the software development model that is designed for large mainframe systems and requires an environment where developers work directly with users is:

Answers

Answer 1

The software development model that is designed for large mainframe systems and requires an environment where developers work directly with users is the Waterfall model.

This model involves a sequential approach to software development, where each phase must be completed before the next one can begin. The emphasis is on planning and documentation, and the process typically involves a large team of developers working in close collaboration with users and stakeholders.

The Waterfall model is well-suited to large-scale projects that require a high level of structure and control, and where changes to requirements are unlikely.
The software development model that is designed for large mainframe systems and requires an environment where developers work directly with users is the Joint Application Development (JAD) model.

To know more about software development, click here:

https://brainly.com/question/3188992

#SPJ11

Answer 2

The software development model that is designed for large mainframe systems and requires an environment where developers work directly with users is the Waterfall model.

The Waterfall model is a linear and sequential approach to software development.

The process is divided into distinct phases that must be completed in a specific order.

Each phase must be completed before moving on to the next, and the process flows downwards like a waterfall, hence the name.

The Waterfall model is often used in large mainframe systems where the requirements are well-defined.

The development process is straightforward.

It requires a well-established development environment where developers can work directly with users to gather requirements and feedback.

This model can be slow to adapt to changes, as each phase must be completed before moving on to the next.

Lead to delays and increased costs if changes are required late in the development process.

For similar questions on Developer

https://brainly.com/question/28156728

#SPJ11


Related Questions


Which type of list should be used if the items in the list need to be in a specific order?

Which type of list should be used if the items in the list need to be in a specific order?

Answers

Answer:

1.

2.

3.

Explanation:

Depending on the situation, any of them could be used to indicate a specific order. But for most cases, such as with scientific procedures, it's best to use the most traditional numbering system of 1. 2. 3...

name the default Package of java

Answers

Answer:

java.lang package

Explanation:

Java compiler imports java. lang package internally by default. It provides the fundamental classes that are necessary to design a basic Java program.

6, Answer the following questions.0
a What is software?​

Answers

Answer:

Software is a set of instructions, data or programs used to operate computers and execute specific tasks. Opposite of hardware, which describes the physical aspects of a computer, software is a generic term used to refer to applications, scripts and programs that run on a device. Software can be thought of as the variable part of a computer, and hardware the invariable part.

Software is often divided into categories. Application software refers to user-downloaded programs that fulfill a want or need. Examples of applications include office suites, database programs, web browsers, word processors, software development tools, image editors and communication platforms.

Explanation:

Software is a set of instructions, data or programs used to operate computers and execute specific tasks. Opposite of hardware, which describes the physical aspects of a computer, software is a generic term used to refer to applications, scripts and programs that run on a device. Software can be thought of as the variable part of a computer, and hardware the invariable part.

Software is often divided into categories. Application software refers to user-downloaded programs that fulfill a want or need. Examples of applications include office suites, database programs, web browsers, word processors, software development tools, image editors and communication platforms.

write subprograms to manipulate arrays of numbers. (assume that they are 'double's.) write the functions with array indexing, then write them with pointer incrementing. (a) count how many numbers in a given array of a given length are greater than a given number (and return the count). (b) add a given number to every number in a given array of a given length.

Answers

count in int For (int I = 0; I length; i++); GreaterThan(double arr[], int length, double num) int count = 0 if (arr[i] > num) count++; return count; AddToEach: void addToEach(double arr[], int length, double num) for (int I = 0; I length; i++) arr[i] += num;

count in int Int length, double num, and greaterThan(double* arr) (int I = 0; I length; i++) for (int count = 0; double* ptr = arr) If (*ptr > num), execute the following commands: count++, ptr++, return count;

AddToEach: void (double* arr, int length, double num). For (int I = 0; I length; i++); double* ptr = arr "*ptr += num," "ptr++," and "

Be aware that in the second set of functions, pointer arithmetic is used to access the array's elements rather than array indexing.

Learn more about "subprograms" here:

https://brainly.com/question/19051667

#SPJ4

what is it called when you squeeze the brake pedal until just before the wheels lock, then ease off the pedal, then squeeze again, repeating until you've reduced your speed enough.

Answers

The ABS system is reactive; when a wheel starts to lock up, it automatically lessens the braking pressure until the wheel regains grip.

How fast are Mbps?

