In a computer or in a(n) ________ bag.

Answers

Answer 1

In a computer or in a laptop bag. A laptop bag, also known as a computer bag, is a container that holds and protects a laptop computer.

These bags are typically lightweight, portable, and have numerous compartments for storing additional accessories such as power adapters, cables, and other gear.

Laptop bags come in a variety of shapes, sizes, colors, and styles to fit individual preferences and requirements. Some bags are designed for business professionals and may have a more formal look, while others are aimed at students or travelers and have more casual and functional features.

Both backpacks and messenger bags are available in a range of materials, including nylon, polyester, leather, and canvas.

To know more about portable visit:

https://brainly.com/question/11854933

#SPJ11


Related Questions

Python plese help 4.2 projectstem

it keeps saying error


pet=input("What pet do you have? ")

c=1

while(pet!="rock"):

print("You have a " + pet + " with a total of " + str(c) + " pet(s)")

pet = input("What pet do you have?")

c = c + 1

Python plese help 4.2 projectstemit keeps saying errorpet=input("What pet do you have? ")c=1while(pet!="rock"):
Python plese help 4.2 projectstemit keeps saying errorpet=input("What pet do you have? ")c=1while(pet!="rock"):

Answers

Answer: while(pet!="stop"):

Explanation:

here was my code for that lesson

pet = input("What pet do you have? ")

total = 0

while pet!="stop":

   total+=1

   print("You have one " + pet + ". Total # of Pets: " + str(total))

   pet = input("What pet do you have? ")

What is the final value of x (after this code has executed)?

int x = 0;

for (x = 0; x < 200; x++)

{

System.out.println(x);

}

Answers

Answer:

199

Explanation:

i starts at 0. One more than 0 is one. Until you get 199.  

The computer is counting as seen below:

0

1

2

....

199

A company notices their software is prone to buffer overflow attacks. They choose a popular development environment, Microsoft Visual Studio, to help avoid future attacks. What development environment feature would most help the company avoid future buffer overflows

Answers

Answer:

Compiler Option

Explanation: These help prevent buffer overflow attacks

True/False: if all transactions use two-phase locking, they cannot deadlock.

Answers

Two-phase locking (2PL) can help prevent some deadlocks, but it does not guarantee that deadlocks will never occur. In 2PL, transactions request locks on resources (such as data items or tables) before accessing them, and hold onto these locks until they commit or abort.

This ensures that conflicting accesses do not occur simultaneously, which can lead to inconsistencies or data corruption. However, deadlocks can still occur in a 2PL environment if transactions are not careful about the order in which they request locks. For example, if two transactions each hold a lock on a resource and then try to acquire a lock on the resource held by the other transaction, a deadlock can occur.

Neither transaction can proceed until it obtains the lock it needs, but neither transaction is willing to release its own lock first. This can result in a circular wait that cannot be resolved without intervention. To prevent deadlocks, transactions in a 2PL environment must follow a strict protocol for requesting and releasing locks. For example, they may be required to request locks in a predetermined order (such as alphabetical or numeric order), or release all locks before requesting new ones. Additionally, some database management systems may use deadlock detection and resolution algorithms to detect and break deadlocks that do occur. In summary, while 2PL can help prevent deadlocks, it does not eliminate the possibility of deadlocks entirely. Careful transaction management and proper system configuration are necessary to minimize the risk of deadlocks in a 2PL environment.Two-phase locking (2PL) can help prevent some deadlocks, but it does not guarantee that deadlocks will never occur. In 2PL, transactions request locks on resources (such as data items or tables) before accessing them, and hold onto these locks until they commit or abort. This ensures that conflicting accesses do not occur simultaneously, which can lead to inconsistencies or data corruption.

To know more about prevent visit:

https://brainly.com/question/12650221

#SPJ11

17. Electrospinning is a broadly used technology for electrostatic fiber formation which utilizes electrical forces to produce polymer fibers with diameters ranging from 2 nm to several micrometers using polymer solutions of both natural and synthetic polymers. Write down 5 different factors that affect the fibers in this fabrication technique. (5p) 18. Write down the definition of a hydrogel and list 4 different biological function of it. (Sp) 19. A 2.0-m-long steel rod has a cross-sectional area of 0.30cm³. The rod is a part of a vertical support that holds a heavy 550-kg platform that hangs attached to the rod's lower end. Ignoring the weight of the rod, what is the tensile stress in the rod and the elongation of the rod under the stress? (Young's modulus for steel is 2.0×10"Pa). (15p)

Answers

The elongation of the rod under stress is 0.09 m or 9 cm. Five factors that affect the fibers in electrospinning fabrication technique.

