you want to see the steps your users take toward a key conversion. which exploration technique lets you visualize the steps users take toward a key task or conversion and see how well they are succeeding or failing at each step?

Answers

Answer 1

Since you want to see the steps your users take toward a key conversion. the exploration technique that lets you visualize the steps users take toward a key task or conversion and see how well they are succeeding or failing at each step is option A: Funnel exploration.

What is the purpose of a funnel?

With the use of funnel exploration, you can easily assess how well your users are succeeding or failing at each step in the process of completing a task. How, for instance, can prospects turn into consumers and ultimately buyers?

The practice of mapping website visitor flow to a set of precise funnel processes that lead to conversions or signups is known as funnel analysis. Businesses use funnel analysis to track the user's progress around their websites, improve them, and determine how many people enter at each stage.

Therefore, Exploration is the process of looking for mineral, coal, oil, or gas deposits (petroleum). In order to determine the location, quantity, and quality of the deposit, information obtained during exploration is used.

Learn more about exploration technique from

https://brainly.com/question/1087764
#SPJ1

See full question below

Which of these exploration techniques helps you visualize the steps your users take toward a key task or conversion and see how well they are succeeding or failing at each step?

Funnel exploration

Segment overlap

Free form

Cohort explorations


Related Questions

consider sending a 2900-bytes datagram into a link that has an mtu of 700 bytes. how many fragments are generated assuming that ip header is 20 bytes?

Answers

There would be 5 fragments generated. The first fragment would be 700 bytes (MTU) + 20 bytes (IP Header) = 720 bytes. The remaining 2880 bytes would be divided into 4 fragments of 700 bytes each.

What is Bytes?
Bytes are the smallest unit of measurement used to measure digital information. Bytes are typically used to measure the size of a file, the amount of memory on a computer, the size of a document, or the amount of data that can be transmitted over a network. A single byte contains 8 bits, which is the smallest unit of memory a computer can access. A byte is large enough to represent one character of text, such as a letter or number. A kilobyte (KB) is equal to 1,024 bytes, a megabyte (MB) is equal to 1,048,576 bytes, and a gigabyte (GB) is equal to 1,073,741,824 bytes.

To know more about Bytes
https://brainly.com/question/14927057
#SPJ4

Susan is a network administrator and is setting up her company's network. In the process to determine an open port on a firewall, she should

Answers

Answer:

type C:\>nmap 203.0.113.100 then Enter

Explanation:

because none of the other chooses make sense

What is the name of the item that supplies the exact or near exact voltage at the required wattage to all of the circuitry inside your computer?

Answers

Answer:

It's the power supply

Explanation:

The power supply is what essentially enables the computer to operate. It is able to do that by converting the incoming alternating current (AC) to direct current (DC) at the correct wattage rating that is required by the computer to function. The power supply is a metal box that is generally placed in the corner of the case.

Language is python 9.14 lab: brute force equation solver numerous engineering and scientific applications require finding solutions to a set of equations. ex: 8x + 7y = 38 and 3x - 5y = -1 have a solution x = 3, y = 2. given integer coefficients of two linear equations with variables x and y, use brute force to find an integer solution for x and y in the range -10 to 10. ex: if the input is: 8 7 38 3 -5 -1 then the output is: x = 3 , y = 2 use this brute force approach: for every value of x from -10 to 10 for every value of y from -10 to 10 check if the current x and y satisfy both equations. if so, output the solution, and finish. ex: if no solution is found, output: there is no solution

Answers

Program in Python to solve equations using brute force algorithm. Image of code and screen output is attached.

