which type of cookie is set by a site other than the one you connected to?

Answers

Answer 1

Answer:

The type of cookie that is set by a site other than the one you connected to is called a third-party cookie.

Explanation:

Third-party cookies are created by domains other than the one that the user is visiting. These cookies are often used for advertising and tracking purposes, allowing advertisers and analytics companies to collect information about the user's browsing habits across multiple websites.


Related Questions

Consider the following declarations:

class bagType
{
public:
void set( string, double, double, double, double);
void print() const;
string getStyle() const;
double getPrice() const;
void get( double, double, double, double);
bagType();
bagType(string, double, double, double, double);
private:
string style;
double l;
double w;
double h;
double price;
};
bagType newBag; // variable declaration

Requried:
a. How many members does class bagType have?
b. How many private members does class bagType have?
c. How many constructors does class bagType have?
d. How many constant functions does class bagType have?
e. Which constructor is used to initialize the object newBag?

Answers

Answer:

12, 5, 2, 3

bagType

Explanation:

I just did it

Tawni made some changes to her file and wants to save the changes in a document with a different title. How can she do this?

Answers

Answer:

By using the save as tab

Explanation:

The save as option allows a user to make another different copy of the same document, or to save the document in another location within the computer system. The shortcut key to quickly access the save as option, is F12. The save as option can also be accessed by going through the following steps

1) Click the File tab

2) Click on the Save as option

3) Select a location to save the file then click save to confirm selection and save the file.

Answer:save as tab

Explanation:

sharing resources.
b) What do you say for the picture given?
2) Write the advantages of
computer
networks
5

sharing resources.b) What do you say for the picture given?2) Write the advantages ofcomputernetworks5

Answers

Answer:

Explanation:

2- Multitasking Multitasking – Multitasking Multitasking is one among the main advantage of computer. ...

Speed – Now computer isn't just a calculating device. ...

Cost/ Stores huge – Amount of knowledge it's a coffee cost solution. ...

Accuracy – ...

Data Security – ...

Task completer – ...

Communication – ...

Productivity –

More items...•

Mac or PC (Need more opinions!)
Just pick which one do you like and why. I need it for my research paper, please.

Answers

Answer:

PC because pc you can download anything without too much trouble and the Mac cost a lot and you will have a hard time with it.

For Questions, refer to Figure Q5.7

List all of the attributes of a movie.

Answers

Based on Figure Q5.7, the attributes of a movie include the title, director, actors/actresses, genre, length/duration, language, country of origin, release date, rating, and synopsis/summary. Based on your request, here's a list of some common attributes of a movie:

1. Title: The name of the movie.
2. Director: The person who directs the making of the movie.
3. Genre: The category or type of movie (e.g., action, comedy, drama, etc.).
4. Release Date: The date when the movie was first released.
5. Duration: The total running time of the movie.
6. Cast: The actors and actresses who play roles in the movie.
7. Rating: The classification given to the movie by the rating board (e.g., G, PG, PG-13, R, etc.).
8. Plot: A brief description of the storyline or events in the movie.
9. Production Company: The company responsible for producing the movie.
10. Country of Origin: The country where the movie was produced.

These are just some of the many attributes that can be associated with a movie.

To learn more about attributes   click on the link below:

brainly.com/question/31656040

#SPJ11

Computers that communicate over a network must follow certain ___ to ensure that the transmission is sent properly and understood.

Answers

Computers that communicate over a network must follow certain protocols or rules, in order to ensure that data are transmitted properly and understood.

What is a protocol?

A protocol can be defined as a formatted blocks of data that have been designed and established to obey a set of standard rules (conventions) such as the Transmission Control Protocol and Internet Protocol (TCP/IP).

In Computer networking, all computers and other network devices that communicate over a network must follow certain protocols or rules, in order to ensure that data are transmitted properly and well understood by end users.

Read more on protocol here: https://brainly.com/question/17387945

You are a cleared employee. You discovered fraud and waste of money related to a classified program within your agency. If you report this fraud and waste through appropriate channels, you may receive protection under the Presidential Policy Directive 19 (PPD-19), Protecting Whistleblowers with Access to Classified Information.A. TrueB. False

Answers

Answer:

A. True.

Explanation:

If you are a cleared employee, who discovered fraud and waste of money related to a classified program within your agency. When you report this fraud and waste through appropriate channels, you may receive protection under the Presidential Policy Directive 19 (PPD-19): Protecting Whistleblowers with Access to Classified Information.

