Note: See 1 Submission Instructions for the instructions regarding images in exercise solutions. On the next page is a UML class diagram that shows several classes that are associated in various ways. This class diagram is included in the Homework Assignment 1 zip archive as an Umlet file named class-relation.urf so if you use Umlet, you can load and modify this diagram. If you are using a different UML class diagramming tool, then you will have to create the diagram from scratch. (a) Note that in Course there is 7.2 an instance variable mRoster which is an instance of Roster. When Course object is deleted, the Roster instance mRoster will also be deleted. Given that, what type of class a relationship, if any, exists between Course and Roster? If there is a relationship, modify the diagram to indicate the relationship and label each end of the relationship with a multiplicity.
(b) Note that in Roster there is an instance variable mStudents which is an ArrayList of Student objects. When a Roster object is deleted, mStudents is also deleted, but each Student object within mStudents is not deleted. Given that, what type of class relationship, if any, exists between Roster and Student. If there is a relationship, modify the diagram to indicate the relationship and label each end of the relationship with a multiplicity.
(c) What type of class relationship, if any, exists between Student and UndergradStudent? If there is a relationship, modify the diagram to indicate the relationship and label each end of the relationship with a multiplicity.
(d) What type of class relationship, if any, exists between Student and GradStudent? If there is a relationship, modify the diagram to indicate the relationship and label each end of the relationship with a multiplicity.
(e) What type of class relationship, if any, exists between UndergradStudent and GradStudent? If there is a relationship, modify the diagram to indicate the relationship and label each end of the relationship with a multiplicity.

Answers

Answer 1

Answer:

that is very very true

Explanation:


Related Questions

Create union floatingPoint with members float f, double d and long double x. Write a program that inputs values of type float, double and long double and stores the values in union variables of type union floatingPoint. Each union variable should be printed as a float, a double and a long double. Do the values always print correcly? Note The long double result will vary depending on the system (Windows, Linux, MAC) you use. So do not be concern if you are not getting the correct answer. Input must be same for all cases for comparison Enter data for type float:234.567 Breakdown of the element in the union float 234.567001 double 0.00000O long double 0.G0OO00 Breaklo n 1n heX float e000000O double 436a9127 long double 22fde0 Enter data for type double :234.567 Breakdown of the element in the union float -788598326743269380.00OGOO double 234.567000 long double 0.G00000 Breakolon 1n heX float 0 double dd2f1aa0 long double 22fde0 Enter data for type long double:

Answers

Answer:

Here the code is given as follows,

#include <stdio.h>

#include <stdlib.h>

union floatingPoint {

float floatNum;

double doubleNum;

long double longDoubleNum;

};

int main() {

union floatingPoint f;

printf("Enter data for type float: ");

scanf("%f", &f.floatNum);

printf("\nfloat %f ", f.floatNum);

printf("\ndouble %f ", f.doubleNum);

printf("\nlong double %Lf ", f.longDoubleNum);

printf("\n\nBreakdown in Hex");

printf("\nfloat in hex %x ", f.floatNum);

printf("\ndouble in hex %x ", f.doubleNum);

printf("\nlong double in hex %Lx ", f.longDoubleNum);

printf("\n\nEnter data for type double: ");

scanf("%lf", &f.doubleNum);

printf("float %f ", f.floatNum);

printf("\ndouble %f ", f.doubleNum);

printf("\nlong double %Lf ", f.longDoubleNum);

printf("\n\nBreakdown in Hex");

printf("\nfloat in hex %x ", f.floatNum);

printf("\ndouble in hex %x ", f.doubleNum);

printf("\nlong double in hex %Lx ", f.longDoubleNum);

printf("\n\nEnter data for type long double: ");

scanf("%Lf", &f.longDoubleNum);

printf("float %f ", f.floatNum);

printf("\ndouble %f ", f.doubleNum);

printf("\nlong double %Lf ", f.longDoubleNum);

printf("\n\nBreakdown in Hex");

printf("\nfloat in hex %x ", f.floatNum);

printf("\ndouble in hex %x ", f.doubleNum);

printf("\nlong double in hex %Lx ", f.longDoubleNum);

return 0;

}

Which of the following acronyms refers to a network or host based monitoring system designed to automatically alert administrators of known or suspected unauthorized activity?
A. IDS
B. AES
C. TPM
D. EFS

Answers

Answer:

Option A (IDS) is the correct choice.

