A Software Developer wants to add a new feature to an existing application operating in the Cloud, but only wants to pay for the computing time the code actually uses when it is called. Which term describes this feature of computing?

Answers

Answer 1

Answer:

that me answer ok

please mark me

Answer:

Cloud computing is the delivery of on-demand computing services -- from applications to storage and processing power -- typically over the internet and on a pay-as-you-go basis.

Rather than owning their own computing infrastructure or data centers, companies can rent access to anything from applications to storage from a cloud service provider.

One benefit of using cloud computing services is that firms can avoid the upfront cost and complexity of owning and maintaining their own IT infrastructure, and instead simply pay for what they use, when they use it.

In turn, providers of cloud computing services can benefit from significant economies of scale by delivering the same services to a wide range of customers.

Cloud computing services cover a vast range of options now, from the basics of storage, networking, and processing power through to natural language processing and artificial intelligence as well as standard office applications. Pretty much any service that doesn't require you to be physically close to the computer hardware that you are using can now be delivered via the cloud.

Explanation:

Answer 2

The term which describes this feature of computing is serverless computing.

Cloud computing can be defined as a type of computing that requires the use of shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than using local servers and hard drives.

Generally, cloud-based computing service that offer individuals and businesses a fast, effective and efficient way of providing services to their clients (customers).

Cloud computing comprises three (3) service models and these are;

Platform as a Service (PaaS). Infrastructure as a Service (IaaS). Software as a Service (SaaS).

Serverless computing can be defined as a streamlined cloud technology that is typically designed for hosting cloud-based software applications  (programs) over the internet and it requires a server operating only for a short period of time when it is needed by a software application (program).

Hence, serverless computing is a cloud computing feature that is designed to be used for the dynamic allocation of machine resources on demand by a software application (program) or service.

In this scenario, a Software Developer is adding a new feature to an existing software application (program) that is operating in the Cloud, but only wants to pay for the computing time being used when the source code is called. Thus, the term which describes this feature of computing is serverless computing because it allows a Software Developer to build and run software applications  (programs) without thinking or paying for a server.

Find more information: https://brainly.com/question/15062747


Related Questions

The diamond shape is used exclusively for
_signs.
A. School crossing
B. Yield
C. Warning
D. Regulatory

Answers

Answer is C. warning signs

The diamond shape is used exclusively for warning signs.

Which sign is a warning sign?

Diamond-shaped signs indicate warnings. Rectangular signs with a longer direction horizontal supply direction information. Pentagons characterize school zones.

The form of a diamond sign stands utilized only for warning signs (For example: cross the road ahead, end/begin divided road, merging traffic, curves, and construction warning signs).

Therefore, the correct answer is option C. Warning.

To learn more about warning signs

https://brainly.com/question/26105318

#SPJ2

Create a flowchart that assigns a counselor to a student. You need to ask a student for the first letter of his/her last name. Assign a counselor based on the following criteria:
• A through Mare assigned to Ms. Jones
• N through Z are assigned to Mr. Sanchez ​

Answers

Answer:

See attachment for flowchart

Explanation:

The explanation is as follows:

Start

Input first_letter (of student's name)

If first_letter is any of N through Z

     Assign student to Mr. Sanchez

Else

     Assign student to Ms. Jones

Print Counselor

Stop

In a forest ecosystem, which of the following is the best example of a limiting factor for a rabbit population?

Answers

Answer:

A rise in the population of predators is followed by a decrease in the population of prey.

Use the drop-down menus to complete the statements about printing Contacts. When printing a single contact, go to File and then Print; the only style available is Memo style . When printing multiple contacts, there are several styles to choose from.

Answers

Answer:

When printing a single contact, go to File and then Print; the only style available is Memo style .

When printing multiple contacts, there are several styles to choose from

Explanation:

The question has been answered (by you). I will help you with the explanation. The texts in bold in the answer section represent the answer.

The question is an illustration of Microsoft outlook.

In Microsoft outlook, the default style of printing is the memo style of printing. This is the only form of printing allowed when printing single contacts. In other words, other forms of printing cannot be selected.

However, there are several options available when multiple contacts are to be printied. Some of the printing styles are:  phone directory style, card style, medium booklet style, etc.

Answer:

1. is memo style

2. is mulitiple

Explanation:

GUITAR
An ensemble is a group of two or more musical-

chairs
chords
notes
performers

Answers

performers! an ensemble is where lots of people perform.

