Answer:
D. It requires that each item of stock is counted and recorded to determine stock levels
Explanation:
A perpetual system of inventory can be defined as a method of financial accounting, which involves the updating informations about an inventory on a continuous basis (in real-time) as the sales or purchases are being made by the customers, through the use of enterprise management software applications and a digitized point-of-sale (POS) equipment.
Under a perpetual system of inventory, updates of the journal entry for cost of goods sold or received would include debiting accounts receivable and crediting sales immediately as it is being made or happening.
Hence, an advantage of the perpetual system of inventory over the periodic system of inventory is that, it ensures the inventory account balance is always accurate provided there are no spoilage, theft etc.
The following are the characteristic of a perpetual inventory system;
I. It is the most popular choice for modern business.
II. Inventory is updated in near real-time.
III. It provides up-to-date balance information and requires fewer physical counts.
c. List three obstacles to effective listening.
Answer:
Information overload, personal concerns or issues, outside distractions, prejudice, and rate of speech and thought.
Answer:
1. Message overload
2. Environmental distractions
3. Prejudgment
4. Preoccupation
5. Message complexity
6. Failure to accommodate diverse learning styles
7. Lack of effort to listen
Explanation:
You are working as a marketing analyst for an ice cream company, and you are presented with data from a survey on people's favorite ice cream flavors. In the survey, people were asked to select their favorite flavor from a list of 25 options, and over 800 people responded. Your manager has asked you to produce a quick chart to illustrate and compare the popularity of all the flavors.
which type of chart would be best suited to the task?
- Scatter plot
- Pie Chart
- Bar Chart
- Line chart
In this case, a bar chart would be the most suitable type of chart to illustrate and compare the popularity of all the ice cream flavors.
A bar chart is effective in displaying categorical data and comparing the values of different categories. Each flavor can be represented by a separate bar, and the height or length of the bar corresponds to the popularity or frequency of that particular flavor. This allows for easy visual comparison between the flavors and provides a clear indication of which flavors are more popular based on the relative heights of the bars.
Given that there are 25 different ice cream flavors, a bar chart would provide a clear and concise representation of the popularity of each flavor. The horizontal axis can be labeled with the flavor names, while the vertical axis represents the frequency or number of respondents who selected each flavor as their favorite. This visual representation allows for quick insights into the most popular flavors, any potential trends, and a clear understanding of the distribution of preferences among the survey participants.
On the other hand, a scatter plot would not be suitable for this scenario as it is typically used to show the relationship between two continuous variables. Pie charts are more appropriate for illustrating the composition of a whole, such as the distribution of flavors within a single respondent's choices. Line charts are better for displaying trends over time or continuous data.
Therefore, a bar chart would be the most effective and appropriate choice to illustrate and compare the popularity of all the ice cream flavors in the given survey.
for more questions on Bar Chart
https://brainly.com/question/30243333
#SPJ8
Append newValue to the end of vector tempReadings. Ex: If newValue = 67, then tempReadings = {53, 57, 60} becomes {53, 57, 60, 67}.
#include
#include
using namespace std;
int main() {
vector tempReadings(3);
int newValue = 0;
unsigned int i = 0;
tempReadings.at(0) = 53;
tempReadings.at(1) = 57;
tempReadings.at(2) = 60;
newValue = 67;
/* Your solution goes here */
for (i = 0; i < tempReadings.size(); ++i) {
cout << tempReadings.at(i) << " ";
}
cout << endl;
return 0;
}
2.Remove the last element from vector ticketList.