Explanation:

Whenever questionable or unusual behavior seems to be detected, another alarm is sent out by network security equipment, which would be considered as Intrusion Detection System.SOC analysts as well as occurrence responders can address the nature but instead, develop a plan or take steps that are necessary to resolve it predicated on such notifications.

All other three alternatives are not related to the given query. So the above option is correct.

Create a Python dictionary that returns a list of values for each key. The key can be whatever type you want.

Design the dictionary so that it could be useful for something meaningful to you. Create at least three different items in it. Invent the dictionary yourself. Do not copy the design or items from some other source.

Next consider the invert_dict function.

def invert_dict(d):
inverse = dict()
for key in d:
val = d[key]
if val not in inverse:
inverse[val] = [key]
else:
inverse[val].append(key)
return inverse

Modify this function so that it can invert your dictionary. In particular, the function will need to turn each of the list items into separate keys in the inverted dictionary.
Run your modified invert_dict function on your dictionary. Print the original dictionary and the inverted one.
Describe what is useful about your dictionary. Then describe whether the inverted dictionary is useful or meaningful, and why.

Answers

Answer:

Explanation:

# name : [animal type, age, sex]

animal_shellter = {

 "Teddy": ["dog",4,"male"],

 "Elvis": ["dog",1,"male"],

 "Sheyla": ["dog",5,"female"],

 "Topic": ["hamster",3,"male"],

 "Kuzya": ["cat",10,"male"],

 "Misi": ["cat",8,"female"],

}

print(animal_shellter)

print("")

def invert(d):

 inverse = dict()

 for key in d:

   val = d[key]

   for item in val:

     if item not in inverse:

       inverse[item] = [key]

     else:

       inverse[item].append(key)

 return inverse  

inverted_shellter = invert(animal_shellter)

print(inverted_shellter)

Consider a short, 90-meter link, over which a sender can transmit at a rate of 420 bits/sec in both directions. Suppose that packets containing data are 320,000 bits long, and packets containing only control (e.g. ACK or handshaking) are 240 bits long. Assume that N parallel connections each get 1/ N of the link bandwidth. Now consider the HTTP protocol, and assume that each downloaded object is 300 Kbit long, and the initial downloaded object contains 6 referenced objects from the same sender.

Required:
Would parallel download via parallel instances of non-persistent HTTP make sense in this case? Now consider persistent HTTP. Doyou expect significant gains over the non-persistent case?

Answers

Please send pics and than I sent you lol I wanna wanna play with you lol but I’m gonna play play with this girl and play with me ur mommy mommy play good day bye mommy bye love.

College
START: what new information, strategies, or techniques have you learned that will increase your technology skills? Explain why its important to START doing this right away

Answers

Answer:

Read Technical Books. To improve your technical skills and knowledge, it's best to read technical books and journals. ...

Browse Online Tutorials. ...

Build-up online profile. ...

Learn new Tools. ...

Implement what you learned. ...

Enrich your skillset. ...

Try-out and Apply.

Mario is giving an informative presentation about methods for analyzing big datasets. He starts with the very basics, like what a big dataset is and why researchers would want to analyze them. The problem is that his audience consists primarily of researchers who have worked with big data before, so this information isn’t useful to them. Which key issue mentioned in the textbook did Mario fail to consider?

Answers

Answer:

Audience knowledge level

Explanation:

The Key issue that Mario failed to consider when preparing for her presentation is known as Audience knowledge level.  

Because Audience knowledge level comprises educating your audience with extensive information about the topic been presented. she actually tried in doing this but she was educating/presenting to the wrong audience ( People who are more knowledgeable than her on the topic ). she should have considered presenting a topic slightly different in order to motivate the audience.

