which of the following is not true regarding the internet and the practice of public relations?

Answers

Answer 1

One of the following is not true regarding the internet and the practice of public relations is: the internet has made it easier for organizations to control their messaging and limit negative publicity.

As the internet has increased the speed and reach of information dissemination, making it more difficult for organizations to control their messaging and reputation. While the internet has made it easier for organizations to disseminate their messages and reach a wider audience, it has also made it more difficult to control their messaging and limit negative publicity.

In fact, the internet has made it easier for individuals to voice their opinions and share information, making it more difficult for organizations to control the narrative and limit negative publicity. One of the main reasons for this is that the internet has given rise to a number of new channels through which individuals can express their opinions and share information.

Learn more about negative publicity: https://brainly.com/question/3434102

#SPJ11


Related Questions

What’s Discord Packing?

Answers

where a couple of people on discord who have loud mics make fun of each other

Make jokes while yelling and shouting. Joke 4 When you and another person are at odds, you make a joke, and when you're done, the other person does the same. You conduct a poll to determine who was funnier. Loudmicing is what it sounds like, and that's all you do. When you pack but don't make any settings, you are lowsiding.

What best define about Discord Packing?

When two or more people engage in “discord packing,” they may roast one another or crack offensive jokes about one another. Discord packing comes in a variety of forms, including stamina packing, blazing, joke-for-joke, loudmicing, and lowsiding. Most people pack in a flaming manner.

Therefore, When people use loud microphones to yell and scream at each other in a voice call for fun or beef. To avoid waking up the participants' parents, they typically take place late at night.

Learn more about packing here:

https://brainly.com/question/15114354

#SPJ2

match each option to the description of the task it accomplishes.
arrange>
shape styles>
size>
insert shapes>
wordart styles

match each option to the description of the task it accomplishes. arrange>shape styles>size>insert

Answers

Answer:

Follows are the solution to the given question:

Explanation:

Please find the attached file of the matching.

Arrange: In shape formatting, the "arrange" is used to provide an arrangement in the positing of the shape on the given slide.

shape styles: In shape formatting, it is used for applying a new design to the shape.

size: In shape formatting, the size is used for modifying the shape.

insert shapes: In shape formatting, the insert shape is used to add a new shape.

Wordart styles: In shape formatting, Wordart is used to provide a text design on the shape.

match each option to the description of the task it accomplishes. arrange>shape styles>size>insert

Potential Energy and Kinetic Energy both mean "energy in motion" True or False​

Answers

Answer:

false

Explanation:

pretty sure energy in motion is only for kinetic energy

Answer:

False

Explanation:

I'm pretty sure potential energy is there when something isn't moving and kinetic energy is when something is in motion

Which sentence is the thesis statement for this essay?

Answers

which essay? the thesis will most likely be the last sentence of an intro, but not necessarily. its what states your reasons or your point of view in an intro.  

Which sentence is the thesis statement for this essay?

Knowing where to look, making a good first impression, and following up with a potential employer can help you land the perfect job.

All these strategies will help you find a job.

There are many sources of potential jobs.

Finding a job can be a scary prospect.

list the steps on how to apply bevel and emboss to a layer

Answers

Answer: 2123

Explanation:

ok

JAVA -Develop a program that prompts the user to enter a series of 10 integers and then determines and displays the largest and smallest values entered. The solution must use at least these following variables:

counter -a counter to count how many integers were entered
number -the integer most recently input by the user
smallest -the smallest number entered so far
largest -the largest number entered so far

Write three separate programs in JAVA , the first using a while construct, the second using a for construct, and the third using a do while construct. Thank you so much!

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that enter a series of 10 integers and then determines and displays the largest and smallest values entered.