Python code

if __name__ == '__main__':

# Define variables

cx1 = int()

cy1 = int()

c1 = int()

cx2 = int()

cy2 = int()

c2 = int()

solution_found = bool()

solution_found = False

# Data entry

print("Enter integer coefficients of two linear equations like this 8x + 7y = 38")

print("Equation 1")

print("coefficients of X: ", end="")

cx1 = int(input())

print("coefficients of Y: ", end="")

cy1 = int(input())

print("Constant: ", end="")

c1 = int(input())

print("Equation 2")

print("coefficients of X: ", end="")

cx2 = int(input())

print("coefficients of Y: ", end="")

cy2 = int(input())

print("Constant: ", end="")

c2 = int(input())

# Applying brute force to find an integer solution for x and y in the range -10 to 10

for x in range(-10,11):

 for ye in range(-10,11):

  if (cx1*x)+(cy1*ye)==c1 and (cx2*x)+(cy2*ye)==c2:

   sx = x

   sy = ye

   solution_found = True

# Output

if solution_found==True:

 print("Solution for X: ",sx)

 print("Solution for Y: ",sy)

else:

 print("There is no solution")

To learn more about brute force algorithms see: https://brainly.com/question/20115984

#SPJ4

Language is python 9.14 lab: brute force equation solver numerous engineering and scientific applications

Which online note-taking device allows students to clip a page from a website and reuse it later?

web clipping tools
electronic sticky notes
offline data storage sites
online data storage sites

Answers

Answer:

The answer is A.) web clipping tools.

Explanation:

Cuz like yeah

Answer: WEB CLIPPING TOOLS

Explanation:

Asia is selling bracelets to raise money for the school's band trip. She needs to determine how much she has already raised and how many more bracelets she must sell. Which response best explains why a computer would perform this task better than a human?

Computers can perform calculations at unbelievable speeds.
Computers can think creatively.
Computers can replicate human tasks.
Computers don't require sleep.

Answers

Note that where Asia is selling bracelets to raise money for the school's band trip and she needs to determine how much she has already raised and how many more bracelets she must sell, the response that best explains why a computer would perform this task better than a human is: "Computers can perform calculations at unbelievable speeds." (Option A)

What is the speed of the fastest computer?

Frontier, the fastest supercomputer on the TOP500 supercomputer list as of May 2022, with a LINPACK benchmark score of 1.102 ExaFlop/s, followed by Fugaku. The United States has five of the top ten, China has two, and Japan, Finland, and France each have one.

As of June 2022, China had 173 of the world's 500 most advanced and powerful, one-third more than its next competitor, the United States, which had an additional 128 supercomputers.

Learn more about computing speed:
https://brainly.com/question/2072717
#SPJ1

what are the means of hardware security?​

Answers

Answer:

Hardware security is vulnerability protection that comes in the form of a physical device rather than software that is installed on the hardware of a computer system. ... Common examples include hardware firewalls and proxy servers.

Explanation:

Thank you

Explanation:

Hardware security is vulnerability protection that comes in the form of a physical device rather than software that is installed on the hardware of a computer system. ... Common examples include hardware firewalls and proxy servers.

The user is told to guess a number between one and 10.

Which responses from the user could cause the program to halt with an error statement? Choose two options.

two
2.5
12
-3
0

Answers

Answer:

0 and -3

Explanation:

These two options do not fall within 1 and 10.

Answer:

2.5 and two

are the answers

Computer _ rely on up to date definitions?

A. Administrators
B. Malware Scan
C. Firmware updates
D. Storage Drivers

Answers

Answer:  The correct answer is B. Malware Scan

Explanation:

The word "definition" only applies to antivirus and malware removal applications that scan for patterns using the definitions. The other choices do not use definitions. Firmware updates rely on images, storage drives use drivers and administrators are user privilege type.

Does anyone know fundamentals of computing I’m begging you pls

Answers

Answer:

Search results say:

"The Computing Fundamentals examination covers a foundational understanding of computer hardware, software, operating systems, peripherals, and troubleshooting to help you get the most value and impact from computer technology. Computer Hardware, Peripherals and Troubleshooting."

Explanation:

Or:

What is Fundamentals of Computing Part 1?

"QTR 1 Fundamentals of Computing is designed to introduce students to the field of computer science through an exploration of engaging and accessible topics. Through creativity and innovation, students will use critical thinking and problem solving skills to implement projects that are relevant to students' lives."

These are not my words, they were found in an internet search.

why is it necessary to have usernames and passwords if one is working on a network?​

Answers

Answer:

So nobody finds and uses your personal information

what are communication tool ​

Answers

Answer:

Basic Communication Tools. A wide variety of communication tools are used for external and internal communication. These tools include mail, email, telephones, cell phones, smartphones, computers, video and web conferencing tools, social networking, as well as online collaboration and productivity platforms.