You are the IT administrator for a small corporate network. You have recently experienced some problems with devices on the workstation in the Support Office. In this lab, your task is use Device Manager to complete the following:______.
The new network card you installed isn't working as expected (speed is only 1 Mbps). Until you can figure out what the problem is, disable the Broadcom network adapter and enable the Realtek network adapter. To make sure the network adapter has the latest drivers, update the driver for the Realtek network adapter by searching Microsoft Update. You recently updated the driver for your video card. However, the system experiences periodic crashes that you suspect are caused by the new driver. Roll back the driver to a previous version. Move the Ethernet cable to the integrated network port on the motherboard.

Answers

Answer:

I will fix it by my mind by thinking

Based on the above scenario, the steps to take is given below\

What is the management about?

The first thing is to Right-click Start and click on Device Manager and then you expand Network adapters.

Later you Disable the network adapter  and then Update the driver .

Learn more about Ethernet from

https://brainly.com/question/1637942

#SPJ2

1. Open the start file EX2019-ChallengeYourself-9-3. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor, and save it.
2. If the workbook opens in Protected View, click the Enable Editing button in the Message Bar at the top of the workbook so you can modify the workbook.
3. Use Consolidate to create a summary of real estate sales for all property types. Place the consolidated data on the Summary worksheet in cells B3: C15. Use the Average function to consolidate the data from cells B2: C14 in the Condo, Townhouse, and Single Family worksheets. Include links to the source data.
4. Import individual sales data from the tab-delimited text file Select Sales Data 2019-2020. Import the data as a table in cell A1 of the Select Sales worksheet.
5. Remove the data connection when the import is complete.
6. In the Select Sales worksheet, add data validation to restrict values in the House Type columns (cells B2: B139) to the values in the cell range named PropertyTypes. Include a drop-down list of values in the cells to assist in data correction.
7. Add the following input message to cells B2:B139: Select a property type from the list.
8. Add the following error alert to cells B2:B139: Not a valid property type.
9. Apply data validation circles to any values that violate the data validation rules you just created.
10. Add a comment to cell B1 in the Select Sales worksheet that reads: This needs to be fixed.
11. Add a hyperlink from cell B1 in the Select Sales worksheet to link to the named range (defined name) PropertyTypes. Test the link.
12. Use Flash Fill to add a new column of data to the Select Sales worksheet to display the number of bedrooms/the number of bathrooms.
a. In the Select Sales worksheet, cell F1, type the heading: BR/BA
b. Complete the column of data using this pattern in cell F2: 1 BR/1 BA
You will need to enter at least two samples in order for Flash Fill to suggest the correct autofill data. Check your work carefully.
Sales Summary 2019-2020
Number of Sales Average Selling Price
1
2
3 One BR, One BA
4 One BR, Two BA +
5 Two BR, One BA
6 Two BR, Two BA
7 Two BR, Two BA +
8 Three BR, One BA
9 Three BR, Two BA
10 Three BR, Three BA +
11 Four BR, One BA
12 Four BR, Two BA
13 Four BR, Three BA+
14 Five BR-. One BA
15 Five BR+ Two BA+
16
17
18
19
20
21
22
23
24

Answers

Answer:

Omg what is this

soooo long questionn

i am fainted

what rubbish you written how long the question is of which subject

what's your name

Programming languages categorize data into different types. Identify the characteristics that match each of the following data types.

a. Can store fractions and numbers with decimal positions
b. Is limited to values that are either true or false (represented internally as one and zero).
c. Is limited to whole numbers (counting numbers 1, 2, 3, ...)

Answers

Answer:

a) Integer data type.

b) Real data type.

c) Boolean data type.

Explanation:

a) Integer data type is limited to whole numbers (counting numbers 1, 2, 3…….).

b) Real data type can store fractions and numbers with decimal positions (such as dollar values like $10.95).

c) Boolean data type is limited to values that are either true or false (represented internally as 1 and 0 respectively).

