what phase of the software development life cycle includes an investigation of what the stakeholder anbd user needs are?

Answers

Answer 1

Requirements gathering software and analysis phase, which involves investigating stakeholder and user needs.

The Requirements Gathering and Analysis phase is the first step of the Software Development Life Cycle. It involves investigating the needs of stakeholders and users in order to determine what the software will do and how it will do it. During this phase, the software requirements are identified, documented, and analyzed. This includes researching and analyzing the target audience, their needs, and the environment in which the software will be used. It also involves identifying the features and functions that the software must have in order to meet the user and stakeholder needs. During this phase, prototypes may also be created to test and refine the requirements. After the requirements have been determined and agreed upon, they are used as the basis for the rest of the software development process.

Learn more about software here-

brainly.com/question/29946531

#SPJ4


Related Questions

all of the following are common ways of spreading malicious code except: a. email attachments b. downloading files from the web c. backing up important files d. peer-to-peer software

Answers

All of the methods listed below are popular ways to propagate malicious code, with the exception of method d, which is not a frequent method of doing so.

What exactly is coding?

Coding is a type of computer language that facilitates communication with computers. Human languages are not understood by computers. Coding enables interaction between people and computers. Code tells the computer what actions to take and which tasks to complete.

What is a C++ program?

Many people believe that C++, an element programming (OOP) language, is the finest language for developing complex applications. The C language is a carbon copy of C++.

To know more about Code visit :

https://brainly.com/question/8535682

#SPJ4

a relationship-oriented person likes connecting but is too afraid to interrupt someone working on a task. true false

Answers

False. A relationship-oriented person is generally outgoing and not afraid to reach out or interrupt someone working on a task.

What is relationship-oriented ?

Relationship-oriented describes an approach to interpersonal interaction that emphasizes the importance of developing and maintaining strong relationships with others. It involves an attitude of mutual respect, trust, and understanding, as well as an active effort to build and nurture relationships.

They are often driven by the need to build relationships, so they are usually eager to initiate contact with others.

To learn more about relationship-oriented
https://brainly.com/question/11842604
#SPJ4

how can i create a command button that would allow me to fill multiple places with text at once in a word text?

Answers

To create a command button in Microsoft Word that fills multiple places with text, use the "Quick Parts" feature to create a building block and insert it wherever needed.

To create a command button in Microsoft Word that allows you to fill multiple places with text at once, you can use the "Quick Parts" feature. Here's how:

Open your Microsoft Word document and navigate to the place where you want to insert the command button.Go to the "Insert" tab and click on the "Text" group.Click on the "Quick Parts" button, and then select "Building Blocks Organizer."In the Building Blocks Organizer window, click the "New" button.Give your building block a name, and then type the text that you want to insert into multiple places.In the "Save In" section, select "Custom" and then click the "OK" button.In your document, you can now insert the building block by clicking on "Quick Parts" and selecting the building block from the list.

By using this method, you can create a command button to fill multiple places with the same text in your Word document.

Learn more about Microsoft Word here:

https://brainly.com/question/23611342

#SPJ4

multiple choice. a method is declared as: public static void showresults(double d, int i) which of the following is a correct method call to it? showresults(double d, int i); showresults(12.2, 67); showresults(4, 99.7); the third and fourth method calls are correct.

Answers

The second method call, "showresults(12.2, 67);" is the appropriate one.

Explain Public static in terms of computer technology?

A particular kind of one whenever in the Java programming language is "public static." It details a method's type and access level. If a method is "public," it can be reached from any part of the programme. Static methods can be invoked without constructing a class object since they are part of the class itself, not a specific instance of the class. Instead of using a class instance, this kind of method can be used directly from of the class name. Public: This access specifier indicates that it will be accessible to the general public. Static: This access modifier means that when the Java programme is loaded, memory space will be automatically created.

To know more about Public static visit:

brainly.com/question/13405750

#SPJ4

in his memo, wes explains three functions of the new software he is recommending. what can wes do to make this information easier to process and remember?

