With the subscription model of software licensing, companies pay for software solely during the time an employee is actively using it. true false

Answers

Answer 1

The statement "With the subscription model of software licensing, companies pay for software solely during the time an employee is actively using it." is false.

What is software licensing?

Software licensing is documentation or law that is made for the redistribution of that software. It is a legal document. This document is used for the use of the software.

With licensed software, there is limited use of that software, and only those who have permission will use this software. The statement is against the licensing, so it is false.

Therefore, the statement is false.

To learn more about software licensing, refer to the link:

https://brainly.com/question/24288054

#SPJ1


Related Questions

Write a program that reads two times in military format (0900, 1730) and prints the number of hours and minutes between the two times.

Answers

In order to write a program in Python that reads two military formatted times (0900 and 1730) and then prints the number of hours and minutes between the two times, we can follow these steps.

Input the two times from the userStep 2: Extract the hour and minute values from each timeStep 3: Convert both times to minutes and store them in separate variablesStep 4: Calculate the absolute difference between the two times in minutesStep 5: Calculate the hours and minutes from the difference in minutesStep 6: Print the output in the required format (i.e. hours and minutes)Here is the Python code that implements the above steps:# Step 1: Input the two timesfrom_time = input("Enter the first military formatted time (HHMM): ")to_time = input("Enter the second military formatted time (HHMM): ")# Step 2: Extract the hour and minute\(valuesfrom_hour1 = int(from_time[:2])from_min1 = int(from_time[2:])to_hour2 = int(to_time[:2])to_min2 = int(to_time[2:])\)# Step 3: Convert both times to \(minutesfrom_min_total = (from_hour1 * 60) + from_min1to_min_total = (to_hour2 * 60) + to_min2\)#

Calculate the absolute difference between the two times in \(minutesdiff_min = abs(from_min_total - to_min_total)\)# Step 5: Calculate the hours and minutes from the difference in \(minuteshours = diff_min // 60minutes = diff_min % 60\)# Step 6: Print the output in the required format (i.e. hours and minutes)print("The difference between", from_time, "and", to_time, "is", hours, "hours and", minutes, "minutes.")Note: This program works correctly only if the second input time is greater than the first input time. Also, the input time values must be in the 24-hour format (HHMM).

To know more about separate visit:

https://brainly.com/question/13619907

#SPJ11

how to make a quizlet public

Answers

Answer:

you make one and and put public

What is the rarest gun on surviv io

Answers

Answer: It's the M249

Explanation: I wanna get brainliest XD

Answer: Bippity Boopity the answer is yesity

Explanation: No

allow the user to issue commands by selecting icons, buttons, menu items, and other objects—typically with a mouse, pen, or finger

Answers

The user interface paradigm that allows the user to issue commands by selecting icons, buttons, menu items, and other objects, typically using a mouse, pen, or finger, is known as graphical user interface (GUI).

GUIs provide a visual and interactive way for users to interact with computer systems, applications, and software. Users can navigate through the interface and perform actions by clicking on icons, buttons, or menu items using input devices like a mouse, pen, or finger on touchscreens.This graphical approach to user interfaces offers a more intuitive and user-friendly experience compared to command-line interfaces. GUIs enable users to interact with software using visual representations and familiar interaction patterns, enhancing usability, accessibility, and ease of learning.

To learn more about  paradigm   click on the link below:

brainly.com/question/30644305

#SPJ11

Select the correct answer.
Ben wants to keep similar items close to each other in the image he is working on. Which is the most effective technique for applying the gestalt
concept of proximity?
The BLANK technique is the most effective technique for applying the gestalt concept of proximity.

Answers

Gestalt Principles are principles/laws of human perception that describe how humans group similar elements, recognize patterns and simplify complex images when we perceive objects.

What are the Gestalt Principles?

The tendency to view items as belonging to the same grouping when they are close to one another is known as the gestalt principle of

proximity

. It claims that regardless of how different the forms and sizes are from one another, if shapes are close to one another, you will perceive them as groups. One of Gestalt's principles, the concept of closeness focuses on how each stimulus would be seen in its most basic form. The

Law of Simplicity

or the Law of Pragnanz are other names for it. It is founded on the idea that the sum of a thing is worth more than the sum of its components.

To learn more about Gestalt Principles refers to;

https://brainly.com/question/4734596

#SPJ1

unless implemented by iframe as non script, the tag tester tool browser icon will activate only on pages with the tag manager implemented.falsetrue

Answers

It is false that unless implemented by iframe as non script, the tag tester tool browser icon will activate only on pages with the tag manager implemented.

