the delineates the chain of command, indicates departmental tasks and how they fit together, and provides order and logic for the organization. a. employee directory b. structural table c. structural chart d. organizational chart

Answers

Answer 1

Organizational chart is a visual representation of the chain of command, tasks, and their relationships within an organization.

Organizational chart is a visual representation of the chain of command, tasks, and their relationships within an organization. It is used by managers to understand the structure of the organization, the roles and responsibilities of each department, and who reports to whom. It also serves to quickly identify the decision-makers and decision-making processes in the organization. The chart usually contains the names of the people who hold positions in the organization and their titles, as well as the name of the organization itself. It also shows the relationships and lines of authority between departments and individuals. This helps to clarify the roles and responsibilities of each person and ensures that everyone is aware of who they should contact if they need to discuss something with someone in another department or division. The organizational chart also helps the organization to stay organized and efficient.

Learn more about Commands here-

https://brainly.com/question/30319932

#SPJ4


Related Questions

2. The option used for making books and magazines. computer topic

Answers

The term used for making books and magazines in a computer environment is Desktop Publishing (DTP) software.

What is Desktop Publishing?

DTP software allows users to create professional-looking publications using a variety of tools, such as templates, graphics, images, and typography. It also provides features for layout and design, as well as tools for adding text, tables, and other elements to a publication.

Therefore, Some common examples of DTP software include Adobe InDesign, QuarkXPress, and Microsoft Publisher. These tools are commonly used by graphic designers, publishers, and businesses to produce books, magazines, brochures, and other types of print and digital publications.

Learn more about Desktop Publishing  from

https://brainly.com/question/7221406

#SPJ1

gwen uses a process that identifies links or connections between apparently unrelated things or events to create new ideas and opportunities. what best describes what gwen is doing?

Answers

Pattern recognition is the method used by Gwen to find connections or similarities between events or objects that appear to be unconnected in order to generate new ideas and possibilities, according to the question.

Are PC Connection and Connection the same thing?

The corporate headquarters of PC Connecting, doing trading as Connection, are in Merrimack, New Jersey. More than 2,500 people work there, and more than 300,000 goods are sold. Inc. PC Connection

How are connections made?

When two or more individuals communicate with one another, there is connection because each person feels important, heard, and seen. No one is passing judgment, and after connecting with them, you feel fed and stronger.

To know more about Connections visit :

https://brainly.com/question/28337373

#SPJ4

the use of what measure as a study endpoint has several advantages, including the fact that it may be relevant to agents that have a subtle effect over a long time period? group of answer choices

Answers

The use of mortality measure as a study endpoint has several advantages, including the fact that it may be relevant to agents that have a subtle effect over a long time period.

What is a study?

A study is defined as the investigation or detailed analysis of a phenomenon, development, or issue. This was to gain more information and to make sure that the data will be presented for further knowledge.

Environmental epidemiology aims to elucidate the link between physical, biological, and pharmacological components and public health by looking at individual populations or areas exposed to various locations in an area.

Learn more about the study, Here:

https://brainly.com/question/17344576

#SPJ1

living conditions for miners in the congo have improved because of the global demand for coltan, which is used in cell phones and other electronics. T/F

Answers

The living conditions for miners in the congo have improved because of the global demand for coltan, which is used in cell phones and other electronics is a false statement.

What is coltan?

The global demand for coltan, which is a valuable mineral used in the production of cell phones and other electronics, has not generally improved the living conditions for miners in the Democratic Republic of the Congo (DRC). The mining of coltan and other minerals in the DRC is often plagued by human rights abuses, including child labor, forced labor, and dangerous working conditions.

In addition, the profits from the mining industry have not been distributed evenly or used to improve the lives of the local population, leading to widespread poverty and inequality. Despite efforts by some companies and organizations to improve the situation, many miners in the DRC continue to face harsh and challenging conditions.

Learn more about coltan from

https://brainly.com/question/16656023

#SPJ1

in terms of information systems, a collaboration tool that helps a team communicate, organize, plan, schedule, track, and delegate jobs would be an example of _________.

Answers

Workgroup information systems are collaboration tools that assist teams with tasks including job delegation, planning, scheduling, and communication.

What is the workgroup system?

Microsoft refers to peer-to-peer local area networks as workgroups. Shared files, printers, and Internet connections are possible amongst computers running Microsoft software packages in the same work group. A domain, wherein computers rely on centralised authentication, contrasts with a work group.

