Answer quickly!!!

harry has just completed his website. pick out the statements that correctly describe the pre-launch tasks harry should carry out.

Answers

Answer 1

Answer: Harry should check that font he has used are readable on every page and element of his website


Harry should check that all images have alt texts

Explanation: edmentum


Related Questions

john consumes 1930 calories per day, weighs 200 lbs., and is 5′9″ tall. what would be an appropriate daily calorie intake to help him lose weight safely and steadily

Answers

In order to lose weight safely and steadily, John's daily calorie intake should be less than his daily caloric requirements. This can be calculated using the Harris-Benedict equation. The Harris-Benedict equation can estimate an individual's basal metabolic rate (BMR), which is the number of calories they need to maintain their weight at rest. From there, one can determine their daily caloric needs based on their level of physical activity.

For men, the Harris-Benedict equation is: BMR = 88.362 + (13.397 x weight in kg) + (4.799 x height in cm) - (5.677 x age in years)

Using John's information (weight of 200 lbs and height of 5'9"), we can convert his weight to kilograms and his height to centimeters.Weight in kg = 200 lbs / 2.205 = 90.72 kg Height in cm = 5'9" x 2.54 = 175.26 cm Using the Harris-Benedict equation, we can calculate John's BMR: BMR = 88.362 + (13.397 x 90.72) + (4.799 x 175.26) - (5.677 x age) BMR = 1915.42 - 5.677 x age. To lose weight, John's daily calorie intake should be less than his daily caloric requirements. A safe and steady rate of weight loss is typically 1-2 pounds per week, which corresponds to a deficit of 500-1000 calories per day. Therefore, an appropriate daily calorie intake to help John lose weight safely and steadily would be: BMR - 500 to BMR - 1000 calories per day.Substituting John's BMR value into this equation and assuming an age of 30: BMR - 500 = 1915.42 - 500 = 1415.42 calories per day BMR - 1000 = 1915.42 - 1000 = 915.42 calories per day.

Therefore, an appropriate daily calorie intake for John to lose weight safely and steadily would be between 915.42 and 1415.42 calories per day.

To learn more about "Harris-Benedict equation" visit: https://brainly.com/question/16603236

#SPJ11

uppose we have the instruction lda 800. given memory as follows: what would be loaded into the ac if the addressing mode for the operating is immediate?

Answers

If the addressing mode for the LDA operation is immediate, then the value at memory location 800 will be loaded directly into the accumulator (AC). In this case, the value at memory location 800 is 20.

In the LDA instruction with immediate addressing mode, the operand is given directly in the instruction, instead of fetching it from a specified memory location. After the execution of the instruction, the accumulator (AC) will contain the value 20. Immediate addressing mode is useful when the operand is a constant value or a small amount of data that can be easily included in the instruction. This method saves time and memory, as the processor does not need to access a memory location to obtain the operand value, making it a more efficient way to execute certain instructions..

To know more about LDA operation visit:

brainly.com/question/29999718

#SPJ11

A customer seeks to buy a new computer for a private use at home.The customer primarily needs the computer to use the Microsoft PowerPoint application for the purpose of practice presentation skills.As a sales person what size hard disc would you recommend and why?

Answers

Answer:

The most common size for desktop hard drives is 3.5 inches,  they tend to be faster and more reliable, and have more capacity. But they also make more noise.

Explanation:

If you are continually deleting and installing programs or creating content, the disc must have good reliability.

Keep in mind that larger hard drives are also a little slower, so it is preferable to opt for two smaller ones. Large hard drives are partitioned so there is no problem gettin

chbdg good performance, but if you put everything on one big disk and it breaks, you will lose everything.

If you buy 2 small disks, check that the motherboard does not limit the speed of a second hard disk.

Please help with my Python code - Functions

Please help with my Python code - Functions

Answers

Answer:

Explanation:

see attached for help

Please help with my Python code - Functions

Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.

Answers

Answer:

I am using normally using conditions it will suit for all programming language

Explanation:

if(minimum){

hours=10

}

Which statement declares a two-dimensional integer array called myArray with 3 rows and 4 columns?
a. int[][] myArray = new int[3][4];
b. int myArray[3, 4];
c. int[] myArray = new int[4][3];
d. int[] myArray = new int[7];

Answers

The correct statement that declares a two-dimensional integer array

is: int[][] myArray = new int[3][4];

Which option correctly declares a 2D integer array named 'myArray' with 3 rows and 4 columns?

