type a public emergency alarm reporting systems receive more than ? alarms per year.

Answers

Answer 1

A typical public emergency alarm reporting system can receive more than thousands of alarms per year.

Public emergency alarm reporting systems are designed to handle a large volume of emergency alarms and notifications from various sources such as individuals, buildings, or automated systems. These alarms can include reports of fires, medical emergencies, security breaches, natural disasters, and other critical incidents. Given the diverse range of emergencies that can occur in a public setting, it is not uncommon for such systems to receive a substantial number of alarms annually. The exact number can vary depending on factors such as the population density, geographical area covered, level of urbanization, and the specific purpose and scope of the system. To ensure prompt and efficient response to emergencies, public emergency alarm reporting systems are designed to handle and prioritize a high volume of alarms, enabling the appropriate authorities and emergency responders to address the situations effectively.

learn more about prompt here:

https://brainly.com/question/30273105

#SPJ11


Related Questions

listen to exam instructions you want to be able to monitor and filter vm-to-vm traffic within a virtual network. what should you do?

Answers

If you want to monitor and filter VM-to-VM traffic within a virtual network, you should deploy Network Watcher.

Network Watcher provides an array of tools for diagnosing, viewing, and monitoring network events and connections in a virtual network. The following are the tools provided by Network Watcher: Virtual Network Tap: Using virtual network tap, you can capture network traffic to and from virtual machines within the virtual network. You may then view this traffic in a capture file or send it to a Network Performance Monitor or any other packet analysis tool.Connection Monitor: Using connection monitor, you can keep track of connections in your virtual network. It tracks the connections between your virtual machines and the virtual networks they are a part of. It also captures diagnostic data about the connection in case of issues or disruptions.Network Performance Monitor: Using Network Performance Monitor, you can monitor network performance between Azure resources in a virtual network. It includes real-time monitoring, the ability to generate alerts for particular metrics, and the capability to view data on network performance over time.  The network diagnostic service is also an essential feature of Network Watcher. Using the network diagnostic tool, you can diagnose network performance issues between a virtual machine and a virtual network.

Learn more about virtual network here:

https://brainly.com/question/30487167

#SPJ11

Is it possible to have a 'regular' corporation that runs exclusively Linux for both server and workstations? Be sure to cite your sources. Explain your reasoning with regards to these factors: Hardware cost, Software cost, Software availability, Training, Support, Maintenance, Features

Answers

Yes, it is possible to have a 'regular' corporation that runs exclusively Linux for both servers and workstations. Linux is a versatile operating system that can effectively meet the needs of businesses.

Hardware cost:

Linux is known for its compatibility with a wide range of hardware, including older or low-cost hardware. This can result in cost savings for a corporation as they can choose hardware options that suit their budget without being tied to specific proprietary requirements.

Software cost:

Linux itself is open-source and typically free of cost, which can significantly reduce software expenses for a corporation. Additionally, Linux offers a vast array of free and open-source software applications that can meet the needs of various business functions.

Software availability:

Linux offers a vast selection of software applications, both open-source and commercial, for various purposes. The availability of enterprise-level software on Linux has been growing steadily over the years, ensuring that businesses can find suitable solutions for their requirements.

Training:

Training resources for Linux are widely available, ranging from online tutorials to professional certification programs. The Linux community is known for its support and educational resources, which can aid in training employees to effectively utilize Linux-based systems.

Support:

Linux distributions typically offer robust community support forums and documentation. Additionally, many Linux distributions have commercial support options available from vendors, providing professional support and assistance for businesses.

Maintenance:

Linux distributions often offer reliable package management systems that simplify software updates and maintenance. Regular updates and patches are released to address security vulnerabilities and improve system stability.

Features:

Linux provides a wide range of features and capabilities, including security, stability, flexibility, and scalability. These features make Linux suitable for various business needs, from basic office productivity to complex server operations.