Discuss the OSI Layer protocols application in Mobile Computing

Answers

Answer:

The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system. The OSI model characterizes computing functions into a universal set of rules and requirements in order to support interoperability between different products and software.

hope that helps you

please follow

please mark brainliest

Write a program to compare the content of AX and DX registers, if they are equal store 1 (as 8 bits) in locations with offset addresses (0020H, 0021H, ..., 0040H), otherwise leave these locations without changing.
???​

Answers

Answer:

so srry I'm very low that this question

The advantage of returning a structure type from a function when compared to returning a fundamental type is that a. the function can return multiple values b. the function can return an object c. the function doesn’t need to include a return statement d. all of the above e. a and b only

Answers

Answer:

The advantage of returning a structure type from a function when compared to returning a fundamental type is that

e. a and b only.

Explanation:

One advantage of returning a structure type from a function vis-a-vis returning a fundamental type is that the function can return multiple values.  The second advantage is that the function can return can an object.  This implies that a function in a structure type can be passed from one function to another.

What are the best websites to learn about Java Programing?

Answers

Answer:

well you can download some apps from the play store and it is easy for you to learn from there (interactive)

In the welding operations of a bicycle manufacturer, a bike frame has a long flow time. The set up for the bike frame is a 7 hour long operation. After the setup, the processing takes 6 hour(s). Finally, the bike frame waits in a storage space for 7 hours before sold. Determine the value-added percentage of the flow time for this bike frame. Round your answer to the nearest whole number for percentage and do NOT include the "%" sign in the answer. For example, if your answer is 17.7%, please answer 18. If your answer is 17.4%, please answer 17. No "%" sign. No letter. No symbols. No explanation. Just an integer number.

Answers

Answer:

Bike Frame Flow Time

The value-added percentage of the flow time for this bike frame is:

= 46.

Explanation:

a) Data and Calculations:

Bike Frame Flow Time:

Setup time = 7 hours

Processing time = 6 hours

Storage time = 7 hours

Flow time of the bike frame = 13 hours (7 + 6)

Value-added percentage of the flow time for this bike frame = 6/13 * 100

= 46%

b) Flow time represents the amount of time a bicycle frame spends in the manufacturing process from setup to end.  It is called the total processing time. Unless there is one path through the process, the flow time equals the length of the longest process path.  The storage time is not included in the flow time since it is not a manufacturing process.

Write the Java code for the calculareDiameter method.

Answers

Answer:

* Program to find diameter, circumference and area of circle.

*/

import java.util.Scanner;

public class Circle {

   public static void main(String[] args) {

       // Declare constant for PI

       final double PI = 3.141592653;

       Scanner in = new Scanner(System.in);

       /* Input radius of circle from user. */

       System.out.println("Please enter radius of the circle : ");

       int r = in.nextInt();

       /* Calculate diameter, circumference and area. */

       int d = 2 * r;

       double circumference = 2 * PI * r;

       double area = PI * r * r;

       /* Print diameter, circumference and area of circle. */

       System.out.println("Diameter of circle is : " + d);

       System.out.println("Circumference of circle is : " + circumference);

       System.out.println("Area of circle is : " + area);

   }

}

What are the differences between sequential and random files? Which one do you think is better and why?

Answers

Answer:

Sequential is better

Explanation:

Sequential is more organized while the more easier to make but less dependable one is random.

sequential is used for things such as date of birth, or where someone was born.

you can't do that with a random file.

Is" Python programming Language" really
worth studying? If yes? Give at least 10 reasons.

Answers

1. Python is a particularly lucrative programming language

2. Python is used in machine learning & artificial intelligence, fields at the cutting-edge of tech

3. Python is simply structured and easy to learn

4. Python has a really cool best friend: data science dilemma.

5. Python is versatile in terms of platform and purpose

6. Python is growing in job market demand

7. Python dives into deep learning

8. Python creates amazing graphics

9. Python supports testing in tech and has a pretty sweet library

10. There are countless free resources available to Python newbies

Microsoft office can be classified under what heading of application

Answers

Answer:

Word processing software/application

pls mark as brainliest!

Have a grt day!!!

What is the relationship between an organization’s specific architecture development process and the Six-Step Process?