1. Solution properties: The solution concentration, viscosity, surface tension, and conductivity are examples of solution properties that influence fiber morphology.

2. Parameters of electrospinning: Voltage, flow rate, distance from the needle to the collector, and needle gauge are examples of parameters that influence the fiber diameter and morphology.

3. Physicochemical properties of the polymer: The intrinsic properties of the polymer chain, such as molecular weight, crystallinity, and orientation, influence the morphology and properties of the fibers.

4. Ambient conditions: Humidity, temperature, and air flow rate can all influence fiber morphology.

5. Post-treatment: Electrospun fibers can be subjected to post-treatments such as annealing, solvent treatment, and crosslinking, which can influence their mechanical, physical, and chemical properties.Answer to question 18:A hydrogel is a soft, jelly-like material that is primarily composed of water and a polymer network. Hydrogels have a range of biological functions due to their properties such as mechanical and biocompatible. Some of the biological functions of hydrogel are mentioned below:

1. Drug delivery: Hydrogels are widely utilized in drug delivery systems, particularly for the sustained release of drugs over time.

2. Tissue engineering: Hydrogels are frequently used as biomaterials in tissue engineering due to their similarities to the extracellular matrix (ECM).

3. Wound healing: Hydrogels are employed in wound healing due to their potential to promote tissue regeneration and repair.

4. Biosensing: Hydrogels are utilized in the production of biosensors that are capable of detecting biological and chemical compounds. Answer to question 19:Given,Magnitude of the force acting on the rod, F = 550 kg × 9.8 m/s² = 5390 NArea of the cross-section of the rod, A = 0.30 cm³ = 0.3 × 10^-6 m³Length of the rod, L = 2.0 mYoung's modulus of steel, Y = 2.0 × 10¹¹ N/m²The tensile stress in the rod is given by the relation;Stress = Force / Areaσ = F / Aσ = 5390 N / 0.3 × 10^-6 m²σ = 1.80 × 10^10 N/m²The elongation of the rod under stress is given by the relation;Strain = Stress / Young's modulusε = σ / Yε = 1.80 × 10¹⁰ N/m² / 2.0 × 10¹¹ N/m²ε = 0.09. The elongation of the rod under stress is 0.09 m or 9 cm.

Learn more about morphology :

https://brainly.com/question/1378929

#SPJ11

The range of positive integers possible in an 8-bit two's complement system is: A) 1 to 256. B) 1 to 127. C) 1 to 255. D) 1 to 128.

Answers

Answer:

The correct answer is B) 1 to 127.

Explanation:

In an 8-bit two's complement system, the range of positive integers possible is from 0 to (2^8)-1 = 255. However, since the two's complement system allocates the most significant bit (MSB) to represent the sign of the number, the range of positive integers would be halved. Therefore, the range of positive integers in an 8-bit two's complement system is from 1 to 127.

Why is it not a good idea for a company to treat employee records with dupli-
cate first and last names as duplicate records?

Answers

Answer:

Maybe several files are titled the name of the client if the client returns to use the company again under different circumstances

Explanation:

What is the role of multimedia in entertainment ? ​

Answers

Answer:

Multimedia is heavily used in the entertainment industry, especially to develop special effects in movies and animations (VFX, 3D animation, etc.). Multimedia games are a popular pastime and are software programs available either as CD-ROMs or online.

In a computer network, a _____ is an expansion card located within the system unit that connects the computer to a network.

Answers

Answer:

Explanation:

Technically, a NIC is a physical card that connects to an expansion slot in a computer. Many computers and wireless devices now include an integrated networking component called a network adapter. This may be an Ethernet controller and port attached to the edge of a motherboard or a small wireless networking chip located on the motherboard.

wich of the following is true about how your skill set relates to a future career

Answers

The statement which is true about how your skill set relates to a future career is: D. Skills from part-time jobs and volunteer work may prove beneficial in future jobs.

What is a career field?

A career field can be defined as a series of sequential jobs that use similar skills, and they typically lead to the short and long-term career goals of an individual such as an employee.

What is a skill acquisition plan?

A skill acquisition plan can be defined as a written plan that is used to outline the goals, objectives, materials, teaching methods, and data collection techniques for teaching trainees or employees, a specific skill or set of skills.

