Part 1

In this exercise, you will first create a simple volume using Disk Management utility. You will then expand the simple volume.

Part 2

In this exercise, you will create a folder called Data, share the folder, and then configure the NTFS and share permissions for that folder. Give access to the user called Hannah Dorner from your active directory (create the user in AD if it doesn't exist).

Part 3

In this exercise, you will create a virtual hard disk (VHD) using Disk Management utility, then initialize it and assign drive letter E: to it. Once you capture screenshot, unmount and delete the VHD.

Answers

Answer 1

To create a simple volume using Disk Management:

1. Open Disk Management by pressing Windows key + X and selecting Disk Management from the list.

2. Right-click on the unallocated space and select New Simple Volume.

3. Click Next and follow the wizard to create a simple volume.

4. Once the volume is created, you can right-click on it and select Extend Volume to expand it.

What are the steps to create a simple volume, folder, and virtual hard disk in Windows using Disk Management?

Part 1:

To create a simple volume using Disk Management utility, follow these steps:

1. Open Disk Management by pressing Windows key + X and selecting Disk Management from the list.
2. Right-click on the unallocated space and select New Simple Volume.
3. Click Next and follow the wizard to create a simple volume.
4. Once the volume is created, you can right-click on it and select Extend Volume to expand it.

Part 2:

To create a folder called Data, share the folder, and configure the NTFS and share permissions for that folder, follow these steps:

1. Create a new folder on your computer and name it Data.
2. Right-click on the folder and select Properties.
3. Click on the Sharing tab and click the Share button.
4. Select the user Hannah Dorner and click Add.
5. Set the permission level to Read/Write and click Share.
6. Click on the Security tab and click the Edit button.
7. Click Add and type in Hannah Dorner.
8. Set the permission level to Modify and click OK.

Part 3:

To create a virtual hard disk (VHD) using Disk Management utility, initialize it, assign drive letter E: to it, capture a screenshot, unmount, and delete the VHD, follow these steps:

1. Open Disk Management by pressing Windows key + X and selecting Disk Management from the list.
2. Click on the Action menu and select Create VHD.
3. Choose a location and size for the VHD and click OK.
4. Right-click on the disk and select Initialize Disk.
5. Choose the partition style and click OK.
6. Right-click on the unallocated space and select New Simple Volume.
7. Follow the wizard to create a new partition and assign it the drive letter E:.
8. Capture a screenshot of the Disk Management window.
9. To unmount the VHD, right-click on the disk and select Detach VHD.
10. To delete the VHD, right-click on the disk and select Delete Volume.

Learn more about simple volume

brainly.com/question/31926192

#SPJ11


Related Questions

____________ programming should be able to address the wide variety of needs of the delinquent girl.

Answers

Gender-responsive programming should be able to address the wide variety of needs of the delinquent girl.

Gender-responsive programming acknowledges and takes into account the unique experiences, challenges, and needs of girls and women. When it comes to addressing the needs of delinquent girls, it is crucial to adopt an approach that considers their specific circumstances and vulnerabilities.

Gender-responsive programming recognizes that girls involved in delinquent behavior often have distinct backgrounds and experiences compared to their male counterparts.

It takes into account factors such as trauma, victimization, family dynamics, mental health, and socialization patterns that may contribute to their delinquency.

To learn more on Programming click:

https://brainly.com/question/14368396

#SPJ4

Individuals connect to the Internet through an __ (1) __ allowing them access to the system. The rules on the Internet for how messages are addressed and passed on are called __ (2) __ .

Answers

Answer:

1. Internet service provider (ISP)

2. Protocols.

Explanation:

Individuals connect to the Internet through an Internet service provider (ISP) allowing them access to the system. An ISP is a telecommunication company that provides internet services for other internet providers i.e they act as a backbone.

The rules on the Internet for how messages are addressed and passed on are called protocols.

A protocol can be defined as a standard set of rules established by the regulatory agencies to determine how data are transmitted from one network device to another.

Generally, the standard Internet communications protocols which allow digital computers to transfer (prepare and forward) data over long distances is the TCP/IP suite.

