assume four possible responses to an error situation by the system: a) provide contextual information regarding the situation; b) let the user decide the best course of action without interference; c) suggest a course of action and ask if it should be executed; and d) provide contextual information regarding the situation and contact information for a human expert. which is the preference order for these courses of action by the system according to the human-computer collaboration model?

Answers

Answer 1

The four possible system responses to an error situation would be prioritised in the following order by the human-computer collaboration model: D - Offer a plan of action and inquire as to whether it should be carried out.

A system encounters an error when it performs incorrectly or yields unexpected outcomes. Several things, including programming errors, hardware malfunctions, user error, or environmental variables, might result in these issues. Depending on the situation, errors can significantly affect user experience, productivity, and even safety. In order to minimise the negative effects of errors and keep users' trust in the system, effective error handling is essential. Offering context, recommending a course of action, providing contact information for human specialists, or letting the user choose how to proceed are all appropriate responses to problems.

Learn more about  error situation here:

https://brainly.com/question/14056874

#SPJ4


Related Questions

ways you will use to reach all pupils who are living at a

disadvantaged area

Answers

Answer:

?

im confused

Explanation:

in a file problem1.java implement a static method with the signature: public static int pow(int x, int n); your method should recursively calculate the value of x^n (x raised to the n power). you may assume that x and n are both positive integers and you do not have to error check the parameters. hint: set up a simple recursion similar to how we setup the factorial recursion in class. write a main method within problem1.java that tests the method out on a few different values of x and n.

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that function for the following statements: Java do-while Use Java do-while loop format.

Writting the code:

import java.util.*;

public class Main

{

   //recuresive function for calculate x^n

   public static int pow(int x,int n){

       if(n==0)

           return 1;

       else

           return x*pow(x,n-1);

   }

   

public static void main(String[] args) {

             //scanner for taking input

 Scanner sc=new Scanner(System.in);

             //infinite loop stop when user enter Y in last

 while(true){

 System.out.print("Enter x: ");

 int x=sc.nextInt();

 System.out.print("Enter n : ");

 int n=sc.nextInt();

 System.out.printf("pow(%d,%d) :%d",x,n,pow(x,n));

 char c;

 System.out.print("\nYou Want to Continue(Y/N): ");

 c=sc.next().charAt(0);

 if(c=='Y'){

     break;

 }

 }

}

}

See more about JAVA at brainly.com/question/18502436

#SPJ1

in a file problem1.java implement a static method with the signature: public static int pow(int x, int

(03 MC)Why is it important to set goals and share them with others?

A) Sharing goals makes you feel like you are better than the other person.
B) If you share your goals, you are more likely to achieve them.
C) Sharing goals is something you should do in order to get a good grade.
D) If you share your goals with others, people will like you more.

ANSWER: B) If you share your goals, you are more likely to achieve them.

Answers

Answer:

answer is b

Explanation:

hope it was helpful

Answer: B, If you share your goals, you are more likely to achieve them.

We know sharing goals can be helpful to everyone, one of the main reasons people share goals is so that they can get the motivation to carry on doing their work. For example, If you and a friend had a goal of going to the gym 3 times a week you would feel responsible if you told your friend that you wouldn't be able to complete the goal this week. Which would make you feel bad for your friend who wants to complete the goal. It also helps with motivation if your friend doesn't want to go then you encourage them and make sure they remember the goal.

Answer choice A, would not make much sense since you are doing the goal together, and + this is a school question and they wouldn't encourage ego. Answer choice C, could be a result of sharing goals with others but doesn't suit the question as much as B. Answer choice D, does apply to the question at all people could end up liking you more but it could also end up the other way around.

Our answer is without a doubt B

Enjoy!

the horizontal axis is also called the value axis.

Answers

The horizontal axis in charting or graphing contexts is commonly known as the X-axis, while the vertical axis is referred to as the Y-axis. The X-axis represents the independent variable or category being measured, while the Y-axis represents the dependent variable or the values being plotted.

What is the horizontal axis called?

The statement is incorrect. In most charting or graphing contexts, the horizontal axis is referred to as the X-axis, while the vertical axis is referred to as the Y-axis. The X-axis typically represents the independent variable or category being measured, while the Y-axis represents the dependent variable or the values being plotted or compared. The term "value axis" is more commonly used to describe the vertical Y-axis, as it represents the numerical values or magnitude of the data being displayed.

Learn more on graphing axis here;

https://brainly.com/question/7807573

#SPJ4

what does this mean PLEASE?

what does this mean PLEASE?

