At which level of decision making are information systems are used to obtain aggregate summaries of trends and projections of the future?

Answers

Answer 1

At Executive level of decision making are information systems are used to obtain aggregate summaries of trends and projections of the future.

What is the executive level of decision making?

It is known to be the stage at where executives are said to be fully involved or engaged in some key areas of decision making.

Here, there is the exchange of information, reviewing of data, bringing up new  ideas, evaluating alternatives, and others.

Therefore, At Executive level of decision making are information systems are used to obtain aggregate summaries of trends and projections of the future.

Learn more about decision making  from

https://brainly.com/question/1249089

#SPJ1


Related Questions

A _____ row is added to the query design grid when the totals button is clicked.

Answers

A total row is added to the query design grid when the totals button is clicked.

What is query design in MS Access?

A query is known to be one that can be either a form of a request for data results obtained from a given  database or for work or function on the data, or for both.

Note that a query can be a tool that helps to give you a result to a simple question, carry out  calculations, join  data from a lot of tables, add, alter , or delete data from a database.

Therefore, A total row is added to the query design grid when the totals button is clicked.

Learn more about query design from

https://brainly.com/question/27755787

#SPJ1

System software is usually divided into two categories: operating systems and ____ programs.

Answers

Answer:

Utility

Explanation:

The physical things that hold digitized information such as books and songs are called?

Answers

The physical things that hold digitized information such as books and songs are called Digital Media.

What is digital media and its importance?

Digital media are known to be any kind of device that is said to make use of  technology such as the use of the internet and other forms of electronic devices to make content, for example audio and video, websites, as well as social media things.

Note that the use of  digital media is seen as any kind  of content that needs to use of electronic devices to make, share and view that given media.

Hence, The physical things that hold digitized information such as books and songs are called Digital Media.

Learn more about Digital Media from

https://brainly.com/question/3653791

#SPJ1

Suppose we compute a depth-first search tree rooted at u and obtain a tree t that includes all nodes of g.

Answers

G is a tree, per node has a special path from the root. So, both BFS and DFS have the exact tree, and the tree is the exact as G.

What are DFS and BFS?

An algorithm for navigating or examining tree or graph data structures is called depth-first search. The algorithm moves as far as it can along each branch before turning around, starting at the root node.

The breadth-first search strategy can be used to look for a node in a tree data structure that has a specific property. Before moving on to the nodes at the next depth level, it begins at the root of the tree and investigates every node there.

First, we reveal that G exists a tree when both BFS-tree and DFS-tree are exact.

If G and T are not exact, then there should exist a border e(u, v) in G, that does not belong to T.

In such a case:

- in the DFS tree, one of u or v, should be a prototype of the other.

- in the BFS tree, u and v can differ by only one level.

Since, both DFS-tree and BFS-tree are the very tree T,

it follows that one of u and v should be a prototype of the other and they can discuss by only one party.

This means that the border joining them must be in T.

So, there can not be any limits in G which are not in T.

In the two-part of evidence:

Since G is a tree, per node has a special path from the root. So, both BFS and DFS have the exact tree, and the tree is the exact as G.

The complete question is:

We have a connected graph G = (V, E), and a specific vertex u ∈ V.

Suppose we compute a depth-first search tree rooted at u, and obtain a tree T that includes all nodes of G.

Suppose we then compute a breadth-first search tree rooted at u, and obtain the same tree T.

Prove that G = T. (In other words, if T is both a depth-first search tree and a breadth-first search tree rooted at u, then G cannot contain any edges that do not belong to T.)

To learn more about  DFS and BFS, refer to:

https://brainly.com/question/13014003

#SPJ4

Suppose a new CPU reduces the voltage by 20% and reduces the frequency by 40%, while having the same capacitive load as the old CPU, how much power savings would be achieved compared with the old CPU?

Answers

Quad-core processors range from 95 to 140 watts, whereas standard CPUs need 65 to 85 watts.

What function does a central processing unit (CPU) serve?The CPU is the computer's "brain," housing all the electronics needed to process input, store data, and output results.Software Programmes that describe which data to process and in what order make constant demands on the CPU.The CPU processes every command that a computer's hardware and software send to it.For instance, the CPU processed the instructions needed for your computer's web browser to open and display this web page.The CPU is frequently described as the brain of the computer. The processing of data is what the CPU does.The CPU handles calculations, sorting, and searching tasks.Quad-core processors range from 95 to 140 watts, whereas standard CPUs need 65 to 85 watts.