Match each word to its correct meaning.
visual representations of
1. clip art
information that are not text-images,
photos, symbols, diagrams, and so on
2. graphics
digital artwork that can be used in
documents

Answers

Answer:

1. Graphics.

2. Clip art.

Explanation:

1. Graphics: visual representations of information that are not text-images, photos, symbols, diagrams, and so on. Some examples of software applications used for graphics design are CorelDraw, Adobe Illustrator, Affinity Designer, Inkscape, Adobe Photoshop, etc.

Adobe Photoshop is a proprietary software application designed and developed by Adobe inc. for both Windows and MacOS operating system. It is a raster graphics editor that's typically used for imaging and graphics design. It comprises of various shape tools such as ellipse, line, polygon, triangle, custom shape and rectangle.

2. Clip art: digital artwork such as symbols and pictures that can be imported for use in documents or other software applications.

Answer: Clip art: digital artwork can be used in documents

Graphics: visual representations of information that are not text, images, photos, symbols, diagrams, and so on

Explanation: Answered it on Edg 2021

The CEO of CorpNet.xyz has hired your firm to obtain some passwords for their company. A senior IT network administrator, Oliver Lennon, is suspected of wrongdoing and suspects he is going to be fired from the company. The problem is that he changed many of the standard passwords known to only the top executives, and now he is the only one that knows them. Your company has completed the legal documents needed to protect you and the company. With the help of a CorpNet.xyz executive, you were allowed into the IT Admin's office after hours. You unplugged the keyboard from the back of the ITAdmin computer and placed a USB keylogger into the USB, then plugged the USB keyboard into the keylogger. After a week, the company executive lets you back into the IT Admin's office after hours again. In this lab, your task is to use the keylogger to recover the changed passwords as follows: Move the keyboard USB connector to a different USB port on ITAdmin. Remove the keylogger from ITAdmin. Move the consultant laptop from the Shelf to the Workspace. Plug the keylogger into the consultant laptop's USB drive. Use the SBK key combination to toggle the USB keylogger from keylogger mode to USB flash drive mode. Open the LOG.txt file and inspect the contents. Find the olennon account's password. Find the Administrator account's password. Answer the questions.

Answers

Answer:

The olennon account's password: See the attached file for this.

The Administrator account's password: 4Lm87Qde

Explanation:

Note: See the attached excel file for the olennon account's password as I was unable to save it here because I was instead getting the following message:

"Oh no! It seems that your answer contains swearwords. You can't add it!"

The olennon account's password and the Administrator account's password can be found as follows:

To see the rear of the computer, click Back from the menu bar above the computer.

Drag the USB Type A connector for the keyboard from the rear of the computer to another USB port on the machine.

Make sure the keyboard is plugged back in.

Expand System Cases on the shelf.

Add the Laptop to the Workspace by dragging it there.

To see the rear of the laptop, click Back from the menu above the laptop.

Drag the keylogger from the computer to the laptop's USB port.

Select Front from the menu above the laptop to see the front of the laptop.

Select Click to display Windows 10 on the laptop.

Toggle between keylogger and flash drive mode by pressing S + B + K.

To control what occurs with detachable drives, select Tap.

To view files, choose Open folder.

To open the file, double-click LOG.txt.

Select Answer Questions in the top right corner.

Respond to the questions.

Choose Score Lab as the option.

Therefore, we have:

The olennon account's password:

The Administrator account's password: 4Lm87Qde

When you apply _______ you insert a number slightly above the the line of text

A. Subscript
B. Underlining
C. Superscript
D. Text effects

Answers

Subscript 2020 on the edge

Can you identify one syntax error and one logic error in these lines? How do you think you could avoid making logic errors like the one in this code?

You are creating a program in which the user will input his or her age. The program will calculate the year that the user was born and will then tell the user which decade he or she was born in. Here is part of the code:if year > 1989 and year < 2000 print("You were born in the 1980s")

Answers

Answer:

(a) Syntax Error: Missing colon symbol

(b) Logic Error: The condition is wrong

Explanation:

The programming language is not stated; so, the syntax error may not be correctly identified.

Assume the programming language is Python, then the syntax error is the missing colon symbol at the end of the if statement. This is so because, Python required a colon symbol at the end of every if condition statement.

The logic error is also in the condition.

