a virus is a computer program that replicates itself. the program code that causes unwanted activity is called the .

Answers

Answer 1

The program code that causes unwanted activity in a virus , A virus is a computer program that replicates itself.

A virus is a type of computer program that has the ability to replicate itself and spread from one computer to another. It typically enters a computer system through various means, such as email attachments or infected websites. Once inside, the virus executes its code and performs unwanted activities.

Which can include damaging files, stealing information, or disrupting the normal operation of the computer. The code responsible for these unwanted activities is known as the "main answer" in the context of viruses.

To know more about virus visit:

https://brainly.com/question/27172405

#SPJ11


Related Questions

what type of data can be entered into a electronic spreadsheet

Answers

Answer:  Labels (text) are descriptive pieces of information, such as names, months, or other identifying statistics, and they usually include alphabetic characters.

Values (numbers) are generally raw numbers or dates.

Explanation: Google.!

Does anyone know where i could watch the move
“little house: look back to yesterday” i cant find it ANYWHERE!!!!

Answers

Answer:

AMC Rosemary Square 12 and Apple The Gardens Mall and Muvico Theaters Automatic Ticketing and Rosemary Square and Apple Wellington Green and Walmart Supercenter

Explanation:

select all the true statements about the memory hierarchy and caches. group of answer choices caching is effective because it exploits the principle of special locality caching is a method of speeding up the execution of programs a cache would be faster if is constructed from sram rather than dram caching is effective because it exploits the principle of temporal locality

Answers

All of the statements about the memory hierarchy and caches are true.


Caching is an effective method of speeding up program execution because it takes advantage of the principle of spatial and temporal locality.

Spatial locality refers to the idea that data that is accessed together tends to be stored together, and temporal locality refers to the idea that data that has been accessed recently is likely to be accessed again in the near future.

A cache is a small amount of fast memory that sits between the processor and the main memory, and stores frequently accessed data.

A cache constructed from SRAM (Static Random Access Memory) will be faster than one constructed from DRAM (Dynamic Random Access Memory), because SRAM is faster and more expensive.

Learn more about  memory hierarchy:

https://brainly.com/question/29907498

#SPJ11

2.9.8 stop light codehs
I cant figure out how to do this stop light function on codehs help
(this is the assignment)
Write a program that prompts the user for a color: red, yellow, or green (the colors of a stoplight). Then using if statements and else statements, print the user a message describing what they should do. For example if the color was red, you could say something like, “Red light: you should stop.”

As a bonus, see if you can use “else if” in this problem. Check out “else if” in the “Docs” tab.

You may assume the user will only input “red”, “yellow”, or “green”. You do not have to worry about other colors, or mixed capitalization such as “blue” or “ReD”, but you can make your program handle these cases if you wish!

Answers

The program illustrates the use of conditional statements

Conditional statements are statements used to make comparison and decisions

How to write the program?

The program written in Python, where comments are used to explain each action is as follows:

#This gets input for the color

color = input("Color: ").lower()

#This checks if the input is red

if color == "red":

   print(“Red light: you should stop.”)

#This checks if the input is yellow

elif color == "yellow":

   print(“Yellow light: you should get ready.”)

#This checks if the input is green

elif color == "green":

   print(“Green light: you should go.”)

#This checks for invalid input

else:

   print(“Invalid")

Read more about Python programs at:

https://brainly.com/question/24833629

What is output? Select all that apply.
C=0.
while (c < 5):
c = c + 1
print(c)

Answers

Answer:

Since we didn't print it at the beginning, we can assume that the program will start printing to the console at the number: 1. After that, it continues right before hitting 5. Proving the output of the program will be the following:

1

2

3

4

Jason Diaz is a financial advisor who works in an open office with coworkers nearby. Jason advises clients both in person and over the phone, as well as by using videoconferencing. What types of input and output devices might Jason require on his computer to do his job? Which input and output devices do you feel are necessary, and which ones do you feel would be nice to have? Given the sensitive nature of the information Jason might be displaying and using, are there any other hardware components you might recommend to make sure Jason's clients' information is protected? Justify

Answers

Answer:

There is a need for a microphone and a speaker in the form of a headset for privacy, also, the conventional keyboard and monitor screen. For information security, a configured firewall is recommended to prevent hacking.