Answers

The correct answer is The initial stage of software development is analysis. A software development team will be asked by a client to create a certain piece of software.

These are typical actions taken by software developers: Consider the demands of the user when designing and developing software. Encourage customers to upgrade their existing software and systems. Design each component of an application or system, and consider how the components will function as a whole. Software development is the name given to a group of computer science tasks involved in developing, deploying, and maintaining software. The set of instructions or programmes that a computer follows are known as software. It makes computers programmable and is independent of hardware. Software can be divided into three categories: system software, utility software, and application software.

To learn more about software development click on the link below:

brainly.com/question/3188992

#SPJ4

when installing a motherboard, suppose you forget to connect the wires from the case to the front panel header. will you be able to power up the system? why or why not?

Answers

No. The power button is routed through the motherboard and the motherboard actually signals the system power-up.

What is a motherboard?

A motherboard, also known as a mainboard, main circuit board, mb, mboard, backplane board, base pcb, system board, logic board (primarily in Apple computers), or mobo, is the primary printed circuit board (PCB) of general-purpose computers and other extensible systems. It has ports for other peripheral devices and stores and permits communication among many of the critical electronic parts of a system, including the memory and CPU. The core CPU, input/output and memory controllers of the chipset, interface connections, and other devices integrated for general usage are only a few examples of key sub-systems that are often present on a motherboard as opposed to a backplane. An expansion-capable PCB is referred to as a motherboard. On separate printed circuit boards that hooked into the backplane, the centralized processing unit (CPU), memory, and peripherals were all contained.

To know more about motherboard visit:

https://brainly.com/question/15970699

#SPJ4

write a select statement that uses the view that you created in exercise 5 to get the sum of the order total for the five best selling products.

Answers

SELECT SUM(OrderTotal) FROM  program vw_Top5Products ORDER BY Quantity DESC LIMIT 5;

This SELECT statement uses the view created in Exercise 5, vw_Top5Products, to get the sum of the OrderTotal for the five best selling products. It first orders the products by Quantity in descending order, and then limits the results to the top five. This will give the total OrderTotal for the five best selling products. This statement can be useful for getting a total amount of sales for the top selling products in a particular store or region. This information can then be used for comparison or for reporting purposes. Additionally, this SELECT statement can be modified to include other criteria to get more specific information regarding the top five selling products. For example, the WHERE clause can be used to filter the results to a specific store or region, or the ORDER BY clause can be changed to sort by other criteria.

Learn more about program here-

brainly.com/question/11023419

#SPJ4

software apps installed on a device before the purchase are known as which of the following?
a. PUP
b. API

Answers

Software apps installed on a device before the purchase are known as PUP.

PUP is (Potentially Unwanted Programs). PUP stands for "Potentially Unwanted Program." It is a type of software that is installed on a device without the user's knowledge or consent, and it typically has unwanted or harmful characteristics, such as slowing down the device, displaying ads, collecting personal information, or changing the user's browser settings. PUPs are often bundled with legitimate software and can be difficult to remove.

Here you can learn more about Potentially Unwanted Programs

https://brainly.com/question/29786851

#SPJ4

When using true or false as criteria in a function, they are considered to be boolean values and therefore should not be put in quotes.a. Trueb. False

Answers

When using true or false as criteria in a function, they are considered to be boolean values and therefore should not be put in quotes. a)True.

What are excel functions?

Functions are pre-written formulas that conduct out calculations by utilising particular values, referred to as inputs, in a given order, or structure. Calculations of any complexity can be carried out using functions. The Formulas tab just on Ribbon contains the syntax for all of Excel's functions. Compatibility, Cube, Database, Date and Time, Engineering, Finance, Information, Logical, Query & Reference, Math & Trigonometry, Statistical, and Text are the 12 categories that Excel divides its functions into. In Excel, you can click the Formulae tab and then Show Formulas to see formulas. All of the formulas inside the Excel worksheet will be displayed. Using the built-in Excel function VLOOKUP, you can search vertically across the page for a specific value.

To know more about excel functions visit:

https://brainly.com/question/29995070

#SPJ4

Which command would you use to fit columns to the text ?

