UAAR is planning to build in house software similar to Zoom Application. University Authorities contact with you in order to provide best solution with in limited time and limited resources in term of cost.
Describe the roles, Artifacts and activities, keeping in view Scrum process model.
Compare and contract your answer with scrum over XP for development of above mention system. Justify your answer with the help of strong reasons, why you choose scrum model over XP model. How scrum is more productive for project management. Furthermore, highlight the shortcoming of XP model.

Answers

Answer 1

Answer:

Following are the answer to this question:

Explanation:

If working to develop Zoom-like house software, its best solution is now in a limited period of time even with effectively reduced assets;  

Evaluate all roles in preparation  

Create a "Pool Draw"  

Choose a singular set of resources.  

Utilize Time Recording.  

Concentrate on assignments and project objectives.  

An object, in which by-product of the development in the software. It's created for the development of even a software program. It could include database schemas, illustrations, configuration screenplays-the list just goes on.  

All development activities of Scrum are composed with one or several groups from a lineout, each containing four ruck roles:  

Holder of the drug  

ScrumMaster and Master  

Equipment for development.  

Owner of the drug

It is the motivating core of the product marketing idea, that Keeps transparent the vision about what the team member is trying to seek so that to accomplish as well as interacts to all of the other members, the project manager is responsible for the success of the way to solve being formed or retained.  

ScrumMaster   It operates as a mentor and providing guidance throughout the development phase, it takes a leadership position in the abolishment with impediments that also impact employee productivity and therefore have no ability to control the team, but the roles of both the project team or program manager are not quite the same thing. It works as a leader instead of the management team.  

Equipe for development

The Scrum characterizes the design team as a diverse, multi-functional community of individuals who design, construct as well as evaluate the application of those who want.  

In this usually 5 to 9 individuals; one's representatives should be able to make quality responsive applications collaboratively.  

It is a framework that operates along with teams. It is often seen as agile project management as well as explains a set of conferences, techniques, and roles that also assist individuals to organize as well as complete their employees together.  The multidisciplinary team from Scrum means that a person should take a feature from idea to completion.

Scrum and XP differences:  

Its team members in Scrum usually operate in the various weeks with one month-long incarnation. The XP teams generally work in incarnations which are either one two weeklong.  Scrum doesn't write a prescription the certain project management; XP seems to do.  Scrum may not make access to other their sprints. XP teams are far more receptive to intervention inside of their repetitions.

Related Questions

What will be displayed after the following code executes? mystr = 'yes' yourstr = 'no' mystr += yourstr * 2 print(mystr)

Answers

Answer:

yesnono

Explanation:

mystr = 'yes'

yourstr = 'no'

mystr += yourstr * 2

mystr = "yes"yourstr * 2 = "no"+"no"yes + no+noyesnono

A direct-mapped cache holds 64KB of useful data (not including tag or control bits). Assuming that the block size is 32-byte and the address is 32-bit, find the number of bits needed for tag, index, and byte select fields of the address.

Answers

Answer:

A) Number of bits for byte = 6 bits

B) number of bits for index = 17 bits

C) number of bits for tag = 15 bits

Explanation:

Given data :

cache size = 64 kB

block size = 32 -byte

block address = 32 -bit

number of blocks in cache memory  

cache size / block size = 64 kb / 32 b = 2^11 hence the number of blocks in cache memory = 11 bits = block offset

A) Number of bits for byte

[tex]log _{2} (6)^2[/tex] = 6  bits

B) number of bits for index

block offset + byte number

= 11 + 6 = 17 bits

c ) number of bits for tag

= 32 - number of bits for index

= 32 - 17 = 15 bits

A text file has been transferred from a Windows system to a Unix system, leaving it with the wrong line termination. This mistake can be corrected by

Answers

Answer:

Text to ASCII Transfer

Explanation:

Why operating system is pivotal in teaching and learning

Answers

Answer:

Without it learning and teaching cannot take place.

Explanation:

It is worthy to note that an operating system enables a computer install and run (lunch) computer programs. In a teaching environment that involves the use of computers, sending lessons to students; would mean that they have software programs that can successfully open this lessons.