Explanation:

Input and output devices are tools used by an operator of a computer device to give instructions and monitor results respectively.

Jason would need a headset, which has a speaker for hearing and a microphone for speaking to the client on a video conference call. These I/O devices are readily available on some personal computers. Every computer system has a keyboard and a monitor, this is also useful for Jason for communicating with his client.

6.36. Four kilograms of steam in a piston/cylinder device at 400kPa and 175 ∘
C undergoes a mechanically reversible, isothermal compression to a final pressure such that the steam is just saturated. Determine Q and W for the process.

Answers

To determine Q (heat transfer) and W (work) for the given process, we can use the first law of thermodynamics:

Q = ΔU + W

where ΔU is the change in internal energy of the system.

For an isothermal process, the change in internal energy (ΔU) is zero since the temperature remains constant. Therefore, the equation simplifies to:

Q = W

Now let's calculate the work done:

Work done (W) = P_initial * V_initial * ln(V_final / V_initial)

Given:

P_initial = 400 kPa

V_initial = (mass of steam) / (density of steam at initial conditions)

V_final = (mass of steam) / (density of saturated steam at final pressure)

To calculate the specific volume (V), we can use the steam tables or properties of water and steam at different conditions.

Once we have the specific volumes at initial and final conditions, we can calculate W using the equation mentioned above.

To calculate Q, we can use Q = W since it is an isothermal process.

To know more about temperature visit-

https://brainly.com/question/14532989

#SPJ11

Complete the statement below using the correct term.
Website managers use
every day​

Answers

Answer:

computers

Explanation:

Answer: Computers, Internet and Printers

Reason: Because they use computers, Internet and Printers to do office things.

1. Describe the problem.
2. Record related information from your research. List the sources that you used.
3. Establish criteria, and list criteria in order of importance.
4. Identify possible solutions.
5. Draw prototypes/models in the space below when necessary.

Answers

Record related information from your research. List the sources that you used.

Record related information from your research. List the sources that you used.3. Establish criteria, and list criteria in order of importance.

Record related information from your research. List the sources that you used.3. Establish criteria, and list criteria in order of importance.4. Identify possible solutions.

Record related information from your research. List the sources that you used.3. Establish criteria, and list criteria in order of importance.4. Identify possible solutions.5. Draw prototypes/models in the space below when necessary.

please mark me brainlist answer

Decrypt the message NXGQWFSLXG which was encrypted using the affine cipher: f(p)=(11p+5)mod26 Alphabet: A=0,B=1,…,Z=25 Message: You have attempted this problem 2 times. Your overall recorded score is 0%. You have unlimited attempts remaining.

Answers

One can  be able to decrypt the entire message "NXGQWFSLXG" as "XJTHDQVZJM".

What is the message about?

To decrypt the message "NXGQWFSLXG" that was encrypted using the affine cipher with the given encryption function f(p) = (11p + 5) mod 26, one need to know  the inverse function that undoes the encryption process.

Within the relative cipher, the encryption work is f(p) = (a * p + b) mod 26, where "a" and "b" are the key values. To decrypt the message, we got to discover the inverse function of this encryption work.

Learn more about Decryption from

https://brainly.com/question/31177004

#SPJ4

When working with Sendmail, what command can be used to test SMTP support?

Answers

Answer:

"HELO" would be the correct choice.

Explanation:

SMTP seems to be the protocol for transferring emails through one messaging service toward the next. HELO seems to be an SMTP command transmitted by someone with an email server that recognizes yourself when you communicate to some other email server to begin the mail transmitting procedure. It is accompanied either by a domain name including its email address that is sent.