Answers

On the Layout tab, in the Cell Size group, click in the Table Column Width box, and then specify the options you want

Which command would you use to fit columns to the text ?

Hover the mouse over the line between two columns. The cursor will turn into a double arrow.Double-click the mouse.The column's width will be changed to fit the content.Click the Page Layout tab on the ribbon. In the Scale to Fit group, in the Width box, select 1 page, and in the Height box, select Automatic. Columns will now appear on one page, but the rows may extend to more than one page. To print your worksheet on a single page, choose 1 page in the Height box.Automatically resize all columns and rows to fit the dataSelect the Select All button. at the top of the worksheet, to select all columns and rows.Double-click a boundary. All columns or rows resize to fit the data.

To learn more about columns refers to:

https://brainly.com/question/30185168

#SPJ4

which core capability of electronic documentation helps access various types of test reports of the client at the same time without any delay?

Answers

The core capability of electronic documentation that helps access various types of test reports of a client at the same time without any delay is called real-time access or real-time availability. Real-time access refers to the ability to retrieve information and data immediately, as it becomes available.

In the context of electronic documentation, this means that test reports can be accessed and reviewed by authorized users in real-time, without any delay. This capability is important because it helps ensure that important information is available when and where it is needed, improving efficiency and reducing the risk of errors or delays. Additionally, real-time access can help streamline the review and approval process for test reports, as well as allow multiple users to access and review the same information simultaneously. Overall, real-time access is a key capability of electronic documentation that helps organizations to operate more efficiently and effectively.

Learn more about real-time: https://brainly.com/question/29891828

#SPJ4

which piece of electrical equipment is not considered a device? a. receptacle b. three-way switch c. lamp d. disconnect switch

Answers

Electrical equipment such as a lamp is not regarded as a device.

Electrical devices: What are they?

Electrical gadgets are those whose major elements are functionally powered by electric energy (AC or DC) (electric motors, transformers, lighting, rechargeable batteries, control electronics). When compared to conventional mechanical systems, that rely on various power sources like fuel or human physical strength, they can be seen as being superior. Electronic devices are a specific kind of electrical equipment in which the production of mechanical forces is less frequent than the processing of data. Electric devices that stress physical work are also known as electrical machines in order to more clearly distinguish between the two kinds. The convergence of the two sciences is highlighted by mechatronics.

To know more about Electrical devices
https://brainly.com/question/12089961
#SPJ4

there are several ways to pan and zoom in photoshop. what is a quick shortcut to get back to a view that fits the image to the window?

Answers

Press the 'Ctrl + 0' (zero) shortcut on your keyboard. This will quickly zoom the image to fit the window, allowing you to view the entire image.

What is shortcut?

A shortcut is a quicker way to access a program, file, or other computer feature. It can be a keyboard shortcut, a mouse shortcut, or a combination of both. Shortcuts are designed to make it easier to quickly perform a task or access a feature without having to go through the entire process or series of steps. For example, on a Windows PC, pressing the Windows key and the letter “R” simultaneously would open the Run command window, allowing you to quickly launch an application or access a folder or file. Shortcuts can also be stored on the desktop or in a folder for quick access.

To learn more about shortcut
https://brainly.com/question/29106300
#SPJ4

what is the solution to this problem? #include errors detected. please update your includepath.

Answers

The error message "Please update your includePath" does not necessarily mean there is actually a problem with the includePath .

What is Python?

High-level, all-purpose programming languages like Python are available. With the usage of extensive indentation, its design philosophy places an emphasis on code readability. Garbage collection and dynamic typing are features of Python. Programming paradigms supported by it include structured (especially procedural), object-oriented, and functional programming. Due to its extensive standard library, it is frequently called a language with "batteries included." As a replacement for the ABC programming language, Guido van Rossum started developing Python in the late 1980s. Python 0.9.0 was its initial release. In 2000, Python 2.0 was released. 2008 saw the release of Python 3.0, a significant update that was not entirely backward-compatible with prior iterations. The final version of Python 2 was 2.7.18, which was released in 2020.