The condition states that all years later than 1989 but earlier than 2000 are 1980s. This is wrong because only years from 1980 to 1989 (inclusive) are regarded as 1980s.

if 209g of ethanol are used up in a combustion process, calculator the volume of oxygen used for the combustion at stp​

help plzz

Answers

Answer:

a) The volume of oxygen used for combustion at STP is approximately 305 dm³

b) The volume of gas released during combustion at STP is approximately 508 dm³

Explanation:

The given chemical reaction equation for the burning of ethanol in air, is presented as follows;

2CH₃CH₂OH (l) + 6O₂ (g) → 4CO₂ (g) + 6H₂O

The mass of ethanol used up in the combustion process, m = 209 g

The molar mass of ethanol, MM = 46.06844 g/mol∴

The number of moles of ethanol in the reaction, n = m/MM

∴ n = 209 g/(46.06844 g/mol) ≈ 4.537 moles

a) Given that 2 moles of ethanol, CH₃CH₂OH reacts with 6 moles of oxygen gas molecules, O₂, 4.54 moles of ethanol will react with (6/2) × 4.537 = 13.611  moles of oxygen

The volume occupied by one mole os gas at STP = 22.4 dm³

The volume occupied by the 13.611 moles of oxygen gas at STP, 'V', is given as follows;

V = 13.611 mol × 22.4 dm³/mole = 304.8864 dm³ ≈ 305 dm³

The volume occupied by the 13.611 moles of oxygen gas at STP, V = The volume of oxygen used for the combustion ≈ 305 dm³

b) The total number of moles of gases released in the reaction, is given as follows;

The total number of moles = (4.537/2) × (4 + 6) = 22.685 moles of gas

The total volume of gas released, [tex]V_T[/tex] = The volume of gas released during the combustion at STP = 22.685 moles × 22.4 dm³/mole = 508.144 dm³ ≈ 508 dm³

Cuales de estos aparatos son ejemplo de mecanización automatizacion o robotica batidora electrica , grifo de un cuarto de bño publico que se detiene al cabo de un cierto tiempo y maquina fotocopiadora digital

Answers

Answer:

La automatización es el reemplazo del trabajo humano por máquinas o computadoras y programas de computadora. El motivo es económico: la suma de trabajo y consumo de materias primas es menor después de la automatización que antes.

Las formas de automatización se pueden encontrar a nuestro alrededor. Los semáforos son operados por un sistema automatizado. La caja registradora de la tienda que paga los alimentos hace más que sumar el precio de los artículos; también es la base de un sistema de gestión de inventarios. Tan pronto como se vende un artículo, se reserva inmediatamente y se puede pedir un artículo de reemplazo.

You have copied the data highlighted in the dotted box. What would be the result if you did PASTE command at the selected cell ?

Answers

Answer:

The data would be copied over to the new box

Explanation:

Summary

In this lab, you complete a partially written C++ program that includes a function requiring multiple parameters (arguments). The program prompts the user for two numeric values. Both values should be passed to functions named calculateSum(), calculateDifference(), and calculateProduct(). The functions compute the sum of the two values, the difference between the two values, and the product of the two values. Each function should perform the appropriate computation and display the results. The source code file provided for this lab includes the variable declarations and the input statements. Comments are included in the file to help you write the remainder of the program.
Instructions

Write the C++ statements as indicated by the comments.
Execute the program by clicking the Run button at the bottom of the screen.

Grading

When you have completed your program, click the Submit button to record your score.



++// Computation.cpp - This program calculates sum, difference, and product of two values.
// Input: Interactive
// Output: Sum, difference, and product of two values.

#include
#include
void calculateSum(double, double);
void calculateDifference(double, double);
void calculateProduct(double, double);
using namespace std;

int main()
{
double value1;
double value2;

cout << "Enter first numeric value: ";
cin >> value1;
cout << "Enter second numeric value: ";
cin >> value2;

// Call calculateSum

// Call calculateDifference

// Call calculateProduct

Answers

Answer:

The functions are as follows:

void calculateSum(double n1, double n2){

   cout<<n1+n2<<endl; }

void calculateDifference(double n1, double n2){

   cout<<n1-n2<<endl; }

void calculateProduct(double n1, double n2){

   cout<<n1*n2<<endl; }

Call the functions in main using:

calculateSum(value1,value2);

calculateDifference(value1,value2);

calculateProduct(value1,value2);

Explanation:

This defines the calculateSum() function

void calculateSum(double n1, double n2){

This prints the sum

   cout<<n1+n2<<endl; }

This defines the calculateDifference() function

void calculateDifference(double n1, double n2){

This prints the difference

   cout<<n1-n2<<endl; }

This defines the calculateProduct() function

void calculateProduct(double n1, double n2){

This prints the product

   cout<<n1*n2<<endl; }

This calls each of the function

calculateSum(value1,value2);

calculateDifference(value1,value2);

calculateProduct(value1,value2);

See attachment for complete program

what are network services?​

Answers

Answer: A networking service is a low-level application that enables the network to perform more than basic functions.

how to bold words in microsoft word

Answers

Answer:

highlight what you want to bold and then press CTRL+B.

