А.
is the highest education degree available at a community college.

Answers

Answer 1

Answer:

The answer is "associate".

Explanation:

The two-year post-school degree is also known as the associate degree, in which the students pursuing any of this degree, which may take as little as 2 years to complete the course, although many prefer to do it at the same rate. Its first two years of a Bachelor (fresh and sophomore years) were covered by an Associate degree.


Related Questions

3. Which of the following is called address operator?
a)*
b) &
c).
d) %

Answers

Answer:

The Ampersand Symbol (Option B)

Explanation:

A 'address of operator' specifies that a given value that is read needs to be stored at the address of 'x'.

The address operator is represented by the ampersand symbol. ( & )

Hope this helps.

Why operating system is pivotal in teaching and learning

Answers

Answer:

Without it learning and teaching cannot take place.

Explanation:

It is worthy to note that an operating system enables a computer install and run (lunch) computer programs. In a teaching environment that involves the use of computers, sending lessons to students; would mean that they have software programs that can successfully open this lessons.

In summary, an operating system is indeed pivotal in teaching and learning.

Which of the factors below is NOT a cause of online disinhibition?
O Anonymity
O Lack of nonverbal cues
Lack of tone of voice
Smartphones

Answers

Answer:

Lack of tone of voice

Explanation:

Remember, online disinhibition refers to the tendency of people to feel open in communication via the internet than on face to face conversations.

A lack of tone voice isn't categorized as a direct cause of online disinhibition because an individual can actually express himself using his tone of voice online. However, online disinhibition is caused by people's desire to be anonymous; their use of smartphones, and a lack of nonverbal cues.

which programming paradigm do programmers follow to write code for event driven applications? a. object oriented programming. b. functional c. nonprocedural. d. procedural​

Answers

Answer:

D) Procedural

Explanation:

Answer:

Object-Oriented Programming

Explanation:

GIVING BRANLIEST IFFF CORRECT James uses a database to track his school football team. Which feature in a database allows James to list only the players that didn't play in the last game? Title Filter Search Sort

Answers

Answer:

filter

Explanation:

the filter feature allows him to fetch data that only meets a certain criteria(those who didn't play in the last game)

The FILTER feature in a database allows James to list on the players that did not play in the game.

What is the filter feature in EXCEL?

The FILTER feature in Excel is used to clear out a number of statistics primarily based totally on the standards which you specify. The feature belongs to the class of Dynamic Arrays functions.

The end result is an array of values that mechanically spills into a number cells, beginning from the Cells wherein you input a formula.

Thus, The FILTER feature in a database allows James to list on the players that did not play in the game.

Learn more about FILTER feature here:

https://brainly.com/question/11866402

#SPJ2

Gary frequently types his class assignment. His ring automatically types the letter O. What is Gary using when he types?

A.Keyboard shortcut
B.Home row
C.Muscle memory
D.Windows logo

Answers

the answer would be C
The answer is C. Muscle memory


Hope this answers your question

what are 3 important reasons to reconcile bank and credit card accounts at set dates?

Answers

Answer:

To verify transactions have the correct date assigned to them.

To verify that an account balance is within its credit limit.

To verify that all transactions have been recorded for the period.

Explanation:

When you start your computer then which component works first?

Answers

Bios is normally the first software, which is used to initiate connections to the hardware and perform testing and configuration. Then the OS is detected and the whole kernel is handed off to load the OS itself.

What will be displayed after the following code executes? mystr = 'yes' yourstr = 'no' mystr += yourstr * 2 print(mystr)

Answers

Answer:

yesnono

Explanation:

mystr = 'yes'

yourstr = 'no'

mystr += yourstr * 2

mystr = "yes"yourstr * 2 = "no"+"no"yes + no+noyesnono

Diverting an attacker from accessing critical systems, collecting information about the attacker's activity and encouraging the attacker to stay on the system long enough for administrators to respond. These are all benefits of what network appliance?

Answers

Answer:

Honeypot is the correct answer

Explanation:

A computer system that is meant to mimic the likely targets of cyber attacks is called honeypot. It is used to deflect the attackers from a legitimate target and detect attacks. It also helps to gain info about how the cyber criminals operate. They have been around for decades, it works on the philosophy that instead of searching for attackers, prepare something that would attract them. It is just like cheese-baited mousetraps. Cyber criminals get attracted towards honeypots by thinking that they are legitimate targets.