The tag tester application A browser icon, sometimes known as a tag debuger or tag inspector, is a functionality that some browser extensions or development tools provide.

Its primary goal is to assist developers and marketers in debuging and analysing the tags and scripts used on a webpage.

The presence of a tag management implementation on a webpage does not affect the activation of the tag tester tool browser icon.

Browser extensions or developer tools often give the tag tester tool browser icon, which allows users to analyse and debug tags and scripts running on a webpage. It has nothing to do with the presence or deployment of a tag management.

Thus, the given statement is false.

For more details regarding browser, visit:

https://brainly.com/question/19561587

#SPJ4

What happens on a phone or tablet if it runs out of RAM to run processes? Is there additional storage?

Answers

Answer:

Ur phone/tablet starts to become laggy

Explanation:

true or false: constructing the document object model (dom) requires style information.

Answers

False, constructing the Document Object Model (DOM) does not require style information.

The Document Object Model (DOM) is a programming interface for web documents. It represents the structure of a document, such as an HTML or XML document, as a tree of objects. Each object represents a part of the document, such as an element or attribute, and allows programmers to manipulate the content and structure of the document.

Style information, on the other hand, pertains to the appearance of the document and is typically provided by Cascading Style Sheets (CSS). While style information can be applied to elements within the DOM, it is not a requirement for constructing the DOM itself. The DOM focuses on the document's structure, whereas style information deals with its presentation.

Learn more about programming here:

https://brainly.com/question/14368396

#SPJ11

What is a named bit of programming instructions?

Answers

Answer:

Function: A named bit of programming instructions. Top Down Design: a problem solving approach (also known as stepwise design) in which you break down a system to gain insight into the sub-systems that make it up.

is a backup copy of the configuration of a pc which a user can revert to if an operational problem arises.

Answers

A restore point is a backup copy of the configuration of a pc which a user can revert to if an operational problem arises.

A restore point is a feature in computer operating systems that allows users to create a snapshot of the system's settings, files, and configurations at a specific point in time. It serves as a reference point that can be used to revert the system back to that particular state if issues or errors occur in the future.

They are typically created automatically by the operating system during certain events, such as the installation of new software or system updates.

Learn more about restore point, here:

https://brainly.com/question/32666274

#SPJ4

this strategy focuses on overwhelming the enemy (the competitor) with vastly superior resources.

Answers

The strategy that focuses on overwhelming the enemy (the competitor) with vastly superior resources is called the  "Resource Domination Strategy."

This strategy involves using your superior resources, such as finances, technology, or personnel, to overpower your competitor and gain a competitive advantage in the market. The steps for implementing this strategy are:

1. Identify your key resources: Determine the resources that give you an advantage over your competitors, such as funding, skilled workforce, or advanced technology.

2. Invest in strengthening these resources: Allocate more resources to further improve and expand your strengths in the areas where you already have an advantage.

3. Exploit your competitor's weaknesses: Understand the areas where your competitor is lacking and use your superior resources to target these weaknesses.

4. Launch an aggressive marketing campaign: Leverage your resources to create a comprehensive marketing campaign that highlights your strengths and puts pressure on your competitor.

5. Monitor and adjust: Continuously monitor the market and your competitor's actions, adjusting your strategy as needed to maintain your competitive advantage.

By following these steps, you can effectively implement a Resource Domination Strategy to overwhelm your competitor with your vastly superior resources.

To learn more about strategy : https://brainly.com/question/31525499

#SPJ11

Can anyone help me out with my photography questions?

Can anyone help me out with my photography questions?

Answers

Verifying, The answer above me is correct

BJP4 Self-Check 7.21: swapPairs

Write a method named swapPairs that accepts an array of strings as a parameter and switches the order of values in a pairwise fashion. Your method should switch the order of the first two values, then switch the order of the next two, switch the order of the next two, and so on.

PLEASE HELP DUE AT 11:59

Answers

Answer:

public static void swapPairs(ArrayList strList)

{

 for(int i = 0; i < strList.size() - 1; i += 2)

 {

  String temp1 = strList.get(i);

  String temp2 = strList.get(i + 1);

  strList.set(i, temp2);

  strList.set(i + 1, temp1);

 }

}

Explanation:

What is a decision tree

Answers

A decision tree is a diagram or chart that people use to determine a course of action or show a statistical probability.