Why are workgroups used?

A workshop is a group of computers connected by a local network (LAN) who share tasks and resources. Workgroups enable simple file, printer, and other networking resource sharing. The workgroup is displayed under the area for the computer name, region, and workgroup settings. A workgroup inside a corporation could be limited to the marketing division.

To know more about printer visits:

https://brainly.com/question/17136779

#SPJ4

all-in-one computers are easier to service and upgrade but occupy more space than desktop computers.T/F

Answers

all-in-one computers are easier to service and upgrade but occupy more space than desktop computers- false.

What is Computer?

A computer is a device that can be configured to carry out logical or mathematical processes in sequences automatically. Modern digital electronic computers are capable of carrying out generalized sets of tasks known as programs. Computers can now carry out a variety of activities thanks to these applications. A computer system is a supposedly fully functional computer that comprises the hardware, operating system, and any additional equipment required for proper functioning. A network of computers or a cluster of computers are examples of groups of computers that are connected and work together under this umbrella phrase. Computer control systems are a common feature of both industrial and consumer goods. Included are straightforward special-purpose devices like microwaves and remote controls, as well as manufacturing equipment like industrial robots and computer-aided design.

To know more about computer visit:

https://brainly.com/question/21474169

#SPJ4

which data type uses historical data to make decisions in the present?

Answers

Analytical data types use historical to make choices in the present, based on the information provided in the inquiry.

What does SQL data type mean?

Data types include binary strings, numeric, characters data, account records, time and dates data, and other types of data that an object can store. All of the data types that can be utilized with SQL Server are defined by a set of systems data types that are provided by SQL Server.

Which are the 5 types of data?

Integral, Floating Points, Characters, Character Strings, and Composite types are the five basic kinds of data types that are recognised by the majority of current computer languages. A number of specific subtypes are also included in each general group.

To know more about  data type visit:

https://brainly.com/question/22574321

#SPJ4

when data are moved over longer distances, to or from a remote device, the process is known as .

Answers

Data communications refers to the process of moving data to or from a remote device over greater distances.

By data, what do you mean?

Data is data that has been transformed into a format that is useful for transfer or processing in computers. Data is information that has been transformed into binary pdf format for use with modern computers and communication mediums. Both the singular and the plural forms of the topic of data are acceptable.

What kind of data is that?

Data examples include text, observations, figures, photos, numbers, graphs, and symbols. For instance, data may be particular amounts of money, weights, names, addresses, dates, temperatures, dates, or lengths.

To know more about Data visit:

https://brainly.com/question/10980404

#SPJ4

What different types of photographic media (e.g., sports, fashion, etc.) exist? Identify and describe at least five different types of photographic media, providing an example of where or in what context you might see this type of photographic media in the world.

Answers

There are various types of media that are available. They can belong to sports, art, architecture, or editorial form.

What is media?

The word "medium" is pluralized to "media," which refers to any route of transmission. This covers everything from printed paper to online knowledge and covers info in art forms, news, training, and a wide range of other things.

There are various mediums through which these can be represented. As if there is a magazine then it can be various types.  

This can easily represent the architecture of a building. As the building's architectural techniques as well as different Architects and their points of view can be presented.

Learn more about media, Here:

brainly.com/question/21333773

#SPJ1

Complete the procedure for attaching a file to an email message by selecting the correct term from each drop-down menu. 1. in a new email message, on the tab, click the attach file button. 2. in the insert file dialog box, locate and select a file to attach, and click .

Answers

The steps to attach a file to that of an email message as follows: 1) Click the "Attach File" button tab to add a file to a new email message. 2) Select the file to attach and click "Open" in the "Insert File" dialog box.

What is an email simple definition?

The exchange of computer-stored messages through one user to one or even more recipients via the internet is known as email (or electronic mail). Emails are a handy, inexpensive, and fast method of communication both for personal and professional purposes.

Why is it called email?

Electronic mail, also referred as email or e-mail, is indeed a method by which people to interact with each other using electronic devices. Email was created as the electronic (digital) equivalent of mail at a period when "mail" solely referred to physical mail.

To know more about email visit :

https://brainly.com/question/28087672

#SPJ4

how many ports in total for each switch are used for vlan traffic? list the vlan and the total number of ports assigned to that vlan.