In the United States of America, President Barack Obama signed the Presidential Policy Directive 19 (PPD-19) in 2012. The PPD-19 is an executive order designed to provide significant protection for an employee who have access to classified informations such as waste of money and frauds, as well as prohibiting any form of retaliation against this cleared employee.

4.2 Code Practice: Question 2
Instructions
Write a loop that continually asks the user what pets the user has until the user enters rock, in which case the loop ends. It should acknowledge the user in the following format. For the first pet, it should say You have a dog with a total of 1 pet(s) if they enter dog, and so on.

Sample Run
What pet do you have? lemur
What pet do you have? parrot
What pet do you have? cat
What pet do you have? rock
------------
Sample Output
You have a lemur with a total of 1 pet(s)
You have a parrot with a total of 2 pet(s)
You have a cat with a total of 3 pet(s)

Answers

In python 3:

total = 0

while True:

   pet = input("What pet do you have? ")

   if pet == "rock":

       break

   total += 1

   print("You have a {} with a total of {} pet(s)".format(pet, total))

I hope this helps!

Answer:

pet = input(str("What pet do you have?"))

totalPets = 1

while(pet!="rock"):

  print("You have a " + str(pet) + " with a total of " + str(int(totalPets)) + " pet(s)")

  totalPets = totalPets+ 1

  pet = input(str("What pet do you have?"))

Does technology make us lazy? Explain. (Remember to support your
answer with citations and references)

Answers

The impact of technology on human laziness is a topic that has been widely debated and it is true to some extent.

Does technology make us lazy?

Some argue it makes us lazy, while others say it can enhance productivity and efficiency.

Argument - technology makes us lazy. Advocates claim tech's conveniences can promote inactivity and a sedentary lifestyle. Tasks once done by hand can now be completed with machines, leading to possible over-reliance on technology and less physical activity, which causes health issues.

Tech improves productivity and efficiency.  Tech revolutionized communication, info access, & task automation, enabling more accomplishment in less time.

Learn more about  technology  from

https://brainly.com/question/7788080

#SPJ1

In the table below, there are a few white collar crimes listed. After reviewing the link
above, define each crime and give an example of each white collar crime listed.
Money Laundering
Investment Fraud
Ponzi Scheme
Pyramid Scheme
Promissory Note
Fraud
Commodities Fraud
Broker Embezzlement
Market Manipulation

Answers

Answer:

Money Laundering: The process of hiding the source of illegally-obtained money.

Investment Fraud: A type of fraud that involves convincing a person to invest money in a fake

or worthless investment.

Ponzi Scheme: A type of investment fraud in which a person uses money from new investors

to pay off existing investors.

Pyramid Scheme: A type of investment fraud in which a person uses money from new investors

to pay their own personal expenses.

Promissory Note: A document that promises to pay a certain amount of money to a certain person

by a certain date.

Fraud: A type of white collar crime in which a person lies or uses deception in order to gain

something of value.

Commodities Fraud: A type of fraud that involves illegally manipulating the prices of

commodities.

Broker Embezzlement: A type of fraud in which a broker illegally uses their clients' money

for their own personal gain.

Market Manipulation: A type of fraud in which a person artificially inflates or deflates the

price of a security.

Explanation:

write a function named sum values whose parameter is an object/dictionary with strings as keys and decimal numbers as values. your function must returns the sum of the parameter's values.

Answers

The `sumValues` function is a useful utility function for working with objects that contain numeric data. It's also a good example of how to use loops and conditionals in JavaScript to process data in a structured way.

Here's one possible implementation of the function
```function sumValues(obj) {
 let sum = 0;
 for (let key in obj) {
   if (typeof obj[key] === 'number') {
     sum += obj[key];
   }
 }
 return sum;
}
```
This function starts by initializing a variable called `sum` to 0. Then it loops through each key in the input object using a `for...in` loop. For each key, it checks if the value associated with that key is a number (using the `typeof` operator). If it is, then it adds that value to the running total in `sum`. Finally, it returns the total sum.
One thing to note is that this implementation assumes that all of the values in the input object are numbers. If there are any non-numeric values, they will be ignored. If you want to handle this case differently (e.g. by throwing an error or returning NaN), you can modify the code accordingly.