Writting the code in JAVA:

public class OddEvenSum {  // Save as "OddEvenSum.java"

  public static void main(String[] args) {

    // Declare variables

     final int LOWERBOUND = 1;

     final int UPPERBOUND = 1000;  // Define the bounds

     int sumOdd  = 0;    // For accumulating odd numbers, init to 0

     int sumEven = 0;    // For accumulating even numbers, init to 0

     int absDiff;        // Absolute difference between the two sums

     // Use a while loop to accumulate the sums from LOWERBOUND to UPPERBOUND

     int number = LOWERBOUND;   // loop init

     while (number <= UPPERBOUND) {  // loop test

           // number = LOWERBOUND, LOWERBOUND+1, LOWERBOUND+1, ..., UPPERBOUND

        // A if-then-else decision

        if (number % 2 == 0) {  // Even number

           sumEven += number;   // Same as sumEven = sumEven + number

        } else {                // Odd number

           sumOdd += number;    // Same as sumOdd = sumOdd + number

        }

        ++number;  // loop update for next number

     }

     // Another if-then-else Decision

     if (sumOdd > sumEven) {

        absDiff = sumOdd - sumEven;

     } else {

        absDiff = sumEven - sumOdd;

     }

     // OR using one liner conditional expression

     //absDiff = (sumOdd > sumEven) ? sumOdd - sumEven : sumEven - sumOdd;

     // Print the results

     System.out.println("The sum of odd numbers from " + LOWERBOUND + " to " + UPPERBOUND + " is: " + sumOdd);

     System.out.println("The sum of even numbers from " + LOWERBOUND + " to " + UPPERBOUND + " is: " + sumEven);

     System.out.println("The absolute difference between the two sums is: " + absDiff);

  }

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

JAVA -Develop a program that prompts the user to enter a series of 10 integers and then determines and

most daemon scripts accept the arguments start stop and restart. (True or False)

Answers

The given statement "Most daemon scripts accept the arguments start, stop, and restart" is true. These arguments allow users to manage the daemon's life cycle easily.

Most daemon scripts, which are used to manage background processes or services in a Unix or Unix-like operating system, often accept the arguments "start," "stop," and "restart." The "start" argument launches the daemon process, "stop" terminates it, and "restart" stops and then starts the daemon again, effectively reloading its configuration.

This is a common convention for daemon scripts to provide a consistent and straightforward way to manage services on a system. By accepting these standard arguments, daemon scripts allow for consistent control and management of services across different systems.

Learn more about Unix visit:

https://brainly.com/question/32072511

#SPJ11

a data mining routine has been applied to a transaction dataset and has classified 88 records as fraudulent (30 correctly so) and 952 as non-fraudulent (920 correctly so). construct the confusion matrix and calculate the overall error rate.

Answers

The overall error rate for the data mining routine applied to the transaction dataset is approximately 6.35%.

First, let's create the confusion matrix using the given information:

                  Predicted Fraudulent Predicted Non-fraudulent
Actual Fraudulent            30                        58
Actual Non-fraudulent        8                         920

Now, let's calculate the overall error rate using the formula:

Overall Error Rate = (False Positives + False Negatives) / Total Records

In this case, the false positives are the 8 records classified as fraudulent but are actually non-fraudulent, and the false negatives are the 58 records classified as non-fraudulent but are actually fraudulent. The total records are 88 + 952 = 1040.

Overall Error Rate = (8 + 58) / 1040
Overall Error Rate = 66 / 1040
Overall Error Rate ≈ 0.0635 or 6.35%

Learn more about matrix: https://brainly.in/question/55764522

#SPJ11

which fields in the contact form is used to control the order in which contacts are displayed in the current view?

Answers

Answer:

The answer is "File As"

Explanation:

The file is a data collection, that is processed either by filename in a single system. It could be a text, an image, a sound or a streaming server, a software collection, an and app, and other data collection. In this, the File As the field is used to order in connections that are displayed in the original understanding was controlled by using the contact-form sector.

More uniform penetration of anatomic structures occurs when what level of kVp is used?
a. Low
b. High
c. kVp does not affect penetration
d. Level at which photoelectric interaction predominates

Answers

More uniform penetration of anatomic structures occurs when high levels of kVp are used, while low levels of kVp can result in under penetration. So, option b is correct.