Decomposition is
O a list of steps to complete a task.
O a set of steps that follow one another in order.
O breaking a problem into smaller parts
O a design flaw in the program.

Answers

Answer:

breaking a problem into smaller parts

Explanation:

In language of computer science, decomposition is the process in which complex problems are divided into simpler parts. These simpler parts helps in the solving of the complex problems. They are made easier and comprehensible for the user to understand. Each simple part is further analyzed separately and the solution of the complex issues are derived.  The process becomes lengthy but the solution is found.

You are working as a software developer for a large insurance company. Your company is planning to migrate the existing systems from Visual Basic to Java and this will require new calculations. You will be creating a program that calculates the insurance payment category based on the BMI score.



Your Java program should perform the following things:



Take the input from the user about the patient name, weight, birthdate, and height.
Calculate Body Mass Index.
Display person name and BMI Category.
If the BMI Score is less than 18.5, then underweight.
If the BMI Score is between 18.5-24.9, then Normal.
If the BMI score is between 25 to 29.9, then Overweight.
If the BMI score is greater than 29.9, then Obesity.
Calculate Insurance Payment Category based on BMI Category.
If underweight, then insurance payment category is low.
If Normal weight, then insurance payment category is low.
If Overweight, then insurance payment category is high.
If Obesity, then insurance payment category is highest.

Answers

A program that calculates the insurance payment category based on the BMI score is given below:

The Program

import java.io.FileWriter;

import java.io.IOException;

import java.io.PrintWriter;

import java.util.ArrayList;

import java.util.Scanner;

public class Patient {

   private String patientName;

   private String dob;

  private double weight;

   private double height;

   // constructor takes all the details - name, dob, height and weight

   public Patient(String patientName, String dob, double weight, double height) {

       this.patientName = patientName;

       this.dob = dob;

       if (weight < 0 || height < 0)

           throw new IllegalArgumentException("Invalid Weight/Height entered");

       this.weight = weight;

       this.height = height;

   }

   public String getPatientName() {

       return patientName;

   }

   public String getDob() {

       return dob;

   }

   public double getWeight() {

       return weight;

   }

   public double getHeight() {

       return height;

   }

   // calculate the BMI and returns the value

   public double calculateBMI() {

       return weight / (height * height);

   }

   public static void main(String[] args) {

       ArrayList<Patient> patients = new ArrayList<Patient>();

       Scanner scanner = new Scanner(System.in);

       // loop until user presses Q

       while (true) {

           System.out.print("Enter patient name: ");

           String patientName = scanner.nextLine();

           System.out.print("Enter birthdate(mm/dd/yyyy): ");

           String dob = scanner.nextLine();

           System.out.print("Enter weight (kg): ");

           double wt = scanner.nextDouble();

           System.out.print("Enter height (meters): ");

           double height = scanner.nextDouble();

           try {

               Patient aPatient = new Patient(patientName, dob, wt, height);

               patients.add(aPatient);

           } catch (IllegalArgumentException exception) {

               System.out.println(exception.getMessage());

           }

           scanner.nextLine();

           System.out.print("Do you want to quit(press q/Q):");

           String quit = scanner.nextLine();

           if (quit.equalsIgnoreCase("q")) break;

       }

       try {

           saveToFile(patients);

           System.out.println("Data saved in file successfully.");

       } catch (IOException e) {

           System.out.println("Unable to write datat to file.");

       }

   }

   // takes in the list of patient objects and write them to file

   private static void saveToFile(ArrayList<Patient> patients) throws IOException {

       PrintWriter writer = new PrintWriter(new FileWriter("F:\\patients.txt"));

       for (Patient patient : patients) {

           double bmi = patient.calculateBMI();

           StringBuilder builder = new StringBuilder();

           builder.append(patient.getPatientName()).append(",");

           builder.append(patient.getDob()).append(",");

           builder.append(patient.getHeight()).append(" meters,");

           builder.append(patient.getWeight()).append(" kg(s), ");

           if (bmi <= 18.5) builder.append("Insurance Category: Low");

           else if (bmi <= 24.9) builder.append("Insurance Category: Low");

           else if (bmi <= 29.9) builder.append("Insurance Category: High");

           else builder.append("Insurance Category: Highest");

           builder.append("\r\n");

           writer.write(builder.toString());

           writer.flush();

       }

       writer.close();

   }

}

Read more about java programming here:

https://brainly.com/question/18554491

#SPJ1

What are the three main elements common to all radio ads?