To learn more about CPU, refer to:

https://brainly.com/question/26991245

#SPJ4

Describe the excel spreadsheet you would set up to calculate the joule- thompson coefficient from the experimental observations.

Answers

To calculate the Joule-Thompson coefficient from experimental observations, I would set up an Excel spreadsheet with the following columns:

Temperature (K): This column would list the temperatures at which the experimental observations were made.

Pressure (Pa): This column would list the pressures at which the experimental observations were made.

Volume (m3): This column would list the volume of gas observed at each temperature and pressure.

Joule-Thompson coefficient (K/Pa): This column would list the calculated Joule-Thompson coefficient at each temperature and pressure.

To calculate the coefficient, I would use the following formula:

Joule-Thompson coefficient = (Temperature / Pressure) * (Volume / Temperature)

This spreadsheet would allow me to quickly and easily calculate the coefficient from the experimental observations.

Learn more on spreadsheet here:

https://brainly.com/question/25863198

#SPJ4

_____ often function as standards or procedures to be used when configuring or maintaining systems. a. eisps b. essps c. syssps d. issps

Answers

SysSPs often function as standards or procedures to be used when configuring or maintaining systems.

What is the purpose of system-specific security policy?

System-specific security are known to be policies that is said to be based on the information security policies of a specific systems.

Note that System-Specific Security Policy, SysSP, is seen as a kind of a policy that is said to often functions as a form of  instructions or procedures that are known to be used in the  configuring of systems.

Therefore, based on the above, SysSPs often function as standards or procedures to be used when configuring or maintaining systems.

Learn more about Policy from

https://brainly.com/question/14897020

#SPJ1

what is polling in python and what is active variable??

Answers

Answer:

Polling is a powerful python utility used to wait for a function to return a certain expected condition.An active variable is a variable that is manipulated by the investigator.

Explanation:

A wireless channel is ____________.
a) an example of an ad-hoc network.
b) a portion of a frequency band.
c) a point-to-point wireless connection.
d) a collision domain.

Answers

A wireless channel is: b) a portion of a frequency band.

What is wi-fi?

Wi-Fi can be defined as a wireless network technology that is designed and developed to avail end users and network devices such as computer systems, mobile devices, router and switches, to communicate with one another over the Internet or through an active network connection.

In Computer technology and networking, the global system for mobile communication (GSM) and the wireless channel is typically designed and developed to operates at the following bands of frequencies (frequency band):

850 MHz900 MHz1800 MHz1900 MHz2.4 GHz3.6 GHz4.9 GHz5 GHz5.9 GHz6 GHz 60 GHz

Read more on frequency bands here: brainly.com/question/19097094

#SPJ1

____ technology uses digital signaling in which the cable carries only one channel of digital data.

Answers

Baseband coaxial technology uses digital signaling in which the cable carries only one channel of digital data.

What is a Baseband coaxial cable?

A baseband coaxial cable is known to be one that is used in networking.

It helps to send a single signal at a  given time and this is known to be done at a very high speed.

Note that a broadband coaxial cable can help to send or  transmit a lot of simultaneous signals via the use of different frequencies.

Therefore, Baseband coaxial technology uses digital signaling in which the cable carries only one channel of digital data.

Learn more about Network from

https://brainly.com/question/8118353
#SPJ1

I really do need help asap

Answers

The third one.

Explanation:

The first answer is missing colons after the "if-else" clauses.

The second answer is missing quotes inside the print statements.

The fourth answer is missing indentation (which results in a syntax error in Python).

The​ ______ class limit is the smallest value within the class and the​ ______ class limit is the largest value within the class.

Answers

The​ lower class limit is the smallest value within the class and the​ upper class limit is the largest value within the class.

Class limits in a frequency distribution denote the least and greatest possible data values for each class. There is a lower class limit and an upper class limit for each class in a frequency distribution. Lower class limit: The smallest data value that can be a member of a class.

In order to acquire class limits in inclusive form, subtract 0.5 from the lower limit and add 0.5 to the upper limit. As a result, the inclusive form of the class limits for the 10–20 class interval is 9.5–20.5. Class size is the distinction between a class interval's true upper limit and true lower limit.