More uniform penetration of anatomic structures occurs when high levels of kVp (kilovolt peak) are used. High kVp allows for better penetration of tissues and reduces the risk of underpenetration or insufficient image quality. It provides higher energy X-rays, which can effectively pass through dense tissues and produce more uniform images.

Low levels of kVp are more likely to result in underpenetration, where the X-rays are absorbed by the tissues and fail to reach the image receptor. This can lead to images that lack detail and contrast.

The statement "kVp does not affect penetration" is incorrect. kVp directly influences the penetration power of X-rays and plays a crucial role in obtaining well-penetrated and diagnostically useful images.

The level at which photoelectric interaction predominates is not directly related to the uniform penetration of anatomic structures. Photoelectric interaction refers to the absorption of X-rays by atoms, which occurs primarily at lower energies. However, the choice of kVp affects the balance between photoelectric and Compton interactions, impacting image contrast and overall image quality.

In summary, using high levels of kVp is associated with more uniform penetration of anatomic structures, ensuring better image quality and diagnostic information.

So, option b is correct.

Learn more about anatomic structures:

https://brainly.com/question/27873535

#SPJ11

1) Assume you are adding an item 'F' to the end of this list (enqueue('F')). You have created a new linear node called temp that contains a pointer to 'F'. Also assume that in the queue linked list implementation, we use the variable numNodes to keep track of the number of elements in the queue.

Answers

When a new item 'F' is added to the end of the queue list (enqueue('F')), a new linear node is created called temp that contains a pointer to the new element. In a queue linked list implementation, the variable numNodes is used to keep track of the number of elements in the queue.

As a result, we increment the numNodes variable by 1 since a new item has been added to the queue list. The pointer at the tail of the queue is then updated to the newly added node temp. We can do this by assigning the new node temp to the current node that is being referenced by the tail pointer.

Next, if the queue was previously empty, then we set both the head and tail pointers to temp. If the queue wasn't empty, we leave the head pointer unmodified, since the element added is being added to the end of the queue. We then return the updated queue list with the newly added item 'F'.In summary, when adding a new item 'F' to the end of a queue list implementation, we first create a new node that points to the new element.

To know more about mplementation visit:

https://brainly.com/question/32092603

#SPJ11

25 points for this answer
Unethical uses of computer devices include _____. Select 3 options.
financial theft
surfing websites
identity theft
media piracy
downloading videos

Answers

Answer:

financial theft

identity theft

media piracy

Unethical uses of computer devices include the following:

Financial theft.Identity theft.Media piracy.

What is an unethical use of a computer?

The unethical use of a computer can be defined as the unauthorized and illegal (illegitimate) use of a computer system to perpetrate cyber crimes and other criminal inclined practices.

In Cybersecurity, unethical uses of computer devices by a hacker include the following:

Financial theft.Identity theft.Media piracy.

Read more on computer crime here: https://brainly.com/question/13109173

#SPJ2

Describe how you would format a cell so that if its value is less than 20 the cell would be automatically bolded.

Answers

To format a cell so that if its value is less than 20 the cell would be automatically bolded, the steps are as follows:

Step 1: Select the cell you want to format.

Step 2: Click on the Home tab located in the toolbar.

Step 3: Click on the Conditional Formatting button located in the Styles group.

Step 4: Select New Rule from the drop-down list. The New Formatting Rule dialog box will appear.

Step 5: Choose the Format only cells that contain option.

Step 6: Under the Format only cells with option, select Less Than as the rule type.

Step 7: Enter 20 as the value you want to use for comparison.

Step 8: Click on the Format button. The Format Cells dialog box will appear.

Step 9: Choose the Font tab and select the Bold checkbox.

Step 10: Click OK to apply the formatting.

Step 11: Click OK again to close the New Formatting Rule dialog box.

By following the above steps, you can format a cell so that if its value is less than 20 the cell would be automatically bolded.

