Identify and explain 4 traditional (old ways) marketing approaches used by University uses in reaching
out to potential students without the medium of technology?

Answers

Answer 1

Based on the information given, it should be noted that the traditional marketing techniques that can be used are:

Billboards.Direct mail.Signage.Flyers.

What is marketing?

Marketing simply means they action that is used to promote one's business and it includes marketing research and advertising.

The traditional marketing approaches used by the University in reaching out to potential students without the medium of technology include Billboards, Direct mail, Signage, and Flyers.

Learn more about marketing on:

https://brainly.com/question/25369230


Related Questions

Explain data hazard and structural hazard. Then, explain how we can prevent each type of hazard. Provide two examples to support your explanations

Answers

Answer:

Answered below

Explanation:

Data hazards happen when instructions exhibiting data dependence modify data in the different stages of a pipeline. Potential data hazards when not attended to, can result in race hazards or race conditions. Examples of situations where data hazards can occur is read after write, write after read, write after write. To resolve data hazards we can insert a pipeline whenever a read after write, dependence is encountered, use out-of-order execution or use operand forwarding.

Structural hazards happen when multiple instructions which are already in pipeline new the same resource. Example is a situation which many instructions are ready to execute an there is a single Arithmetic Logic Unit. Methods for preventing this hazard include pipeline break an pipeline flushing.

Computer keyboard failures can be attributed to electrical defects or mechanical defects. A repair facility currently has 25 failed keyboards, 6 of which have electrical defects and 19 of which have mechanical defects.
a. How many ways are there to randomly select 5 of these keyboards for a thorough inspection (without regard to order)?
b. In how many ways can a sample of 5 keyboards be selected so that exactly two have an electrical defect?
c. If a sample of 5 keyboards is randomly selected, what is the probability that at least 4 of these will have a mechanical defect?

Answers

Answer:

A. 53130

B. 1 4535

C.  0.656578

Explanation:

a.

Failed keyboards = 25

The number of electrical defects = 6

The number of mechanical defects = 19

using Combination Formulas since the question stated that order isn't required.

Combination formula is nCr = n! / r! * (n - r)!,

In the above formula,  n = The number of the population

r= the number of items chosen randomly whenever there is selection

In the question, n= 25, r= 5

so putting this in the formula we have:

nCr =  25! / 5! (25-5)!

nCr =  25! / 5! (20)!

so, 25! is 25 x 24 x 23 x 22 x 21 x 20 x 19 x 18 x 17 x 16 x 15 x 14 x 13 x 12 x 11 x 10 x 9 x 8 x 7 x 6 x 5 x 4 x 3 x 2 x 1 divided by 5! (20)!

where 5! = 5 x 4 x 3 x 2 x 1

and (20)! = 20 x 19 x 18 x 17 x 16 x 15 x 14 x 13 x 12 x 11 x 10 x 9 x 8 x 7 x 6 x 5 x 4 x 3 x 2 x 1

25C5 = 53130

b.

To do this, we will find the combination of the value of keyboards that have have electrical defects then multiply it be the value of the combination of keyboards that have mechanical defects.

for electrical defects, n= 6

6C2 =  6! / 2! (6-2)!

Note we use 2 because of the value given from the question (In how many ways can a sample of 5 keyboards be selected so that exactly two have an electrical defect?)

6C2 =  6! / 2! (4)!

6C2 = 6 x 5 x 4 x 3 x 2 x 1 / 2 x 1 (4 x 3 x 2 x 1 )

6C2 = 720 / 2(24‬)

6C2 = 15‬

for mechanical defects, n = 19, selecting the other 3, so r = 3

19C3 =  19! / 2! (19-3)!

19C3 = 19 x 18 x 17 x 16 x 15 x 14 x 13 x 12 x 11 x 10 x 9 x 8 x 7 x 6 x 5 x 4 x 3 x 2 x 1 / 3 x 2 x 1 ( x 16 x 15 x 14 x 13 x 12 x 11 x 10 x 9 x 8 x 7 x 6 x 5 x 4 x 3 x 2 x 1)

19C3 = 121,645,100,408,832,000‬ / 2 (355,687,428,096,000‬)

19C3 =969‬

19C3  x 6C2 =  969 x 15‬ = 1 4535

C.

