jane, an employee in the human resources department, has created several important pdf documents on her computer that all office managers in her building must read. she would like to make locating these files simple and maintain them as little as possible. it is important that no other users are permitted to view these documents. As the IT technician for your company, Jane has asked you to make this possible.
Which of the following would MOST likely fulfill Jane's needs?

Answers

Answer 1

Answer:

Network share

Explanation:


Related Questions

Compare a Wi-Fi hotspot with a cybercafé.

Answers

Answer:

A WiFi Hotspot is a wireless internet connection that allows a computer, smartphone, or any other internet-enabled devices to connect to internet access points.

A cybercafe refers to any business place that allows people to access the internet usually within its premises after paying for connection access to connect to it.

Explanation:

Most operating system have GUI as part of the system, which is the following best describes an operating system GUI

Answers

A Graphical User Interface (GUI) is the component of an operating system that allows users to communicate with the system using graphical elements. GUIs are generally used to give end-users an efficient and intuitive way to interact with a computer.

They provide an easy-to-use interface that allows users to manipulate various objects on the screen with the use of a mouse, keyboard, or other input device.The primary function of an operating system GUI is to make it easier for users to interact with the system.

This is done by providing visual feedback and a simple way to access various system functions. GUIs can be customized to suit the user's preferences, which means that they can be tailored to meet the specific needs of different users.Some of the key features of a GUI include the use of windows, icons, menus, and buttons.

Windows are used to display information and applications, while icons are used to represent various objects or applications on the screen. Menus and buttons are used to provide users with a way to access various system functions, such as saving a file or printing a document.

The use of a GUI has become a standard feature of most operating systems. This is because GUIs make it easier for users to interact with computers, and they provide an efficient and intuitive way to access various system functions.

For more such questions on Graphical User Interface, click on:

https://brainly.com/question/28901718

#SPJ8

Chinh wants to have a program print, "Sorry, but that isn’t one of your options" until the user enters the correct information. What should be used to do this?

a database

import

a while loop

a for loop

Answers

Answer:

I really beleive its a while loop

Explanation:

Chinh wants to have a program print, "Sorry, but that isn’t one of your options" until the user enters the correct information so a while loop should be used to do this.

What is a while loop ?

A "While" Loop is used to copy a selected block of code an unknown range of instances, till a circumstance is met. For example, if we need to invite a person for a variety of among 1 and 10, we do not know how in many instances the person can also additionally input a bigger range, so we preserve asking "whilst the range isn't among 1 and 1.

The whilst loop is used whilst we do not know the range of instances it's going to repeat. If that range is infinite, or the Boolean circumstance of the loop by no means receives set to False, then it's going to run forever.

Read more about the a database

https://brainly.com/question/26096799

#SPJ2

How do technologies such as virtual machines and containers help improve
operational efficient?

Answers

Answer:

Through the distribution of energy usage across various sites, virtual machines and containers help to improve operational efficiency. A single server can accommodate numerous applications, negating the need for additional servers and the resulting increase in hardware and energy consumption.

Hope this helps! :)

Components of micro computer with diagram

Answers

Answer:

CPU, Program memory, Data memory, Output ports,  Input ports and Clock generator.

Explanation:

There are six basic components of a microcomputer which includes CPU, Program memory, Data memory, Output ports,  Input ports and Clock generator. CPU is the central processing unit which is considered as the brain of the computer. It is the part of a computer that executes instructions. Data memory is the place where data is stored that is present in the CPU.

What will be inserted when you press Carl+;

Answers

Answer: It will insert the current date into the cell.

a stop watch is used when an athlete runs why

Answers

Explanation:

A stopwatch is used when an athlete runs to measure the time it takes for them to complete a race or a specific distance. It allows for accurate timing and provides information on the athlete's performance. The stopwatch helps in evaluating the athlete's speed, progress, and overall improvement. It is a crucial tool for coaches, trainers, and athletes themselves to track their timing, set goals, and analyze their performance. Additionally, the recorded times can be compared to previous records or used for competitive purposes,such as determining winners in races or setting new records.

you can support by rating brainly it's very much appreciated ✅

Which of the following statements about personality tests are true? Check all of the boxes that apply. They evaluate a person’s personality traits. They evaluate a person’s ability to perform a job. They can be used as self-assessment tools for career planning. They determine a person’s level of intelligence.