To know more about Python visit:

https://brainly.com/question/30391554

#SPJ4

write a multi-way if/else statement thatadds 1 to the variable minors if the variable age is less than 18,adds 1 to the variable adults if age is 18 through 64 andadds 1 to the variable seniors if age is 65 or older.

Answers

The if/else statement adds 1 to the respective variables based on the value of age.

if (age < 18) {

 minors++;

} else if (age >= 18 && age <= 64) {

 adults++;

} else {

 seniors++;

}

The if/else statement is a control flow statement that allows a program to make a decision based on a certain condition. In this example, the condition is the value of the age variable. If the age is less than 18, the statement adds 1 to the minors variable. If the age is between 18 and 64, the statement adds 1 to the adults variable. If the age is 65 or above, the statement adds 1 to the seniors variable. This statement allows the program to dynamically change the values of the respective variables based on the value of the age variable. This is an effective way to categorize and keep track of different age groups. The if/else statement allows the program to make decisions quickly and accurately and make sure that the values of the variables are always up to date.

Learn more about variable here-

brainly.com/question/12296810

#SPJ4

write a c program that reads a sequence of floating point numbers (decimal numbers) and displays their sum after every number input. three decimal numbers are displayed for the sum.

Answers

Here is a C program that reads a sequence of floating-point numbers and displays their sum after every number input with three decimal places:

#include <stdio.h>

int main(void) {

  float number, sum = 0.0f;

  int count = 0;

  printf("Enter numbers (0 to terminate): ");

  scanf("%f", &number);

  while (number != 0.0f) {

     sum += number;

     count++;

     printf("Sum = %.3f\n", sum);

     printf("Enter next number (0 to terminate): ");

     scanf("%f", &number);

  }

  printf("Total sum = %.3f\n", sum);

  printf("Number of numbers entered: %d\n", count);

  return 0;

}

In this program, the user inputs a floating-point number, which is stored in the number variable. The sum of the numbers entered so far is stored in the sum variable. The count variable keeps track of the number of numbers entered. The %.3f format specifier is used to display the sum with three decimal places.

Learn more about coding: https://brainly.com/question/17204194

#SPJ4

are small text files loaded on a computer when a user visits websites. question content area bottom part 1 a. bytes b. pixels c. grabbers d. clumps e. cookies

Answers

e) Cookies are small text files that are loaded on a computer when a user visits websites. A cookie refers to a layer of data from a website that is stored within a web browser that the website can retrieve at a later time.

A cookie is a piece of data that is stored on a user's computer by a website and can be later retrieved by the website. Cookies are used to store information such as user preferences, login information, and shopping cart contents.

They allow websites to remember information about a user's visit, making it possible for the website to provide a personalized experience the next time the user visits the site. Cookies can be used to direct the server that users have returned to a particular website.

Learn more about text file: https://brainly.com/question/29760957

#SPJ4

how to connect apple pencil to ipad without plugging in

Answers

Make sure Bluetooth is turned on by going to Settings > Bluetooth. Tap Abandon this Device after that. When the Pair option eventually displays, tap it after pairing your iPad and Apple Pencil.

What does promoting a product actually mean?

to promote anything by praising it or talking about it frequently lot, particularly on the television or the radio He only used that interview to promote his new book. This milk chocolate bar is currently being advertised everywhere.

What causes pipeline plugging?

Pipeline plugging is a technique for safely bypassing and isolating a pipeline segment to enable alteration of a pressurised system without having to shut down the line while it is still in use.

To know more about plugging visit:

https://brainly.com/question/7143308

#SPJ4

which bit (bit 0 is the right most, least significant bit) of the ascii code for capital letters must be inverted to create the corresponding ascii code for small letters?

Answers

The fifth (0-based) bit of the ASCII code for capital letters must be inverted to create the corresponding ASCII code for small letters.

The fifth (0-based) bit of the ASCII code for capital letters must be inverted to create the corresponding ASCII code for small letters.