For mechanical defect = we add to events together

19C4 =  19! / 4! (19-4)! + (19C5 = 19! / 5! (19-5)!)

19C4=  23256

19C5  = 11628

so adding these events 23256  +  11628  = 34884

Since the total of 25 combinating 5 selections, that is 25C5 =  53130

Then the probability that at least 4 of these will have a mechanical defect

= 34884 / 53130

= 0.656578

A) The number of ways to randomly select 5 of these keyboards for a thorough inspection (without regard to order) is; 53130 ways

B) The number of ways that a sample of 5 keyboards be selected so that exactly two have an electrical defect is; 14535 ways

C) The probability that at least 4 of these will have a mechanical defect if a sample of 5 keyboards is randomly selected is; 0.6566 or 65.66%

Probability Combinations

We are given that;

Total defective keyboards = 25Keyboards with electrical defects = 6Keyboards with mechanical defects = 5

A) The number of ways to randomly select 5 of these keyboards for a thorough inspection (without regard to order) is gotten by combination formula which is; nCr

Thus, we have;

25C5 = 25!/(5! × (20 - 5)!)

>> 53130 ways

B) The number of ways that a sample of 5 keyboards can be selected so that exactly two have an electrical defect is;

6C2 × 19C3 = 14535 ways

C) The probability that at least 4 of these will have a mechanical defect if a sample of 5 keyboards is randomly selected is gotten by getting the total number of cases first which is;

N = (19C4 × 6C1) + (19C5 × 6C0)

N = 23256 + 11628

N = 34884

Total possible cases of choosing 5 keyboards is;

25C5 = 53130

Thus;

P(at least 4 of these will have a mechanical defect if a sample of 5 keyboards is randomly selected) = 34884/53130

>> 0.6566

Read more about combinations at; https://brainly.com/question/11871015

Note that common activities are listed toward the top, and less common activities are listed toward the bottom.
According to O*NET, what are common work activities performed by Veterinarians? Check all that apply.

Answers

According to O*NET, common work activities performed by Veterinarians include:

A) documenting/recording information

C) making decisions and solving problems

E) working directly with the public

F) updating and using relevant knowledge

What is the Veterinarians work about?

According to O*NET, common work activities performed by Veterinarians include:

documenting/recording information, such as medical histories and examination resultsmaking decisions and solving problems, such as diagnosing and treating illnesses and injuriesworking directly with the public, such as answering questions and providing information about animal healthupdating and using relevant knowledge, such as staying current with new research and developments in veterinary medicine.

Hence the options selected above are correct.

Learn more about Veterinarians from

https://brainly.com/question/7982337

#SPJ1

See full question below

Note that common activities are listed toward the top, and less common activities are listed toward the bottom.

According to O*NET, what are common work activities performed by Veterinarians? Check all that apply.

A) documenting/recording information

B) repairing electronic equipment

C) making decisions and solving problems

D) operating large vehicles

E) working directly with the public

F) updating and using relevant knowledge

What kind of files are automatically blocked in outlook?

A: .doc and .vbs files

B: .xls and .doc files

C: .vbs and .exe files

D: .rtf and .exe files

Answers

C) .vbs and .exe files

Answer:

Guy above is right

Explanation:

Edge 2022

Keith is presenting a documentary he created. He most likely shot the documentary using a 1. digital camera 2.scanner 3. projector and edited the documentary on a 1. sound editing tool 2. media player 3. movie editing tool

Answers

Keith most likely shot the documentary using a digital camera and edited it on a movie editing tool. The correct option is A.

What is digital camera?

A digital camera is a device that takes pictures and stores them digitally. Digital cameras have mostly replaced film-based cameras as the majority of those made today.

High-quality video and photographs may be captured with a digital camera, which is necessary for making a documentary.

While physical documents and photographs can be digitally preserved with scanners, videos are not routinely recorded using them.

A media player is a piece of software that can play audio and video files, although it's not frequently used to edit videos.

