Networking, as it applies to the field of selling, is a method of prospecting:
A) with the telephone
B) popular only in the telecommunications field
C) which is seldom used today
D) that is of dubious ethics
E) that relies on making contacts with people and profiting from the connection

Answers

Answer 1

Networking, as it applies to the field of selling, is a method of prospecting: E) that relies on making contacts with people and profiting from the connection.

What is Networking?

Networking, in the context of selling, refers to a method of prospecting where individuals make connections with others in order to leverage those relationships for business opportunities and sales.

It involves building a network of contacts, fostering relationships, and utilizing those connections to generate leads, referrals, and ultimately profit from the connections made.

Networking is a widely recognized and practiced approach in various industries, enabling sales professionals to expand their reach, establish credibility, and create mutually beneficial relationships for business growth.

Read more about networking here:

https://brainly.com/question/28342757

#SPJ4


Related Questions

can plastic be recycled and how can plastic be recycled and into what​

Answers

Answer:

There are two types of plastic, thermoset and thermoplastic. Thermoset plastics cannot be recycled due to the fact that they contain polymers that cross-link to form an irreversible chemical bond which means no matter what you can't just melt them into reusable products. Whereas thermoplastics can be remelted and remolded to form new plastic products. Things such as milk jugs, plastic bags, bottles, bottle caps, and foam packaging can be reused to make things like new bottles and containers, plastic lumber, picnic tables, lawn furniture, playground equipment, recycling bins, park benches, backyard decks and fences,  t-shirts, sweaters, fleece jackets, insulation for jackets and sleeping bags, carpeting, more bottles, batteries for your car, garden rakes, storage containers, reusable shopping bags, yarn, ropes, brooms, more bottle caps, insulation, picture frames, building products for your home, and more foam packaging.

Explanation:

I really hope this helps ヾ(≧▽≦*)o

On larger computers such as servers, a volume can span multiple physical secondary storage devices.

a. true
b. false

Answers

On larger computers such as servers, a volume can span multiple physical secondary storage devices is True.

What is a volume?

A volume is a logical unit of storage that can be made up of multiple physical disks. This is often done on larger computers such as servers to increase the available storage space and improve performance. When a volume spans multiple disks, the data is striped across the disks, which can improve performance by spreading the read and write operations across multiple disks.

There are a number of different ways to create a volume that spans multiple disks. One common method is to use a RAID controller. A RAID controller is a hardware device that manages the disks in a RAID array.

Find out more on secondary storage devices here: https://brainly.com/question/20600657

#SPJ4

ces he three main media formats for online retailing are mobile Internet, stationery Internet and a. E-commerce b. Internet-enabled TV C. VPN d. None of these e. All of these 43. Mobile commerce compo

Answers

The three main media formats for online retailing are mobile Internet, stationery Internet and a. E-commerce.

What is E-commerce?

E-commerce, short for electronic commerce, refers to the buying and selling of goods and services over the internet. It involves conducting commercial transactions electronically, using online platforms, websites, or applications. E-commerce eliminates the need for physical presence in traditional brick-and-mortar stores, allowing customers to shop conveniently from anywhere at any time.

It encompasses various activities such as online shopping, online banking, online auctions, digital payments, and electronic ticketing. E-commerce has revolutionized the way businesses operate and has significantly impacted the global economy.

Find out more on E-commerce here: https://brainly.com/question/29115983

#SPJ4

the recordings we record are biphasic (have both positive and negative phases). why are they biphasic? (hint: the recording is differential, and the playdough has both resistance and capacitance)

Answers

The recordings in a differential recording setup are biphasic because of the combined effects of resistance and capacitance in the system.

In a differential recording, two electrodes are used to measure the potential difference between them. The recording electrodes are typically placed at different locations on the body or within a biological system. The electrodes are in contact with the tissue or medium of interest, and this interaction introduces resistance and capacitance.

The resistance component arises due to the electrical impedance of the tissue or medium. It can affect the flow of electrical current and cause voltage changes between the electrodes.

The capacitance component is related to the ability of the tissue or medium to store electrical charge. It results in the charging and discharging of the capacitive elements between the electrodes, leading to changes in voltage over time.

The combination of resistance and capacitance in the recording system results in biphasic recordings. As the electrical current flows through the tissue or medium, it generates both positive and negative phases in the recorded signal. These phases represent the different polarities and temporal characteristics associated with the underlying physiological or electrical activity being measured.

Therefore, the biphasic nature of the recordings in a differential setup is attributed to the interplay between resistance and capacitance in the system, which influences the voltage changes observed between the recording electrodes.

learn more about capacitance here

https://brainly.com/question/31871398

#SPJ11

use the sort command to sort the contents of dir_out.txt in reverse order and redirect the output to a new file called dir_rev_sorted1.txt.

Answers

To sort the contents of the "dir_out.txt" file in reverse order and redirect the output to a new file named "dir_rev_sorted1.txt," you can use the "sort" command with the "-r" option and the ">" symbol for redirection.

The "sort" command is a utility available in most Unix-like operating systems that can be used to sort lines of text alphabetically or numerically. By default, it sorts in ascending order. To sort in reverse order, you can use the "-r" option, which tells the "sort" command to reverse the sorting order.