Answers

Answer:

It is a method of developing architecture in various stages

Explanation:

The organization-specific architecture developmental process is a tested and repeated process for developing architecture. It made to deal with most of the systems. It describes the initial phases of development.  While the six step process is to define the desired outcomes, Endorse the process, establish the criteria and develop alternatives. Finally to document and evaluate the process.

a do-while loop that continues to prompt a user to enter a number less than 100, until the entered number is actually less than 100. End each prompt with newline Ex: For the user input 123, 395, 25, the expected output is:Enter a number (<100):Enter a number (<100):Enter a number (<100):Your number < 100 is: 25

Answers

Answer:

Explanation:

import java.util.Scanner;  

//Declare the class NumberPrompt.  

public class NumberPrompt  

{  

  public static void main(String args[])  

  {  

       /*Declare the variable of scanner class and allocate the  

       memory.*/  

       Scanner scnr = new Scanner(System.in);  

       

       //Initialize the variable userInput.  

       int userInput = 0;

       /* Your solution goes here*/

       //Start the do-while loop

       do

       {

         //Prompt the user to enter the number.

         System.out.println("Enter a number(<100)");  

         

         /*Store the number entered by the user in the

         variable userInput.*/

         userInput=scnr.nextInt();

           

       }while(userInput>=100);/*Run the do-while loop till the    

       user input is greater than 100*/  

       

       //Print the number which is less than 100.

       System.out.println("Your number <100 is "+userInput);

       return;

  }

}

Output:-

Define firewall ?with example

Answers

Explanation:

it acts as a barrier between a trusted system or network and outside connections, such as the Internet. However, a computer firewall is more of a filter than a wall, allowing trusted data to flow through it. ... For example, a basic firewall may allow traffic from all IP.

if my answer helps you than mark me as brainliest.

Answer:

hope this helps

Explanation:

Firewalls are software or hardware that work as a filtration system for the data attempting to enter your computer or network. Firewalls scan packets for malicious code or attack vectors that have already been identified as established threats.And also firewall is a network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules.

WHAT IS ONE WAY A PIVOTTABLE COULD COMBINE THE FOLLOWING DATA

Answers

Answer: You sort table data with commands that are displayed when you click a header arrow button. Hope it help's :D

OSI model layers application in mobile computing

Answers

Answer:

The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system. The OSI model characterizes computing functions into a universal set of rules and requirements in order to support interoperability between different products and software.

Hello everybody,
For the quiz questions, I tried using the circular method, but got a numeric, period or comma error?
So I tried using the solver to find the same solution I got, but when I entered it in the answer box, he always said incorrectly.
Any help would be highly appreciated and write the results here, why do I have to read the solution quiz because I was wrong? thank you.


The bisection method is being used to calculate the zero of the following function between x = 0 and x = 1.
What is the midpoint for the 3rd iteration? (The midpoint for the 1st iteration is 0.5.) Provide your answer rounded to the thousandths place.

Answers

Answer:

i don't know the answer please tell me

Type the correct answer in the box. Spell all words correctly.
Page scaling mode helps increase or reduce the size of the worksheet to fit within the set number of pages to be printed. Which option re-scales
a worksheet vertically?
To re-scale a worksheet vertically, select the number of pages in the height text box in the____group.

Answers

Answer:

Scale to fit.

Explanation:

The scale to fit group can be found in the page layout tab as it is used to deal with display of functionalities of a document and spreadsheet program. The scale to fit requires input in the width option which will dictate the width of the page in which to place the documents on. By specifying 1 for the width, this means that the document will be rescaled to fit on a single page. The automatic option may be selected for the height option which will allow the program to make an auto Decison in the shrinkage depending on the stated width value.

Compare and contrast traditional and cloud data backup methods. Assignment Requirements You are an experienced employee of the DigiFirm Investigation Company. Chris, your team leader, explains that your biggest client, Major Corporation, is evaluating how they back up their data. Chris needs you to write a report that compares traditional backup methods to those provided by a cloud service provider, including the security of cloud services versus traditional forms of on-site and off-site backup. For this assignment: 1. Research both traditional and cloud data backup methods. 2. Write a paper that compares the two. Make sure that you include the security of cloud services versus traditional forms of on-site and off-site backup. Required Resources Course textbook Internet Submission Requirements Format: Microsoft Word Font: Arial, size 12, double-space Citation Style: Follow your school's preferred style guide Length: 1-2 pages If-Assessment Checklist I researched both traditional and cloud data backup methods. I wrote a report that compares the two. I included the security of cloud services versus traditional forms of on-site and off-site backup. I organized the information appropriately and clearly. . I created a professional, well-developed report with proper documentation, grammar, spelling, and nunctuation

Answers

Answer:

Ensures all database elements are known and secured through inventory and security protocols. Catalogs databases, backups, users, and accesses as well as checks permissioning, data sovereignty, encryption, and security rules. 