In summary, an operating system is indeed pivotal in teaching and learning.

g Write a method that accepts a String object as an argument and displays its contents backward. For instance, if the string argument is "gravity" the method should display -"ytivarg". Demonstrate the method in a program that asks the user to input a string and then passes it to the method.

Answers

Answer:

The program written in C++ is as follows; (See Explanation Section for explanation)

#include <iostream>

using namespace std;

void revstring(string word)

{

   string  stringreverse = "";

   for(int i = word.length() - 1; i>=0; i--)

 {

     stringreverse+=word[i];

 }

 cout<<stringreverse;

}

int main()

{

 string user_input;

 cout << "Enter a string:  ";

 getline (std::cin, user_input);

 getstring(user_input);

 return 0;

}

Explanation:

The method starts here

void getstring(string word)

{

This line initializes a string variable to an empty string

   string  stringreverse = "";

This iteration iterates through the character of the user input from the last to the first

   for(int i = word.length() - 1; i>=0; i--)   {

     stringreverse+=word[i];

 }

This line prints the reversed string

 cout<<stringreverse;

}

The main method starts here

int main()

{

This line declares a string variable for user input

 string user_input;

This line prompts the user for input

 cout << "Enter a string:  ";

This line gets user input

 getline (std::cin, user_input);

This line passes the input string to the method

 revstring(user_input);

 return 0;

}

Select the Stats Worksheet. Enter simple formulas in B3 and B4 to pull through the calculated Total Expenditure and Total Net from the Data worksheet (cells X2 and Y2). If you have done it correctly the pie chart should now show how income is proportioned between expenditure and net. QUESTION: According to the pie chart, what percentage of Income is made up by Expenditure?

Answers

Answer:

62.49

Explanation:

How can technology efforts be reconciled to improve hazard/disaster preparedness, response, and mitigation to insure systems sustainability, data integrity, and supply chain protection?

Answers

Answer:

Prediction

With regard to preparedness for hazard/disaster, technology such as AI are being explored to see how they can help to predict natural disaster.

If there is a breakthrough in this space, it will drastically reduce the negative impact of natural disasters such as floods and earthquakes as people will become ready to respond to them and mitigate their effects where possible.

In agriculture, there are factors which come together to bring about flooding. Flooding is one of the major disasters which cripples entire value chains. With a potential threat anticipated or predicted by AI, businesses can invest in technologies that can help protect the farms, farmland and other resources critical to such a supply chain.

AI-powered technologies that provide prediction services often combine this advanced computing prowess with the ability to process big data.

Technology can reach places that are unreachable by humans

AI-powered robots will soon become the norm.

Presently there are self-learning and self instructing robots powered by Artificial Intelligence that have applications in warfare, manufacturing, deepsea diving and intelligence gathering, and transportation. It is not out of place to predict that in the next decade, scientists would have perfected rescue robots that can go into very unstable terrain that have been damaged by flood or earthquake and attempt a rescue of lives and property at a scale that has never been possible before.

Connectivity  

Connectivity helps people access to aid, resources that are critical for survival, transmission and receipt of life--saving information etc. CISCO has successfully used its technology called TacOps (short for Tactical Operations) successfully 45 times on over 5 continents.

Cheers!    

The fact that the speed of a vehicle is lower than the prescribed limits shall relieve the driver from the duty to decrease speed when approaching and crossing an intersection. True or false

Answers

Explanation:

the answer is false ........

The fact that the speed of a vehicle is lower than the prescribed limits shall relieve the driver from the duty to decrease speed when approaching and crossing an intersection is not true.

What is intersection in the traffic rules?

An intersection serves as the point where many lanes cross on the road which is a point where driver is required to follow the traffic rules.

However, the above statement is not true because , a driver can decide not  decrease speed when approaching and crossing an intersection, even though it is a punishable offense in traffic rules.

Read more on traffic rules here: https://brainly.com/question/1071840

#SPJ2

Strong emotions can interfere with your ability to
A. make wise decisions.
B. think and reason.
C. judge risks.
D. all of the above

Answers

All of the above

All emotions cloud judgement, but anger is the worst

Hope this helps ♥︎

Strong emotions can interfere with your ability to make wise decisions, think and reason, and judge risk. The correct option is (D).