If the processor has 32 address lines in its address bus; i.e. 32-bit address range, what is its address space or range; i.e. what is the smallest and largest address that can be represented

Answers

Answer:

The answer is "0 to 4294967295"

Explanation:

Given bit:

32 bits

Calculating smallest and largest bits:

In any processor, it works only on the 0 and 1 bit and it also stores 0 and 1 values. so, the smallest address in bit value is= 0 and the largest bit value can be defined as follows:

largest address value in bits:

[tex]\Longrightarrow 2^{32}-1\\\\\Longrightarrow 4294967296 -1\\\\\Longrightarrow 4294967295\\\\[/tex]

smallest address= 0

largest address = 4294967295

Append newValue to the end of vector tempReadings. Ex: If newValue = 67, then tempReadings = {53, 57, 60} becomes {53, 57, 60, 67}.
#include
#include
using namespace std;
int main() {
vector tempReadings(3);
int newValue = 0;
unsigned int i = 0;
tempReadings.at(0) = 53;
tempReadings.at(1) = 57;
tempReadings.at(2) = 60;
newValue = 67;
/* Your solution goes here */
for (i = 0; i < tempReadings.size(); ++i) {
cout << tempReadings.at(i) << " ";
}
cout << endl;
return 0;
}
2.Remove the last element from vector ticketList.
#include
#include
using namespace std;
int main() {
vector ticketList(3);
unsigned int i = 0;
ticketList.at(0) = 5;
ticketList.at(1) = 100;
ticketList.at(2) = 12;
/* Your solution goes here */
for (i = 0; i < ticketList.size(); ++i) {
cout << ticketList.at(i) << " ";
}
cout << endl;
return 0;
}
3. Assign the size of vector sensorReadings to currentSize.
#include
#include
using namespace std;
int main() {
vector sensorReadings(4);
int currentSize = 0;
sensorReadings.resize(10);
/* Your solution goes here */
cout << "Number of elements: " << currentSize << endl;
return 0;
}
4. Write a statement to print "Last mpg reading: " followed by the value of mpgTracker's last element. End with newline. Ex: If mpgTracker = {17, 19, 20}, print:
Last mpg reading: 20
#include
#include
using namespace std;
int main() {
vector mpgTracker(3);
mpgTracker.at(0) = 17;
mpgTracker.at(1) = 19;
mpgTracker.at(2) = 20;
/* Your solution goes here */
return 0;}

Answers

Answer:

Following are the code to this question:

In question 1:

tempReadings.push_back(newValue); //using array that store value in at 3 position

In question 2:

ticketList.pop_back(); //defining ticketList that uses the pop_back method to remove last insert value

In question 3:

currentSize = sensorReadings.size(); /defining currentSize variable holds the sensorReadings size value

In question 4:

cout<<"Last mpg reading: "<<mpgTracker.at(mpgTracker.size()-1)<<endl;

//using mpgTracker array with at method that prints last element value

Explanation:

please find the attachment of the questions output:

In the first question, it uses the push_back method, which assigns the value in the third position, that is "53, 57, 60, and 67 "In the second question, It uses the pop_back method, which removes the last element, that is "5 and 100"In the third question, It uses the "currentSize" variable to holds the "sensorReadings" size value, which is "10".In the fourth question, It uses the mpgTracker array with the "at" method, which prints the last element value, which is "20".

Using data from interviews with ESCO executives conducted in late 2012, this study examines the market size, growth forecasts, and industry trends in the United States for the ESCO sector.

Thus,  It uses the "currentSize" variable to holds the "sensorReadings" size value, which is "10". In the fourth question, It uses the mpgTracker array with the "at" method, which prints the last element value, which is "20".

There are numerous types of gateways that can operate at various protocol layer depths.

Application layer gateways (ALGs) are also frequently used, albeit most frequently a gateway refers to a device that translates the physical and link layers. It is best to avoid the latter because it complicates deployments and is a frequent source of error.

Thus, Using data from interviews with Gateway executives conducted in late 2012, this study examines the market size, growth Esco size and industry trends in the United States for the Gateway.