Learn more about formatting:

https://brainly.com/question/32268394

#SPJ11

ng/ Computer Applications - Office 2016 - EL3520 A
exprang TOWO AU an city a List
Hope wants to add a third use at the end of her
nitrogen list
What should Hope do first?
a.
What is Hope's next step?
Hope has now created her sublist.
1. Oxygen
Helps living things produce energy
b. Helps protect living things from harmful rays of
the sun
2. Nitrogen
Part of the muscles and organs of living things
b. Part of substances that make living things
function
a.

Answers

Answer:

1. Put her insertion point at the end of item 2b.

2. Press the enter key

Explanation:

Just did it on Edge.

differences between word processor and typewriter​

Answers

The differences between word processor and typewriter​ are given below:

Word Processor:

Documents can be saved, printed, and shared electronically.

Multiple documents can be open simultaneously, and changes can be easily made and undone.

Word processors often include templates for various document types like resumes, letters, and reports.

Typewriter:

A typewriter is a mechanical device used for writing and producing printed text on paper.

It uses individual keys for each character and requires manual effort to press the keys and produce text.

Typewriters offer limited formatting options, typically only allowing for basic text alignment and bold or underline options.

Corrections are more difficult on a typewriter, often requiring correction fluid or erasing and retyping.

Read more about word processors here:

https://brainly.com/question/29762855

#SPJ1

After 4 years of night school and nearly half a year waiting for the results of the bar examination, you have been admitted to practice law in your state. You decide that you have to keep your current government job while, hopefully, establishing your law practice. To do a first class job for the client, you need first class equipment i.e., good computers and printers, fax machines, etc. You stay late at the office each day to complete work on your pleadings, and you create a database on your computer to keep track of your contacts and cases. Is this an acceptable temporary solution

Answers

Answer:

yes

Explanation:

because it will make the lawyer to keep track of all is client cases without any stress

Respond to the following in a minimum of 175 words: Testing is an integral part of software development, and the testing process varies from software to software depending upon its size and complexity. Discuss why it is necessary to have different levels of testing rather than just a single level of testing • How much of testing activities would you do before releasing software to a client? Discuss 3 testing activities that are necessary for all projects.

Answers

Testing is an essential part of software development, and it is necessary to have different levels of testing rather than just a single level of testing.

The different levels of testing are designed to ensure that the software meets the specified requirements and is free from defects. The levels of testing include unit testing, integration testing, system testing, and acceptance testing. Each level of testing has its own objectives and focuses on different aspects of the software. Unit testing is focused on testing individual components or modules of the software, while integration testing is focused on testing the interactions between different components or modules. System testing is focused on testing the software as a whole, while acceptance testing is focused on testing the software against the user's requirements.

Before releasing software to a client, it is necessary to perform a sufficient amount of testing activities to ensure that the software is of high quality and meets the client's requirements. Three testing activities that are necessary for all projects include:

Functional testing: This type of testing evaluates the software application's functionality or behavior based on the requirements and specifications of the application. It ensures that the software performs the intended functions and meets the user's requirements.

Performance testing: This type of testing evaluates the software's performance under various conditions, such as high load, stress, and endurance. It ensures that the software performs well under different conditions and can handle the expected workload.

Security testing: This type of testing evaluates the software's security features and identifies vulnerabilities that could be exploited by attackers. It ensures that the software is secure and protects the user's data and information.

In conclusion, different levels of testing are necessary to ensure that the software meets the specified requirements and is free from defects. Before releasing software to a client, it is necessary to perform a sufficient amount of testing activities, including functional testing, performance testing, and security testing, to ensure that the software is of high quality and meets the client's requirements.

learn more about software here:

https://brainly.com/question/32393976

#SPJ11

which of the following is an internet challenge to privacy a. spyware b. hardware c. risk management d. all of the above

Answers

All of the options listed—spyware, hardware, and risk management—can be considered internet challenges to privacy. The correct answer is "d. all of the above."

