________ refers to the process of integrating external stakeholders into the innovation process.
A) Nearshoring
B) Open innovation
C) Media sharing
D) Crowdsourcing
E) Social cataloging

Answers

Answer 1

B) Open innovation. Open innovation is a concept developed by Henry Chesbrough, which refers to the practice of integrating external stakeholders such as customers, suppliers, and other partners into the innovation process of a company.

Open innovation can take many forms, such as collaborating with external partners on research and development projects, licensing or acquiring intellectual property from other companies or universities, or even crowdsourcing ideas from the general public through platforms such as IdeaScale or InnoCentive. The benefits of open innovation include increased access to new ideas, reduced R&D costs, faster time to market, and improved customer satisfaction. However, open innovation also presents some challenges, such as the need for effective intellectual property management, the potential for conflicts of interest, and the difficulty of integrating external partners into the company's culture and processes. Despite these challenges, many companies have embraced open innovation as a way to stay competitive and drive growth in today's fast-paced, constantly evolving business environment.

Learn more about Open innovation here:

https://brainly.com/question/1008019

#SPJ11

Answer 2

Open innovation refers to the process of integrating external stakeholders into the innovation process.

Open innovation refers to the process of integrating external stakeholders, such as customers, suppliers, and partners, into the innovation process to co-create and collaborate on new ideas and solutions. This approach allows companies to leverage external knowledge and expertise to enhance their innovation capabilities and improve their competitiveness. Other terms such as nearshoring, media sharing, crowdsourcing, and social cataloging are related to innovation but do not specifically refer to the process of integrating external stakeholders.

What is Open innovation?

Open innovation is a collaborative approach to innovation that involves working with external stakeholders such as customers, suppliers, universities, and other organizations. Rather than relying solely on internal research and development, open innovation involves sharing ideas, knowledge, and resources with external partners to develop new products, services, and technologies.

Open innovation can take many forms, such as joint ventures, licensing agreements, strategic alliances, and crowdsourcing. The goal of open innovation is to access a wider range of expertise and resources, speed up the innovation process, and improve the chances of success.

To know more about innovation process visit:

https://brainly.com/question/1008019

#SPJ11


Related Questions

Which function in excel helps facilitate taking a random sample?

Answers

The function to help facilitate taking a random function would be the rand() function. It will produce a number greater than or equal to 0, but less than 1.

In java, how do I make a scanner class?

Answers

Answer:

Scanner input = new Scanner(System.in);

. Cloudy Corporation has provided the following cost data for last year when 50,000 units were produced and sold: All costs are variable except for $100,000 of manufacturing overhead and $100,000 of selling and administrative expense. If the selling price is $12 per unit, the net operating income from producing and selling 120,000 units would be: 17. Constance Company sells two products, as follows: Fixed expenses total $450,000 annually. The expected sales mix in units is 60% for Product Y and 40% for Product Z. How much is Constance Company's expected break-even sales in dollars?

Answers

Constance Company's expected break-even sales in dollars are $2,160,000.