Answers

The setup of the switch determines how many ports are used for VLAN traffic. Each VLAN is often given a certain range of switch ports in a configuration.

How many ports per switch are utilized for Vlan traffic in total?

Each VLAN is often given a certain range of switch ports in a configuration. A switch with 24 ports, for instance, can have 4 ports assigned to VLAN 1, 10 ports to VLAN 2, and the rest 20 ports to VLAN 3. Here is an illustration list of VLANs together with the amount of ports each VLAN is assigned:

4 ports for VLAN 1

10. VLAN 2 ports

10. VLAN 3 ports

It is significant to remember that depending on your network's particular needs, the number of ports allocated to each VLAN may change. Additionally, switches frequently enable numerous VLANs on a single port, enabling more adaptable network configurations.

To know more about VLAN visit:

brainly.com/question/14530025

#SPJ4

why does the ethernet protocol include a 64-bit preamble before every packet that consists of alternating 00s and 11s.

Answers

The 64-bit preamble is used to inform devices on the network that an Ethernet packet is about to be sent. This preamble helps synchronize the sending and receiving of data on the network.

The 64-bit preamble is a sequence of alternating 0s and 1s that appear before each Ethernet packet. This preamble is used to inform devices on the network that an Ethernet packet is about to be sent. By using this preamble, the receiving device can synchronize its clock with the sending device, allowing it to more accurately interpret the data in the packet. The preamble also contains a start frame delimiter (SFD) which marks the beginning of the Ethernet packet. This helps the receiving device to easily identify when the packet begins and ends. The 64-bit preamble is an essential part of the Ethernet protocol, as it provides devices on the network with the necessary information to accurately interpret and process Ethernet packets.

Learn more about network here:

brainly.com/question/29970297

#SPJ4

g 1. to get the pivot table summarizing invoice amounts by customer, the pivot table should have which specifications?

Answers

Right-click the value field in the pivot table that needs to be changed, and then select Summarize Values By. To use the summary feature, click it.

By adding a field to the VALUES section of the PivotTable Fields Task pane, you may summarise a PivotTable. Excel summarises fields by default by adding the field's values in the VALUES box. Use summary functions like Sum, Count, and Average to condense information in a PivotTable in Excel for the web. For numeric values in value fields, the Sum function is automatically applied. A PivotTable built using an OLAP data source may be viewed and edited, but you cannot build one in Excel for the web.

To learn more about pivot table click the link below:

brainly.com/question/30384473

#SPJ4

brainliest, 100 points, please please please

Answers

Triangular Prism and the sketch in the attached diagram which is determined the shape as it represents.

What is Rectangular Prism?

The has 5 sides 2 of which are triangles while the other are rectangles as the Rectangular Prism. This, in other words represents a cuboid

Triangular Pyramid, this has 4 sides, all of which are triangles, Rectangular Pyramid. This has 5 sides; 4 of which are triangles while the last is a square of rectangle. From the analysis above, the best option that answers the question is The Triangular Prism because it perfectly describes Lucia's drawing.

Therefore, Triangular Prism and the sketch in the attached diagram which is determined the shape as it represents.

Learn more about Triangular Prism on:

https://brainly.com/question/27102803

#SPJ1

Answer:

Explanation:

i cant see the image

when using selection sort to sort a list with 21 elements, what is the minimum number of assignments to indexsmallest once the outer loop starts?

Answers

The minimum number of assignments to "indexsmallest" once the outer loop starts, in a selection sort algorithm for sorting a list with 21 elements, is 20.

In selection sort, the outer loop iterates n-1 times, where n is the number of elements in the list. In this case, n = 21, so the outer loop iterates 20 times.

In each iteration of the outer loop, the inner loop is used to find the smallest element in the unsorted portion of the list. The variable "indexsmallest" is used to store the index of the smallest element. The minimum number of assignments to "indexsmallest" is one per iteration of the outer loop, so the total minimum number of assignments is equal to the number of iterations of the outer loop, which is 20 in this case.

What methods do cybercriminals use to trick you?

Answers

Phishing or spoofing: Emails and websites that appear to be trustworthy and include harmful attachments or dangerous links are the main sources of spyware.

What do online thieves mean?

Cybercriminals are people or groups of people who utilize technology to carry out nefarious acts on digital networks or systems with the aim of stealing confidential business information of personal data and making money.