To learn more about Linux: https://brainly.com/question/12853667

#SPJ11

Whats the best way to make a video game?

Answers

Answer:

Step 1: Do Some Research & Conceptualize Your Game. ...

Step 2: Work On A Design Document. ...

Step 3: Decide Whether You Need Software. ...

Step 4: Start Programming. ...

Step 5: Test Your Game & Start Marketing

What do you do when you have computer problems? Check all that apply. PLEASE HELP

Answers

Answer:

I ask my parents or call someone

Can you put the answers to the problem it would be a lot easier for me


And I would look up how to fix the problem on my own before paying someone....

in a formal business document, a works cited list usually appears___.

Answers

Answer:

At the end

Explanation:

In formal documents, each of the cited works is written in different paragraphs and assigned a number at the end of citation in ascending order.

Finally, at the end of the document, the document reference where it has been published online in same order as in document is quoted. Finally, this list of cited works appears at the end of the document called references and Bibliography.

T/F:
CCFL displays consume less power, last longer, and are thinner, lighter, and brighter than a display that uses LED technology.

Answers

False. The statement is incorrect. CCFL (Cold Cathode Fluorescent Lamp) displays do not consume less power, last longer, or offer better brightness compared to displays that use LED (Light Emitting Diode) technology.

LED displays are more energy-efficient as they require less power to operate. Additionally, LED displays tend to have longer lifespans compared to CCFL displays. LED technology also allows for thinner and lighter displays due to its compact design. Furthermore, LED displays often offer better brightness and contrast ratios, resulting in improved visual quality. Overall, LED displays have become the standard choice due to their advantages over CCFL displays in terms of power efficiency, lifespan, and visual performance.

To learn more about  brightness   click on the link below:

brainly.com/question/30047287

#SPJ11

What is the missing line of code? >>> >>> math.sqrt(16) 4.0 >>> math.ceil(5.20) 6

Answers

Answer:

A math.pow reference

Explanation:

Answer:

from math import ceil

Explanation:

yes

not sure what this means.​

not sure what this means.

Answers

Answer:

should be text effects............

Text effective it’s not hard it’s easy

The size (number of bytes) of a structure-type variable can be changed by the following factors. Select all that apply. O changing the orders of the members in the structure, O adding a member into the structure. O changing a struct from containing one char followed by a int, to a two chars followed by an int O changing the computer from a 32-bit to a 64-bit processor.

Answers

The size of a structure-type variable can be changed by changing the orders of the members in the structure, adding a member into the structure, or changing the computer from a 32-bit to a 64-bit processor.

Changing the structure members order can change the alignment of the data members and hence affect the size of the structure. Adding a new member into the structure will increase the size of the structure by the size of the new member. Changing the computer from a 32-bit to a 64-bit processor also changes the size of the data types and hence affects the size of the structure. However, changing a struct from containing one char followed by a int, to two chars followed by an int, will not necessarily change the size of the structure as the size of char and int data types remains the same.

Learn more about processor :

https://brainly.com/question/30255354

#SPJ4

as the software development process matures, who is increasingly responsible for safeguarding applications?

Answers

Software developers are increasingly responsible for safeguarding applications. This includes making sure the software is secure and reliable, as well as tested for potential vulnerabilities.

Developers are also responsible for developing secure coding practices, auditing code and systems, and monitoring for suspicious activity. They may also need to collaborate with security teams and other stakeholders to ensure that security measures are implemented correctly.

The Growing Responsibility of Software Developers in Securing Applications

The development of software is a crucial and ever-evolving process. As the complexity of software grows, so too does the responsibility of the software developer in ensuring that applications remain secure and reliable. From developing secure coding practices to auditing code and systems, software developers are increasingly being held accountable for safeguarding applications against potential vulnerabilities.