1. Net operating income from producing and selling 120,000 units would be:Given data: Selling price per unit = $12Variable costs = $8 per unitFixed manufacturing overhead = $100,000Fixed selling and administrative expense = $100,000Total cost per unit = Variable cost per unit + Fixed manufacturing overhead / Units produced= $8 + $100,000 / 50,000= $10 per unitContribution margin per unit = Selling price per unit - Total cost per unit= $12 - $10= $2 per unitContribution margin ratio = Contribution margin per unit / Selling price per unit= $2 / $12= 0.167 or 16.7%Net operating income (NOI) for 50,000 units sold= Selling price per unit × Units sold - Total cost= $12 × 50,000 - ($8 × 50,000 + $100,000 + $100,000)= $600,000 - $600,000= $0 NOI for 120,000 units sold= Selling price per unit × Units sold - Total cost= $12 × 120,000 - ($8 × 120,000 + $100,000 + $100,000)= $1,440,000 - $1,460,000= ($20,000) or a net loss of $20,000.2. Constance Company's expected break-even sales in dollars can be calculated as follows:Constance Company sells two products, Y and Z.Fixed expenses = $450,000 per yearSelling price of Product Y = $120 per unitVariable cost of Product Y = $90 per unitSelling price of Product Z = $180 per unitVariable cost of Product Z = $150 per unitContribution margin of Product Y = Selling price of Product Y - Variable cost of Product Y= $120 - $90= $30Contribution margin of Product Z = Selling price of Product Z - Variable cost of Product Z= $180 - $150= $30Weighted average contribution margin per unit = (Contribution margin of Product Y × Sales mix of Product Y) + (Contribution margin of Product Z × Sales mix of Product Z) = ($30 × 60%) + ($30 × 40%)= $18 + $12= $30Contribution margin ratio = Weighted average contribution margin per unit / Selling price per unit= $30 / [(60% × $120) + (40% × $180)]= $30 / ($72 + $72)= $30 / $144= 0.2083 or 20.83%Breakeven sales in units = Fixed expenses / Contribution margin per unit= $450,000 / $30= 15,000Breakeven sales in dollars = Breakeven sales in units × Selling price per unit= 15,000 × [(60% × $120) + (40% × $180)]= 15,000 × ($72 + $72)= 15,000 × $144= $2,160,000.

Learn more about break-even here :-

https://brainly.com/question/31774927

#SPJ11

workflow, crowdsourcing, and telepresence systems are examples of which network application?

Answers

Workflow, crowdsourcing, and telepresence systems are examples of network applications that fall under the category of "Collaboration and Communication."

The network applications of workflow, crowdsourcing, and telepresence systems all involve collaboration and communication among individuals or groups. Workflow systems facilitate the coordination and automation of tasks within an organization, streamlining business processes. Crowdsourcing applications leverage the collective intelligence and contributions of a large group of individuals to solve problems or generate ideas. Telepresence systems enable remote real-time communication and interaction, simulating the experience of being physically present in a different location. All these applications rely on network infrastructure to enable efficient collaboration, information sharing, and communication, enhancing productivity and connectivity in various domains such as business, research, and remote collaboration.

To know more about Communication click the link below:

brainly.com/question/32546276

#SPJ11

you plan to deploy a virtual machine running oracle database to azure. you need to minimize the deployment time. what should you use to deploy the vm to azure?

Answers

When modernizing infrastructure or consolidating database instances on Oracle Database, Oracle Linux is a cost-effective, high-performance option that is also highly dependable, secure, and cloud-ready.

Which server is used for Oracle?Integrated fault management increases dependability. Customers can benefit from multilevel reliability optimizations thanks to Oracle's fault management architecture, which is integrated into the Oracle Linux and Oracle Solaris operating systems as well as Oracle Server X8 and X9 ILOM.Starting with Oracle Database 19c Release Update (19.13) or later, Windows 11 x64 - Pro, Enterprise, and Education versions as well as Windows Server 2022 x64 - Standard, Datacenter, and Essentials editions are supported.Installations of Oracle Databases require at least 1 GB of RAM. 2 GB of RAM is advised. Oracle Grid Infrastructure deployments require at least 8 GB of RAM.Although Microsoft utilizes Transact SQL (T-SQL) and Oracle Database employs Procedural Language SQL (PL/SQL), the majority, including MS SQL Server and Oracle Database, use SQL. Both are different "flavors" or dialects of SQL, and both languages have different syntax and capabilities, claims Segue Technologies.

To Learn more About Oracle Database Refer to:

https://brainly.com/question/28388468

#SPJ4

10. Two technicians are discussing recycling specifications for refrigerant. Technician A says that refrigerant oil with 5,000 parts per million (ppm) does not fall
within specifications. Technician B says that air can only have a maximum of 330 ppm. Who is correct?
O A. Neither Technicians A and B
OB. Technician B
O C. Both Technicians A and B
O D. Technician A

Answers

Two technicians are discussing recycling specifications for refrigerant   Technician A is correct.

What is the recycling ?