Option A is the correct statement to declare a two-dimensional integer array called myArray with 3 rows and 4 columns in Java.

The statement "int[][] myArray = new int[3][4];" declares a two-dimensional integer array with the name "myArray". The first pair of square brackets "[]" specifies the number of rows, which is 3 in this case.

The second pair of square brackets "[]" specifies the number of columns, which is 4 in this case. The "new" keyword is used to allocate memory for the array. The data type of the array is "int".

Option B is incorrect because it uses comma "," to separate the dimensions, but in Java, square brackets "[]" are used.

Option C is also incorrect because it declares a one-dimensional integer array with 4 elements and then tries to specify 3 rows, which is not allowed in Java.

Option D is also incorrect because it declares a one-dimensional integer array with 7 elements, but it does not specify any rows or columns for a two-dimensional array.

Learn more about Integer array

brainly.com/question/31754338

#SPJ11

OBJECTIVE As a result of this laboratory experience, you should be able to accomplish Functions and proper handling of hand tools in automotive workshop Functions and proper handling of power tools in automotive workshop (5 Marks)

Answers

The objective of the laboratory experience is to develop the knowledge and skills necessary for performing functions and proper handling of hand tools and power tools in an automotive workshop.

In the laboratory experience, students will be exposed to various hand tools commonly used in an automotive workshop. They will learn about the functions of different hand tools such as wrenches, screwdrivers, pliers, and socket sets. The importance of proper handling, including correct gripping techniques, applying appropriate force, and ensuring tool maintenance and safety, will be emphasized. Students will also understand the specific applications of each tool and how to use them effectively for tasks like loosening or tightening fasteners, removing or installing components, and performing basic repairs.

Additionally, the laboratory experience will cover the functions and proper handling of power tools in an automotive workshop. Students will learn about power tools such as impact wrenches, drills, grinders, and pneumatic tools. They will gain knowledge on how to operate these tools safely, including understanding their power sources, selecting the right attachments or bits, and using them for tasks like drilling, grinding, sanding, or cutting. Proper safety measures, such as wearing personal protective equipment and following manufacturer guidelines, will be emphasized to ensure the safe and efficient use of power tools in the automotive workshop setting.

Overall, this laboratory experience aims to equip students with the necessary knowledge and skills to effectively and safely handle hand tools and power tools in an automotive workshop.

Learn more about pneumatic tools here:

https://brainly.com/question/31754944

#SPJ11

In your opinion, how can communication be affected by media and information?

Answers

Communication and information are fundamental aspects of modern society. The media play an important role in the way people receive and process information.

The media can play an important role in educating and raising awareness in society about important issues, such as human rights, gender equality and environmental protection.

Furthermore, the media can serve as a platform for people to share information and communicate with a wider audience, which can contribute to a more meaningful and constructive dialogue in society.

In conclusion, the media and information have a significant impact on the way people communicate and relate to each other.

Lear More About Media and information

https://brainly.com/question/21444450

#SPJ11

REOLVER EL SIGUIENTE PROBLEMA: R1=1.7K, R2=33K R3=4.7K R4=5.9K R5=17K IT=20mA CALCULAR: VT, I1, I2, I3, I4, I5 Y RT

Answers

Answer :

Ok

Step-by-Step Explanation:

Create an application named TestClassifiedAd that instantiates and displays at least two ClassifiedAd objects. A ClassifiedAd has fields for a Category(For example, Used Cars and Help Wanted), a number of Words, and a price. Include properties that contain get and set accessors for the category and number of words, but only a get accessor for the price. The price is calculated at nine cents per word.
Note: Your output should be formatted as:
The classified ad with 100 words in category Used Cars costs $9.00
The classified ad with 60 words in category Help Wanted costs $5.40
/*MUST BE FORMATTED AS BELOW*/
using static System.Console;
public class TestClassifiedAd
{
public static void Main()
{
// Write your main here.
}
}
class ClassifiedAd
{
// Write your ClassifiedAd class here.
}

Answers

The application "TestClassifiedAd" creates and displays two instances of the "ClassifiedAd" class. Each ClassifiedAd object has fields for category, number of words, and price.

