The Ntuser.dat file loads registry information for the current user logged onto a system in the HKEY_CURRENT_USER (HKCU) registry hive. True or False?

Answers

Answer 1

Yes, The Ntuser.dat file loads registry information for the current user logged onto a system in the HKEY_CURRENT_USER (HKCU) registry hive.

Where can I get the Ntuser DAT file?

NTUSER. DAT can be found under C:usersdefaultntuser. dat in Windows Vista and later versions of Windows. Other paths exist for earlier operating systems, such as C: Documents and Settingsusername>ntuser.

What causes a Windows 10 user profile to become corrupt?

One of the following factors is known to contribute to this error: The user profile is damaged or not present. Virus attacks, power outages, and disk write mistakes all jeopardize the integrity of the file system. faulty memory or a failing hard drive are examples of hardware issues.

To know more about operating system visit:

https://brainly.com/question/6689423

#SPJ4


Related Questions


similarities between incremental and
prototyping models of SDLC

Answers

Prototype Model is a software development life cycle model which is used when the client is not known completely about how the end outcome should be and its requirements.

Incremental Model is a model of software consequence where the product is, analyzed, developed, implemented and tested incrementally until the development is finished.

What is incremental model in SDLC?

The incremental Model is a process of software development where conditions are divided into multiple standalone modules of the software development cycle. In this model, each module goes through the conditions, design, implementation and testing phases.

The spiral model is equivalent to the incremental model, with more emphasis placed on risk analysis. The spiral model has four stages: Planning, Risk Analysis, Engineering, and Evaluation. A software project frequently passes through these phases in iterations

To learn more about Prototype Model , refer

https://brainly.com/question/7509258

#SPJ9

d' Explain each of the following i 100 Base-CX (10GBase-T Ethernet standards

Answers

Note that 100Base-CX is an Ethernet standard for 100 Mbps over short distances. While,

10GBase-T  - Ethernet standard for 10 Gbps over copper cables up to 100 meters.

How do they work?

1. 100Base-CX  -   It is an Ethernet standard that defines the specifications for transmitting data at a rate of 100 Mbps over a short distance using copper twisted pair cables with a maximum segment length of 25 meters.

It uses a balanced signaling scheme and is commonly used for connecting devices within a confined area, such as in-building networks.

2. 10GBase-T  -   It is an Ethernet standard that allows for data transmission at a rate of 10 Gbps over twisted pair copper cables. It utilizes advanced signaling techniques and supports a maximum cable length of 100 meters.

10GBase-T is widely used for high-speed network connections in data centers, enterprise networks, and other applications requiring high bandwidth.

Learn more about Ethernet standards at:

https://brainly.com/question/31063222

#SPJ1

Which core business etiquette is missing in Jane

Answers

Answer:

As the question does not provide any context about who Jane is and what she has done, I cannot provide a specific answer about which core business etiquette is missing in Jane. However, in general, some of the key core business etiquettes that are important to follow in a professional setting include:

Punctuality: Arriving on time for meetings and appointments is a sign of respect for others and their time.

Professionalism: Maintaining a professional demeanor, dressing appropriately, and using appropriate language and tone of voice are important in projecting a positive image and establishing credibility.

Communication: Effective communication skills such as active listening, clear speaking, and appropriate use of technology are essential for building relationships and achieving business goals.

Respect: Treating others with respect, including acknowledging their opinions and perspectives, is key to building positive relationships and fostering a positive work environment.

Business etiquette: Familiarity with and adherence to appropriate business etiquette, such as proper introductions, handshakes, and business card exchanges, can help establish a positive first impression and build relationships.

It is important to note that specific business etiquettes may vary depending on the cultural and social norms of the particular workplace or industry.

. Write a program to calculate the square of 20 by using a loop
that adds 20 to the accumulator 20 times.