Recycling is the process of transforming waste materials into new products to prevent the waste of potentially useful materials and reduce the consumption of fresh raw materials. It is an important part of the global economy and helps to preserve the environment by reducing energy usage, air and water pollution, and reducing the amount of waste sent to landfills. Recycling can be done through mechanical means such as shredding or separation, or through chemical processes such as melting and reforming.

To learn more about recycling

https://brainly.com/question/27248056

#SPJ1

How do I find the range of integers in a text file with python?

Answers

To find the range of integers in a text file with Python, follow these steps:

1. Open the text file using the `open()` function.
2. Read the contents of the file using the `readlines()` method.
3. Initialize an empty list to store the integers.
4. Iterate through each line in the file, and extract the integers from the line.
5. Append the extracted integers to the list.
6. Find the minimum and maximum integers in the list.
7. Calculate the range by subtracting the minimum integer from the maximum integer.

Here's the Python code for these steps:

```python
# Step 1: Open the text file
with open("integers.txt", "r") as file:
  # Step 2: Read the contents of the file
   lines = file.readlines()

# Step 3: Initialize an empty list to store the integers
integers = []

# Step 4: Iterate through each line and extract integers
for line in lines:
   numbers = [int(x) for x in line.split() if x.isdigit()]
   # Step 5: Append the extracted integers to the list
   integers.extend(numbers)

# Step 6: Find the minimum and maximum integers
min_integer = min(integers)
max_integer = max(integers)

# Step 7: Calculate the range
range_of_integers = max_integer - min_integer

print("The range of integers in the text file is:", range_of_integers)
```

Remember to replace "integers.txt" with the name of your text file. This code will find the range of integers in the text file using Python.

Learn more about Python here:

https://brainly.com/question/18502436

#SPJ11


Write the role of UPS and spike guard in terms of power protection.​

Answers

Answer:

It allows for safe and orderly shutdown of the Computer and Other Connected devices or equipments attached to It.  It can be used as an immediate backup during power cut or failure.

Explanation:

The role of the UPS and spike guard in power protection is absorption of power surges and fluctuations.

The spike guard is a device used to protect electrical equipments from fluctuations and surges.

The UPS is a device used to provide power backup been electrical power drops or fails to a certain unacceptable voltage level.

Role of UPSIt provides steady power to equipment during power failureIt absorbs power surges.

Role of spike guardIt protects electrical equipments from power fluctuationsIt also protects from power surges.

Therefore, the role of the UPS and spike guard in power protection is absorption of power surges and fluctuations.

Learn more about Uninterrupted power supply here:

https://brainly.com/question/7850680

#SPJ2

how many bits and bytes are occupied by six long variables​

Answers

Answer:

24 bytes = 192 bits

Explanation:

A long is typically 4 bytes or 4*8 = 32 bits

However, on some 64 bit systems, a long is defined as 64 bits so the answer is not universal.

Discuss the elements of computer and show how your company can use these to leverage on its operation

Answers

The elements of a computer include hardware, software, data, and people.

Hardware consists of physical components such as the central processing unit (CPU), memory, storage devices, input/output devices, and networking devices. Software refers to the programs and applications that run on the hardware to perform specific tasks. Data represents the information that is processed and stored by the computer. People are the users who interact with the computer to perform various operations.

My company can leverage these elements of the computer in several ways to improve its operations. For example:

Hardware: We can invest in the latest hardware technology to improve the performance and reliability of our computer systems, which can increase productivity and reduce downtime.Software: We can use various software applications to automate repetitive tasks, such as accounting, inventory management, and customer relationship management, which can save time and reduce errors.Data: We can analyze our data to gain insights into our business operations, customer behavior, and market trends, which can inform our decision-making and help us identify opportunities for growth.People: We can provide training and support to our employees to ensure they have the necessary skills to effectively use our computer systems and software applications.

By leveraging the elements of a computer, my company can improve its efficiency, productivity, and competitiveness in the marketplace.

Learn more about CPU here:

https://brainly.com/question/16254036

#SPJ4

What advanced search operator would you use if you want the search results to contain BOTH or ALL of the keywords entered in your search?

