Which is an example of a crime that might occur in an e-commerce transaction?
A customer’s new purchase is stolen after delivery.
A customer’s credit card information is stolen and used by someone else.
A customer can easily take merchandise without having to pay for it.
A customer pays an unfair price for the merchandise she bought.

Answers

Answer 1

Answer:

A costumers credit card information is stolen and used by someone else.

Answer 2

Answer:

A customer's credit card information is stolen and used by someone else.

Explanation:

Since e-commerce is online sales, the customer can not take merchandise without having to pay for it.

Also the customer can search for the best price.


Related Questions

most hackers claim to benefit the systems they intrude upon because they do not destroy data and they alert system administrators to security flaws. t/f

Answers

False.

While there are some hackers who claim to have noble intentions and aim to improve security by identifying vulnerabilities and notifying system administrators, this statement does not apply to the majority of hackers.

Hacking, by definition, involves unauthorized access to computer systems or networks with the intention of exploiting or manipulating them for personal gain, mischief, or malicious purposes.

The term "hacker" has different connotations depending on the context. Ethical hackers, also known as white hat hackers or security researchers, are individuals who use their skills to identify vulnerabilities and help improve security measures. They typically work within legal boundaries and with the permission of system owners.

However, the majority of hackers, commonly referred to as black hat hackers or malicious hackers, engage in illegal activities. Their actions often involve stealing sensitive information, disrupting services, spreading malware, or causing other forms of harm. Their motivations are typically financial gain, political agendas, personal vendettas, or the thrill of malicious activity.

It's important to note that unauthorized access to computer systems, regardless of the intentions, is generally considered illegal and unethical.

Learn more about hackers here:

https://brainly.com/question/32413644

#SPJ11

What is the process to correct a single spelling mistake that has been indicated by the spelling checker in PowerPoint Online?


Select the word, then double click.

Select the word, then left select.

Select the word, then right select.

Select the word, then single click.


YOU WILL GET BRAINLIEST FIRST PERSON IF RIGHT

Answers

I’m not to sure what this is asking, if by selecting word- it means the word is already left-click selected, so it would be option 3. If not, then it would be option 2 I believe

Answer:

C!

Mark me as brainliest!!

which of the following is an example of new and emerging classes of sofware

Answers

We need to know what was listed :)!

a boolean expression may evaluate to more than 2 values
T/F

Answers

The given statement "a boolean expression can only evaluate to two values, which are true or false" is false. A boolean expression is a logical statement that is either true or false based on the values and operators used. It is often used in conditional statements and loops to control program flow.

The result of a boolean expression determines whether a block of code is executed or skipped over. While some programming languages may have different ways of representing true and false values, a boolean expression will always have only two possible outcomes. Therefore, it cannot evaluate to more than two values.

Learn more about boolean expression visit:

https://brainly.com/question/29025171

#SPJ11

6
1 point
Which units of measurement measure data transfer?
0 Kb, Mb. Gb, & Tb
KB, MB, GB, & TB
FLOPS
0 MHz, GHz
Previous

Answers

Answer:

right answer is option no b

kb, mb, gb, & tb,

Select the correct answer from each drop-down menu. What are the effects of emerging technology? has brought the internet to almost every location around the world. has led to the proliferation of on-the-go computing. Reset Next​

Select the correct answer from each drop-down menu. What are the effects of emerging technology? has

Answers

Answer:

The correct answers are:

Wireless web

Mobile computing

Explanation:

I got it right on the Edmentum test.

Wireless web has brought the internet to almost every location around the world. Mobile computing has led to the proliferation of on-the-go computing.

What is technology?

Technology, or as it is sometimes referred to, the modification and manipulation of the human environment, is the application of scientific knowledge to the practical goals of human life.

A catchall phrase for unrestricted access to the Internet and other services like email and messages.

The wireless Web is made up of public and private hotspots, cellular Internet access, and all other fixed or mobile wireless access services.

In human-computer interaction known as mobile computing, a computer is expected to be carried around while being used, allowing for the transmission of data, speech, and video.