Learn more about Gateway, refer to the link:

https://brainly.com/question/30167838

#SPJ6

mplement the function fileSum. fileSum is passed in a name of a file. This function should open the file, sum all of the integers within this file, close the file, and then return the sum.If the file does not exist, this function should output an error message and then call the exit function to exit the program with an error value of 1.Please Use This Code Template To Answer the Question#include #include #include //needed for exit functionusing namespace std;// Place fileSum prototype (declaration) hereint main() {string filename;cout << "Enter the name of the input file: ";cin >> filename;cout << "Sum: " << fileSum(filename) << endl;return 0;}// Place fileSum implementation here

Answers

Answer:

Which sentence best matches the context of the word reticent as it is used in the following example?

We could talk about anything for hours. However, the moment I brought up dating, he was extremely reticent about his personal life.

Explanation:

Which sentence best matches the context of the word reticent as it is used in the following example?

We could talk about anything for hours. However, the moment I brought up dating, he was extremely reticent about his personal life.

what makes''emerging technologies'' happen and what impact will they have on individuals,society,and environment

Answers

Answer:

Please refer to the below for answer.

Explanation:

Emerging technology is a term given to the development of new technologies or improvement on existing technologies that are expected to be available in the nearest future.

Examples of emerging technologies includes but not limited to block chain, internet of things, robotics, cognitive science, artificial intelligence (AI) etc.

One of the reasons that makes emerging technology happen is the quest to improving on existing knowledge. People want to further advance their knowledge in terms of coming up with newest technologies that would make task faster and better and also address human issues. For instance, manufacturing companies make use of robotics,design, construction, and machines(robots) that perform simple repetitive tasks which ordinarily should be done by humans.

Other reasons that makes emerging technology happens are economic benefit, consumer demand and human needs, social betterment, the global community and response to social problems.

Impact that emerging technology will have on;

• Individuals. The positive effect of emerging technology is that it will create more free time for individuals in a family. Individuals can now stay connected, capture memories, access information through internet of things.

• Society. Emerging technology will enable people to have access to modern day health care services that would prevent, operate, train and improving medical conditions of people in the society.

• Environment. Before now, there have been global complains on pollution especially on vehicles and emission from industries. However, emerging technology will be addressing this negative impact of pollution from vehicles as cars that are currently being produced does not use petrol which causes pollution.

what makes ''emerging technologies'' happen is the necessity for it, the need for it in the society.

The impact they will have on individuals ,society,and environment is that it will improve areas of life such as communication, Transportation, Agriculture.

What is Emerging technologies?

Emerging technologies can be regarded as the technologies in which their development as will as practical applications are not yet realized.

Learn more about Emerging technologies at:

https://brainly.com/question/25110079

Internet radio probably uses UDP because it is a connection-less protocol and streaming media typically does not require an established connection.

a. True
b. False

Answers

Answer:

True

Explanation:

Please mark me as the brainiest

what are three ways to add receipts to quick books on line receipt capture?

Answers

Answer:

1) Forward the receipt by email to a special receipt capture email

2) You can scan, or take a picture of the receipt and upload it using the QuickBooks mobile app.

3) You can also drag and drop the image, or upload it into QuickBooks Online receipt center.

Explanation:

1) Th first process is simply done using the email address

2) On the app, tap the Menu bar with icon ≡.  Next, tap Receipt snap., and then

tap on the Receipt Camera. Yo can then snap a photo of your receipt, and tap on 'Use this photo.' Tap on done.

3) This method can be done by simply navigating on the company's website.

What will be assigned to the variable s_string after the following code executes? special = '1357 Country Ln.' s_string = special[ :4] Group of answer choices

Answers

Answer:

s_string = 1357

Explanation:

character: index

1: 0

3: 1

5: 2

7: 3

 : 4

C: 5

o: 6

u: 7

n: 8

t: 9

r: 10

y: 11

 : 12

L: 13

n: 14

. : 15

s_tring  = special[:4]

s_tring = special[0] + special[1] + special[2] + special[3]

s_string = 1357

3. How many bytes of storage space would be required to store a 400-page novel in which each page contains 3500 characters if ASCII were used? How many bytes would be required if Unicode were used? Represent the answer in MB

Answers

Answer:

A total of 79.3mb will be needed

In which situation would it be appropriate to update the motherboard drivers to fix a problem with video?

Answers

Answer:

you may need to do this if you need to play video game that may need you to update drivers

it would be appropriate to update the motherboard drivers to fix a problem with video while playing video game.

What is motherboard?

A motherboard is called as the main printed circuit board (PCB) in a computer or laptop. The motherboard is the backbone of processing in PCs.

All components and external peripherals connect through the motherboard.

Thus, the situation in which it is needed to update the motherboard drivers to fix a problem is while playing video game.