Megabits per second, sometimes known as Mbps or Mb Mbits p/s, is the unit of measurement for broadband speeds. A megabit is one million bits, which are incredibly small pieces of data. Your internet activity should be faster the more Gbps (megabits per second you have available.

What Wi-Fi speed is faster?

Fast internet download speeds are defined as 200 Mbps downloading and 20 Mbps upload. The standard for high speed internet is now greater than ever, with average speeds of around 152/21 Mbps. Anything faster than 200 Mbps may support many internet users.

To know more about speed speed visit:

https://brainly.com/question/28224010

#SPJ1

What html attribute should be included in order to make websites more understandable and ensure that the content will be presented appropriately and read audibly by screen readers in the correct language?.

Answers

Most screen readers will read out the filename, title attribute, and alt text in this situation. Additionally, when the mouse pointer hovers over title text, browsers display tooltips.

Screen readers will either skip over the image or read the image file name if no alt text is provided. Always include concise and illustrative alt language for each piece of non-text material, like as images, videos, icons, and embeds, on your pages to make them accessible. ARIA is a collection of responsibilities and attributes that describes how to improve the accessibility of web content and web applications for people with impairments. For viewers whose browsers do not support pictures, the alt property of the element is used to show text in place of the image.

Learn more about attributes here-

https://brainly.com/question/28163865

#SPJ4

Given an unlimited supply of coins of denominations x1, x2, . . . , xn, we wish to make change for a value v using at most k coins; that is, we wish to find a set of ≤ k coins whose total value is v. This might not be possible: for instance, if the denominations are 5 and 10 and k = 6, then we can make change for 55 but not for 65. Give an efficient dynamic-programming algorithm for the following problem.Input: x1,...,xn; k; v.Output: Is it possible to make change for v using at most k coins, of denominations x1,...,xn? If the answer is yes, output the coins used.IN C++ PLEASE