For example, the ASCII code for the capital letter "A" is 65, which in binary is 1000001. Inverting the fifth bit (0-based) gives 1100001, which is the binary representation of the ASCII code for the small letter "a", which is 97.

In general, this works because the ASCII codes for capital letters and small letters are adjacent, with the ASCII code for the small letter being exactly 32 less than the ASCII code for the corresponding capital letter. By inverting the fifth bit, we are effectively subtracting 32 from the ASCII code, which takes us from the range of capital letters to the range of small letters.

The ASCII (American Standard Code for Information Interchange) code assigns a unique number to each character in the basic ASCII character set, which includes English letters (capital and lowercase), digits, punctuation, and some control characters. The ASCII code for a character is stored as a 8-bit binary number, with each bit representing a different weight in the decimal representation of the code.

Learn more about ASCII code here:

https://brainly.com/question/11842595

#SPJ4

What is the code for CodeHS 4.8.5 factorial? I searched everywhere for the answer but I can't find it.

Answers

Some of the discovered problems with your code after debugging are:

You're not using the range function correctly. Range is range(start, stop, increment). So if the input is 4, your range is range(3,4,1). Start at 3, stop at 4, and increment by 1.So, given the range, your loop is only iterating once

What is Debugging?

Debugging is the process of identifying and fixing defects in computer programs, software, or systems. It is a crucial step in computer programming and software development.

Looking at your code, it is discovered that you have problems with the range function, for loop, and calculation and some possible solutions are given above.

Read more about debugging here:

https://brainly.com/question/15079851

#SPJ1

which of the following are not proper or legal identifiers in java for you to use in your program? give the letters of those which are not allowed in java a. somestring b. myage c. 4aces d. a long identifier with letters and 12345678 numbers e. max value f. public g. isletterordigit h. your age

Answers

The following cannot be used as legitimate or legal identifiers in Java: a. "4aces" (starts with a number) c. "4aces" (starts with a number) (starts with a number), "max value," e. (contains a space), "Your age," h (contains a space).

What is Java used for?

Java is a programming language used by programmers to create programmes for computers, server farms, game consoles, scientific quantum computers, mobile phones, and other gadgets. Based on the Forbes list, which ranks the popularity of programming languages, Java is the third most used programming language in the world, after Python and C. Only letters, digits, underscores, and dollar signs are permitted as identifiers in Java, and they must begin with one of those characters. Furthermore, Java has a list of special characters like "public" that are not allowed to be used as identifiers. It is advised to use camelCase or PascalCase standards and meaningful, illustrative names for your identifiers.

To know more about Java Visit:

brainly.com/question/12978370

#SPJ4

5. one control against accidental software deletion is to save all old versions of a program. of course, this control is prohibitively expensive in terms of cost of storage. suggest a less costly control against accidental software deletion. is your control effective against all possible causes of software deletion? if not, what threats does it not cover?

Answers

Tracking and regulating software modifications is the responsibility of software configuration management (SCM). It would be successful in preventing programme deletion from any potential reasons.

Systems are exposed because they may be accessed at any point along the link since they are interconnected. This interconnectedness raises the risk of fraud, abuse, misuse, and unauthorised access to confidential and sensitive information. an unreliable server An unreliable server is a vulnerability. An exploitable weakness or absence of a defence, such as a USB port that is enabled on the server hosting the database, is known as a vulnerability. Protection of information. protection against unauthorised use, disclosure, modification, interruption, removal, and destruction of data and information systems.

To learn more about software click the link below:

brainly.com/question/1022352

#SPJ4

10. what does a domain model class diagram show about system requirements, and how is it different from an erd?

Answers

The class diagram itself is the main diagram of The Unified Modeling Language which is used to show classes or objects in a system. while ERD is a model to explain the relationship between data in a database based on basic data objects that have relationships.

Definition of The Unified Modeling Language

The Unified Modeling Language (UML) is a standard set of language in diagramming techniques for the development of object-oriented systems. UML has a function to help describe and design software systems, especially systems built using object-oriented programming

The class diagram itself is the main diagram of UML which is used to describe classes or objects in a system. Analysis of the formation of class diagrams is the beginning of designing a program.