Answers

The statements about personality tests are true is They evaluate a person’s personality traits and They can be used as self-assessment tools for career planning.The correct answer among the given options are A and C.

Personality tests are assessments designed to evaluate a person's personality traits and can be used as self-assessment tools for career planning.

Option A is true because personality tests are specifically created to measure and assess various aspects of an individual's personality, such as introversion/extroversion, agreeableness, conscientiousness, openness, and emotional stability.

These tests provide insights into an individual's behavioral patterns, preferences, and tendencies.

Option C is also true as personality tests can be valuable tools for self-assessment when it comes to career planning. By understanding one's personality traits and characteristics, individuals can gain a better understanding of their strengths, weaknesses, and preferences in work environments.

This self-awareness can aid in making informed decisions about career choices, identifying suitable job roles, and aligning personal traits with career paths that suit them best.

Option B is incorrect. While some tests may include items related to job performance or skills, their primary purpose is to assess personality traits rather than job-related abilities.

Job performance evaluations are typically carried out through different assessments, such as job-specific tests, interviews, or performance evaluations.

Option D is incorrect. Personality tests are not designed to determine a person's level of intelligence. Intelligence tests, such as IQ tests, are specifically designed to assess cognitive abilities and intelligence levels, while personality tests focus on evaluating personality traits and characteristics.

For more such questions on Personality,click on

https://brainly.com/question/23161776

#SPJ8

The Probable question may be:
Which of the following statements about personality tests are true? Check all of the boxes that apply.

A. They evaluate a person’s personality traits.

B. They evaluate a person’s ability to perform a job.

C. They can be used as self-assessment tools for career planning.

D. They determine a person’s level of intelligence.

who here has a crush on jk from bts but feels more mature than him

Answers

Answer:

Nope not K-pop fan

Explanation:

Select the guidelines you should follow when creating a memo.

A. Single space the paragraphs in the memo.
B. Send copies to anyone who is affected by the memo.
C. Write very long sentences.
D. Get to the point at the beginning of the memo.
E. Keep the paragraph lengths short.
F. Do not send copies to people who were mentioned in the memo.

Please help me. 30 points!

Answers

Select the guidelines you should follow when creating a memo.

A. Single space the paragraphs in the memo.D. Get to the point at the beginning of the memo.E. Keep the paragraph lengths short.

When creating a memo, you should start it by keeping your opinion that seems strong So, get to the point at the beginning of the memo. Single space the paragraphs because it makes it look tidy but too much space gives the reader a thought that it's too empty. Keep the paragraph lengths short, this is an art. Everyone cannot do it, keeping your point with a short paragraph is not easy. Short paragraphs keeps the reader interested in the memo. Too long paragraphs are boring...~

Answer:

Hello there, the answer is A,D,E

Explanation:

Assuming the user types the sentence


Try to be a rainbow in someone's cloud.


and then pushes the ENTER key, what will the value of ch be after the following code executes?.


char ch = 'a';

cin >> ch >> ch >> ch >> ch;

(in c++)

Answers

The value of ch will be the character entered by the user after executing the code.

What is the value of ch after executing the code?

The code snippet cin >> ch >> ch >> ch >> ch; reads four characters from the user's input and assigns them to the variable ch. Since the user input is "Try to be a rainbow in someone's cloud." and the code reads four characters, the value of ch after the code executes will depend on the specific characters entered by the user.

In conclusion, without knowing the input, it is not possible to determine the exact value of ch. Therefore, the value of ch will be the character entered by the user after executing the code.