An information system is a large and highly-specialized server that hosts the database for large businesses, generally those with over 10,000 employees.
False

Answers

The given statement "An information system is a large and highly-specialized server that hosts the database for large businesses, generally those with over 10,000 employees" is False because it helps to automate time-consuming processes and provides insight into the business's operations.

What is an information system?

An information system is a set of processes, equipment, and people that collect, store, and distribute data. It aids in decision-making by providing valuable information. It's an essential component of any organization.

Examples include transaction processing systems, management information systems, decision support systems, and executive information systems.

Therefore the correct option is  False

Learn more about An information system:https://brainly.com/question/14688347

#SPJ11

PLSSS HELLLP!!! THE CROWN WILL BE REWARDED FOR THE CORRECT ANSWER!!!

When creating technical writing document, the author should consider _____. Choose all that apply.

Group of answer choices

the setting

the purpose

the audience

the imagery

the organization

Answers

Answer:

The audience

Explanation:

The correct option is - The audience

Reason -

When writing a technical document -

Always describe things in technical terms.

Write for your readers.

Describe things exactly as they're described to you by subject matter experts.

Technical writing :

Addresses particular readers.

Helps readers solve problems.

Wanda is taking photos using a lens that sees and records a very narrow view with a focal length longer than 60mm. When her friend asks what type of lens she is using for their photography outing,

Answers

Answer:

a telephoto lensExplanation: It's on Quizlet lol

And I got it correct on the test...

It provides an instant 2x optical zoom and has a focal length that is twice that of the primary lens. Additionally, it has a limited field of view, which causes distant things to resemble those that are nearby.

What role of telephoto lens in taking photos?

Simply put, a telephoto lens deceives the eye into thinking a topic is closer than it actually is. This may be the best option for photographers who are physically unable to go close to their subjects or who are concerned for their safety.

With a telephoto lens, the background elements appear larger and nearer to the foreground elements. The converse is true with wide-angle lenses, which make background elements appear smaller and farther away from the camera.

Therefore, a telephoto lens Wanda uses a lens longer than 60 mm in focal length to capture images with a very small field of view. When her friend inquires about the lens she will be using on their photographic excursion.

Learn more about telephoto lens here:

https://brainly.com/question/15599633

#SPJ2

In a single paragraph, write about the connections between web servers and web pages. Select and differentiate between their various characteristics and how they work together.

Edge please don't copy paste, 20 points

Answers

Answer:

web servers hold all the info that the website has on it, most servers hold multiple websites

Explanation:

Answer:

web servers hold all the info that the website has on it, most servers hold multiple websites

Explanation:

What is a semiconductor

Answers

A semiconductor material has an electrical conductivity value falling between that of a conductor, such as metallic copper, and an insulator, such as glass. Its resistivity falls as its temperature rises; metals behave in the opposite way. I hope this helps and have a great day! (Also brainliest would be appreciated but you don’t have to) :)

Answer:

Explanation:

Semiconductors are materials which have a conductivity between conductors  and nonconductors or insulators.

Semiconductors can be pure elements

The area that holds all the startup instructions the computer needs to start is ________. A) RAM
B) ROM
C) USB
D) CPU

Answers

The area that holds all the startup instructions the computer needs to start is the ROM. The correct answer is B) ROM (Read-Only Memory).

ROM is a type of memory in a computer system that stores permanent instructions or data that cannot be modified. It contains firmware or software instructions that are written during the manufacturing process and remain unchanged throughout the life of the computer. The startup instructions, also known as the computer's firmware or BIOS (Basic Input/Output System), are stored in the ROM. When a computer is powered on, the ROM is the first memory component accessed by the CPU (Central Processing Unit). The startup instructions stored in the ROM provide the initial set of instructions that the computer needs to boot up and initiate the operating system. These instructions perform various tasks, including hardware initialization, system diagnostics, and loading the operating system into the computer's RAM (Random Access Memory). Unlike RAM (Random Access Memory), which is volatile and loses its contents when power is turned off, ROM retains its data even when the computer is powered down. This makes ROM an ideal storage medium for storing critical startup instructions that are required every time the computer is booted.

learn more about BIOS (Basic Input/Output System) here:

https://brainly.com/question/13092385

#SPJ11

An apple cake recipe calls for 454 grams of apples and 50 grams of raisins. How many kilograms of fruit are needed to make 12 cakes?