To perform the sorting and redirect the output to a new file, you can use the ">" symbol followed by the desired filename. In this case, you would run the following command:

```shell

sort -r dir_out.txt > dir_rev_sorted1.txt

```

This command will read the contents of "dir_out.txt," sort them in reverse order, and then save the sorted output to a new file named "dir_rev_sorted1.txt." The new file will contain the contents of "dir_out.txt" sorted in reverse order.

Learn more about sorts here:

https://brainly.com/question/30673483

#SPJ11

Which CSS declaration makes the child of the paragraph blue?

This will be the blue paragraph.


a. p > span { color: blue;}
b. p ~ span { color: blue;}
c. p + span { color: blue;}
d. p < span { color: blue;}

Answers

The CSS declaration that makes the child of the paragraph blue is: a. p > span { color: blue;}.

Explanation: Given options are:a. p > span { color: blue;}b. p ~ span { color: blue;}c. p + span { color: blue;}d. p < span { color: blue;}Here, p > span means that any child of `` tags with `` tags will have the color blue. So, Option a is the correct answer. The symbol > is known as child selector which selects all the direct child elements specified with the second element. Here, p is the parent selector and span is the child selector which means that the code p > span applies to any span element that is a direct child of a p element.

An ordered group of CSS values and properties makes up a CSS declaration block. It appears as a CSSStyleDeclaration in the DOM.

Every set of properties and values is referred to as a CSS declaration. These properties are linked to the CSS declaration block:

derived flag

If the CSSStyleDeclaration object is a computed style as opposed to a given style, it is set. By default, unset.

declarations

The associated CSS declarations for this item.

CSS parent rule

The CSSRule that the block of CSS declaration belongs to, unless null.

node owner

The element to which the CSS declaration block is attached; if null, the element.

modifying flag

Sets the time at which the owner node's style attribute is updated by the CSS declaration block.

Know more about CSS here:

https://brainly.com/question/32535384

#SPJ11

Write a program to write Java statements for performing the following tasks with an array declared as
int[][] values = new int[ROWS][COLUMNS];
• Fill all entries with 0.
• Fill elements alternately with 0s and 1s in a checkerboard pattern.
• Fill only the elements at the top and bottom row with zeroes.
• Compute the sum of all elements.
• Print the array in tabular form.
Final form looks like this for a 10 X 10 array:
0 0 0 0 0 0 0 0 0 0
1 0 1 0 1 0 1 0 1 0
0 1 0 1 0 1 0 1 0 1
1 0 1 0 1 0 1 0 1 0
0 1 0 1 0 1 0 1 0 1
1 0 1 0 1 0 1 0 1 0
0 1 0 1 0 1 0 1 0 1
1 0 1 0 1 0 1 0 1 0
0 1 0 1 0 1 0 1 0 1
0 0 0 0 0 0 0 0 0 0

Answers

Here is the Java program that will perform the given tasks with an array declared as int[][] values = new int[ROWS][COLUMNS];:

import java.util.Arrays;public class ArrayTasks { public static void main(String[] args) { int ROWS = 10; int COLUMNS = 10; int[][] values = new int[ROWS][COLUMNS]; //Fill all entries with 0. for (int[] row : values) { Arrays.fill(row, 0); } printArray(values); //Fill elements alternately with 0s and 1s in a checkerboard pattern. for (int i = 0; i < ROWS; i++) { for (int j = 0; j < COLUMNS; j++) { values[i][j] = (i + j) % 2; } } printArray(values); //Fill only the elements at the top and bottom row with zeroes. for (int j = 0; j < COLUMNS; j++) { values[0][j] = 0; values[ROWS - 1][j] = 0; } printArray(values); //Compute the sum of all elements. int sum = 0; for (int[] row : values) { for (int element : row) { sum += element; } } System.out.println("Sum of all elements: " + sum); } //Print the array in tabular form. public static void printArray(int[][] array) { for (int[] row : array) { for (int element : row) { System.out.print(element + " "); } System.out.println(); } System.out.println(); }}

Know more about ArrayTasks here:

https://brainly.com/question/30167225

#SPJ11

Which of the following is a small file that is placed on the computer hard drive of visitors to an organization's site?
a. a cookie
b. a wiki
c. an antivirus
d. a bookmark

Answers

The option which is a small file that is placed on the computer hard drive of visitors to an organization's site is called "Cookie" Opton A)

How does a cookie work ?

A cookie is a small file   that is placed on a visitor's computer hard drive when they access a website.

It is used to store information   about the visitor's interactions with the websiteand can be accessed by the website during subsequent visits.

Users can choose to accept or reject cookies,delete existing   cookies, or configure their browser to prompt for cookie acceptance on each website visit.

Learn more about Cookie at:

https://brainly.com/question/14252552

#SPJ1

1) Using a set of values from 0 to 5, perform the following unions using union-by-size. Show the result of each union. When sizes are the same, make the second tree a child of the first tree. Notice the finds return roots, and the union will union the roots.
union(find(0),find(1))
union(find(3),find(4))
union(find(5),find(1))
union(find(2),find(5))
union(find(3),find(2))
2) Illustrate the array for the final forest of the previous problem (note that roots are not simply -1 when using union-by-size).