This ultimately implies that, skill acquisition plans include all of the following:

GoalsObjectivesMaterialsData collection

In conclusion, we can infer and logically deduce that the statement which is true about how your skill set relates to a future career is that skills you acquired from part-time jobs and volunteer work may prove beneficial in future jobs.

Read more on skill acquisition plans here: brainly.com/question/15352575

#SPJ1

Complete Question:

Which of the following is true about how your skill set relates to a future career? (1 point)

Employers like to hire people with only full-time job experience.

Employers consider subject-specific skills for new positions.

Skills learned in high school should not be included.

Skills from part-time jobs and volunteer work may prove beneficial in future jobs.

points)

(01.01 MC)

Which is an example of correct HTML?

This is a heading
This is a heading
This is a title
This is a title

Answers

Answer:

For a heading it would be <heading> </heading>

For a title it would be <title> </title> title goes in the heading by the way

Explanation:

You use tags in html

You put a title tag in the heading tag in html

1 pound is equivalent to how many grams?
A.463.59 grams
B.10 grams
C.59 grams
D.5 grams​

Answers

A, because it makes sense and i asked siri

Stacy plans to print her contacts and would like to choose an option that will print select information for each contact in a business card format. Which option should she choose?

Answers

Answer: card style

Explanation:

From the question, we are provided with the information that Stacy plans to print her contacts and the option that she would like to choose is an option that will print select information for each contact in a business card format.

Based on the above information that is given, the option that she should choose is the card style.

what is the size of the bit vector of a 1tb disk with 512-byte blocks? a. 2 mb b. 28 mb c. 28 mb d. 8 mb

Answers

Option C. Bit vectors are one-dimensional, zero-originated arrays of booleans. They are shown as a series of 0s and 1s separated by the symbol #*, for example, (make-bitvector 8 #f) #*00000000.

Bit vectors can be used with array methods because they are a special instance of one-dimensional bit arrays; for more information, see Arrays. In essence, a bit vector is a vectorbool> because it is a Sequence with the same interface as a vector. The primary distinction is that bit vector is space-efficiently optimized. A bit vector just needs one bit per element but a vector always needs at least one byte.

The translation of memory size into 2 powers is crucial for OS numericals.

Disk size = 1TB = 240 B, then.

Block Size: 4 KB, or 2 12 B

Block count is equal to (240) / (212) = 228 blocks.

Now that we need 1 bit to represent each block in a bit map, the size of the bitmap in bits is 228 bits (to represent 228 blocks).

Bitmap size in Bytes is therefore 228 / 23 = 28 MB

Learn more about arrays here-

https://brainly.com/question/19570024

#SPJ4

How do i fix this? ((My computer is on))

How do i fix this? ((My computer is on))

Answers

Answer:

the picture is not clear. there could be many reasons of why this is happening. has your computer had any physical damage recently?

Answer:your computer had a Damage by u get it 101 Battery

and if u want to fix it go to laptop shop and tells him to fix this laptop

Explanation:

use caution and only complete troubleshooting tasks that you feel what and what doing

Answers

The steps are: identify the problem, establish a theory of probable cause, test the theory, establish a plan (including any effects of the plan), implement the plan, verify full system functionality, and—as a final step—document everything.

If you encounter any situation that seems unsafe or beyond your expertise, it's essential to stop and seek help from a qualified professional.

What is troubleshooting

Before trying to fix anything, make sure you read and understand the manuals and safety instructions for  the equipment or system.

Turn off and disconnect: When fixing electronic devices, always turn them off and disconnect them from power before making any changes or looking inside. Don't touch live wires or parts when working on electrical circuits.

Read more about troubleshooting  here:

https://brainly.com/question/28508198

#SPJ3

what's the point of using `uint8_t`, `uint32_t`, `int32_t`, and `uint16_t` in a program?

Answers

The use of uint8_t, uint32_t, int32_t, and uint16_t in a program provides a way to ensure specific data sizes and signedness, enhancing portability and consistency in the code.

uint8_t, uint32_t, int32_t, and uint16_t are types defined in the C and C++ programming languages as part of the <stdint.h> or <cstdint> header files. These types are known as fixed-width integer types and are used to guarantee specific data sizes and signedness, regardless of the platform or compiler being used.

Using these types in a program offers several benefits. Firstly, it ensures that the variables have a consistent size across different systems, regardless of the underlying architecture. This enhances portability and allows the program to behave predictably regardless of the platform it is compiled on.

Secondly, the use of these types explicitly indicates the size and signedness requirements of the variables, making the code more readable and self-documenting. For example, uint8_t represents an unsigned 8-bit integer, int32_t represents a signed 32-bit integer, and so on.