Although it is uncommon for a documentary to be produced with a projector, it is frequently utilized to show it to an audience.

Thus, the correct option is A.

For more details regarding digital camera, visit:

https://brainly.com/question/24155120

#SPJ9

program a macro on excel with the values: c=0 is equivalent to A=0 but if b is different from C , A takes these values

Answers

The followng program is capable or configuring a macro in excel

Sub MacroExample()

   Dim A As Integer

   Dim B As Integer

   Dim C As Integer

   

   ' Set initial values

   C = 0

   A = 0

   

   ' Check if B is different from C

   If B <> C Then

       ' Assign values to A

       A = B

   End If

   

   ' Display the values of A and C in the immediate window

   Debug.Print "A = " & A

   Debug.Print "C = " & C

End Sub

How does this work  ?

In this macro, we declare three integer   variables: A, B, and C. We set the initial value of C to 0 and A to 0.Then, we check if B is different from C using the <> operator.

If B is indeed different from C, we assign the value of B to A. Finally, the values of A and C are displayed   in the immediate window using the Debug.Print statements.

Learn more about Excel:
https://brainly.com/question/24749457
#SPJ1

When you read in data from a file using the read() method the data is supplied to Python in the form of:
A. A list of Strings
B. A String
C. A list of lists
D. Raw ASCII values

Answers

Answer:

B. A String

Explanation:

Remember, there are other methods or ways to read data from a file such as readlines(), and the for ... in loop method.

However, if you read in data from a file using the read () method the data would be supplied to Python in the form of a String (or single String). This is the case because a String supports only characters, unlike lists that could contain all the data types.

Using the read() method in python is used to read in files such as text files, csv and other file types. The read() method will render the read in data as as a string.

In general, the read in data from the file is supplied in the form of a string, however, depending on the version of python which is being used, the string type may vary.

When using python 2, the data is supplied as a bytestring while the data is supplied a unicode string in python 3.

Hence, the read() method renders data as a string.

Learn more : https://brainly.com/question/19973164

what are the benefits of solar installation ?

Answers

Solar installation offers numerous benefits for homeowners and businesses alike. One of the primary advantages is cost savings. By using solar energy, individuals can significantly reduce their electricity bills and save money in the long run. Additionally, solar power is a renewable energy source, which means it is eco-friendly and sustainable. This helps reduce carbon emissions and improve overall air quality.

Another benefit of solar installation is increased property value. Homes and businesses with solar panels installed are considered more valuable due to their reduced energy costs and increased energy efficiency. Additionally, solar panels require very little maintenance, which makes them a reliable and hassle-free investment.

Finally, solar power can provide energy independence. By generating their own electricity, individuals and businesses are not dependent on the grid, which can be especially useful during power outages or other emergencies.

Overall, solar installation is an excellent investment that offers numerous benefits, including cost savings, eco-friendliness, increased property value, and energy independence.

For more such questions on renewable, click on:

https://brainly.com/question/13203971

#SPJ11

A co-worker is called away for a short errand and leave the clinical PC logged onto the Confidential Information System. You need to look up information using the same computer system to provide treatment. What should you do

Answers

Since you need to look up information on the same computer system to provide treatment, you should do the following: Log your co-worker off and then login with your Username (User ID) and Password.

What is a Confidential Information System?

A Confidential Information System can be defined as a database that contains the personal information that are electronically created or shared with a company by a grantee or client, especially for specific purposes such as:

TreatmentContract bidEmployment

In this scenario, you should do the following: Log your co-worker off and then login with your Username (User ID) and Password since you need to look up information on the same computer system to provide treatment.

Read more on confidential information here: https://brainly.com/question/25530020

What are the fundamental activities that are common to all software processes?

Answers

Answer:

There are some fundamental activities that are common to all software processes:

•Software specification. In this activity the functionality of the software and constraints on its operation must be defined.

•Software design and implementation. ...

•Software validation. ...

•Software evolution

Website managers use
every day.