Answers

1) Let's consider the set of values from 0 to 5 and perform the following unions using union-by-size. Find the result of each union where sizes are the same, make the second tree a child of the first tree. Find returns roots, and the union will union the roots.union(find(0),find(1))find(0) = 0find(1) = 1Perform union, size of 1 is smaller than the size of 0 so we make 1 the child of 0. [0] -> [-1,0] [1] -> [0,1]union(find(3),find(4))find(3) = 3find(4) = 4Perform union, size of 4 is greater than the size of 3 so we make 3 the child of 4. [0] -> [-1,0] [1] -> [0,1] [4,3]union(find(5),find(1))find(5) = 5find(1) = 1Perform union, size of 2 is smaller than the size of 0 so we make 1 the child of 0. [0] -> [-2,0] [1] -> [0,1] [4,3] [5] -> [1,5]union(find(2),find(5))find(2) = 2find(5) = 5Perform union, size of 3 is smaller than the size of 0 so we make 5 the child of 0. [0] -> [-3,0] [1] -> [0,1] [4,3] [5,2]union(find(3),find(2))find(3) = 4find(2) = 0Perform union, size of 4 is greater than the size of 3 so we make 2 the child of 3. [0] -> [-4,0] [1] -> [0,1] [4,3] [5,2]The final answer for the union of these sets will be [−4, 0, 1, 3, 2, 5] 2) The array for the final forest of the previous problem (note that roots are not simply -1 when using union-by-size) is given below:Forest Array[-4,0,1,3,2,5]

Know more about Array here:

https://brainly.com/question/13261246

#SPJ11

Virtualization is becoming the normal way to run servers in the enterprise environment. What are three reasons with details companies are adapting virtualization? Your answer should be 500 words minimal.

Answers

Companies are adapting virtualization in the enterprise environment for three main reasons: cost savings, improved flexibility and scalability, and enhanced disaster recovery and business continuity.

Cost savings: Virtualization allows companies to reduce hardware costs by consolidating multiple virtual servers onto a single physical server. This eliminates the need for purchasing and maintaining separate hardware for each server, resulting in cost savings in terms of hardware procurement, power consumption, cooling, and physical space. Additionally, virtualization enables better utilization of server resources, optimizing their efficiency and reducing overall operational costs.

Improved flexibility and scalability: Virtualization provides companies with greater flexibility and scalability in managing their IT infrastructure. With virtualization, it becomes easier to provision new servers, clone existing ones, or adjust resource allocation as needed. This allows for more efficient resource utilization, dynamic workload management, and the ability to quickly adapt to changing business requirements. Companies can scale their virtual server environment up or down based on demand, without the need for significant hardware investments or disruptions to ongoing operations.

Enhanced disaster recovery and business continuity: Virtualization offers improved disaster recovery and business continuity capabilities. By encapsulating entire server environments into virtual machines, companies can easily replicate and migrate these virtual machines to alternate physical servers or off-site locations. This enables faster and more reliable disaster recovery processes, as virtual machines can be quickly restored in the event of server failures or data center outages. Virtualization also allows for the creation of snapshots and backups of virtual machines, providing additional layers of data protection and reducing downtime in case of system failures or data corruption.

In summary, companies are adopting virtualization in the enterprise environment due to its cost-saving potential, improved flexibility and scalability, and enhanced disaster recovery and business continuity capabilities. By leveraging virtualization technologies, businesses can optimize their IT infrastructure, streamline operations, and ensure more efficient resource utilization, ultimately driving productivity and supporting their overall business objectives.

Learn more about virtualization here:

brainly.com/question/31257788

#SPJ11

(e) predicting the outcomes of tossing a (fair) pair of dice.

Answers

When tossing a pair of fair dice, there are 36 possible outcomes, as each die can land in one of six possible ways. To predict the outcomes, we can use basic probability theory.

The most common way to represent the outcomes of rolling two dice is by using a table or matrix called a probability distribution, which lists all possible outcomes along with their associated probabilities.

For example, if we label the two dice as A and B, then the probability distribution would have 6 rows and 6 columns, corresponding to the possible values of A and B. The entry in row i and column j would be the probability that A takes value i and B takes value j.

For a fair pair of dice, the probability of any particular outcome is simply the number of ways that outcome can occur divided by the total number of possible outcomes. For example, the probability of rolling a total of 7 is 6/36 = 1/6, since there are six ways to get a total of 7 (1+6, 2+5, 3+4, 4+3, 5+2, 6+1) out of the 36 possible outcomes.

By analyzing the probability distribution, we can make various predictions about the outcomes of rolling two dice. For instance, we can compute the expected value of the sum of the two dice, which is simply the sum of all possible outcomes weighted by their probabilities. In this case, the expected value of the sum turns out to be 7, which means that over many rolls of the dice, we expect the average sum to be around 7.

Learn more about tossing here:

https://brainly.com/question/30149683

#SPJ11

marc is an investigator who discovers a piece of visible data. what did marc likely then see? group of answer choices any data stored in sectors or clusters a file dragged to the windows recycle bin a file being swapped in visible ram a string of sms text messages

Answers

Based on the given options, if Marc is an investigator who discovers a piece of visible data, he likely saw a file being swapped in visible RAM.

How can this process be explained?

This refers to the process where data from the computer's memory is temporarily stored on the hard drive.

The other options, such as data stored in sectors or clusters, a file dragged to the Windows recycle bin, and a string of SMS text messages, do not necessarily indicate visible data that Marc would come across in his investigation.

