Case-Based Critical Thinking Questions​Case 1: Tony’s Pizza & Pasta​Tony’s Pizza & Pasta restaurant uses an application to update and display menu items and the related price information.Which of the following statements assigns the daily special of lasagna to Tuesday? a.
strSpecial(5) = "rigatoni"

b.
strSpecial(6) = rigatoni

c.
strSpecial(5) = rigatoni

d.
strSpecial(6) = "rigatoni"

Answers

Answer 1
Final answer:

None of the provided options directly answers the question due to a misunderstanding or a potential typo since they involve assigning "rigatoni" instead of "lasagna" and none select Tuesday correctly based on zero-based indexing for days of the week in programming.

Explanation:

The question involves assigning the daily special of lasagna to Tuesday in a programming context, likely using an array to manage menu items by day of the week. Arrays in programming are zero-based, meaning the first element is at index 0. Therefore, Tuesday, being the second day of the week under conventional standards starting with Monday, would be at index 1 in the array. However, none of the given options directly mention "lasagna" or Tuesday explicitly, so we must infer based on standard array indexing and typical syntax for assigning values in programming languages like Python or Java.

Given the options, however, none correctly assigns "lasagna" to Tuesday due to the mix-up in the days and the item mentioned. The correct approach to assign "lasagna" to Tuesday would look something like strSpecial[1] = "lasagna", considering a hypothetical array strSpecial where days of the week are mapped to menu items. Since this option is not available, it points to a possible typo or error in the question's formatting.


Related Questions

What are the two main purposes of S/MIME?
Digital signatures
Encryption
Junk mail prevention
Spam prevention

Answers

The two main purpose of S/MIME are digital signatures and encryption

Explanation:

The Secure Multipurpose Internet Mail Extension is used to protect the data that is the data will be encrypted and it is used in security purpose and gives authentication at the receiver and at the sender side

This public key also allows the users to digitally sign the mail and check for the fraudulent in cases thus it allows the digital signing of mails and envelops the data and it is defined in detail in the RFC 3369 and 3370

This has now been also layered in the Cryptographic message syntax

Engineers involved in product design and manufacturing use computer-aided design/computer-aided manufacturing (CAD/CAM) systems, which is an example of specialized information systems called knowledge work systems (KWSs) that create information in their areas of expertise.?

Answers

Engineers who are involved in product design and manufacture of computer-aided should have enough knowledge in circuit and auto cad electronic design.

Explanation:

He or she should have mother board, voltage in or out extra. Person who develops should enough knowledge on circuit design which capacitor, resistance and voltage and processor capacity.

Each design they have first simulates and tested and result should be recorded. On simulation test success design is made.

There is third party software also available for design the circuit and gives the tested results as report.

The _____ requirements are associated with the efficiency, maintainability, portability, reliability, reusability, testability, and usability quality dimensions. functional non-functional performance correctness standard

Answers

Answer: Non-functional

Explanation:

Non-functional requirement(NFR) are the the requirements that evaluates operation of any particular system.It consist of several factors for judging the system such as security, reliability, quality, utility, maintainability etc.These parameters depicts about how a system will perform the tasks.

Other options are incorrect because function requires are used for depicting about specific and certain function in system. Performance requirements deal with the parameter of operation execution.

Correctness and standard requirement are measure for correcting system and general needs in a system respectively.

Answer:

Non-Functional Requirements are the correct answer to the following question.

Explanation:

NFS(Non-Functional Requirements) is referred to the attribute of the system and it serves the design of the computer system side to side the not similar uncompleted works or matters because the following reliability, testability, performance is not the features of the computer system.

So, that's why the following option is correct.

Show two ways of bracketing an exposure of f/16 at 1/125 shutter speed. (Copy the two lines below and fill in the blanks for the two alternate exposures for each way. Remember that you need an f-stop and a shutter speed to write an exposure.)

Answers

Answer:

Explanation:

If we use bracketing, we must take three pictures of the same place, but we must take it with different exposures.

In this particular example we have an exposure of f/16 at 1/125 shutter speed, first we must take underexposed picture with exposure of f/22 at 1/125 shutter speed or exposure of f/16 at 1/400 shutter speed, then we take an overexposed picture with exposure of f/8 at 1/125 shutter speed or exposure of f/16 at 1/50 shutter speed.