Mobile hardware, mobile software, and mobile communication are all components of mobile computing.

Thus, these are the effects of emerging technology.

For more details regarding technology, visit:

https://brainly.com/question/9171028

#SPJ5


Provide a description of cloud computing. Include the advantages
and disadvantages and business drivers for using cloud
computing.

Answers

Cloud computing is a paradigm that enables convenient, on-demand access to a shared pool of configurable computing resources over the internet. It offers numerous advantages such as scalability, cost-effectiveness, flexibility, and reliability. However, there are also disadvantages, including security concerns, dependency on internet connectivity, and potential vendor lock-in.

Cloud computing refers to the delivery of computing resources, including servers, storage, databases, software, and networking, over the internet. It allows users to access and utilize these resources on-demand, without the need for extensive local infrastructure. One of the key advantages of cloud computing is scalability, as businesses can easily scale their resources up or down based on their needs, thereby optimizing costs and improving efficiency. Additionally, cloud services are typically offered on a pay-as-you-go basis, allowing organizations to save on upfront infrastructure costs and only pay for what they use.

Another advantage is flexibility, as cloud computing enables remote access to resources from anywhere with an internet connection. This facilitates remote work, collaboration, and global accessibility, promoting efficiency and productivity. Moreover, cloud providers often offer high levels of reliability and uptime through redundant systems and data backups, minimizing the risk of data loss or downtime.

However, there are also disadvantages to consider. Security is a major concern, as sensitive data may be stored in the cloud and exposed to potential breaches. Organizations must implement robust security measures and trust the cloud provider's security practices. Furthermore, reliance on internet connectivity becomes crucial, as any disruption in connectivity can affect access to cloud services and impact operations. Additionally, adopting a particular cloud provider's services may result in vendor lock-in, making it difficult to switch providers or migrate to alternative solutions.

From a business perspective, several drivers motivate the adoption of cloud computing. Cloud services enable organizations to be more agile by quickly provisioning resources to meet changing demands. This agility supports innovation, faster time to market, and the ability to scale operations as required. Cloud computing also allows businesses to optimize resource utilization by dynamically allocating and de-allocating resources based on workload fluctuations, thereby maximizing efficiency and cost-effectiveness. Moreover, by moving to the cloud, companies can reduce capital expenditures associated with building and maintaining physical infrastructure, shifting to a more predictable and flexible operational expenditure model.

Furthermore, cloud computing provides access to advanced technologies and services that might otherwise be costly or difficult to implement in-house. This includes machine learning, artificial intelligence, big data analytics, and high-performance computing capabilities, enabling organizations to leverage these technologies for competitive advantage and business growth.

In conclusion, cloud computing offers significant advantages in terms of scalability, cost-effectiveness, flexibility, and reliability. However, it also presents challenges related to security, connectivity, and vendor lock-in. Businesses are driven to adopt cloud computing for its ability to enhance agility, improve resource utilization, reduce infrastructure costs, and access advanced technologies and services. Careful consideration of these factors is essential for organizations seeking to harness the benefits of cloud computing while mitigating associated risks.

Learn more about computing here:

https://brainly.com/question/8645052

#SPJ11

A client in Nebraska asks you to create a cover image that is 2000 pixels high by 1200 pixels wide for catalog that will be displayed on its website. Which of the following new documents types will you select for this new project?


Select one:
Art & Illustration
Web
U.S. Paper
Photo

Answers

Answer: WEB

Explanation: this is the correct answer.

A support person has verified that an employee's system is fully functioning. What is the next step in the troubleshooting theory?

Answers

Answer:

Document findings, actions and outcomes.

Explanation:

The troubleshooting process can be defined as the sequential steps that are to be taken while trying to proffer a solution to a problem, usually on computer systems.