Answers

The program to calculate the square of 20 by using a loop

that adds 20 to the accumulator 20 times is given:

The Program

accumulator = 0

for _ in range(20):

   accumulator += 20

square_of_20 = accumulator

print(square_of_20)

Algorithm:

Initialize an accumulator variable to 0.

Start a loop that iterates 20 times.

Inside the loop, add 20 to the accumulator.

After the loop, the accumulator will hold the square of 20.

Output the value of the accumulator (square of 20).

Read more about algorithm here:

https://brainly.com/question/29674035

#SPJ1

The most effective technique of malware propagation among the following list

Answers

Question Completion with Options:

A. Embedding & packing malcode in application programs

B. Replacing the Import-Address-Table (IAT)

C. Appending & prepending malcode into application programs

D. Embedding malcode in documents, such as MS O Office & PDF

Ε. Replicating malcode's source code

Answer:

The most effective technique of malware propagation among the following list is:

A. Embedding & packing malcode in application program

Explanation:

Malware propagation becomes effective and replicates effortlessly when malicious codes (otherwise called malcodes, which are self-replicating malicious programs) are embedded and packed in application programs.  These usually take many years before they start to manifest, making them very difficult to detect.  They are often triggered by some set events.  Given the nature of malcodes and the culprits behind them, they are very dangerous to applications and pose substantial business risks.

Under the rules of parliamentary procedure, it is the responsibility of the secretary to keep accurate notes of the meeting.

A.
True

B.
False

Answers

It  TRUE  to state that Uunder the rules of parliamentary procedure, it is the responsibility of the secretary to keep accurate notes of the meeting.

What is parliamentary procedure?

Parliamentary process refers to the recognized norms, ethics, and practices that govern meetings of a legislature or institution. Its goal is to allow for orderly discourse on issues of relevance to the organization, and so to arrive at the majority's sense or will on these issues.

Subsidiary motions that influence the primary motion under consideration. Privileged motions are critical problems that must be addressed swiftly, even if they disrupt ongoing activity. Incidental motions that are related to the company in various ways. Motions to reconsider a matter before the assembly

Learn more about parliamentary procedure:
https://brainly.com/question/23265511
#SPJ1

Tunes up and maintains your PC, with anti-spyware, privacy protection, and system cleaning functions. A _ _ _ n _ _ _ S _ _ _e _ C _ _ _

Answers

Tunes up and maintains your PC, with anti-spyware, privacy protection, and system cleaning functions is all-in-one PC optimizer"

How do one  maintains their PC?

An all-in-one PC optimizer improves computer performance and security by optimizing settings and configuration. Tasks like defragmenting hard drive, optimizing startup, managing resources efficiently can be done.

Anti-spyware has tools to detect and remove malicious software. Protect your computer and privacy with this feature. System cleaning involves removing browser history, temporary files, cookies, and shredding sensitive data.

Learn more about  privacy protection from

https://brainly.com/question/31211416

#SPJ1

What are the core steps to add revisions or features to a project?(1 point)
Responses

Evaluate feasibility of the goals, create a list of functionality requirements, and develop the requirements of the feature.

Evaluate feasibility of the goals, develop programming solutions, and evaluate how well the solutions address the goals.

understand the goals, evaluate the impact on the project, create a list of functionality requirements, and develop the requirements of the feature.

Communicate with the client, create a sprint backlog, develop the project, and evaluate how well the solution fits the requirements.

Answers

The core steps to add revisions or features to a project are ""Understand the goals, evaluate the impact on the project, create a list of functionality requirements, and develop the requirements of the feature." (Option C)

How  is this so?

 

The core steps to add revisions or features to a project include understanding the goals,evaluating the impact on   the project, creating a list of functionality requirements,and developing   the requirements of the feature.

These steps ensure that the goals are clear, the impact is assessed, and the necessary functionality is identified and implemented effectively.