What peripheral port type was originally developed by Apple and is currently regarded as the optimal interface for digital video transfer

Answers

Answer:

IEEE 1394

Explanation: Common port used for video preipherals and other video transfer

what statement about constructors is false? group of answer choices all constructors are passed a pointer argument constructors may take arguments you must write at least one constructor for every class classes may have more than one constructor constructors have no return type

Answers

A return type cannot exist in the constructor. It ought to produce and deliver fresh objects. Consequently, a compilation error would result.

Including a return type in a constructor declaration is not allowed. A constructor has to accept one or more input parameters. In the absence of explicitly declared constructors for the class, Java will give a default constructor. The name of the constructor should match the class name. 2) The compiler will automatically produce a default parameterless constructor for a class if you don't define one. 3) All instance variables are initialized to default values, such as 0, null, and super(), by the default constructor.

Learn more about variable here-

https://brainly.com/question/13375207

#SPJ4

as a member of the help desk team, you have been assigned to update the driver for the network adapter that is installed on most of the computers in your department. you have a copy of the latest driver on a usb flash drive. which windows utility allows you to manually update this new driver?

Answers

To manually update the network adapter driver in Windows, use the Device Manager utility to browse for the new driver on the USB flash drive and install it.

To manually update the network adapter driver in Windows, you can use the Device Manager utility. To access it, you can right-click the Start button and select "Device Manager" from the context menu, or you can search for "Device Manager" in the Start menu or Cortana search bar. Once in Device Manager, find the network adapter for which you want to update the driver, right-click it and select "Update Driver." From there, you can select "Look through my computer for driver software." and point the search to the USB flash drive's driver location.

After selecting the option to "Browse my computer for driver software," you will be prompted to specify the location of the driver. Navigate to the folder on the USB flash drive where you have saved the new driver and select it. Windows will then install the updated driver for the network adapter.

It's worth noting that before installing the new driver, it's always a good idea to backup your current driver and system configuration in case of any issues. Also, ensure that you have administrative rights on the computer and that the new driver is compatible with your specific version of Windows and the network adapter hardware.

Learn more about USB flash drive here:

https://brainly.com/question/4576943

#SPJ4

How did the invention of an airplane totally change people’s views of the world?

Answers

airplanes have played an important role in the social life of so many people. after this marvellous invention, people became more socially interactive. they have been able to explore the world and travel to so many places.

Write down the difference between Sub... end sub and function... end function statement.
any 3 points, please ​

Answers

A sub does something but doesn't give something back. A function provides a value representing the tasks completed. Subs come in many different types and can be recalled from anywhere in the program.

What is sub and end sub in VBA?

A Sub procedure is a collection of Visual Basic statements that are delimited by the Sub and End Sub statements and that carry out tasks without producing a result. A calling procedure may give constants, variables, or expressions as inputs to a sub process.

Various processes are used in Visual Basic, including: Sub Procedures carry out tasks but do not provide the calling code with a value in return. Sub procedures known as "event-handling procedures" run in response to an event triggered by a user action or by a program occurrence.

Thus, A sub does something but doesn't give something back.

For more information about sub and end sub in VBA, click here:

https://brainly.com/question/26960891

#SPJ1

Define a class Sphere to input radius of a sphere and compute the volume of it. Volume = πr3 (where π=3.14)​

Answers

Lets use Python

Program:-

\(\tt r=(float(input("Enter\:the\:radius\:of\:Sphere=")))\)

\(\tt V=4/3*3.14*r**3\)

\(\tt print("Volume\:of\:the\:sphere=",V)\)

Output:-

\(\tt Enter\:the\:radius\:of\:the\:sphere=3\)

\(\t Volume\:of\:the\:Sphere=103.4\)

Write a specification file of a class name Sample, with Private data members( one intezer, one
character, one boolean) and all the necessary methods, including (find(), isthere()) methods? Please write and type it out in C++.