Strong emotions can indeed interfere with a person's ability to make wise decisions, think clearly and reason logically, and accurately judge risks.

Emotions have the potential to cloud judgment, bias perception, and impede rational thinking, which can impact decision-making processes.

Therefore, Strong emotions can interfere with your ability to make wise decisions, think and reason, and judge risk. The correct option is (D).

To know more about the emotions:

https://brainly.com/question/14587591

#SPJ4

mplement the function fileSum. fileSum is passed in a name of a file. This function should open the file, sum all of the integers within this file, close the file, and then return the sum.If the file does not exist, this function should output an error message and then call the exit function to exit the program with an error value of 1.Please Use This Code Template To Answer the Question#include #include #include //needed for exit functionusing namespace std;// Place fileSum prototype (declaration) hereint main() {string filename;cout << "Enter the name of the input file: ";cin >> filename;cout << "Sum: " << fileSum(filename) << endl;return 0;}// Place fileSum implementation here

Answers

Answer:

Which sentence best matches the context of the word reticent as it is used in the following example?

We could talk about anything for hours. However, the moment I brought up dating, he was extremely reticent about his personal life.

Explanation:

Which sentence best matches the context of the word reticent as it is used in the following example?

We could talk about anything for hours. However, the moment I brought up dating, he was extremely reticent about his personal life.

You have a Nano Server named Nano1. Which cmdlet should you use to identify whether the DNS Server role is installed on Nano1

Answers

Answer:

The correct solution will be "Get-Package".

Explanation:

The accreditation property defines a domain as well as client initials with computer authorizations for executing commands. Mostly on the virtual device, the argument ScriptBlock executes the Get-Package cmdlet. This order obtains from some kind of special introductory commercial software downloaded on either the user's computer.

Internet radio probably uses UDP because it is a connection-less protocol and streaming media typically does not require an established connection.

a. True
b. False

Answers

Answer:

True

Explanation:

Please mark me as the brainiest

What is resource Management in Wireless Communication ? Explain its Advantages?

Answers

Answer:

Resource management is the system level transmission cellular networks and wireless communication.

Explanation:

Wireless communication is the process to continue to the address for faster response time,to the resource management.

Transmission is the provided by that more utilization and wireless resources available,and to discovered data.

Wireless communication system to demand the larger bandwidth and transmission using development to the system.

Wireless communication resources management the larger bandwidth and reliable transmission consumed all the system layer.

Resource management techniques tool are used in a preliminary concepts or mathematical tools,and average limited power battery.

Resource management are they necessary mathematical and fundamental tools are used in wireless communication.

Wireless communication in the provide that wireless industry in a wireless communication.

Most keyboards today are arranged in a(n) _______ layout.

Answers

Answer:

QWERTY

Explanation:

The QWERTY keyboard arrangement was invented back when typewriters were used, and they needed a keyboard layout that wouldn't jam the letters.

Today, QWERTY is the most commonly used keyboard layout.

Hope this helped!

CHALLENGE 7.1.1: Initialize a list. ACTIVITY Initialize the list short.names with strings 'Gus', Bob, and 'Ann'. Sample output for the given program Gus Bob Ann 1 short_names- Your solution goes here 2 # print names 4 print(short_names[0]) 5 print(short names [11) 6 print(short_names[2])

Answers

Answer:

short_names = ["Gus", "Bob", "Ann"]

print(short_names[0])

print(short_names[1])

print(short_names[2])

Explanation:

There are some typos in your code. In addition to the missing part of the code, I corrected the typos.

First of all, initialize the list called short_names. The list starts with "[" and ends with "]". Between those, there are must be the names (Since each name is a string, they must be written between "" and there must be a semicolon between each name)

Then, you can print each name by writing the name of the list and the index of the names between brackets (Index implies the position of the element and it starts with 0)

when an object is passed as a non-reference pointer parametor to a method, modifiying the members of that object from

Answers

Answer:

"this" keyword representing the class object itself.

Explanation:

Object-oriented programming concept emphasizes on using blueprints representing the structure of a data collection type to continuously create an instance of that data structure. The instance of that object is called a class object. It is used in database management systems to populate the database.