Answers

Here's an efficient dynamic-programming algorithm in C++ to solve the given problem:

```cpp

#include <iostream>

#include <vector>

bool makeChangePossible(const std::vector<int>& denominations, int k, int v, std::vector<int>& coinsUsed) {

   int n = denominations.size();

   std::vector<std::vector<bool>> dp(n + 1, std::vector<bool>(v + 1, false));

   std::vector<std::vector<int>> prevCoin(n + 1, std::vector<int>(v + 1, -1));

   dp[0][0] = true;

 for (int i = 1; i <= n; i++) {

       for (int j = 0; j <= v; j++) {

           if (dp[i - 1][j]) {

               dp[i][j] = true;

               prevCoin[i][j] = j;

           } else if (j >= denominations[i - 1] && dp[i][j - denominations[i - 1]]) {

               dp[i][j] = true;

               prevCoin[i][j] = j - denominations[i - 1];

           }

       }

   }

   if (!dp[n][v]) {

       return false; // Change not possible

   }

   int remainingValue = v;

   int remainingCoins = k;

   for (int i = n; i >= 1; i--) {

       if (remainingCoins <= 0) {

           break;

       }

       int usedCoin = prevCoin[i][remainingValue];

       if (usedCoin != -1) {

           coinsUsed.push_back(denominations[i - 1]);

           remainingValue = usedCoin;

           remainingCoins--;

       }

   }

   return true;

}

int main() {

   std::vector<int> denominations = {5, 10};

   int k = 6;

   int v = 65;

   std::vector<int> coinsUsed;

   bool changePossible = makeChangePossible(denominations, k, v, coinsUsed);

   if (changePossible) {

       std::cout << "Change is possible for value " << v << " using at most " << k << " coins.\n";

       std::cout << "Coins used:";

       for (int coin : coinsUsed) {

           std::cout << " " << coin;

       }

       std::cout << std::endl;

   } else {

       std::cout << "Change is not possible for value " << v << " using at most " << k << " coins.\n";

   }

The algorithm uses dynamic programming to solve the problem. It creates a 2D table `dp` to store the subproblems' results, where `dp[i][j]` indicates whether it's possible to make change for value `j` using at most `i` coins. Another table `prevCoin` is used to keep track of the coins used to reach a certain subproblem.

The algorithm iterates over the denominations and values, filling the `dp` table based on the previous subproblems' results. If it's possible to make change using fewer coins or using the current denomination, the corresponding `dp` entry is marked as true and the previous coin used is stored in `prevCoin`.

Finally, the algorithm

Learn more about dynamic-programming here:

https://brainly.com/question/30885026

#SPJ11

Create a mobile app plan using PowerPoint slides to show mock-ups of screens, identifying input, process, and output for each screen.


You are going to design a mobile app. Think of something you would like to use or something that fills a need you see among your friends and family. You will create wireframes, visual representations of each screen along with the processes that occur on each screen.

Your app needs to have at least three screens. For each screen, you will "sketch" the screen and identify the input-process-output that occurs on that screen. You will also identify how a screen transfers to another screen. For example, suppose you were designing an app to help students at your school find another student who can tutor them. The welcome screen could look like the one shown here, where the user chooses the subject, times and days available, and then selects the "Find a tutor" button. The note at the bottom explains the processing that occurs on the page. It also identifies how this screen connects to the available tutors screen. One screen may connect to more than one other screen.

Screen Requirements

Each screen should have each of the following. The list shows, in the parentheses, which part of the example meets each requirement.

a title (Welcome Screen)
a sketch of the screen (Notifications table). You can sketch your screens on paper and take a picture of it; you can draw your screens in a drawing application such as Paint
a description of the input-process-output for each screen, which includes how one screen transfers to other screens (the notes at the bottom)
You need at least three screens in your app. The tutor app would have at least three screens: Welcome Screen, Available Tutors, and Scheduled Tutoring Sessions. Your app can have more screens as needed.
Variations

The sample screen shown here is part of a PowerPoint presentation that has a slide for each screen. It uses tables as a simple way to show what the screen looks like. You could also draw your screens by hand and take pictures of your screens. Then add them to a PowerPoint, Word, or similar file. You can include images on your screens as needed.

Reminder

Be sure you remember to describe the input-process-output for each screen and how it connects to other screens. Compare your work to the rubric before you turn it in.
What to Turn In

Your PowerPoint, Word, or other file that has the visual representation of at least three screens, the notes describing the input-process-output that occurs on the screen, and a description of how each screen connects to other screens.

Answers

The three major elements of great PowerPoints are your command of PowerPoint's design tools, your concentration on presentation techniques, and your commitment to upholding a consistent style.

Here are a few simple tips to help you get started learning each of those components. Don't forget to look at the powerpoint presentation and further resources listed at the end of this post.

To help you create presentations with a cohesive style, Microsoft comes with pre-installed themes and color palettes.