Answers

Answer:

the controls of which you're your suppose to use or where your suppose to put it

Explanation:

because i'm not sure what you're your showing me

what is the name of the mac feature that makes these finger motions available

Answers

The Mac feature that makes finger motions or gestures available is called the "Trackpad" or "Multi-Touch Trackpad." This feature allows users to perform various actions using different finger movements on the trackpad surface.

A multi-touch trackpad is a type of trackpad that supports multiple simultaneous touch inputs. Unlike traditional trackpads that primarily recognize basic finger movements, multi-touch trackpads can detect and interpret more complex gestures involving multiple fingers.

With a multi-touch trackpad, users can perform a wide range of gestures and actions using multiple fingers, enabling more intuitive and efficient interaction with the computer.

Multi-touch trackpads are commonly found on laptops, particularly those running macOS or Windows operating systems. They enhance the user experience by providing more natural and intuitive ways to interact with the computer, similar to touchscreen gestures on mobile devices. The precise gestures and functionality of a multi-touch trackpad may vary depending on the operating system and specific software applications.

Visit here to learn more about macOS brainly.com/question/17371989

#SPJ11

Small data differs from big data in what ways? Select all that apply.
A. Small data is typically stored in a database. Big data is typically stored in a spreadsheet.
B. Small data focuses on short, well-defined time periods. Big data focuses on change over a long period of time.
C. Small data involves datasets concerned with a small number of specific metrics. Big data involves datasets that are larger and less specific.
D. Small data is effective for analyzing day-to-day decisions. Big data is effective for analyzing more substantial decisions.

Answers

Depending on the quantity and complexity of the data, Option A is incorrect because both tiny data and big data can be kept in databases or spreadsheets.

Which of the following provides an illustration of small data?

Little data frequently comes in the form of: information from customer relationship management systems (CRMs) information about where to get marketing collateral, supplies, and machinery. Sales data for both customers and products.

How do small data and big data differ from one another?

As contrast to little data, which is, unsurprisingly, smaller, big data involves enormous amounts of information. Here's another perspective on the matter: Massive amounts of unstructured data are frequently referred to as "big data." On the other hand, small amounts of exact information are called metrics.

To know more about databases visit:-

https://brainly.com/question/30634903

#SPJ1

What are the three ways you can add recipients to your marketing emails? Add a list of contacts, add individual contacts, or save the email as a sales email. Add a list of contacts, add individual contacts, or save the email as a services email. Add a list of contacts, add individual contacts, or save the email for automation. Add individual contacts, save the email for auto

Answers

Answer:

Explanation:

The three ways of doing this are to add a list of contacts, add individual contacts, or save the email for automation. The list of contacts would be added as a single file containing a large collection of contacts which would all be imported. Adding individual contacts would be done one by one would need to be done manually. Lastly, we have saving the email for automation which would automatically add the email and the contact info asociated with that email to your marketing emails.

Answer:

add a list of contacts, add individual contacts, or save the email for automation

Explanation:

Do you think we could use mathematical operators on string values rather than integers or floats? Explain.

Answers

Answer:

Yes and no. For example, you can do this:

print('hi' * 5)

Output:

hihihihihi

HOWEVER, you cannot do mathematical operations on strings. If I have a string "6" and try dividing it by 3, it's not going to work because... it's not an integer. While multiplying strings does work, you cannot actually do real math with strings unless you change them to int or float

Write the pseudocode that could be used for a program that will test if a
number is odd or even and print the result.
esult.

Answers

Here's an example of pseudocode that could be used for a program that will test if a number is odd or even and print the result:

1. Ask the user for an integer input and store it in a variable called "number."
2. Check if the number is divisible by 2 using the modulo operator (%).
3. If the result of the modulo operator is 0, print "The number is even."
4. If the result of the modulo operator is 1, print "The number is odd."

Here's an implementation of the pseudocode using Python:

```
number = int(input("Enter an integer: "))

if number % 2 == 0:
print("The number is even.")
else:
print("The number is odd.")
```

This program will ask the user to enter an integer and then check if it is even or odd using the modulo operator. If the number is even, it will print "The number is even." If the number is odd, it will print "The number is odd."

Select the correct answer from each drop-down menu.
When you right-click a picture in a word processing program, which actions can you choose to perform on that image?
You can choose to
an image when you right-click the picture in the word processing program. You can also choose to
an image when you right-click the picture in the word processing program.