Learn more about project management at:

https://brainly.com/question/16927451

#SPJ1

Answer True or False to these questions
a. Schedules under strict 2PL do not allow dirty reads.
b. Every serializable schedule is conflict serializable.
c. An index containing ‘data records’ in ‘data entries’ can be unclustered.
d. Using an unclustered index speedups range search.
e. If all operations of transactions are read-only, then every schedule is serializable.
f. 2PL allow deadlocks and strict 2PL avoids deadlocks.
g. Only one transaction can hold a shared lock at any time.

Answers

Answer:

a. True: Schedules under strict 2PL do not allow dirty reads.

b. False: Every serializable schedule is conflict serializable.

c. False: An index containing ‘data records’ in ‘data entries’ can be unclustered.

d. False: Using an unclustered index speedups range search.

e. True: If all operations of transactions are read-only, then every schedule is serializable.

f. False: 2PL allow deadlocks and strict 2PL avoids deadlocks.

g. False: Only one transaction can hold a shared lock at any time.

What is the most important function of GIS and why?; What are the 4 functions of GIS?; What are the three major purposes of GIS?; What are the 6 functions of a GIS?

Answers

The most important function of GIS is its ability to help users visualize and analyze data in a spatial context, which can be useful for a wide range of applications. Some examples of the functions of GIS include mapping, data analysis, spatial modeling, and data sharing.

Mapping: GIS allows users to create maps that show the location of different features, such as roads, buildings, rivers, and other features. These maps can be used for a wide range of purposes, such as planning, analysis, and decision-making.

Data analysis: GIS allows users to analyze data in a spatial context, which can help them to better understand patterns, trends, and relationships in the data. This can be useful for a wide range of applications, such as market analysis, environmental monitoring, and public health.

Spatial modeling: GIS can be used to create spatial models that simulate real-world phenomena, such as the spread of disease or the impact of natural disasters. These models can help users to better understand complex systems and make more informed decisions.

Data sharing: GIS allows users to share their spatial data with others, which can facilitate collaboration and help to support decision-making.

GIS, or Geographic Information System, is a type of technology that is used to collect, manage, and analyze spatial data.

Learn more about GIS, here https://brainly.com/question/14464737

#SPJ4

a democratic government has to respect some rules after winning the elections. Which of these points is not a part of those rules

Answers

After coming to power, a democratic administration is bound to follow certainrules and regulations. And Office-bearers are not accountable is not a part of those   rules.

How is this so?

In a democratic administration,office-bearers are indeed accountable as they are bound by rules and regulations.

The accountability ensures transparency,ethical conduct, and adherence to the principles of democracy.

Office-bearers are expected to uphold the laws and serve the interests of the people they represent.

Learn more about  democratic administration at:

https://brainly.com/question/31766921

#SPJ1

website is a collection of (a)audio files(b) image files (c) video files (d)HTML files​

Answers

Website is a collection of (b) image files (c) video files and  (d)HTML files​

What is website

Many websites feature a variety of pictures to improve aesthetic appeal and provide visual substance. The formats available for these image files may include JPEG, PNG, GIF, or SVG.

To enhance user engagement, websites can also introduce video content in their files. Web pages have the capability to display video files either by embedding them or by providing links, thereby enabling viewers to watch videos without leaving the site. Various formats such as MP4, AVI and WebM can be utilized for video files.

Learn more about  website  from

https://brainly.com/question/28431103

#SPJ1

7. A puzzle game featuring falling bricks which need to be3 organized on the screen describes which of the following very popular games from the 80s?
a) Tricks
b) Tetris
c) Sonics
d) Bricks

Answers

Answer:

Tetris

Explanation:

Which part of the Result block should you evaluate to determine the needs met rating for that result

Answers

To know the "Needs Met" rating for a specific result in the Result block, you should evaluate the metadata section of that result.

What is the  Result block

The assessment of the metadata section is necessary to determine the rating of "Needs Met" for a particular outcome listed in the Result block.

The metadata includes a field called needs_met, which evaluates the level of satisfaction with the result in terms of meeting the user's requirements. The needs_met category usually has a score between zero and ten, with ten implying that the outcome entirely fulfills the user's demands.