Answer:

HELO/EHLO.

Explanation:

Simple Mail Transfer Protocol (SMTP) is a protocol followed while sending an electronic mail or receiving it. It is a TCP/IP protocol (a protocol used to interconnect in communication protocols).

To test Simple Mail Transfer Protocol (SMTP), the HELO/EHLO command is used. There are several other commands in SMTP, which is used to communicate properly.

The HELO command is a type of command in SMTP which is used to test or initiate SMTP communication. HELO/EHLO are the commands which are used to test SMTP communication. They are used interchangebaly.

Thus the correct answer is HELO/EHLO command is used to test SMTP support.

vendor builds multiple types of tablet computers. Each has a type identification number and a name. The key specifications for each type include amount of storage and display type. The company uses multiple processor types, exactly one of which is used for a specific tablet type. The same processor can be used in multiple types of tablets. Each processor has a manufacturer and a manufacturer's unique code that identifies it.

Answers

Answer:

ARM processor

Explanation:

The processors can be shared across different tablet types and are characterized by a manufacturer and a unique code.

How does the company assign processors to tablet types?

The company assigns processors to different tablet types based on their specific requirements. Each tablet type is associated with exactly one processor, chosen from the available options.

This ensures that the tablets are equipped with processors that meet their performance and compatibility needs. Multiple tablet types may utilize the same processor if it satisfies their respective specifications. The processors themselves are identified by their manufacturer and a unique code, allowing for easy identification and tracking within the company's inventory and production systems.

Read more about processors

brainly.com/question/614196

#SPJ2

which method call would print the items in a perfect size array? assume shoppinglist is a perfect sized array, and printitems is a function that printsa.printitems(shoppinglist, listsize);b.shoppinglist

Answers

The method call that would print the items in a perfect size array is a. `printitems(shoppinglist, listsize)`.

Given that shoppinglist is an array that is of a perfect size and print items is a function that prints. So, the call to printitems function will print the contents of shoppinglist which are of a perfect size. Below is the detailed explanation; We are given that the array shoppinglist is of a perfect size. We are also given that there is a function named printitems which prints items. And finally, we are given two options:a. `printitems(shoppinglist, listsize);`b. `shoppinglist`The option that would print the items in a perfect size array is option a `printitems(shoppinglist, listsize);`. This is because the printitems() function takes two parameters, the first is the array shoppinglist which contains the items to be printed and the second is listsize which specifies the size of the array. Since shoppinglist is already of the perfect size, we can just pass it along with its size to the printitems() function and it will print the contents of the array. Therefore, option a is the correct option.

Learn more about Array here:

https://brainly.com/question/31605219

#SPJ11

What is output?
C = 1
sum 0
while (c < 10):
c = c + 3
sum
sum + C
print (sum)

Answers

Answer:The French and Dutch settlements differed from the Spanish colonies in that they were created mainly to trade and develop industries, while the Spanish were primarily concerned with gold and silver excavation, and then later with sugar exportation.

Explanation:The French and Dutch settlements differed from the Spanish colonies in that they were created mainly to trade and develop industries, while the Spanish were primarily concerned with gold and silver excavation, and then later with sugar exportation.

Why should we follow the codes of conduct while using technology that provides us information

Answers

Codes of conduct are guidelines that outline appropriate behavior and actions when using technology. They are established to ensure that the use of technology is ethical, responsible, and respectful of others. Following codes of conduct while using technology that provides information is important for several reasons:

Respect for privacy and personal information: Codes of conduct help protect individuals' privacy and personal information, by outlining guidelines for collecting, storing, and sharing data.

Ethical use of information: Codes of conduct help ensure that the information provided is used ethically and in a manner that is not harmful to others.

Fairness and accuracy: Codes of conduct help ensure that information is presented in a fair and accurate manner, avoiding bias, manipulation and spreading misinformation.

Maintaining trust: By following codes of conduct, individuals and organizations can maintain the trust of the public by being transparent and accountable in their use of technology and information.