#include
#include
using namespace std;
int main() {
vector ticketList(3);
unsigned int i = 0;
ticketList.at(0) = 5;
ticketList.at(1) = 100;
ticketList.at(2) = 12;
/* Your solution goes here */
for (i = 0; i < ticketList.size(); ++i) {
cout << ticketList.at(i) << " ";
}
cout << endl;
return 0;
}
3. Assign the size of vector sensorReadings to currentSize.
#include
#include
using namespace std;
int main() {
vector sensorReadings(4);
int currentSize = 0;
sensorReadings.resize(10);
/* Your solution goes here */
cout << "Number of elements: " << currentSize << endl;
return 0;
}
4. Write a statement to print "Last mpg reading: " followed by the value of mpgTracker's last element. End with newline. Ex: If mpgTracker = {17, 19, 20}, print:
Last mpg reading: 20
#include
#include
using namespace std;
int main() {
vector mpgTracker(3);
mpgTracker.at(0) = 17;
mpgTracker.at(1) = 19;
mpgTracker.at(2) = 20;
/* Your solution goes here */
return 0;}
Answer:
Following are the code to this question:
In question 1:
tempReadings.push_back(newValue); //using array that store value in at 3 position
In question 2:
ticketList.pop_back(); //defining ticketList that uses the pop_back method to remove last insert value
In question 3:
currentSize = sensorReadings.size(); /defining currentSize variable holds the sensorReadings size value
In question 4:
cout<<"Last mpg reading: "<<mpgTracker.at(mpgTracker.size()-1)<<endl;
//using mpgTracker array with at method that prints last element value
Explanation:
please find the attachment of the questions output:
In the first question, it uses the push_back method, which assigns the value in the third position, that is "53, 57, 60, and 67 "In the second question, It uses the pop_back method, which removes the last element, that is "5 and 100"In the third question, It uses the "currentSize" variable to holds the "sensorReadings" size value, which is "10".In the fourth question, It uses the mpgTracker array with the "at" method, which prints the last element value, which is "20".Using data from interviews with ESCO executives conducted in late 2012, this study examines the market size, growth forecasts, and industry trends in the United States for the ESCO sector.
Thus, It uses the "currentSize" variable to holds the "sensorReadings" size value, which is "10". In the fourth question, It uses the mpgTracker array with the "at" method, which prints the last element value, which is "20".
There are numerous types of gateways that can operate at various protocol layer depths.
Application layer gateways (ALGs) are also frequently used, albeit most frequently a gateway refers to a device that translates the physical and link layers. It is best to avoid the latter because it complicates deployments and is a frequent source of error.
Thus, Using data from interviews with Gateway executives conducted in late 2012, this study examines the market size, growth Esco size and industry trends in the United States for the Gateway.
Learn more about Gateway, refer to the link:
https://brainly.com/question/30167838
#SPJ6
xamine the following output:
Reply from 64.78.193.84: bytes=32 time=86ms TTL=115
Reply from 64.78.193.84: bytes=32 time=43ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=47ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=73ms TTL=115
Reply from 64.78.193.84: bytes=32 time=46ms TTL=115
Which of the following utilities produced this output?
The output provided appears to be from the "ping" utility.
How is this so?Ping is a network diagnostic tool used to test the connectivity between two network devices,typically using the Internet Control Message Protocol (ICMP).
In this case, the output shows the successful replies received from the IP address 64.78.193.84,along with the response time and time-to-live (TTL) value.
Ping is commonly used to troubleshoot network connectivity issues and measureround-trip times to a specific destination.
Learn more about utilities at:
https://brainly.com/question/30049978
#SPJ1
what is the importance of file management and how do you control files over time?\
Answer:
File management improves productivity by lowering the amount of time employees spend looking for documents. It also cuts down on the time it takes to recreate files when an employee can't find the original.
To control files over time, here are some tips.
-Delete unnecessary files
-Take immediate action on files you encounter
-Consolidate files when possible
-Have less folders as possible
Write the algorithmic description& draw a flow chart to find product of the first 10 counting numbers
Answer:
n!
\(p = 1 \\ for \: n = 1 \: to \: 10 \: step \: 1 \\ p = p*n \\ next \\ print \: p\)
Spreadsheet software enables you to organize, calculate, and present numerical data. Numerical entries are called values, and the
instructions for calculating them are called.