Learn more about Result block from

https://brainly.com/question/14510310

#SPJ1

The 6 steps for PowerPoint competency from the TED talk in the module "How to Avoid Death by PowerPoint."?

Answers

Answer:

1. Do some presentation preparation work

2. Set the right tone and end on a high note.

3. Create sleek and stylish slides.

4. Get your audience to focus.

5. Its all about you.

Explanation:

1. Do some presentation preparation work:

A good presentation begins, not with slides, but with a pencil and paper. Research your audience’s background, interests and capabilities. What do they already know, for instance, and what can they learn from you?

2. Set the right tone and end on a high note:

You have no more than 30 seconds to secure your audience’s attention. So, what attention-grabbing opener will you use?

Visual communications expert Curtis Newbold suggests “a fascinating quote; an alarming or surprising statistic; asking your audience a question; telling a relevant and funny joke… an imaginary scenario; or a demonstration''.

3. Create sleek and stylish slides:

Once you have your story down, you can start to design your slides.  

Before you do, it’s important to think about the practicalities. Will they, for instance, be displayed Widescreen with a 16:9 ratio? Or Standard with 4:3? This might seem like a small detail, but it can make a huge difference in terms of visual impact.

4.  Get your audience to focus:

The most important thing is to grab your audience’s attention straight away – and then maintain it! You want your audience to go away having learned something. So, make it as easy as possible for people to grasp your message “from the off”!

5.  Its all about you:

Finally, remember that, ultimately, it’s you that the audience should be paying attention to, not your slides!

PowerPoint can be used to create great visual aids, but the success of your presentation is determined by the way you deliver them. So, tell your story with a confident, compelling physical presence, and master it by rehearsing it 10 to 15 times.

Question 11
Marissa wants to work in web development, creating the parts of web pages that the users see and
interact with. Which of these search strings should Marissa use when she looks for a job?
O front-end development
O database development
O back-end development
O machine language development

Answers

The search strings that Marissa can use when she looks for a job is front-end development.

What is frontend in development?

A front-end developer is known to be a person what makes the front-end part of websites and web applications.

Note that this part is one that any users can actually see and work with. A front-end developer makes websites as well as applications using web languages.

Therefore, The search strings that Marissa can use when she looks for a job is front-end development.

Learn more about front-end development from

https://brainly.com/question/13263206

#SPJ1



How do a write 19/19 as a whole number

Answers

As a whole number it is 1.0.

Answer:

1.0

Explanation:

You divide 19 by 19 and get 1

A standard method for labeling digital files is called a file-labeling what? Question 5 options: protocol tool setting configuration

Answers

Answer:What is the file-labeling protocol (standard method for labeling files)--protocol

Explanation:

Buying with a credit card can offer security like fraud prevention. True False

Answers

true because it does not directly have access to your bank account

Write a function wordcount() that takes the name of a text file as input and prints the number of occurrences of every word in the file. You function should be case-insensitive so 'Hello' and 'hello' are treated as the same word. You should ignore words of length 2 or less. Also, be sure to remove punctuation and digits.
>>>wordcount('frankenstein.txt')
artifice 1
resting 2
compact 1
service 3

Answers

Answer:

I am writing a Python program. Let me know if you want the program in some other programming language.        

import string  #to use string related functions

def wordcount(filename):  # function that takes a text file name as parameter and returns the number of occurrences of every word in file

   file = open(filename, "r")  # open the file in read mode

   wc = dict()  # creates a dictionary

   for sentence in file:  # loop through each line of the file

       sentence = sentence.strip()  #returns the text, removing empty spaces

       sentence=sentence.lower() #converts each line to lowercase to avoid case sensitivity

       sentence = sentence.translate(sentence.maketrans("", "", string.punctuation))  #removes punctuation from every line of the text file

       words = sentence.split(" ")  # split the lines into a list of words

       for word in words:  #loops through each word of the file

           if len(word)>2:  #checks if the length of the word is greater than 2

               if word in wc:  # if the word is already in dictionary

                   wc[word] = wc[word] + 1  #if the word is already present in dict wc then add 1 to the count of that word

               else:  #if the word is not already present

                   wc[word] = 1  # word is added to the wc dict and assign 1 to the count of that word                

   for w in list(wc.keys()):  #prints the list of words and their number of occurrences

       print(w, wc[w])  #prints word: occurrences in key:value format of dict        

wordcount("file.txt") #calls wordcount method and passes name of the file to that method