Answers

Answer:

google

Explanation:

hsjsjwjwwjajakakaka

Mencione como la electricidad evoluciono la vida el ser humano.
AYUDA

Answers

Answer:

La electricidad es el conjunto de fenómenos físicos relacionados con la carga eléctrica y los campos eléctricos y también con el electromagnetismo. Dado que la energía eléctrica es una fuente importante de energía en la vida cotidiana, las palabras "electricidad" y "corriente" a menudo se usan indistintamente en el habla cotidiana. Sin embargo, la electricidad también incluye otros fenómenos fácilmente reconocibles como los rayos y la electricidad estática.

La electricidad tiene muchas aplicaciones técnicas. Por lo tanto, la ingeniería eléctrica se explora y se desarrolla más en la ingeniería eléctrica. A diferencia de muchos otros fenómenos físicos, muchos de los fenómenos asociados con la electricidad pueden medirse y calcularse previamente con gran precisión.

La electricidad es un fenómeno natural. La más conocida es la ocurrencia de rayos, que es causada por una diferencia de potencial en la atmósfera. Algunos peces, como la anguila eléctrica, también son capaces de generar electricidad. Además, los sistemas nerviosos animal y humano funcionan con señales eléctricas.

The 2013 version of Word will feature improved readability of documents on the screen and better integration of videos. True False

Answers

Answer:

True

Explanation:

. Write a program to calculate the square of 20 by using a loop
that adds 20 to the accumulator 20 times.

Answers

The program to calculate the square of 20 by using a loop

that adds 20 to the accumulator 20 times is given:

The Program

accumulator = 0

for _ in range(20):

   accumulator += 20

square_of_20 = accumulator

print(square_of_20)

Algorithm:

Initialize an accumulator variable to 0.

Start a loop that iterates 20 times.

Inside the loop, add 20 to the accumulator.

After the loop, the accumulator will hold the square of 20.

Output the value of the accumulator (square of 20).

Read more about algorithm here:

https://brainly.com/question/29674035

#SPJ1

In a network that uses distance-vector routing protocols, what information is included in the update sent out by each router?

Answers

Answer:

Network or next hop associations

Explanation:

In a network that uses distance-vector routing protocols, the information that is included in the update sent out by each router is "network or next hop associations."

This information is contained in a routing table. It commands a router on which destination is most favorable. It is done by carrying the packet to a certain router that indicates the next hop along the way to the last destination.

In a network that uses distance-vector routing protocols, the information that is included in the update sent out by each router is the network or next hop association.

A distance-vector routing protocol in data networks is vital for determining the best route for the packets that are based on the distance.

It should be noted that distance-vector routing protocol simply measures the distance based on the number of routers that a packet will have to pass. The information that is vital will be the network or next hop association.

Read related link on:

https://brainly.com/question/20595433

how do you import an SVG file?

Answers

Answer:

You can also add an SVG file directly to your Silhouette Library, by choosing File > Import > Import to Library. This will save the design in Studio format to your library for future use. Then, just double-click the design you want to use to open it in the Silhouette workspace.

Explanation:

What are the core steps to add revisions or features to a project?(1 point)
Responses

Evaluate feasibility of the goals, create a list of functionality requirements, and develop the requirements of the feature.

Evaluate feasibility of the goals, develop programming solutions, and evaluate how well the solutions address the goals.

understand the goals, evaluate the impact on the project, create a list of functionality requirements, and develop the requirements of the feature.

Communicate with the client, create a sprint backlog, develop the project, and evaluate how well the solution fits the requirements.

Answers

The core steps to add revisions or features to a project are ""Understand the goals, evaluate the impact on the project, create a list of functionality requirements, and develop the requirements of the feature." (Option C)

How  is this so?

 

The core steps to add revisions or features to a project include understanding the goals,evaluating the impact on   the project, creating a list of functionality requirements,and developing   the requirements of the feature.

These steps ensure that the goals are clear, the impact is assessed, and the necessary functionality is identified and implemented effectively.

Learn more about project management at:

https://brainly.com/question/16927451

#SPJ1

Sir Tim Berners-Lee wrote the three fundamentals for the Web. What are these three fundamentals? Choose the answer. OO HTMT, IP, URL (or URI) HTML, HTTP, URR HTTP, HTML, IP HTML, HTTP, URL (or URI)​

Answers

Answer:

HTML, HTTP, and URI/URI

Explanation:

In 1990, Berners-Lee developed three fundamental technologies: HTML, HTTP, and URI/URL; which remain the core of the web as we know it today.