For such more question on sumValues

https://brainly.com/question/28996310

#SPJ11

computer cannot do anything without instructions true or false

Answers

Answer: True

Explanation:A computer (specifically the CPU, or central processing unit, within the computer system) needs instructions in order to do even the simplest things. Without instructions, it can't do anything. Just to boot your computer requires executing many many instructions.

Hope it helps✌✌

Which computer databases would you search if you had images of a cartridge casing that had been ejected during a shooting?

Answers

These databases include the National Integrated Ballistic Information Network (NIBIN), eTrace, and IBIS (Integrated Ballistic Identification System).National Integrated Ballistic Information Network (NIBIN)NIBIN is a computerized system used to acquire, store, and compare digital images of firearm-related evidence, including cartridge cases and bullets.

It is a repository for ballistic evidence that has been recovered from crime scenes and firearms-related incidents.

The database is searchable to provide leads in investigations and allows for the linking of ballistic evidence to other crime scenes and incidents. eTraceeTrace is a web-based system that provides firearm tracking capabilities to law enforcement agencies.

It enables law enforcement officials to trace firearms used in the commission of crimes, thereby facilitating investigations.  Integrated Ballistic Identification System (IBIS)The Integrated Ballistic Identification System (IBIS) is a digital network that compares ballistic evidence to generate leads in an investigation.

It is utilized to analyze images of cartridge casings and bullets collected from crime scenes and weapons-related incidents. It enables the sharing of ballistic evidence between law enforcement agencies, allowing for faster identification and tracking of criminals.

To know more about National Integrated Ballistic Information Network visit :-

https://brainly.com/question/31259088

#SPJ11

a folder contains nencrypted files of which one is a special file. an attacker has access to the folder and withdraws kof these files one at a time. each selection is equally likely to be any one of the remaining files at the time. what is the probability that the intruder withdraws the special file?

Answers

The probability that the intruder withdraws the special file is 1/k.

What is the probability that the intruder withdraws the special file?The probability that the intruder withdraws the special file is dependent on the number of encrypted files in the folder and the number of files the intruder withdraws. If the folder contains n encrypted files and the intruder withdraws k of them one at a time, then the probability of the intruder withdrawing the special file is (1/n)^k. This means that the probability that the intruder withdraws the special file is increasing as the number of files in the folder decreases and the number of files the intruder withdraws increases.For example, if the folder contains 10 encrypted files and the intruder withdraws 5 of them one at a time, then the probability that the intruder withdraws the special file is (1/10)^5 or 0.0009765625. This means that the chances of the intruder withdrawing the special file are quite low, but not impossible.In general, the probability that the intruder withdraws the special file is inversely proportional to the number of encrypted files in the folder and proportional to the number of files the intruder withdraws. Therefore, the more files the intruder withdraws, the higher the probability that the special file will be withdrawn. Conversely, the more files that are in the folder, the lower the probability that the special file will be withdrawn.

To learn more about dividing probability refer to:

https://brainly.com/question/29844780

#SPJ4

What is a path and how do you know that it is filled and selected

Answers

Explanation:

A path represents a selected editing area of an image, this feature is typically available when using Adobe Photoshop software.

For example, a photographer may select the entire face area of his subject as his path (work path). To know when it is filled the photographer observes to see when the colour changes or other changes are applied to the background layer of the selected path.

5. All of the following are part of a cylinder head EXCEPT:
OA. Water pump
OB. Combustion chamber
OC. Valve guides
OD. Valve seats

Answers

Answer:

Wouldn't it be B? I mean a combustion chamber is where the fuel and air mixture are injected to be ignited and burned to produce power to a vehicle.

Which option offers predesigned formatting and design elements to facilitate the process of creating a document?
A.
themes
B.
templates
C.
design
D.
layout

Answers

Answer:

The answer is B, templates

Explanation:

Answer:

B. templates

Explanation:

limitation of the 8-bit extended ASCII character set is that it can only represent up to 128 explain how can these limitations can be overcome?