To select one of these pre-built themes, select the File tab once more, then select New, choose an option, and finally click Create. Alternately, you can make your own "theme" by utilizing PowerPoint's tools, your own sense of style, and your company's color scheme.

Thus, Your mastery of PowerPoint's design tools, your focus on presenting procedures, and your dedication to maintaining a consistent style are the three primary components of great PowerPoints.

Learn more about Powerpoint, refer to the link:

brainly.com/question/15992747

#SPJ6

who continued to fight a guerilla war against the british​

Answers

Answer:

tantia tope

Explanation:

tantia tope escaped to the jungle of central India with some peasant leader to fight the war against British

Use the drop-down menus
to complete the steps for reducing the mailbox server storage,
1. To access Mailbox Cleanup tools, navigate to_____the tab, and click Cleanup Tools.
2. Once in the Mailbox Cleanup dialog box, there are different options to choose from, such as_____________
or Empty Deleted Items,
3. The____________
function moves items off the server to an online Office 365 folder.

Answers

1. enter back stage view

Answer:

1. File

2. AutoArchive

3. Online Archive

Explanation:

Which statement about programming languages is true?

1) Lisp was designed for artificial intelligence research.
2) BASIC was the first high-level programming language.
3) FORTRAN was an early programming language designed for business use.
4) Pascal was the first programming language for personal computers.

Answers

Answer:

2

Explanation:

plz make me brainliest

Option A: Lisp was designed for artificial intelligence research.

The acronym Lisp stands for List Programming is a computer programming language developed about 1960 by John McCarthy.Lisp is the second-oldest high-level programming language which has a widespread use today.LISP has a very simple syntax in which a parenthesized list is used to give operations and their operands.This Language was designed for manipulating data strings with convenience.Lisp includes all the working as the function of any object.Lisp uses symbolic functions which are easy to use with AI applications.Originally Lisp was created as a practical mathematical notation used in computer programs.Lisp pioneered many revolutions in the field of computer science such as tree data structures, automatic storage management etc.

An attacker, acting as a postal worker, used social engineering tactics to trick an employee into thinking she was legitimately delivering packages. The attacker was then able to gain physical access to a restricted area by following behind the employee into the building. What type of attack did the attacker perform? Check all that apply.

Answers

Answer: Deception

Explanation:

Pretty straight forward...

The attacker was then able to gain physical access to a restricted area by following behind the employee into the building, this type of attack is tailgating attack. The correct option is B.

In order to trick a worker, the assailant used a tailgating attack in which they pretended to be a postal worker.

The attacker tricked the employee into granting access to a restricted area by putting on the appearance of a real package delivery.

This type of physical intrusion gets over security precautions and takes advantage of public confidence.

In contrast to digital attacks, a tailgating attack takes use of human weaknesses, hence it is essential for organizations to place a high priority on staff awareness and training to reduce such dangers.

Thus, the correct option is B.

For more details regarding Tailgating attack, visit:

https://brainly.com/question/34195547

#SPJ3

Your question seems incomplete, the probable complete question is:

An attacker, acting as a postal worker, used social engineering tactics to trick an employee into thinking she was legitimately delivering packages. The attacker was then able to gain physical access to a restricted area by following behind the employee into the building. What type of attack did the attacker perform? Check all that apply.

A) Phishing attack

B) Tailgating attack

C) Denial of Service (DoS) attack

D) Man-in-the-middle attack

E) Brute force attack

When looking to ensure your website is easily accessible by mobile users, what should you focus on doing first

Answers

Answer:

There are may steps in this procedure but there few steps that do first to access your mobile with your website.

Explanation:

When we are looking in our website and easily accessed by the mobile users, It is easy for them.

There are certain steps that should do first.

First step is that you have to redesign the website color schemeTo optimize your websiteTo create the mobile appNow to shorten the content in website.

In Python: Write a program to input 6 numbers. After each number is input, print the smallest of the numbers entered so far.

Sample Run:
Enter a number: 9
Smallest: 9
Enter a number: 4
Smallest: 4
Enter a number: 10
Smallest: 4
Enter a number: 5
Smallest: 4
Enter a number: 3
Smallest: 3
Enter a number: 6
Smallest: 3

Answers

Answer:

python

Explanation:

list_of_numbers = []
count = 0
while count < 6:
   added_number = int(input("Enter a number: "))
   list_of_numbers.append(added_number)
   list_of_numbers.sort()
   print(f"Smallest: {list_of_numbers[0]}")
   count += 1

First time using this site so be mindful if I make any mistakes
For Micro Econ AP I am having a problem with this one question
It goes:
In what ways do households dispose of their income? How is it possible for a family's persoal consumption expenditures to exceed its after-tax income?

Answers

Answer:

Okay... Well

I will. help you out dear

You will need an Excel Spreadsheet set up for doing Quantity Take- offs and summary estimate
sheets for the remainder of this course. You will require workbooks for the following:
Excavation and Earthwork
Concrete
Metals
Rough Wood Framing
Exterior Finishes
Interior Finishes
Summary of Estimate
You are required to set up your workbooks and a standard QTO, which you will submit
assignments on for the rest of the course. The QTO should have roughly the same heading as
the sample I have provided, but please make your own. You can be creative, impress me with
your knowledge of Excel. I have had some very professional examples of student work in the
past.
NOTE: The data is just for reference, you do not need to fill the data in, just create a QTO.
Build the columns, and you can label them, however you will find that you will need to adjust
these for different materials we will quantify.
Here are some examples of what they should look like:

Answers

We can see here that in order to create Excel Spreadsheet set up for doing Quantity Take- offs and summary estimate, here is a guide:

Set up the spreadsheet structureIdentify the required columnsEnter the item details: In each sheet, start entering the item details for quantity take-offs.

What is Excel Spreadsheet?

An Excel spreadsheet is a digital file created using Microsoft Excel, which is a widely used spreadsheet application. It consists of a grid of cells organized into rows and columns, where users can input and manipulate data, perform calculations, create charts and graphs, and analyze information.

Continuation:

4. Add additional columns to calculate the total cost for each item.

5. Create a new sheet where you will consolidate the information from all the category sheets to create a summary estimate.

6. Customize the appearance of your spreadsheet by adjusting font styles, cell formatting, and color schemes.

7. Double-check the entered quantities, unit costs, and calculations to ensure accuracy.

Learn more about Spreadsheet on https://brainly.com/question/26919847

#SPJ1

Which specific type of attack occurs when a threat actor redirects network traffic by modifying the local host file to send legitimate traffic anywhere they choose

Answers

The specific type of attack that occurs when a threat actor redirects network traffic by modifying the local host file is DNS Poisoning.

What is DNS poisoning?

DNS poisoning is known to be a type of attack where the  hacker uses a method that alters some seen vulnerabilities that are found in the domain name system (DNS).

Conclusively, The type of attack that takes place when a threat actor redirects network traffic by modifying the local host file is DNS Poisoning as it alters it and change it to what they want thereby redirecting users elsewhere.

Learn more about attack from

https://brainly.com/question/76529

#SPJ1

a(n) ____ in a sql command instructs oracle 12c to use a substituted value in place of the variable at the time the command is actually executed.

Answers

A bind variable in a SQL command instructs Oracle 12c to use a substituted value in place of the variable when the command is executed.

It is a placeholder in a SQL statement where a data value is expected to be substituted. Bind variables are used to pass data into a SQL statement in a secure and efficient manner.

A bind variable is a parameterized SQL statement element. Bind variables are utilized in SQL commands to replace data with literal values. They assist to keep your query safe, as data injection attacks can't occur, and they assist to improve query performance.

Learn more about SQL commands at

https://brainly.com/question/32924871

#SPJ11

Age, interests, and size are all _____ characteristics that should be considered when developing a presentation.

-developer
-audience
-presenter
-programmer

Answers

Age, interests, and size are all audience characteristics that should be considered when developing a presentation. Knowing the audience is the key to making a successful presentation.

The more information you have about your audience, the more effective your presentation will be.Age is an important consideration when developing a presentation. You should be aware of the age range of your audience to be able to adjust your message. An older audience will have different interests than a younger audience and will be more inclined to appreciate different references, examples, and language use. Interests are another key characteristic that should be considered. Understanding the interests of your audience can help you tailor your message and presentation style to better capture their attention.

Finally, size is also an important factor to take into account when developing a presentation. The larger the audience, the more formal your presentation should be, and the more you should use visual aids to make your message clear and easy to follow.In conclusion, age, interests, and size are all audience characteristics that should be considered when developing a presentation. By keeping these characteristics in mind, you can develop a presentation that is tailored to the needs of your audience, and that effectively conveys your message.

To know more about presentation visit:

https://brainly.com/question/1493563

#SPJ11

Victor has been murdered, and Art, Bob, and Carl are suspects. Art says he did not do it. He says that Bob was the victim's friend but that Carl hated the victim. Bob says he was out of town the day of the murder, and besides he didn't even know the guy. Carl says he is innocent and he saw Art and Bob with the victim just before the murder. Assuming that everyone - except possibly for the murderer - is telling the truth, encode the facts of the case so that you can use the tools of Propositional Logic to convince people that Bob killed Victor.

How can you find out using logic that Bob Killed Victor?

Answers

20 characters yes no

cmu 2.5.4 scoreboard i need help with all of cmu 2.5.4

cmu 2.5.4 scoreboard i need help with all of cmu 2.5.4