The last step is taking the three pictures and use the option bracketing in an editing photo tool, there are cameras that have this option to take 3 pictures automatically.

if are reseachers is using data that are low in cost and save time which type of data is this likely tro be

Answers

Answer:

Internet or online data.

Explanation:

There are different sources of data, through questionnaire, database, online etc.

Questionnaires are writing or printed guides to data collection given to individuals to give answer to the questions based on their perspective. For a questionnaire to be ready, questions are formulated, typed and printed with copies. The questionnaires are taken to the target subjects. The time taken to implement this can be overwhelming. Databases on the other hand needs paid skills and time to setup.

The internet has readily available resources, anybody can access its unlimited resources with just an internet connection.

On a Linux system it is considered bad manners to create files and folders in the _______________ directory.

Answers

Answer:

Root

Explanation:

Linux is an open source operating system which receives command from the user and communicates with the hardware, and in Linux the root directory is the top level directory that contains all other directory, it is not recommended to create files and folders in  the root directory because the commands the user enters may change files that the operation system may depend on for usage.

The ability for a protocol or program to determine that something went wrong is known as_________.

Answers

Answer:

The correct answer to the following question will be Error-detection.

Explanation:

Error-detection: The detection of errors caused during the transmission from the transmitter to the receiver by damage and other noises, known as Error-detection. This error-detection has the ability to resolute if something went wrong and if any error occurs in the program.

There are mainly three types of error-detection, these types can be followed:

Automatic Repeat Request (ARQ)Forward Error CorrectionHybrid Schemes

There are two methods for error-detection, such as:

Single parity checkTwo-dimensional parity check

David owns a retail business that just implemented a web app to supplement sales. He needs to choose an attribution partner to integrate the app for in-app conversion tracking. Which two are available attribution providers? (Choose two.)
1. Google Firebase2. Google Analytics3. Google Play4. Salesforce

Answers

Answer:

Option 1 and 3 i.e., Google Firebase and Google Play is the correct answer.

Explanation:

Because david started a business and he creates web application for the sales of the their business then, he required those two applications for tracking and by which the other users get their application.

Google Firebase: is referred to an application which provide users fix their application crashes and upload their application on the google store.Google Play: is referred to an application by which the owner easily provide their application to their users.

Which is true about POP3 and IMAP for incoming email?
(a)Both keep email on an email server by default
(b)IMAP keeps email on an email server by default
(c)Neither keep email on an email server by default
(d)POP3 keeps email on an email server by default.

Answers

Answer:

Both keep email on an email server by default is true about POP3 and IMAP for incoming email

Explanation:

POP3 and IMAP have used setting parameters for incoming email in MS-outlook and lotus domino to receive emails for the end-user.

Normally pop3 will nor keeps mail in emails in the server. once the end-user receives mails for the specific account it deletes emails from the email server.

But IMAP keeps mail in the email server. So the end-user can retrieve the old emails in case he formatted or lost emails.

But email account has some limitation in size. If it is IMAP setting period cleaning should be done in the email server. If it is not done the end-user will not receive any email unless or until deleting the old emails.

Best method is to have pop3 account. But in pop3 still setting can be done in email server not delete for specific period of time.

Select the characteristics of a Base Transceiver Station:

A. connected to a cell tower
B. sends phone signals to the cellular provider's Mobile Switching Station (MSS)
C. sends phone signals to the recipient's Mobile Switching Station (MSS)
D. broadcasts weak microwave signals to create "cells" of mobile coverage

Answers

Answer:

The correct answer to the following question is options A, B, and D.

Explanation:

Base Transceiver Station (BTS) is an apparatus that works wireless communication between the network and user equipment (UE - Mobile phones (handset), wireless network computers). Wireless technologies like wi-fi, GSM, CDMA, etc.

Some elements of BTS :

Radio base stationTower/MastDuplexerTransceiver unit (TRU)Microwave

So the above are the elements of the BSA, then it also having the characteristics related to these elements like it definitely connects to a cell network, sends phone or mobile phone and microwave signals to cellular providers but it isn't able to send the signals to the recepients.

Final answer:

A Base Transceiver Station (BTS) is connected to a cell tower, sends signals to the provider's Mobile Switching Station (MSS), and broadcasts weak microwave signals.