Read more about code execution

brainly.com/question/26134656

#SPJ1

What are the connections between the following concepts: letter frequency, avalanche effect, correlation between plaintext and ciphertext , and diffusion?

Answers

The Avalanche Effect describes how modifications to the plaintext have an impact on the ciphertext for a good cypher. When the input is only slightly altered, the algorithm generates an entirely different outcome.

Avalanche breakdown definition How does the avalanche breakdown mechanism look like in a diagram?

Avalanche Breakdown:  When a significant reverse voltage is put across the diode, the avalanche breakdown happens. The electric field across the junction grows when the applied reverse voltage is increased. The electrons at the junction are forced by the electric field, breaking their covalent bonds.

Which four fundamental security tenets apply to messages?

Confidentiality, Integrity, Non-repudiation, and Authentication are the four primary security principles that apply to messages.

To know more about Avalanche Effect visit:-

brainly.com/question/29095928

#SPJ1

Which statement about the discipline of information systems is true?
A. It involves organizing and maintaining computer networks.
B. It involves connecting computer systems and users together.
C. It involves physical computer systems, network connections, and
circuit boards.
D. It involves all facets of how computers and computer systems
work

Answers

Answer:

C.

Personal computers, smartphones, databases, and networks

Answer:

IT'S B

Explanation:

TRUST ME I HAD TO LEARN THE HARD WAY!!

Using wireshark in packet analysis. Create a display filter for the subnet address of the IPv4 address 66.235. 143.121/16 (Hint: calculate the subnet address on which 66.235.143.121 exists by converting the decimal of this IPv4 address and the subnet mask to binary and using the AND operation) 1. Provide the expression syntax for the display filter created.

Answers

The display filter expression for the subnet address of the IPv4 address 66.235.143.121/16 would be: ip.addr == 66.235.0.0/16

To create a display filter for the subnet address of the IPv4 address 66.235.143.121/16 using Wireshark, we need to calculate the subnet address and then construct the filter expression accordingly.

First, we convert the decimal representation of the IPv4 address and the subnet mask to binary.

The IPv4 address 66.235.143.121 in binary is 01000010.11101011.10001111.01111001, and the subnet mask /16 (which represents 16 network bits and 16 host bits) in binary is 11111111.11111111.00000000.00000000.

Next, we perform the logical AND operation between the binary representation of the IPv4 address and the subnet mask.

This operation sets the host bits to zero, resulting in the subnet address. The result of the AND operation is:

01000010.11101011.00000000.00000000

Finally, we construct the display filter expression using the subnet address. The display filter expression for the subnet address of the IPv4 address 66.235.143.121/16 would be:

ip.addr == 66.235.0.0/16

This filter expression instructs Wireshark to display only packets with an IPv4 address that matches the subnet address 66.235.0.0/16.

It filters out any packets with different network bits in the specified subnet range.

By using this display filter, you can focus your analysis on the specific subnet and observe network traffic relevant to that subnet, which can be useful for troubleshooting, monitoring, or analyzing network behavior.

For more questions on IPv4 address

https://brainly.com/question/18789088

#SPJ8

I will mark brainlist please help


1) Top layer we used the following effect

• clipping mask

• release clipping mask

• rasterize type

• none of the above


2) Reflection layer blend mode changed to:

• overlay

• normal

• dissolve

• hard light



3) for the layer reflection copy we added

• input mask

• color overlay

• layer mask

• none of the above

Answers

Answer:

C,A,B

Explanation:

3
Drag each label to the correct location on the image.
An organization has decided to initiate a business project. The project management team needs to prepare the project proposal and business
justification documents. Help the management team match the purpose and content of the documents.
contains high-level details
of the proposed project
contains a preliminary timeline
of the project
helps to determine the project type,
scope, time, cost, and classification
helps to determine whether the
project needs meets business
needs
contains cost estimates,
project requirements, and risks
helps to determine the stakeholders
relevant to the project
Project proposal
Business justification

Answers

Here's the correct match for the purpose and content of the documents:

The Correct Matching of the documents

Project proposal: contains high-level details of the proposed project, contains a preliminary timeline of the project, helps to determine the project type, scope, time, cost, and classification, helps to determine the stakeholders relevant to the project.