Answer:
It's called coding frame
How does a network-based IDPS differ from a host-based IDPS? List and describe the three control strategies proposed for IDPSs.
A signature-based IDPS is sometimes called a pattern-based IDPS.
It has been identified that known patterns of the malicious behavior based on the signatures or predefined patterns of known attacks. In other words, it looks for the specific characteristics that have been previously identified as the indicators of the malicious activity.
Signature-based IDPSs use the database of signatures to detect malicious activity, which is constantly updated to keep up with new threats. When an IDPS detects an event that matches a signature in its database, it triggers an alert, and the system can take specific action to prevent the attack.
Learn more about database on:
https://brainly.com/question/30634903
#SPJ1
RAM requires a power source to store data.
Question 10 options:
True
False
RAM is a type of memory which requires a power source to store data is referred to as a true statement.
What is RAM?This is referred to as Random Access Memory and is a volatile memory which is used in the storage of working data and machine codes.
This type of memory requires a power source for the data to be retrieved or stored at that point in time which is why True was chosen as the most appropriate choice in this context.
Read more about RAM here https://brainly.com/question/13748829
#SPJ1
Answer:
true
Explanation:
took test
Someone who expects other team members to work long hours is possibly from a _________ culture.
Participative
Competitive
Cooperative
Answer:
I'm pretty sure cooperative is the answer.
I hope this helps...
Have a nice day <3
2/ kinite a program in pascall language that prompts the user to enter the amount of fe as paid. When the amount of fees paid is less than 20000 the program displays a message cyber services denied
Answer:
Examples of few editors include Windows Notepad, OS Edit command, Brief, Epsilon, EMACS, and vim or vi. Name and version of text editor can vary on different operating systems. For example, Notepad will be used on Windows and vim or vi can be used on windows as well as Linux or UNIX.
Explanation: If this is not what your look for then am sorry but i can't help you.
timeline:
At least three different historical periods in time to examine and explore in terms of art
and photography as well as our current time period (you will therefore research four time
periods in total).
• For each historical period that you choose, as well as the current time period:
• Explore and identify at least one artistic theme associated with this period
• Explore and identify at least one artistic trend associated with this period
• Explore and identify the most popular or relevant photographic styles used during this period
Explore and identify the most popular or frequently photographed subjects during this period
O
Now for the fun part! Your timeline should feature more images, graphics, and visual
components than text. While you will certainly need to include text to further explain the
images that you include and the research that you do, you want your timeline to ultimately
appear as a beautiful work of art-a visual exploration through the history of photography
neral. This timeline can be created using any program you wish, or feel free to
The timeline is a representation of a chronological sequence of events that occurred in a specific period. It is an important aspect of analyzing art and photography. Below are the three historical periods, art themes, and trends associated with the era, photographic styles, and most popular or frequently photographed subjects during the period:1.
Renaissance Period (1400-1600)Art Theme: Religious themes, classic myths, and historical events were a prominent theme.
Trend: The dominant trend during this period was the perfection of art as a skill. A focus on balance, symmetry, and realistic human features.
Photographic Style: There were no photographs at this time. The art was created by paint and other art forms.Most Popular/Frequently Photographed Subjects: People, daily life, architecture, and nature2.
Modernism Period (1900-1930)Art Theme: Experimental, abstraction, and simplification were the prominent art themes.
Trend: The dominant trend was the change of perception towards art and creative representation.
Photographic Style: During this period, photographers shifted their interest in capturing events in reality to exploring the abstract.
Most Popular/Frequently Photographed Subjects: Human faces, motion, and landscape3.
Postmodernism Period (1960-1990)Art Theme: The prominent art theme was the exploration of cultural differences and diversity.
Trend: The dominant trend was the creation of art that served as a critique to modernism.
Photographic Style: Photography became a primary source of artistic expression, and photographers created various styles.
Most Popular/Frequently Photographed Subjects: Social changes, women's rights, multiculturalism, and globalization.In conclusion, exploring the history of photography is an essential aspect of analyzing art and understanding the various artistic themes, trends, styles, and subjects that dominated each period.