Compliance with laws and regulations: Codes of conduct also help individuals and organizations comply with laws and regulations related to the use of technology and information.

Overall codes of conduct help to promote responsible and ethical behavior in the use of technology and information, which can have a positive impact on society as a whole.

at what layer of the osi model does a network switch normally operate? a. layer 5 b. layer 3 c. layer 4 d. layer 2

Answers

Answer:

D. Layer 2

Explanation:

It is layer 2.

To learn more:

https://brainly.com/question/26299918?referrer=searchResults

Hope this helps!

Convert 1100 1001 to a decimal number.
Need help

Answers

Answer:

-28 and 1001 1010 = -26. Got to love. binary

Which initial value of number would cause the loop to be skipped?
REPEAT UNTIL(number MOD 2 = 0)
{
number ← number - 1
}
1.Any positive integer.
2.Any negative integer.
3.Any even integer.
4.Any odd integer.

Answers

The initial value of the number that would cause the loop to be skipped is option 3 - any even integer. The reason for this is that the loop condition requires the number to be divided by 2 and have a remainder of 0, which means it must be an odd number. Therefore, if the initial value is an even number, it would not satisfy the loop condition and the loop would be skipped entirely.

To further explain, the loop starts with the initial value of the number and checks if it is an odd or even number. If it is odd, it subtracts 1 from the number until it becomes an even number. Once the number is even, it checks again if it is odd or even and repeats the process until it becomes an odd number. Once the number is odd and satisfies the loop condition of having a remainder of 0 when divided by 2, the loop will stop. In conclusion, any even integer would cause the loop to be skipped as it would not satisfy the loop condition and the loop would not run at all. This highlights the importance of understanding loop conditions and initial values when writing code to avoid unexpected results.

Learn more about even integer here:

https://brainly.com/question/14614572

#SPJ11

________-oriented architecture is a software architecture in which business processes are broken down into individual components that are designed to achieve the desired results for the service consumer.

Answers

The Answer is Service

Whose work is responsible for the invention of the air bag? Scientist, Engineers or both?

Answers

The scientist and the engineers were both responsible for the invention of the airbag.

Peter Florhancicn was a scientist and he invented the airbag because of the Dutch people who drowned when they drove into the canals

Also, John Hetrick who was an engineer filed for the patent of airbags when he saw that deers were running across the road. He believed that it could cause an accidentthat led to the invention.

In conclusion, both the engineers and the scientists were responsible.

Read related link on:

https://brainly.com/question/24686827

2. Media sharing websites let you post photos and videos to share with other people. What are the benefits and drawbacks of using these websites?

Answers

Media sharing websites let you post photos and videos to share with other people. The benefit is that we are up to date and get all the news as well as information worldwide.

What is company's website?

The website of the company is all web sites which is operated by any occupied company or via any occupied company conducts the business. Any business website is a website that is designed in such a way that it can represent the identity of a business on the internet.

Company's name and fame id totally depends upon advertisement and its products and websites play an important role in order to make company popular and due to this reason company used the website or designed the website in unique and knowledgeable manner.

Therefore, Media sharing websites let you post photos and videos to share with other people. The benefit is that we are up to date and get all the news as well as information worldwide.

Learn more about website here:

https://brainly.com/question/19459381

#SPJ2

how can development in ICT be utilized to speed up the development and integration efforts

Answers

Answer:

Explanation:

1.  Sustainability and scale

2.  Lack of knowledge

 

3. Pace of change

4.  Funding

5. Changing roles and norms

hello everyone! can anybody help me? i need help with computing.
what is a pseucode?
please answer me ​

Answers

Answer:

a pseu code is a is an artificial and informal language that helps programmers develop algorithms.