Answers

When you right-click a picture in a word processing program, the actions that can you choose to perform on that image are as follows:

Rotate.Resize.

What is a Word processing program?

A Word processing program may be characterized as a kind of advanced typing program that permits a user to track records information and then let the user perform a variety of other things with it.

According to the context of this question, you can opt to rotate an image when you right-click the picture with the utilization of a word processing program. Apart from this, you can also opt to resize an image through the same function of a word processing program.

Therefore, when you right-click a picture in a word processing program, the actions that can you choose to perform on that image are rotated and resized.

To learn more about Word processing programs, refer to the link:

https://brainly.com/question/985406

#SPJ1

Your question seems incomplete. The most probable complete question is as follows:

When you right-click a picture in a word processing program, which actions can you choose to perform on that image?

You can choose

RotateViewCompress

You can also choose to

ReviewResizeBookmark

natasha, a network security administrator for an online travel portal, noticed that her website was the victim of an sql injection. she decided to study the sql queries to find which one made this vulnerability in the database, and she noticed the following sql code piece executed on the database: 'whatever' and email is null; what has been accessed by the attacker running this sql injection?

Answers

The information which has been accessed by the attacker running this SQL injection is that: The attacker has determined the names of different types of fields in the database.

What is SQL injection?

In Cybersecurity, SQL injection can be defined as code injection technique which is typically used by an attacker to exploit any web security vulnerability in a database especially by interfering with the queries that are being sent through a software application to the database.

What is a database?

A database can be defined as an organized and structured collection of data that're stored on a computer system as a backup and they're usually accessed electronically.

In this context, we can reasonably infer and logically deduce that this attacker was able to access the names of different types of fields which are stored in the online travel portal's database.

Read more on SQL injection here: https://brainly.com/question/25823241

#SPJ1

Complete Question:

Natasha, a network security administrator for an online travel portal, noticed that her website was the victim of an SQL injection. She decided to study the SQL queries to find which one made this vulnerability in the database, and she noticed the following SQL code piece executed on the database: 'whatever' AND email IS NULL;

What has been accessed by the attacker running this SQL injection?

The attacker accessed the data of specific users.

The attacker accessed the entirety of email address data from all users in the database.

The attacker has used the SQL injection to delete the table in the database.

The attacker has determined the names of different types of fields in the database.

List any three beneficial and harmful effects of computer in our society ?​

Answers

Answer :

Positive impact of computer :

1. It facilities business process and other activities . It makes work more simple and less time consuming .

2. We can perform multitasking and multiprocessing capabilities of data .

3. It can be used for various purposes like education, business or industries etc.

Negative impact of computers :

1. Computers can be expensive so not many people can bye them .

2. Chances of data stole or hacking destroys the data of the computer .

3. It facilities computer Crime or cyber theft .


Hope this helps :)

Explain the difference between file and folder (in your own words)

Answers

Answer:

the difference is one is online and one is not

Explanation:

A file is usually what you find online. And a folder is what you put papers into.

Normally, by the time teenagers have finished high school, they have formed their own identities and belief systems and have less
need for
against authority figures.

Answers

Answer:

The answer is rebellion

Explanation:

I took the test.

Answer:

rebellion

Explanation:

What is an easy and accurate way that a graphic designer can increase the size of a digital shape while keeping the ratio of height to width the same?
First make the height taller, and then drag the width by using one’s eyes to try to make sure the proportions stay the same.
Hold the key, such as Shift, that the program uses to make sure all dimensions are adjusted while dragging just one side.
Open the shape’s properties window, and type the height value multiplied by 2 and the width value multiplied by 3.
First convert the shape into a photo file, and then digitally manipulate it in a program such as Adobe Photoshop.

Answers

Answer:

Open the shape’s properties window, and type the height value multiplied by 2 and the width value multiplied by 3.

Explanation:

Answer: A resolution independent, vector graphics and illustration application used to create logos, icons, drawings, typography and complex illustrations for any medium.

explanation:

because it is what it is

Which symbol should you use for entering a formula in a cell?
А.+
B.=
C. $
D.%
E#

Answers

Answer:

ITS + AND =

Explanation:

Answer:

Explanation: The equals operator is used in the Microsoft excel for the indication of formula in a cell .

Explanation:

the tag field of a main memory address is used to determine:

Answers

The tag field of a main memory address is used to determine the specific cache block or cache line associated with that memory address.