Learn more about class limit:

https://brainly.com/question/24701109

#SPJ4

what is a constructor in java? a constructor is something that holds the private state of an instance. a constructor allows us to create a new instance of a class, usually initializing instance variables. a constructor is a method with instructions on how to use a class. a constructor is a syntax rule in java for placing curly brackets.

Answers

Answer:

A constructor allows us to create a new instance of a class, usually initializing instance variables.

Explanation:

When a new object is created, the constructor is called. A constructor can be used to set initial values for object attributes.

If you suspect a computer is infected with a virus and you are ready to upgrade from windows 8 to windows 10, what is your best practice?

Answers

The best practice is to scan the computer for malware and then upgrade.

What is an Operating System?

An operating system (OS) is the software that handles all of the other application programs in a computer after being loaded into the machine by a boot program. The application programs interact with the operating system by requesting services via a predefined application program interface (API).

If you suspect a computer is infected with a virus and you are ready to upgrade from Windows 8 to Windows 10, then the best practice is to scan the computer for malware and then upgrade.

Hence, the best practice is to scan the computer for malware and then upgrade.

Learn more about Operating System here:

https://brainly.com/question/6689423

#SPJ1

Consider this sequence of bits: 1000111001011011 0011100010001110 1010101100101111 0110010000010110 1011100011000111 what is true about this binary data?

Answers

The true statement about this binary data is that: C. This sequence of bits might represent positive, negative, or fractional numbers.

What is binary encoding?

Binary encoding can be defined as a standard technique that is designed and developed to convert data in plain text (source alphabets) to a form that is easily used by different operating systems (OS), especially through the use of a binary digit (bit) or two-symbol system.

What is a numerical data?

A numerical data is also referred to as a quantitative data and it can be defined as a data set that is primarily expressed in numbers only, which can either be positive, negative, or fractional numbers. This ultimately implies that, a numerical data refers to a data set consisting of numbers rather than words.

In this context, we can reasonably infer and logically deduce that the true statement about this binary data is that this sequence of binary digits might represent positive, negative, or fractional numbers.

Read more on binary digits here: https://brainly.com/question/16612919

#SPJ1

Complete Question:

Consider this sequence of bits:

1000111001011011

0011100010001110

1010101100101111

0110010000010110

1011100011000111

What is true about this binary data?

A. This sequence of bits might represent positive numbers and fractional numbers, but it could not represent any negative numbers.

B. This sequence of bits might represent positive and negative numbers, but it could not represent any fractional numbers.

C. This sequence of bits might represent positive, negative, or fractional numbers.

D. This sequence of bits might represent positive numbers, but it could not represent any negative or fractional numbers.

What word is used today to refer to network-connected hardware devices?
a. client
b. endpoint
c. device
d. host

Answers

endpoint is the word used today to refer to network-connected hardware devices.

An endpoint is a network-connected hardware device, such as a computer, printer or smartphone. Today, the term endpoint is used to refer to any device that can be connected to a network.

Endpoints are important because they are the devices that users interact with when they access a network. For example, when you log into a website, you are using an endpoint (your computer) to connect to a server.

Endpoints can be either physical or virtual. Physical endpoints are actual hardware devices, while virtual endpoints are software-based and run on top of physical hardware.

Most endpoint security solutions focus on physical devices, but as more and more devices become virtual, it's important to consider security for both physical and virtual endpoints.

Learn more on endpoints here:

https://brainly.com/question/28221902

#SPJ4

The central organizing tenant of the file-oriented approach is to store data related to.

Answers

The central organizing tenant of the file-oriented approach is to store data related to: D. a specific program.

What is data?

Data can be defined as a representation of factual instructions (information) in a formalized and structured manner, especially as a series of binary digits (bits) that are used on computer systems in a business organization for day-to-day activities.

What is DBMS?

DBMS is an abbreviation for database management system and it can be defined as a collection of software programs (applications) that enable various computer users to create, store, modify, migrate (transfer), retrieve and manage data in a relational database.

In database management system (DBMS), a file-oriented approach to storage is designed and developed to create the required files in sets when a business organization sells its products or services. This ultimately implies that, there is an independent relationship between each file with respect to the other files in storage and software program.

Read more on file-oriented approach here: https://brainly.com/question/14531687

#SPJ1

Complete Question:

The central organizing tenant of the file-oriented approach is to store data related to

A an entity

B a business division

C a transaction cycle

D a specific program

describe at least five ways in which Information Technology can help students studying subject other than computing ​

Answers

Answer:

‘Computer Science’ and ‘information technology’ are completely different subjects. Information Technology (IT) is-

(i) the study,

(ii) design,

(iii) development,

(iv) implementation, and

(v) support or management

of computer-based information systems, particularly software applications and computer hardware.