Explanation:

Peer-reviewed journals that are published in electronic format and allow increased access are referred to as

Answers

Answer:

open access journals

Explanation:

What is a PowerPoint template?​

Answers

Answer:

there are lots of templates

each and every one is for a special purpose

some are designed for business while some are designed for schoolwork

a PowerPoint template is just a range of templates to choose from depending on the purpose and way you are writing

Explanation:

Answer:

a special template depending on what you want to use it for

Explanation:

QUESTION 1
a) Describe the main differences between cross-sectional data and
panel data.
b) What are censoring and truncation problems in data
analysis?
c) Explain the Method of least square and its

Answers

Answer:

a) Cross-sectional data refers to data collected at a specific point in time from different individuals, entities, or observations. It provides a snapshot of information about different variables for a particular sample or population at a given moment. Panel data, on the other hand, involves collecting data from the same individuals, entities, or observations over multiple time periods. It allows for the analysis of individual or entity-specific changes over time, capturing both within-individual variations and cross-sectional differences.

The main differences between cross-sectional data and panel data are:

-Time Dimension: Cross-sectional data captures information at a single point in time, while panel data includes data collected over multiple time periods.

-Variation: Cross-sectional data captures variation across different individuals or entities at a specific point in time, whereas panel data captures both cross-sectional variation and within-individual or within-entity variation over time.

-Analysis Scope: Cross-sectional data is more suited for studying the differences and relationships between different individuals or entities at a given time, while panel data allows for the examination of changes within individuals or entities over time.

b) Censoring and truncation are two common issues encountered in data analysis, particularly in survival analysis or studies involving time-to-event data.

Censoring: Censoring occurs when the exact value of an event time is not observed or known for some individuals in the dataset. It can happen due to various reasons, such as the study ending before the event occurs, loss to follow-up, or the event not occurring during the study period. Censoring is classified into three types:

-Right Censoring: The event of interest has not occurred for some individuals by the end of the study, and their event times are unknown, but it is known that the event will occur after a certain point.

-Left Censoring: The event of interest has already occurred for some individuals before the study started, and their event times are unknown.

Interval Censoring: The event of interest occurs within a specific time interval, but the exact time of occurrence is unknown.

Truncation: Truncation occurs when only a subset of the population under study is included in the dataset, leading to incomplete or biased observations. It can arise due to selection criteria, study design, or other factors. Truncation can be classified into two types:

-Left Truncation: The event of interest has already occurred for some individuals before they entered the study, resulting in their exclusion from the dataset.

-Right Truncation: The event of interest has not occurred for some individuals by the end of the study, resulting in their exclusion from the dataset.

c) The Method of Least Squares (OLS) is a statistical technique used to estimate the parameters of a linear regression model. It aims to find the best-fitting line that minimizes the sum of the squared differences between the observed values and the predicted values.

In OLS, the following steps are typically followed:

1. Formulate the regression model: Define the relationship between the dependent variable and the independent variables in the form of a linear equation.

2. Specify the error term: Assume that the relationship between the variables can be captured by a linear equation plus a random error term.

3. Collect data: Gather the necessary data for the dependent variable and independent variables from the sample or population of interest.

4. Estimate the coefficients: Use the collected data to estimate the coefficients (slopes) of the independent variables in the linear equation. This estimation is done by minimizing the sum of the squared differences between the observed values and the predicted values.

5. Assess the model: Evaluate the goodness of fit of the estimated model by examining statistical measures such as the coefficient of determination (R-squared), significance of coefficients, and diagnostic tests.

6. Interpret the results: Interpret the estimated coefficients and their significance in terms of the relationship between the variables in the model.

"What is the longest time (with extensions) a developer can have to file a final map after receiving tentative map approval?"

Answers

Answer:

The answer is "Five years (Two years)".

Explanation:

It supplies with proactive maps of approved modifications beyond the limits of plan may be expanded by the submission of final maps, reflecting the stages of the initial proactive plan, up to ten years with both the chief administrator.

Its provisional submission of a map, that will include the request forms or other resources provided at the request of the city administrator and the office.  It also allows the phasing for the current map, that has been accepted.