The price is calculated based on the number of words (nine cents per word). The output displays the category, number of words, and calculated price for each classified ad. To create the "TestClassifiedAd" application, you need to define the "Main" method within the class. In the "Main" method, you will instantiate two objects of the "ClassifiedAd" class and display their details.

The "ClassifiedAd" class should have fields for category, number of words, and price. Additionally, you should include properties with get and set accessors for the category and number of words, and a get accessor for the price. The price should be calculated by multiplying the number of words by nine cents.

Within the "Main" method, you will create two instances of the "ClassifiedAd" class using the "new" keyword. Set the values for the category and number of words for each object. Then, use the get accessors to retrieve the values and calculate the price. Display the details of each classified ad using the "Console.WriteLine" method, formatting the output as specified in the instructions.

Here's an example of how the "TestClassifiedAd" application code structure could look:

```csharp

using static System.Console;

public class TestClassifiedAd

{

   public static void Main()

   {

       ClassifiedAd ad1 = new ClassifiedAd();

       ad1.Category = "Used Cars";

       ad1.Words = 100;

       ClassifiedAd ad2 = new ClassifiedAd();

       ad2.Category = "Help Wanted";

       ad2.Words = 60;

       WriteLine("The classified ad with {0} words in category {1} costs ${2}", ad1.Words, ad1.Category, ad1.Price.ToString("0.00"));

       WriteLine("The classified ad with {0} words in category {1} costs ${2}", ad2.Words, ad2.Category, ad2.Price.ToString("0.00"));

   }

}

class ClassifiedAd

{

   public string Category { get; set; }

   public int Words { get; set; }

   public decimal Price => Words * 0.09M;

}

```

In this example, we define the "TestClassifiedAd" class with the "Main" method. Inside the "Main" method, we create two instances of the "ClassifiedAd" class, set their properties, and display their details using the formatted output specified in the instructions. The "ClassifiedAd" class includes properties for category and number of words, as well as a calculated property for the price. The price is calculated by multiplying the number of words by 0.09 (nine cents per word). The "Console.WriteLine" statements display the information for each classified ad, including the number of words, category, and price.

Learn more about output displays here:- brainly.com/question/15205214

#SPJ11

you are a developer at a software development firm. your latest software build must be made available on the corporate web site. internet users require a method to ensure that they have downloaded an authentic version of the software. in other words, you want users to be able to be able to check the integrity of the software that they download. what should you do?

Answers

One way to ensure the integrity of the software that users download is by providing them with a cryptographic hash or a checksum value for the software. This value is a unique string of characters that is generated by applying a cryptographic hash function to the software. Users can then verify that the downloaded software is authentic by calculating the hash value of the downloaded file and comparing it to the hash value provided by the developer. If the hash values match, then the downloaded file is authentic.

To implement this, you should:

Calculate the cryptographic hash or checksum value of the software. Common hash functions include SHA-256, SHA-512, and MD5.

Publish the hash value on your corporate website, along with the download link for the software.

Instruct users to calculate the hash value of the downloaded file using a tool such as md5sum, sha256sum, or a similar tool that can be used to calculate the hash of a file.

Provide instructions on how to verify the hash value of the downloaded file against the published hash value on your website.

Learn more about website here:

brainly.com/question/32075231

#SPJ11

Sam works as a security analyst in an xyz company. he sends threat intelligence information to his manager in a machine-readable format so that the manager can verify it. in that format, mandiant's indicators are used by sam for the base framework. which format did sam use in the given scenario

Answers

Sam used Mandiant's Indicators format for the machine-readable threat intelligence information.

How did the security analyst format the threat intelligence information for the manager?

In the given scenario, Sam, a security analyst, utilizes Mandiant's Indicators format to share threat intelligence information with his manager in a machine-readable format.

Mandiant's Indicators is a standardized framework developed by Mandiant, a leading cybersecurity firm.

This format allows for consistent and structured representation of indicators of compromise (IOCs) and other relevant information related to cybersecurity threats.

By using this format, Sam ensures that the information he shares with his manager is in a format that can be easily interpreted and verified.

It enables the manager to efficiently analyze the threat intelligence and take appropriate actions to mitigate potential security risks.