The seven (7) steps of the troubleshooting process in ascending order are;

1. Identify the problem.

2. Establishing a theory of probable cause of the problem.

3. Test the established theory to determine cause.

4. You should establish a plan of action to resolve the problem while identifying its potential effects.

5. Implement a solution.

6. Verify full system functionality.

7. Document findings, actions and outcomes.

Since the support person has verified that an employee's system is fully functioning. The next step in the troubleshooting theory is to document findings, actions and outcomes in order to preserve the information on the cause of the problem and steps taken to resolve it. Documentation is usually done for reference purposes.

any one know how to fix forzas camera bc it shutters to much

any one know how to fix forzas camera bc it shutters to much
any one know how to fix forzas camera bc it shutters to much
any one know how to fix forzas camera bc it shutters to much

Answers

Answer:

LEDs are powered by alternating current AC.

Explanation:

The electricity will move in and out of cycles.

When the FPS won't math it'll flicker. Try switching to your camera's shutter speed instead. ( May be times your camera won't support it.)

What is a counter? In typography

Answers

answer:

in typography, it is an area entirely or partially enclosed by a letter form or a symbol

explanation:

・two types: closed & open

・closed —  A, B, D, O, P, Q, R, a, b, d, e, g, o, p, and q

・open — c, f, h, s

What is 6

-Only a Little Nightmare fan will know this-

Answers

Answer:

Six is much smaller than the adult characters of the series, being barely a third of their height with an extremely small, thin frame.

Answer:

Six is the main character you play as in Little Nightmares who is very very small and wears a yellow raincoat. You also come across her in the second game and she accompanies the protagonist of the second game. She also is not as nice and cute as you think she is, which you will know once you play the games, and the Little Nightmares 2 ending is where she shows her true colors.

Explanation:

;p

Which is NOT the quality of an entrepreneur?

a) self-discipline
b) non-risk taking
c) persistence
d) creative thinking

Answers

Answer:

Option b). is the right choice.

Explanation:

An enterpreneur must have a risk-taking quality.

Best Regards!

Answer:

b)

Explanation:

An entrepreneur is always ready to take risks

:) :)

2. How does the traditional approach to network design differ from the building block approach?

Answers

The traditional approach to network design involves designing a network from scratch, taking into consideration all the necessary components such as hardware, software, and network protocols.

This approach requires a deep understanding of network architecture and infrastructure and can be time-consuming and complex. On the other hand, the building block approach to network design involves using pre-built components to create a network. This approach involves selecting pre-configured hardware and software that fit the needs of the organization and integrating them into the existing infrastructure. This approach is generally faster and less complex than the traditional approach.

The key difference between these two approaches is the level of customization and control. With the traditional approach, the organization has complete control over the network design and can customize it to meet specific requirements. However, this approach is often more expensive and time-consuming. The building block approach, on the other hand, offers less customization but is more cost-effective and faster to implement. Ultimately, the approach that an organization chooses will depend on its specific needs and budget. While the traditional approach may be the best option for some organizations, the building block approach can be a viable alternative for others looking for a faster and more cost-effective solution.

Learn more about network here: https://brainly.com/question/13102717

#SPJ11

Create a program that prompts the user to enter 5 employee names and their salaries for the week. Sort the arrays is descending order according to salary. Use a for loop in the main method to call the necessary methods for input. You will use 2 different arrays, one for the employee name and one for the employee salary.



Use static methods for the following:


EmployeeName()


Employee Salary()


SelectionSort()


Output()



Add a binarySearch() static method

Answers

import java.util.Scanner;

public class Employee {

   static String[] names = new String[5];

   static double[] salaries = new double[5];

   public static void main(String[] args) {

       EmployeeName();

       EmployeeSalary();

       SelectionSort();

       Output();

   }

   public static void EmployeeName() {

       Scanner input = new Scanner(System.in);

       for (int i = 0; i < names.length; i++) {

           System.out.print("Enter name of employee " + (i + 1) + ": ");

           names[i] = input.nextLine();

       }

   }

   public static void EmployeeSalary() {

       Scanner input = new Scanner(System.in);

       for (int i = 0; i < salaries.length; i++) {

           System.out.print("Enter salary of employee " + (i + 1) + ": ");

           salaries[i] = input.nextDouble();

