the different ways the nonprofit can engage in marketing without changing its practices or the mission. Which of the following marketing activities would be most feasible for this nonprofit? Hep me ASAP!!!! A.-2 B.4 C.7-3sqrt3 D.7- sqrt3 The circumference of a circle is 43.96 millimeters. What is the circle's radius? if 12, 15, 18 and 16, 20, and x are the lengths of the corresponding sides of two similar triangles, what is the value of x? 2345678910esM any countries around the world today are trying to use renewable resources in such a way that the resource will be able tomeet the needs of their citizens long into the future. What name is given to this practice of using resources carefully so thatfuture generations may also be able to meet their needs?sustainable useresource selectionbiotic preservationD)biogeochemical cyclingEliminateSubmitHuman Population Growth Why was the Electoral College created? Corruption during the Gilded Age of politics led to a distortion of the political process and a need to restore balance to the presidential elections. The Election of 1800 created conflict when there was no clear winner, leading to an amendment to the Constitution and the creation of the Electoral College. Constitutional delegates feared that citizens might not be sufficiently informed to elect the president, since literacy rates were low and communication was slow. The Electoral College was created to provide balance to the presidential elections when it became too cumbersome for states to calculate their exact populations. Which of the following is not one of the four overarching strategies to create and deliver value and to develop sustainable competitive advantages? Jaime claimes that when you multiply by 100, the decimal point moves to the right. Salome argue that the decimal point only moves when you multiply a whole number by 100. Salmon says that when you multiply a whole number by 100, product has 2 extra zeros. Which student got it correct? Justify your answer. If there is unemployment, the average wage rate will decline as the unemployed workers choose lower wages rather than going without a job. The demand curve for labor slopes downward and to the right so that more workers would be hired at the lower wage rate, restoring full employment. 1. According to the Keynesian view, this quote is __________.a.incorrect because widespread unemployment would cause wages to rise, not decline.b.incorrect because the demand for labor, other things constant, will not be negatively related to wages.c.incorrect because wages and prices tend to be highly inflexible downward.d.essentially correct. 5 6/7-1 1/2difference? Type the correct answer in the box. Use numerals instead of words. If necessary, use / for the fraction bar.What is the vertical asymptote of the function f(x) = 3 log(x + 3)?The vertical asymptote of the function f(x) = 3 log(x + 3) is x = . A covalent compound is composed of a nitrogen atom, a hydrogen atom, and a carbon atom. How many electrons should the Lewis structure of the covalent compound contain? Griffin's Goat Farm, Inc., has sales of $796,000, costs of $327,000, depreciation expense of $42,000, interest expense of $34,000, a tax rate of 21 percent, and paid out $95,000 in cash dividends. The common stock outstanding is 80,000 shares. a. What is the earnings per share figure? (Do not round intermediate calculations and round your answer to 2 decimal places, e.g., 32.16.) b. What is the dividends per share figure? (Do not round intermediate calculations and round your answer to 2 decimal places, e.g., 32.16.) The Supreme Court's interpretation of the existing laws _______ clear. A. was B. are C. were D. have been Which type of ethics does Stevenson say Socrates was engaged in in discussing virtue and knowledge Suppose you are an observer standing on the Moon, looking back at Earth. If the moon is in the waxingquarter phase, what phase of the Earth would you see?A. waxing quarterB. fullC. newD. waning quarterE. none; the Earth doesn't have phases Steam Workshop Downloader