Security Risk Scoring

Proprietary Risk Assessment relays the security posture of an organization's databases at-a-glance through risk scores.

 Operational Security

Discovers and mitigates internal and external threats in real time through Database Activity Monitoring plus alerting and reporting. Identifies and tracks behavior while looking for anomalous activity internally and externally.

Database Activity Monitoring

Monitors 1 to 1,000+ databases simultaneously, synthesizing internal and external activity into a unified console.

Only by covering both of these areas can organizations have defense in depth and effectively control risk.

What is a computer system

Answers

Answer:

A computer along with additional hardware and software together is called a computer system. A computer system primarily comprises a central processing unit (CPU), memory, input/output devices and storage devices. All these components function together as a single unit to deliver the desired output.

Explanation:

pls mark brainliest

Start with the following Python code.
alphabet = "abcdefghijklmnopqrstuvwxyz"
test_dups = ["zzz","dog","bookkeeper","subdermatoglyphic","subdermatoglyphics"]
test_miss = ["zzz","subdermatoglyphic","the quick brown fox jumps over the lazy dog"]
def histogram(s):
d = dict()
for c in s:
if c not in d:
d[c] = 1
else:
d[c] += 1
return d

Copy the code above into your program but write all the other code for this assignment yourself. Do not copy any code from another source.

Write a function called has_duplicates that takes a string parameter and returns True if the string has any repeated characters. Otherwise, it should return False.

Implement has_duplicates by creating a histogram using the histogram function above. Your implementation should use the counts in the histogram to decide if there are any duplicates.

Write a loop over the strings in the provided test_dups list. Print each string in the list and whether or not it has any duplicates based on the return value of has_duplicates for that string. For example, the output for "aaa" and "abc" would be the following.

aaa has duplicates
abc has no duplicates

Print a line like one of the above for each of the strings in test_dups.

Answers

Answer:

huwugsgssuaihsux h baiThatha svaadishht us

A hierarchy chart can be helpful for a. planning the functions of a program b. naming the functions of a program c. showing how the functions of a program relate to each other d. all of the above e. a and c only

Answers

Answer:

Hence the correct options are option B and option C.

Explanation:  

Hierarchy Chart means top to bottom structure 0f a function or a program or an organization.  

Planning the functions of a program means deciding beforehand that what are the functions of a program and what to try to do and when to try to, hierarchy Charts are often helpful In doing/knowing this all.

   Showing how the functions of a program relate to every other means what's the connection between two functions for instance if we have a hierarchical chart of a corporation member then we'll have the connection among the members of the team i.e., first, we'll have CEO, then Manager then team/ project lead then team members and by using hierarchical chart ready to " we will be able to identify the connection among them. during a similar way, we will have a relationship among the functions of a program using the hierarchical chart.

2.13 LAB: Branches: Leap Year
A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To account for the
difference in time, every 4 years, a leap year takes place. A leap year is when a year has 366 days: An extra day, February 29th. The
requirements for a given year to be a leap year are:
1) The year must be divisible by 4
2) If the year is a century year (1700, 1800, etc.), the year must be evenly divisible by 400
Some example leap years are 1600, 1712 and 2016.
Write a program that takes in a year and determines whether that year is a leap year.
Ex If the input is
1712
the output is
1712 13 leap year.
Ex If the nouts
1913
the outoutis
1913 not leap year.
Written is Coral Language

Answers

Answer:

integer userInput

userInput = Get next input

if userInput % 400 == 0

  Put userInput to output

  Put " is a leap year" to output

else

  if userInput % 4 == 0

     Put userInput to output

     Put " is a leap year" to output

  else

     Put userInput to output

     Put " is not a leap year" to output

Explanation:

I don't know what is so special about Coral but here we go. I couldn't find and IDE that supported Coral so I just used their Coral simulator on their website. The first if statement on line 5 determines if the number is divisible by 400. If so, the leap year is on a century year e.g 1900 1800. If not, the else statement will be executed and the second if statement will execute. If the number is divisible by 4, it is a leap year. If not, the else statement gets executed in which case the number was not a century leap year or a leap year. After that the program terminates.