Answers

Answer: final notions on frequency, reach, and consistency.



If my answers wrong please tell me :D
Vhhhhhhhhjjjgvhjjghhhhh

Hey y'all I need this answer like immediately. How do you select non-adjacent cells in Excel? I'll give you brainliest, pleaseee!!!

Answers

Answer:

Click on a cell to select it. Or use the keyboard to navigate to it and select it.

To select a range, select a cell, then with the left mouse button pressed, drag over the other cells.

Or use the Shift + arrow keys to select the range.

To select non-adjacent cells and cell ranges, hold Ctrl and select the cells.

Explanation:

i hope that helps! if it doesn't help than i'm sorry!!

why is preserving the integrity of data, information, and systems an important cybersecurity goal?

Answers

Preserving the integrity of data, information, and systems is an important cybersecurity goal because it ensures that data, information, and systems are accurate, consistent, and reliable.

What is cybersecurity ?

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These attacks are usually aimed at accessing, changing, or destroying sensitive information, extorting money from users, or interrupting normal business processes. Cybersecurity involves technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.

It also helps to protect data, information, and systems from unauthorized access, manipulation, and malicious attacks. Furthermore, preserving data, information, and systems integrity ensures that the data and information remain secure and accessible only to authorized users.

To learn more about cybersecurity
https://brainly.com/question/28004913
#SPJ4

which set of access control entries would allow all users on the 192.168.10.0/24 network to access a web server that is located at 172.17.80.1, but would not allow them to use telnet?

Answers

To allow all users on the 192.168.10.0/24 network to access a web server at 172.17.80.1 without allowing them to use Telnet, you need to set up Access Control Entries (ACEs) in the Access Control List (ACL). Follow these steps:

1. Create an ACL: First, you need to create an ACL on the network device (such as a router) managing the traffic between the two networks.

2. Permit HTTP and HTTPS traffic: Web servers typically use HTTP (port 80) and HTTPS (port 443) protocols. To permit web access, create two ACEs that allow traffic from the 192.168.10.0/24 network to the 172.17.80.1 server on ports 80 and 443.

Example:
```
access-list 101 permit tcp 192.168.10.0 0.0.0.255 172.17.80.1 0.0.0.0 eq 80
access-list 101 permit tcp 192.168.10.0 0.0.0.255 172.17.80.1 0.0.0.0 eq 443
```

3. Deny Telnet traffic: Telnet uses port 23. Create an ACE to deny Telnet traffic from the 192.168.10.0/24 network to the 172.17.80.1 server.

Example:
```
access-list 101 deny tcp 192.168.10.0 0.0.0.255 172.17.80.1 0.0.0.0 eq 23
```

4. Permit other necessary traffic: If you need to allow other types of traffic between the networks, add ACEs accordingly.

5. Apply the ACL: Finally, apply the ACL to the appropriate interface on your network device, such as the router's inbound interface.

Example:
```
interface FastEthernet0/0
ip access-group 101 in
```

By following these steps, you can set up Access Control Entries that allow all users on the 192.168.10.0/24 network to access the web server at 172.17.80.1 while preventing them from using Telnet.

To know more about HTTP visit:

https://brainly.com/question/13152961

#SPJ11

HELP
If there is a need to write code in order to help the player move through the game which team member would create this code?
a. writer
b. graphic designer
c. software engineer
d. sound designer

Answers

I’m pretty sure the answer is b

A cloud computing service model whereby one or more computing environments suitable for use in application development and testing are provided as a turnkey, on-demand service. is known as _____.

Answers

A cloud computing service model whereby one or more computing environments suitable for use in application development and testing are provided as a turnkey, on-demand service. is known software-as-a-Service (SaaS).

What is Cloud computing?

Cloud computing refers to programs and offerings that run on an allotted community the usage of virtualized sources and accessed via way of means of not unusual place Internet protocols and networking standards.

Software-as-a-Service (SaaS) is a version of carrier shipping wherein one or greater programs and the computational sources to run them are furnished to be used on call for as a turnkey carrier. Its principal cause is to lessen the overall fee of hardware and software program development, maintenance, and operations.

Read more about the cloud computing service :

https://brainly.com/question/19057393

#SPJ1

Alfred works in the human resources department, and he uses a management information system to find applicants' résumés on the web and filter them to match needed skills.

The type of MIS that recruiters use is a(n) ________ system.