Spyware refers to malicious software that is designed to gather information about a person or organization without their knowledge or consent. It can track online activities, capture personal information, and compromise privacy.

Hardware can also pose a challenge to privacy, particularly in the context of internet-connected devices. Vulnerabilities in hardware components or devices can be exploited to gain unauthorized access to personal data or compromise privacy.

Risk management is a broader concept that encompasses various strategies and processes aimed at identifying, assessing, and mitigating risks, including those related to privacy. In the context of the internet, risk management involves understanding and addressing potential threats to privacy and implementing measures to protect sensitive information.

Therefore, all of the options listed—spyware, hardware, and risk management—are internet challenges that can impact privacy. Option d is the correct answer.

You can learn more about internet privacy challenges at

https://brainly.com/question/31675572

#SPJ11

which tool is an open source utility for unix devices that includes content filtering? a. syslog-ng b. rsyslog

Answers

Content filtering is a feature of the open-source syslog-ng tool for Unix devices.

What is a Unix device?All CPU architectures may access hardware transparently with UNIX, which was developed for this purpose. All devices should be reachable using the same set of command-line utilities, which is another principle supported by UNIX. Character (char), block, and network devices are the three types of devices that make up the traditional Unix driver model. Accordingly, char drivers, block drivers, or network drivers are names for the drivers that implement these devices. Character, Block, and Network are the three hardware device types that Linux supports. The system's serial ports /dev/cua0 and /dev/cua1 are two examples of character devices that can be read and written to without buffering. Only data in multiples of the block size, usually 512 or 1024 bytes, can be written to or read from block devices.

To learn more about Unix device, refer to:

https://brainly.com/question/30260393

How much do high-end earners make as power plant operators? Type answer as numerical number.

Answers

Answer:

$78,430

Explanation:

The yearly salary of power plant operaters varies depending on the type of industry that they are working for. The highest paying industry for power plant operators would be the natural gas distribution companies. Individuals in this position are making $78,430 a year as of 2020. The second highest paid position would be working in the Scientific research operations industry as a power plant operator which are making roughly $74,000 a year.

A company is monitoring the number of cars in a parking lot each hour. each hour they save the number of cars currently in the lot into an array of integers, numcars. the company would like to query numcars such that given a starting hour hj denoting the index in numcars, they know how many times the parking lot reached peak capacity by the end of the data collection. the peak capacity is defined as the maximum number of cars that parked in the lot from hj to the end of data collection, inclusively

Answers

For this question i used JAVA.

import java.time.Duration;

import java.util.Arrays;;

class chegg1{

 public static int getRandom (int min, int max){

       

       return (int)(Math.random()*((max-min)+1))+min;

   }

public static void display(int[] array){

    for(int j=0; j< array.length; j++){

     System.out.print("   " + array[j]);}

     System.out.println("----TIME SLOT----");

}

public static void main(String[] args){

   int[] parkingSlots= new int[]{ -1, -1, -1, -1, -1 };

   

   display(parkingSlots);

   for (int i = 1; i <= 5; i++) {

     

     for(int ij=0; ij< parkingSlots.length; ij++){

       if(parkingSlots[ij] >= 0){

           parkingSlots[ij] -= 1;

       }

       

       else if(parkingSlots[ij]< 0){

           parkingSlots[ij] = getRandom(2, 8);

       }

       

       

       }

      display(parkingSlots);

   

    // System.out.println('\n');

     try {

       Thread.sleep(2000);

     } catch (InterruptedException e) {

       e.printStackTrace();

     }

   }

   }

}

output:

-1   -1   -1   -1   -1----TIME SLOT----

  8   6   4   6   2----TIME SLOT----

  7   5   3   5   1----TIME SLOT----

  6   4   2   4   0----TIME SLOT----

  5   3   1   3   -1----TIME SLOT----

  4   2   0   2   4----TIME SLOT----

You can learn more through link below:

https://brainly.com/question/26803644#SPJ4

How to fix "files required to play gta online could not be downloaded"?