In a cache memory system, the cache is organized into blocks or lines, and each block or line corresponds to a specific range of memory addresses. The tag field in the main memory address helps identify which block or line in the cache corresponds to the requested memory address.

When a memory address is accessed, the cache controller checks the tag field of the address to determine if the requested data is present in the cache. If the tag matches the tag stored in a cache block, it indicates a cache hit, and the corresponding data is retrieved from the cache. If the tag does not match, it signifies a cache miss, and the data needs to be fetched from main memory and placed into the cache with the updated tag for future accesses.

In summary, the tag field of a main memory address is used to identify the cache block associated with the memory address during cache access operations.

Learn more about cache memory here:

https://brainly.com/question/29977825

#SPJ11

PLEASE HELP
Which option is the correct format of placing HTML tags while coding in HTML?
A.
B.
C.
D.

Answers

Answer:

the 3rd one you put

Explanation:

The function of a decoder is to break a decimal or other character code down into a binary code.

Question 2 options:
True
False

Answers

The above statement is True. The function of adecoder is to convert an input code, such as a decimal or character code,   into its corresponding binary representation.

 How is this  so?

It takes the encoded input and breaks it down into its binary components, which consist of bits representing ones and zeros.

By decoding the input, a decoder enables the interpretation and processing of the information in binary form, allowing for further manipulation or analysis in digital systems.

Learn more about binary code. at:

https://brainly.com/question/16612919

#SPJ4

Create an infographics using the Word Processing Software, informing the audiences about internet safety practices.

Answers

Here is a suggested infographic on internet safety practices using Microsoft Word:

[A Word document shows the following infographic:]

Staying Safe Online

Protect your personal information. Never share your name, address, phone number, passwords, or Social Security Number on social media or public websites.

Be wary of phishing emails and malicious links. Never click links or download attachments from unknown or untrusted sources. Legitimate companies will not ask for sensitive data via email.

Use strong and unique passwords. A strong password contains a minimum of 8 characters, a mix of letters, numbers and symbols, and is not based on personal information. Use different passwords for different online accounts.

Be cautious of what you post. Anything you post online can potentially last forever. Do not post anything that you would not want seen by anyone.

Turn on two-factor authentication whenever possible. This adds an extra layer of security for your accounts like email, social media, and cloud storage services.

Ensure all devices and software are up to date. Install the latest updates to keep security patches current to protect against threats.

Be wary of public Wi-Fi networks. Public networks are not secure and all your online activity and information can be visible to others. Avoid conducting sensitive activities on public Wi-Fi.

Signal for help if anything suspicious happens. If you notice any suspicious activity on your accounts or devices, changing passwords or unauthorized logins, report it immediately to the concerned companies and consider filing a police report.

Online privacy and security is a shared responsibility. Be proactive and spread awareness about internet best practices to help keep everyone safe online. Together, we can make the internet a safer place!

Does this infographic look okay? I tried to highlight some key best practices around protecting personal information, using strong passwords, being cautious of what is posted online, enabling two-factor authentication, keeping software up to date, avoiding public Wi-Fi and knowing how to get help if needed. Please let me know if you would like me to modify anything in the infographic. I can also suggest some other topics or formatting styles if required.

A brief overview of some important internet safety practices that you can include in your infographic  using the Word Processing Software is given.

How to explain the information

Use strong passwords: Use a combination of uppercase and lowercase letters, numbers, and symbols in your passwords, and avoid using personal information.

Enable two-factor authentication: Two-factor authentication provides an extra layer of security by requiring a second form of authentication in addition to your password.

Be careful with personal information: Don't share personal information like your full name, address, phone number, or social security number online.

Learn more about Word Processing on

https://brainly.com/question/985406

#SPJ1

which of the following correctly compares the significance of the different technologies shown in the images?

Answers

Without knowing which images are being referred to, it is difficult to provide a direct answer to this question. However, in general, comparing the significance of different technologies.

For instance, the significance of a new renewable energy technology could be compared to that of a traditional fossil fuel-based technology in terms of their environmental impact, cost-effectiveness, and ability to provide energy security. Similarly, the significance of a new medical technology could be compared to that of an existing treatment in terms of their efficacy, safety, and affordability.

To compare the significance of different technologies, one may also need to consider their potential for innovation and disruption. A new technology that completely transforms an industry or creates a new market may be considered more significant than a minor improvement to an existing technology.

To know more about technologies visit:-

https://brainly.com/question/9171028

#SPJ11

what is the name for the dos attack that causes machines on a network to initiate a dos against one of that network's servers?