Business justification: helps to determine whether the project needs meet business needs, contains cost estimates, project requirements, and risks.

Please note that the purpose and content of these documents may vary depending on the organization and specific project. However, this is a general guideline for matching the labels to the documents.

Read more about Project proposal here:

https://brainly.com/question/29307495

#SPJ1

Summarize the history of artificial intelligence detailing its origin and future state in technology today.
Wrong answer will get reported

Answers

Scaled AI implementation can enhance team performance and strengthen corporate culture. Discover how BCG's AI-driven projects have aided in maximizing value for our clients. Learn About Our AI Products.

How does artificial intelligence work?

The replication of human intelligence functions by machines, particularly computer systems, is known as artificial intelligence. Expert systems, language processing, speech recognition, and machine vision are some examples of specific AI applications.

What fundamental principle underpins artificial intelligence?

Artificial intelligence is founded on the idea that intellect can be described in a way that makes it simple for a computer to duplicate it and carry out activities of any complexity. Artificial intelligence aims to emulate cognitive processes in humans.

To know more about artificial intelligence visit:

https://brainly.com/question/23824028

#SPJ1

List two reasons a scientist should know how to use a computer.​

Answers

The reasons that scientist should know how to use a computer are:

Data Analysis and ModelingLiterature Research and Communication:What is the computer use?

Scientists analyze data using computer skills and statistical software, programming, and visualization tools. Computers aid complex scientific modeling, testing, predictions, and insights.

Therefore, Scientists must navigate digital libraries and databases, access scholarly articles, and communicate with colleagues through email, video conferencing, and online collaboration platforms. Computer proficiency enables scientists to communicate globally.

Learn more about computer from

https://brainly.com/question/24540334

#SPJ1

What is a requirement?

Answers

The correct answer is a desired or required thing: necessity. Production was insufficient to meet military demands. : a prerequisite for the occurrence or presence of another thing: condition.

A prerequisite is a trait or attribute you must possess in order to engage in an activity or qualify for a position. Commonly accepted requirements are divided into three groups: functional requirements, non-functional requirements, and domain requirements. Functional requirements, according to IEEE, are "a task that a system or component must be able to do." A description of the characteristics the bespoke product must offer, the environment in which it must operate, and the functional specification of the system are established through the requirements process.

To learn more about prerequisite click the link below:

brainly.com/question/19504182

#SPJ4

give one major environmental and
one energy problem kenya faces as far as computer installations are concerned?​

Answers

One considerable predicament that Kenya encounters pertaining to the utilization of computers is managing electronic waste (e-waste).

Why is this a problem?

The mounting number of electronic devices and machines emphasizes upon responsibly discarding outdated or defective hardware in order to avoid environmental degradation.

E-waste harbors hazardous materials such as lead, mercury, and cadmium which can pollute soil and water resources, thereby risking human health and ecosystem sustainability.

Consequently, a significant energy drawback with computer use within Kenya pertains to the insufficiency or instability of electrical power supply.

Read more about computer installations here:

https://brainly.com/question/11430725

#SPJ1

Describe a topic, idea, or concept in the tech space you find engaging it makes you lose all track of time. Why does it captivate you? Why does it captivate and inspire you.

Answers

The fascinating subfields of computer science include numerous that deal with data, technology, life, money, health, and other topics.

In the modern world, computer science is used in practically everything, including the devices we use every day.

In computer science, what is a subdomain?

According to the DNS hierarchy, a subdomain is a domain that is a subdomain of a larger domain. For particular or distinctive information on a website, it is utilised as a quick and simple technique to establish a more memorable Web address.