Answers

use more bits to allow for more characters for example unicode uses i think up to 32 bit

Software engineering is not only concerned with issues like system heterogeneity, business and social change, trust, and security, but also with ethical issues affecting the domain. Give some examples of ethical issues that have an impact on this domain

Answers

Answer:

follows are the solution to this question:

Explanation:

Confidentiality:

It always agrees with all of this, even though there is no security arrangement, and the theoretically facilitates the free exchange of information between both the client as well as the worker or understands that perhaps the personal life of a client and then all the concerns and problems we have belongs to them.

Competence:

It didn't distort the skill level in such a specific field or topic, it is the talent or capacity, and being able to be doing something well or be sane enough just to face charges in court.

Intellectual property rights:

It will be mindful of regional intellectual property laws in which the individuals over its mind's constructs are given over a certain amount of time, which typically gives the maker the exclusive right to use his / her development.

The examples of the ethical issued that have an impact on the domain is as follows:

Confidentiality:  When there is no security arrangement, and the theoretically facilitates the free exchange of information between both the client as well as the worker .Competence:  It didn't distort the skill level in such a specific field or topic, it is the talent or capacity. Intellectual property rights: It will be mindful of regional intellectual property laws in which the individuals over its mind's constructs are given over a certain amount of time.

Learn more: brainly.com/question/17429689

Will mobile banking catch on? Tell some good things about it. Then, explain the problems with it. Would you use a banking app? Why or why not? Use facts from the lesson in your answer.

Write your answer below.

Answers

Yes i would use a Banking app.
Because if you use a banking app you can know everything that happens in ur bank account and see all the purchases all the transactions and many more things you can send money to anyone you want and also lock and protect your cards if they get stolen or lost.

Write a program to output The sum of the cubes of odd integers between 11 and 49​

Answers

Answer:

779400

Explanation:

There are 20 odd integers between 11 and 49, they are 11, 13, 15, 17, 19, 21, 23, 25, 27, 29, 31, 33, 35, 37, 39, 41, 43, 45, 47, 49. There are 5 odd numbers before 11, and 25 odd numbers from 1 to 49.

Use the formula to calculate the sum

25^2 * (2 * 25^2 - 1) - 5^2 * (2 * 5^2 - 1)

= 25^2 * (2 * 625 - 1) - 5^2 * (2 * 25 - 1)

= 25^2 * (1250 - 1) - 5^2 * (50 - 1)

= 625 * 1249 - 25 * 49

= 780625 - 1225

= 779400

Verify:

11^3 + 13^3 + 15^3 + 17^3 + 19^3 + 21^3 + 23^3 + 25^3 + 27^3 + 29^3 + 31^3 + 33^3 + 35^3 + 37^3 + 39^3 + 41^3 + 43^3 + 45^3 + 47^3 + 49^3

= 1331 + 2197 + 3375 + 4913 + 6859 + 9261 + 12167 + 15625 + 19683 + 24389 + 29791 + 35937 + 42875 + 50653 + 59319 + 68921 + 79507 + 91125 + 103823 + 117649

= 779400

Here's a Python program that will output the sum of the cubes of odd integers between 11 and 49:

sum_of_cubes = 0

for i in range(11, 50):

if i % 2 == 1:

sum_of_cubes += i ** 3

print("The sum of the cubes of odd integers between 11 and 49 is:", sum_of_cubes)

This program initializes a variable called sum_of_cubes to 0, then uses a for loop to iterate through the range of numbers between 11 and 49. For each number in that range, it checks if the number is odd by using the modulus operator (%) to check if the number is divisible by 2 with a remainder of 1. If the number is odd, it adds the cube of that number to the sum_of_cubes variable.

Finally, the program prints out the total sum of the cubes of the odd integers between 11 and 49.

write a function that takes a string like 'one five two' and returns the corresponding integer (in this case, 152). a function just like this would be used in a speech recognition system (e.g. automated phone taxi bookings) to convert a spoken number into an integer value.

Answers

The function convertStringToNumber takes a string input representing a spoken number (e.g., "one five two") and returns the corresponding integer value (in this case, 152).