Domain Modeling is a technique for identifying objects in nouns contained in the list of requirements classified in the same problem area (domain) to be used as candidate classes in the class diagram.

Learn more about the Unified Modeling Language at: https://brainly.com/question/15078406

#SPJ4

what is another solution to ip exhaustion that will create more public ip addresses as it is implemented? multiple choice, shuffle

Answers

Lease IPv4 address and deploy IPv6 address is another solution to ip exhaustion that will create more public ip addresses as it is implemented.

What is an IP adress?

The IP address is a unique name that will be added to the device. This is to identify the user that will be using the Internet and provide them with a unique set of IDs. All the Internet protocol address need to follow there set of the rules and the regulations that are being set.

In order to avoid IP address depletion, the organization must actively seek for options. There are various options like the deploy IPv6 addresses or even use the Lease IPv4

Learn more about IP adress, Here:

https://brainly.com/question/16011753

#SPJ1

you want to apply the filter() function to the variables cocoa.percent and rating. add the code chunk that lets you filter the new data frame for chocolate bars that contain at least 80% cocoa and have a rating of at least 3.75 points. 1 run reset how many rows does your tibble include?

Answers

Here's the code to filter the data frame for chocolate bars with at least 80% cocoa and a rating of at least 3.75:

chocolate_bars <- chocolate_bars %>%

 filter(cocoa.percent >= 80 & rating >= 3.75)

To find out the number of rows in the filtered data frame, you can use the nrow() function:

n_rows <- nrow(chocolate_bars)

The n_rows variable will then contain the number of rows in the filtered data frame.

The number of rows included in the tibble after filtering would depend on the original data in the chocolate_bars data frame. If the original data contained many chocolate bars with less than 80% cocoa or a rating below 3.75, then the filtered data frame would have fewer rows.

Learn more about coding: https://brainly.com/question/20712703

#SPJ4

the means by which you convey a message is known as a communication ________

Answers

Information, thoughts, feelings, and opinions are exchanged between people or groups through communication.

What is communication?It entails communicating from a sender to a receiver by using signs, symbols, and language. There are several ways to communicate, including verbally, nonverbally, in writing, or by using technology. Mutual comprehension between the sender and the receiver is necessary for effective communication, and the message should be delivered in a way that the recipient can grasp it.In both personal and professional relationships, effective communication is essential to establishing trust, resolving disputes, and achieving shared objectives. Communication needs to be succinct, clear, and audience-specific in order to be effective.The passing of messages is considered communication. Everything we do in our relationships starts with communication. Oral or written words can be used to convey messages. Use of symbols, gestures, expressions, and body language are all examples of nonverbal communication.

To Learn more About communication Refer To:

https://brainly.com/question/25645043

#SPJ4

what is it called when a hacker gets into a system through a secret entryway to gain remote access to the computer?

Answers

Answer:

a back door

Explanation:

hi, hope this helps love <3

Select all that apply. To create a Python program, you can use a. a text editor, Notepad, Idle, b. a word processor if you save your file as a .docx C. IDE, Visual studio, eclipse d. Excel, PowerPoint, pdf ANS

Answers

To create a Python program, you can use

a. a text editor, Notepad, Idle

c. IDE, Visual Studio, Eclipse

What is the Python program about?

You can create a Python program using a text editor such as Notepad or an Integrated Development Environment (IDE) such as Visual Studio or Eclipse.

Therefore,  based on the above, one can say that a word processor such as Microsoft Word or a presentation software such as PowerPoint or PDF is not the recommended tool for creating Python programs.

Learn more about Python at:

https://brainly.com/question/26497128

#SPJ1

How to solve eror: array must be initialized with a brace-enclosed initializer

Answers

A comma-separated set of constant expressions encased in braces () serves as an array's initializer. An equal symbol (=) is placed in front of the initializer. Not every element in an array needs to be initialised.