By utilizing uint8_t, uint32_t, int32_t, and uint16_t in a program, developers can ensure data consistency, portability, and communicate the intended data size and signedness, contributing to robust and maintainable code

Learn more about programming languages here:

https://brainly.com/question/23959041

#SPJ11

Jemima has finished formatting her main headings. She now wants to format her two subheadings. She wants to apply the format of her first subheading, not the format of the main heading, to the second subheading. Which feature of Word would help her to complete this task efficiently?

Answers

Answer:

the Format Painter feature

Answer:

the format painter feature

Explanation:

state five benefits of digitizing data​

Answers

Answer:

Ahorro de espacio físico. ...

Protección de los datos. ...

Gestión del tiempo en la consulta de datos. ...

Mejora de la productividad. ...

Responsabilidad social corporativa. ...

Acceso a la información a través de distintos dispositivos tecnológicos.

Explanation:

Answer:

Save money.

Save time.

Enhance collaboration.

Explanation:

discuss one simple example of hybrid computer​

Answers

Answer:

Below

Explanation:

hybrid computers are capable to resolve more complicated set of differential equations. Examples are – freedom space flights,

is a variable a number

Answers

A variable is a symbol standing for a unknown numerical value. Such as “x” and “y”

Answer:

No

Explanation:

A variable is like a symbol like a letter, that it used to describe a number.

URGENT: What questions would you ask a USER when in a requirements-gathering session? Multiple answers may be selected.

1. Are there any websites that you like or dislike?
2. What key information do you expect to find on the site?
3. What kind of security would you like to be implemented for the transactions you might do?
4. What might help you to navigate the sire?

Answers

The questions would you ask a user when in a requirements-gathering session are:

2. What key information do you expect to find on the site?

3. What kind of security would you like to be implemented for the transactions you might do?

What is a requirements-gathering session?

The act of developing a list of requirements to explain what a project is about and its aim is known as requirement gathering. Stakeholders, whether clients, employee users, consumers, or vendors, can provide insights.

Requirement gathering is frequently used to create project blueprints. Developers, for example, adjust requirements between iterations.

Therefore, the correct options are 2 and 3.

To learn more about the requirements-gathering session, refer to the link:

https://brainly.com/question/29768295

#SPJ1

Salim wants to add a device to a network that will send data from a computer to a printer. Which hardware component should he use?

A.
repeater
B.
modem
C.
switch
D.
bridge

Answers

It’s letter B good luck
I think person above is correct (sorry if I'm wrong I just need points)

In which disclosure paradigm will dislosure potentially help both the attacker and defender?

Answers

Information sharing is a disclosure paradigm in which disclosure will potentially help both the attacker and defender.

What is vulnerability?

Vulnerability can be defined as any form of weakness, flaw or defect that is found in a software application, computer system, or network, which can be exploited by an attacker or a hacker, in order to gain an unauthorized access and privileges to sensitive user data that are stored in a computer system.

What is vulnerability disclosure?

Vulnerability disclosure can be defined as a practice that typically involves reporting any security flaw in an equipment, computer software, or hardware, so as to avert and mitigate a potential attack (threat).

The types of disclosure paradigm.

In Computer technology, there are four (4) main types of disclosure paradigm and these include the following:

Military: disclosure doesn't help the defender (low) but helps the attacker (high).Open source: disclosure helps the defender (high) but not the attacker (low).Information sharing: disclosure helps both the defender (high) and the attacker (high).Public domain: disclosure neither helps the defender (low) nor the attacker (low).

In this context, we can infer and logically deduce that the information sharing is a disclosure paradigm in which disclosure will potentially help both the attacker and defender such as when the CIA or FBI considers whether or not to share a sensitive information with officials in other agencies.

Read more on vulnerability here: brainly.com/question/25813524

#SPJ1

Discuss any five factors that hinder the application of computer application in business organization

Answers

Answer:

Many factors can cause inderdce to the application of computer application in any business organization

Explanation:

Various factors affect and hinder the use of computers in the business scenario such as Time and cost, that is business think that new and different computer application is a waste of time and money.   lack of training of employees, most of the emptied are not properly trained and lack professionalism. Old and primitive software that cannot be replaced, due to the old tools and methodologies of the company the business may not feel the need to change. Risks of hacking and data leak, as new software, can contain hidden costs which may destroy or leak information or may be more vulnerable to risks. Low financial support, such as new startup or a low-paying corporation.