Who do cybercriminals intend to harm?

The majority of cyberattacks target small and medium-sized businesses. Smaller firms do not enjoy the same luxury as major organizations, and hackers are aware of this. Large corporations can afford cybersecurity services and can improve their network to match the most recent hacker techniques.

To know more about cybercriminals visit:

https://brainly.com/question/27146593

#SPJ4

Assign a pointer to any instance of searchChar in personName to searchResult.
*/
int main() {
char personName[100] = "Albert Johnson";
char searchChar = 'J';
char* searchResult = 0;
/* Your solution goes here */
searchResult = strchr(personName, searchChar);
if (searchResult != 0) {
cout << "Character found." << endl;
}
else {
cout << "Character not found." << endl;
}
return 0;

Answers

Here is the answer to the problem:

searchResult = strchr(personName, searchChar);  

The strchr function, which is used to locate a character (searchChar) within a string, is used in this statement (personName). The outcome is given the name searchResult.

It need the headerfile cstring to use this approach.

What is strchr function?

Here is the complete program

#include<iostream> //to use input output functions  

#include <cstring> //to use strchr function  

using namespace std; //to access objects like cin cout  

int main() { // start of main() function body  

 char personName[100]; //char type array that holds person name  

 char searchChar; //stores character to be searched in personName

 char* searchResult = nullptr; // pointer. This statement is same as searchResult  = NULL    

 cin.getline(personName, 100); //reads the input string i.e. person name  

 cin >> searchChar;    // reads the value of searchChar which is the character to be searched in personName  

 /* Your solution goes here */  

 searchResult = strchr(personName, searchChar); //find the first occurrence of a searchChar in personName  

 if (searchResult != nullptr) //if searchResult is not equal to nullptr  

 {cout << "Character found." << endl;} //displays character found

 else //if searchResult is equal to null  

 {cout << "Character not found." << endl;} // displays Character not found  

 return 0;}  

For example the user enters the following string as personName  

Albert Johnson  

and user enters the searchChar as:  

J

Then the strchr() searches the first occurrence of J in AlbertJohnson.  

The above program gives the following output:  

Character found.

To Learn more About strchr function, Refer To:

https://brainly.com/question/15683939

#SPJ4

what would prevent data from appearing in a custom report?

Answers

A filter that filters out all Data Prevent  data from appearing in a custom report in computer, Dimensions and metrics of different scopes.

How accurate are custom report types?

Salesforce administrators can construct dynamic reports using Custom Report Types (CRT), which goes beyond what is possible with Standard Reports. Consider Salesforce's Basic Reports as a pre-packaged reporting solution.

A custom report is which of the following?

A customized report is one you write yourself. Matching metrics and dimensions from various scopes is not feasible in any report; you choose the characteristics and metrics and select how they ought to be displayed.

To know more about Data visits:

https://brainly.com/question/22711837

#SPJ4

What happens when your browser cache becomes full?

Answers

The browser automatically deletes old cached files as you continue to browse the Web.

What is browser cache?

The World Wide Web can be optimized with a Web cache. It is put into use on both the client and the server.

Multimedia and other items can be cached to reduce overall loading times when browsing the Web.

Browser cache is kept on the end-side user's of the system rather than the server. A user's browser downloads the page's data each time they load a website page in order to display it.

As you explore the Web, the browser automatically deletes outdated cached files.

Thus, this can be the step when your browser cache becomes full.

For more details regarding browser cache, visit:

https://brainly.com/question/17898582

#SPJ1

how many different possible options of combinations are available in binary code using eight bits?

Answers

The total (4) 2⁸ = 256 possible οptions of combinatiοns are available in binary code using eight bits. Option D is cοrrect.

How does binary code work?

The binary is a base-2 number system in which integers are represented by a sequence of ones and zerοs.

In the early computer systems, 1 and 0 were represented by mechanical switches. By cοnnecting switches in series, cοmputers might use binary code to express numbers. Mοdern computers continue to use binary code in the form of digital ones and zerοs in the CPU and RAM.

A "byte" is a set of eight "bits" that make up a binary number. The binary number of eight bits is represented by a single bit, either οne or zero. Using ASCII cοdes, binary numbers can alsο be transformed into text characters for storage in cοmputer memory.

Learn more about binary codes:

brainly.com/question/29365412

#SPJ4

Complete question :

How many different possible options of combinations are available in binary code using eight bits?