Answers

Answer:

9.08

Explanation:

Because 454 divided by 50 is 9.08

the hose is 2 inches in diameter. What circumference does the plug need to be? remember to type just a number

Answers

Answer:

6.28

Explanation:

This problem bothers on the mensuration of flat  shapes, a circle.

Given data

Diameter d= \(2in\)

Radius r =  \(\frac{d}{2} = \frac{2}{2} = 1in\)

We know that the expression for the circumference of a circle is given as

\(C= 2\pi r\)

Substituting our given data and solving for C we have

\(C= 2*3.142*1\\C= 6.28\)

In contrast to meetings that take place in a person a webcast offers the advantage of

Answers

Answer: being available for retransmission any time after the original event has taken place.

Explanation:

What is the keyboard shortcut for the Undo command?
Choose the answer.
CTRL+X
CTRL+Z
CTRL+U
CTRL+V​

Answers

Answer:

CTRL+Z is Undo

Explanation:

CTRL+X: Cut

CTRL+Z: Undo

CTRL+U: Underline

CTRL+V: Paste

What are some restrictions that should apply to sensitive and confidential data? check all that apply.

Answers

Some special protocol should be applied to sensitive and confidential data.

While dealing with sensitive and confidential data, some special protocols must be followed to ensure its safety. The data should be managed efficiently which requires diligent organization. Encrypted media devices must always be used for storage and as a further step the data itself can be encrypted as well. The data should have restricted access both by personnel and location. It should be backed up in a safe location.

You need to apply some special protocol or restriction to sensitive and confidential data in a way that:

Data must be stored on encyrpted media online that prevents cyber secuity issues. Data should always be protect from unauthorized access. Ensure and implement safegauards against data encryption and decryption from unauthorized access.

The data should always be accessed with care, must never be shared with an unauthorized third party and should have a strong passcode. End- to – end encryption should be used for online transfers. Access to the data must only be available on-site and should be monitored and documented at all times.

Failure to properly safeguard sensitive and confidential data is a breach of trust which not only affects departments or projects integrity but also opens individuals and/or organizations up to legal liabilities.

You can learn more about confidential data at

https://brainly.com/question/27208943

#SPJ4

you've just installed a new device on your windows system. after installation, you can't use the device. you check device manager and find an icon with a yellow exclamation mark. what is the best first step for resolving the device issue?

Answers

From the manufacturer's website, download the most recent driver. Getting the most recent driver for the device would be the first thing to try.

What does yellow exclamation mark on Device Manager indicate?Under Other devices, if a device has a yellow circle with an exclamation point, it means that other hardware is in conflict with it. It could also mean that the device's drivers weren't properly installed. When you double-click and open the problematic device, an error code is displayed.Go to Start. To open the console, perform a search for Device Manager and select the top result. The device with the yellow exclamation point can be selected by right-clicking it and choosing Update driver.The extracted folder containing the driver update should be chosen.Select Include subfolders from the menu.Then press the Next button.Select Close from the menu.

To learn more about : Device Manager

Ref : https://brainly.com/question/28249704

#SPJ4

how to get rid of this weird line at the top of my screen

how to get rid of this weird line at the top of my screen

Answers

It's difficult to provide a solution without more information about the nature of the line you're seeing, the device you're using, and the software you're running.

What is computer screen?

However, here are a few general troubleshooting steps you can try:

Restart your device: Sometimes a simple restart can fix many software-related issues.

Check for updates: If you're using a device that's running an operating system, check if there are any available updates. Installing updates can often fix bugs and improve the overall performance of your device.

Run a virus scan: If you suspect that the line may be caused by malware, run a virus scan using your preferred antivirus software.

Check your display settings: Depending on your device and operating system, you may be able to adjust display settings, such as the resolution or refresh rate. Experiment with adjusting these settings to see if it resolves the issue.