Explanation:

The program has a function wordcount that takes the name of a text file (filename) as parameter.

open() method is used to open the file in read mode. "r" represents the mode and it means read mode. Then a dictionary is created and named as wc. The first for loop, iterates through each line (sentence) of the text file. strip() method is used to remove extra empty spaces or new line character from each sentence of the file, then each sentence is converted to lower case using lower() method to avoid case sensitivity. Now the words "hello" and "Hello" are treated as the same word.

sentence = sentence.translate(sentence.maketrans("", "", string.punctuation))  statement uses two methods i.e. maketrans() and translate(). maketrans() specifies the punctuation characters that are to be deleted from the sentences and returns a translation table. translate() method uses the table that maketrans() returns in order to replace a character to its mapped character and returns the lines of text file after performing these translations.

Next the split() method is used to break these sentences into a list of words. Second for loop iterates through each word of the text file. As its given to ignore words of length 2 or less, so an IF statement is used to check if the length of word is greater than 2. If this statement evaluates to true then next statement: if word in wc:   is executed which checks if the word is already present in dictionary. If this statement evaluates to true then 1 is added to the count of that word. If the word is not already present  then the word is added to the wc dictionary and 1 s assigned to the count of that word.

Next the words along with their occurrences is printed. The program and its output are attached as screenshot. Since the frankenstein.txt' is not provided so I am using my own text file.

Write a function wordcount() that takes the name of a text file as input and prints the number of occurrences
Write a function wordcount() that takes the name of a text file as input and prints the number of occurrences

Which of the following is a valid SQL statement for adding a new row of data to a SQL database table?INSERT INTO users (firstname, lastname) values ('George', 'Washington');

Answers

INSERT INTO users (firstname, lastname) values (‘George’, ‘Washington’);

How can I insert data into a SQL database?

The INSERT INTO statement is used to insert new records in a table. Connect to an instance of the SQL Server Database Engine in Object Explorer, then expand that instance. Expand Databases, then right-click the database to which you want to add the files and choose Properties. Select the Files page in the Database Properties dialog box. Click Add to add a data or transaction log file.

Inserting a single row is as simple as right-clicking the entire row above which you wish to insert the new row and selecting Insert Rows. To insert multiple rows, select the same number of rows as the ones you wish to replace. Select Insert Rows from the context menu after right-clicking the selection. As a result, the Put-SELECT-UNION query may be used to insert data into several rows of the table.

To learn more about SQL refer:

https://brainly.com/question/14469511

#SPJ4

Answer

Explanation

You sometimes hear, “You can’t add apples and oranges.” Show that we can and do add apples and oranges in the national accounts. Explain how.

Answers

The reason for the statement of You can’t add apples and oranges.” Show that we can and do add apples and oranges in the national accounts is that the expression "apples and oranges can't be added" is used to highlight the differences between two objects that economists believe are incomparable.

What is the expression about?

Due to the lack of an acceptable unit of measurement, it is particularly challenging to measure the national income in practice. Three approaches are used in economics to measure national income:

The Product Method, also known as the Value Output Method.The Income Method.The Expenditure Method.

Which are not enough. The national income or GDP is immaterial. Therefore, Real GDP includes thousands of other items and services that cannot be directly added in economics, in addition to apples and oranges, computers, as well as power, transportation, and also education.

Learn more about national accounts from

https://brainly.com/question/1098565
#SPJ1

A chart legend?