Thus, the correct answer is a file being swapped in visible ram

Read more about file managers here:

https://brainly.com/question/13189758

#SPJ4

Which of the following stories can be said to be in the public domain?
A - A story that is published in a magazine without any author's name
B - A copyrighted story the author provides permission for
C - A story with more than one author
D - A copyrighted story whose copyright has expired
D - A copyrighted story whose copyright has expired
A story is considered in the public domain when its copyright has expired or has been explicitly released by the owner.

Answers

D - A copyrighted story whose copyright has expired. A story that is in the public domain is one that is not protected by copyright law and can be freely used, copied, and distributed.

This can occur in two ways:

The story's copyright has expired: Copyright protection typically lasts for a specific period of time, after which the work enters the public domain. Once a copyrighted story's copyright term has expired, it is no longer protected and can be considered in the public domain.

The author has explicitly released the story: The author of a copyrighted story can choose to release it into the public domain by waiving their copyright or using a Creative Commons license, granting permission for others to use the work without restriction.

Therefore, option D, a copyrighted story whose copyright has expired, can be said to be in the public domain. Stories without any author's name (option A), stories with more than one author (option C), and copyrighted stories with the author's permission (option B) may not necessarily be in the public domain unless the copyright has expired or the author has explicitly released it.

learn more about copyright here

https://brainly.com/question/14704862

#SPJ11

The Open Systems Interconnection (OSI) Reference Model: defines standards for many aspects of computing and communications within a network. is a generic description for how computers use multiple layers of protocol rules to communicate across a network. defines standards for wireless local area network (WLAN) communication protocols. details the advantages and disadvantages of various basic network cabling options.

Answers

Answer:

is a generic description for how computers use multiple layers of protocol rules to communicate across a network.

Explanation:

OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;

1. Physical Layer.

2. Data link Layer.

3. Network Layer.

4. Transport Layer.

5. Session Layer.

6. Presentation Layer.

7. Application Layer.

Hence, the Open Systems Interconnection (OSI) Reference Model is a generic description for how computers use multiple layers of protocol rules to communicate across a network.

Additionally, each layer has its unique functionality which is responsible for the proper functioning of the communication services.

What is the tone for The Untiming of Ben and Ruby: Episode 1

Answers

The tone of "The Untiming of Ben and Ruby: Episode 1" is suspenseful. Suspense is a literary tool that allows the reader to be anxious, curious, and fearful about the outcome of an event or character's decision. It is used in many genres of literature, such , thriller, horror, and science fiction.

Suspense can be created by several factors, including the author's use of plot, setting, characters, and language. In the case of "The Untiming of Ben and Ruby: Episode 1," the suspense is mainly created through the plot. The story is about two young people, Ben and Ruby, who get involved in a time-travel experiment that goes awry.

They end up trapped in a time loop, reliving the same day over and over again, and they must figure out how to break the cycle. The suspense comes from the fact that the reader doesn't know how the story will end. Will Ben and Ruby find a way out of the time loop.

To know more about Untiming visit:

https://brainly.com/question/32394174

#SPJ11

With ____, a resource user asks for a resource, and if it isn't found in the local resource registry, the resource locator searches for it in external locations.

Answers

With __"Resource Discovery"__, a resource user asks for a resource, and if it isn't found in the local resource registry, the resource locator searches for it in external locations.

What is "Resource Discovery"

The mechanism you're referring to is known as "Resource Discovery". Resource Discovery allows a system to locate and use resources that may be located in different areas of the network, instead of relying only on local resources.

It's particularly valuable in distributed systems where resources might be spread across different servers or locations. If the required resource is not available locally, the system will employ various algorithms and strategies to search for the resource in external or remote locations.

Read more on "Resource Discovery" hre https://brainly.com/question/29759586'

#SPJ4

use humorous and monster in a sentence.

Answers

Answer: Here are a few...

1) The monstrous elephant trampled through the jungle crushing everything in its path.

2) Because it was so monstrous, the maid often got lost in the massive home she cleaned.

3) Monstrous amounts of foods are needed to feed the hundreds of refugees who showed up at the soup kitchen.

Explanation:

I hope this helps :D

two critical factors used to distinguish experimental designs from most non-experimental designs are:

Answers

The two critical factors used to distinguish experimental designs from most non-experimental designs are:

1 Manipulation of an independent variable

2 Control over extraneous variables

Manipulation of an independent variable: In an experimental design, researchers manipulate an independent variable to observe its effect on a dependent variable. The independent variable is deliberately changed by the researcher to see if it has any impact on the outcome.

Control over extraneous variables: In an experimental design, researchers try to maintain control over extraneous variables that might affect the outcome. This is done by keeping all other variables constant or controlling them in some way. By doing this, researchers can attribute any observed changes in the dependent variable to the manipulation of the independent variable.

These two factors help ensure that any observed effects are due to the manipulated variable and not to some other factor.

Learn more about non-experimental designs here:

https://brainly.com/question/13722557

#SPJ11

which of the following addresses can not be used by an interface in the 223.1.3/29 network? check all that apply.
O a. 223.1.3.28 O b. 223.1.3.2 O c.223.1.2.6 O d. 223.1.3.16 O e. 223.1.3.6

Answers

To determine which addresses cannot be used by an interface in the 223.1.3/29 network, we need to check the available addresses within the given network range and identify any invalid addresses.