To implement this function, we can split the input string into individual words, convert each word into its numerical representation, and then concatenate them to form the final number. We can use a dictionary to map the word representations to their numerical values. Here's an example implementation in Python:

def convertStringToNumber(input_string):

   word_to_number = {

       'one': 1,

       'two': 2,

       'three': 3,

       'four': 4,

       'five': 5,

       'six': 6,

       'seven': 7,

       'eight': 8,

       'nine': 9,

       'zero': 0

   }

   words = input_string.split()

   number = ''

   for word in words:

       if word in word_to_number:

           number += str(word_to_number[word])

   return int(number)

By iterating over each word in the input string, we check if it exists in the word_to_number dictionary. If it does, we append the corresponding numerical value to the number string. Finally, we convert the number string to an integer and return it as the result.

To learn more about string

https://brainly.com/question/30392694

#SPJ11

question 4 fill in the blank: in ggplot2, the term mapping refers to the connection between variables and .

Answers

In ggplot2, the term mapping refers to the connection between variables and a plotting object like point, line, or other shape.

What is ggplot?

A geom in the gg plot2 system has "a plotting object like point, line, or other shape."A Geom is used in formulating different layouts, shapes, or forms of a ggplot2 such as bar charts, scatterplots, and line diagrams.

For example some different types of Geom can be represented as geom_bar(), geom_point(), geom_line() etc in ggplot2, the term mapping refers to the connection between variables and a Geom is used in formulating different layouts, shapes, or forms of a ggplot2 such as bar charts, scatterplots, and line diagrams.

Therefore, In ggplot2, the term mapping refers to the connection between variables and a plotting object like point, line, or other shape.

Learn more about variables on:

https://brainly.com/question/17344045

#SPJ1

You wrote a program to find the factorial of a number using recursion. 4! =

Answers

Answer:

24

Explanation:

Anything "factorial" is the result of multiplying the number by itself and all numbers below it, so:

4! = 4 × 3 × 2 × 1 = 24

There's no other info for this question so I assume you just wanted the answer, but as an example of a program here's a function that would work it out for you by using recursion in javascript, to use this you would call factorial(4) like at the bottom:

function factorial(num) {

 if (num < 0)  

       return -1;

 else if (num == 0)  

     return 1;

 else {

     return (num * factorial(num - 1));

 }

}

factorial(4);

please help me out with answering the questions

please help me out with answering the questions

Answers

10.

if "h" in letter:

   #do something

11.

if value >= 13.6:

   #do something

12.

if 5 < y < 11:

   #do something

13.

if num1 == num2:

   print("equal")

14.

num1 = int(input("Enter a number: "))

num2 = int(input("Enter a number: "))

if num1 > num2:

   print(num1)

else:

   print(num2)

15.

if number == 89 or number == 78:

   print("Your number is equal to 89 or 78")

I hope this helps! If you have any other questions, I'll do my best to answer them.

What recreational activity was invented in fayetteville?.

Answers

Fayetteville is known for inventing disc golf.

What recreational activity originated in Fayetteville?

Disc golf, a popular recreational activity, was invented in Fayetteville. Players throw a disc into a basket, aiming to complete each hole in the fewest number of throws. Similar to traditional golf, disc golf offers a challenging and enjoyable outdoor experience.

Courses are often set in parks or wooded areas, providing a scenic backdrop for players to navigate through trees and varying terrain. The game can be played casually with friends or competitively in organized tournaments. Disc golf has gained a significant following worldwide, attracting players of all ages and skill levels.

Learn more about Disc golf

brainly.com/question/29167866

#SPJ11

A) explain how traceroute works. assume in this traceroute the host is at least 9 hops away.

b) explain the meaning of flow control in routing?

Answers

30 hops
By default, the upper limit is 30 hops, but a different value can be specified when the command is run. When finished, traceroute prints all the hops in the path, along with the amount of time it took to each hop and back (this is known as the Round Trip Time

Pointers contain memory addresses for other variables, but there are no means to access or change the contents of those variables True O False We use the & symbol to create a pointer. int& myPointer; O True O False Assuming a 32 Bit Architecture .. A pointer is how many bytes? 4. A double is how many bytes? 8

Answers

False. Pointers contain memory addresses for other variables and provide a means to access and change the contents of those variables. int& myPointer; is not how we create a pointer. A pointer is typically 4 bytes in a 32-bit architecture, while a double is 8 bytes.