       }

   }

   public static void SelectionSort() {

       for (int i = 0; i < salaries.length - 1; i++) {

           int maxIndex = i;

           for (int j = i + 1; j < salaries.length; j++) {

               if (salaries[j] > salaries[maxIndex]) {

                   maxIndex = j;

               }

           }

           double tempSalary = salaries[i];

           salaries[i] = salaries[maxIndex];

           salaries[maxIndex] = tempSalary;

           String tempName = names[i];

           names[i] = names[maxIndex];

           names[maxIndex] = tempName;

       }

   }

   public static void Output() {

       System.out.println("Employees sorted by salary:");

       for (int i = 0; i < names.length; i++) {

           System.out.println(names[i] + ": " + salaries[i]);

       }

   }

   public static int binarySearch(double[] array, double searchValue) {

       int low = 0;

       int high = array.length - 1;

       while (low <= high) {

           int mid = (low + high) / 2;

           if (array[mid] == searchValue) {

               return mid;

           } else if (array[mid] < searchValue) {

               high = mid - 1;

           } else {

               low = mid + 1;

           }

       }

       return -1;

   }

}

This Java program prompts the user to input 5 employee names and salaries and stores them in two separate arrays. The program then uses a selection sort algorithm to sort the employees' salaries in descending order and prints out the sorted employee names and salaries.

Finally, the program includes a binary search method that can be used to search for a specific salary in the salaries array.

The main method calls the necessary methods for input, sorting, and output using a for loop. The EmployeeName and EmployeeSalary methods prompt the user to input and store the values in the names and salaries arrays, respectively.

The SelectionSort method sorts the arrays in descending order based on the salaries using a selection sort algorithm. The Output method prints out the sorted employee names and salaries.

Additionally, the program includes a binarySearch method that takes in an array and a search value as parameters and returns the index of the search value in the array if found, or -1 if not found.

Overall, this program demonstrates how to use arrays, selection sort, and binary search in Java to sort and search through employee salary data.

For more questions like Java click the link below:

https://brainly.com/question/29897053

#SPJ11

MS-Word 2016 is the latest version of WORD software. True or False
It's urgent ​

Answers

Answer:

true

Explanation:

Answer: This is True!

I hope you have a nice day

An algorithm is a guiding rule used to solve problems or make decisions. Please select the best answer from the choices provided T F

Answers

True. An algorithm can be defined as a step-by-step procedure or a set of rules designed to solve a specific problem or perform a particular task.

It serves as a guiding rule for problem-solving or decision-making processes. Algorithms are used in various fields, including computer science, mathematics, and even everyday life.

In computer science, algorithms are fundamental to programming and software development. They provide a systematic approach to solving complex problems by breaking them down into smaller, manageable steps.

Algorithms can range from simple and straightforward to highly complex, depending on the nature of the problem they aim to solve.

The importance of algorithms lies in their ability to provide a structured and efficient solution to a given problem. They help in achieving consistency, accuracy, and reproducibility in decision-making processes. Additionally, algorithms enable automation and optimization, allowing for faster and more reliable problem-solving.

It is essential to acknowledge and respect the originality and intellectual property of others when using algorithms developed by someone else. Proper citation and avoiding plagiarism are crucial to ensure the integrity of one's work and uphold ethical standards.

For more such questions on algorithm,click on

https://brainly.com/question/29927475

#SPJ8

g i r l s o n l y j o i n
id= ons jcuv jke

Answers

at least 20 characters long

Each student is expected to write a short case study on "The Global Electric Vehicle (EV) industry". The case should include the following:

A brief snapshot of the global EV industry
Using Michael Porter’s five force framework, conduct an industry scan for the global EV industry
How has COVID impacted the EV industry?
The future of EVs as compared to conventional cars. Are EVs really ’green’?

Answers

The case study includes a snapshot of the industry, an analysis using Porter's five forces, the impact of COVID-19, and an assessment of the future of EVs compared to conventional cars.

What are the key components of the case study on the global EV industry?

Each student is assigned to write a short case study on "The Global Electric Vehicle (EV) industry." The case study should cover various aspects.

Firstly, it should provide a brief snapshot of the global EV industry, including its current market size, growth rate, key players, and major market trends. This snapshot will provide an overview of the industry's status and dynamics.