The array will have random values at each memory place if it is not initialised at the moment of declaration or at any point thereafter. Because zero is the default value for omitted array elements, the compiler will set the first array element to the value you've specified (zero) and all remaining array elements will also be set to zero. 0 for char ZEROARRAY[1024]; The unwritten entries would be filled with zeros by the compiler. As an alternative, you might launch the programme with memset to initialise the array: ZEROARRAY, 0 0 1024;

To learn more about array's click the link below:

brainly.com/question/19570024

#SPJ4

What is remote viewing CCTV?

Answers

The full form of CCTV is generally known as closed circuit television.

What is CCTV?

CCTV is an abbreviation for closed circuit television and it can be defined as a television system that makes use of video cameras to privately transmit digital signals to a specific location (place), especially for the purpose of security surveillance and monitoring of an environment.

The importance of CCTV is that it ultimately implies that, a closed circuit television (CCTV) is primarily used for enhancing the security of a location wherein it is installed.

Therefore, The full form of CCTV is generally known as closed circuit television.

Learn more about CCTV on:

brainly.com/question/23348225

#SPJ1

Other Questions
a software vendor has a good understanding of the features required in the next release of a software product, but the marketing group has set a very aggressive delivery date. which type of life cycle model might the software engineering product manager choose? the nurse is preparing to care for a patient who has myasthenia gravis. the nurse will be alert to symptoms affecting which body system in this patient? which science writer and philosopher showed that humans do not naturally develop the scientific method FILL IN THE BLANK. creb is a transcription factor that binds to the (-response element). it is involved with the transcription of hundreds of genes based on the levels in the cell. when levels are high, creb is ___ , which allows it to bind to ___ . this binding connects the (-response element) to the basal transcription machinery, stimulating transcription. some customers presented tickets purchased on a previous day when there wasn't a ticket taker at the theater entrance (so the tickets didn't get torn). b) a group of kids snuck into the theater through a back door when customers left after a show. c) the ticket taker admits his friends without tickets. d) the box office cashier accidentally gives too much change to a customer. the superior portion of the nasal septum is formed by the___ true/false. apush gilded age dbq evaluate the extent to which technology transformed the us economically and socially during the period 1865 to 1898 Which structure is composed of axons that enable the hemispheres to communicate? what is unusual about endocannabinoids or endogenous cannabinoids? what is unusual about endocannabinoids or endogenous cannabinoids? they are retrograde messengers by which postsynaptic neurons act on presynaptic terminals. they contain a chemical structure called catechol. they float in the membrane like adenylyl cyclase. they play an important role in the brain systems that regulate mood. Perform the following conversions: (Show work on back of page for this problem only). 98.6 oF = __________ oC = __________ K _________ oF = 25.0 oC = __________ K _________ oF = __________ oC = 405 K How is treatment for atypical squamous cells of undetermined significance? how is marine insurance different from automobile insurance which of the following best describes how the money supply responds to changes in the nominal interest rate? choose 1 answer: choose 1 answer: (choice a) a the quantity of money supplied increases as the interest rate increases. (choice b) b the quantity of money supplied decreases as the interest rate increases. (choice c) c the quantity of money decreases as the interest rate increases up to a point, and then increases. (choice d) d the money supply is independent of the interest rate. (choice e) e the quantity of money increases as the interest rate increases up to a point, and then decreases. Why very few subsistence economies exist today Which of these souvenirs do you think costs more?Gifts for all your friendsPostcards for all your friends one problem psychologists have with using personality types is they question 8 options: a) oversimplify personality. b) describe character, not personality. c) are hereditary constructs. d) are not observable or measurable. Which three structures are possessed by all bacteria?a. chromosomes b. cell membranec. ribosomes g suppose 50 students took an exam and the average score was 70 with a standard deviation of 10. use 68-95-99.7 rule for questions dealing with normal distribution. if the distribution of scores is perfectly normal, how many students would you expect to get an a? (a score between 90 and 100) round up to nearest whole number. the kaseya vsa uses several different groupings to create logical structure to stored data. which of these represents an accurate grouping? which of the following terms refers to an agreement that specifies performance requirements for a vendor?