Answers

To find search results that contain both or all of the keywords entered in your search, you should use the AND operator.

For example, if you wanted to search for questions about "trees and plants", you would enter "trees AND plants" into the search bar. The advanced search operator that you would use if you want the search results to contain BOTH or ALL of the keywords entered in your search is the AND operator.

By using the AND operator, you can ensure that your search results will include all of the keywords that you have entered. For example, if you wanted to search for articles about both "climate change" and "global warming," you would enter "climate change AND global warming" into the search bar. This would return results that contain both of these keywords, rather than just one or the other.

Here you can learn more about the search result: https://brainly.com/question/30454255

#SPJ11

What do computer programs generally try to solve and how? A) Computer programs generally try to solve a well-defined problem using a well-defined algorithm B) Computer programs try to solve poorly-defined problems using well-defined algorithms C) Computer programs try to solve well-defined problems using poorly-defined algorithms D) Computer programs try to solve math problems using only plain English

Answers

Explanation:

A) computer programs generally try to solve hard problems in a few seconds and makes us easy to learn

How can you open a link in a new tab/browser window?.

Answers

Answer:

Press the + at the top of your brower, or New Tab button.Copy-paste it into the top of the browser, the main search bar.

                                     \(Steps~also~in~pictures~below.\)

How can you open a link in a new tab/browser window?.
How can you open a link in a new tab/browser window?.
How can you open a link in a new tab/browser window?.
How can you open a link in a new tab/browser window?.

all the application environments in windows 10 restrict apps to running in which of the following modes?

Answers

All the application environments in Windows 10 restrict apps to running in User Mode.

Windows 10 utilizes a protected mode of operation where applications run in a restricted environment known as User Mode. In User Mode, applications have limited access to system resources and are isolated from each other to ensure stability, and security, and prevent unauthorized access to critical system components. User Mode provides a layer of protection by enforcing user-specific permissions and restrictions on applications. This helps prevent applications from interfering with the operating system or other applications, enhancing overall system security and stability. In contrast, the operating system itself runs in a privileged mode called Kernel Mode, which has direct access to system resources and controls the execution of applications. Kernel Mode is restricted to trusted system processes and is responsible for managing hardware, memory, and other critical functions. By running applications in User Mode and separating them from the Kernel Mode, Windows 10 ensures a secure and controlled execution environment, reducing the risk of system instability or malicious activities impacting the operating system.

learn more about User Mode here:

https://brainly.com/question/31486134

#SPJ11

What five safety habits are you using for the internet?

Answers

Answer: Keep Personal Information Professional and Limited.

Keep Your Privacy Settings On.

Practice Safe Browsing.

Make Sure Your Internet Connection is Secure.

Be Careful What You Download.

Choose Strong Passwords.

Explanation:that’s what is think

Describe psychographic differences among the past five generations of Americans that you learned about in this course. What type of game
would you create for each generation based on thatgeneration's psychographic characteristics? Give reasons for your choices. You may do some
online research to find existing games (if any) that may appeal to each generation of players.

Answers

Answer:

1.The silent generation are people that were born between 1924 and 1943. Most of the silent gen.had overbearing parents and were content with holding a steady job. World War II and the GreatDepression of the 1930s held little effect on them but they appreciated the benefits that the economic boom and the era of mass consumption had. If I were to create a game for this generation based on its psychographic characteristics, I would create a game that focused on theprogression through the workforce because they enjoy their jobs and were content with a stable

Which increment operator does not exist in python

Answers

Python does not have a unary increment operator such as "++". In Python, increments are performed using the "+=" operator.

In Python, there is no "++" increment operator, which is commonly used in some other programming languages such as C, C++, and Java. In Python, the usual increment operator "++" does not exist and will result in a syntax error if used. Instead, Python provides a shorthand for incrementing a variable by a certain value, which is the "+=" operator. For example, to increment a variable "x" by a value of 1, you would use the syntax "x += 1" in Python. This is known as the "in-place addition" operator and is the preferred way to increment a variable in Python. Python follows a different syntax and coding style compared to other programming languages, and understanding the specific features and limitations of Python is important when working with it in a programming context.