Learn more about security analyst

brainly.com/question/31064552

#SPJ11

One part of a development team has completed an algorithm. Why is it important to share it with others on the team? Choose all that apply. If it is easy to understand, no one will dispute what is included in the algorithm. It will give everyone else an opportunity to comment on the process described in the algorithm. It will serve as the starting point for all future activity. It communicates the consecutive instructions of the solution.

Answers

Answer: B,C,D

Explanation:

Answer:

the answer is B,C,D

Explanation:

What is the difference between a class and an object in Python?

Answers

Answer:   A class is a template for creating Python objects within a program, whereas the object itself is an instance of the Python class. You can think of a class as a blueprint for an object that includes the available functions and data variables.

Explanation:

A collection of data (variables) and methods (functions) that act on those variables constitutes an object. A class, similarly, is a blueprint for that object. A class can be compared to a rough sketch (prototype) of a house.

which guidelines should be used to make formatting tasks more efficient

Answers

“Use pasted text only; this does not keep the original formatting”
which guidelines should be used to make formatting tasks more efficient

I will mark Brainliest

I will mark Brainliest

Answers

1. There are satellites that work with Antennas In the sky.

2. They help with recipes, They are good for games, They are also great for chatting. But, they run out of battery fast, they also radiate the room, they costt alot.

3. You can see definitions, But it can be false

what do these two parts of the lift that go down a mine do​

Answers

they transport miners and equipment down the mine

Identify a true statement about reintermediation with reference to e-tailing.
A) It refers to the design of business models that reintroduce middlemen.
B) It refers to the design of business models that eliminate middlemen.
C) It provides ways for clients and firms to conduct business online without human assistance.
D) It provides ways for clients and firms to conduct business activities in a traditional manner by operating physical locations.
E) It enables access to Web sites linked to corporate databases in order to provide real-time access to personalized information.

Answers

A) It refers to the design of business models that reintroduce middlemen

Reintermediation refers to the reintroduction of intermediaries or middlemen in e-tailing or online commerce. This means that businesses are designing models that include intermediaries to help facilitate transactions between buyers and sellers. Reintermediation is the opposite of disintermediation, which refers to the elimination of intermediaries in the distribution channel. Reintermediation can be used to overcome some of the challenges that arise with disintermediation, such as issues with trust, security, and logistics. For example, intermediaries such as online marketplaces, comparison sites, or payment processors can help buyers and sellers connect and transact safely and efficiently. In summary, reintermediation in e-tailing involves the reintroduction of intermediaries to facilitate online transactions, and it is the opposite of disintermediation, which involves the removal of intermediaries from the distribution channel.

Learn more about distribution channel here: brainly.com/question/13385853

#SPJ11

on your newly-installed systemd-based server you want to view log files that pertai tp the systems booting and any error messages. which command would you use on this system to view the desired information?

Answers

Journalctl is the command used on the system to view the desired information

What is journalctl?

A tool called journalctl is used to search and display the logs kept by journald, the logging service provided by systemd.Journalctl is the preferred method of reading log messages processed by journald since journald maintains log data in a binary format rather than a textual format.

Numerous tools are available on Linux-based systems to assist in recording and analysing system logs. Similar to "systemd," a strong programme that collects logs from sources in binary format and enables command-line access to the logs for the user.The "Journald" is a system application from the systemd utility that gathers information in binary format from various logs. It provides a more effective way to manage logs while operating in a similar manner to syslog.

Hence to conclude the Journalctl command is used on the system to view the desired information

To know more on commands in systemd  follow this link:

https://brainly.com/question/29727723

#SPJ4

The costs incurred when a firm buys on the marketplace what it cannot make itself are referred to as

Answers

Answer: transaction cost

Explanation:

Transaction costs refers to the expenses that are incurred when a good or service is bought or sold. Transaction cost is the labor that's required in bringing a product to the market.

Transaction cost is the costs that are incurred when a firm buys on the marketplace what it cannot make itself.

Transaction costs are the costs that are incurred which don’t accrue to the participant of the transaction.

true or false: each page within a website/domain has a unique url.

Answers

True. Each page within a website/domain typically has a unique URL (Uniform Resource Locator) that identifies its specific location on the internet.