Explanation:

The characteristics of a Base Transceiver Station (BTS) are:

Connected to a cell tower: A BTS is connected to a cell tower, which allows it to transmit and receive signals to and from mobile phones.Sends phone signals to the cellular provider's Mobile Switching Station (MSS): A BTS sends phone signals to the cellular provider's MSS, which handles the routing of calls and messages.Broadcasts weak microwave signals to create "cells" of mobile coverage: A BTS broadcasts weak microwave signals to create cells of mobile coverage, enabling mobile phones to be used while changing location.

You’ve been asked to conduct a penetration test for a small company and for the test, you were only given a company name, the domain name of their website, and the IP address of their gateway router. What describes the type of test?

Answers

Answer:

Black box testing

Explanation:

Black box testing is a software testing method where the tester(QA) is provided with minimal information (in this scenario just the company domain name, website and IP address) so as to test just the input and output of the SUT (Software under Test) and he/she does not need to worry about internal code structure of the SUT.

A type of backlight technology most commonly used in modern laptop devices is called____________.

Answers

Answer:

LED is the correct answer for the following question.  

Explanation:

LED is a display that is used in the Laptop screen which is a type of blacklight technology. Blacklight technology is a technology that is used to increase readability when the light is low.

An LED display is used in a modern laptop. It is a flat panel display. Its brightness is so high and allows a user to use it in the presence of the sunlight. It is designed in 1962 for the first time.

The above question asked about a blacklight technology that is used in a laptop device which is the LED display used in a modern laptop. Hence the answer is LED

Final answer:

The commonly used backlight technology in modern laptops is LED (Light Emitting Diodes), which provides illumination for the display's pixels, allowing for control over the color and brightness of the image.

Explanation:

In flat-panel displays, such as those found in laptop computers, tablets, and flat screen televisions, a light source at the back of the device illuminates the screen. The light from the LEDs travels through millions of tiny units called pixels, which consist of three cells with red, blue, or green filters. Each cell can be controlled independently, allowing the voltage applied to the liquid crystal in each pixel to adjust the amount of light passing through the filters, thereby varying the display's picture contrast.

This LED technology is prominent among laptop and notebook computers, offering advantages like lower power consumption and a slimmer profile compared to the older CCFL (Cold Cathode Fluorescent Lamp) backlighting. As technology advances, developments such as revamped E Ink technology are expected to provide even more enhanced display capabilities, such as displaying color and multimedia/hypermedia content.

A device's mean time between failure (MTBF) rating provides an estimate of how long the device should last?
A) True
B) False

Answers

Answer:

True

Explanation:

What tag allows you to tell Google Ads which specific customer actions should be tracked as a conversion?A) An event tagB) An analog tagC) A global site tagD) A temporary tag

Answers

Answer:

The tag which allows you to tell Google Ads which specific customer actions should be tracked as a conversion is:

A) An event tag

Explanation:

The option A is correct as the event tag takes record of clicks and impressions of the customer as well as you can add some other functionality by changing the settings option. So, this tag allows you to tell Google Ads which specific customer actions should be tracked as conversion.The option b and d are incorrect as such tags don't exist in google ads.The option c is also incorrect as the global tag is used to send the date of event to other applications like Google Analytics, Campaign Manager etc.

Riser cards on some proprietary systems plug into a unique socket or slot on the motherboard. These are also called________

Answers

Answer: Daughter board

Explanation:

A daughter board is refers to the circuit board and it is basically connected to the motherboard directly without any interruption.

It is also known as a daughter card which plugs and then extended the circuitry by connecting with the another circuit board. A mezzanine card and the riser card are the examples of the daughter board that used in the system.

According to the question, the riser card basically plus into the unique socket or the slot in the board and this is known as the daughter board.

Therefore, Daughter board is the correct answer.          

Consider the abstract superclass below:
public abstract class Foo
{
private int a;
public int b;

public Foo( int aVal, int bVal )
{
a = aVal;
b = bVal;
} // end Foo constructor

public abstract int calculate();
} // end class Foo

Any concrete subclass that extends class Foo:
1) Must implement a method called calculate.
2) Will not be able to access the instance variable a.
3) Neither (a) nor (b).
4) Both (a) and (b).

Answers

Answer:

4) Both (a) and (b).