To learn more about operator; https://brainly.com/question/4721701

#SPJ11

what did Ada lovelace do

Answers

Answer: Ada Lovelace is often considered to be the first computer programmer!

Explanation: Most wealthy women of the 1800s did not study math and science. Ada Lovelace excelled at them—and became what some say is the world's first computer programmer. Born in England on December 10, 1815, Ada was the daughter of the famous poet Lord George Byron and his wife, Lady Anne Byron.

Which application makes sure your computer has the most recent versions of its system software?.

Answers

Windows update application makes sure your computer has the most recent versions of its system software.

The Start menu button, Quick Launch bar, taskbar buttons, and notification area are all located on the taskbar by default in Microsoft Windows, which is located at the bottom of the screen. Users interact with electronic devices through a graphical user interface (GUI), a sort of user interface that uses visual indication representations. Security software like antivirus software is meant to shield users from many kinds of malware in addition to viruses. The program is a risk management solution that periodically and on-demand analyzes computers for known malware and suspicious activity linked to malware.

Learn more about software here-

https://brainly.com/question/985406

#SPJ4

Which is the best example of a strong topic sentence?

Answers

With six classes a day, middle school is challenging.

Answer:

b

Explanation:

Write a program to display "HELLO WORLD" ​

Answers

Explanation:

Here's a simple "Hello, World!" program written in Python:

```python

print("HELLO WORLD")

```

To execute this program, you need to have Python installed on your computer. Save the code above to a file named `hello_world.py` and then run it using the command `python hello_world.py` in the terminal or command prompt.

PLEASE HELP!!!
I was trying to create a superhero class code, but i ran into this error

File "main.py", line 3
def_init(self, name = "", strengthpts = 0, alterego = "", villain "", powers = "", motto = ""):
IndentationError: expected an indented block

Here is my actual code:
class superhero:

def_init(self, name = "", strengthpts = 0, alterego = "", villain "", powers = "", motto = ""):

# Create a new Superhero with a name and other attributes

self.name = name

self.strengthPts = strengthPts
self.alterego = alterego
self.powers = powers
self.motto = motto
self.villain = villain

def addStrengthPts(self, points):

# Adds points to the superhero's strength.

self.strengthPts = self.strengthPts + points



def addname(self):

if(self.name == "Dr.Cyber"):
print("My hero's name is Dr.cyber!")
elif(self.name == "Mr.cyber"):
print("My hero's name is Mr.cyber!")
elif(self.name == "Cyber Guy"):
print("My hero's name is Cyber Guy!")
else:
print("My hero doesn't have a name")



def addalterego(self):

if(self.alterego == "John Evergreen"):
print("Dr.Cyber's alter ego is John Evergreen")
elif(self.alterego == "John Silversmith"):
print("Dr.Cyber's alter ego is John Silversmith.")
elif(self.alterego == "Johnathen Grey"):
print("Dr.Cyber's alter ego is Johnathen Grey.")
else:
print("Dr.Cyber Does not have an alter ego")



def addpowers(self):

if(self.powers == "flight, super strength, code rewrighting, electronics control, psychic powers"):
print(fly. He is super strong. He can rewrite the genetic code of any object around him to whatever he wants.He can control surrounding electronics to do what he wants. He can move objects with his mind.")
else:
print(Fly. He can rewrite the genetic code of any object around him. he can move objects with his mind.")



def addmotto(self):

if(self.motto == "error terminated!"):
print("rewritting the code!")
else:
print("error eliminated!")



def addvillain(self):

if(self.villain == "The Glitch"):
print("Dr.Cyber's Arch nemisis is The Glitch.")
elif(self.villain == "The Bug"):
print("Dr.Cyber's Arch nemisis is The Bug.")
else:
print("Dr.Cyber has no enemies!")

def main():

newhero = superhero("Dr.Cyber", "John Evergreen", "fly. He is super strong. He can rewrite the genetic code of any object around him to whatever he wants.He can control surrounding electronics to do what he wants. He can move objects with his mind.", "The Glitch", "error terminated!", "0")

print("My Superhero's name is " + newhero.name + ".")