Answers

The Sample class in C++ has private data members consisting of an integer, a character, and a boolean value. It also includes methods such as find() and isthere() to perform specific operations on the class data.

The Sample class is designed to encapsulate data with three private members: an integer, a character, and a boolean value. These private members can only be accessed or modified through the class's methods.

The find() method can be implemented to search for a specific value within the class data. It takes a parameter representing the value to be searched and returns a boolean value indicating whether the value is found or not.

The isthere() method is designed to check the existence of a particular data member. It takes a parameter representing the data member and returns a boolean value indicating whether the data member exists within the class data or not.

These methods allow for controlled access to the private data members, ensuring encapsulation and data integrity. Other methods and operations specific to the requirements of the class can be added as necessary.

To learn more about boolean value, refer:-

https://brainly.com/question/30624264

#SPJ11

Why error occurs during transmission? Explain different types of errors with suitable examples. 5 (b) How do you detect error using CRC? Generate the CRC code for the data word 1101011011 The divisor is x4+x+1. 7

Answers

During transmission, errors occur due to a variety of factors such as atmospheric conditions, system malfunction, or network errors.

Different types of errors include Single Bit Error, Burst Error, and Burst Error Correction. Here are the different types of errors with suitable examples: Single Bit Error: It occurs when one bit of data is changed from 1 to 0 or from 0 to 1 in data transfer. This type of error is mainly caused by a small amount of interference or noise in the transmission medium. For instance, a parity bit error.Burst Error: It occurs when two or more bits are incorrect during data transmission. A Burst Error occurs when bits of data are lost or changed in groups, which can affect multiple data bits at once. It can be caused by signal loss or attenuation in fiber-optic cables. Burst Error Correction: To overcome the issue of Burst Error, Burst Error Correction is used. This method divides data into blocks to detect and fix errors. Reed-Solomon coding and Viterbi decoding are two types of burst error correction techniques. There are different techniques for error detection, and the Cyclic Redundancy Check (CRC) is one of them. CRC checks the checksum at the receiver's end to ensure that the data was not corrupted during transmission. To detect errors using CRC, follow these steps: Divide the data word by the generator polynomial. Generator polynomial: x4 + x + 1 Divide 1101011011 by x4 + x + 1 and find the remainder by using the modulo 2 division method.1101011011 10011- 10011000- 10011000- 10010100- 10010100- 10000001- 10000001- 1111100- 1111100- 1001The remainder of the above step is the CRC code of the data word, which is 1001. Therefore, the CRC code for the data word 1101011011 is 1001.

know more about type of error.

https://brainly.com/question/31751999

#SPJ11

program should count the number of successive 1’s and successive 0’s in the string and print out the counts of the successive amounts.

Answers

```python

def count_successive(string):

   count_ones = 0

   count_zeros = 0

   max_ones = 0

   max_zeros = 0

   for char in string:

       if char == '1':

           count_ones += 1

           count_zeros = 0

           if count_ones > max_ones:

               max_ones = count_ones

       elif char == '0':

           count_zeros += 1

           count_ones = 0

           if count_zeros > max_zeros:

               max_zeros = count_zeros

   print(f"Maximum successive ones: {max_ones}")

   print(f"Maximum successive zeros: {max_zeros}")

# Example usage:

count_successive("110011000111111")

```

The provided code defines a function `count_successive` that takes a string as input. It initializes variables `count_ones` and `count_zeros` to keep track of the current counts of successive ones and zeros, respectively. It also initializes `max_ones` and `max_zeros` to store the maximum counts of successive ones and zeros encountered so far.

The function then iterates over each character in the string. If the character is '1', it increments `count_ones` and resets `count_zeros` to zero since we are counting successive ones. If the character is '0', it increments `count_zeros` and resets `count_ones` to zero since we are counting successive zeros.

After each increment, the code checks if the current count is greater than the maximum count encountered so far for each category (ones and zeros). If it is, it updates the corresponding maximum count.

Finally, the function prints the maximum successive ones and maximum successive zeros by using formatted string output.