Hope it helped! :)

Given the following schema

AB ⟶ CD
A ⟶ B
B ⟶ E
E ⟶ F
A ⟶ F
G ⟶ H
H ⟶ E
GC ⟶ H
G⟶E

Required:
a. Find a minimal cover of this schema.
b. Find a key of this schema.
c. Find a 3rd normal form decomposition of this schema.
d. Find a BCNF decomposition of this schema.



Answers

Answer:

a)

A ⟶ BCD , B ⟶ E , E ⟶ F , G⟶ H , H ⟶ E

b)  AG

c) attached below

d ) attached below

Explanation:

a) Minimal cover of this schema

This can be written following the steps below

step 1 : AB ⟶ C, AB ⟶ D , A ⟶ B , B ⟶ E,  E ⟶ F , A⟶F, G ⟶ H, H ⟶ E, GC⟶H, G ⟶ E  

removing redundant FD

AB ⟶ C , AB ⟶ D , A ⟶ B, B ⟶ E, E ⟶ F,  G ⟶H , H⟶ E ,

eliminating p if Q⁺  contains p  

Finally the Minimal cover of the schema

A ⟶ BCD , B ⟶ E , E ⟶ F , G⟶ H , H ⟶ E

B)  Key of this schema

AG is the key of this schema given that ( AG )⁺ = ABCDEFGH

C) Determine the 3rd normal form decomposition

attached below

D) BCNF decomposition

attached below

Given the following schemaAB CD A B B E E FA FG HH EGC HGERequired:a. Find a minimal cover of this schema.b.

Choose the best option to answer each question. Which output device allows a user to create a copy of what is on the screen? printer speakers earphones display or monitor

Answers

Answer: printer

Explanation:

The reason that many of the innovations of the twenty-first century is coming to pass is the result of
O more computer scientists.
O better computer components.
O quantum computers.
O better operating systems.

Answers

The reason that many of the innovations of the twenty-first century is coming to pass is the result of better operating systems.

Why did technology advance so fast in the 21st century?

The use of Technology as well as Technological evolution is one that has increase a lot exponentially.

This is due to the fact that each generation of technology is one that often makes better  over the last, the rate of progress is one that is different from version to version and it is one that do speeds up.

Therefore,  a better operating system tends to make innovation to be more faster and so. the reason that many of the innovations of the twenty-first century is coming to pass is the result of better operating systems.

Hence, option d is correct.

Learn more about operating systems from

https://brainly.com/question/22811693
#SPJ1

Write a python program to display "Hello, How are you?" if a number entered by
user is a multiple of five, otherwise print "Bye Bye"

Answers

Answer:

Here's a simple Python program that takes input from the user and checks if the entered number is a multiple of five, then displays the appropriate message accordingly:

# Get input from user

num = int(input("Enter a number: "))

# Check if the number is a multiple of five

if num % 5 == 0:

   print("Hello, How are you?")

else:

   print("Bye Bye")

Answer:

Here's a simple Python program that takes input from the user and checks if the entered number is a multiple of five, then displays the appropriate message accordingly:

# Get input from user

num = int(input("Enter a number: "))

# Check if the number is a multiple of five

if num % 5 == 0:

   print("Hello, How are you?")

else:

   print("Bye Bye")

Infringement Less than 13km/h over the speed limit At least 13km/h but not more than 20km/h over the speed limit More than 20km/h but not more than 30km/h over the speed limit More than 30km/h but not more than 40km/h over the speed limit More than 40km/h over the speed limit Penalty amount $177 $266 $444 $622 $1.245 Demerit points 1 3 4 6 8 Note: the way the government website has written this (and we've copied it) is NOT efficient in terms of decision structures. This written for each condition to stand alone (if, if, if) but we can tell its mutually exclusive and so know a better tool for the job don Avoid a 6-month suspension by writing a program to ask for the user's: • speed and the • speed limit
program in python?​