Answers

The name for the DOS attack that causes machines on a network to initiate a DOS against one of that network's servers is known as Distributed Denial of Service (DDoS) attack.

A denial-of-service (DoS) attack is a malicious attack that makes it impossible for a service to be rendered, normally by preventing legitimate traffic from accessing a target computer. In a DoS attack, attackers flood servers, systems, or networks with traffic in an effort to exhaust the target's resources and make it impossible to provide service to legitimate requests.

A Distributed Denial of Service (DDoS) attack is a more sophisticated form of a DoS attack that employs multiple machines to flood the target with bogus traffic. Attackers may use botnets (collections of compromised computers) to carry out DDoS attacks.

A DoS attack is performed using a single machine to target the victim. The attacker generally does not have control over the whole network or a collection of machines in this scenario. DDoS attack, on the other hand, employs several machines to target a single victim. Attackers have complete control over the network in this scenario.

You can learn more about DOS attacks at: brainly.com/question/3353954

#SPJ11

How do device drivers vary in complexity?​

Answers

i wanna know so bad i can’t wait till someone answers

What is causing the electricity prices to increase in South Africa?​

Answers

The law of demand says that the higher the price of a good is, the less people will demand it. But South Africa , sales of electricity have been dropping, yet the utility wants consumers to even pay more for its good. The national utility, South Africa wants consumers to pay more for electricity.

What do devices provide? A.data to be processed B. Software code C.text and images only D.results of processing.

Answers

A is the correct answer!

what is the importance of planning before you start your vegetable farm business?

Answers

Answer with Explanation:

"Planning" plays a crucial role before starting any business. If you've decided to start a vegetable farm business, then you better plan ahead.

Vegetables are "perishable," which means it is easy for them to get spoiled. Thus, you have to consider many things such as: what kind of crops to sell, where to sell them, what season you're going to sell them and how much you are going to sell them.

Choosing the kind of crop depends on whether you'll be requiring intensive labor or not. Although the former means more profit, it will require more capital. Knowing your target market is essential. For example, if your target are health-conscious people, then you have to go for organic vegetables. Determining the season to sell the vegetables will allow you to price them accordingly. Lastly, you have to know how much you're going to sell your vegetables in order for you to have an idea of the profit you're going to make. This will also allow you to budget your money.

Is MOOC's potentially harmful to copyright? Why or why not ?

Answers

Answer:

Fair-use exceptions to traditional copyright protection face challenges as well, given a MOOC's potential for global reach. Nonetheless, fair use and MOOCs are not mutually exclusive ideas. MOOCs remain an experiment...

different he launc.
in function are available with MS-Excel
Many​

Answers

functions are available with MS-Excel..

1.count and sum

2.cell references

3.data and Time

4.text

5.lookup and reference

6.finanical

7.round

8.array formula

Express 42 as a product  of its prime factor​

Answers

The only way to write 42 as the product
of primes.