For more such questions on Renaissance Period, click on:
https://brainly.com/question/879750
#SPJ8
Software developers can use a(n) _____ to help them create diagram-like flowcharts.
A.
visual design tool
B.
code repository
C.
online editor
D.
development environment
Answer:
Software developers can use a flowchart software or tool to help them create diagram-like flowcharts. These tools provide a visual representation of the steps or processes involved in a program or system and can help developers identify areas for optimization or improvement. Some examples of flowchart software include Microsoft Visio, Lucidchart, and SmartDraw.
Explanation:
application of computer in insurance
Answer:
To keep a list of insured members in the offices.
Explanation:
Compunters can be used to keep records of insured individual and their details
What is Difference between Data and information
Answer:
Data is an individual unit that contains raw material which does not carry any specific meaning.
Information is a processed, organised data presented in a given context and is useful to humans.
Information is a group of data that collectively carry a logical meaning.
What does this function do? How to write a docstring for it?
def product(factors):
i = factors[0]
for p in factors[1:]:
i *= p
return i
Answer:
def product(factors):
'''Returns the product of all the numbers in the list factors.'''
i = factors[0]
for p in factors[1:]:
i *= p
return i
the docstring is a string that is the first statement in a function.
At what layer in the TCP/IP protocol hierarchy could a firewall be placed to filter incoming traffic by means of:
a) message content
b) source address
c) type of application
The answer is c) type of application
The most significant protocol at layer 3, often known as the network layer, is the Internet Protocol, or IP.The IP protocol, the industry standard for packet routing among interconnected networks, is the source of the Internet's name. Thus, option C is correct.
What are the TCP/IP protocol hierarchy could a firewall?Application-layer firewalls operate at the TCP/IP stack's application level (all browser traffic, or all telnet or ftp traffic, for example), and thus have the ability to intercept any packets going to or from an application. They stop different packets (usually dropping them without acknowledgment to the sender).
Firewalls are frequently positioned at a network's edge. An external interface is the one that is located outside the network, while an internal interface is the one that is located inside the firewall.
Therefore, The terms “unprotected” and “protected,” respectively, are sometimes used to describe these two interfaces.
Learn more about TCP/IP here:
https://brainly.com/question/27742993
#SPJ2
How many discussion posts must you complete to meet the Expectations of the replies category
Answer:
I want to take this time to discuss a few expectations and helpful information about how to participate in the weekly online discussions. You can scroll down the page or use the links here to navigate to each section. All Discussions can be found by clicking on the Discussions link located on the left-hand side of the course.
Explanation:
Participation in the discussion forums is critical for maximizing student learning in this course, both because your participation is graded and because it's a chance to engage in a dialogue about course material. In this course, students are required to be a part of an online community of learners who collectively interact, through discussion, to enhance and support the professional performance of each other. Part of the assessment criteria for the course includes evaluating the quality and quantity of your participation in the discussion forum.
The TAS will facilitate student discussions, although they likely will not address every single post. In most cases, they might share a related idea, intervene when the discussion goes off-track, or tie student comments together to help deepen student learning. Remember, if you have a specific question, pose
Write a switch statement to select an operation based on the value of inventory. Increment total_paper by paper_order if inventory is 'B' or 'C'; increment total_ribbon by ribbon_order if inventory is 'D', 'F', or 'E'; increment total_label by label_order if inventory is 'A' or 'X'. Do nothing if inventory is 'M'. Display error message if value of inventory is not one of these 6 letters.
Answer:
switch(inventory){
case B || C:
total_paper += paper_order;
break;
case D || F || E:
total_ribbon += ribbon_order;
break;
case A || X:
total_label += label_order;
break;
case M:
break;
default:
console.log("Error! Invalid inventory value");
}
Explanation:
The switch keyword is a control statement used in place of the if-statement. It uses the 'case' and 'break' keywords to compare input values and escape from the program flow respectively. The default keyword is used to accommodate input values that do not match the compared values of the cases.