Functions defined in the class objects are called methods and are used specifically by the class instance to modify the data content of the class object defined.

When a member of a class is referenced in the class, it can be accessed with the "this" keyword. At an instance of the class object, the variable holding the object should be called to get the class content because of the "this" keyword binding the instance of the object to the method.

While interoperability and unrestricted connectivity is an important trend in networking, the reality is that many diverse systems with different hardware and software exist. Programming that serves to "glue together" or mediate between two separate and usually already existing programs is known as:

Answers

Answer:

Middleware

Explanation:

In today's technology like networking, software development, web development, etc, there is a need for connectivity. The problem at hand is the variation of the tech brands which results in the difference in operating systems, applications, and connectivity protocols. This problem is solved with the introduction of Middleware.

Middleware is the solution to conflicting software applications, interconnectivity between various tech platforms. It promotes cross-platform interactions.

What type of function is being performed when a router screens packets based on information in the packet header

Answers

Answer:

"Router screening" is the correct option.

Explanation:

A router that philters packets like a firewall. For certain instances, the whole firewall system is such a single scanning router.Often connected to a network stage as well as a container-filter firewall has been the scanning router firewall. This rather firewall operates by filtering protocol characteristics from received packets.

So that the above seems to be the correct approach.

The readline method reads text until an end of line symbol is encountered, how is an end of line character represented

Answers

Answer:

\n

Explanation:

readline() method is used to read one line from a file. It returns that line from the file.    

This line from the file is returned as a string. This string contains a \n at the end which is called a new line character.

So the readline method reads text until an end of line symbol is encountered, and this end of line character is represented by \n.

For example if the file "abc.txt" contains the lines:

Welcome to abc file.

This file is for demonstrating how read line works.

Consider the following code:

f = open("abc.txt", "r")  #opens the file in read mode

print(f.readline()) # read one line from file and displays it

The output is:

Welcome to abc file.    

The readline() method reads one line and the print method displays that line.                        

3. How many bytes of storage space would be required to store a 400-page novel in which each page contains 3500 characters if ASCII were used? How many bytes would be required if Unicode were used? Represent the answer in MB

Answers

Answer:

A total of 79.3mb will be needed

Show using a cross-product construction that the class of regular languages is closed under set difference. You do not need an inductive proof, but you should convincingly explain why your construction works.

Answers

Answer:

The class definition for Javascript:

var Class = {

      arguments of the class object are initialized here;

}

This class definition for Python:

class "class_name"( object ):

      def __init__(self, arguments are passed are and initialized after the closing parenthesis)

Explanation:

Object-oriented programming languages are vital tools in creating data structures that are meant to be changeable, unindexed but directly accessible knowing the key value, and has unique membership.

This clearly is an adoption of the set data structure rule in creating a data structure blueprint that can be instantiated anytime in the code.

Question 16
Which of the following may not be used when securing a wireless connection? (select multiple answers where appropriate)
WEP
VPN tunnelling
Open Access Point
WPA2
WPA2
Nahan nah​

Answers

Answer:

wpa2 wep

Explanation:

wpa2 wep multiple choices

When working with the instruction LAHF, the lower eight bits of the EFLAGS register will wind up getting moved into the

Answers

hellohellohellohello

2- (8 point) Write a program using the instructions below. Assume that integers are stored in 4 bytes. a) Define an array of type int called apples with five elements, and initialize the elements to the even integers from 2 to 10. b) Define a pointer aPtr that points to a variable of type int. c) Print the elements of array values using a for statement. d) Write two separate statements that assign the starting address of the array to pointer variable aPtr. e) What physical address is aPtr pointing to? f) Print the elements of array values using pointer/offset notation. g) What address is referenced by aPtr + 3? What value is stored at that location? h) Assuming aPtr points to apples[4], what address is referenced by aPtr -= 4? What value is stored at that location?