Learn more about motherboard.

https://brainly.com/question/15058737

#SPJ2

In which type of hacking does the user block access from legitimate users without actually accessing the attacked system?

Answers

Complete Question:

In which type of hacking does the user block access from legitimate users without actually accessing the attacked system?

Group of answer choices

a. Denial of service

b. Web attack

c. Session hijacking

d. None of the above

Answer:

a. Denial of service

Explanation:

Denial of service (DOS) is a type of hacking in which the user (hacker) blocks access from legitimate users without actually accessing the attacked system.

It is a type of cyber attack in which the user (an attacker or hacker) makes a system or network inaccessible to the legitimate end users temporarily or indefinitely by flooding their system with unsolicited traffic and invalid authentication requests.

A denial of service is synonymous to a shop having a single entry point being crowded by a group of people seeking into entry into the shop, thereby preventing the legitimate customers (users) from exercising their franchise.

Under a DOS attack, the system or network gets stuck while trying to locate the invalid return address that sent the authentication requests, thus disrupting and closing the connection. Some examples of a denial of service attack are ping of death, smurf attack, email bomb, ping flood, etc.

Develop a CPP program to test is an array conforms heap ordered binary tree. This program read data from cin (console) and gives an error if the last item entered violates the heap condition. Use will enter at most 7 numbers. Example runs and comments (after // ) are below. Your program does not print any comments. An output similar to Exp-3 and Exp-4 is expected.
Exp-1:
Enter a number: 65
Enter a number: 56 // this is first item (root,[1]) in the heap three. it does not violate any other item. So, no // this is third [3] number, should be less than or equal to its root ([1])
Enter a number: 45 // this is fourth number, should be less than or equal to its root ([2])
Enter a number: 61 // this is fifth number, should be less than or equal to its root ([2]). It is not, 61 > 55. The 61 violated the heap.
Exp-2:
Enter a number: 100
Enter a number: 95 1/ 95 < 100, OK
Enter a number: 76 // 76 < 100, OK
Enter a number: 58 // 58 < 95, OK
Enter a number: 66 1/ 66 < 95, OK
Enter a number: 58 // 58 < 76, OK
Enter a number: 66 // 66 < 76, OK
Exp-3:
Enter a number: -15
Enter a number: -5
-5 violated the heap.
Exp-4:
Enter a number: 45
Enter a number: 0
Enter a number: 55
55 violated the heap.

Answers

Answer:

Following are the code to this question:

#include<iostream>//import header file

using namespace std;

int main()//defining main method

{

int ar[7];//defining 1_D array that stores value      

int i,x=0,l1=1,j; //defining integer variable

for(i=0;i<7;i++)//defining for loop for input value from user ends  

{

cout<<"Enter a Number: ";//print message

cin>>ar[i];//input value in array

if(l1<=2 && i>0)//using if block that checks the array values  

{

x++;//increment the value of x by 1  

}

if(l1>2 && i>0)//using if block that checks the array values  

{

l1=l1-2;//using l1 variable that decrases the l1 value by 2  

}

j=i-x;//using j variable that holds the index of the root of the subtree

if(i>0 && ar[j]>ar[i])// use if block that checks heap condition  

{

l1++; //increment the value of l1 variable

}

if(i>0 && ar[j]<ar[i])// using the if block that violate the heap rule  

{

cout<<ar[i]<<" "<<"Violate the heap";//print message with value

break;//using break keyword  

}

}

return 0;

}

Output:

1)

Enter a Number: -15

Enter a Number: -5

-5 Violate the heap

2)

Enter a Number: 45

Enter a Number: 0

Enter a Number: 55

55 Violate the heap

Explanation:

In the above-given C++ language code, an array "ar" and other integer variables " i,x,l1, j" is declared, in which "i" variable used in the loop for input values from the user end.In this loop two, if block is defined, that checks the array values and in the first, if the block it will increment the value of x, and in the second if the block, it will decrease the l1 value by 2.In the next step, j variable is used that is the index of the root of the subtree. In the next step, another if block is used, that checks heap condition, that increment the value of l1 variable. In the, if block it violate the heap rule and print its values.

While the Internet can be a great resource, the information is not always reliable, as anyone can post information. Select one: True False

Answers

Answer: True

Explanation: Because anyone can post something and it can be non reliable

Write an INSERT statement that adds this row to the Categories table:

CategoryName: Brass
Code the INSERT statement so SQL Server automatically generates the value for the CategoryID column.