Information Technology (IT) deals with the use of electronic computers and computer software to-

(i) convert,

(ii) store,

(iii) protect,

(iv) process,

(v) transmit, and

(vi) securely retrieve information.

Shortly, information technology (IT) itself means learning to use technology in business or in studies of some subject matter using technology.

Hence, IT could help students studying subjects other than computing with the above mentioned points considered.

_____ session mode connects the host to a guest vm using rdp and allows cutting and pasting between the machines.

Answers

Enhanced session mode connects the host to a guest vm using RDP and allows cutting and pasting between the machines.

If you've ever used remote desktop to connect to a Windows guest VM, you know that it can be a little tricky to transfer files between the host and guest. Fortunately, there's a feature called enhanced session mode that makes it a breeze.

Enhanced session mode connects the host to a guest vm using RDP and allows cutting and pasting between the machines. This makes it super easy to transfer files between the host and guest, and also makes it possible to use local devices like printers and scanners from within the guest.

To use enhanced session mode, simply connect to your guest VM using RDP and then click the "Enable enhanced session mode" button. Once you do that, you'll be able to use all of your host's devices from within the guest.

Learn more on enhanced session mode here:

https://brainly.com/question/14488447

#SPJ4

What Is Classification of Computers?

Answers

Answer:

Explanation:Sr.No.

Type

Specifications

1

PC (Personal Computer) or Micro-Computers

It is a single user computer system having a moderately powerful microprocessor. It is termed as a computer that is equipped microprocessor as its CPU.

2

Workstation

It is also a single user computer system, similar to the personal computer, however, has a more powerful microprocessor.

3

Mini-Computer

It is a multi-user computer system, capable of supporting hundreds of users simultaneously.

4

Main Frame

It is a multi-user computer system, capable of supporting hundreds of users simultaneously. Software technology is different from minicomputer.

5

Super-Computer

It is an extremely fast computer, which can execute hundreds of millions of instructions per second.

Which internet explorer security feature restricts the browsing session information that can be tracked by external third-party websites and applications?

Answers

Tracking protection internet explorer security feature restricts the browsing session information that can be tracked by external third-party websites and applications

The internet can be a dangerous place, and it's important to take steps to protect your privacy. One way to do this is to enable tracking protection in your web browser.

Tracking protection is a security feature that restricts the information that can be tracked by external websites and applications. This means that your browsing session will be more private, and your data will be less likely to be collected and used without your consent.

To enable tracking protection in Internet Explorer, go to the Tools menu and select Internet Options. On the Privacy tab, click the Tracking Protection button. You can then choose to enable tracking protection for all websites, or only for certain websites that you trust.

Enabling tracking protection can help to keep your data safe and your privacy protected. So if you're concerned about online privacy, be sure to enable this feature in your web browser.

Learn more on internet explorer here:

https://brainly.com/question/28431103

#SPJ4

What does the -m switch do when used with the useradd command? type useradd -h or useradd --help at the prompt to answer the question.

Answers

Regardless of the system settings, the home directory is not created when the -m switch is used with the useradd command.

What is the useradd option?

Linux and other Unix-like operating systems employ a low-level programme called "useradd" to add or create user accounts. The useradd command is quite similar to "adducer," which is essentially just a symbolic link to it. In order to add users to a system, a low-level utility called useradd is utilized.

The majority of the time, adduser is preferable because it is more user-friendly. Before using useradd to create new accounts, review your documentation because your operating system might have a slightly different version.

Hence,  Regardless of the system settings, the home directory is not created when the -m switch is used with the useradd command.

To learn more about useradd, refer to:

https://brainly.com/question/24290640

#SPJ4

Electronic courts (e-courts) may also be referred to as _______.
a. web courthouses
b. computer courts
c. virtual courthouses
d. network courts
e. digital courthouses

Answers

Electronic courts (e-courts) may also be referred to as  c. virtual courthouses

What are virtual courts?

Virtual Courts is known to be the idea that is known to be aimed at removing the presence of litigant or any form of lawyer in the court as well as for adjudication of cases that is made on a virtual platform.

Note that this concept is one that has changed so that it can efficiently utilize court resources as well as  provide litigants.