Why is it a good idea not to change the subject line when replying to a message?
O so that the reply is sent to the original sender
O so that the reply does not bounce back as undeliverable
O so that the reply matches with the sender's original message
O so that the reply does not inadvertently include unintended recipients

Answers

Answer:

C. so that the reply matches with the sender's original message.

Explanation:

The Sender Message Channel Receiver (SMCR) model of communication was developed and created by David Berlo in 1960. SCMR was developed from the Shannon-Weaver model of communication of 1949.

The SCMR model of communication comprises of four (4) main components and these are;

1. Sender (S): this is typically the source of information (message) or the originator of a message that is being sent to a receiver. Thus, they are simply the producer of a message.

2. Channel (C): this is the medium used by the sender for the dissemination or transmission of the message to the recipient. For example, telephone, television, radio, newspapers, billboards etc.

3. Message (M): this is the information or data that is being sent to a recipient by a sender. It could be in the form of a video, audio, text message etc.

4. Receiver (R): this is typically the destination of information (message) or the recipient of a message that is being sent from a sender. Thus, the receiver is any individual who is able to read, hear or see and process the message being sent or communicated in the communication process.  

Basically, the communication channel used in SCMR must connect the sender with the desired recipients.

Hence, it is a good idea not to change the subject line when replying to a message, so that the reply matches with the sender's original message.

Answer:

Explanation:

Its C not B

dns is a network of decentralized servers that translate urls (uniform resource locators) into ip address. true false

Answers

Dns is a network of decentralized servers that translate urls (uniform resource locators) into ip address ---- True

DNS Stands for :

DNS, or Domain Name System, translates human-readable domain names (such as www.amazon.com) into machine-readable IP addresses.

What is the IP address of your DNS server?

The Domain Name System (DNS) is the name database where Internet domain names are found and translated into IP (Internet Protocol) addresses. The Domain Name System maps the name that users use to look up her website to the IP address that computers use to look up that her website.

Is DNS the same as IP address?

Web browsers use Internet Protocol (IP) addresses to interact. DNS translates domain names into IP addresses and allows browsers to load Internet resources. Every device connected to the Internet has a unique IP address that other computers use to find the device.

Learn more about DNS :

brainly.com/question/17952402

#SPJ4

Son aplicaciones desarrolladas específicamente para realizar actividades otareas que se llevan a cabo en oficinas o en educación.

Answers

Las herramientas ofimáticas son aplicaciones desarrolladas específicamente para realizar actividades o tareas que se llevan a cabo en oficinas o en educación.

Estas son las diversas computadoras y software que se utilizan para crear, recopilar, almacenar, manipular y transmitir digitalmente la información necesaria para realizar tareas básicas en los ámbitos educativos o comerciales.  

Al automatizar las operaciones de la oficina, es posible lograr una mayor cantidad de tareas más rápido; además elimina la necesidad de una gran cantidad de empleados; y permite que se requiera menos espacio de almacenamiento de datos.