Lastly, Seek technical support: If none of the above steps work, consider seeking technical support from the manufacturer of your device or from a qualified technician. They may be able to diagnose and fix the issue more effectively.

Learn more about computer screen from

https://brainly.com/question/9017156

#SPJ1

you have purchased new computers and will be disposing of your old computers. instead of recycling the computers, you decide to resell them by placing an ad on the internet. these computers were previously used for storing sensitive information. to properly protect the accidental discovery of the company's sensitive information, which of the following steps must be completed prior to getting rid of the computers?

Answers

Given that one has just purchased new computers and will be disposing of the old ones, where instead of recycling the computers, one decides to resell them by placing an ad on the internet,

If these computers were previously used for storing sensitive information, to properly protect the accidental discovery of the company's sensitive information, the steps that must be completed prior to getting rid of the data in the old computer is "Use data deletion software to clear the hard drives"

How can sensitive information be protected?

Encryption is the most efficient way to prevent unwanted access to your data.

Encryption is the process of converting data into an alternate format that can only be read by someone who has access to a decryption key. There are several options available for encrypting data stored on your PC.

Learn more about sensitive information:
https://brainly.com/question/28499853
#SPJ1

ESSAY: In two or three sentences,
\( - \)
write your idea on how your knowledge in identifying, selecting and using appropriate kitchen tools, equipment and paraphernalia affects your life. ​

Answers

Answer:

Being able to use tools in the kitchen is essential for basic tasks. Knowing what to use helps to perform tasks properly such as cutting a lemon or peeling an apple. Not knowing how to use such tools can cause accidents that could've been avoided.

A car showroom consists of N numbered spaces. Each space can hold at most one car. The spaces are indexed starting from 0 though the last space, N - 1. No two cars in the showroom are the same model. Write the CarShowroom method findCarSpace. This method returns the index of the space in which the car with the specified model is located. If there is no car of that model in the showroom, the method returns -1. Then write the CarShowroom method consolidate. This method should move the cars so that cars in adjacent spaces, starting at index 0, have no empty spaces between any two cars. Keep the order of the cars the same as the array in the code shows.

Answers

The CarShowroom method find function of CarSpace takes a car model as a parameter and returns the index of the space containing the car with that model. The Car Showroom method consolidate moves the cars in the showroom so that no empty spaces are between any two cars, while preserving the order of the cars.

The CarShowroom class contains two methods: findCarSpace and consolidate. The findCarSpace method takes a car model as a parameter and returns the index of the space in which the car with the specified model is located. If no car with that model is present in the showroom, the method returns -1. This method is useful for finding a car in a showroom with many cars. The consolidate method moves the cars in the showroom so that no empty spaces exist between any two cars. This method preserves the order of the cars, so that the cars are still in the same order as the array in the code shows. This method is useful for organizing a showroom with many cars, as it ensures that cars are spaced evenly and that no cars are hidden behind other cars.

Learn more about functions here-

brainly.com/question/28939774

#SPJ4

What can Sami add to her webpage to make important text stand out?
color
music
animations
images

Answers

What can Sami add to her webpage to make important text stand out? O Color O Music O Animations ... Color and bold font and use images.
(Color )
Sami can use a variety but in these four options, bold would work but since that is not an option, it will be color.

Classes in UML are implemented as tables in a relational database and individual instances of the class are implemented as

Answers

The answer is rows in the table

what is the purpose of the switch command switchport access vlan 99?
a. to enable port security
b. to make the port operational
c. to assign the port to a particular VLAN
d. to designate the VLAN that does not get tagged
e. to assign the port to the native VLAN (VLAN 99)

Answers

The switch command "switchport access vlan 99" aims to assign the port to a particular VLAN. The answer is C. to assign the port to a particular VLAN.

The "switchport access vlan 99" command allocates a specific VLAN (Virtual Local Area Network) to a network infrastructure's Ethernet switch port. Using this command to configure a switchport, any device connected to that port will be added to VLAN 99. VLANs enable network administrators to partition a physical network conceptually into numerous virtual networks, improving network security, performance, and manageability. The "switchport access vlan 99" command ensures that all traffic received or sent through the specified switch port is associated with VLAN 99, allowing for network traffic isolation and management inside that specific VLAN.