Answers

Answer:

Explanation: i can not see your sreeen

PLEASE HURRY

Jorge is using Python 3 as a calculator. Jorge wants to find the product of 321 and 408. What should Jorge type? print 321 x 408 print (321 times 408) print 321(408) print (321 * 408)​

Answers

Answer:

1. 321 x 408 print (321 times 408)

Explanation:

It is multiplication, it will create a product. So that is why.

Answer:

print (321 * 408)​

*¿Qué requisito debe cubrir el reciclado de dispositivos
de los equipos de computo para el cuidado del medio
ambiente?

Answers

Give Back to Your Electronic Companies and Drop Off Points.
Visit Civic Institutions. ...
Donating Your Outdated Technology. ...
Sell Off Your Outdated Technology. ...
Give Your Electronic Waste to a Certified E-Waste Recycler

Does anyone know how to ask the user to input their name and then print the name 10 times using a while loop and have the 10 names on different lines?

Answers

In python:

name = input("What's your name? ")

i = 0

while i <= 10:

   print (name)

   i += 1

I hope this helps!

Why is it important to perform routine computer maintenance? It can make more room for junk files and downloadable programs. It can help prevent hardware, software, and Internet access problems. It can stop computer problems from occurring more than once. It can help you remember how to perform steps to solve computer problems.

Answers

b :D

hope this helps

plz give me brainliest

only typed tht so i can have enough words lol

Answer:

B. It can help prevent hardware, software, and Internet access problems.

Explanation: trust dawg

In Java Write a class named Date to represent a standard date. This class should include instance variables for day, month and year.
a. Write a constructor to create the Date with an initial date b. Write a method that is passed a day, a month, and year and checks to make sure it is valid. c. Write a method that is passed a new date to set. It should be passed all the day, month, and year, not just one. This method must check that the new date is valid (reuse your validator method from part b.) d. Write accessor methods to return each individual date element

Answers

Here is the Java code for the Date class that meets the requirements given in the question:`

public class Date {

   private int day;

   private int month;

   private int year;

   // Constructor to create the Date with an initial date

   public Date(int initialDay, int initialMonth, int initialYear) {

       day = initialDay;

       month = initialMonth;

       year = initialYear;

   }

   // Validation method

   public boolean isValidDate(int checkDay, int checkMonth, int checkYear) {

       if (checkMonth < 1 || checkMonth > 12) {

           return false; // Invalid month

       }

       if (checkDay < 1 || checkDay > getMaxDayOfMonth(checkMonth, checkYear)) {

           return false; // Invalid day

       }

       return true; //valid

   }

   // Method that is passed a new date to set checking if it is valid

   public void setDate(int newDay, int newMonth, int newYear) {

       if (isValidDate(newDay, newMonth, newYear)) {

           day = newDay;

           month = newMonth;

           year = newYear;

       } else {

           System.out.println("Invalid date. The date remains unchanged.");

       }

   }

   // Accessor methods

   public int getDay() {

       return day;

   }

   public int getMonth() {

       return month;

   }

   public int getYear() {

       return year;

   }

}

Java is an object-oriented programming (OOP) language, which means that it focuses on creating objects that contain both data and methods to manipulate that data. It follows the "write once, run anywhere" principle, allowing Java programs to be executed on any device or operating system that has a Java Virtual Machine (JVM) installed.

On this case, the code might not run if the the date format is not set as basic format. Because the code checking if the day and month values are within their respective valid ranges. It doesn't consider localized date formats or any other specific requirements beyond the provided instructions.

Learn more about java programming

https://brainly.com/question/29966819

#SPJ11

personal professionalism is only important when you have a full-time job.

true or false?

Answers

Answer: True

Explanation: just cuz

what is bitcoin??????​

Answers

Answer:

a digital or virtual currency created in 2009 that uses peer-to-peer technology to facilitate instant payments.

Explanation:

disadvantages of computer. ​

Answers

Answer:You cant carry it around like a phone

Explanation:

Which of the following does not violate the referential integrity of a database?
inserting a new row into a table with a foreign key that doesn’t match a primary key in the related table
updating a foreign key with a value that doesn’t match a primary key in the related table
updating a primary key in a primary key table without also updating the foreign keys for the related rows in all related tables
deleting a row in a foreign key table without deleting the related row in the related primary key table

Answers

The option that  does not violate the referential integrity of a database is option D: deleting a row in a foreign key table without deleting the related row in the related primary key table.

What does referential integrity prevent?

You can avoid adding information to table Y that cannot be connected to information in table X by using a referential integrity rule. Referential integrity also requires that any records that are connected to a deleted record from table X be destroyed as well.

When all values for all foreign keys are valid, a database is said to be in referential integrity. A column or combination of columns in a table that must have values that match at least one of the main key or unique key values of a row in its parent table are known as foreign keys.