Software developers must be vigilant in their efforts to protect applications. This includes developing secure coding practices and auditing code and systems for potential vulnerabilities. Developers must also be aware of the latest security developments and trends, as well as any new security threats that may arise. Additionally, developers must stay up-to-date on any changes in the software development process, as these changes can impact security measures.

Learn more about software development:

https://brainly.com/question/26135704

#SPJ4

A scientific theory can never be disproven. true or false

Answers

Answer:

false

Explanation:

I just think its false because a theory hasn't become a law and laws cannot be disproven.

Hope this helped!

:)

the cost to ship a package is a flat fee of 75 cents plus 25 cents per pound. 1. declare a constant named cents per pound and initialize with 25. 2. get the shipping weight from user input storing the weight into shipweightpounds. 3. using flat fee cents and cents per pound constants, assign shipcostcents with the cost of shipping a package weighing shipweightpounds. java

Answers

The shipping cost ; shipCostCents = FLAT_FEE_CENTS + (shipWeightPounds × CENTS_PER_POUND)

The shipping cost can be calculated thus :

Flat fee + (Weight of package × cost per pound

Use of Payton 3:

#Declaring a flat rate of 25 cents per pound

CENTS_PER_POUND = 25

#Requests the package's weight in pounds from the user.

eval(input("Weight of your package")): shipWeightPounds

75 FLAT FEE CENTS

ship

CostCents is calculated as follows: FLAT FEE CENTS + (shipWeightPounds CENTS PER POL)

USPS is by far the most affordable shipping choice when compared to FedEx or UPS. But as the weight gets close to 2 pounds, USPS shipping charges are on par with UPS and FedEx Ground..

Learn more about shipping cost:

https://brainly.com/question/17601395

#SPJ4

Further explains information found in a chapter

Answers

Answer:

The answer is E: Appendix

Explanation:

Refer to Table 8-4. Consider the data above (in billions of dollars) for an economy: Gross domestic product (in billions of dollars) for this economy equals

Answers

If one uses the data above (in billions of dollars), the Gross domestic product (in billions of dollars) for this economy equals  $1,200.

What is the GDP about?

Note that:

GDP (Gross Domestic Product):

Thus it will be :

Consumption + Investment + Government expenditure + (Export - Import)

Which is:

GDP = 800 + 200 + 300 + (100 - 200)

GDP = $1200 billions

See full question below

Consumption expenditures $800

Investment expenditures 200

Government purchases 300

Exports 100

Imports 200

Wages 800

8) Refer to Table above. Consider the data above (in billions of dollars) for an economy: Gross domestic product (in billions of dollars) for this economy equals

A) $2,200.

B) $1,600.

C) $1,400.

D) $1,200.

Learn more about GDP from

https://brainly.com/question/1383956

#SPJ1

Consider the graph of the function f(x) = 2(x + 3)2 + 2. Over which interval is the graph decreasing? (–∞, –3) (–∞, 2) (–3, ∞) (2, ∞)

Answers

Answer:

The interval over which the graph is decreasing is;

(-∞, -3)

Explanation:

The given function is f(x) = 2·(x + 3)² + 2

By expanding the function, we have;

2·x² + 12·x + 20

From the characteristics of a quadratic equation, we have;

The shape of a quadratic equation = A parabola

The coefficient of x² = +2 (positive), therefore the parabola opens up

The parabola has a minimum point

Points to the left of the minimum point are decreasing

The minimum point is obtained as the x-coordinate value when f'(x) = 0

∴ f'(x) = d(2·x² + 12·x + 20)/dx = 4·x + 12

At the minimum point,  f'(x) = 4·x + 12 = 0

∴ x = -12/4 = -3

Therefore;

The graph is decreasing over the interval from -infinity (-∞) to -3 which is (-∞, -3)

Please find attached the graph of the function created with Microsoft Excel

The graph is decreasing over the interval (-∞, -3).

Consider the graph of the function f(x) = 2(x + 3)2 + 2. Over which interval is the graph decreasing?