Learn more about Complex operations

brainly.com/question/13325963

#SPJ11

What are the qualities of strong leaders? Check all that apply. They inspire others. 1)They are easily influenced by others. 2)They are outstanding role models. 3)They have a strong sense of purpose. 4)They lack self-confidence.

Answers

Answer: 2 and 3
Explanation:

I would pick 2 and 3 based on process of elimination

These questions are from the sql database query,


Find the highest rated apps with a user rating of at least 4. 6, have at least 1000 reviews, and does not have a content rating of ‘Everyone’.


Find the total number of apps for each of the 6 content rating categories.


Find the top 3 highest rated apps in the category of ‘TOOLS’ that have more than 225,000 reviews. Also, include at least 1 positive review for each of the top 3 apps in the visualization

Answers

To find the highest rated apps with a user rating of at least 4.6, have at least 1000 reviews, and does not have a content rating of ‘Everyone’, you would need to have access to the app store or platform where the apps are listed.

From there, you would need to filter the apps based on their user rating and the number of reviews they have received. Then, you would need to further filter the apps based on their content rating to exclude those with a rating of ‘Everyone’.

To find the total number of apps for each of the 6 content rating categories, you would need to have access to the app store or platform where the apps are listed. From there, you would need to group the apps based on their content rating and count the number of apps in each group.

To find the top 3 highest rated apps in the category of ‘TOOLS’ that have more than 225,000 reviews, you would need to have access to the app store or platform where the apps are listed. From there, you would need to filter the apps based on their category and the number of reviews they have received. Then, you would need to rank the remaining apps based on their user rating and select the top 3. Finally, you would need to find positive reviews for each of the top 3 apps and include them in a visualization.

Learn more about apps here brainly.com/question/11070666

#SPJ4

the comptia ____________________ certification tests an individual’s security knowledge mastery and requires two years on-the-job networking experience, with emphasis on security.

Answers

CompTIA Security+ is the certification that tests an individual’s security knowledge mastery and requires two years on-the-job networking experience, with emphasis on security.

It is an internationally recognized certification that is designed to validate the essential knowledge and skills required to perform core security functions and pursue an IT security career.CompTIA Security+ certification ensures that an individual possesses the basic knowledge required to secure and defend IT infrastructure against cyber attacks and other emerging threats. It covers a wide range of topics, including network security, access control, cryptography, organizational security, disaster recovery, and risk management.

The certification is designed to help professionals enhance their skills, build their knowledge, and advance their career in the field of cybersecurity. The certification is recognized by government agencies, private organizations, and other entities across the globe. It helps professionals demonstrate their knowledge and expertise in the field of cybersecurity and validates their skills to potential employers.CompTIA Security+ certification is an important step in building a successful career in cybersecurity.

It equips professionals with the knowledge and skills required to secure and defend IT infrastructure and helps them stand out in the job market. It is an industry-leading certification that validates an individual’s expertise in the field of cybersecurity and provides a foundation for further career advancement.

To learn more about security :

https://brainly.com/question/32133916

#SPJ11

write a program that asks the user to enter three different names and then sorts and display names in ascending order. do not use any sorting utilities that exist in java, such as arrays.sort() or treeset. while this is 100% how you would do this in a real world program, this lesson is teaching you how to use string comparisons and if/else conditionals for complex logic.

Answers

Here is the main answer.

import java.util.Scanner;

public class NameSorter {

   public static void main(String[] args) {

       Scanner scanner = new Scanner(System.in);

       System.out.print("Enter three names: ");

       String name1 = scanner.next();

       String name2 = scanner.next();

       String name3 = scanner.next();

       if (name1.compareTo(name2) <= 0) {

           if (name2.compareTo(name3) <= 0) {

               System.out.println(name1 + " " + name2 + " " + name3);

           } else {

               if (name1.compareTo(name3) <= 0) {

                   System.out.println(name1 + " " + name3 + " " + name2);

               } else {

                   System.out.println(name3 + " " + name1 + " " + name2);

               }

           }

       } else {

           if (name1.compareTo(name3) <= 0) {

               System.out.println(name2 + " " + name1 + " " + name3);

           } else {

               if (name2.compareTo(name3) <= 0) {

                   System.out.println(name2 + " " + name3 + " " + name1);

               } else {

                   System.out.println(name3 + " " + name2 + " " + name1);

               }

           }

       }

   }

}

This program asks the user to enter three different names and sorts them in ascending order using string comparisons and if/else conditionals.