print(newhero.name + "'s alter ego is " + newhero.alterego + ".")

print(newhero.name + " can " + newhero.powers + ".")

print(newhero.name + "'s arch nemisis is " + newhero.villain + ".")

print("when " + newhero.name + " fights " + newhero.villain + ", he lets out his famous motto " + newhero.motto + ".")

print(newhero.name + " defeated " + newhero.villain + ". Hooray!!!")

print(newhero.name + " gains 100 strengthpts.")

main()

PLEASE ONLY SUBMIT THE CORRECT VERSION OF THIS CODE!!! NOTHING ELSE!!!

Answers

Answer:

you need to properly indent it

Explanation:

align your codes

Mark the other guy as brainliest, I'm just showing you what he meant.

I'm not sure if that's all that's wrong with your code, I'm just explaining what he meant.

Answer:

def_init(self, name = "", strengthpts = 0, alterego = "", villain "", powers = "", motto = ""):

# Create a new Superhero with a name and other attributes

self.name = name

self.strengthPts = strengthPts

self.alterego = alterego

self.powers = powers

self.motto = motto

self.villain = villain

def addStrengthPts(self, points):

 

   # Adds points to the superhero's strength.

   self.strengthPts = self.strengthPts + points

def addname(self):

   if(self.name == "Dr.Cyber"):

       print("My hero's name is Dr.cyber!")

   elif(self.name == "Mr.cyber"):

       print("My hero's name is Mr.cyber!")

   elif(self.name == "Cyber Guy"):

       print("My hero's name is Cyber Guy!")

   else:

       print("My hero doesn't have a name")

def addalterego(self):

   if(self.alterego == "John Evergreen"):

       print("Dr.Cyber's alter ego is John Evergreen")

   elif(self.alterego == "John Silversmith"):

       print("Dr.Cyber's alter ego is John Silversmith.")

   elif(self.alterego == "Johnathen Grey"):

       print("Dr.Cyber's alter ego is Johnathen Grey.")

   else:

       print("Dr.Cyber Does not have an alter ego")

def addpowers(self):

   if(self.powers == "flight, super strength, code rewrighting, electronics control, psychic powers"):

       print(fly. He is super strong. He can rewrite the genetic code of any object around him to whatever he wants.He can control surrounding electronics to do what he wants. He can move objects with his mind.")

   else:

       print(Fly. He can rewrite the genetic code of any object around him. he can move objects with his mind.")

def addmotto(self):

   if(self.motto == "error terminated!"):

       print("rewritting the code!")

   else:

       print("error eliminated!")

def addvillain(self):

   if(self.villain == "The Glitch"):

       print("Dr.Cyber's Arch nemisis is The Glitch.")

   elif(self.villain == "The Bug"):

       print("Dr.Cyber's Arch nemisis is The Bug.")

   else:

       print("Dr.Cyber has no enemies!")

def main():

   newhero = superhero("Dr.Cyber", "John Evergreen", "fly. He is super strong. He can rewrite the genetic code of any object around him to whatever he wants. He can control surrounding electronics to do what he wants. He can move objects with his mind.", "The Glitch", "error terminated!", "0")

   

   print("My Superhero's name is " + newhero.name + ".")

   print(newhero.name + "'s alter ego is " + newhero.alterego + ".")

   print(newhero.name + " can " + newhero.powers + ".")

   print(newhero.name + "'s arch nemisis is " + newhero.villain + ".")

   print("when " + newhero.name + " fights " + newhero.villain + ", he lets out his famous motto " + newhero.motto + ".")

   print(newhero.name + " defeated " + newhero.villain + ". Hooray!!!")

   print(newhero.name + " gains 100 strengthpts.")

main()

Which word contains the Latin root that means say a dictate b import c tractor d transmit

Answers

The word "transmit" contains the Latin root "trans-" meaning "to send, transfer."

What is a Latin Root?

It is to be noted that a Latin root is the base word from which a number of related words in several languages are derived.