Answers

Answer:

ATS

Explanation:

A management information system or MIS is defined as a computer system that consists of hardware as well as software which serves as the backbone of any organization's operations. It gathers data and information from the web and analyse the data for decision making.

In the context, Alfred works in the HR department and he uses an ATS system to find resumes online and match them with the desired skill sets of the job profile.

An ATS stands for Applicant Tracking System. It is a HR software that acts as the database for the applicants.This software helps the recruiting agent to filter the skills and the required experiences from the database of all the resumes in the web and select according to the requirement of the job.

what is the value of the time-to-live field in an igmp query message

Answers

In the IGMP (Internet Group Management Protocol) query message, there is no specific field called "time-to-live." The time-to-live (TTL) field is typically found in IP (Internet Protocol) packets and represents the maximum number of network hops (routers) that the packet can traverse before being discarded.

IGMP query messages are sent by a multicast router to query the multicast group membership of hosts on the local network. They are encapsulated within IP packets, and the TTL field in the IP packet header determines the scope of the query message.

The TTL value for IGMP query messages is usually set to 1, indicating that the message should not be forwarded beyond the local network segment. This helps prevent unnecessary propagation of query messages across the entire network.

It's important to note that the specific structure and fields of IGMP messages may vary depending on the version of IGMP being used (e.g., IGMPv1, IGMPv2, IGMPv3). However, none of these versions include a "time-to-live" field within the IGMP query message itself.

Learn more about IGMP  here:

https://brainly.com/question/30588884  

#SPJ11

Sean wants to build a robot. What part of the robot will he need to include that enables the robot to process sensory information?

Answers

To enable a robot to process sensory information, Sean will need to include a sensor system as part of the robot. The sensor system will provide input to the robot's central processing unit (CPU) or microcontroller, allowing it to perceive and respond to its environment. The specific sensors needed will depend on the robot's intended function and the type of sensory information it needs to process. Common sensors used in robots include cameras, microphones, touch sensors, and proximity sensors.

#SPJ1

Python does not allow if statements to occur within the definition of a function.
True
False
Every HTML document needs to begin with which of the following tags?

Answers

Answer:

1. Python does allow if statements to occur within the definition of a function.

2. Begins with <html> Ends with </html>

what is the difference between word processing software and presentation software​

Answers

Answer:

Word is a word processing program. PowerPoint is presentation software. MS Word is used for preparing documents which have higher quantum of text and tables. ... On the other hand, MS Powerpoint is used in cases where you want to give a presentation.

Word is a program for word processing. Presentation tools include PowerPoint. Documents with a greater amount of text and tables are created using MS Word. However, if you want to give a presentation, MS PowerPoint is what you use.

What word processing software and presentation software​?

Plain text is typed and edited in word processing, whereas presentation software is used to edit and create visual aids to assist your presentation.

Word processors are specialized pieces of software that are required to do word processing. Many individuals use various word processing tools in addition to Microsoft Word, which is only one example.

Therefore, In contrast to presentation software, which prevents you from doing so, word processing software allows you to create papers and keep your information privately

Learn more about software here:

https://brainly.com/question/12114624

#SPJ2

An individual has chosen the public key of N = 187 = 11 x 17 and e = 3. What is the private key using RSA encryption? A 2 B 107 с 15 D 160

Answers

The answer is (C) 15, since the private key is d = 53.

How can I calculate an RSA private key from a public key?

The steps below are used by the RSA algorithm to create public and private keys: Choose the two huge primes p and q. Find n = p x q by multiplying these values, where n is referred to as the modulus for encryption and decoding. The public key is if n = p x q.

What is the RSA algorithm's key size?

The minimal size for secure and clear RSA keys in the public key data set (PKDS) is 512 bits. The token key data set (TKDS) requires safe RSA keys to be at least 1024 bits in size.

To know more about private key visit:-

https://brainly.com/question/29999097

#SPJ4

What are the 3 things needed for tissue engineering?

Answers

Tissue engineering is the process of generating artificial biological tissue in the laboratory by combining cells, biomaterials, and biologically active molecules.

The three essential components required for tissue engineering are as follows:

1. Scaffolds: Scaffolds are structures made of various biomaterials that provide mechanical support for cells to develop and grow into tissues. They provide a temporary structural framework for cells to attach and form tissues, as well as assist in delivering cells and bioactive agents to the site of tissue formation.

2. Cells: Stem cells, primary cells, and cell lines are the three types of cells that are required for tissue engineering. The cells must be sourced from the same patient to minimize the likelihood of immune rejection. These cells are implanted into the scaffold, where they differentiate and proliferate to generate functional tissue.