The program begins by importing the Scanner class from the java.util package, which allows us to read user input from the console. It then defines a main method that is executed when the program is run.

In the main method, the program prompts the user to enter three names using the System.out.print method and reads in the names using the Scanner.next method.

The program then uses a series of nested if statements to compare the three names and determine their order. The compareTo method is used to compare the names lexicographically, which means that it compares them based on their alphabetical order.

If the first name is less than or equal to the second name, the program checks whether the second name is less than or equal to the third name. If it is, the names are printed in order. If it is not, the program checks whether the first name is less than or equal to the third name.

If it is, the names are printed in the appropriate order. If it is not, the third name must be the smallest and the names are printed in the appropriate order.

If the first name is greater than the second name, the program checks whether the first name is less than or equal to the third name. If it is, the names are printed in the appropriate order. If it is not, the program checks whether the second name is less than or equal to the third name. If it is, the names are printed in the appropriate order.

If it is not, the third name must be the largest and the names are printed in the appropriate order. Finally, the program uses the System.out.println method to print the sorted names to the console.

For more questions Program click the link below:

https://brainly.com/question/11023419

#SPJ11

Sports photography is not included in news coverage.


True


False

Answers

Answer:

False yes it is

Explanation:

refers to the increasing accessibility of technology, allowing more people to access information, create content, and develop applications.refers to the increasing accessibility of technology, allowing more people to access information, create content, and develop applications.

Answers

Answer:

Democratization of technology

Explanation:

Democratization of technology refers to the increasing accessibility of technology. More people have better access to the tools needed to view content and create technology solutions of their own.

Answer:

democratization of technology: the increasing accessibility of technology, allowing more people to access and create content and applications

Explanation:

- Edge 2022

your computer appears to be correctly configured but the device or resource is not responding

Answers

Answer:

Oh no! You'll probably have to contact your teacher for help.

Explanation:

Open the gallery10-1.js file and below the code that creates and populates the captions array, declare the htmlCode variable, setting its initial value to an empty text string.

Create a for loop with a counter variable i that goes from 0 to 13 in increments of 1. Each time through the for loop, add the following code to the value of the htmlCode variable:



caption_i

where i is the value of the counter variable and caption_i is the value from the captions array with index number i.

After the for loop, change the inner HTML of the document element by the ID gallery to the value of the htmlCode variable.

Answers

The code has been written in CSS as is done in the space below

How to write the code

// Code that creates and populates the captions array

var captions = ["Caption 1", "Caption 2", "Caption 3", "Caption 4", "Caption 5", "Caption 6", "Caption 7", "Caption 8", "Caption 9", "Caption 10", "Caption 11", "Caption 12", "Caption 13", "Caption 14"];

// Declare htmlCode variable and initialize it to an empty string

var htmlCode = "";

// Create a for loop to generate HTML code for each caption

for (var i = 0; i < 14; i++) {

 htmlCode += "<div class='captionStyle'>" + captions[i] + "</div>";

}

// Set the innerHTML of the gallery element to the generated HTML code

document.getElementById("gallery").innerHTML = htmlCode;

In this code, we create a for loop that iterates over the captions array and generates HTML code for each caption using the current index of the array. The generated code is appended to the htmlCode variable at each iteration of the loop. Finally, the innerHTML of the gallery element is set to the generated HTML code.

Read more on CSS code here:https://brainly.com/question/30166021

#SPJ1

1. why have we been studying special resource allocation scenarios, such as single-unit and single-unit-request policies in the context of deadlock detection?

Answers

We have been studying special resource allocation scenarios, such as single-unit and single-unit-request policies in the context of deadlock detection because it is important to understand how different allocation policies can impact the likelihood of a deadlock occurring.