A.corresponds to the title of the data series column.
B.provides the boundaries of the chart graphic.
C.is based on the category labels in the first column of data.
D.is used to change the style of a chart.

Answers

A chart legend can be useful in some cases during data process
Change style and f art

how do you number the dissertation correctly in the table of contents? ​

Answers

To number the dissertation correctly in the table of contents, you should follow these steps:

Use heading styles: First, use the heading styles provided in your word processor (e.g., Heading 1, Heading 2, etc.) to format your dissertation. This will ensure that the headings are properly formatted and numbered automatically.

Number the headings: Number each heading in your dissertation, starting with "Chapter 1" for the first chapter, and so on. You can use Arabic numerals (1, 2, 3, etc.) to number the chapters and sections.

Include subheadings: If you have subheadings within a chapter, number them using decimal notation (e.g., 1.1, 1.2, 1.3, etc.).

Update the table of contents: After you have formatted and numbered your dissertation headings, insert a table of contents into your document. Then, update the table of contents to ensure that it reflects the correct page numbers for each heading.

By following these steps, you can ensure that your dissertation is properly numbered and formatted in the table of contents.

Simon has created a diagram that defines classes used in an object-oriented program. What type of diagram has he constructed?
A(n) is a type of UML diagram that directly maps to object-oriented classes.

Answers

Answer:

class diagram

The most plausible reason why changes in the price of cotton can cause shifts in the supply curve for tobacco is:

a.

when incomes rise, people consume more cotton and tobacco.

b.

firms can switch from growing tobacco to cotton and vice versa.

c.

cigarette smokers often wear cotton shirts.

d.

tobacco is an input in the production of cotton.

Answers

The most plausible reason why changes in the price of cotton can cause shifts in the supply curve for tobacco is: firms can switch from growing tobacco to cotton and vice versa.The correct answer is option B.

This option reflects the concept of resource allocation and production choices based on relative prices and profitability.

When the price of cotton increases, it becomes more profitable for farmers to allocate their resources towards cotton production. This can lead to a decrease in the supply of tobacco as some tobacco farmers may choose to switch to growing cotton instead.

Consequently, the supply curve for tobacco shifts to the left, representing a decrease in the quantity supplied at each price level.

On the other hand, if the price of cotton decreases, it becomes less profitable to produce cotton, and some cotton farmers may switch to growing tobacco instead.

This can result in an increase in the supply of tobacco, causing the supply curve to shift to the right, representing an increase in the quantity supplied at each price level.

Therefore, the changes in the price of cotton can have a direct impact on the supply of tobacco as firms have the flexibility to switch between the two crops based on relative profitability, leading to shifts in the supply curve for tobacco.

For more such questions tobacco,Click on

https://brainly.com/question/30006424

#SPJ8

Two technicians are discussing Newton's first law of motion. Technician A says that a lightweight vehicle requires as
much energy to accelerate as a heavier vehicle. Technician B says that a lighter vehicle requires less energy to
accelerate than a heavier vehicle. Who is correct?
Select one
a. Technician A
b Technician B
C Both Technician A and Technician B
d. Neither Technician A nor Technician

Answers

CBoth Technician A and B

bills is replacing a worn-cut cable to his power table saw.what type of cable is he most likely using ?
A.PSC
B.SO
C.CS
D.HPD

Answers

Bill is replacing a worn-cut cable for his power table saw.  is using is A. PSC (Portable Cord).

What is the bills?

Working with frayed cables can be dangerous and may act as a form of a risk of electric shock or other hazards. To make a safe and successful cable replacement, there are some general steps Bill can follow.

A is the most probable  type of cable he is utilizing from the provided choices. A type of cord that can be easily carried or moved around. Flexible and durable, portable cords are frequently utilized for portable power tools and equipment.

Learn more about bills from

https://brainly.com/question/29550065

#SPJ1

problem description IT​

Answers

In IT, a problem description refers to a clear and concise explanation of an issue or challenge that needs to be resolved within a technology system or application.