Learn more about VLAN here: https://brainly.com/question/31136256.

#SPJ11      

     

This activity will help you meet these educational goals:

Content Knowledge—You will determine the importance of computer skills, organizational structures, labor laws, community programs and managerial qualities in an industry of your choice.

Inquiry—You will conduct online research in which you will collect information, make observations, and communicate your results in written form.

21st Century Skills—You will use critical thinking and problem solving skills, and communicate effectively.



Introduction

In this activity, you will analyze the role of computer skills, organizational structures, labor laws and community programs, and managerial skills and qualities.

__________________________________________________________________________



Directions and Analysis

Task 1: Role of Computer Skills in an Industry

In this activity, you will understand the importance of computer skills in an industry by completing the following tasks:

Select an industry of your choice. With the help of online research, explain how computer skills are necessary for the industry’s management team.

Discuss how these skills are important in terms of planning, marketing, and use of financial resources.

Discuss the ways in which a person should aim to upgrade their skills, and also discuss why this process is of importance.



Type your response here:



Law, Public Safety, Corrections & Security









Task 2: Industry, Profession, and Social Issues

In this activity, you will choose an industry of your choice and conduct an online research. You will read relevant content, take notes, and summarize the information in your own words.





Then, you need to write a paper covering the following:



Identify and describe labor issues that include employment opportunities, workers' rights and privileges, and growth opportunities in the industry.

Identify various community programs and other services that the selected industry offers to the members of the community. Also, discuss how the community affects the industry in terms of the demand for products and services, the target customer base, and the employee base.

Discuss financial responsibility within the industry.



Type your response here:













Task 3: Organizational Structures and Managerial Skills

In this activity, you will understand the role of organizational hierarchy and management skills by completing the following tasks:

Conduct online research and explore common organizational structures in any industry of your choice.

Discuss the different qualities and skills that managers working in such an industry should possess.



Type your response here:











Task 4: Diversity Awareness

Most people encounter someone at school or at work with whom they don’t really associate. Pick someone in your school whom you may have classes with but don’t really know. Write down what you think you know about the person. Then, speak with that person and write a response about what you have learned. Write an additional paragraph at the end, discussing how taking the time to get to know someone can make a difference.



Type your response here:











What are nontraditional groups? Write about nontraditional groups and the potential employment barriers for these groups. Also write about ways to overcome these barriers.



Type your response here:













Task 5: Conflict Resolution Skills

Think of a recent occasion when you became upset with a friend or family member. How did you handle the situation? How did you confront the person involved in the situation? Did you identify the problem together with the person or persons involved in the situation? What was the solution? Did you request help from an unbiased third party to reach a solution if the problem persisted.



Type your response here:















__________________________________________________________________________

Answers

Answer:

Explanation:

Content Knowledge—You will determine the importance of computer skills, organizational structures, labor laws, community programs and managerial qualities in an industry of your choice.  Inquiry—You will conduct online research in which you will collect information, make observations, and communicate your results in written form.  21st Century Skills—You will use critical thinking and problem solving skills, and communicate effectively

Simulate the 2-input XOR gate using the University Waveform VWF and QSIM In the next step, we want to test if the digital logic circuit works the way it is intended. To be able to do this, we have to let the software check for errors first. To do that, click on the blue triangle next to "Analysis and Synthesis". Make sure that your Top-level file matched the name of your schematic design file. Task 0-2: Simulate the 2-input XOR gate using the University Waveform VWF and QSIM nclude a picture of your Quartus simulation (timing diagram) here Please answer the following questions 1. 2. 3. How do you expect the output of a 2-input XOR gate to behave? What tests did you perform to verify your logic circuit? Did the circuit behave as expected? If no, what was wrong?

Answers

Only when exactly one of an XOR gate's inputs is true is the output true.  If both inputs are "true," the output is "true," otherwise, it is "false."