1. 64

2. 16

3. 128

4. 256

if you run a program in new york city that uses network resources to the extent that a user is denied access to them, what type of law have you violated?

Answers

You may have violated the Computer Fraud and Abuse Act (CFAA).

What is Computer Fraud ?

Computer fraud is the intentional use of computers to commit fraud. It is a form of cybercrime that involves using computers to steal money, data, and other valuable information. Common forms of computer fraud include phishing, identity theft, account hijacking, and malware attacks. Computer fraud is a serious crime and can have serious consequences for the victim.

The CFAA is a federal law that makes it illegal to access a computer system without authorization, or in excess of authorized access. This includes using a computer network to interfere with the use of a computer system by another user. Violations of the CFAA can lead to both civil and criminal penalties, depending on the severity of the violation.

To learn more about Computer Fraud
https://brainly.com/question/14293081
#SPJ4

write a program to find and print the first perfect square (i*i) whose last two digits are both odd.

Answers

This program prints the first perfect square (i*i) whose last two digits are both odd.

#include <stdio.h>

int main()

{

//Declare a variable to store the perfect square number, and initialize it to 0

int perfectSquare = 0;

//Declare a variable to store the remainder of a division, and initialize it to -1

int remainder = -1;

//Declare a variable to store the loop index, and initialize it to 0

int i = 0;

//Start a loop that runs until we find a perfect square whose last two digits are both odd

while (remainder != 0 || (perfectSquare % 10) % 2 == 0 || (perfectSquare / 10) % 2 == 0)

{

 //Increment the loop index

 i++;

 

 //Calculate the perfect square

 perfectSquare = i * i;

 

 //Calculate the remainder of the last two digits

 remainder = perfectSquare % 100;

}

//Print the perfect square

printf("The first perfect square whose last two digits are both odd is %d\n", perfectSquare);

return 0;

}

What is program?

A program is a set of instructions that tells a computer how to perform a specific task. It can range from a simple command-line application to a complex software application that runs on a computer or device. Programs are written in programming languages such as C, Java, Visual Basic, and Python. Programs can be used to automate tasks, create user interfaces, store data, and create applications.

To learn more about program
https://brainly.com/question/30467545
#SPJ4

what boolean search would you use to look for web pages about beaches in new jersey? what if you wanted to find web pages about beaches on the isle of jersey (in the english channel)?

Answers

Boolean search is a method used to narrow down search results using specific keywords and operators such as AND, OR, NOT, and quotation marks. To look for web pages about beaches in New Jersey, the following Boolean search could be used:

"beaches" AND "New Jersey"

To find web pages about beaches on the Isle of Jersey in the English Channel, the following Boolean search could be used:

"beaches" AND "Isle of Jersey" AND "English Channel"

This search would return results that include all three terms, thus providing more specificity in the results and excluding any irrelevant pages about New Jersey. In conclusion, Boolean search can be a useful tool for finding relevant information on the web. It allows for greater control over search results by combining keywords and operators to find exactly what you're looking for.

Learn more about boolean: https://brainly.com/question/13265286

#SPJ4

How many characters may be used in a file name?

Answers

Answer:

255 :)

Explanation:

In order to be used as a primary key, which of these characteristics must an attribute possess with respect to a single instance of the entity? Select all that apply. a) There must be a maximum of one attribute instance. b) There must be many instances of the attribute. c) There must be at most one entity instance that each attribute instance describes. d) There must be at least one instance of the attribute. e) There must be zero or more instances of the attribute.

Answers

An attribute needs to meet the following requirements in order to be used as a primary key for an entity: For every instance of the entity, it needs a non-null value.

Which attribute must have a value for each instance of the entity it belongs to?Any entity instances that have already been defined must have a value for every attribute that is necessary. As an example of an optional attribute, consider the attribute middle name for the entity person.When each occurrence of an attribute only applies to one instance of an entity, then it is considered unique.An attribute needs to meet the following requirements in order to be used as a primary key for an entity: For every instance of the entity, it needs a non-null value. Every instance of an entity must have a different value. Throughout each entity instance's existence, the values cannot be null or change.            

To learn more about attribute refer to:

https://brainly.com/question/17290596

#SPJ4

when we represent data digitally, what is the smallest unit used?

Answers

A bit is the smallest digital data representational unit (binary digit). A bit can represent data in a binary system by having one of two possible values, 0 or 1.