The network range 223.1.3/29 provides a total of 8 IP addresses, including the network address and the broadcast address. The valid host addresses within this network range are as follows:

223.1.3.1 (Network Address)

223.1.3.2

223.1.3.3

223.1.3.4

223.1.3.5

223.1.3.6

223.1.3.7 (Broadcast Address)

Based on the available addresses, the addresses that cannot be used by an interface in the 223.1.3/29 network are:

a. 223.1.3.28

c. 223.1.2.6

d. 223.1.3.16

Therefore, options (a), (c), and (d) are the addresses that cannot be used by an interface in the 223.1.3/29 network.

Learn more about addresses here:

https://brainly.com/question/30038929

#SPJ11

Command scripts are just a series of commands saved in a file with a .bat extension.

a. true
b. false

Answers

Command scripts are just a series of commands saved in a file with a .bat extension. This is true

How to explain the information

Command scripts, also known as batch files, are indeed a series of commands saved in a file with a .bat extension. These scripts are commonly used in Windows operating systems to automate tasks by executing a sequence of commands or instructions.

The .bat extension indicates that the file contains a batch script, which can be run by the Windows Command Prompt or by double-clicking on the file.

Learn more about file on

https://brainly.com/question/29511206

#SPJ1

what is the trend of the best fit line for the total energy e in your data? if the data is accurate, the total mechanical energy should decrease slightly. why is that?

Answers

If the trend of the best fit line for the total energy (E) in the data is decreasing, it suggests that the total mechanical energy is decreasing slightly over time. This trend is expected if the data is accurate and follows the principles of conservation of energy.

The reason for the slight decrease in total mechanical energy can be attributed to various factors, including:

1. Friction: In most real-world systems, there is usually some level of friction present. Friction converts some of the mechanical energy into other forms, such as heat or sound energy. This loss of energy leads to a decrease in the total mechanical energy over time.

2. Energy dissipation: In some systems, energy may be dissipated due to various processes like air resistance, resistance in electrical circuits, or other forms of resistance. As energy is dissipated, the total mechanical energy decreases.

3. Inefficiencies: Systems may have inherent inefficiencies that result in energy losses. These inefficiencies can be due to factors such as mechanical losses in machines, transmission losses, or losses in conversion processes. Over time, these losses accumulate, causing a decrease in total mechanical energy.

It is important to note that the decrease in total mechanical energy should be gradual and not abrupt. In an ideal situation with no external influences, the total mechanical energy would remain constant. However, in real-world scenarios, various factors contribute to the slight decrease in total mechanical energy over time.

Learn more about mechanical energy here:

https://brainly.com/question/13552918

#SPJ11

Inconsistent implementation of condition protocols refers to which threat to internal validity?

Answers

Inconsistent implementation of condition protocols refers to the threat to internal validity called Implementation Threat. The implementation threat occurs when protocols and procedures that are inconsistent across conditions occur, which can lead to inaccurate interpretations of the study's outcomes.

If the intervention is not properly implemented, then the outcomes are unlikely to reflect the intended intervention’s impact. It can be difficult to determine whether the effects of the intervention are due to the intervention itself or the way it was implemented. A common way to address implementation threats is to develop a detailed protocol that clearly describes how the intervention should be delivered across all conditions. Another approach to reduce the threat is by monitoring the implementation process throughout the study.The success of an experiment's conclusion depends on the experiment's internal validity. If the experiment has low internal validity, the results are unlikely to be valid, and researchers must not draw conclusions about the intervention's effectiveness. Researchers must use robust internal validity designs to address internal validity threats to draw valid conclusions about the intervention's impact. Internal validity is defined as the extent to which the results of an experiment can be attributed to the intervention.

To know more about threat visit:

https://brainly.com/question/32252955

#SPJ11

2. You could argue that it would be appropriate in this case to state your assessment of the blog up front but make your recommendation for action only after presenting the information about the blog. Your reasoning would be
Multiple Choice
that your boss might not read the whole report if you stated your recommendation up front.
both that you want to avoid seeming pushy and that you want to build support for your recommendation before presenting it.
that your recommendation is of little importance here.
that, given your position, it could seem pushy to make your recommendation at the beginning of the report.
that you want to build your boss’s confidence in your analysis before making your recommendation

Answers

The most appropriate reasoning in this case would be option b) Both that you want to avoid seeming pushy and that you want to build support for your recommendation before presenting it.

What is the recommendation?

You can offer a thorough comprehension of the situation by introducing details about the blog prior to expressing your evaluation and suggestion.

This tactic enables your supervisor to create their own perspective by analyzing the given data, instead of sensing as though you are asserting your own stance from the outset.

Learn more about recommendation  from

https://brainly.com/question/28798981

#SPJ4

Salim wants to add a device to a network that will send data from a computer to a printer. Which hardware component should he use?

A.
repeater
B.
modem
C.
switch
D.
bridge

Answers

It’s letter B good luck
I think person above is correct (sorry if I'm wrong I just need points)

WILL GIVE BRAINLIEST
Give several reasons why Python is such a great programming language. Explain how Python is related to flowcharts.