Therefore, Electronic courts (e-courts) may also be referred to as  c. virtual courthouses

Learn more about courthouses from

https://brainly.com/question/18228641

#SPJ1

Spear-phishing is when hackers search for and use personal data to directly target a person in a phishing email. of the following, which would provide the most credibility in a spear-phishing email?

Answers

Of the aforementioned, the option which provides the most credibility in a spear-phishing email is: C. knowing a recent store that you shopped at.

What is social engineering?

Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security through cyber attacks.

Basically, social engineering refers to a manipulative cyber attack strategy or technique that involves the deploying deceptive and malicious activities on unsuspecting victims, in order to gain unauthorized access to their confidential or private information for fraud-related purposes.

Generally, cyber attacks often require long periods of planning and intelligence gathering to lay the groundwork. Also, some examples of social engineering attacks include the following:

VishingPretextingPhishingQuid pro quoBaitingTailgatingWater-holingSpear phishing

Of the aforementioned, the option which provides the most credibility in a spear-phishing email is "knowing a recent store that you shopped at." because it included an information of interest to the target.

Read more on spear-phishing here: https://brainly.com/question/24156548

#SPJ1

Complete Question:

Spear-phishing is when hackers search for and use personal data to directly target a person in a phishing email. Of the following, which would provide the most credibility in a spear-phishing email?

A.Knowing your full name

B.Knowing your hobbies

C.Knowing a recent store that you shopped at

D. Knowing your address

Facility automation uses internet of things (iot) to integrate automation into business functions to reduce reliance on machinery. True or false

Answers

Facility automation uses internet of things (iot) to integrate automation into business functions to reduce reliance on machinery is a true statement.

How is IoT used in automation?

The Internet of Things (IoT) is known to be one of the main driving factor that is said to have brought a lot of power which has helped in the  enabling of the growth as well as the development of industrial automation systems.

Note that IoT that is said to be used along with computer automation controls can be able to aid one to streamline industrial systems as well as improve data automation, with the aim of deleting errors and inefficiencies of  people.

Therefore, Facility automation uses internet of things (iot) to integrate automation into business functions to reduce reliance on machinery is a true statement.

Learn more about internet of things from

https://brainly.com/question/19995128
#SPJ1

Maintaining a detailed study log that identifies the interviews making phones calls. True or false

Answers

Maintaining a detailed study log that identifies the interviews making phones calls is a false statement.

What are the interviews?

An interview is known to be a kind of a structured form of a conversation and it is seen as the one where one participant is known to be asking the questions, and the other is said to be providing the answers.

In carrying out an interview, there is no need keeping tab  of the phone calls made because it is irrelevant.

Note that this is seen in common parlance as a word called "interview" and as such it can be called a one-on-one conversation that tends to exist between an interviewer and that of an interviewee.

Maintaining a detailed study log that identifies the interviews making phones calls is a false statement as it is not necessary.

Learn more about interviews from

https://brainly.com/question/8846894

#SPJ1

A _____ is an example of a systems program.
a. command interpreter
b. web browser
c. database system
d. programming ide

Answers

Command interpreter is an example of system porgram. In this question the correct option is a i.e Command interpreter

A software that is part of operating systems is known as a system program. System programs provide a platform to other programs or software. Command interpreter is one such example of system programs. Unlike graphical user interface (GUI) based programs, command interpreter handles and processes text commands entered by users or other programs.

Command interpreter provides an interface between users and computers. MS-DOS is an example of a command interpreter. Experienced and advanced users prefer to use command interpreters as they give fast and direct access to operating systems.

Why other options (b, c, and d) are not correct is explained briefly below:

Web browser: It is an application software to access the World Wide Web.Database system: It is a system software used to store, organize and retrieve data through queries.Programming ide: It is a software application that facilitates the programmers to develop software.

You can learn more about command interpreter at

https://brainly.com/question/14725990

#SPJ4

Binary is the lowest level of abstraction because all data used and stored by computers use tiny transistors (switches) as memory storage. True or false

Answers

Binary is the lowest level of abstraction because all data used and stored by computers use tiny transistors (switches) as memory storage is a false statement.

What is the lowest level of abstraction?

The Physical level is known to be the lowest level of abstraction and it is said to be one that tells the ways that a system do usually use to save any form of data.