In linguistics, the Latin roots of a word are those elements of the word which are derived from ancient Latin, often via a process of word formation known as affixation. These roots often serve as the basis for the formation of new words in other languages and provide a way to understand the relationships between words and their meanings.

Learn more about Latin Root:
https://brainly.com/question/1046510
#SPJ1

why are pirated software considered a threat?​

Answers

Pirated software are considered a threat because if they are able to infect your PC with a kind of adware, bots and even a ransomware, they can damage your PC.

What are the disadvantages of using pirated software?

The Disadvantages of Pirated software is known to be the likelihood to be infected with a kind of serious computer viruses, that tends to damage the a person's computer system.

Hence, Pirated software are considered a threat because if they are able to infect your PC with a kind of adware, bots and even a ransomware, they can damage your PC.

Learn more about pirated software from

https://brainly.com/question/3615098

#SPJ1

what is wrong with this python code? The syntax error is on the first line.






public class Box


{

private String myDate;

private String myContents;

private String myLocation;

public class Box(String date, String contents, String location)

{

myDate = date;

myContents = contents;

myLocation = location;

}

}

Box twentyThree = new Box("2016", "medical records", "storage closet");

Box zeroSeven = new Box(“2020”, “flu shot flyers", “receptionist’s office”);

Box twentyOne = new Box(“2018”, “lotion samples”, “waiting room”)

print (Box twentyThree = 1)

print (Box zeroSeven = 2)

print (Box twentyOne = 3)

Answers

class Box:

   def __init__(self, date="", contents="", location=""):

       self.d = date

       self.c = contents

       self.l = location

   def displayBox(self):

       if self.d != "":

           print("The date is " + self.d)

       else:

           print("The date was not supplied")

       if self.c != "":

           print("The contents are " + self.c)

       else:

           print("The contents were not supplied")

       if self.l != "":

           print("The location is " + self.l)

       else:

           print("The location was not supplied")

obj = Box("2016", "medical records")

obj.displayBox()

This is how you would create a class in python. Your code seems to be part python part some other language. I hope this helps!

Caroline is collaborating with several writers who are creating multiple documents. There is a single list of content that must be eventually covered by all the documents, and Caroline needs a way to “flag” which writer is covering which content; all writers will be looking at the exact same online version of the list. Describe how Caroline could quickly use colors in Word to show which content goes with which writer; be specific about which Word tool she should use and how that tool operates.

Answers

A Word document can be shared with multiple users by selecting the File menu at the top ribbon and then select Share from the drop down menu

Several writers can work together on Microsoft Word by using the co-authoring, sharing, and co-editing features in MS Word

In order to co-author the content list, Caroline, should

1. Create the content list document

2. Click on Share icon on the top right corner of the document

3. Ensure to save the document in OneDrive

4. Input the email addresses of the other writers who are working on the list

5. Enter a message to the writers to add the title of the content they are working on in the list

When the other writers open the link to the document sent to them in the email they receive, and they open the document in a web browser, by selecting Edit Document > Edit in Browser

The presence of a writer and their real time changes to the content list document, showing the content they are working on are shown by colored flags that has the author (writer) name next to the content they are working on

Learn more about collaboration in Word here:

https://brainly.com/question/1877453

(576)8. In to ( )16 ( )8

Answers

Answer:

around ()72381 approx

Explanation:

approximately not accurate

Supplies/material used in iron​

Answers

The raw materials used to produce pig iron in a blast furnace are iron ore, coke, sinter, and limestone. Iron ores are mainly iron oxides and include magnetite, hematite, limonite, and many other rocks. The iron content of these ores ranges from 70% down to 20% or less.

17. What kind of circuit selects binary information from one of many input lines and directs it to a single output line?

Answers

The kind of circuit that selects binary information from one of many input lines and directs it to a single output line is called a multiplexer (also known as a MUX).