Secondly, the case study should apply Michael Porter's five force framework to conduct an industry scan for the global EV industry. This analysis should assess the industry's competitive rivalry, bargaining power of buyers and suppliers, threat of new entrants, and threat of substitute products. It will help identify the industry's competitive forces and their impact on the EV market.

Next, the case study should explore the impact of the COVID-19 pandemic on the EV industry. It should discuss the challenges faced by the industry, such as disruptions in supply chains, reduced consumer demand, and delays in production and technology development. Additionally, it should highlight any opportunities or changes that emerged during the pandemic.

Lastly, the case study should examine the future of EVs compared to conventional cars. It should analyze the environmental benefits of EVs, including reduced emissions and dependence on fossil fuels. It should also consider the challenges related to EV adoption, such as limited charging infrastructure and battery production concerns. This analysis will help evaluate whether EVs are truly 'green' and their potential for wider adoption in the future.

Overall, the case study aims to provide a comprehensive understanding of the global EV industry, its competitive landscape, the impact of COVID-19, and the potential of EVs as a sustainable alternative to conventional cars.

Learn more about industry

brainly.com/question/16680576

#SPJ11

Question 9 of 10
Which pair of devices work together to allow incoming and outgoing
communications between a predefined set of users?

Answers

The pair of devices that work together to allow incoming and outgoing communications between a predefined set of users are a router and a firewall.

What is a Router?

A router is a network device that connects multiple networks together and forwards data packets between them. It is responsible for directing incoming and outgoing traffic between networks.

A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on a set of predetermined rules. It filters and blocks unauthorized access to the network and allows only authorized users to access the network.

Together, the router and firewall work to ensure that only authorized users can communicate with each other over the network. The firewall filters incoming and outgoing traffic based on the predetermined rules, while the router forwards the allowed traffic to its destination.

Read more about communications here:

https://brainly.com/question/25645043

#SPJ1

Teens are more likely to access the news online or by watching the news on TV.
OA. True
OB. False

Answers

The answer is True.

Brainliest for correct answer :)
How many different input combinations will be considered in the truth table, when there are 2 Inputs to the logic circuit?

Answers

Answer:

hey there, it's 4 different input combinations (TrueTrue, TrueFalse, FalseFalse,FalseTrue).

power steering belts should be checked for all of the following EXCEPT

Answers

You did not list the options.

Jasmine took many pictures at a photo shoot. She wants to transfer these pictures from her camera to her laptop for image enhancements. What mode is best to transfer the images? A. USB Cable B. Bluetooth C. the cloud D. thumb drive​

Answers

The answer would more likely be A
If it’s not correct I’m very sorry

Answer:

USB cable is correct

Explanation:

edmentum/plato

Anime Recommendations? ( No isekai, harem, or fan service recommendations I don't like that genre) I'd like more of horror, idol, romance, comedy, fantasy and action recommendations please ! :)

Answers

Answer:

little witch academia

Explanation:

its on netflix and was my first anime :-)

9.
Write an application that computes and displays the day on which you become (or
became) 10,000 days old. Save the application as Ten ThousandDaysOld.java.
TI

Answers

Answer:

Explanation:

The following code is written in Java and it asks you for your age and then prints out the exact date from your birthday that you will turn 10,000 days old.

import java.util.Calendar;

import java.util.Date;

import java.util.Scanner;

public class Main {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("What is your age?");

       int age = in.nextInt();

       int daysLeft = (10000 - (age*365));

       Date birthday = new Date();

       Calendar cal = Calendar.getInstance();

       cal.setTime(birthday);

       cal.add(Calendar.DATE, daysLeft);

       Date modifiedDate = cal.getTime();

       System.out.println(modifiedDate);

   }

}

Were the colonists loyal to the British king after the war began? WILL GIVE BRANLEST PLS ASAP

Colonists were loyal to the French once the American Revolution began.
Colonists were never loyal to the king, so the war didn’t change anything.
There was no more British loyalty in the American colonies once the war began.
The colonists still felt loyalty for their king even after the start of the war.