Answers

Answer:

a)  

int apples [5] = {2, 4, 6, 8, 10};

b)

int *aPtr   //this is the pointer to int

Another way to attach a pointer to a an int variable that already exists:

int * aPtr;

int var;

aPtr = &var;

c)

for (int i = 0; i < size; i++){

       cout << values[i] << endl;    }

d)  

   aPtr = values;

   aPtr = &values[0];    

both  the statements are equivalent

e)

If its referring to the part d) then the address is:

cout<<aPtr;

f)

     for (int i = 0; i < size; ++i) {

            cout<<*(vPtr + i)<<endl;    }

g)

   cout << (aPtr + 3) << endl;  // address referenced by aPtr + 3

   cout << *(aPtr + 3) << endl; // value stored at that location

This value stored at location is 8

h)

    aPtr = &apples[4];

    aPtr -= 4;

    cout<<aPtr<<endl;

    cout<<*aPtr<<endl;  

Explanation:        

a)

int apples [5] = {2, 4, 6, 8, 10};

In this statement the array names is apples, the size of the array is specified in square brackets. so the size is 5. The type of array apples is int this means it can store integer elements. The values or elements of the array apples are even integers from 2 to 10. So the elements of array are:

apples[0] = 2

apples[1] = 4

apples[2] = 6

apples[3] = 8

apples[4] = 10

b)

In this statement int *aPtr  

The int* here is used to make the pointer aPtr points to integer object. Data type the pointer is pointing to is int. The asterisk symbol used with in makes this variable aPtr a pointer.

If there already exists an int type variable i.e. var and we want the pointer to point to that variable then declare an int type pointer aPtr and aPtr = &var; assigns the address of variable var to aPtr.

int * aPtr;

int var;

aPtr = &var;

c)

The complete program is:

int size= 5;

int values[size] = {2,4,6,8,10};

for (int i = 0; i < size; i++){

       cout << values[i] << endl; }

The size of array is 5. The name of array is values. The elements of array are 2,4,6,8,10.

To print each element of the values array using array subscript notation, the variable i is initialized to 0, because array index starts at 0. The cout statement inside body of loop prints the element at 0-th index i.e. the first element of values array at first iteration. Then i is incremented by 1 each time the loop iterates, and this loop continues to execute until the value of i get greater of equal to the size i.e. 5 of values array.

The output is:

2

4

6

8

10

d)

aPtr = values;

This statement assigns the first element in values array to pointer aPtr. Here values is the address of the first element of the array.

aPtr = &values[0];    

In this statement &values[0] is the starting address of the array values to which is assigned to aPtr. Note that the values[0] is the first element of the array values.

e)

Since &values[0] is the starting address of the array values to which is assigned to aPtr. So this address is the physical address of the starting of the array. If referring to the part d) then use this statement to print physical address is aPtr pointing to

cout<<aPtr;

This is basically the starting address of the array values to which is assigned to aPtr.

The output:

0x7fff697e1810                

f)

i variable represents offset and corresponds directly to the array index.

name of the pointer i.e. vPtr references the array

So the statement (vPtr + i) means pointer vPtr that references to array values plus the offset i array index that is to be referenced. This statement gives the address of i-th element of values array. In order to get the value of the i-th element of values array, dereference operator * is used.  It returns an ith value equivalent to the address the vPtr + i is pointing to. So the output is:

2

3

6

8

10

g)

values[0] is stored at 1002500

aPtr + 3 refers to values[3],

An integer is 4 bytes long,

So the address that is referenced by aPtr + 3 is

1002500 + 3 * 4 = 1002512

values[3] is basically the element of values array at 3rd index which is the 4th element of the array so the value stored at that referred location  is 8.

h)

Given that aPtr points to apples[4], so the address stored in aPtr is

1002500 + 4 * 4 = 1002516

aPtr -= 4  is equivalent to aPtr = aPtr - 4

The above statement decrements aPtr by 4 elements of apples array, so the new value is:

1002516 - 4 * 4 = 1002500

This is the address of first element of apples array i.e 2.

Now

cout<<aPtr<<endl; statement prints the address  referenced by aPtr -= 4 which is 1002500  

cout<<*aPtr<<endl;  statement prints the value is stored at that location which is 2.

Write an INSERT statement that adds this row to the Categories table:

CategoryName: Brass
Code the INSERT statement so SQL Server automatically generates the value for the CategoryID column.