Therefore, based on the above, one can say that Binary is the lowest level of abstraction because all data used and stored by computers use tiny transistors (switches) as memory storage is a false statement.

Learn more about abstraction  from

https://brainly.com/question/7994244

#SPJ1

____ is concerned with the security of computers or devices that are part of a network infrastructure.

Answers

Network security is concerned with the security of computers or devices that are part of a network infrastructure.

Network security can be defined as a broad term that includes many technologies, devices and processes. In the simplest terms, network security is a set of rules and configurations designed to protect the integrity, confidentiality, and accessibility of computer networks and data using software and hardware technologies. Every organization, regardless of size, industry, infrastructure or structure needs a level of network security solution to protect it from the ever-evolving cyber threat landscape in today's wild.

There are many avenues to consider when addressing network security across an organization. Attacks can occur at any path in the network security layer model, so hardware, software, and network security policies must be designed to address each area. Network security usually consists of three distinct controls: physical, technical and administrative.

You can learn more about network security here https://brainly.com/question/14407522

#SPJ4

Debra tracks her business finances in a spreadsheet. She wants to figure out how much she could increase profits if she raises prices on some products. What feature should she use to find the answer?.

Answers

On this spreadsheet, a feature which Debra should use to find the answer is the What-if analysis.

In order to execute the following actions on a data collection, a spreadsheet application is a type of computer software that is frequently made with cells that are organised in rows and columns in a tabular fashion:

GenerateSortCalculateFormatArrange

Debra, a short version of the Hebrew female given name Deborah, means "bee." The Book of Judges in the Old Testament has this Biblical phrase. The only female judge described in the Bible, Deborah was a hero and prophetess.

Phyllis Hilton, whose daughter Debra had EB, created DEBRA in 1978; it was the first organisation for EB patients in the globe.

Learn more about Debra:

https://brainly.com/question/28503666

#SPJ4

Other Questions
A paper company needs to ship paper to a large printing business. The paper will be shipped in small boxes and large boxes. Each small box of paper weighs 45 pounds and each large box of paper weighs 75 pounds. There were 3 more small boxes shipped than large boxes and the total weight of all boxes was 1455 pounds. Write a system of equations that could be used to determine the number of small boxes shipped and the number of large boxes shipped. Define the variables that you use to write the system Where is most of the earth's land mass-north or south of the equator?A trip from Australia to Africa would cross which ocean? A point located on the second hand of a large clock has a radial acceleration of 0.10 cm/s2. how far is the point from the axis of rotation of the second hand? the parents of an adult client with bipolar disorder and alcohol use disorder are scheduled for a family meeting prior to discharge. the parents decline to participate in the meeting and state, "after so many hospitalizations, another family meeting will not help; he does what he wants to do and we know he will never change." what is the nurses best initial response? what is the nth term of 1, 3, 9 What orbitals would be present in principal energy level two? at high ph dna bases are in a keto tautomeric state resulting in decreased h-bonding stability and denaturation of dna strands What do the best firms in an industry seek to identify and manage on an ongoing basis as sources to respond to their external environment? Rewrite-Charles stood on the pitcher's mound, staring down at the batter. He fiddled with the ball in his glove, not sure what pitch to throw. The shortstop backed up to the outfield grass, anticipating the play. Charles knew that the outcome of the game could be decided by this one pitch. He couldn't believe that two of his teachers had given tests on the day of the big game. He wound up and fired toward home plate, pouring every ounce of energy into his right arm. In order to have a non-zero value ofacceleration, the object must changespeed.TrueFalse How was Jean-Jacques Rousseau's criticism of inequality incomplete? A He did not believe women should have the same rights as men. B He did not believe that the power of government comes from the people.C He failed to consider that governments should be dedicated to the common good. D He failed to consider the importance of the law as an expression of the general will. what does Brutus claim is the purpose of the government Assuming there are no syntax errors in the labassignment.java program when it is compiled, answer the following questions. a. what file will be produced? 2. The first philosophers to consider the idea of a social contract believed that p+17=9 i need help ASAP Is Salmon Brown's account a trustworthy source for learning about John Browns Intentions? The nurse is providing education to an older adult client who has been prescribed atorvastatin. how should the nurse describe the common adverse effects of the drug? A ______ driven project portfolio system can reduce or eliminate the impact of problems in project implementation. The larger of two numbers is 17 more than the smaller number. The sum of the two numbers is 71. List the importance of a binomial system of nomenclature.