Explanation:

Hope this helped.

In which patten the modern computer work ?​

Answers

Answer:

Modern computers can perform generic sets of operations known as programs. These programs enable computers to perform a wide range of tasks.

Liam and his team developed a social networking group site for their company. They launched the site, and more than 100 users have already
joined, with the number of users growing each day. Above all else, which critical user requirement must Liam and his team meet?
ОА.
ability to access old messages posted by users
OB.
free access to the site
Ocability to upload user videos
OD.
user privacy and confidentiality issues

Answers

Answer:

D. user privacy and confidentiality issues

Explanation:

Software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.

There are seven (7) main stages in the creation of a software and these are; planning, analysis, design, development (coding), testing, implementation and execution, and maintenance.

Basically, the two (2) essential privacy concerns in the field of cybersecurity are knowing how personal data are collected and essentially how they're used by the beneficiaries or end users.

Above all else, the critical user requirement Liam and his team must meet is user privacy and confidentiality issues.

Confidentiality refers to the act of sharing an information that is expected to be kept secret, especially between the parties involved. Thus, a confidential information is a secret information that mustn't be shared with the general public.

do earthquakes ever happen in Malaysia?​

Answers

The correct answer to this open question is the following.

Although there are no options attached we can say the following.

Do earthquakes ever happen in Malaysia?

Yes, they do. And they are very frequent and high in intensity.

For instance, the Sabah earthquake in 2015.

On June 5, 2015, the region of Malaysia was hit by a strong earthquake, 6.0 of magnitude on the Ritcher scale. The telluric movement lasted 30 seconds and caused much destruction.

Experts and scientists confirm that this had been the strongest earthquake since the one presented in 1976.

which of the following is not a bus type A. Address bus B. Data bus C. Memory bus D. Control bus ​

Answers

Answer:

Answer is memory bus.

Explanation:

Answer is memory bus.

Which factors make the prevention of cyberbullying difficult? Check all that apply.
speaking out publicly that cyberbullying is a problem
disbelieving that cyberbullying causes serious harm
convincing others that cyberbullying is harmless
refusing to take responsibility to stop cyberbullying
using technology to participate in cyberbullying
collecting evidence that cyberbullying has occurred

Answers

Answer:

disbelieving that cyberbullying causes serious harm

convincing others that cyberbullying is harmless

refusing to take responsibility to stop cyberbullying

using technology to participate in cyberbullying

Explanation:

We can categorize the 6 given options into 2 categories.

(1) The factors that makes the prevention easy

(2) The factors that makes the prevention difficult

Options (a) and (f) can be categorized under 1 because when one speaks up or gather evidence when one gets cyberbullied, that means that an awareness has been created and as such, one and others would know how to prevent themselves from being cyberbullied.

However, the same cannot be said for (b), (c), (d), and (f). In fact, these 4 options contribute to the growth of cyberbullying. One must shun each of these 4 activities.

A __________________ is the amount of something that occurs in a given unit of time.

Answers

Answer:

A  system time is the amount of something that occurs in a given unit  of time.

Explanation:

What is the purpose of the green flag in the Scratch interface?
A. It opens the sprite menu.
B. It saves and shares the game.
C. It begins the program.
D. It opens the costumes palette.

Answers

Answer:

C. It begins the program.

Explanation:

# is used for single line comment and triple quotes(‘ ' ' or " " " ) are used for multiline comments. true or false

Answers

Answer:

False

Explanation:

In Python the symbol # is used for a single line comment, but it is the only way to comment anything in this language. Triple quotes are not for comments, instead they are used in order to easily implement multi line strings into your code without having to create various one-line strings. However triple quotes will never comment out the information in between the quotes. Therefore, the statement being made is ultimately false.

Which can be used to create a poll on a web page?
CSS
HTML
JavaScript
Text editor​

Answers

Answer:

HTML can be used to create a poll on a web page.

Answer:

HTML

Explanation:


3. Explain five (5) reasons why computers are so powerful.
the following software threats.​

Answers

Answer:

Software development brings your business to new heights of integration. It allows your company to be accessible from almost anywhere via smartphone or computer.