Answers

The example of the program in Python to help one to calculate the penalty amount as well as the demerit points based on the speed and speed limit provided by the user is given in the code below

What is the program?

python

def calculate_penalty(speed, speed_limit):

   penalty_amount = 0

   demerit_points = 0

   if speed <= speed_limit:

       return penalty_amount, demerit_points

   overspeed = speed - speed_limit

   if overspeed <= 13:

       penalty_amount = 177

       demerit_points = 1

   elif overspeed <= 20:

       penalty_amount = 266

       demerit_points = 3

   elif overspeed <= 30:

       penalty_amount = 444

      demerit_points = 4

   elif overspeed <= 40:

       penalty_amount = 622

       demerit_points = 6

   else:

       penalty_amount = 1245

       demerit_points = 8

   return penalty_amount, demerit_points

# Get user input

speed = int(input("Enter the recorded speed (in km/h): "))

speed_limit = int(input("Enter the speed limit (in km/h): "))

# Calculate penalty and demerit points

penalty, points = calculate_penalty(speed, speed_limit)

# Display the results

print("Penalty amount: $", penalty)

print("Demerit points: ", points)

Read more about python here:

https://brainly.com/question/30113981

#SPJ1

An example of a one-to-many relationship would be: ___________

a. One customer, one billing address.
b. Two employees, one skill set.
c. One employee, three timecards for the pay period.
d. One customer, one shipping invoice.

Answers

Answer:

c. One employee, three timecards for the pay period.

Explanation:

Database relationships can be regarded as a type of associations that exist among tables which are developed by the use of

join statements in data retrieval. Types are ;one-to-many relationships, one-to-one relationships.

One-to-many relationship is a type of database relationship whereby,

one record in a particular table can have association with one or more records in other table. a one-to-many relationship can be regarded as a type of database relationship, which gives the relationship that exist between different two entities whereby the elements in the first entity can as well be linked with many elements of the second entity even though the members that are present in second entity can only be linked to just only one of the element in first entity. Example of this is when first entity is a book while second entity are pages.

It should be noted An example of a one-to-many relationship would be One employee, three timecards for the pay period.

Azure subscription storage1 virtual machines: service endpoint

Answers

Microsoft's cloud storage solution is the Azure Storage platform. Azure Storage offers huge scalability, security, and high availability.

What exactly is a storage service endpoint in Azure?

Endpoints give you the ability to limit access to your vital Azure service resources to just your virtual networks. Service Endpoints makes it possible for private IP addresses in the VNet to access an Azure service's endpoint without the use of a public VNet IP address.

What happens when a service endpoint for Azure storage is enabled?

With the use of virtual network service endpoints, you can completely block public internet access to these resources by securing Azure Storage accounts to your virtual networks. The best routing is provided by service endpoints, which always keep traffic going to Azure Storage on the backbone network of Azure.

To know more about Azure service visit:

https://brainly.com/question/30373354

#SPJ1

Identify the data model used in each scenario.


A database of contestants in a dog show where each dog, owner, and competition is identified by a primary key

A database that stores detailed information on the taxonomy of living things found in a geographical area, including the categories of kingdom, phylum, class, order, family, genus, and species

A database used to catalog types of architecture, geographical features, and sociological characteristics in various parts of the world

A database used to cross-reference actors who have performed in various movies with directors, writers, and other support staff for those movies

Answers

Answer:

Relational databaseObject-oriented databaseHierarchical databaseNetwork database

Explanation:

The relational database has always been recognized or identified as well as using the primary key. The object database would be where the documentation has always been displayed as such an object. This same hierarchical database would be a type of database these have links to something else with either a connection. Network database does indeed have a cross-reference where this component should be pass to some other.

When you are using a keyword search what are you most likely doing?

Answers

Answer:

Just typing words or answering questions

Answer:

when using a keyword search, you are looking for close results to what you are looking for.

Explanation: its a general search not specific. thus you are likely to get very many results with the same word. hope this helps. :)

Addition and subtraction are considered to be ____ operations performed by a computer.

Answers

Answer:

Mathematical operations

Hey tell me more about your service

Answers

Answer:

look below!