What is binary digit?

A binary number is a number that has been stated using the base-2 or binary numeral system, which employs just two symbols, often "0" and "1."

How to read binary?

For whole numbers, we must understand that the most significant binary digit (or bit for short) is located on the left and the least significant bit is on the right in order to comprehend a binary number.

To know more about binary digit visit :

https://brainly.com/question/29037669

#SPJ4

in cloud computing, the practice of grouping together computing resources and making them available for shared access for multiple consumers is referred to as:

Answers

in cloud computing, the practice of grouping together computing resources and making them available for shared access for multiple consumers is referred to as resource pooling.

What is computing resources?

The simplest computational resources are computation time, which is the total number of steps required to solve a problem, and memory space, which is the amount of storage used while solving a problem, although many more complex resources have been developed. An action on any legitimate input is typically used to characterize a computational problem[citation needed]. Examples of issues are "with an integer n, find whether n is prime" and "compute the product of x and y given two values" The quantity of computer resources required to solve an issue will grow as the inputs are larger. As a result, the resources required to solve a problem are stated in terms of asymptotic analysis, where the resources are determined as a function of the input's size or length.

To know more about computing resources, visit:

https://brainly.com/question/30090250

#SPJ4

uestion 13 (1 point) saved a detailed outline of the scope of the policy development project is created during which phase of the secsdlc? question 13 options: design analysis implementation investigation

Answers

Saved a detailed outline of the scope of the policy development project is created during investigation phase of the Sec-SDLC.

ABOUT SDLC

SDLC is the process of modifying and creating systems, models, and methodologies used to develop software.

In short, in the world of software engineering, it is the steps that engineers and developers can apply to design and manage software.

What is this SDLC for?

Of course to produce a high quality system output that meets the expectations of users and stakeholders.

the software development cycle is a process that can produce software with high quality at a low cost.

SDLC also has several work phases, including planning, design, testing, development, and implementation.

Learn more about SDLC at https://brainly.com/question/14096725

#SPJ4

you are the network administrator for westsim. the network consists of a single active directory domain. you have enabled outbound filtering for public networks in the windows firewall with advanced security node of a group policy that applies to member servers. a member server named app1 is being configured to host a custom web application named application 1 that must contact a source server located on the internet using port 735. after installing application 1 on app1, you discover that it is unable to contact the source server. you need to enable app1 to contact the source server on the internet. what should you do?

Answers

The outbound rule will be the one that will be followed and need to be enabled.

What is a network?

A group of computers combining resources that are available on or offered by network nodes is known as a computer network. To communicate with one another across digital connections, computers employ standard data exchange.

Outbound firewall rules are typically guidelines that specify the traffic that is permitted to enter your net through safe ports and travel to authorized destinations. They block requests that are made to dangerous websites and dubious domains. Export network rules configuration can stop data regression.

Learn more about network, Here:

https://brainly.com/question/15088389

#SPJ1

What is called a book of original entry?

Answers

A book of original entry can refer to any one of the books of accounts where a transaction is first entered.

What types of books are examples of original entries?Like cash journals, bank journals are kept for the time period containing all transactions involving the transfer of money from the organization's bank accounts, Countless sales journals.An accounting book or journal called a book of original entry is where we keep track of all business transactions, along with their associated source documents and all relevant information and details.A book of original entry can refer to any one of the books of accounts where a transaction is first entered.An accounting book or journal called a book of original entry is where we keep track of all business transactions, along with their associated source documents and all relevant information and details.          

To learn more about original entry refer to:

https://brainly.com/question/27748482

#SPJ4

Other Questions
Lee presents in counseling with relationship difficulties. He is often mistrustful of others and withdraws when he feels anxious. Lee seems rather eccentric, and you suspect that he might have a diagnosis of schizotypal personality disorder. However, you do not think that you have enough information. Based on the Alternative DSM-5-TR Model for Personality Disorders, which diagnosis could be given? which of these substances will not form a covalent network solid? select the correct answer below: carbon dioxide silicon silicon dioxide carbon graphite we use a scatter plot to display the relationship between two numerical variables. we can expand the usage of the scatter plots to include a categorical variable. if we plot property values against square footage, then we anticipate a positive relationship between these two variables. which of the following describes the usage of scatter plots that include a categorical variable? In business calculus, what does CPR stand for? islamic law derived from the quran and the teachings of muhammad. true or false tamara is the sales representative of a pharmaceutical company. when making sales calls, she uses ingratiation techniques to make the prospects feel good about themselves. by this, tamara is appealing to the prospects' . a. self-control b. social affect c. self-concern d. social cognition The function f(x) = 5x + 35 represents the distance in miles a drone flew.The function g(x) = x + 7 represents the time the drone flew in hours.Part A: Find f(3) and g(3). Show your work. (2 points)Part B: Find (f/g) divided by g of 3. Show your work. (2 points)Part C: What is the domain of f divided by g of (f/g) x? (2 points) design and names by which merchants or manufacturers designate and differentiate their products are known as Find the y-intercept and the slope of the line.y= -2/5x+6 3. Put the following numbers in order from least to greatest: 0.8, 1/10, 3/100, 0.914. Put the following numbers in order from least to greatest: 0.9, 0.35, 11/100, 7/10, 0.6, 0.215. Put the following numbers in order from least to greatest: 36/100, 0.2, 1/10, 8/100, 0.5, 0.44If you can answer all the questions thats awesome but i mainly need help with number 5. next, they're concerned about ways their network has been exposed to viruses due to employees using company computers to visit international web sites with questionable security. what can you add to the network to offer the company better control over which web sites are approved for business interactions? 13. State if the triangles in each pair are similar by AA, SSS or SAS. If not, write not possible.BA10126CG2025H10 or 1. Shakespeare's plays follow a five act model where the second act is the "complication," where the conflicts we saw begin in act 1 deepen and become more complex. Explain how this play fits this model.2. Revenge isn't about getting even or justice; revenge is always about hurting others worse than they hurt the victim. Explain the Goths' plans for revenge on Titus. Who is involved? How do their plans fit the idea of revenge?3. When Aaron and Tamora meet during the hunt, Aaron gives the empress a "fatal ill-plotted scroll," how is this part of their revenge plot? Does it work as expected? Explain.4. Shakespeare chooses the background of the hunt for the second act of the play. Explain how this is an effective metaphor / symbol for the events of Act 2. 5. Chiron and Demetrius, after raping Lavinia, cut out her tongue and amputate her hands before leaving her to die in the wilderness. Why? They have a particular reason for leaving her so mutilated; what is that reason? Explain.6. Explain the fate of Martius and Quintus at the end of Act 2. What has happened to them? Was it their fault? holloway company earned $9,700 of service revenue on account during year 1. the company collected $8,245 cash from accounts receivable during year 1. required based on this information alone, determine the following for holloway company. the balance of the accounts receivable that would be reported on the december 31, year 1, balance sheet. the amount of net income that would be reported on the year 1 income statement. the amount of net cash flow from operating activities that would be reported on the year 1 statement of cash flows. the amount of retained earnings that would be reported on the year 1 balance sheet. you are considering to buy a piece of art. you estimate that there is a 50% chance of selling it for $400,000 in 5 years, and a 50% chance of selling it for $800,000 in 8 years. your discount rate is 9%. what is the most you are willing to pay for this piece of art right now? what textual evidence supports the authors claim (cite specific exmapls provide the paragraph number Shannon manages a small zoo and she has been analyzing the attendance data. Shannon finds that the number of visitors increases exponentially as the temperature increases, and this situation is represented by the function f(x) = 3x. Shannon also finds a linear equation that models the number of people who leave the park early depending on the change in temperature, and it is represented by g(x) = x + 4. The graph of the two functions is below. Find the solution to the two functions and explain what the solution represents.Graph increasing exponentially from the left, crosses the y axis at one and goes to infinity and intersects a linear graph that decreases and crosses the y axis at four and the x axis at four. 3. If you could inherit a gene from anyone in the world, what would it be and from whom wouyou like to inherit it? pick one of the options (1) or (2) to answer the question. if you pick (1), tell us what p is below; if you pick (2), tell us why. the percent of surveyed u.s. adults who had a great deal of confidence in both scientists and religious leaders 1. is equal to p%. 2. cannot be found with the information in the article. Hii! I need a good introduction paragraph in my debate paper about why we should NOT make another nuclear power plant. My key points are: Cost Waste Management Safety Concerns Nuclear Proliferation35 points and marking brainliest answer for whoever can write me a strong introduction paragraph! :) thank you!!