Answers

Answer:

There was no more British loyalty in the American colonies once the war began.

Explanation:

The American Revolution began in 1775 as a response to the absolutist policies imposed by King George of Great Britain, specifically in economic and political matters, on the Thirteen Colonies and their citizens.

During the reign of King George, many civil, political and economic freedoms were suppressed (through the Intolerable Acts and other similar regulations), with which popular support for the monarchy was gradually losing size. Thus, new liberal ideologies began to appear, based on the postulates of philosophers such as John Locke or Jean Jacques Rousseau, who promoted the freedom of the individual and the respect of their natural rights as the fundamental premises of social organization.

For this reason, at the time of the Revolution, most of the settlers were pro-independence, while small minorities continued to support Great Britain. Precisely, these minorities, after the advance of the armed conflict, began to move towards what is now Canada, which continued to be a British stronghold.

Answer:

The colonists still felt loyalty for their king even after the start of the war.

Explanation:

Loyalists were American colonists who remained loyal to the British Crown during the American Revolutionary War, often referred to as Tories, Royalists or King's Men at the time. They were opposed by the Patriots, who supported the revolution, and called them "persons inimical to the liberties of America."

The function that accepts a c-string as an argument and converts the string to a long integer is:___________

Answers

The function that accepts a c-string as an argument and converts the string to a long integer is the strtol() function.

The strtol() function is part of the C standard library and is declared in the <cstdlib> header file. It is used to convert a C-string (character array) representing an integer value into a long int value.

Here's the general syntax of the strtol() function:

#include <cstdlib>

long int strtol(const char* str, char** endptr, int base);

   str is the C-string to be converted.

   endptr is a pointer to a char* object that will be set by the function to the character immediately following the converted number.

   base is the number base (radix) to interpret the string (e.g., 10 for decimal numbers, 16 for hexadecimal numbers).

The strtol() function parses the input string and returns the converted long int value. If the conversion fails, it returns 0. You can check for conversion errors by examining endptr or by using errno if you have included the <cerrno> header.

Here's an example of using strtol() to convert a C-string to a long int:

#include <cstdlib>

#include <iostream>

int main() {

   const char* str = "12345";

   char* endptr;

   long int num = strtol(str, &endptr, 10);

   if (endptr == str) {

       std::cout << "Invalid input.";

   } else {

       std::cout << "Converted number: " << num;

   }

   return 0;

}

In this example, the C-string "12345" is converted to the long int value 12345, and it is printed to the console.

To learn more about string visit: https://brainly.com/question/30392694

#SPJ11

Which of the following is a strategy used to enhance communication in a presentation?

Answers

One of the strategy used to enhance communication in a presentation is to speak clearly and confidently.

Other strategies for effective communication

Know your audience: Tailor your message to your audience and their interests, needs, and knowledge level.

Use visual aids: Visual aids such as slides, images, videos, or diagrams can help to clarify and reinforce your message.

Speak clearly and confidently: Project your voice and vary your tone and pace to keep your audience engaged and interested.

Use storytelling: Incorporate stories, examples, or anecdotes that illustrate your points and make your presentation more memorable.

Encourage audience participation: Ask questions, invite feedback, or provide opportunities for audience members to interact with you or each other.

Keep it simple and focused: Stick to your main message and avoid using jargon, complex terminology, or irrelevant information.

Practice, practice, practice: Rehearse your presentation multiple times to become more comfortable with the material and refine your delivery.

Learn more about communication here:

https://brainly.com/question/28153246

#SPJ1

structure that the house the electronic system specifications

Answers

Electrical systems, also called circuits or networks, are designed as mixtures of mainly three fundamental components: resistor, capacitor, and inductor. They are likewise defined by resistance, capacitance, and inductance—generally considered to be lumped-parameter effects.

What are the specifications of a circuit?

The specification can (and normally does) also set some of the physical parameters that the procedure must meet, such as size, weight, moisture resistance, temperature range, thermal output, vibration tolerance, and acceleration tolerance.

What is the electronic system?