Explanation:

In addition to regular classes, Java has abstract classes. An abstract class is like a regular class. You can also define fields and methods in an abstract class, while at the same time, you cannot create an object or an instance of an abstract class. Abstract classes are designed to provide basic functionality for derived classes while derived classes required to implement this functionality.

A derived class must override and implement all abstract methods that are in the base abstract class. Therefore answer a (1) is correct.

Access modifier for the field a was private which means it has to be provided with accessor methods to obtain/modify its value. Therefor answer b (2) is correct as well.

WikiLeaks is a famous not-for-profit whistleblower website. MasterCard and Visa stopped payments to WikiLeaks after a series of leaks by the site. An anonymous group attacked the websites of both MasterCard and Visa reacting to this. These web vandals, who tried to protect WikiLeaks, are called ________.

Answers

Answer:

Hacktivists

Explanation:

Hacktivists are individuals who gain unauthorized access to computer networks or information, then use unruly ways to effect social or political change. Hacktivism started as a way of protesting online to effect a change by pushing for a certain outcome. This saw the building of websites such as wiki leaks. Although hacktivists are not entirely driven by malicious intent they employ some tactics used by hackers to drive their message across.

On which tab would you find Access's features for formatting text?

A. File
B. Home
C. Create
D. Format

Answers

Answer:

B. Home

Explanation:

In Microsoft Access's database the home tab contains the text formatting group, a feature for formatting texts, it also contains clipboard, sort and filter, and find. the tab provides a place to perform common or repetitive tasks done in MS Access. Access is a database management system provided by microsoft.

PowerPoint:
In the Outline pane, a highlighted slide icon next to the slide number indicates that the slide is selected.
True or False?

Answers

Answer:

The following statement is True.

Explanation:

Because in the powerpoint presentation, the outline pane is the icon that is next to the slide number which signifies the highlighted slide in which the user is selected. The PowerPoint presentation is an application or software in which the users create their presentation for the offices, schools, and colleges, etc on the slides.

Answer:

True

Explanation:

True

outline pane in power point is a type of navigation panel which major function is to give a broad view of the current document, to take overview  of an alignment, or for any change.

It is available on view tab  under the heading of presentation views group. it appear on the left side of the screen with different heading to operate.

Companies normally pay for PaaS solutions on demand for the resources they consume, usually on a per-user basis.
True
False

Answers

Answer:

True

Explanation:

There are companies like Google, Amazon and Microsoft that renders cloud services. There are different type of cloud computing, they platform as a service (paas), Infrastructure as a service (IaaS) and software as a service (SaaS).

Platform as a service is a type of cloud computing that provides a platform for its users to run, develop and maintain applications without having to build and maintain the infrastructure for developing and launching applications.

Companies like Google offers these services to users range from a personal project to a company of 500 personnels, charging for individual access to the service.

Write a function named get_first_name that asks the user to enter his or her first name and returns it.

Answers

Answer:

def get_first_name( ):

   My_name = input('Please What is Your Name')

   return My_name

Explanation:

In Python Programming Language, we define the function def get_first_name

The function receives no parameters.

On line two, the function uses the input function to request for a users name and assigns

On line three, it returns the the name entered by the user.

Final answer:

The function 'get_first_name' asks the user to enter their first name using Python's input function and returns the value entered by the user.

Explanation:

To create a function named get_first_name that prompts the user to enter their first name and returns it, you can use Python's input function. Below is a step-by-step example of how the function might look:

def get_first_name():
   # Prompt the user for their first name
   first_name = input("Please enter your first name: ")
   # Return the entered first name
   return first_name
When you call the get_first_name function, it will ask the user to enter his or her first name and store the input in a variable. After that, it returns the stored value when the function completes.

Many websites ask for phone numbers. Write a Raptor flowchart which inputs a string containing a phone number in any format and outputs it in the standard format.

Answers

Answer:

This problem consists in how you can search for the telephone number of x person in a directory. We try to make it as simple as possible, and in a general way; Without declaring variables or anything, we only did the process necessary to locate a number.

First we made the algorithm

1.Start

2.Go to the section of the municipality where the person lives

3.Locate the first letter of the first surname.

4.Locate the full last name

5.Find the second last name

6.Find the person's name

7.Find the phone

8.End

To make the flowchart we use 'Raptor'

 and so we left the diagram

   What we take into account first is to locate

the section in which the person we are looking for is located,

then go to the section with the initial letter of the first surname,

then look for the full last name,

and since there are many people with that last name,

we look for the second last name and lastly the first name; And so we got to the phone.  