Consider this program:
Cost1 = input("Please enter the first expense: ")
Cost2 = input("Please enter the second expense: ")
print("Your total for both expenses was", Cost1 + Cost2)
If the user inputs “10” for the first expense and “20” for the second expense, what will the interpreter show in the final line when this program is run? If this result in not what the programmer intended, how would you explain what went wrong?

You are writing a line of code that should ask the user to input the balance of their bank account in dollars and cents. The program will then perform a multiplication problem to tell the user how much interest they can earn. Identify three errors in your line of input code and explain why they are incorrect. Include the corrected line of code in your answer. Here is the code:
1num = input(What is your balance?)

What are some kinds of comments that might be useful for a programmer to include in a program?

If you were planning how to write a program, at what point would a flowchart be helpful? At what point would pseudocode be helpful? Explain your reasoning.

Answers

Answer:

G i v e   s e v e r a l   r e a s o n s   w h y   P y t h o n   i s   s u c h  a  gr e a t   p r o g r a m m i n g   l a n g u a g e.   E x p l a i n   h o w   P y t h o n   i s        r e l a t e d   t o   f l o w c h a r t s.

P y t h o n   i s   s u c h   a   g r e a t   p r o g r a m m i n g   l a n g u a g e b e c a u s e   i t   i s   s i m p l e,   p o p u l a r,   a n d   p o w e r f u l   e n o u g h   t o   c r e a t e   s o m e   a w e s o m e   a p p s.   P y t h o n   i s   r e l a t e d   t o   f l o w c h a r t s   b e c a u s e   F l o w c h a r t   P y t h o n    i s              e s s e n t i a l l y   t h e   P y t h o n   p r o g r a m m i n g   l a n g u a g e   i n   v i s u a l   f o r m.

C o n s i d e r    t h i s   p r o g r a m :  

C o s t 1   =   i n p u t ( " P l e a s e   e n t e r   t h e   f i r s t   e x p e n s e :  "  )

C o s t 2  =   i n p u t ( " P l e a s e   e n t e r   t h e   s e c o n d                        e x p e n se: ")

p r i n t ( " Y o u r   t o t a l   f o r   b o t h   e x p e n s e s   w a s " ,   C o s t 1   +   C o s t 2 )  

I f   t h e   u s e r   i n p u t s   “ 1 0 ”   f o r   t h e   f i r s t   e x p e n s e   a n d   “ 2 0 ”   f o r   t h e   s e c o n d   e x p e n s e ,   w h a t   w i l l   t h e               i n t e r p r e t e r   s h o w   i n   t h e   f i n a l   l i n e   w h e n   t h i s             p r o g r a m  i s   r u n ?   I f   t h i s   r e s u l t   i n   n o t   w h a t   t h e   p r o g r a m m e r   i n t e n d e d ,   h o w   w o u l d   y o u   e  x p l a i n   w h a t w e n t   w r o n g ?  

Y o u   a r e   w r i t i n g   a   l i n e   o f   c o d e   t h a t   s h o u l d   a s k   t h e   u s e r   t o   i n p u t   t h e   b a l a n c e   o f   t h e i r   b a n k   a c c o u n t   i n   d o l l a r s   a n d   c e n t s .   T h e   p r o g r a m   w i l l   t h e n   p e r f o r m   a   m u l t i p l i c a t i o n   p r o b l e m   t o   t e l l   t h e   u s e r   h o w   m u c h   i n t e r e s t   t h e y   c a n   e a r n .   I d e n t i f y   t h r e e   e r r o r s   i n   y o u r   l i n e   o f   i n p u t   c o d e   a n d   e x p l a i n   w h y  t h e y   a r e   i n c o r r e c t .   I n c l u d e   t h e   c o r r e c t e d   l i n e   o f   c o d e   i n   y o u r   a n s w e r .   H e r e   i s   t h e   c o d e :  

T h e   f i r s t   e r r o r   i s   t h a t   t h e   v a r i a b l e   s t  a r t s   w i t h   a   n u m b e r ,   w h i c h   i s   a   r u l e   y o u   c a n ’ t   b r e a k ,   o r   e l s e   t h e   c o m p u t e r   w o n ’ t   k n o w   t h a t   i t ’ s   a   v a r i a b l e .   T h e   n e x t   e r r o r   i  s   t h a t   t h e y   d i d n ’ t   d e c l a r e   t h e   v a r i a b l e   a s   a   f l o a t .   T h e   f i n a l   e r r o r   i s   t h a t   t h e r e   a r e   n o   q u o t a t i o n   m a r k s   i n   t h e   p a r e n t h e s e s ,   w h i c h   a r e   n e e d e d    t o   t  e l l   t h e   c o m p u t e r   t o   o u t p u t   t h a t   o u t   t o   t h e   s c r e e n ,   o r   e l s e   i t s   g o i n g   t o   t h i n k   t h a t   y o u   w a n t   t h e   c o m p u t e r  t o   f i l l   t h a t   i n   i t s e l f .  

1 n u m = input(What is your balance?)

What are some kinds of comments that might be useful for a programmer to include in a program?

some kinds of comments that might be useful is when there is a bug, something that needs to be fixed, something that is easy to hack, and something the programmer needs to finish if the programmer released the program early.

If you were planning how to write a program, at what point would a flowchart be helpful? At what point would p s e u d o c o d e be helpful? Explain your reasoning.