It improves sales and service. The way your customers experience your business is very important. Do you want them to provide you with positive feedback? Then you can’t avoid having an online platform to make it easier for them to reach your services and products.

It helps to implement on-the-go marketing, promoting your products at any place and any time without additional expenses and extra time needed. It doesn’t matter where your customers are. They can access your ads anytime and from anywhere.

It increases customers’ engagement. As with any other business, you probably want to have loyal customers. How should you increase the number of such customers? Work on online marketing strategies. Increase customers’ engagement through the website and application and make them always come back to you, not to your competitor.

Direct communication. Any other strategy can’t bring you an opportunity of direct communication with the customers at the same level as this one does. Direct communication with your customers is the fastest way to boost your brand.

Explanation:

News programs and documentaries are examples of?​

Answers

Answer:

A documentary film or documentary is a non-fictional motion-picture intended to "document reality, primarily for the purposes of instruction, education, or maintaining a historical record

Terry visits the website www.examplewebsite.org. What can you gather about the site from the domain?
ОА.
It is a commercial website.
OB.
The website belongs to an organization.
Ос.
The website was set up in Oregon.
OD.
The website is 100 percent original.
O E.
It is a government website.

Answers

Answer: B

Explanation: This question asks the student to consider the domain .org. The student needs to know that org is short for organization. This would point to option B. For option A to be true, the domain would need to be .com. Option C and D couldn’t be true, as there is no domain to point to these options. For option E to be true, the domain would need to be .gov.

Hope this helps! Comment below for more questions.

Ravi is writing an essay on the impact of the internet on business. Help him classify the scenarios he sees around him as positive and negative effects of the internet on business. He recently bought a second-hand camera online, which he hadn't been able to find in any store. A bookstore down the road shut down because people preferred the cheaper online bookstores. Ravi's sister complains that her boss always knows when she is late, but rarely greets her if their paths cross in office. His friend sells printed T-shirts online, storing them in his basement and promoting them on social media. One of his friend's printed T-shirts got wet and stained in the delivery truck and the buyer wrote a nasty review.

Answers

Answer: See explanation

Explanation:

Based on the options given, the positive effects of the internet on business will be:

• He recently bought a second-hand camera online, which he hadn't been able to find in any store.

• His friend sell printed T-shirts online, storing them in his basement and promoting them on social media.

The negative effects of the internet on business will be:

• A bookstore down the road shut down because people preferred the cheaper online bookstores.

• Ravi's sister complains that her boss always knows when she is late, but rarely greets her if their paths cross in office.

• One of his friend's printed T-shirts got wet and stained in the delivery truck and the buyer wrote a nasty review.

write a program to enter base and height of a triangle and print area of rectangle using Q Basic. (class8)​

Answers

Answer:................................

Cls

Input " enter the base";b

Input" enter the height ";h

A = b*h

Print" the area of triangle=" ;a

End

One of the users in your company notices some strange behavior on his PC. After describing what is being seen, you do a little research and determine that the best course of action is to update the UEFI firmware. Before performing the upgrade, if possible, which of the following is the BEST action to take?
A. Upgrade the processor
B. Password protect the system
C. Connect the computer to a UPS
D. Change the motherboard battery

Answers

Answer:

B

Explanation:

I don't know the explanation to this

The best action to take is to password protect the computer system. Hence option B is correct.

What is computer system?

Computer system is defined as a fundamental, full-featured, and operational hardware and software arrangement that includes all necessary components to implement computer performance. Computers are currently extremely significant since they are highly accurate, quick, and capable of completing a variety of jobs with ease.

Keeping your anti-virus software up to date and regularly scanning your computer for viruses is one of the most crucial tasks in maintaining your computer's efficiency and security. Always put password on the computer so that unknown person does not easily user your computer or hacker will not able to hack your computer easily.

Thus, the best action to take is to password protect the computer system. Hence option B is correct.  