The document ____ provides a systems developmental lifecycle approach to security assessment of information systems.
A) SP 800-53 A, Jul 2008: Guide for Assessing the Security Controls in Federal Information Systems: Building Effective Security Assessment Plans
B) SP 800-53 Rev. 3: Recommended Security Controls for Federal Information Systems and Organizations
C) SP 800-41 Rev. 1: Guidelines on Firewalls and Firewall Policy
D) SP 800-14: Generally Accepted Principles and Practices for Securing Information Technology Systems
The document that provides a systems development lifecycle approach to the security assessment of information systems is B) SP 800-53 Rev. 3: Recommended Security Controls for Federal Information Systems and Organizations.
The SP 800-53 Rev. 3 document is a comprehensive set of security controls and assessment procedures for Federal information systems and organizations. This document provides a systems development lifecycle approach to security assessment, which covers all phases of the systems development lifecycle, from conception to disposal. The focus is on assessing and implementing security controls that protect information systems and the data they process, store, and transmit.
The SP 800-53 Rev. 3 document provides recommendations for security controls that should be implemented in information systems to protect against potential threats. The security controls are organized into families, such as access control, awareness and training, audit and accountability, security assessment and authorization, etc. This document also explains how to assess the effectiveness of security controls and how to implement them.
Learn more about The SP 800-53 Rev. 3 document here: https://brainly.com/question/14859626.
#SPJ4
The company is especially concerned about the following:
Account management. Where will accounts be created and managed?
How will user authentication be impacted? Will users still be able to use their current Active Directory credentials to sign into their devices and still access resources on the local Active Directory network?
Securing authentication in the cloud.
Address the following based on the given information:
Explain how you can implement a Microsoft Intune device management solution and still allow Tetra Shillings employees to use their existing on premises Active Directory credentials to log onto the local network.
What controls and methods are available Azure Active Directory and Intune for controlling access to resources?
What Methods are available in Intune to detect when user accounts get compromised.
What actions can be taken to prevent compromised credentials from being used to access the network.
Write a c++ program that generates three random numbers. The first number should be between 0-30, the second number should be between 30-60 and the third number should be between 60-90.
Answer:
#include <stdlib.h>
#include <time.h>
#include <iostream>
using namespace std;
int main() {
srand(time(NULL));
cout << rand() % 30 << endl;
cout << rand() % 30 + 30 << endl;
cout << rand() % 30 + 60 << endl;
}
Explanation:
rand() returns a pseudo-random integral number in the range between 0 and RAND_MAX. By applying the modulo operator, you map that to the desired range (30 in your case), then you add an offset.
what is the role of course management systems such as blackboard in education?
Answer:
The answer to this question is given below in the explanation section.
Explanation:
Role of course management system varies among organizations. The course management system is a set of tools, application and environment that allow the organization, teacher/ instructor to manage courses online.
There are many course management systems, such as blackboard, moodle, etc. Course management systems allow organizations to manage courses online and deliver course content to their learner either online or offline. Course management systems help organizations to manage students online and enroll them in their respective courses.
Course management system help educationist in managing students, their attendance, assignment, and grades , etc. It also allows the student to see their course progress as they go along the course. It makes it easier for educationists and educational institute to manage their students.
Which popular video game franchise has released games with the subtitles World At War and Black Ops?
Answer:
Call of duty i think has released those games
Answer:
IT WAS CALL OF DUTY
Explanation:
Name three risks of developing a stragtic role for information systems in a business. Explain one risk in more detail..
One risks of developing strategic role for information systems is the possibility of overspending on IT projects which may not generate the desired returns on investment.
What is the risk of overspending on IT projects?Today, businesses are engrossed with latest and greatest technological advancements which leas to overspending on IT projects that may not ultimately provide the intended value.
This risk can arise from a lack of understanding on how technology fits into business strategy or failure to properly assess the potential benefits and risks of new IT initiatives.