A Multiplexer (MUX) is the kind of circuit that selects binary information from one of many input lines and directs it to a single output line. It acts as a switch that chooses the desired input based on a selection code provided to it. It is a gadget that chooses between a few simple or computerized input signals and advances the chosen contribution to a solitary result line. A separate set of digital inputs known as select lines direct the selection. This combinational circuit can have up to n data inputs, n selection lines, and a single output line. The values of the selection lines will be used to connect one of these data inputs to the output. There will be a total of n possible zero-to-one combinations because there are n selection lines.

learn more about multiplexer

https://brainly.com/question/29609961

#SPJ11

With respect to IOT security, what term is used to describe the digital and physical vulnerabilities of the IOT hardware and software environment?

Question 4 options:

Traffic Congestion

Device Manipulation

Attack Surface

Environmental Monitoring

Answers

Answer:

Attack Surface

Explanation:

In the context of IOT security, the attack surface refers to the sum total of all the potential vulnerabilities in an IOT system that could be exploited by attackers. This includes both the digital vulnerabilities, such as software bugs and insecure network protocols, and the physical vulnerabilities, such as weak physical security or easily accessible hardware components. Understanding and reducing the attack surface is an important part of securing IOT systems.

Other Questions
i need help answering the question in the picture provided zach's bird feeder holds 3/4 cup of birdseed. Zach is filling the bird feeder with a scoop that holds 3/8 of a cup. how many scoops of birdseed will Zach put into the feeder Find the sum1/7 + 2/5 Volleyball question I need help! Antennas are considered in play. True or False listed following are distinguishing characteristics and examples of reflecting and refracting telescopes. match these to the appropriate category. view available hint(s)for part a resethelp reflecting telescopesdroppable refracting telescopesdroppable I'm kinda in a pickle with these (easy 60 points if answered and best one will get b-b-b-b-b-brainliest :) How do oligopoly market maximize their production and price? Which action can be attributed to a toddlers genes? The area of a parallelogram is 20 square miles find its base and height Okay so Tomura Shigaraki from MHA how does he do everything stuff (like eating or doing other activities) since what ever he touches with all five fingers disintegrates? The empty boxes in this expression contain the numbers -7, -3, or -6. Each number is used exactly once. 0+0-0 What is the least possible value of this expression? What is one way that president franklin d. roosevelt tries to make his argument about the moral order more appealing to his audienceA. By introducing technical languageB. By drawing connection to national historyC: cite the writings of famous philisopher D: by ordering his goals from most to least importance answer this mannnn i need hemo Which of the following is a step that all computer users should take to protect against virus attacks?A) purchase and configure a firewallB) shut down all incoming portsC) use non-standard e-mail clientsD) install and use antivirus software To find the portfolio's average return, we have to multiply each stock's average returns by... O the stocks' standard deviations. O the dollar amount invested in the stock divided by the total dollars invested.O one divided by the total number of stocks O just the dollars invested in each stock. write the equation of the line parallel to y=1/2x-7 that passes through 8,-15 A Moving to another question will save this response. Question 19 Verizon, AT&T, Sprint and T-Mobile-control more than 90 percent of the U.S. wireless service provider market. This is an example of which type of markets. O a. pure competition b. monopolistic competition. Oc. oligopolistic competition O d. pure monopoly Products like Brandwatch and UberVU are used by companies to ________.A) expand the possibilities of cloud computingB) create apps for mobile devicesC) generate automatic TweetsD) detect crowdsource opportunitiesE) perform social media monitoring A students AP statistics project involves comparing the time it takes a student to complete a set of 25 basic trinomial factoring problems while listening to either rap music or country music. Twelve students are timed on two different sets of problems of equal difficulty. The order of which set of problems he does first and which music he listens to first are randomized. The resulting data is thus paired, with each student acting as his own "pair." Which of the following conditions is required to perform a t-test on these paired data?A. The distribution of times for all students on each set of problems must be approximately Normal.B. The distribution of times for all students while listening to each type of music must be approximately Normal.C. The distribution of times for all 24 sets of problems (12 students are taking 2 tests each) must be approximately Normal.D. The distribution of differences between each individual students times on each of the two tests (time with rap time with country) must be approximately Normal. How do you restate a quote?.