The URL serves as an address for accessing and referencing a specific webpage, allowing users to navigate to different pages within a website or SHARE the URL to direct others to a particular page.A URL (Uniform Resource Locator) is a specific web address that is used to locate and access resources on the internet. It provides a standardized way to identify the location of a web page, file, or any other resource. A URL consists of several components:1. Protocol: The protocol specifies the rules and procedures that determine how data is transferred between the client (web browser) and the server. Common protocols include HTTP (Hypertext Transfer Protocol), HTTPS (HTTP Secure), FTP (File Transfer Protocol), etc.

2. Domain Name: The domain name identifies the specific website or server hosting the resource. For example, in the URL "https://www.example.com," "www.example.com" is the domain name.

3. Path: The path specifies the specific location or directory within the website where the resource is located. It follows the domain name and is separated by slashes (/). For example

Learn more about URLs here:

https://brainly.com/question/32369651

#SPJ11

how is an organizational unit different from a normal container?

Answers

An organizational unit (OU) is different from a normal container in that it is a logical grouping of objects with similar attributes, such as users, computers, and other resources, within an Active Directory (AD) domain. It is a way of dividing the domain into smaller sections to make it easier to manage.

Active Directory users and computers are grouped into containers and OU. They are similar in that they provide a way to organize and manage the AD structure. However, the key difference is that a container can only hold other containers and objects, while an OU can contain other OUs, groups, and objects. Additionally, a container cannot be used to apply Group Policy settings, while an OU can be used for this purpose.

An organizational unit (OU) is more flexible and provides greater control than a container. It can be used to delegate administrative control, apply policies and permissions, and create custom organizational structures. Therefore, OUs are commonly used to manage large and complex AD environments.

Know more about organizational unit:

https://brainly.com/question/31442527

#SPJ11

how can you turn on a light switch and it not work, without turning off the power to the whole house?

Answers

Answer:

Go to the beaker box and turn off the power to that one room. Duh

Explanation:

which of the following is not a use of a hash function?program execution optimization to make computers run fasterchecksums for integrity checkingerror correcting codes for data transmission optimizationlossy compression to reduce files sizes when fidelity is not required

Answers

The one that is not a use of a hash function is Lossy compression to reduce file sizes when fidelity is not required. Option C is correct.

The use of a hash function is to generate a unique fixed-size output (hash value) from an input of variable size. This output is used for various purposes, such as data indexing, security, and digital signatures.

Out of the given options, program execution optimization, checksums for integrity checking, and error correcting codes for data transmission optimization all make use of hash functions. However, lossy compression to reduce file sizes when fidelity is not required does not involve hash functions.

Instead, lossy compression algorithms discard some data to reduce file size, which can result in a loss of information. Hence, lossy compression is not a use of a hash function.

Therefore, option C is correct.

Learn more about hash function https://brainly.com/question/31579763

#SPJ11

Read the following code used to calculate the total cost of an item with tax: price = input("What is the item price? ") tax = price * 0.065 totalPrice = price + tax There is an error in the code. What type of function needs to be used? (5 points) float() int() print() str()

Answers

Answer: float()

Explanation: The code used to calculate total price = tax + price.

price = input("What is the item price? ")

tax = price * 0.065

totalPrice = price + tax

Since the input required from the user will be numerical, that is the price of an item, then it has to be stated explicitly, instead the code throws an error as it will read in a string if not stated explicitly.

Also, Given that the total price calculation will require decimal or fractional calculations, using the float() function will allow the program to read in the user input as a numerical value which can be used in further calculation as the float () function provides flexibity when working with fractional values.

What does else do in an if/else statment?
O Gives the if statement a command to run if the condition is false
O Runs a command regardless of whether the condition is tru or false
O Determines whether the condition is true or false
O Tells the condition which code to run

Answers

Answer:

Gives the if statement a command to run if the condition is false

What is comprised of millions of smart devices and sensors connected to the internet?.

Answers

IoT is a sensor network made up of billions of smart gadgets that connects people, systems, and other applications to collect and share data, taking M2M to a new level.

IoT is a sensor network made up of billions of smart gadgets that connects people, systems, and other applications to collect and share data, taking M2M to a new level. M2M provides the connectivity that powers IoT as its core.

The supervisory control and data acquisition (SCADA) software application program category, which collects data in real time from remote locations to control equipment and conditions, is a natural extension of the internet of things. SCADA systems are made up of both hardware and software elements. The software on the computer uses the data that the hardware collects and feeds into it to process and present it in real time. Due to the way SCADA has developed, first-generation IoT systems have evolved from late-generation SCADA systems.