The output of an XOR gate is false if either one of its inputs is true or if both of its inputs are false. An XOR gate's functionality is dependent on how it is implemented if it has more than two inputs. The logical "either/or" is equivalent to how the XOR (exclusive-OR) gate operates. If any of the inputs is "true," but not both, then the output is "true." If both inputs are "true," the output is "true," otherwise, it is "false."

Learn more about output here-

https://brainly.com/question/18133242

#SPJ4

Will MARK BRAINLIST
What refers to the level at which a player is interacting with a story or game?

Group of answer choices


engagement


flow


emotion


distance

Answers

I’m not 100% sure... but I think the answer is engagement.

Hope this helped!

Identify the data type of each variable as either int, float, string, list, or boolean.

Identify the data type of each variable as either int, float, string, list, or boolean.

Answers

Data type of each variable is:

i-int

j-string

k-string

m-boolean

n-list

p-float

q-integer

r- boolean

s-int

t- string

u-string

v- float

w-string

What are data types?

Data is categorized into different types by a data type, which informs the compiler or interpreter of the programmer's intended usage of the data. Numerous data types, including integer, real, character or string, and Boolean, are supported by the majority of programming languages. Today, binary data transfer is the most widely used type of data transport for all devices.

A collection of 0s and 1s arranged in a precise order makes up a binary kind of data. Every piece of information is translated to binary form and used as needed. Another set of binary data is connected to this binary form to define the type of data being carried since this binary form does not specify what it is carrying. Variables are specific storage units used in computer programming that hold the data needed to carry out tasks.

To know more about Data, check out:

https://brainly.com/question/19037352

#SPJ1

Which snippet of code is in XML?​

Which snippet of code is in XML?

Answers

Answer:

The top left

Explanation: It uses XML Syntax

Answer: Bottom left '<cd>'

Explanation:

PLAYTO i got it right

talis shoots a photo with his 20 megapixel digital camera. how is the image stored as digital data? group of answer choices as a collection of lines in the primary colors format of rby as a combination of letters, numbers, and symbols as a list of the binary color numbers for all the pixels it contains

Answers

Since Talis shoots a photo with his 20 megapixel digital camera, the way that the image is stored as digital data is option  D)As a list of the binary color numbers for all the pixels it contains.

Pixels come in what shades?

Information that is electronically represented in a language or format that computers can read and interpret is known as digital data. Digital data is information that has been translated from a binary format into a machine-readable digital format, to use more technical terminology.

Therefore, Each pixel on a display actually comprises of the three colors red, green, and blue. These three colors combine to produce a color on the screen. The RGB value of the pixel is a common term for these. Consider, for illustration, that a pixel can have 256 possible values for red, green, and blue, ranging from 0 to 255.

Learn more about digital camera from

https://brainly.com/question/22789334
#SPJ1

See full question below

Talis shoots a photo with his 20 megapixel digital camera. How is the image stored as digital data?

A)As a collection of lines

B)In the primary colors format of RBY

C)As a combination of letters, numbers, and symbols

D)As a list of the binary color numbers for all the pixels it contains

What marking (banner and footer) acronym (at a minimum) is required on a DoD document containing controlled unclassified information?
A. FOUO

B. IAW

C. Unclassified

D. CUI - Correct Answer

Answers

CUI is required on a DoD document containing controlled unclassified information.

What is DoD document?
The Department of Defense (DoD) document is a document that is issued by the US Department of Defense (DoD). This document is a set of regulations that govern the activities of the Department of Defense and its personnel. The DoD document establishes the authority, responsibility, and oversight for the Department of Defense and its personnel. It also outlines the rules, procedures, and policies for the department's activities. The document is used to ensure the Department of Defense is following its mission and achieving its goals. The document is updated from time to time to reflect changes in the laws and regulations governing the department. The DoD document is an important document that ensures the Department of Defense is meeting its responsibilities and conducting its activities in a professional and responsible manner.

To learn more about DoD document

https://brainly.com/question/27999913
#SPJ1

within windows 8, when does automatic maintenance occur?

Answers

In windows 8, automatic maintenance occurs during periods of system inactivity, which is typically when your computer is idle and not being used. Automatic maintenance is a feature designed to keep your system running smoothly by performing various maintenance tasks.