A flowchart is helpful in the beginning of writing a program when you are planning what to do. The p s e u d o c o d e would be helpful before you start the coding. The reason is because flowcharts are helpful for planning out your course of action, while pseudocode helps you plan what you are going to write, so it should be right before you start coding, so you know everything that you were thinking about whilst writing the p s e u d o c o d e , and you know that if one thing doesn’t work, you still have all the previous thoughts on that line.

Explanation:

I have the same text questions so I don't want to get anything wrong. I also want to be a developer of  M i n e c r a f t , so I pay attention in my coding class.

1. explore data using cluster analysis of protein, fat, and carbs consumption.

Answers

Cluster study is a mathematical method used to group comparable objects or data points into clusters established their correspondences or dissimilarities.

What is cluster analysis?

In the framework of investigating dossier on protein, fat, and hydrogen devouring, cluster study can help identify patterns or clusters of things accompanying analogous abstinence from food tendencies.

To cluster analyze protein, fat, and carbohydrate intake data:

1. Collect data on consumption for individuals. Organize data in tabular format with individual rows and macronutrient columns. Preprocessing: Standardize data for comparable scaling. Needed to avoid one nutrient dominating. Standardization methods: z-score normalization or min-max scaling.

Learn more about cluster analysis  from

https://brainly.com/question/30429984

#SPJ4

true/false. facility automation uses internet of things (iot) to integrate automation into business functions to reduce reliance on machinery.

Answers

True. Facility automation utilizes the Internet of Things (IoT) to integrate automation into business functions and reduce dependence on machinery.

Facility automation refers to the application of advanced technologies, including IoT, to automate and optimize various processes within a facility or building. By leveraging IoT, facility automation integrates interconnected devices and systems to enhance operational efficiency, productivity, and sustainability.

The IoT plays a crucial role in facility automation by enabling the seamless connectivity and communication between different devices, sensors, and systems. Through IoT-enabled automation, businesses can monitor and control various aspects of their facilities, such as lighting, temperature, security, energy usage, and equipment maintenance.

By reducing reliance on traditional machinery and manual processes, facility automation improves operational efficiency, reduces costs, enhances safety, and allows for more effective resource management. IoT-based automation systems provide real-time data and insights, enabling businesses to make informed decisions, automate routine tasks, and optimize their operations for better performance and sustainability.

Learn more about automation here:

https://brainly.com/question/31297085

#SPJ11

use the function you created in question 6 in a select statement that returns five columns: vendorcity and the four columns returned by the function.