To know more about IoT click here:

https://brainly.com/question/25703804

#SPJ4

how the actions of patronage shaped the direction of specific kinds of technologies which ultimately exerted a lasting cultural or social impact upon society.

Answers

Patronage of specific technologies has a long and varied history. From the invention of the wheel to the development of the printing press, patronage of technology has had a lasting impact on the way people interact and live.

What is technology?

Technology is the application of scientific knowledge for practical purposes, especially in industry. It involves the use of engineering and manufacturing processes to create items that are used in everyday life.

In the Middle Ages, many new technologies were developed with the help of wealthy patrons. These patrons funded the development of new technologies, and in turn, these inventions had a significant effect on the cultural, social, and economic life of the period. For example, the development of the water wheel allowed for the mechanization of mills and other industries, improving the efficiency of production and creating numerous jobs.
In the modern era, patronage of technology has also had a lasting effect on society. One example of this is the development of the internet. The internet has had a dramatic impact on the way people communicate, work, and live their lives. Many of the technologies that make up the internet were initially funded by private and public patrons, who saw the potential for the internet to revolutionize communication and commerce.
Patronage of technology has also played a key role in the development of medical technology. For centuries, patrons have funded the development of medical treatments and devices, ranging from the discovery of new drugs to the development of prosthetics. This patronage has had a lasting effect on the health and quality of life of millions of people around the world.

To learn more about technology
https://brainly.com/question/29338740
#SPJ4

Do you need a internet browser to go to the intrnet?​

Answers

Answer:

No you do not need a interent browzer to get to the internet.

Explanation:

Not sure but I don’t think so

7. (a) An algorithm has been written in pseudocode to Input 50 numbers. Positive numbers are stored
in the array PosNum[ ]. Negative numbers are stored in the array NegNum ).
Zeros are not included in the positive and negative counts.
Count 0
PosCount Count
NegCount + Count
REPEAT
INPUT Number
IF Number > 0
THEN
PosCount PosCount + 1
PosNum[PosCount] = Number
ELSE
NegCount = NegCount
NegNum[NegCount] = Number
ENDIF
Count Count + 1
UNTIL Count >= 50
OUTPUT "There are ", PosCount," positive numbers"
OUTPUT "There are ", NegCount," negative numbers"
(b) The algorithm needs to be changed so there is no limit to how many numbers can be input.
When the number 9999 is input, the algorithm stops more numbers being input and outputs
the results. The number 9999 is not to be stored nor counted as a positive number.
Explain how you would change the algorithm.​

Answers

Answer:

The numbers do not have to be stored and the counter is also unnecessary, so take out all lines with PosNum[], NegNum[] and Count.

The repeat...until clause can be changed to:

REPEAT

...

UNTIL Number = 9999

and the IF Number>0 THEN must be changed to

IF Number > 0 AND Number != 9999 THEN

That should do the trick.