Therefore, in the flowchart, at last we add all the variables to reach the telephone, because this is the case in a directory; You add all the steps you did and as a result you get the phone number of the desired person.

Given an int variable datum that has already been declared, write a few statements that read an integer value from standard input into this variable.

Answers

Answer:

Following are the  Statement in the Java Language .

Scanner out = new Scanner( System.in); // creating the object

datum = out.nextInt(); // Read the integer value bu using the instance of scanner class

Explanation:

In the Java Programming Language The scanner class is used for taking the user input from the standard input The definition of scanner class is java.util package means that if you taking the input by using scanner class firstly importing the predefined package i.e Java.util.

The description of the above code is given below

Scanner out = new Scanner( System.in);: This statement created the instance "out" of the scanner class which is used for taking the input.datum = out.nextInt(); : This statement taking the integer input and store them into the datnum variable.

Virtualization:

A. allows one operating system to manage several physical machines.
B. has enabled microprocessor manufacturers to reduce the size of transistors to the width of an atom.
C. can boost server utilization rates to 70% or higher.
D. allows smartphones to run full-fledged operating systems.

Answers

Answer:

C. can boost server utilization rates to 70% or higher.

Explanation:

Virtualization -

It is the process of running virtual instance of the computer in the abstracted layer from the very actual hardware , is known as virtualization .

In this process multiple operating system can be operated on the single computer setup , it is useful for increasing the speed of the program.

Hence, from the question,

The correct statement with respect to virtualization is C. can boost server utilization rates to 70% or higher .

Final answer:

The correct answer is option C, stating that virtualization can boost server utilization rates to 70% or higher by allowing multiple virtual machines to operate on a single physical server. Virtualization benefits include efficient resource management and improved server scalability.

Explanation:

Virtualization in computing refers to the creation of a virtual version of something, such as hardware platforms, storage devices, and network resources. It enables one physical machine to be divided into multiple virtual machines, each capable of running its own operating system and applications. The main benefits of virtualization include increased server utilization, better resource management, and improved system scalability.

The correct answer to the question is option C, which states that virtualization can boost server utilization rates to 70% or higher. This is due to the fact that virtualization allows multiple virtual machines to operate on a single physical server, thus maximizing the server's computing potential. Options A, B, and D are not accurate representations of virtualization.

Virtualization technologies are fundamental in modern computing infrastructures such as cloud services, where resources are dynamically allocated based on demand. Using concepts developed from foundational research in operating systems, virtualization effectively manages resources such as CPUs, memory, and storage to optimize performance and efficiency. The Atmosphere system is an example of how clusters of physical computers are allocated into virtual machines with various capacities, allowing for a more efficient and scalable utilization of resources.

Once you create a slide show, it is not easy to rearrange things, so you should plan your presentation ahead of time.

A. True
B. False

Answers

Answer:

The following statement is False.

Explanation:

The following statement is incorrect because if the user create its slideshow in the MS PowerPoint or any other presentation application or software then, they can easily edit or rearrange the following thing any time that is written by the user in the slide of the presentation, so there is not any difficulty to edit or rearrange things.

As the manager for network operations at his company, Shane saw an accountant in the hall who thanks him for keeping the antivirus software up to date. When asked what he means, he mentions one of the IT staff members named Michael called him yesterday and remotely connected to his PC to update the antivirus…but there’s no employee named Michael. What happened?A) IP spoofingB) MAC spoofingC) Man-in-the-middle attackD) Social engineering

Answers

Answer:

D. Social engineering.

Explanation:

In IP spoofing, ip packets with a false ip address source is created with the sole intent on impersonating a client system in a network.

MAC (media access control) address spoofing is similar to ip spoofing, but is related to stealing MAC integrity to impersonate a system.

So, man in the middle security attack is very much related to an active member of a company planting security threat codes to gain access to restricted networks.

Social engineering clearly describes this scenario, as the culprit is not a member of company but played on the ignorance of a member.  

Which of the following commands would instruct OSPF to advertise ONLY the 192.168.10.0/24 network in Area 0?