Answers

This error message typically appears when there is a problem with the files required to play Grand Theft Auto (GTA) Online on a computer or gaming console. Here are a few troubleshooting steps that may help fix the problem

Check your internet connection.Restart the game.Clear the cache.Check for updates.Check for server status.Reinstall the game.

Make sure your device is connected to the internet and that you have a stable connection. Close the game and restart it to see if that fixes the issue. Clear the cache on your console or computer to make sure that the game is using the most recent files. Make sure that you have the latest update for the game installed. Check the official Rockstar Games Social Club website to see if the servers are down for maintenance or experiencing technical issues. If none of the above steps work, try uninstalling and reinstalling the game. This will delete all the game files, but will also ensure that the game is running the latest version and that all files are present.

Learn more about fix problem, here https://brainly.com/question/20371101

#SPJ4

Explain LCD and give two example​

Answers

Answer:

LCD means least common denominator• a "Common Denominator" is when the bottom number is the same for the fractions.

Explanation:

Answer:

least common denominator.

To view the Picture tools tab, a user must first _____.

A.select the picture
B.navigate to the View tab
C.place the cursor in the right margin
D.select the picture style

Answers

Answer: A select the picture
Select the picture is the correct answer

Why did it take fewer 1-inch tiles than 1-centimeter tiles to measure the length of the cookie cutter?​

Answers

The inch tiles are larger, meaning they use less space.

How your private data and information are used, who has access to them, which techniques and technologies protect them, and the communications and preferences surrounding how they are handled are components of Internet

Answers

The security components of Internet describes how user's private data are used, who has access to them, which techniques and technologies protect them.

What are the security components of Internet?

The security components of Internet can be defined as a strategic process that highlights and describes how all end user's private data and information are used, who has access to them, which techniques and technologies protect them.

Furthermore, the communications and preferences surrounding how an user's private data and information are handled describes are the security components of Internet.

Read more on security here: https://brainly.com/question/14286078

#SPJ1

Bill gates is one of the founders of microsoft, a leading international technology firm. bill would be considered which level of management?

Answers

Bill Gates (the founders of microsoft, a leading international technology firm)  would be considered as a top-level manager at Microsoft.

Bill Gates, as one of the founders of Microsoft, holds a position of significant authority and responsibility within the organization. As a top-level manager, Gates is involved in strategic decision-making, setting the overall direction and goals for the company. He plays a crucial role in shaping Microsoft's long-term vision and ensuring its alignment with the rapidly evolving technology industry.

In his capacity as a top-level manager, Gates oversees the work of other managers and executives within the organization. He provides guidance and leadership to the executive team, ensuring that the company's resources are effectively allocated and utilized to achieve its strategic objectives.

Gates also represents Microsoft in high-level meetings with stakeholders, partners, and government officials, further highlighting his top-level management role.

Learn more about  Top-level manager

brainly.com/question/30516904

#SPJ11

In order to personalize your desktop, you may click on: Start>settings>Personalization . . .

•TRUE
•FALSE

Answers

According to your question you are not wrong. It in fact is correct. TRUE

Please see the attached workbook. What is the url query string for the extract in the attached worksheet?.

Answers

http://www.imdb.com/ is the url query string for the extract in the attached worksheet as a Query String is the string passed to the url in the form of parameters, it can contain one or more parameters, each parameter is separated using the ampersand.

What Does Query String Mean?

The part of a URL known as a query string is used to pass information to a back-end database or web application. Because the HTTP protocol is stateless by design, we need query strings. You must continue to operate a website in order for it to function as more than a brochure (store data).

There are several methods for doing this: You can use something like server-side session state on the majority of web servers. Cookies can be used to store data on the client. You can also use a query string in the URL to store data.

All URLs on the internet can be divided into three parts: protocol, file (or program) location, and query string. The majority of the time, the protocol you see in a browser is HTTP.