Answers

Answer:

INSERT INTO categories (CategoryName)

VALUES ('Brass Code');

Explanation:

The SQL refers to the Structured Query Language in which the data is to be designed and maintained that occurred in the relational database management system i.e it is to be used for maintaining and query the database

Now the INSERT statement should be written as follows

INSERT INTO categories (CategoryName)

VALUES ('Brass Code');

What command would you use to place the cursor in row 10 and column 15 on the screen or in a terminal window

Answers

Answer:

tput cup 10 15

Explanation:

tput is a command for command line environments in Linux distributions. tput can be used to manipulate color, text color, move the cursor and generally make the command line environment alot more readable and appealing to humans. The tput cup 10 15 is used to move the cursor 10 rows down and 15 characters right in the terminal

A direct-mapped cache holds 64KB of useful data (not including tag or control bits). Assuming that the block size is 32-byte and the address is 32-bit, find the number of bits needed for tag, index, and byte select fields of the address.

Answers

Answer:

A) Number of bits for byte = 6 bits

B) number of bits for index = 17 bits

C) number of bits for tag = 15 bits

Explanation:

Given data :

cache size = 64 kB

block size = 32 -byte

block address = 32 -bit

number of blocks in cache memory  

cache size / block size = 64 kb / 32 b = 2^11 hence the number of blocks in cache memory = 11 bits = block offset

A) Number of bits for byte

[tex]log _{2} (6)^2[/tex] = 6  bits

B) number of bits for index

block offset + byte number

= 11 + 6 = 17 bits

c ) number of bits for tag

= 32 - number of bits for index

= 32 - 17 = 15 bits

Review the given requirements using the checklist and discover possible problems with them. The following requirements are for a library system which is an interactive system providing access to a large document database and which allows the automated ordering and electronic delivery of documents to local and remote end-users. Some requirements for this system are: Req. 1 The user interface shall be html. Users shall access the system via standard web browsers such as Netscape and Internet Explorer. Req. 2 The system shall primarily an end-user system. Users shall use the system within the constraints of the permissions assigned by the administrator to identify, locate, order and receive documents. Req. 3 Users shall communicate with the system mainly via the html interface. Req. 4 User shall provide input to the system via the html interface. Req. 5 The system shall give output to the user via the html interface, email and print. The print output shall mainly be documents.

Answers

Answer:

Redundancy

Req. 1 and Req. 3 are seemed to say the same thing. We need to remove the first sentence in Req. 1

Conflict and understandability

Req. 1 states that access is through web browser while Req. 4 states that access is via html. We have to re-write the Req. 3 to make it clear that users do not actually have to write directly html to communicate with the system.

Completeness

Req. 5 states that print out will “mainly” be documents. What else might be printed? What other inputs will be produced?

Either remove mainly or clarify other print out.

What version of html or web browser is assumed in Req. 1 and Req. 3?

Explanation:

A __________ infrastructure is made available to the general public or a large industrygroup and is owned by an organization selling cloud services.

a. community cloud
b. hybrid cloud
c. public cloud
d. private cloud

Answers

[tex]\Huge{\fbox{\red{Answer:}}}[/tex]

A public cloud infrastructure is made available to the general public or a large industrygroup and is owned by an organization selling cloud services.

[tex]<font color=orange>[/tex]

a. community cloud

b. hybrid cloud

c. public cloud

d. private cloud

_________ enables customers to combine basic computing services,such as number crunching and data storage,to build highly adaptable computer systems.A) IaaSB) EAP peerC) CPD) SaaS

Answers

Answer:

The correct answer to the question is option A (IaaS)

Explanation:

IaaS (Infrastructure as a Service) can be used for data storage, backup, recovery, web hosting, and various other uses as it is cost-effective, and it also has secured data centers. It is a service delivery method by a provider for cloud computing as it enables customers to be offered the service the possibility to combine basic computing services to build and direct access to safe servers where networking can also be done. These services rendered by the providers allow users to install operating systems thereby making it possible to build highly adaptable computer systems.

SaaS (Software as a Service): Here, the service provider bears the responsibility of how the app will work as what the users do is to access the applications from running on cloud infrastructure without having to install the application on the computer.

The cloud provider (CP) as the name suggests is anybody or group of persons that provide services for operations within the cloud.