Answers

Answer:

First, you need to start the OSPF process by executing the command:

Router (config)# router ospf {process-ID#}

Then, you have to instruct the router to advertise the networks that are directly linked to it by entering this network command with the area ID number for that network:

Router (config-router)# network {192.168.10.0} {255.255.255.0} area {0}

The command will advertise ONLY the 192.168.10.0/24 is

router ospf <process-id>

network 192.168.10.0 0.0.0.255 area 0

To instruct OSPF to advertise ONLY the 192.168.10.0/24 network in Area 0, use the network command in OSPF router configuration mode.

The specific command use depends on the router's OSPF process.

Assuming you are using Cisco IOS, the command would be:

router ospf <process-id>

network 192.168.10.0 0.0.0.255 area 0

In this command:

<process-id> should be replaced with the OSPF process ID on the router.

`192.168.10.0` is the network address you want to advertise.

`0.0.0.255` is the wildcard mask, which means the network is 192.168.10.0/24 (since 255.255.255.0 is the subnet mask for /24).

`area 0` specifies that the network should be advertised in Area 0, which is the backbone area in OSPF.

This command will advertise ONLY the 192.168.10.0/24 network in Area 0 and no other networks.

Learn more about OSPF here:

https://brainly.com/question/33618289

#SPJ3

What will display after the following code executes?password = 'ILOVEPYTHON'if password.isalpha(): print('Invalid, must contain one number.')elif password.isdigit(): print('Invalid, must have one non-numeric character.')elif password.isupper(): print('Invalid, cannot be all uppercase characters.')else: print('Your password is secure!')

Answers

Answer:

Invalid, must contain one number

Explanation:

The program will assign ILOVEPYTHON to the password variable and start checking the cases stated below.

password.isalpha(): is true for the given password value and the code will execute, the display will show "Invalid, must contain one number." and it will bypass the elif and else statements.

I hope this answer helps.

Host A has IP address/network mask: 192.168.3.222/27

Host B has IP address/network mask: 192.168.3.225/27

Given the information above, it can be inferred that:

Group of answer choices

Both host A and host B are on the same network

Host A and Host B are on different networks

Host A and Host B will have the same routing tables

Host A and Host B will be able to communicate directly without an intervening router.

Answers

Answer:

The first option can be inferred.

Explanation:

IP address stands for Internet Protocol Address and is assigned to every device that is connected to a computer network or the internet so that they can be identified and located.

The fact that the IP addresses are starting with 192.168 means that they are private IP addresses and is assigned by the router. Since both host A and host B have IP addresses starting with 192.168, it can be inferred that they are both on the same network.

I hope this answer helps.

In process-based DO/S, resources are controlled by servers called ____ that are responsible for accepting requests for service on the individual devices they control, processing each request fairly, providing service to the requestor, and returning to serve others.

Answers

Answer:

Guardians or Administrators

Explanation:

In process-based DO/S, resources are controlled by servers called Guardians or Administrators.

The servers are used for high level corporations and for sharing of actions and data. They are responsible for providing services to the requestors.