Explanation:

please add more context and I’ll be happy to answer!

true or false. Two of the main differences between storage and memory is that storage is usually very expensive, but very fast to access.​

Answers

Answer:

False. in fact, the two main differences would have to be that memory is violate, meaning that data is lost when the power is turned off and also memory is faster to access than storage.

Other Questions
Describe two models that show how earth and the sun move in space relative to each other. Can someone help me with this one pleaseee!!!! Leer y escribir: El pap de Ana Mara habla de los veranos que pasaba en Boston con su pap. Completasu descripcin con las formas apropiadas del imperfecto de los verbos "ir", "ser" y "ver.Cuando 1.pequeo, me encantaban los veranos. Vivamos en Boston donde mi pap yyo 2.al famoso estadio de bisbol de las Medias Rojas, Fenway Park. Cada veranonosotros 3. a nuestros jugadores favoritos, como Pedro Martnez. Mi pap 4. __ originalmentede la Repblica Dominicana y por eso l 5. todos los partidos cuando Pedro jugaba all.Tambin yo siempre 6. a la playa con mi familia. Qu ms? Tambin nosotros 7. al cinedonde comamos palomitas y 8. las pelculas ms populares. Los veranos en Boston9. fantsticos y los recuerdo muy bien. Ferromagnetic materials are very strongly attracted to magnetic fields. Describe the response of Ferromagnetic materials to the presence of an increasing magnetic field. What happens to the ferromagnet when the magnetic field is removed? The following is also an example of what?"Land created in common,dream nourished in common."A)epistropheB)OonamonapiaC)assonanceD)personificationMore than one answer from above Human resource managers generally exert ________ within the human resources department and ________ outside the human resources department.A) line authority; implied authorityB) staff authority; line authorityC) functional authority; line authorityD) staff authority; implied authority An increase in the number of moles of gas in a fixed container would cause... Select one : A higher pressure, because there would be more collisions between more gas particles. A lower volume, because the collisions between gas particles would be more forceful. A higher pressure, because the collisions between gas particles would be more forceful. A lower volume, because there would be more collisions between more gas particles . When 150 joules of work is done on a system by an external force of 15 newtons in 20. seconds, the total energy of that system increases by.(1) 1.5 102 J (2) 2.0 102 J (3) 3.0 102 J(4) 2.3 103 JPlease include an explanation Who controlled the lands of ancient Greece during the Hellenistic World?A Macedonian kingdomB PergamumC Seleucid kingdomD Egyptian kingdom Stabilized Net Operating Income should recognize the tenant improvements made to a property that are appropriate for the market. T/F What makes a gas a gas? your text describes a study in which photos of older women and men were evaluated in terms of positive or negative stereotypes. the results indicated that Graph is in picture. Questions about graph:1. Find the slope and describe what it represents.2. Find the y-intercept and describe what it represents.3. Write an equation that represents the above scenario. have you completed research with a faculty member or mentor in an academic discipline such as science, engineering or other academic interests (e.g., humanities, social sciences or languages)? Find the measure of an angle such that the difference between the measures of its supplement and 6 times its complement is 40 . A solution has a hydrogen ion (or hydronium ion) concentration of 3. 24 * 10-6What is the pH of the solution? Round to one decimal place what is(are) the advantage(s) of there being a low blood pressure in the pulmonary circuit? check all that apply. check all that apply What are the first action steps a bystander should take in an emergency situation?Run quickly to try and find help.Check, Call, CareTake the victim to get helpRICE An investor holds an efficient portfolio with a mean return of 16% and a standard deviation of 18%. Assume that the risk-free rate is 6%, that the mean return on the market portfolio is 14%, and that the CAPM holds. Answer the following questions (show all the details of your calculations and display the results with four decimal places):i. What is the beta of this portfolio?ii. Suppose that the investors total wealth is 100, which is invested entirely in market shares. Considering your answer in (i) above, is this investor borrowing or lending and how much? Explain your answer. Primera clase y segunda clase son dos tipos de ______________. a. escuelas c. billetes b. equipaje d. horarios Please select the best answer from the choices provided A B C D