Note that removing a row from a table with foreign keys without removing the relevant entry from the related primary key table. Referential integrity, however, is broken when a record from the primary key table is deleted.

Learn more about referential integrity from

https://brainly.com/question/22779439
#SPJ1

Other Questions
Hi! I need the answers to this quick! The equation of the graph shown is y=ax+b, where a and b are real numbers. What is true about a and b? Scatter plots are used to visualize association in samples of paired data (x, y). group starts a. true b. false If f(x)=3x^2-2 and g(x)=2x+4, Find (f-g)(x). Explain your process jeffrey opened a savings account where his funds will acccrue 1.2% intrest. if he originally investeed $4,500.00 into his account, how much intreat will he accrue in 10 years You take out an $8,000 loan that calls for 48 monthly payments of $240 each. The APR is- 19%- 21%- 23%- 24%and the EAR is-18%- 21%- 25%- 27% The graph of y=-2x5x+2 is drawn belowDraw a suitable line to solve -2x - 5x + 2 = -5 en una investigacion sobre la anemia se estudia la relacion que hay entre el consumo de determinados alimentos [ variable independiente] y loss niveles de emoglobina [ variable dependiente] On 25 June 2021 Carroll received an order from a new customer, Ciros, for products with a sales value of $900,000. Ciros enclosed a deposit with the order of $90,000.On 30 June Carroll had not completed credit checks on Ciros and had not despatched any goods.Carroll is considering the following possible entries for this transaction in its financial statements for the year ended 30 June 2021.(i) Include $900,000 in revenue for the year(ii) Include $90,000 in revenue for the year(iii) Do not include anything in revenue for the year(iv) Create a trade receivable for $810,000(v) Show $90,000 as a current liabilityAccording to IAS 18 Revenue, how should Carroll record this transaction in its financial statements for the year ended 30 June 2021? 3. How is Agosn's language connected to her identity? Give an example fromthe reading to support your answer. The number of 2.452 has two 2s. why does each two have a different value' answer key? PART A: Which statement best describes how the author develops the narrator's point of view? D. The author shows how the narrator's opinion of her brother has changed over the years as he has made countless mistakes.(answer)PART B: Which section from the story best supports the answer to Part A?A. "It took me a moment to take in the room. Even then, I felt that there was a theatrical quality to the way the drawers had been flung open. Or perhaps it was simply that I knew my brother too well." (Paragraph 3)B. "Hey! Madam, why did you waste your fair skin on a boy and leave the girl so dark? What is a boy doing with all this beauty?" (Paragraph 8)C. "But Enugu was anonymous. There the police could do what they were famous for doing when under pressure to produce results: kill people." (Paragraph 14)D. "I wanted him to stop talking. He seemed to enjoy his new role as the sufferer of indignities, and he did not understand how lucky he was that the policemen allowed him to come out and eat our food, or how fool he'd been to stay out drinking that night, and how uncertain his chances were of being released." (Paragraph 24) 1.2 pointsDavid's teacher asked him to solve the problemshown below.(-125 + 175) + (-125 + 165) + 110David's answer of 190 is incorrect. What is thecorrect answer?A.150B.160C.200D. 210Your answer 3x1 73/100 what is it equal to? Mary (42) and roland (43) are married with no dependents. they will file separate returns for 2021. roland files his return first and claims total itemized deductions of $23,500. if mary chooses to claim the standard deduction rather than itemizing when she files her return, what is the maximum amount she may claim? $0 $1,600 $12,550 $25,100 What is the grammatical term for the bracketed words in the sentence below? My prize was (a fluffy green pencil case with a gold zip) financial statements of a manufacturing firm the following events took place for sorensen manufacturing company during january, the first month of its operations as a producer of digital video monitors: purchased $246,000 of materials. used $177,120 of direct materials in production. incurred $442,800 of direct labor wages. incurred $177,100 of factory overhead. transferred $747,800 of work in process to finished goods. sold goods for $1,180,800. sold goods with a cost of $664,200. incurred $211,600 of selling expense. incurred $123,000 of administrative expense. Are the boiling points of alkanes lower or higher than those of almost any other type of compound of the same molecular weight?In general, do the boiling and melting points of alkanes increase or decrease with increasing molecular weight? Read the excerpt from "A Wagner Matinee" by Willa Cather. "One summer, which she had spent in the little village in the Green Mountains where her ancestors had dwelt for generations, she had kindled the callow fancy of the most idle and shiftless of all the village lads, and had conceived for this Howard Carpenter one of those absurd and extravagant passions which a handsome country boy of twenty-one sometimes inspires in a plain, angular, spectacled woman of thirty. When she returned to her duties in Boston, Howard followed her; and the upshot of this inexplicable infatuation was that she eloped with him, eluding the reproaches of her family and the criticism of her friends by going with him to the Nebraska frontier. " What is most likely the meaning of reproaches? Question 3 options: cooperation disapproval rudeness surrender. What does Projective structure from motion mean What expression represents 16 more than 5 times a number, n?