Aprende más en https://brainly.com/question/21750706

Other Questions
100 points!! Its for a T-Chart, I need the answer for each question, regarding electric fields and magnetic fields. explain why at high frequencies a capacitor acts as an ac short, whereas an inductor acts as an open circuit. QuestionNew Orleans has 283 hotels with a population of 391, 006. If Atlanta was proportional to New Orleans in hotels topopulation and Atlanta has a population of 498, 000, how many hotels will Atlanta have? Round to the nearest wholenumber. Name of the important art works of Roman era. Psychologists use the term _____ to describe decreasing responsiveness with repeated stimulation. This phenomenon is seen in infants when they gain familiarity with repeated exposure to a stimulus: Their interest wanes and they look away sooner. which of the following has occurred in international trade over the past half-century? there has been a dramatic increase in the barriers to international trade. regulations prohibiting foreign companies from entering domestic markets and establishing production facilities have increased. tariff rates on manufactured goods traded by advanced nations have fallen. the volume of world trade has decreased dramatically. there has been a decline in the value of foreign direct investment. What is a health concern that affects your community and interests you? Research programs that exist in your community to address this concern. If one exists, what did you learn about it? Consider these points: What are some potential downsides/missing pieces/barriers to entry? How might you improve upon this program? If one does not exist, what kind of program would you create? A roadway rises 3ft every 10 ft along the road what is the angle of inclination of the roadway After his Political Science class, Andre only remembered the parts of his professor's lecture that he agreed with. This is an example of selective Five years ago, Diane secured a bank loan of $300,000 to help finance the purchase of a loft in the San Francisco Bay area. The term of the mortgage was 30 yr, and the interest rate was 12%/year compounded monthly on the unpaid balance. Because the interest rate for a conventional 30-yr home mortgage has now dropped to 10%/year compounded monthly, Diane is thinking of refinancing her property. How much less would Diane's monthly mortgage payment be if she refinances? Please round the answer to the nearest cent. a.$536.51 b.$531.06 c.$514.64 d.$513.59 e.$508.66 The following data relate to notes receivable and interest for CGH Cable Co., a cable manufacturer and supplier. (All notes are dated as of the day they are received.)Apr. 10.Received a $144,000, 5%, 60-day note on account.May 15.Received a $270,000, 7%, 120-day note on account.June 9.Received $145,200 on note of April 10.Aug. 22.Received a $150,000, 4%, 45-day note on account.Sept. 12.Received $276,300 on note of May 15.30.Received a $210,000, 8%, 60-day note on account.Oct. 6.Received $150,750 on note of August 22.18.Received a 120,000, 5%, 60-day note on account.Nov. 29.Received $212,800 on note of September 30.Dec. 17.Received $121,000 on note of October 18.Journalize the entries to record the transactions. Refer to the Chart of Accounts for exact wording of account titles. Help with Alex Murdaugh questions steve, an engineer in a construction company, is at present working on a home construction project. the home is being built for the robinson family, the owners of the home. steve is working with his project team and support staff to ensure the project is completed on time. in such a scenario, the project sponsor is . select one: a. the project team b. the support staff c. steve d. the robinson family Iris Company has provided the following information regarding two of its items of inventory at year-end: There are 200 units of Item A, having a cost of $10 per unit, a selling price of $14 and a cost to sell of $6 per unit. There are 150 units of Item B, having a cost of $40 per unit, a selling price of $46 and a cost to sell of $4 per unit. How much is the ending inventory using lower of cost or net realizable value on an item-by-item basis?A. $8,350. B. $8,750. C. $8,000. D. $7,600. 7.1.5 Quiz: State and Local CourtsQuestion 7 of 10Which case will most likely be heard in a municipal court?A. A bitter divorce caseB. A trial for murderC. A declaration of bankruptcyD. An appeal from a lower courtSUBMIT Roberto went to a grocery store to buy his favorite brand of soft drink; however, the store was temporarily out of that brand, so he looked over the other familiar brands and decided to try one that is well-advertised. This case illustrates: are marketing objectives that include goals related to increasing or maintaining sales volume and market share. would ti be possible ot manufacture cel phones ni the united states fi a world crisis prevented ti from importing minerals and elements? yes no. what evidence from fig. 3.23 supports your answer? a 135-kg k g astronaut (including space suit) acquires a speed of 2.70 m/s m / s by pushing off with her legs from a 1900-kg k g space capsule. use the reference frame in which the capsule is at rest before the push.A) What is the velocity of the space capsule after the push in the reference frame? B)If the push lasts 0.660 s , what is the magnitude of the average force exerted by each on the other? C)What is the kinetic energy of the astronaut after the push in the reference frame? D)What is the kinetic energy of the capsule after the push in the reference frame? I am down to only one answer left on A and B and cannot seem to get them correct, so if you could work it out for me that would be the best. Thank you. What are the three questions that managers can use to distinguish a winning strategy from a so-so or flawed strategy