Answer:

A. (–∞, –3)

Explanation:

Edge 2021 ( if feel still think it's wrong, check the picture ⬇️  )

Consider the graph of the function f(x) = 2(x + 3)2 + 2. Over which interval is the graph decreasing?

if you make a typing mistake when entering your program, what sort of error will result

Answers

When you make a typing mistake when entering your program, it can result in a syntax error. A syntax error occurs when the code does not follow the language's grammatical rules and the computer cannot process the program correctly.

For example, if you misspell a keyword or forget to include a semicolon at the end of a line, you may receive a syntax error.

About syntax error

A typing mistake when entering your program will result in a syntax error. Syntax errors occur when the structure or order of your code does not conform to the rules of the programming language. These errors can be caused by typos, missing punctuation, or incorrect use of operators. It is important to carefully proofread your code to avoid syntax errors, as they can prevent your program from running correctly.

Learn more about syntax error at

https://brainly.com/question/28957248

#SPJ11

when was "Rick Astley Never Gonna Give You Up" originally made?

Answers

Answer: See explanation

Explanation:

Rick Astley "Never Gonna Give You Up" was originally recorded in October 1986 and was then released on 27th July, 1987.

The song was recorded in South London at the PWL studios. On the American billboard hot 100, it reached number one in March 1988.

Answer:

1987

Please mark me as brainliest

Explanation:

when was technology created?

who start it?

and finally how it started?


free coins
just answer

Answers

Answer:

two million years ago

Thomas Edison, American inventor who, singly or jointly, held a world-record 1,093 patents. In addition, he created the world's first industrial research laboratory.

In which attack does a hacker capture data packets from a network and retransmit them to produce an unauthorized effect, usually to gain information that allows unauthorized access into a system

Answers

The attack described, where a hacker captures data packets from a network and retransmits them to produce an unauthorized effect, is known as a "replay attack."

In a replay attack, an attacker intercepts and captures data packets transmitted over a network. The captured packets are then replayed or retransmitted at a later time to produce an unauthorized effect. The goal of such an attack is typically to gain sensitive information that can be used to gain unauthorized access to a system or network.

By capturing and replaying data packets, the attacker can mimic a legitimate user or device, fooling the system into accepting their actions or commands. This can lead to unauthorized access, bypassing authentication mechanisms, or compromising the confidentiality and integrity of the transmitted data.

To protect against replay attacks, various security measures can be implemented, such as encryption, message integrity checks, timestamping, and the use of secure protocols. These measures help ensure that transmitted data is protected from interception and replay, thereby mitigating the risk of unauthorized access and manipulation.

Learn more about replay attack here: brainly.com/question/31541115

#SPJ11

How could an online college utilize enterprise software? A. Develop new technical support jobs B. Improve course resources and navigation C. Provide access to course registration D. Supply online word processing software

Answers

Answer:

The answer is "Choice B"

Explanation:

The enterprise applications is a software program that is used to meet the demands of planning instead of individual users. It also is referred to as business software applications that include schools, stakeholders involved, clubs, charity organizations as well as the states. Its develops processes for the course or viewing software used by online courses.

Answer:

C. Provide access to course registration

What is an important theme in "Once Upon a Time"?


the unity between all peoples

the disintegration of South African society

the birth of a new nation

the importance of self-reliance

Answers

Answer:

The disintegration of South African society.

Explanation:

Nadine Gordimer's "Once Upon A Time" revolves around the racist "Apartheid" time of South African society where the whites 'dominate' the blacks. the story focuses on the societal issues between the two races and how it is detrimental to the overall lives of the people involved.

One important theme of the story is racism, "Apartheid" which seemingly dictates who is superior and who is not. The huge divide in not only the living spheres of the two groups of citizens but also in their approaches to society is indicative of the discriminative attitude and perception of the people, especially with the whites claiming themselves to be superior and 'civilized'. The book deals largely with the colonial mindset of the whites while also the structural bigotry apparent in the mindset of the people.