Which computer science subfields are there?

The primary fields of study in computer science are artificial intelligence, computer systems and networks, security, database systems, human computer interaction, vision and graphics, numerical analysis, programming languages, software engineering, bioinformatics, and computing theory.

To know more about computer science visit:-

https://brainly.com/question/20837448

#SPJ1

Question 1 of 10 Which two scenarios are most likely to be the result of algorithmic bias? A. A person is rejected for a loan because they don't have enough money in their bank accounts. B. Algorithms that screen patients for heart problems automatically adjust points for risk based on race. C. The résumé of a female candidate who is qualified for a job is scored lower than the résumés of her male counterparts. D. A student fails a class because they didn't turn in their assignments on time and scored low on tests. ​

Answers

Machine learning bias, also known as algorithm bias or artificial intelligence bias, is a phenomenon that happens when an algorithm generates results that are systematically biased as a result of false assumptions made during the machine learning process.

What is machine learning bias (AI bias)?Artificial intelligence (AI) has several subfields, including machine learning. Machine learning relies on the caliber, objectivity, and quantity of training data. The adage "garbage in, garbage out" is often used in computer science to convey the idea that the quality of the input determines the quality of the output. Faulty, poor, or incomplete data will lead to inaccurate predictions.Most often, issues brought on by those who create and/or train machine learning systems are the source of bias in this field. These people may develop algorithms that reflect unintentional cognitive biases or actual prejudices. Alternately, the people could introduce biases by training and/or validating the machine learning systems using incomplete, inaccurate, or biased data sets.Stereotyping, bandwagon effect, priming, selective perception, and confirmation bias are examples of cognitive biases that can unintentionally affect algorithms.

To Learn more about Machine learning bias refer to:

https://brainly.com/question/27166721

#SPJ9

// This pseudocode segment is intended to compute and display
// the average grade of three tests for any number of students.
// The program executes until the user enters a negative value
// for the first test score.
start
Declarations
num test1
num test2
num test3
num average
housekeeping()
while test1 >= 0
mainLoop()
endwhile
endOfJob()
stop

housekeeping()
output "Enter score for test 1 or a negative number to quit"
return

mainLoop()
output "Enter score for test 2"
input test2
average = (test1 + test2 + test3) / 3
output "Average is ", average
output "Enter score for test 1 or a negative number to quit"
input tesst1
return

endOfJob()
output "End of program"
return

Answers

The pseudocode to calculate the average of the test scores until the user enters a negative input serves as a prototype of the actual program

The errors in the pseudocode

The errors in the pseudocode include:

Inclusion of unusable segmentsIncorrect variablesIncorrect loops

The correct pseudocode

The correct pseudocode where all errors are corrected and the unusable segments are removed is as follows:

start

Declarations

     num test1

     num test2

     num test3

     num average

output "Enter score for test 1 or a negative number to quit"

input test1

while test1 >= 0

     output "Enter score for test 2"

     input test2

     output "Enter score for test 3"

     input test3

     average = (test1 + test2 + test3) / 3

     output "Average is ", average

     output "Enter score for test 1 or a negative number to quit"

     input test1

endwhile

output "End of program"

stop

Read more about pseudocodes at:

https://brainly.com/question/11623795

a. In cell K11, create a formula using the DCOUNT function to count the number of projects with final costs of more than $100,000, using the data in the entire Projects table (Projects[#All]) and counting the values in the column of final costs ("Final Cost") that are equal to the values in the range J9:J10

Answers

Answer:

the data in the entire Projects table (Projects[#All]) and counting the values in the column of final costs ("Final Cost") that are equal to the values in the range J9:J10

help meeeeeeeeeeeeeeeee

help meeeeeeeeeeeeeeeee

Answers

Answer:

The advantages include much access to photos, digital functions like games and contacts with friends, videos, and you can search questions to anything you like. Disadvantages include things like too much screen time affecting sleep, health, and other physical problems. There is also exposure to explicit content and hatred from strangers.