How is this so?

It involves providing relevant details about the symptoms, impact, and context of the problem.

A well-written problem description outlines the specific errors, failures, or undesired behavior observed and provides enough information for IT professionals to analyze and identify potential solutions.

A comprehensive problem description is crucial for effective troubleshooting and problem-solving in the IT field.

Learn more about Problem Description at:

https://brainly.com/question/25923602

#SPJ1

what is the meaningof the word internet of things?​

Answers

Answer:

the networking capability that allows information to be sent to and received from objects and devices using the Internet The Internet of Things really comes together with the connection of sensors and machine.

Explanation:

....

Other Questions
what is the closest number to estimate for 175.32 divided by 3 QUESTION: Sample Posts - Provide THREE different sample posts to illustrate what a campaign will look like, and describe how each of the posts will help achieve your social media goals. Make sure to be specific and outline the action you expect people to take as a result of your post, and at what stage it is in the social media marketing funnel?GOALS - 500 like views comment on particular date Working in groups as assigned by the instructor, develop a social media marketing plan using the following company; Company Name: ALT VEG Burger & Barbecue Corner Location: Corner of Robson Street & Denman Street in Vancouver, BCCompany Mission: Provide a healthy, tasty alternative to traditional meat burgers and bbq dishes in a festive and casual atmosphere. Company Description: ALTVEG Burger & Barbecue Corner wants to change people's perceptions about non-meat based food, such as plant-based meat alternatives, by showing them how good the food really is! They want people to come into their restaurant, and be amazed by the food, and stay for the fun atmosphere. The interior is designed to feel like you're at an outdoor barbecue with your friends. The floor even has artificial turf (fake grass), and diners sit at picnic tables. You can see the chefs preparing your meal on grills that look like barbecues. The restaurant is currently being built, and the menu is not yet finalised. They will be holding a grand opening event in 9 months from today, and hope to get a lot of attention and reservations for their first day through their online reservation system. The reservation system will open two weeks before the grand opening day, and their goal is to sell out reservations for the first day in order to manage the anticipated crowds. The owners are chefs and have no experience in marketing or social media, and do not have any social media accounts yet for their business. They have come to you for a strategy, plan and ideas. They are relying on you to make their opening day a success. They have a small budget of $2,000 for social media, and the remainder of their marketing budget will go to another company that specialises in traditional marketing challenges and PR. So your task is to ONLY focus on social media strategy, plan and execution. A block of cork, a block of wood, and a block of metal are all placed into 3separate beakers of water. The block of cork floats on top of the water, while the block of wood floats near the surface of the water, and the blockof metal sinks to the bottom. Determine if each block is less dense, aboutthe same density, or more dense than the water. In Capital Budgeting Techniques, some investment decisions involve choosing among independent projects, where accepting one project does not necessarily preclude accepting another unrelated project. However, managers typically have limited funds to invest and, therefore, must prioritize their investment resources (capital rationing). To prioritize independent projects, we cannot simply compare the Net Present Values, which are stated as absolute dollar values. This makes comparing projects of different sizes difficult. Although the Internal Rate of Return is a relative measure of performance, it assumes that the cash flows will be reinvested to earn the same IRR, a notion which is unlikely to be true for independent projects. Managers should prioritize capital investment projects based on a factor called the profitability index (PI). Which of the following three skills and attitudes best promote positivewellness and self-esteem?A. drinking large amounts of caffeineM B. squeezing a stress ball to relaxEh C. using rewards when goals metD. pacing yourself to meet a deadline. Northern Railway is considering a project which will produce annual sales of $975,000 and increase cash expenses by $848,000. If the project is implemented, taxes will increase from $141,000 to $154,000 and depreciation will increase from $194,000 to $272,000. The company is debt-free. What is the amount of the operating