Thus, the correct answer is the second option.

Answer:

The disintegration of South African society.

Explanation:

refers to cells not wide enough to display the entire entry.

Answers

In spreadsheet applications, when the content within a cell exceeds the width of the cell itself, it results in the content being cut off or truncated. Cells not wide enough to display the entire entry are referred to as "overflow" or "truncated" cells.

Overflow occurs when the text or data in a cell extends beyond the visible width of the cell. This can happen when the cell's width is not sufficient to accommodate the entire content. As a result, the excess content is not displayed within the cell, and only a portion of the entry is visible.

To address this issue, spreadsheet applications typically offer options to adjust the column width to fit the content automatically or manually. Automatic adjustment ensures that the column width expands to display the complete content of the cell. Manual adjustment allows users to manually resize the column width to ensure all content is visible.

Truncated cells can cause problems when working with data, as important information may be hidden from view. It is important to ensure that column widths are adjusted appropriately to prevent data loss or misinterpretation.

Learn more about Truncated cells  here:

https://brainly.com/question/31753306

#SPJ11

Write a split_check function that returns the amount that each diner must pay to cover the cost of the meal. the function has 4 parameters:

Answers

The function has 4 parameters:

def split_check(bill, people, tax_percentage = 0.09, tip_percentage = 0.15):

  tip = bill * tip_percentage

  tax = bill * tax_percentage

  total = bill + tip + tax  

  return total / people

bill = float(input())

people = int(input())

print("Cost per diner: " + str(split_check(bill, people)))

bill = float(input())

people = int(input())

new_tax_percentage = float(input())

new_tip_percentage = float(input())

Create a function named split check that takes four parameters, bill, persons, tax percentage and tip percentage (last two values are optional) (last two parameters are optional)

Use the percentages to compute the tip and tax inside the function. Add the bill, the tip, and the tax to get the final amount. The cost per person is then calculated by dividing the amount by the number of people.

Learn more about parameters:

https://brainly.com/question/28249912

#SPJ4

What is the output of the following line of code? print (“I\tLove Python”)

Answers

Answer: it will print:

I (4 spaces) Love Python

Explanation: the \t adds in a tab (4spaces) in a print statement

What is the output of the following line of code? print (I\tLove Python)
What is the output of the following line of code? print (I\tLove Python)

2. Write a QBASIC program to enter a number and print whether its even or odd.​

Answers

In order to determine if a number is even or divisible by two (i.e., divisible by two), this application first asks the user to enter a number. If num MOD 2 yields a value of 0, 0.

How can a software that determines if a number is even or odd be written?

The necessary code is shown below. Number = int (input) (“Enter any number to test whether it is odd or even: “) if (num % 2) == 0: print (“The number is even”) else: print (“The provided number is odd”) Output: Enter any number to test whether it is odd or even: 887 887 is odd.

CLS

INPUT "Enter a number: ", num

IF num MOD 2 = 0 THEN

   PRINT num; " is even."

ELSE

   PRINT num; " is odd."

END IF

To know more about application visit:-

https://brainly.com/question/30358199

#SPJ1

What is the meaning of the term "social engineering" in the area of cybersecurity? Multiple Choice the impersonation of trusted organizations to trick people into making online donations the act of manipulating or tricking people into sharing confidential, personal information the use of online surveys or polls to gauge public sentiment and influence public opinion О the waging of misinformation campaigns through social media posts with false information

Answers

The meaning of the term "social" in the context of cybersecurity refers to human interaction and behavior.