PORFA AYUDAAAA DOY CORONA (solo si puedo) ES DE TECNOLOGÍA
Promoción/Responsable/Sociedad/Tecnologías/Económico/Fronteras/Sostenible/Impulso
La _____ de las TIC y el desarrollo de la _____ de la información no son solamente motores de crecimiento _____, sino que también desmpeñan un importante papel en el _____ de una sociedad más ______y______ de n un mundo globalizado y veloz en el que las nuevas ______son fundamentales para derribar ______.

Answers

Answer:

de una socieda

Explanation:

Write a code in python that guesses a hardcoded answer and keeps on asking the user until the user gets the answer correct. The cmputer should be telling the user if the number they are guessing is too low or too high.

Answers

import random

#You can change the range.

answer = random.randint(1,1000)

counter = 0

while(True):

   guess = int(input("Make a guess: "))

   message = "Too high!" if guess>answer else "Too low!" if guess<answer else "You won!"

   print(message)

   if(message=="You won!"):

       print("It took",counter,"times.")

       break

   else:

       counter+=1

Write a code in python that guesses a hardcoded answer and keeps on asking the user until the user gets

waluigi for smash who agrees ​

Answers

Answer:

I do

Explanation:

Well, if i didnt, i wouldn't be part of the internet, now would I?

(can i get brainliest? pls?)

totally i agree-even tho i dont really play anymore

.Which of these pointing devices is used most often on microcomputers?A. touchpadB. mouseC. pointing stickD. joy stick

Answers

The pointing device most often used on microcomputers is :

B. mouse.

The mouse is the pointing device that is used most often on microcomputers. It is a handheld device that typically includes buttons and a scroll wheel. The mouse is moved across a flat surface, such as a mouse pad or desk, to control the on-screen cursor. By clicking the buttons or scrolling the wheel, users can interact with graphical user interfaces and navigate through various applications and software.

While touchpads, pointing sticks, and joysticks are also used as pointing devices on certain devices, such as laptops or gaming controllers, the mouse remains the most commonly used pointing device on microcomputers. It offers precise control, versatility, and ease of use for a wide range of tasks, from basic navigation to intricate graphical design or gaming.

Thus, the correct option is : (B) mouse

To learn more about mouse visit : https://brainly.com/question/29998751

#SPJ11

what should you do if an online friend asked to meet you after school?
ᵖˡˢˢˢˢ...​

Answers

Answer:

I'm going to agree if they had some decision when we meet to each other because I want to meet them in personal.

Explanation:

That's my own opinion

Other Questions
Juanitas Social Security full monthly retirement benefit is $2,128. She started collecting Social Security at age 65. Her benefit is reduced since she started collecting before age 67. Using the reduction percents from Example 1, find her approximate monthly Social Security benefit to the nearest dollar.EXAMPLE 1Marissa from Example 2. What will her monthly benefit be, since she did not wait until age 67 to receive full retirement benefits?SOLUTION Age 67 is considered to be full retirement age if you were born in 1945. If you start collecting Social Security before age 67, your full retirement benefit is reduced, according to the following schedule. If you start at collecting benefits at 62, the reduction is about 30%. If you start at collecting benefits at 63, the reduction is about 25%. If you start at collecting benefits at 64, the reduction is about 20%. If you start at collecting benefits at 65, the reduction is about 13.3%. If you start at collecting benefits at 66, the reduction is about 6.7%.Marissas full retirement benefit was $1,130.40. Since she retired at age 65, the benefit will be reduced about 13.3%.Find 13.3% of $1,130.40, and round to the nearest cent.0.133 x 1,130.40Subtract to find the benefit Marissa would receive.1,130.40 x 150.34Marissas benefit would be about $980.06.EXAMPLE 2Marissa reached age 62 in 2007. She did not retire until years later. Over her life, she earned an average of $2,300 per month after her earnings were adjusted for inflation. What is her Social Security full retirement benefit? A Triangle has a height that is half of 28 yards and an area of 56 yards^2. What is the length of the base of the trangle? 32. Ryan Enterprise Inc. forecasts the free cash flows (in millions) shown below. The weighted average cost of capital is 13.0%, and the FCFs are expected to continue growing at a 5.0% rate after Year 3. What is the Year 0 value of operations, in millions? Year FCF -$15.0 $10.0 $40.0 QUESTION 2: INVESTIGATIVE REPORT BACKGROUND There are many disgruntled employees that laid complaints on social media stating that the company is forcing them to work overtime without any additional remuneration. These accusations are damaging the image of the company and there is a steady decline of new membership applications. Mzansi News and Themba Dispatch have also published articles on the unfair treatment of the employees, and this is impeding the growth of the company. Ms Thembi Makunyane has raised concerns on the effects of the tweets and posts made on social media. INSTRUCTIONS There are many disgruntled employees that laid complaint on social media stating that the company is forcing them to work overtime without any additional remuneration. After receiving complaints from the employees via Move On's social media platforms, Ms Thembi Makunyane, the CEO of MoveOn, requested you, the chief of human resources manager to investigate the allegation.the report is to be submitted to the CEO by 30 June 2023 Can you think of a way to explain Hubble's Law other than thestandard Big Bang idea, which includes the concept of a Universewith no center and no edge? Find the cross product a b. a = t, 6, 1/t , b = t2, t2, 1 in Hershey and Chase experiment discussed in the lecture, the scientists used _____ to infect the target cells O the 35s labeled bacteria O the 15n-labeled bacteria O the 32p-labeled phages O the 32plabeled bacteria O the 15-labeled phagesO the 35s labeled phages JPG, PNG, .GIF ... Which image is limitedto 256 colors? woodrow wilson's political philosophy included all of the following except a a belief in the central importance of morality of politics. b faith in the masses. c a belief that the president should provide leadership for congress. d a belief that compromise was necessary to be an effective leader. e a belief that the president should appeal over the heads of legislators to the sovereign people. Ideal Company owns a department store selling furniture and home furnishing. It is studying the feasibility of opening a new store. Ideal plans to run the store for only 3 years. The details relating to the project are as follows: Additional working capital of $100,000 is required. This level is expected to remain the same until the end of the project. Sales of the new store for the 3 years are $500,000, $550,000 and $600,000, respectively. Lost sales of in main store due to opening of new store is $50,000 a year. Rent and other expenses for the new store amount to $150,000 each year. Cost of goods are 50% of sales. Cost of market research done 1 year ago is $50,000.Ideal plans to borrow $500,000 to finance this project. The bank will charge the same loan rate as the existing bank loan that the company has of $2 million. The bank charges the company a loan rate which consists of the risk-free rate and a risk premium of 2%.Ideal has 1,000,000 common shares with a market price of $2 each. The stock has a beta of 1. Currently, the market risk premium is 5% while the risk-free rate is 3%. Ideal pays a 20% tax rate.(a) Determine Ideals cost of equity, cost of debt as well as the weighted average cost of capital. (b) Compute the operating cash flows related to the project. (c) Compute cash flows from assets for the project. (d) Compute the NPV of the project using a discount rate of 10 %. Appraise whether the firm should go ahead with the project. (e) The payback period has been criticised for not considering the time value of money and all the project cash flows. Appraise the circumstances when these issues do not matter much. The equilibrium constant for the reaction of bromine and chlorine to form bromine chloride under certain conditions is 4.7x10-2. Cl2(g) + Br2(g) + 2BrCl(g) K= 4.7 x 10-2 What is the equilibrium constant for the following reaction under the same conditions? 1/2 Cl2(g) + 1/2 Br2(g) BrCl(g) K=? 2.1 x 101 2.2 x 10-3 -4.7 x 10-2 4.7 x 102 0.22 the number one mistake officers make in processing fingerprints with powders is If a client is unsure about whether or not he/she can obtain coverage or how much it would cost, what can the producer suggest to see what the insurer can do without tying up any of the client's funds Jason gained responsibility for advertising at his firm. For which element of the marketing mix is he responsible Compare and contrast discounted cash flow valuation and relative valuation approaches in terms of philosophical basis, information requirement, and market efficiency assumption. how is the modern department of defense different from the old department of war? it is a cabinet department and not an independent executive agency. it was not created by any act of congress, unlike the department of war. it contains sub-departments for the air force, army, and navy. The interpretation of this coefficient of determination in context is that _____% of the variance in median household income is explained by the variance in population. erin's parents do not set high educational goals for her. they do not have enough economic resources to enable erin to have access to better education. erin's parents also receive less social support. judging from the information presented in this scenario, erin's parents are: multiple choice low-ses individuals. middle-ses individuals. high-ses individuals. Etting up a small reward to encourage yourself to complete each week's exercise goal is an example of? positive reinforcement. negative reinforcement. which of these lifestyle choices will increase cancer risk? which of these lifestyle choices will increase cancer risk? changing to a diet low in plant fiber spending less time in the sun jogging quitting smoking