Hope this helped :)  If it didn't let me know and I do my best to find out what went wrong.

Have a good day :)

Other Questions
An online retailer is looking to implement an enterprise platform. Which component of the enterprise platform will help the company capture curate and consumer customer information? When is it appropriate to use the two-sample t-methods instead of the one sample t-methods? Choose the correct answer below. A. Use the two-sample t-methods when a sample was taken from each of two populations (i.e. two groups being compared) and the population standard deviations are not known. Use the one-sample t-methods when a sample was taken from one population. B. Use the two-sample t-methods when a random sample was not taken. Use the one-sample t-methods when a random sample was taken. C. Use the two-sample t-methods when the conditions for inference using the one-sample t-methods aren't satisfied. D. Use the two-sample t-methods when the population standard deviation is known. Use the one-sample t-methods when the population standard deviation is not known. a guien le gudta musica cristiana de alex zurdo, lily godman etc I NEED HELP ON MATH PLS Any help is very much appreciated!! (: Reread the first two paragraphs of the passage.How does this opening section develop the central idea of the passage?It explains how Douglass comes to understand that white people take advantage of ignorance to keep black people enslaved.It shows that Douglass is a quick learner and sets the stage for the passage's exploration of how Douglass learns to read.It shows the mean-spirited attitude of Mr. Auld and sets the stage for the central idea: the cruelty of white slaveholders.It describes Douglass's relationship with Mr. and Mrs. Auld and introduces the central idea: Douglass's resentment of Mr. and Mrs. Auld. If Bromine has a charge of 1-, how many electrons does it have? Many Americans approved of the use of atomic weapons on Japan despite their destructive power becauseA) they believed they were justified in striking first in order to protect themselvesB) they were eager to see if this new technology was effective in preventing warsC) they believed that the atom bomb would cause no more damage than regular bombsD) they were told that it was the only certain way to defeat the militant Japanese empire Capital has diminishing returns in the Solow model, but ideas do not have diminishing returns in the Romer model because Group of answer choices capital is scarce, but new ideas are not scarce. capital is a rival object, but ideas are non-rival. capital depreciates because it is a physical object, but ideas cannot depreciate because they cannot physically break over time. capital is excludable, but ideas are non-excludable. help asap------------ Help plsYou add the same amount of money to your savings each week. At week 5 you have $45. At week 12 you have $80. How much money do you have at week 20? What changes needs to be made to sentence 15? Sam feels that students score better on math tests that take place on Fridays. The school provides Sam with the school math test average, but they cannot separate them by date taken. The school is too large for him to ask every student, so he randomly selects a sample of willing students' test scores after the next Friday's math test. He uses the method of hypothesis testing to compare the Friday scores against the true average of all scores. Frame the correct set of hypotheses for his research. Decide where the rejection region will lie. Which statement best fits with Sociocultural theory?Select one:a.Children learn because their successful attempts are positively reinforced by adults.b.We are evolutionarily prepared to learn.c.Development occurs as a result of inborn mechanisms.d.Children depend on assistance from adults and more expert peers as they tackle new challenges. Is there any way to tell the gender of a baby who has not yet been born before the mother has given birth? And is there any way to try and have a specific gender?*This is worth a lot of points due to the fact that I need to know build and sketch 2x2+7x+6) An advertiser goes to a printer and is charged $36 for 80 copies of one flyer and $46 for 242 copies of another flyer. The printer charges a fixed setup cost plus a charge for every copy of single-page flyers. Find a function that describes the cost of a printing job, if xx is the number of copies made. make a sentence which has a complex noun phrase as od Which is the king of all subjects? Did the Erie Canal make the transporting of goods faster and cheaper?