There are hundreds of editing software for you to try, and many are free to use and are even compatible offline. They can make content related to or look like something in a movie or can be used to make things look nicer and cooler.

What additional hindrances do criminal investigators face when dealing with computer crimes aside from the obvious struggle with the ever-changing technological world?​

Answers

Answer:hackers

Explanation:

The nth Fibonacci number Fn is defined as follows: F0 = 1, F1 = 1 and Fn = Fn−1 + Fn−2 for n > 1.
In other words, each number is the sum of the two previous numbers in the sequence. Thus the first several Fibonacci numbers are 1, 1, 2, 3, 5, and 8. Interestingly, certain population growth rates are characterized by the Fibonacci numbers. If a population has no deaths, then the series gives the size of the poulation after each time period.
Assume that a population of green crud grows at a rate described by the Fibonacci numbers and has a time period of 5 days. Hence, if a green crud population starts out as 10 pounds of crud, then after 5 days, there is still 10 pounds of crud; in 10 days, there is 20 pounds of crud; in 15 days, 30 pounds of crud; in 20 days, 50 pounds of crud, and so on.

Write a program that takes both the initial size of a green crud population (in pounds) and some number of days as input from the keyboard, and computes from that information the size of the population (in pounds) after the specified number of days. Assume that the population size is the same for four days and then increases every fifth day. The program must allow the user to repeat this calculation as long as desired.
Please note that zero is a valid number of days for the crud to grow in which case it would remain at its initial value.
You should make good use of functions to make your code easy to read. Please use at least one user-defined function (besides the clearKeyboardBuffer function) to write your program.

basically I've done all the steps required except the equation in how to get the final population after a certain period of time (days). if someone would help me with this, I'll really appreciate it.

Answers

In Python, it can be expressed as follows. Using the recursive function type, we find the sum of the previous term and the sum of the two previous terms.

Python:

x=int(input("Initial size: "))

y=int(input("Enter days: "))

mod=int(y/5)-1

def calc(n):

   gen_term = [x,2*x]

   for i in range(2, n+1):

       gen_term.append(gen_term[i-1] + gen_term[i-2])

   return gen_term[n]

if(mod==0):

   print("After",y,"days, the population is",x)

else:

   print("After",y,"days, the population is",calc(mod))

The nth Fibonacci number Fn is defined as follows: F0 = 1, F1 = 1 and Fn = Fn1 + Fn2 for n > 1.In

Which of these are tools used to diagnose and test code? Check all of the boxes that apply.
debugging software
creating data sets
compiler software
error messages

Answers

Answer:

A C D

Explanation:

Answer:

Correct

Explanation:

Trade secrets _____. give a competitive edge give a competitive edge protect owners for 20 years protect owners for 20 years are secret company names are secret company names are products that generate profit

Answers

Trade secrets are confidential business information that give a competitive edge give a competitive edge.

What is a trade secret?

Note that trade secret protection is one that gives people or their owners the right to hinder or stop an information lawfully and it is one that is said to be within their control and this it cannot be disclosed, acquired or used by any other person without their consent.

Conclusively,  confidential business information are said to give an enterprise a competitive edge and it is said to be  unknown to others and thus it is said to be protected as a trade secret.

Learn more about Trade secrets  from

https://brainly.com/question/993315

The following code will not display the results expected by the programmer. Can you find the error? Declare Real lowest, highest, average Display "Enter the lowest score." Input lowest Display "Enter the highest score." Input highest Set average = low + high / 2 Display "The average is ", average, "."

Answers

Based on the information given, the first error in the code is that the Variable name is lowest, NOT low, and Set average = low + high / 2.

How to find the error in the code.

For Error 2: Variable name is highest, NOT high and Set average = low + high / 2

For Error 3 : Set average = low + high / 2. Thus, you will need to add the lowest and highest, then perform the division by 2

Set average = (lowest + highest) / 2 is the the correct statement.