By default, Windows 8 schedules automatic maintenance to run daily at a specific time if your computer is turned on and idle. The exact timing may vary depending on your system settings and usage patterns.

During automatic maintenance, Windows carries out tasks such as software updates, disk optimization, system diagnostics, and security scans.

The automatic maintenance setting in windows 8 can be adjust by the steps below:

Open the Control Panel by pressing the Windows key + X and selecting "Control Panel" from the menu.Navigate to "System and Security" and click on "Action Center."In the Action Center window, click on "Maintenance" in the left-hand pane.Here, you can modify the automatic maintenance settings according to your preferences. You can change the time when maintenance is scheduled or allow maintenance to wake up the computer from sleep mode.

To learn more about windows: https://brainly.com/question/27764853

#SPJ11

 

the meaning of belt drives

Answers

Answer:

A belt drive is a transmission system that uses a flexible strip to transfer power. The turning disk is connected by a belt drive to the electric motor. A rubber belt drive is used to transfer power from one pulley to another. A belt drive is a transmission system that uses a flexible strip to transfer power.

Explanation:

Other Questions
How did the Reign of Terror during the French Revolution change the way people outside of France view the French Revolution Week 3 Discussion Board ActivityVideo Case: The Profit Ideal Cheese (Season 7 Episode 11)After watching this episode, describe and explain 3 new things you learned (or things you already knew but were reinforced) from this episode. Dont not provide your response in point form. Use full sentences.After explaining the 3 new things, select one of those topics and write approximately 250-350 words (it can be a bit less or a bit more) on that topic. At a minimum, you should explain the concept in more detail, and why it is important in a retail context. You may discuss any other thoughts that you deem are important for a reader to better understand the concept. You may also want to provide examples if it helps to more fully explain the concept and importance.In order to achieve the highest possible marks, provide outside research to help support your views and be sure to cite those references. which person is a stakeholder for a business? multiple choice competitor customer spouse insurance broker Hurry please! Is this the correct order?If you had to do research online for a project on timber wolves, what are 5 steps you should take to make sure you getthe most accurate results for your research? Put the steps in the correct order below.First. Use a search engine to search for timberwolves.Second:Select a website to reviewThird:Look for ou or cow at the end of the beachesult we addressesFourth:Elnareadults that are advertisementsFifth:Review the search Anglo Americans and Mexican Americans are the two largest cultural groups in Texas. T or f what are two features formed by wave deposition Which of the following is a chemical change? A. soil drying as water evaporates B. a rock eroding as the wind removes particles from it C. a solution of salt water being diluted as water is added to it D. silver tarnishing as the silver metal reacts with sulfur H. Cochran, Inc., is considering a new three-year expansion project that requires an initial fixed asset investment of $2,350,000. The fixed asset will be depreciated straight-line to zero over its three-year tax life, after which time it will be worthless. The project is estimated to generate $2,590,000 in annual sales, with costs of $1,610,000. Assume the tax rate is 21 percent and the required return on the project is 11 percent. What is the projects NPV? Given in a plane the points A(-1,4),B(2,3),C(4,5),D(m,7)Calculate m knowing that AB // CDhelppppp step by step Which statement best explains why cells replicate DNA?To make DNA that leaves the nucleus to build proteins.To make new proteins.To make copies of DNA before the cell divides.To make different DNA for specialized cells. On a city street you should be looking ahead of you as far as 44.5 divided by 42.2 Which of the following was designed by a person in the applied arts?a coffee potthe set of a filma famous paintinga ballet Explain how you could build on knowing the decimal form of 1/5, to find the decimal form of 3/5. Then write the decimal. What does satirizing a character in a story mean? Question 1 (Multiple Choice Worth 2 points)(Solving Two-Step Equations MC)Solvey = 1/3Oy=Oy=2/34|3Oy=179(+)for y. Please help, quick!! What does it mean when someone say I try to keep myself busy so I wont have time to feel. Lin solve the equation 8(x - 3) + 7= 2 x (4 - 17) incorrectly find the errors in her solution what should her answer have been political parties prepare a party platform, or policies and principles important to the partys ideology