Other Questions
WE CEO OF MOO MOO COWS!!! What is the independent variable in f(x)=6x Solve for x.Use the completing the square method.x2 + 10x = 6 Write on the motion :Co education is the best A diving platform used to by Olympic divers is made of a board material (E = 12,500 MPa) that has a width of 300 mm, thickness of 50 mm and a length of 4000 mm. Six hundred millimeters of the length of the board is embedded into a pillar support. A diver weighing 600 N stands on the edge of the board. How many millimeters is the direction at the end of the board where the diver stands? How many grams of chlorine will be needed to make 75.0 grams of C2H2Cl4?2Cl2+C2H2=C2H2Cl4(Performed at STP) a worker at the top of a 594-m-tall television transmitting tower accidentally drops a heavy tool. if air resistance is negligible, how fast (in m/s) is the tool going just before it hits the ground? Older adults might need a Vitamin B-12 supplement because: Question 25 options: their stomach produces less hydrochloric acid they don't eat dairy products as often as they should they drink more fluids and excrete more dilute urine they are at a higher risk of osteoporosis Quisssssssss !!!!x + 2x + 9y - 7y In a paragraph, analyze how the American Revolution changed colonial society. Discuss what changed and what remained the same. Make a powerpoint: explain how it affected Florida's economy. You must include other ways transportation affected Florida. You must mention at least one entrepreneur who was involved with this type of transportation and how they where involved.And explain how a technological advance in transportation affected Florida.i will mark Brainliest just two people have to answer:) what is the entropy change when 381 j of energy is reversibly transferred to a sample of water at 25c? Case Study:The benefits of diversity in the workplaceDiversity in the workplace means that a company has employees that vary by many different characteristics. Most often when people refer to workplace diversity, theyre referring to a workplace thats balanced by race and gender. But diversity in the workplace can exist across many different variables, including age, religion, cultural background, and language, physical. A truly diverse workplace features a distribution of people that reflects greater society. This indicates that the company doesnt present any barriers to entry for individuals of any particular background. For example, a diverse company should have a relatively equal gender balance at both the staff and leadership level. Any worthwhile definition of workplace diversity also includes the notion of inclusion. Whereas diversity is more of an objective measure of how different employees are from one another, inclusion is about whether employees truly feel like they are accepted, their voices matter, and that they belong. So its not enough just to be diverse. A company must also be inclusive. What makes diversity and inclusion so important? Many companies recognise the value of diversity in the workplace. There are eleven compelling reasons that explain why companies are making workplace diversity a priority.Diverse organisations are more innovative and creative - Workplace diversity sparks innovation and creativity. Diverse organisations solve problems faster - Because diverse companies are more innovative and creative, they also solve problems faster.Diverse organisations make better decisions and are more adaptable - Not only do diverse teams make decisions quicker, they also make better decisions.Diverse teams are more productive and perform better - While working within a homogeneous team of similar people may seem easier on the surface, theres a wealth of research that shows that diverse teams are actually more productive.Diverse companies are seen as better employers - Working at an inclusive organisation is a growing priority for job seekers. Diverse companies have higher employee engagement - Employee engagement is a major goal of most HR teams.Diverse workforces see reduced turnover - Its simple: diversity and inclusion lead to engagement, and engaged employees stay longer.Diverse companies can better serve their diverse customer base - A team with a variety of backgrounds is more likely to understand or uncover the challenges that their diverse customers may have.Diverse companies have better reputations - Companies that make diversity and inclusion as part of their mission are seen as desirable, socially responsible organisations leading to a better reputation with customers and investors.Diverse workforces and leadership teams earn more profit - All of the above factors lead to more profitable businesses.Diverse companies make the world a better place - Simply put, fostering a culture of diversity and inclusion sets an example for the world to follow. Its not just good for business its the right thing to do.Having a truly inclusive workplace is not possible unless a diversity and inclusion program is implemented with buy-in from top-to-bottom in the organisation. Some quick tips on how to do this is to create inclusive company policies, celebrate individual differences, proactively hire for diversity, audit job posts for inclusive language and finally, hire objectively without bias.QUESTION 2You work in an organisation that has a diverse workforce in terms of age, cultural background, physical abilities, race, religion, gender, and sexual orientation. Elaborate on EIGHT (8) approaches that will assist your organisation to effectively manage this diversity.1. Accommodating work and family needs:2. Alternative Work Arrangements:3. Diversity Training:4. Mentoring Programmes:5. Identifying and Building on Shared Values:6. Commitment to Goals and Objectives:7. Appreciating the Uniqueness of Each Person and Culture:8. Acknowledging Cultural Conflicts and Differences:9. Team Building: Rippy invests $16,000.00 at 3(1)/(4)% simple interest for 1325 days. How much interest is earned over the 1325 day period? The interest earned over the 1325 day period is How much is in the account at the end of the 1325 day period? Rippy will have in the account at the end of the 1325 day period. factors such as the increasing number of women in the workforce and the growing number of older workers exemplify which force for change outside the organization? multiple choice question. Find the slope (15 points) . A gym charges $25 a month membership fee. The cost of a personal trainer is $15 per session.If p represents the number of personal training sessions used and c represents the totalcharges at the end of the month, what finear equation can be used to determine a user'smonthly bill? 1 kg of water at 100 oc is poured into a bucket that contains 4 kg of water at 0 oc. find the equilibrium temperature Read this excerpt from The People Could Fly.How does this excerpt show that the story is a folktale?A. It teaches a lesson about human behaviorB. It is passed down orallu through generationsC. It includes a person with magical abilitiesD. It describes a conflict between good and evil The expression 2.2x+4.4 factored is