Learn more about codes on:

https://brainly.com/question/25875879

Other Questions
The words hearty and somber are synonyms.True or false Need answer asapppp This mechanism specifies a set of methods that an implementing class must override and define. group of answer choices polymorphism static class constructor interface the patient with chronic renal disease has hyperphosphatemia. which condition is commonly associated with this electrolyte imbalance? the ph of body fluids must remain fairly constant for the body to maintain homeostasis. the ph of body fluids must remain fairly constant for the body to maintain homeostasis. true false Describe a situation with two variables that you can represent w its an equation that uses two operations. Write the equation. Explain the relationships between the variables the deltoid tuberosity is a bone marking on the lateral surface of the shaft of the humerus. what is the function of this bone marking? Please help Spanish basics Betty contracted with Roger the Dodger Home Decorating Pty Ltd to redesign the interiors of her wholehouse and complete the job in 3 months for $ 100,000. The job was completed on time, but about 25 % of itwas not finished properly with quite a few faults and it would cost another $ 20,000 to finish it off properly.Betty refuses to pay anything to Rodger the Dodger who is demanding payment because he says hecompleted the job on time.Discuss the legal situation for both parties with reference to any relevant cases ( Corporation Act 2001 and please Use ILAC format) State the formula to determine body mass index. PLS ANSWER!!!! Lincoln in his Inaugural Speech says: "The Government will not assail 'you'. You canhave no conflict without being yourselves the aggressors." Yet, after Ft. Sumter's attack,he called for 75,000 volunteers to "put down" the rebellion.Should he have done this? Why or why not? 1. Assuming g will remain constant, the dividend yield is a good measure of the required return on a common stock under which of the following circumstances? a. g=0. b. g> 0. c. g < 0. d. Under no circumstances. e. Answers a and b are both correct. The Hunicut and Hallock Corporation makes two versions of the same basic file cabinet, the TOL (Top-of-the-line) five drawer file cabinet and the HQ (High-quality) five drawer filing cabinet. The TOL and HQ use the same cabinet frame and locking mechanism. The drawer assemblies are different although both use the same drawer frame assembly. The drawer assemblies for the TOL cabinet use a sliding assembly that requires four bearings per side whereas the HQ sliding assembly requires only two bearings per side. (These bearings are identical for both cabinet types. ) 100 TOL and 300 HQ file cabinets need to be assembled in week #10. No current stock exists. Required:Develop a material structure tree for the TOL and the HQ file cabinets. A block weighing 2 kg i in the hape of a cube of ide 10 cm. It i kept on a horizontal table. Find the preure on the portion of the table where the block i kept Develop a marketing plan with market research I'm thinking of a number when i double it and take the result away from 25 the answer is less than 11What number could it be Write your answer as x< Or x> A metastable (excited) form of Sc changes to its stable form by emitting radiation with a wavelength of 8.73 pm. What is the change in mass of 1 mol of the isotope when it undergoes this change? One of the pieces of evidence supporting energy quantization was the line spectra of elements. Why does this demonstrate energy quantization?. MATH HELP PLEASE!!! I REALLY NEED IT !! Phil bought 700 shares of a company's stock for $9.29/share. Hepays a broker a commission of $18 to buy and sell stock. After oneyear, he sold all his shares, which were worth $9.90/share at that time.What was his rate of return?6.0%S6.2%6.5%6.8% Trudy was glad to give live now where a speech focused on getting a customer to purchase rather than back in Aristotles day when speeches had such a formal structure. Does Trudy understand the history of speeches?A. Yes, speeches today only have one main idea in each. B. Yes, today is far more casual in length and purpose than in Aristotles day. C. No, Trudy is trying to persuade which Aristotle recognized as a primary purpose of speeches. D. No, there were no sales presentations in Aristotles day what brain structure routes sensory information to the appropriate areas of the cortex?