Except to change the order of the factors is
2 × 3 × 7. We call 2 × 3 × 7 the prime factorization of 42.
The only way to write 42 as the product of primes (except to change the order of the factors) is 2 × 3 × 7. We call 2 × 3 × 7 the prime factorization of 42.
Other Questions
BRAINLIEST!!!!!!BRAINLIEST!!!! BRAINLIEST!!!!!!BRAINLIEST!!!! BRAINLIEST!!!!!!BRAINLIEST!!!! BRAINLIEST!!!!!!BRAINLIEST!!!! Assess the influence of culture on the phenomenon of strategic drift, describing and justifying an appropriate tool that strategic managers can use to prevent such drift. Use appropriate literature at a certain truck manufacturing plant, 8 trucks were produced last week. unknown to the manufacturer, 3 of the trucks had defective transmissions. suppose that a certain local shipping company has just purchased 2 trucks from the manufacturer. what is the probability that: a. both trucks purchased had defective transmissions? b. only one of the trucks had a defective transmission? c. suppose the company purchases 3 trucks. what is the probability that all 3 had defective transmissions? 13. "The most prosperous society is the one with the most entrepreneurs". This statement describes the situation of a society if it has many entrepreneurs. This is due to the contribution of entrepren the initial exposure to an allergen usually does not produce any symptoms. The symptoms usually appear in the second exposure. What events are occurring during this second exposure? In your description include the role of IgE, basophils, mast cells, and the allergen. Florida Farms recently offered 12,000 shares of stock for sale but received payment for only 10,500 shares since was all the shares the underwriters could sell. What type of underwriting was this? A. Firm commitment B. Private placement C. Best efforts D. Dutch auction Write about 1500 words in total, chosen from a selection of three topics offered .Topics for this assignment:Discuss the difficulty of creating a cash flow analysis and pro forma financial statement for a new Venture startup. How do you suggest coping with these issues? 3. Suppose that (a,n) = 1. Prove that if and only if a = a (mod n) b = c(mod ord,(a)). The letters in the word MATHEMATICS are arranged randomlyWhat is the probability that the first letter is E?What is the probability that the first letter is M? Decision-making problems that could occur when using absorption costing include inappropriate ______ decisions, and decisions made to ______ products that are, in fact, profitable.pricing; dropvariable, absorptiontraceable; common which of the following is a disadvantage of strategic alliances? they mandate that the companies do not share complementary competencies and assets. they do not allow for sharing of risks and fixed costs. they give competitors a low-cost route to new technology and markets. they do not facilitate entry into a foreign market. they cause problems when it comes to establishing technological standards for the industry. A square with side lengths of 6 cm is enlarged using a scale factor of 2.5. What will be the perimeter and area of the enlarged squa The Travel Industry Council of Hong Kong (TIC) was founded in1978 to safeguard travel brokers' interests." Two cylinders are similar. The surface area of one is 49 cm2, and the surface area of the other is 121 cm2. Find the scale factor between them. Enter the smaller number first. scale factor = [?]:[] En This architectural complex: a. was built by the Khmer ruler Suryavarman II. b. is an example of a temple mountain. c. was a symbol of the ruler's merit and divine authority. d. was dedicated to the ruler's chosen deity, Vishnu. e, all of the above _____dictates that when given a choice between two compelling explanations, the explanation that relies on fewer explanatory factors is the better choice. s a senior analyst for the company you have been asked to evaluate a new IT software project. The company has just paid a consulting firm $100,000 for a test marketing analysis. After looking at the project plan, you anticipate that the project will need to acquire computer hardware for a cost of $450,000. The Australian Taxation Office rules allow an effective life for the computer hardware of five years. The equipment can be depreciated on a straight-line (prime cost) basis and there is no expected salvage value after the five years. Your company does not have any available space where the project can be located for five years and you anticipate to rent the required office space it would cost $65,000 per year for the life of the project. You expect that the project will need to hire 3 new software specialists at $50,000 (each specialist) per year (start in year 1) for the full five years to work on the software. The project will use a van currently owned by the company. Although the van is not currently being used by the company, it can be rented out for $15,000 per year for five years. The book value of the van is $20,000. The van is being depreciated straight-line (with five years remaining for depreciation) and is expected to be worthless after the five years. Expected annual marketing and selling costs will be incurred during the life of the project (5 years), with the first year expecting to be $250,000. The produced software is expected to sell at $85 per unit while the cost to produce each unit is $40. You expect that 10,000 units will be sold in the first year and the number of units sold will increase by 25% a year for the remaining four years. The project will need working capital of $50 000 to commence the business (in year 0) and the investment in working capital is to be completely recovered by the end of the projects life (in year 5). The company tax rate is 30%, and the discount rate is 10.5%. Based on the information presented above, answer the following questions (1) (3).1. In evaluating the new IT software project, is the cost of $100,000 spent on marketing analysis relevant? Explain your answer(s). ( 1 mark)2. Calculate the incremental free cash flow during the projects life (starting from year 0 to year 5). Show workings. ( 6 marks)3. Calculate the NPV and IRR of the project. Should the project be accepted? Show workings and explain your answer(s). ( 7 marks) The data below represent a demand schedule. Product Price Quantity Demanded$30 1025 2020 3015 4010 50Using the midpoint approach, determine the price elasticity of demand between each of the following prices:Instructions: Round your answers to two decimal places. Enter your answers as a positive value (absolute value). a. Between P1 = $30 and P2 = $25, Ed= b. Between P1 = $25 and P2 = $20, Ed=c. Between P1 = $20 and P2 = $15, Ed= d. Between P1 = $15 and P2 = $10, Ed= | Porter (1980) defined a number of "generic strategies" that organisations can use as a way to compete. He suggested thatfirms should follow one of these strategies and avoid being "stuck in the middle" between different strategies. Was he right? Explain each generic strategy and critically evaluate thisstatement, using examples and appropriate literature. find the length of a cube with a volume of 8/729in3