An Electronic System is a physical interconnection of components, or parts, that gathers various parts of information together.

To learn more about Electrical systems, refer

https://brainly.com/question/24786034

#SPJ9

Other Questions
will mark first person correct BRAINLIST!!!!!!!!!!!!!!!!the local newspaper has letters to the editor from,70 people. If this number represents 4% of all of the newspaper's readers, how many readers does the newspaper have? What do you think Ponyboy meant when he said Dally died gallant? (RAFFT) What is the best answer to solution of x^2 + 16 = 0? Home Burial PART B: Which TWO quotes from the poem best support the answers to Part A? the animals in phylum mollusca are so diverse, why did scientists place them all in the same phylum? PLEASE HELP I WILL GIVE BRAINLIEST! KMandNPareparallellines.JKLMNOPQWhich angles are corresponding angles? AP3X!!!Read the following thesis and counter-argument from an essay: THESIS: Cell phones may cause brain cancer. COUNTER-ARGUMENT: Medical research has not yet proven a connection between brain cancer and cell phone use.Which of the following is the most relevant rebuttal to the counter -argument? A. Cell phones are not a necessity, so people could learn to moderate use in case their health is at risk. B. Medical research usually takes a long time before it proves anything. C. Even though they cannot prove the case for cancer yet, is being glued to a radioactive device 24 hours a day really smart? D. While not enough time has passed for conclusive evidence to prove this , many studies have indicated that there's a likely risk. Our Sun has a surface temperature of 5770 K and a radius of 6.96 x 105km. Jupiter has a mean radius of 69,900 km, an albedo of 0.52 and an average orbital radius of 778 x 106 km. The observed equivalent blackbody temperature of Jupiter is 20 K higher than the effective temperature of Jupiter. Assuming that the temperature of Jupiter is in a steady state, estimate the flux density of radiation emitted from the top of it atmosphere that is generated internally by processes in the planet. this component provides rigid structure and support to the outside of a cell while this substance fills inside the cell. Dale made $105 for 7 hours of work. At the same rate, how much would he make for 9 hours of work? helppp please Company R, an Apple device repair company, has maintained a competitive advantage by providing excellent repairs at a reasonable price. The company focuses on repairing devices to the point as if they were brand new when repaired, which takes significant time. Customers and employees have suggested expediting the process by giving up on some quality; however, the CEO and top management team have rejected that suggestion. Competitor Company S has started providing same-day repairs, which takes significantly less time than Company R's services. Due to this new same-day repair service provided by Company S, Company R has lost many customers and is continuously losing more customers. According to the dynamic capabilities perspective, Company R has lost its competitive advantage due toa. resource stocks.b. resource flows.c. value chain disruption.d. core rigidity. If the magnitude of the electric field of an electromagnetic wave is 3x10^3 V/m, what is the the magntude of the magnetic field?a. 1.1 x 10^-12 Tb. 9 x 10^11 Tc. 10^5 Td. 10^-5 Te. 3 x 10^3 T suppose you separate a 2.95 g mixture of sand and salt and recover 1.33 g of salt. what is the percent by mass of salt in the mixture? Problem #2: Depreciation Methods (Show your work)Numo Company purchased a new machine on October 1, 2021, at a costof $145,000. Thecompany estimated that the machine will have a salvage value of$2 Consider the reactivity of phenol, bromobenzene, toluene, and nitrobenzene toward electrophilic aromatic substitution.1.) The most reactive compound is (pick one: phenol, bromobenzene, toluene, and nitrobenzene) because the (pick one: electron donating or electron withdrawing) character of the (pick one: alcohol group, methyl group, bromine atom, or nitro group) increases the rate of the reaction.2.) The least reactive compound is (pick one: phenol, bromobenzene, toluene, and nitrobenzene) because the (pick one: electron donating or electron withdrawing) character of the (pick one: alcohol group, methyl group, bromine atom, or nitro group) decreases the rate of the reaction. What is this expression in simplified form?3/3 x 6/6 What is discrimination need the answers step by step for 6-9 f(x) = 2/x, find f'(x)