3. Signaling molecules: These molecules, including growth factors, cytokines, and other bioactive agents, interact with cells to regulate their differentiation, proliferation, and migration during tissue regeneration. They are included in the scaffold or delivered separately to the implantation site to promote tissue formation and vascularization.

Learn more about tissue engineering at

https://brainly.com/question/31981857

#SPJ11

3.4 Code Practice: Question 2

Answers

Answer:

n = float(input("Enter the Numerator: "))

d = float (input("Enter the Denominator: "))

if (d != 0):

  print ("Decimal: " + str(n/d))

else:

  print("Error - cannot divide by zero.")

Other Questions
The perimeter of this isosceles triangle is 22 cm. if one side is 6 cm, what are the possible lengths of the other two sides? 8 and 8 part b explain how you know. provide at least one reason for your answer. why do states usually try to solve their disagreements through bargaining? maxine knows the students will be disappointed that her textbook is out of stock, but she needs to get them information about their orders. this is a major problem as students may have to withdraw from their class or pay double the cost for a special copying process. how should maxine start her email to the students? the ice cream shop has 10 flavor of ice cream, how many different two-scoop ice cream cones can you make? What is the best topic for a project for systems analysis and design? In the ____________ , the child learns about the world by coordinating sensory experiences (like hearing and seeing) with physical actions. Approximately 9% of high school athletes go on to play sports in college. Of these college athlets, only 1.3% go on to play professional sports. What is the probability that a high school athlete will go on to play professional sports Which revision corrects Sams error in the use of dashes to set off a clause in sentence 4? a The longhorns had been skittish, but Johnny Chillers, who was named for the old Chillers trail, sang to themwhenever they started to spookto calm them down. b The longhorns had been skittish, but Johnny Chillerswho was named for the old Chillers trail sang to themwhenever they started to spook to calm them down. c The longhorns had been skittish, but Johnny Chillerswho was named for the old Chillers trailsang to them whenever they started to spook to calm them down. d The longhorns had been skittishbut Johnny Chillerswho was named for the old Chillers trail, sang to them whenever they started to spook to calm them down. How did septima p. clark, modjeska simkins and matthew j. perry take leadership roles in fighting for african american rights in south carolina? briefly explain what each person did. Which of the following tools or commands can be used to monitor resources in Windows? Select all that apply.a) The PowerShell Get-Processcommandlet. b) Control Panel. c) The msinfo32 command entered in the CLI. d) The Resource Monitoring tool accounting profit is equal to: a. total revenue minus implicit costs. b. explicit costs minus implicit costs. c. explicit costs plus implicit costs. d. total revenue minus explicit costs. e. total revenue minus implicit costs and explicit costs. The diameter of circle o is ac, and mbc = 62. what is maob Classes that serve one another or serve a purpose can be in a I Choose from the list: stored directory project folder packaged embedded According to research describing innovation adoption curves, the greatest percentage of customers who might adopt a solution would be found where on the above distribution curve? Why did both core and sncc increasingly turn away from nonviolence by the late 1960s? do you think this turn was a good idea? why or why not? (100 points) Questlon 10 of 20 Which comparison-contrast statement is most effective? O A. Both were important 19th-century poets, but Dickinson was famous for her reclusive lifestyle, while Whitman enjoyed being a part of public life and conversing with many people. OB. Though they lived during the same time period, Dickinson wrote compact poems about ordinary events, while Whitman wrote longer poems about public life and well-known events. O C. While a majority of Emily Dickinson's works were published after her death, Whitman's most famous work, Leaves of Grass, was published during his lifetime. OD. Though Dickinson wrote mostly from her home in Amherst, Massachusetts, and Whitman wrote from his home in New Jersey, both wrote during the 1800s. At a circus, tickets cost $6.75 per person. a family of four spent $73.00 on tickets and food. if each person spent an equal amount on food, how much did each person spend on food? Convert Fraction to Decimal 19/40 2. Answer the following questions:1. What was the role of the use of credit in creating the Great Depression?2. What was the role of The Federal Reserve in creating the Great Depression?3. What is a tariff? (you may need to do additional research for the answer)4. How did the Smoot-Hawley Tariff contribute to extending or prolonging the GreatDepression? Which statement describes part of the meeting scheduling process? It is always an all-day event. It is created in a single calendar. It cannot be viewed by anyone except the meeting organizer. It requires recipients of the meeting request to respond.