A text file has been transferred from a Windows system to a Unix system, leaving it with the wrong line termination. This mistake can be corrected by

Answers

Answer:

Text to ASCII Transfer

Explanation:

Write a program that reads the input.txt file character by character and writes the content of the input file to output.txt with capitalize each word (it means upper case the first letter of a word and lowercase remaining letters of the word)

Answers

Answer:

def case_convertfile( file_name):

    with open(" new_file","x") as file:

         file.close( )

    with open("file_name", "r") as txt_file:

     while True:

            word = txt_file.readline( )

            word_split= word.split(" ")

            for word in word_split:

                  upper_case = word.uppercase( )

                  file= open("new_file","w+")

                  file= open("new_file","a+")

                  file.write(upper_case)

     txt_file.close( )

     file.close( )

Explanation:

This python function would open an existing file with read privilege and a new file with write and append privileges read and capitalize the content of the old file and store it in the new file.

Other Questions
a transformer changes 95 v acorss the primary to 875 V acorss the secondary. If the primmary coil has 450 turns how many turns does the seconday have g Nour drove from the Dead Sea up to Amman, and her altitude changed at a constant rate. When she began driving, her altitude was 400400400 meters below sea level. When she arrived in Amman 222 hours later, her altitude was 100010001000 meters above sea level. Let yyy represent Nour's altitude (in meters) relative to sea level after xxx hours. A paint machine dispenses dye into paint cans to create different shades of paint. The amount of dye dispensed into a can is known to have a normal distribution with a mean of 5 milliliters (ml) and a standard deviation of 0.4 ml. Answer the following questions based on this information. Find the dye amount that represents the 9th percentile of the distribution. A microwave oven operates at 2.4 GHz with an intensity inside the oven of 2300 W/m2 . Part A What is the amplitude of the oscillating electric field How did Mehmet II overcome the strategic blocking of the Golden Horn by the Byzantines? what are the possible polynomial expression for dimensions of the cuboid whose volume is 12y2 + 8y -20!!!!!plz answer fast Tyler and Jamie decide to share a box of 50 candy bars. To their pleasant surprise, there are 5 extra candy bars in the box. They agree that Tyler gets at least eight more candy bars than Jamie. What is the minimum number of candy bars that Tyler gets. Can I get a step by step explanation please? Thank you! In answering the question "Which customers are most likely to click on my online ads and purchase my goods?" you are most likely to use which of the following analytic applications?A) customer profitabilityB) propensity to buyC) customer attritionD) channel optimization f(x) = -3x + 7What is f (0)? JOURNEY TO THE CENTRE OF THE EARTH: what did professor get from the havellious bookshop?why he was so much excited. On December 1, 20X1, Tigg Mortgage Co. gave Pod Corp. a $200,000, 12% loan. Pod received proceeds of $194,000 after the deduction of a $6,000 nonrefundable loan origination fee. Principal and interest are due in 60 monthly installments of $4,450, beginning January 1, 20X2. The repayments yield an effective interest rate of 12% at a present value of $200,000 and 13.4% at a present value of $194,000. What amount of accrued interest receivable should Tigg include in its December 31, 20X1, balance sheet Let A and B be any two sets. Show that:Show that (AUB)', (BUA)' = 0 Change 06:00 to 12 hour clock time using a.m. and p.m.I will mark you as brainlist g A slot machine has three slots; each will show a cherry, a lemon, a star, or a bar when spun. The player wins if all three slots show the same three items. a. How many simple events are in the sample space Evaluate the expression. *23 (12 + 6) + 8Please help Bryan decides he wants to help pay for a birthday party for his little brother at the ice rink. It cost $50 to rent the party room and then $4 for each person attending. Bryan only has $100 to spend at the party. a) What are the constraints for this situation? b) Find the domain and range for this situation. Make sure you include all values for each using correct notation. Raj was concentrating so much while working on his project plan that he was late for a meeting. When he went back to his office, he noticed his system was restarted and his project file was not updated. What advice would you provide Raj in this situation? In a zoo there are 6 orang-utans for every 3 baboons. There are 27 orang-utans and baboons altogether. How many are orang-utans? ______ costs are administrative costs related to determining an order quantity, preparing purchase invoices, inspecting goods received for quality and quantity, and moving goods for temporary storage. Please help for the 4 and 5 question in the picture above.The person answering both part of question 4 and 5 will be marked as brainliest. I promise.The subject is hindi but there is no option so I opted for biology.but pls help.