By analyzing the behavior of different allocation policies, we can determine which policies are more effective at preventing deadlocks and can use this information to design more efficient and reliable systems.Deadlocks occur when two or more processes are waiting for resources that are being held by other processes, resulting in a situation where none of the processes can proceed. This can lead to a system becoming unresponsive and can cause significant delays and disruptions.To prevent deadlocks from occurring, we need to implement resource allocation policies that are designed to minimize the likelihood of two or more processes becoming deadlocked. By studying special resource allocation scenarios, such as single-unit and single-unit-request policies, we can gain a better understanding of how different policies impact the likelihood of deadlocks occurring and can use this information to design more effective deadlock prevention strategies.Overall, the study of special resource allocation scenarios in the context of deadlock detection is an important area of research that can help us to design more efficient and reliable systems. By understanding how different allocation policies impact the likelihood of deadlocks occurring, we can develop more effective policies and strategies to prevent deadlocks and ensure that our systems remain responsive and reliable.

To learn more about Deadlocks please visit:

https://brainly.com/question/2983979

#SPJ11

Other Questions
Please helpppIdentify one of the types of conflict (listed below) in Sakis The Interlopers. Then discuss how it came about, how it builds, and how it is finally resolved.Include the following Academic Vocabulary in your response to make your writing more precise:comprehend, concept, context, determine, differentiate.Write at least 200 words.types of conflict:1. person vs self2. person vs person3. person vs society4. person vs natureQuestions to consider:-what is the protagonists goal?- what prevents the protagonist from reaching that goal?- how does the protagonist change throughout the story?- what causes that change?Remember:Provide textual evidence to support your position. apacity in the selling division may increase select one: a. a negotiated transfer price b. the market price for the good c. the price that a buying divisi Which word best describes the tone of "After Apple-Picking"?. Which sentence below is tariff used correctly? A. All states charge a tariff B. A tariff is charged to mail a letter C. Americans are required to pay a tariff at the airport D. A tariff was added to the Chinese imports. Find the standard deviation, correct to 2 decimal places.Data Set: 10, 12, 12, 16, 24 Mean 14.8 a sample of ammonia gas has a volume of 50.0 ml at stp. part a what is the celsius temperature if the volume is 600.0 ml at 350 mmhg ? It is important to keep household batteries out of landfills because of all of the following except:____.A. they can leach toxic metalsB. Their decomposition can contribute to greenhouse gas emissionC. they can be recycled which would reduce they need for new raw materials Explain how increased energy efficiency is beneficial. Identify any vertical, horizontal, or slant asymptotes in the graph of y = f(z). f(x) = x-x-12 x + 5 O Vertical asymptote(s): None Horizontal asymptote: None Slant asymptote: y =z-6 O Vertical asymp The Gardner Company expects sales for October of $247,000. Experience suggests that 40% of sales are for cash and 60% are on credit. The company collects 50% of its credit sales in the month of sale and 50% in the month following sale. Budgeted Accounts Receivable on September 30 is $67,500. What is the amount of cash expected to be collected in October Explain how New Amsterdam became New York. (i can say if you got it wrong or not) When did Albania become a communist country?1990199119441946 f(x)= (x - 1)^2+2 Graph the function and identify the axis is symmetry What do prokaryote cells and eukaryote cells have in common explain how the regions of Latin America could be described as both a formal and perceptual regionthanks to anyone that answers How does the united nations convention of the law of the sea affect international relations? When a client's muscle or joint problem is brought on or aggravated by exercise, the Personal Trainer should: Explain how layers that form in ice are similar to tree ringsfirst answer gets brainliest Round to 1 significant figure: be changedWhich of the following best describes someone operating at Kohlberg's Conventional Stage of moraldevelopment?a) Donna breaks a law, because she's sure she'll never get caughtb) Garth decides not to cut in line, because he's learned in school that taking cuts is wrongc) Bao finds $100,000 and returns it, because he believes that it's the right thing to do.d) Jane pretends to get hurt on the job, so she can take some time off and still get paid, because shefeels like "those profit-sucking greed-heads owe it to me!"e) Sponge Bob doesn't make fun of squirrels wearing oxygen helmets because of his highly developedpersonal code of values