To learn more about computer system, refer to the link below:

https://brainly.com/question/17206337

#SPJ5

Other Questions
What is the product? (x + 3)(2 x minus 1) 2 x squared minus 3 2 x squared + 6 x 2 x squared + 5 x minus 3 2 x squared + 6 x minus 3 Gandhi is best known as a(n) ___. What is p at the point of equilibrium, to the nearest tenth?a. 19.3b. 16.5C. 13.4d. 12.0Please select the best answer from the choices providedanswer: C The presence of many different churches in the colony of New Jersey indicated that?? Passage 1The Mother At first, she had a forbidding exterior, but her body was softer. With her eight legs, she had carefully built a den to prepare for her offspring. Nestled amongst rocks at the bottom of the sea, the mother octopus had forty clusters in her clutch, each containing about a thousand eggs. Watching the small, grape-like bunches, she tended them in her den with great care, and she never left them, not even to snatch a bit of food for herself. It was springtime, and for fifty days, she prepared for her children to be born. While she waited, she was rarely at rest because the mother continually watched over and cleaned the eggs. Sometimes, she took them in her fluid arms and held them close to her mouth, and other times, she would slowly walk around the rock the egg sacks were attached to. She lifted each delicate bunch, one at a time, and carefully cleaned it. She ate very little for nothing was in her reach. Her appetite had eventually vanished; crabs, clams, and oysters were not as important as looking after her eggs. On the day her baby octopods were born, they were the size of ladybugs. The little eggs burst open, and the little octopods came out. They did not look like their mother. Their arms were a circle of hair-like threads. She was exhausted but proud of the work she had done to take care of her little ones.Passage 2Octopus Facts Octopi, the plural of octopus, live in many different parts of the ocean. In the ocean, they prefer to live in coral reefs. Octopi have eight arms. The arms of an octopus have cups that can suck. In fact, the arms can also detect the flow of water. Most octopi have soft bodies without an internal skeleton or internal shells. They also lack a protective outer shell. The only hard part in the body of an octopus is a beak which is almost shaped like a parrot's beak. The beak helps the octopus to squeeze through narrow slits between underwater rocks. Being able to squeeze through very narrow slits between underwater rocks is very helpful when an octopus is fleeing from its enemies. An octopus usually needs be careful of other fish. Some octopi may have two fins and an internal shell. In this case, it is harder for them to squeeze into small spaces. A female octopus focuses entirely on her unhatched eggs before they hatch. A female octopus may also neglect to eat during the (roughly) one month period that she awaits her eggs to hatch. The entire month is spent taking care of her unhatched eggs. Octopi have a relatively short life span. Larger species, such as the North Pacific Giant Octopus, may live for up to five years in good conditions.How is the information in the second passage different from the information in the first passage? A. The second passage explains what an octopus looks like, while the first passage does not give such details. B. The first passage features outdated information; the second passage has current information on octopi. C. The first passage tells a story to teach the reader about octopi; the second passage uses only facts. D. The first passage focuses only on octopi mothers; the second passage focuses only on octopi food. what is the definition of the Latin word Historia give the answer in cm^2 p.s the answer is not 66 Find the equation of the line with slope m=3/5 that contains the point (5,6). In the accompanying diagram of parallelogram ABCD, m La clase de 8-23 era de estudiantes: Your answer: O inteligentes O brutos O brillantes Question 4. Select the statement that best describes the PM wave. a. Carrier phase angle changes represent the PM modulated signal, however, unlike FM and AM modulated carriers, it is not always easy to see these phase changes in the plot. b. The FM signal accurately represents the message. c. Although PM and FM techniques are classified as angular modulation techniques, they cannot be used interchangeably (i.e., modulated with FM and demodulated with PM, and visa versa). d. All statements are correct. There are two substances, 1 and 2, that diffuse through a medium. The substances have diffusion constants D1 and D2, and D1 > D2. Which substance will spread out farther over a 10 s time interval? Two methods are used to predict how many customers will call in for help in the next four days. The first method predicts the number of callers to be 23, 5, 14, and 20 for the four respective days. The second method predicts 20, 13, 14, and 20 for the four respective days. The actual number of callers turns out to be 23, 10, 15, and 19. Which method has the bigger forecast bias? a- the second methodb- both are equally biasedc- both are not biasedd- the first method I WILL MARK U BRAINLIEST IF YOU ANSWER Why does glucose and acentic acid have the same empirical formula Cubism isArt looking from different angles at the same time.O flat art on a canvas.O painting an actual or real objectO describes artwork that is clearly derived from a real object The Dulac Box plant produces 500 cypress packing boxes in two 10-hour shifts. Due to higher demand, they have decided to operate three 8-hour shifts instead with one employee. They are now able to produce 600 boxes per day. What has happened to productivity?A. Productivity has not changed.B. It has increased by 4.17 boxes/hr.C. It has increased by 25%.D. It has decreased by 8.3%. 75 percent of $82 i know the answer how do i solve helppppp a.f(x+2)b.f(x-5)c.f(x)+2d.f(x)-5 The cost of 120 PSP is Dh 15000. Find the cost of one PSP