Social engineering is the act of manipulating or tricking people into sharing confidential, personal information or performing certain actions that may compromise their cybersecurity. This type of attack targets the human element of cybersecurity, such as employees or users, rather than the technical infrastructure itself. Social engineering attacks can come in many forms, such as phishing emails, phone scams, or impersonation of trusted individuals or organizations. The goal of social engineering is to gain access to sensitive information or systems by exploiting human vulnerabilities, such as trust, fear, or curiosity. In order to prevent social engineering attacks, it is important to raise awareness and provide education on how to identify and respond to suspicious requests or activities. Cybersecurity measures should also be implemented to protect against unauthorized access and data breaches.

Learn more on cyber security here:

https://brainly.com/question/24856293

#SPJ11

You run a small business and have just set up the internal computer network. You have four people working for you and you want their computers to automatically obtain IP configuration information. Which type of server will you use?

A.
DHCP server
B.
DNS server
C.
IP configuration server
D.
Domain controller

Answers

the answer is A. DHCP is the Dynamic Host Configuration Protocol. It is used to automatically provide IP addressing information to clients. A DHCP server can assign IP addresses, subnet masks, a DNS server address, and much more. This frees you from having to manually enter this information on all your client systems.

Damage to data or equipment that in which the data or equipment can not be recovered is which concern

Answers

Damage to data or equipment in which the data or equipment can not be recovered in the concern associated with data loss.

What happens when data is lost or damaged?

The notoriety of a business may definitely suffer due to data loss or damage. It involves a complete process of communicating a data loss incident to customers, but it can unintentionally outcome in a lack of trust and discontent.

According to the context of this question, the mechanism of data loss takes place when data is completely or partially destroyed, corrupted, or made unreadable by software applications and users. It is thought that the process of data loss accidentally or unintentionally happens.

Therefore, damage to data or equipment in which the data or equipment can not be recovered is the concern associated with data loss.

To learn more about Data loss, refer to the link:

https://brainly.com/question/15027705

#SPJ9

Your question seems incomplete. The most probable complete question is as follows:

Damage to data or equipment that in which the data or equipment can not be recovered is which concern?

a concern associated with data loss. a concern associated with data recovery.a concern associated with data indentation.

Select the correct answer.
What is the Web of Trust?
А.
a group of experts who rate reviews as good or bad
a group of experts who analyze reviews before they go online
B.
C. a group of reviewers who review products frequently
D. a group of reviewers with your highest ratings
Reset
Next

Answers

A group of reviewers with your highest ratings

Answer: A.

Explanation:

A. a group of experts who rate wiews as good or bad.

what is targets net worth in 2020 (i will see if you put in 2019)

Answers

Answer:

62.6 billion

Explanation:

Other Questions
Which protocol is most likely used to communicate with a san over an ethernet lan using standard nics? what did the constitution replace as our governing document in the united states? Select the correct answer.An image illustrates a turn traffic sign.Which navigational command does the image represent? A. Ve a la derecha. B. Ve a la izquierda. C. Ve derecho. D. Ve recto. It part of a Law of Exponents What are the 5 steps in the basic risk management process? Which of the following geologic profiles would most likely be found at the circled region in the figure?B) peat, peat, sedimentary rock, igneous rock tool city rental shop will rent a pressure washer for $35 for the first 3 hours, and $8 for each additional hour, up to a total of 10 hours. after this, you will pay the full-day price of $87. you may also choose to buy an optional $5 insurance policy to cover any damage that occurs to the tool. note: you cannot pay for a partial hour, so if you keep the washer for 7 hours and 1 minute, you will be charged for 8 full hours. if you rented the washer at 9:40 am and returned it at 3:00 pm on the same day, and you bought the optional insurance, how much would you owe for the rental? Match the protein with its necessary non-protein organic molecule component. rhodopsin [choose]hemoglobin [choose]carboxypeptidase [choose]carboxylase [choose]Multiple Choice- zinc ion- heme group- telomerase- retinal- runisco- biotin Read the excerpt from the passage:"Send the bill," he said.*To you or the town?"da very early The Mayor didn't look at him. He closed the door and said through the screen:i mold, out of "It's the same thing."e order, as ifolden stud,How does the author's word choice impact the meaning of the passage?correspondeda. It emphasizes the power of the mayor over the townspeople.c. It reveals that the mayor feels he is equal with the citizens of the town.ir and sating, butO b. It conveys the mayor's displeasure with the dentist's performance.O d. It highlights that the mayor blatantly disregards the dentist's financial status.aw two pensivext door He What was the argument of the students in Tinker v. Des Moines? Where did the narrator live before she moved to The house on mango street? How were her previous homes different? A buyer purchases a rental home that is fully furnished. The document used to transfer title to the furniture is: a. quitclaim deed b. bill of sale Give me lil reasoning so I know your not lying for points:( (Ill mark you as brainlister ) Sales for Triad Inc. have grown from $3.500 million to $9.500 million in 8 years. What is the implied annual growth rate of sales for Triad? a 13.29% b 14.13% c 9.44% d 6.97% what is the value of the expression below when x=4 and y=4? 3x+7 BACKGROUND: i. Khalil Mahmoud and his 4 brothers decided to open a furniture factory which they called Mahmoudco Furnishings. Their idea was to purchase cheap wood, cut it, and assemble cheap furniture for sale in the market. Their goal was to become the cheap furniture provider in the region. They decided to open 10 more branches in the major cities in the Kingdom within 3 years. Since Khalil was the older brother, he was made CEO of the company. ii. Mahmoudco Furnishings needed to expand due to increasing business. In order to fulfill their delivery orders, the company decided to buy three (3) medium-to-large trucks for pickup and delivery for the major branch. THEY HAVE A LIMITED BUDGET SET ASIDE, BUT KHALIL DID NOT SPECIFY IT. HE WOULD MAKE HIS CHOICE BASED ON A COMPARISON OF CHOICES. Questions 1. Important question: Go to the Internet. Search the national AND international market for trucks that Mahmoudco Furnishings could buy. To shorten your search, choose among Honda, Toyota, Hyundai/Kia, Nissan, Mitsubishi, and/or ANY 3 BRANDS YOU WANT. Go through the 8 steps for business purchase like the example in class, as it applies to this case. REFER TO THE BOOK FOR MORE DETAILS. Listing the steps gets you a ZERO. You must explain each step as it applies to the case (similar to example in class). List 4-5 criteria you would choose to compare them on, and do it. In the end, tell me which vehicles YOU would choose.(4 points) 2. What micro or macro environmental forces would MOST effect Mahmoudco Furnishings? List and explain 1 micro and 1 macro elements. (2 points) 3. For the furniture consumer, what kind of decision is this (complex, variety seeking, habitual, dissonance reducing)? Explain your answer fully. What are the steps the consumer would go through to purchase from Mahmoudco (steps in purchase)? (3 points) 4. ASSUME Mahmoudco Furnishings is making the purchase decision today: knowing what you do about the Coronavirus outbreak, what ADVICE would you give them? Why? What would YOU do in his place? EXPLAIN. (1 points) NOTE: PICKUP TRUCKS ARE NOT A CHOICE. DO NOT PUT PICKUP TRUCKS. PICKUP TRUCKS DO NOT QUALIFY. IF YOU CHOOSE PICKUP TRUCKS, YOU WILL RECEIVE A LOW GRADE Which expression shows the first step in dividing 5x + 3 by x? Find the Lateral Area and Surface Area of the figure.1310Perimeter of the base =Slant height =(Note: 13 is NOT the slant height)Area of the base =square unitsL.A. =square unitsS.A. =square unitsBlank 1:Blank 2:Blank 3:Blank 4:Blank 5: you are the secretary of students council of delhi public school , new delhi . you are organising an excursion to manali. write a letter in about 100-150 words , to the director of tourism department, manali, asking the information on that terms and condition of conducting an excursion. People who wish to celebrate their love may do so with this ceremony. la boda el beso el abrazo el esposo