Answers

Assuming that the function created in question 6 is named `fn_get_num_products`, here is an example of how to use it in a select statement that returns five columns including vendorcity and the four columns returned by the function:```
SELECT vendorcity,
      fn_get_num_products(vendorid) AS total_products,
      fn_get_num_products(vendorid, 1) AS active_products,
      fn_get_num_products(vendorid, 0) AS inactive_products,
      fn_get_num_products(vendorid, NULL) AS null_products
FROM vendors;


```In the example above, the `SELECT` statement is selecting five columns: vendorcity, total_products, active_products, inactive_products, and null_products. The `fn_get_num_products` function is called four times, once for each of the four columns returned by the function.The `vendorid` parameter is passed to the function to calculate the number of products for each vendor. The second parameter is used to specify the status of the products (1 for active, 0 for inactive, NULL for all products).

Know more about SELECT here:

https://brainly.com/question/30039307

#SPJ11

In Python, a function is _____.

a group of instructions that can be used to organize a program or perform a repeated task

a value that can be passed back to the calling part of a program

a formula that pairs each x-value with a unique y-value

a value that can be passed

Answers

Answer:

a group of instructions that can be used to organize a program or perform a repeated task

Explanation:

A function is a group of commands that can be called upon with extra parameters if needed.

Example:

def foo():                          #defining this function and naming it foo

    return True                 #what is performed when foo is called on

if foo() == True:               #foo() is calling on a function named foo

   print('yes')

Implement an approximation algorithm for the Traveling Salesperson problem, run it on your system, and study it's performances using several problem instances.
in any languages and please comment code and screenshot

Answers

The Traveling Salesman Problem (TSP) is a popular problem in computer science that entails discovering the shortest route to visit a set of cities and return to the starting point. TSP is a well-known NP-hard problem, which means that the problem's complexity grows exponentially with the number of cities.Here is an implementation of an approximation algorithm for the TSP problem using Python:```
import itertools
import random
import time
import matplotlib.pyplot as plt

def distance(point1, point2):
   x1, y1 = point1
   x2, y2 = point2
   return ((x1 - x2) ** 2 + (y1 - y2) ** 2) ** 0.5

def total_distance(points):
   return sum(distance(point, points[index + 1])
              for index, point in enumerate(points[:-1]))

def traveling_salesperson(points, start=None):
   if start is None:
       start = points[0]
   return min(itertools.permutations(points), key=lambda x: total_distance([start] + list(x)))

def generate_random_points(n, seed=1):
   random.seed(seed)
   return [(random.randint(0, 1000), random.randint(0, 1000)) for _ in range(n)]

def plot(points):
   plt.plot([p[0] for p in points], [p[1] for p in points], 'bo-')
   plt.axis('scaled')
   plt.axis('off')
   plt.show()

if __name__ == '__main__':
   points = generate_random_points(10)
   print(points)
   plot(points)
   start = time.time()
   best_order = traveling_salesperson(points)
   end = time.time()
   print("time:", end - start)
   print(best_order)
   plot([points[i] for i in best_order])```

Know more about TSP here:

https://brainly.com/question/15399245

#SPJ11

Other Questions
HOW DO I FIX THIS ????!!!!! i have spent the last months trying to fix it how can i fix it please help me please please pleaseeee 5. What is the volume of the triangularprism?a) 480 cm3b) 192 cm3c) 240 cmd) 384 cm3 Your firm has net income of $276 on total sales of $1,080. Costs are $610 and depreciation is $120. The tax rate is 21 percent. The firm does not have interest expenses. What is the operating cash flow?Multiple Choice$470$350$626$396$276 what is the active form of this:The job will be done by the labourers Match the combining form ischi(o) with its closest definition. A. IliumB. IschiumC. HumpD. lamina Ans pls I dont know if Im right 13. The element with the following electron configuration [Kr] 4d105s25p2 belongs toGroup of answer choicesactinide.metal.transition element.nonmetal.lanthanide.14. Which is a physical change?Group of answer choicesKNO3 dissolves in waterA firecracker explodesPopcorn pops when placed in a microwaveA nail rustsA piece of wood is burned after what president jackson did value, what do you think was his problem with a country covered with forest PLEASE ANSWER ASAP DUE IN 2 MIN WILL GIVE BRAINLEST!!!!!!!!!!!!!!!!PLEASE ONLY ANSWER PART B Bob has the following utility function: U = F. E0.1 where F is the number of fish consumed and E is the number of eggs consumed. The price of fish is 9 and the price of eggs is 8. Bob has a weekly income of 200. Use a Lagrangian to find the optimal amounts of fish and eggs that Bob consumes in a week. Case 1 Familiarization Hard Rock Cafe-This unique restaurant chain has thrived where similar themed restaurants have disappeared. Via the videos, we get introduced to the firm's unique strategies in c Read the excerpt from "The Tell-Tale Heart".The narrator says that other people characterize him asabccalmTRUE!-nervous-very, very dreadfully nervous I hadbeen and am; but why will you say that I am mad? Thedisease had sharpened my senses-not destroyed notdulled them. Above all was the sense of hearing acute. Iheard all things in the heaven and in the earth. I heardmany things in hell. How, then, am I mad? Hearken! andobserve how healthily-how calmly I can tell you thewhole story.healthyinsanescared an important part of the third phase of the 3-x-3 writing process is __________, which involves correcting the grammar, spelling, punctuation, format, and mechanics of a message. The cost of renting a bicycle, y, forx hours can be modeled by a linearfunction. Renters pay a fixed insurancefee of $12 plus an additional cost of $10per hour, for a maximum of 6 hours.What is the range of the function for thissituation? C:3-58 Reconciling Book Income and Taxable Income. Alpha Corporation reports the following results for the current year: Net income per books (before federal income taxes) Federal income tax expense p What is the cardinality ofthe set A={a,e,i,o,u} i need help quick pls Choose two more words or phrases that help develop the claim in paragraph three that Phil did not start out well at first but eventually would find success.A)StillB)TodayC)He beganD)He also madeE)Some television networksDuck CommanderLyndon CrestfillIt is not easy to start up a business from scratch, but Phil Robertson made it look easy. There is an old saying, If you build a better mousetrap, the world will beat a path to your door. This saying turned out to be true for Phil and his love of duck hunting.Phil grew up in rural Louisiana with six brothers and sisters. His family was poor, so hunting was an important way to get food and money. As a boy, Phil was a good hunter, but he was good at other things as well. In high school, he played many sports, including football, baseball, and track. He was such a great football player that he earned a college scholarship to Louisiana Tech. After graduating from college, he went back to the woods he called home. He returned to hunting again and he realized that the duck calls (special whistles that trick ducks into coming when they hear the sound) did not work so well. He wanted a duck call that would sound just like a real duck. So, in 1972, Phil began working on his new invention, a duck call that he named the Duck Commander.At first, he did not sell many Duck Commanders. He made $8,000 during his first year, but that was not enough money to take care of his wife and four children. Still, Phil did not give up. He began the Duck Commander Company in 1973. He used his home for a factory and his family helped him make, package, and ship all the calls. He also made videos of himself explaining and showing how to use the duck calls. Some television networks saw his videos and thought that the family would make an interesting reality television show. Today, the Robertson family stars in the extremely popular reality show, Duck Dynasty. His company is now worth millions of dollars!Because of hard work and dedication, Phil turned a good idea into a great business. He also proved that there is some truth in the old build a better mousetrap saying. This question is based on the story or article on " Love is a Fallacy" 1. How did the modern setting/context of the video clarify or help you tobetter understand both the fallacies and the humor of the original story?2. How did the modern setting/context of the video make apparent anydisturbing or socially unacceptable aspects of the original story?3. What are two different fallacies unknowingly spoken by the protagonisteither in the story or in the film PRIOR to his last date with Polly that younoticed? What is the fallacy called, and how do you know that what hesaid is indeed this fallacy? 90 point for anyone to answer asap pls Which of the following methods of fossil formation is formed in dry areas due to a lack of moisture? aMummification bCasts and molds cAmber fossil dCarbonization Please help me with this