Other Questions
How were the votes determined in each house of the Congress? (Can choose more than one answer)1) House of Representatives: Each state would be assigned a number of votes based upon itspopulation.2) Senate: Each state would be assigned a number of votes based upon its acreage.3) House of Representatives: Each state would be allowed two votes.4) Senate: Each state would be allowed two votes.5) Senate: Each state would be allowed one vote. Bacteria, like the Lactobacillus acidophilus use sugar as an energy source for anaerobic cellular respiration. This process produces much less ATP than aerobic respiration and does not produce carbon dioxide as a by-product. It does, however, give yogurt its sour taste and prevents other food spoiling bacteria from developing. Critical periods after birth exist forlearning languagescorrecting present birth defectsgoing through withdrawalssparrows finding their mates The property is a brick 38 unit apartment building built in 1985. There are 24 two bedroom and 14 one bedroom units on 6 acres. The sellers on the property listing are three brothers who claim to own the property as tenants in common. Your title research, however, indicates that the property was previously owned by the father of the brothers and his sister, Brunhilda, as joint tenants. The father passed away two years ago, and the brothers assumed they inherited their father's share. Brunhilda is alive and living in a neighboring state. The brothers assure you they can validly transfer the property to you by quitclaim deed. You are trying to acquire some development property to add to the apartment property described above. There is a ten acre piece next to the apartment property, but it is zoned Trans-ag 2, allowing a single family dwelling on 2 acres. You would like it to be changed to High Density Residential zoning with a conditional use permit for a day care center on the property. What should you do? Explain your answer carefully. There are 182 adults and 18 children attending a weddingreception as guests of the bride and groom. The guests will beseated in groups of eight at each table. How many tables areneeded for the wedding guests? A company's operating income was $70,000 using variable costing for a given period. Beginning and ending inventories for that period were 45,000 units and 50,000 units, respectively. Ignoring income taxes, if the fixed factory overhead application rate was $8.00 per unit, what would operating income have been using full costing? 4 coffees and 12 lattes. Costs $6112 coffees and 7 lattes. Costs $59.75How much does a coffe and a latte cost Which of the lines graphed has a slope of -1/2 and a y-intercept of 3(WORTH 100 POINTS AND WILL GIVE BRIANLIEST) What is social darwinism The activities of philanthropic foundations are unique because: Group of answer choicesa. they reduce health care costs b. they are quasi-governmental agencies c. they have money to give away d. they have so many staff members Felipe picked a pumpkin that weighed three times the weight of Meg's pumpkin Meg's pumpkin with half the weight of Ryan's pump Ryan's pumpkin weighed 14 lb how much did Felipe's pumpkin weigh For a certain experiment, the available experimental units are eight rats, of which four are female (F1, F2, F3, F4) and four are male (M1, M2, M3, M4). There are to be four treatment groups, A, B, C, and D. If a randomized block design is used, with the experimental units blocked by gender, which of the following assignments of treatments is impossible? a. A (F1, M1), B (F2, M2), C (F3, M3), D (F4, M4) b. A (F1, M2), B (F2, M3), C (F3, M4), D (F4, M1) c. A (F1, M1), B (F3, F2), C (F4, M1), D (M3, M4) d. A (F4, M1), B (F2, M3), C (F3, M2), D (F1, M4) e. A (F4, M1), B (F1, M4), C (F3, M2), D (F2, M3) Inkglot Technologies, a medium-sized corporation, is allowed to have only 35 stockholders at any point of time. However, all stockholders of the company can actively participate in the management of the company while still maintaining limited liability. Given this information, Inkglot Technologies is most likely a(n):A. S corporation.B. C corporation.C. not-for-profit corporation.D. statutory close corporation. Please help with remaining and/or correct what I have What is the solution to the equation 4x + 2(x 3) = 3x + x 12? (1 point) Group of answer choices 3 1 1 3 The financial records for Harold Corporation included the following information: Accounts receivable, $60,000 Accounts payable, $25,000 Cash, $15,000 Common stock, $10,000 Dividends, $5,000 Rent expense, $10,000 Sales revenue, $75,000 Salaries and wages expense, $20,000 Based on this information, how much was its net income? Factor completely, then place the answer in the proper location on the grida^3-b^3 Automobiles arrive at the drive-through window at the downtown Baton Rouge, Louisiana. post office at the rate of 4every 10 minutes. The average service time is 2 minutes. The Poisson distribution is appropriate for the arrival rate andservice times are exponentially distributed.a) What is the average time a car is in the system?b) What is the average number of cars in the system?c) What is the average number of cars waiting to receive service?d) What is the average time a car is in the queue?e) What is the probability that there are no cars at the window?f) What percentage of the time is the postal clerk busy?9) What is the probability that there are exactly 2 cars in the system?h) By how much would your answer to part (a) be reduced if a second drive-through window, with its own server, wereadded? You want your students to get into the habit of using the restroom only at scheduled times throughout the day unless it is an emergency. You explain that the class will have regular breaks and that everyone should take advantage of them. Right after your social studies lesson on the third day of school, Tia, a very quiet girl, comes up to you and asks you if she can go to the restroom, despite the fact that the class took a break not long ago. The best thing to do in this case is Group of answer choices to remind Tia that she should have gone to the bathroom earlier, and that she her discomfort is the consequence of a bad choice. to tell Tia she should be able to make it until the next break, which will be in just twenty minutes. to let Tia use the restroom, but to pay attention during subsequent class bathroom breaks, encouraging her to go then. to stop the lesson and take the whole class to the bathroom. With all the different possibilities that may cause a wreck, it is highly recommended that you always keep a _________________ around yourself and your vehicle. Steam Workshop Downloader