Answers

Answer:

INSERT INTO categories (CategoryName)

VALUES ('Brass Code');

Explanation:

The SQL refers to the Structured Query Language in which the data is to be designed and maintained that occurred in the relational database management system i.e it is to be used for maintaining and query the database

Now the INSERT statement should be written as follows

INSERT INTO categories (CategoryName)

VALUES ('Brass Code');

A device driver would ordinarily be written in :__________
a. machine language
b. assembly language
c. a platform-independent language, such as Java
d. an application-oriented language

Answers

Answer: Assembly language

Explanation:

A device driver is a computer program that is in charge of the operation or the controls of a device attached to a computer.

device driver would ordinarily be written in an assembly language. Assembly language is a low-level symbolic code that is converted by an assembler. It is typically designed for a particular type of processor.

Given the following code: public class Test { public static void main(String[] args) { Map map = new HashMap(); map.put("123", "John Smith"); map.put("111", "George Smith"); map.put("123", "Steve Yao"); map.put("222", "Steve Yao"); } } Which statement is correct?

Answers

Answer:

There are no statements in the question, so I explained the whole code.

Explanation:

A map consists of key - value pairs. The put method allows you to insert values in the map. The first parameter in the put method is the key, and the second one is the value. Also, the keys must be unique.

For example, map.put("123", "John Smith");   -> key = 123, value = John Smith

Even though the key 123 is set to John Smith at the beginning, it will have the updated value Steve Yao at the end. That is because the keys are unique.

Note that the key 222 also has Steve Yao for the value, that is totally acceptable.

Cloud computing gives you the ability to expand and reduce resources according to your specific service requirement.

a. True
b. False

Answers

Answer:

a. True

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

In Computer science, one of the most essential characteristics or advantages of cloud computing is rapid elasticity.

By rapid elasticity, it simply means that cloud computing gives you the ability to expand and reduce resources according to your specific service requirement because resources such as servers can be used to execute a particular task and after completion, these resources can then be released or reduced.

Some of the examples of cloud computing are Google Slides, Google Drive, Dropbox, OneDrive etc.

Given an array of integers check if it is possible to partition the array into some number of subsequences of length k each, such that:
Each element in the array occurs in exactly one subsequence
For each subsequence, all numbers are distinct
Elements in the array having the same value must be in different subsequences
If it is possible to partition the array into subsequences while satisfying the above conditions, return "Yes", else return "No". A subsequence is formed by removing 0 or more elements from the array without changing the order of the elements that remain. For example, the subsequences of [1, 2, 3] are D. [1], [2], [3]. [1, 2], [2, 3], [1, 3], [1, 2, 3]
Example
k = 2.
numbers [1, 2, 3, 4]
The array can be partitioned with elements (1, 2) as the first subsequence, and elements [3, 4] as the next subsequence. Therefore return "Yes"
Example 2 k 3
numbers [1, 2, 2, 3]
There is no way to partition the array into subsequences such that all subsequences are of length 3 and each element in the array occurs in exactly one subsequence. Therefore return "No".
Function Description
Complete the function partitionArray in the editor below. The function has to return one string denoting the answer.
partitionArray has the following parameters:
int k an integer
int numbers[n]: an array of integers
Constraints
1 sns 105
1 s ks n
1 s numbers[] 105
class Result
*Complete the 'partitionArray' function below.
The function is expected to return a STRING
The function accepts following parameters:
1. INTEGER k
2. INTEGER ARRAY numbers
public static String partitionArray (int k, List public class Solution

Answers

Answer:

Explanation:

Using Python as our programming language

code:

def partitionArray(A,k):

flag=0

if not A and k == 1:

return "Yes"

if k > len(A) or len(A)%len(A):

return "No"

flag+=1

cnt = {i:A.count(i) for i in A}

if len(A)//k < max(cnt.values()):

return "No"

flag+=1

if(flag==0):

return "Yes"

k=int(input("k= "))

n=int(input("n= "))

print("A= ")

A=list(map(int,input().split()))[:n]

print(partitionArray(A,k))

Code Screenshot:-

If the processor has 32 address lines in its address bus; i.e. 32-bit address range, what is its address space or range; i.e. what is the smallest and largest address that can be represented