The location is represented by the hostname and filename in their typical format (for instance, www.brainly.com/somefile.html), and the query string is whatever comes after the question mark symbol ("?").

For example, in the URL below, the bolded area is the query string that was generated when the term "database" was searched on the brainly website, //www.brainly.com/search.aspx?q=database§ion=all.

To know more about URL, visit: https://brainly.com/question/19715600

#SPJ4

how do you play pokemon go

Answers

Download the app and make an account hope this helps!

Answer:

download the app then tap your screen for the rest of your life

(And I'm being serious)

Other Questions
10 - 14help me out if u guys can What does a file association specify?A) the software needed to open a fileB) the files authorC) the files directory pathD) a list of related files How does paragraph 8 help develop the author's ideas?Oby presenting an alternative perspective of the college whereDodgson attendedby summarizing the author's conclusions about Dodgson's lifeat collegeby providing context explaining why Dodgson remained atcollege despite his unhappinessby offering evidence to support the author's point thatDodgson excelled during college Erica Turner can you please help me with another math question the amount of hydrogen that would be produced by dropping 2.5 grams of zinc in 100 mL of sulfuric acid solution with the same concentration Marlina received her salary on Friday. She spent one-half of her salary on rent and then spent $338 on her electric and water bill. Next, she spent one-half of what was left on her phone bill. After spending $56.00 on gas for her car, Marlina had $102.00 left. How much did Marlin spend on rent? There were 90 runners to start a race. In the first half of the race, 1/3 of them dropped out. In the second half of the race, 1/5 of the remaining runners dropped out. How many runners finished the race? A recipe says that 2 cups of dry rice will serve 6 people. Complete the table as you answer the questions. Be prepared to explain your reasoning. rowth is expected to be constant after 2023, and the weighted average cost of capital is 11%. what is the horizon (continuing) value at 2024 if growth from 2023 remains constant? do not round intermediate calculations. enter your answer in millions. for example, an answer of $1 million should be entered as 1, not 1,000,000. round your answer to the nearest whole number. Please help Which of the following sentences represents the strongest concludingstatement for an essay? For a reaction that has an equilibrium constant of 7 10^3 , which of the following statements must be true?A) S is positive.B) G is positive.C) G is negative.D) H is negative.E) H is positive.I know the answer is B but not sure WHY. What two empires are shown on this map and where are they in relation to Arabia How do parrots speak? (Please dont tell me they dont actually speak)Worth 45 points List the key features of comparative bar graph and segmented bar graph: What is a cloud-first strategy? what is a cloud-first strategy? a. a multi-service approach that re-platforms global businesses with greater speed and value b. a service that enhances and automates a business's customer acquisition strategy c. a wearable technology that provides customers with on-the-spot personalized experiences d. a hybrid cloud service that allows multiple customers to share control of applications Which of the following does not provide an example of network externalities? The Internet The telephone system A language A patent Brief Exercise 12-24 (Algo) Given the following attributes of an investment... [LO 12-4] Given the following attributes of an investment project with a 5 -year life and an after-tax discount rate of 11%, calculate both the IRR and MIRR of the project: Investment outlay, time 0,$3,100; after-tax cash inflows, year 1,$930; year 2,$620; year 3 , $930; year 4,$620; and year 5,$1,550. the accompanying graph depicts demand at point d demand is Changing Americans' LivesConsider all of the inventions that you learnedabout in this lesson. Which do you think changedAmericans' lives most? Why? How? Write a five-to seven-sentence paragraph that answers thesequestions. Include examples from this lesson. Question 9 of 25How does a cell's history affect the benes expressed by the cell?OA. All of the genes contained in a cell must be expressed as soon asthe cell forms so it can differentiate.OB. Internal and external conditions determine which genes are turnedon or off as the cell develops.C. The genes that are turned on when a cell is developing are the onlygenes that will be expressed during the cell's life.D Refore a call dividae unnececean nongo are removed from ite PREVIOUS