Pointers are variables that store memory addresses. They allow us to indirectly access and manipulate the contents of other variables by pointing to their memory locations. In C and C++, we can use pointers to access and modify the values stored in variables.

The statement "Pointers contain memory addresses for other variables, but there are no means to access or change the contents of those variables" is incorrect. Pointers provide a means to access and change the contents of variables by dereferencing them. By using the dereference operator (*) on a pointer, we can access or modify the value stored at the memory address it points to.

For example, if we have a pointer `int* myPointer` pointing to an integer variable `num`, we can access the value of `num` by dereferencing the pointer like this: `int value = *myPointer;`. We can also change the value of `num` by assigning a new value to the dereferenced pointer: `*myPointer = 42;`.

The statement "int& myPointer; is how we create a pointer" is also incorrect. The syntax `int& myPointer;` declares a reference to an integer variable, not a pointer. References are different from pointers in that they must be initialized to refer to an existing variable and cannot be reassigned to refer to a different variable.

In a 32-bit architecture, a pointer typically occupies 4 bytes of memory. This means that the memory address it can hold ranges from 0 to \(2^(32-1)\). On the other hand, a double data type usually occupies 8 bytes of memory, allowing it to store larger and more precise floating-point values compared to a float or an integer.

Learn more about Pointers

brainly.com/question/30460618

#SPJ11

what is the main purpose of a web crawling program
A.two index web pages for quick retrieval full of content B.turn create meta tags for web contact C. to search illicit or illegal web activity D.to convert keywords to HTML
Please ANSWERRRRR​

Answers

Answer:

the answer is A because Web crawlers enable you to boost your SEO ranking visibility as well as conversions.

Explanation:

the diagram that is most effective in describing the internal steps of a use case is

Answers

The diagram that is most effective in describing the internal steps of a use case is the Sequence Diagram.

A Sequence Diagram is a behavioral diagram in Unified Modeling Language (UML) that illustrates the interaction between objects or actors within a system over time. It depicts the chronological sequence of events and messages exchanged between different components, such as objects, actors, or system modules, during the execution of a use case.

In the context of a use case, a Sequence Diagram helps visualize the order of interactions and the flow of control between different entities involved in achieving the use case's objectives. It shows how objects or actors collaborate and exchange information to accomplish specific tasks or scenarios.

The Sequence Diagram typically represents the behavior of the system in response to various events and user interactions. It captures the dynamic aspect of a use case by illustrating the specific sequence of actions, method invocations, and responses between different entities.

Learn more about Sequence Diagram visit:

https://brainly.com/question/29812843

#SPJ11

Other Questions
Molds are a type of fungus that can cause severe allergies when conditions are favorable for it to reproduce asexually. Which of these best describes how a person would trigger an allergy caused by mold? mila's fev1 is recorded as 1.5 l, and fvc as 2.2 l. calculate her fev1/fvc ratio; is this consistent with her diagnosis? What is the output of the function when the input is 0? Please solve the Problem. Simplify the expression -15 + (-16 + 9.34/6) 3^2 -5.7 help please, im kind of a r3+ard T-T Pls help I need help with chemistry pls Suppose a profit-maximizing monopolist faces a constant marginal cost of $20, produces an output level of 100 units, and charges a price of $50. The socially efficient level of output is 200 units. Assume that the demand curve and marginal revenue curve are the typical downward-sloping straight lines. The monopoly deadweight loss equals $1,500. The Hansen Group is one of the UKs largest construction groups. Traditionally, the company has been involved primarily in civil engineering but it has recently begun to diversify, partly through acquiring local government contracts, for example for street maintenance and cleaning and the facilities management of publicly owned buildings, such as universities. Therefore, the company is now involved in a wide range of diverse activities and employs an increasingly diverse workforce, from street cleaners to highly qualified civil engineers.The three years since the Credit Crunch of 2008 have been incredibly difficult for the construction industry in the UK. As a result of the economic downturn, many construction firms have decreased their spending on learning and development. Hansen Construction has, however, increased its investment in these activities, notably introducing a new apprenticeship scheme for construction team leaders, expanding online learning provision and continuing to recruit and develop significant numbers of graduates. Hansen recognizes that talented individuals are the lifeblood of the firm and, therefore, sees investment in workforce development as a key dimension of its employment proposition. This approach is felt to be in line with its commitment to sustainability in its corporate activity.The learning and development team at Hansen drives learning and development innovations, provides analysis of business learning requirements and manages the delivery of cost-effective learning solutions to support the achievement of business goals. Learning solutions at Hansen include traditional off-the-job classroom programs, short courses, online learning interventions, workbooks and mentoring. The firm has recently recruited two new team members specifically to design in-house e-learning solutions, and to upgrade the companys online learning management system.Traditionally, training needs for Hansen staff have been identified centrally and on the basis of the employee group. This has been consistent with its traditional approach to training for large groups in classroom settings. However, with an increasingly diverse workforce, the company has sought to introduce a new performance management system that focuses on individual performance and the competencies behind that performance.In 2010, the L&D team sought to supplement its traditional classroom-based training programs with a series of bite-sized (typically half an hour) interactive learning modules for construction site staff that were linked together to form part of a meaningful program of activities. These were known as toolbox talks, and were delivered by site managers, using materials developed to support them by the central team. The talks are mainly devoted to site management and health and safety issues. In addition, a significant part of Hansens revised approach to learning and development is to increase the amount of on-the-job coaching employees receive and to create a coaching culture within its management community.Hansen has made significant investment in technology-based learning (or e-learning), particularly software that enables e-learning specialists within the learning and development team to produce online training programs, several of which are compulsory for all employees. The learning and development team is exploring other technological solutions, such as the use of mobile phones and DVDs, to deliver learning to its maintenance workers, street cleaners and other employees who do not have ready access to the Internet.Historically, the evaluation of learning and development interventions at Hansen has tended to focus on the initial reactions of employees by asking them to complete evaluation forms after having attended a training program. However, as part of the wider changes to learning and development at the company, longer-term evaluation of interventions is now in place. This involves the learning and development center asking the manager sponsoring any new program to define what a positive outcome would look like in order to determine an appropriate metric for assessment, such as employee engagement or productivity, and involves contacting recipients of training 36 months after they have completed a program and asking them whether they are doing anything differently as a result of what they have learned.what is the external environment/mission/process/social subsystem/individual domain in this case 20Select the correct answer.Which statement about Earth's layers is true?O A. They all consist of liquid rock.B. They each vary in size and temperature.O C. They are all under an equal amount of pressure.OD.They will soon combine, forming a single, thick layer.Dacat a company's next annual dividend will be $12 and that dividends after one year will have a constant growth rate of 5%. if the required rate of return is 9%, then what should the stock price and dividend yield be? Questions #3 - 10 Record the LETTER OF THE FRACTION card that is equivalent to the decimal representation below. Not all cards will be used. HINT: Use your calculator to convert all fraction cards to decimals BEFORE you solve #3 - #10.#3 *10 pointsCaptionless Imaged#4 *10 pointsCaptionless ImageThis is a required question#5 *10 pointsCaptionless Imagee#6 *10 pointsCaptionless Imageg#7 *10 pointsCaptionless ImageThis is a required question#8 *10 pointsCaptionless Image#9 *10 pointsCaptionless Image#10 *10 pointsCaptionless Image could I get help with number 2 in the following image Starting from one oasis, a camel walks 25 km in a direction 30 south of west and then walks 30 km toward the north to a second oasis. What is the direction from the first oasis to the second oasis?Select one:a.21 N of Wb.39 W of Nc.69 N of Wd.51 W of Ne.42 W of N help would be appreciated What can a writer describe about two characters to help develop their personalities?A. their communicationB. the settingC. the expositionD. a transition what's the answer really need help kristi, a japanese expatriate working in denmark, tends to use communication primarily to build personal social relationships. she feels that relationships and trust are more important than business. kristi is surprised that her business associates in denmark do not share the same views. based on this information, kristi most likely grew up in what type of culture? Sketch the region enclosed by the given curves. Decide whether to integrate with respect to x or y. Draw a typical approximating rectangle.y = x^2 2x, y = 4xFind the area of the region. How did the ideas expressed in "The White Man'sBurden" affect the lives of colonized people?