Answers

Answer:

The answer is "0 to 4294967295"

Explanation:

Given bit:

32 bits

Calculating smallest and largest bits:

In any processor, it works only on the 0 and 1 bit and it also stores 0 and 1 values. so, the smallest address in bit value is= 0 and the largest bit value can be defined as follows:

largest address value in bits:

[tex]\Longrightarrow 2^{32}-1\\\\\Longrightarrow 4294967296 -1\\\\\Longrightarrow 4294967295\\\\[/tex]

smallest address= 0

largest address = 4294967295

Other Questions
I REALLY need help with these 3 questions plz!!!! Busch Company has these obligations at December 31. For each obligation, indicate whether it should be classified as a current liability, long-term liability, or both. (a) A note payable for $100,000 due in 2 years. select a balance sheet section (b) A 10-year mortgage payable of $200,000 payable in ten $20,000 annual payments. select a balance sheet section (c) Interest payable of $15,000 on the mortgage. select a balance sheet section (d) Accounts payable of $60,000. select a balance sheet section Solve x2 + 9x + 8 = 0 by completing the square. What are the solutions?O (1.-8)O (1.8)O (-1-8) Which event would appear first on a time line? Rome was founded. Much of Rome burned. The Colosseum was built. Rome split into two empires. HELPPPP NNOWWWWWW PLEASEEE PLEASE HELP FAST The object distance for a convex lens is 15.0 cm, and the image distance is 5.0 cm. The height of the object is 9.0 cm. What is the height of the image? 1. The first stage of stellar formation is the assembly (or formation) of a_______ . 2. Stars form in clouds. 3. When a cloud collapses it into smaller and smaller pieces till those pieces reach stellar masses. 4. As the density increases, the fragments become_______ , which________ the temperature of the cloud and inhibits further fragmentation. 5. The _______then condense into rotating globs of gas that serve as stellar embryos. 6. During this stage the surface temperature_______ and luminosity_________ despite decreasing size. 7. The central temperature and pressure increase as the potential energy is converted to energy due to contraction. ternary operators of computerplease explain. The use of DNA in the process of classifying organisms is known as What is the correct alternate hypothesis if the pilots' average gain score due to alcohol is indicated in the hypothesis statement by where is plassey and how did it get its name? What do you think is the most valuable for immigrants to understand in order to become productive and law-abiding citizens of the United States? WILL GIVE 50 POINTS TO BRAINLIEST In the triangles, Line segment B C is-congruent-to line segment D E and Line segment A C is-congruent-to line segment F E. Triangles A B C and F D E are shown. The lengths of sides A C and F E are congruent. The lengths of sides B C and D E are congruent. If m Angle C is greater than m Angle E, then Line segment A B is ________ Line segment D F. Congruent to longer than shorter than the same length as o help create these gradients, there are a series of capillaries, branching from the peritubular capillaries and associated with the loop of Henle, collectively called the Leia o trecho abaixo da crnica "Blecaute", de Paula Pimenta: 01 - Aponte o fato que levou a cronista a escrever a crnica sobre o tema "blecaute": * 1 ponto a) A pergunta feita pelo professor de violo clssico sobre a eletricidade. B) O blecaute demorado na aula de msica. C) A comodidade proporcionada pela eletricidade. D) O retorno da luz na aula de msica. I want to travel to a country . should I take my sister or my best friend ? g The company plans a 4-for-1 stock split. How many shares will you own and what will the share price be after the stock split? On the following number line, two rational numbers are graphed. Represent the two numbers as fractions (or mixed numbers) in lowest terms, and write two different expressions to represent the difference between them. Then, find the difference, showing all of your work. The points (-6,-4) and (3,5) are the endpoints of the diameter of a circle. Find the length of the radius of the circle.The length of the radius is a(Round to the nearest hundredth as needed.) Due to the side-effects of industrialization, Roosevelt passed many conservation efforts, such as:A. The 17th AmendmentB. The Sierra ClubC. The Federal Employers Liability ActD. The Clayton Antitrust Act CAN SOMEONE HELP ME PLEASE ITS INTEGRATED SCIENCE AND I AM STUCK