cash flow using the top-down approach Determine if the following series are convergent ordivergent:1. Determine if the following series are convergent or divergent: a) En=1(-1)". b) Ex=(-1)kk sin Inn n2 k What is the factored form of 27 - 530? Show that the particular solution for the 2nd Order Differential equation dy + 16y = 0, y dx2 6) =-10, y' ) = = 3 is 3 y = -10 cos(4x) + -sin (4x) + sin (4 4 when faced with uncertain conditions, it is always best to sign long-term contracts (because they are typically cheaper) and avoid all flexible capacity (because it is more expensive) t/f Suppose you have just inherited $10,000 and are considering the following options for investing the money to maximize your return:Option 1: Put the money in an interest-bearing checking account, which earns 2%. The FDIC insures the account against bank failure.Option 2: Invest the money in a corporate bond, with a stated return of 5%, but there is a 10% chance the company could go bankrupt.Option 3: Loan the money to one of your friends roommates, Mike, at an agreed-upon interest rate of 8%, but you believe there is a 7% chance that Mike will leave town without repaying you.Option 4: Hold the money in cash and earn zero return.a.If you are risk-neutral (that is, neither seek out nor shy away from risk), which of the four options should you choose to maximize your expected return? (Hint: To calculate the expected return of an outcome, multiply the probability that an event will occur by the outcome of that event).b.Suppose Option 3 is your only possibility. If you could pay your friend $100 to find out extra information about Mike that would indicate with certainty whether he will leave town without paying or not, would you pay the $100? What does this say about the value of better information regarding risk? What is the solution, if any, to the inequality |3| > 20? Refer to your Expeditions in Reading book and Hidden Figures for complete versions of these texts. Read the excerpt from Mary Jackson Biography. Mary retired from Langley in 1985. Among her many honors were an Apollo Group Achievement Award, and being named Langleys Volunteer of the Year in 1976. She served as the chair of one of the centers annual United Way campaigns, was a Girl Scout troop leader for more than three decades, and a member of the National Technical Association (the oldest African American technical organization in the United States).Alex wants to explain why working with the Girl Scouts was important to Mary Jackson. Which quotation from Hidden Figures could best be integrated with the information from Mary Jackson Biography to achieve this?A. She took the girls on three-mile hikes and field trips to the crab factory to learn more about what their parents did for work. B. The organizations commitment to preparing women to take their place in the world with the mission of respect for God and country, and of honesty and loyalty, embodied Marys core beliefs. C. It was a sight the girls never forgot: an impeccable black staff in a fabulous house, serving a black family. D. She took them to an afternoon tea at the Hampton Institute Mansion House, where the colleges president and his family lived.ITS NOT HARD IT 5TH GRADE WORK Who is our audience? Give as much detailas possible. 4. What is the function of a wind turbine?a. changing the kinetic energy of wind to electrical energyb. capturing wind energy and using it to pump waterc. slowing down the wind so it causes less erosiond. storing the energy of wind as thermal energy motivational interviewing is a psychotherapy technique used for treating problem drinking, and this technique has the advantage of group of answer choices having a 90% improvement rate for problem drinking. being more effective in group settings than when administered individually. being a brief intervention that requires few sessions. all of these. all of the following are descriptive of listening behavior except: listening comprises at least one-half of all communication people learn to listen selectively and can even shut out what is undesirable being an effective communicator means that one must listen to oneself the ability to be a good listener comes naturally and no training is necessary who was awarded the highest rank in the us armed forces? QUESTION 4. Consider the following game. Player 1s payoffs are listed first, in bold: Player 2 X Y Player 1 U 100 , 6 800 , 4 M 0 , 0 200 , 1 D 10 , 20 20 , 20 a. Imagine that Player 1 makes a decision first and Player 2 makes a decision after observing Player 1s choice. Write down every subgame-perfect Nash equilibrium of this game. b. Does the outcome above differ from the Nash equilibrium (if the game were played simultaneously)? Carefully explain why, intuitively, the result differs or does not differ. A membership price for the local pool wentfrom $80 to $60. What is the percentchange in membership cost?