In an overall, the overspending on IT projects can lead to financial strain and can ultimately harm the business's ability to achieve its strategic goals.
Read more about strategic role
brainly.com/question/28332723
#SPJ1
Need help please asapp
Answer:
B
Explanation:
0.05 is the decimal form of 5%
So the sale amount times 0.05 will give the tax amount
Hope this helps!
3. What workplace hazards can be found on picture A?
4-5. Describe the workplace A and B, What are their differences
Answer:
HakdogExplanation:
kase hakdog ka kainin mo tite koThis is for computer technology please help me out!
Answer:
bag = 2
Explanation:
apples + oranges > 20 is false
apples + oranges > 15 although it is 15, its false. If it was apples + oranges >= 15 it would be true. But it doesn't so that's false.
apples + oranges > 10 is true, and when you run it, bag will equal to 2.
hope this helped :D
Which of the following is a category of group password settings in Microsoft Windows? (Choose all that apply.)A - Password Policy SettingsB - Account Policy SettingsC - Password Lockout PolicyD - Account Lockout Policy
Group password settings in Microsoft Windows are under the Password Policy Settings and Password Lockout Policy categories.
What are Password Policy Settings?A password policy is a set of rules created with the goal of boosting computer security by encouraging users to use strong passwords. The official regulations of a firm typically include a password policy, which is something that security awareness training may touch on. Users are either required by the computer systems to follow the password policy, or the policy is only recommended. A number of countries have created national authentication frameworks that specify criteria for user authentication to government services, including password requirements.
How do I find my password policy?By utilizing the management console's Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Account Policies -> Password Policy or the PowerShell command Get-ADDefaultDomainPasswordPolicy, you may retrieve your current AD password policy for a particular domain.
Group password settings in Microsoft Windows are under the Password Policy Settings and Password Lockout Policy categories.
To learn more about Password Policy Settings refer to:
https://brainly.com/question/29392724
#SPJ4
Assume you are given a boolean variable named isNegative and a 2-dimensional array of ints that has been created and assigned to a2d. Write some statements that assign true to isNegative if more integer elements in entire 2-dimensional array are negative than not.
Answer:
#include <iostream>
using namespace std;
int main(){
int rows, cols;
bool isNegatives;
cout<<"Rows: ";
cin>>rows;
cout<<"Columns: ";
cin>>cols;
int a2d[rows][cols];
for(int i =0;i<rows;i++){
for(int j =0;j<cols;j++){
cin>>a2d[i][j];} }
int negatives, others = 0;
for(int i =0;i<rows;i++){
for(int j =0;j<cols;j++){
if(a2d[i][j]<0){
negatives++;}
else{
others++;}} }
if(negatives>others){
isNegatives = true;}
else{
isNegatives = false;}
cout<<isNegatives;
return 0;
}
Explanation:
For clarity and better understanding of the question, I answered the question from the scratch.
This line declares number of rows and columns
int rows, cols;
This line declares the Boolean variable
bool isNegatives;
This line prompts user for rows
cout<<"Rows: ";
This line gets the number of rows
cin>>rows;
This line prompts user for columns
cout<<"Columns: ";
This line gets the number of columns
cin>>cols;
This line declares the array
int a2d[rows][cols];
This line gets user input for the array
for(int i =0;i<rows;i++){
for(int j =0;j<cols;j++){
cin>>a2d[i][j];} }
This line declares and initializes number of negative and others to 0
int negatives, others = 0;
The following iteration counts the number of negatives and also count the number of non negative (i.e. others)
for(int i =0;i<rows;i++){
for(int j =0;j<cols;j++){
if(a2d[i][j]<0){
negatives++;}
else{
others++;}} }
This checks of number of negatives is greater than others
if(negatives>others){
If yes, it assigns true to isNegatives
isNegatives = true;}
else{
If otherwise, it assigns false to isNegatives
isNegatives = false;}
This prints the value of isNegatives
cout<<isNegatives;
See attachment