A free open source audio editing software program is
Sound Forge.
Pro Tools.
iTunes.
Audacity.

Answers

Answer 1

Answer:

D. Audacity

Explanation:


Related Questions

PLEASE HELP
Find five secure websites. For each site, include the following:

the name of the site

a link to the site

a screenshot of the security icon for each specific site

a description of how you knew the site was secure

Use your own words and complete sentences when explaining how you knew the site was secure.

Answers

The name of the secure websites are given as follows:

wwwdotoxdotacdotuk [University of Oxford]wwwdotmitdotedu [Massachusetts Institute of Technology]wwwdotwordbankdotorg [World Bank]wwwdotifcdotorg [International Finance Corporation]wwwdotinvestopediadotorg [Investopedia]

Each of the above websites had the security icon on the top left corner of the address bar just before the above domain names.

What is Website Security?

The protection of personal and corporate public-facing websites from cyberattacks is referred to as website security.

It also refers to any program or activity done to avoid website exploitation in any way or to ensure that website data is not accessible to cybercriminals.

Businesses that do not have a proactive security policy risk virus spread, as well as attacks on other websites, networks, and IT infrastructures.

Web-based threats, also known as online threats, are a type of cybersecurity risk that can create an unwanted occurrence or action over the internet. End-user weaknesses, web service programmers, or web services themselves enable online threats.

Learn more about website security:
https://brainly.com/question/28269688
#SPJ1

PLEASE HELPFind five secure websites. For each site, include the following:the name of the sitea link

In what year was napier bone invented ​

Answers

The Napier's Bones is a manually-operated calculating device, invented by the Scottish mathematician John Napier in the early 17th century, around the year 1617.

What is Napier bone used for?

Napier's Bones, also known as Napier's rods, are used for multiplication, division, and square root calculations. The device consists of a set of rectangular rods or bones with each bone representing a single digit in the multiplication table.

By manipulating the rods, users can quickly perform calculations that would otherwise be time-consuming to complete by hand. The Napier bone is an early example of a calculating device and is considered a predecessor to modern mechanical calculators.

Learn more about Napier bone  at:

https://brainly.com/question/24242764

#SPJ1

what general term describes the physical equipment of a computer system such as its video screen keyboard and storage device a output b software c hardware d input​

Answers

A computer is a physical system made up of real components and its own internal interactions that change its physical states. Thus, option C is correct.

What hardware describes physical equipment of computer?

The physical components required for a computer system to function are known as computer hardware. It encompasses all computer-related hardware that contains a circuit board. The motherboard, CPU, cooling fans, power supply, and so forth.

Therefore, hardware general term describes the physical equipment of a computer system, such as its video screen keyboard and storage device.

Learn more about hardware here:

https://brainly.com/question/14726020

#SPJ1

what is the importance of file management and how do you control files over time?\

Answers

Answer:

File management improves productivity by lowering the amount of time employees spend looking for documents. It also cuts down on the time it takes to recreate files when an employee can't find the original.

To control files over time, here are some tips.

-Delete unnecessary files

-Take immediate action on files you encounter

-Consolidate files when possible

-Have less folders as possible

According the SDLC phases, which among these activities see a substantial amount of automation initiatives?

A code generation
B release build
C application enhancement
D test case generation
E incident management

Answers

Answer:

d. test case generation

Explanation:

Testing should be automated, so that bugs and other errors can be identified without a human error and lack of concentration.

The System Development Life Cycle (SDLC) phase that has seen a substantial amount of automation is the A. code generation.

The main phases of the SDLC include the planning, analysis, design, development, testing, implementation, and maintenance phases.

Using automation for the code generation will help eliminate human errors and increase efficiency.

The code generation phase still requires some human input to ensure that user requirements are completely met.

Thus, while automation will be useful with all the SDLC phases, substantial amount of automation initiatives have been seen with the code generation phase.

Learn more about SDLC phases at https://brainly.com/question/15074944

Which of the following is used to create flow records that show relationships among various traffic types?
1. NetFlow
2. SNMP
3. sFlow
4. Syslog

Answers

NetFlow, An exclusive traffic monitoring technology from Cisco, known as NetFlow.

How does NetFlow work Cisco?Cisco developed the network protocol system known as NetFlow, which gathers active IP network traffic as it enters or exits an interface. The NetFlow data is then analyzed to produce a visual representation of the volume and flow of network traffic, hence the name.With SNMP, you may view all of the device's resource usage information, including physical resources, bandwidth utilization resources, and interface faults. You can determine the nature of the traffic using NetFlow.

To learn more about NetFlow refer,

https://brainly.com/question/29563059

#SPJ4

Creating a company culture for security design document

Answers

Use strict access control methods: Limit access to cardholder data to those who "need to know." Identify and authenticate system access. Limit physical access to cardholder information.

Networks should be monitored and tested on a regular basis. Maintain a policy for information security.

What is a healthy security culture?

Security culture refers to a set of practises employed by activists, most notably contemporary anarchists, to avoid or mitigate the effects of police surveillance and harassment, as well as state control.

Your security policies, as well as how your security team communicates, enables, and enforces those policies, are frequently the most important drivers of your security culture. You will have a strong security culture if you have relatively simple, common sense policies communicated by an engaging and supportive security team.

What topics can be discussed, in what context, and with whom is governed by security culture. It forbids speaking with law enforcement, and certain media and locations are identified as security risks; the Internet, telephone and mail, people's homes and vehicles, and community meeting places are all assumed to have covert listening devices.

To learn more about security culture refer :

https://brainly.com/question/14293154

#SPJ1

. The jury reached a verdict of not guilty as there wasn't ---- evidence to prove beyond a reasonable doubt he intended to kill his boss.

Answers

The completed statement is given as follows;

"The jury reached a verdict of not guilty as there wasn't sufficient evidence to prove beyond a reasonable doubt he intended to kill his boss."

What is the rationale for the above response?

It can be inferred that the reason why the jury reached a verdict of not guilty is that there was not enough evidence to prove that the accused intended to kill his boss.

In a criminal case, the prosecution must prove the defendant's guilt beyond a reasonable doubt, which is a high standard of proof. If there is insufficient evidence to meet this standard, the jury may acquit the defendant, which is what happened in the scenario presented in the question.

Learn more about Jury:

https://brainly.com/question/9788151

#SPJ1

how can the various templates that are available for new word documents to be accessed?
A opening up an instance of word
B pressing CTRL+N with word open
C clicking file to enter backstage view
D all of the above​

Answers

Answer:

ITS D ALL OF THE ABOVE.

Explanation:

HOPE THIS HELPS?

The various templates that are available for new word documents can be accessed by opening up an instance of word, pressing CTRL+N with word open and clicking file to enter backstage view. The correct option is D.

What is template?

Pre-made designs and documents that can be customized are referred to as design templates.

Templates are frequently designed to meet specific standards or specifications in order to be consistent across users and mediums.

A template is a document format that you can use to create your own. The templates available for new Word documents can be accessed by clicking File and then New.

Here you will find all of the templates available for use as well as the option to search for templates online that can be downloaded.

To access the various templates available for new Word documents, open a new instance of Word, press CTRL+N with Word open, and then click file to enter backstage view.

Thus, the correct option is D.

For more details regarding templates, visit:

https://brainly.com/question/13566912

#SPJ5

Are AWS Cloud Consulting Services Worth The Investment?

Answers

AWS consulting services can help you with everything from developing a cloud migration strategy to optimizing your use of AWS once you're up and running.

And because AWS is constantly innovating, these services can help you keep up with the latest changes and ensure that you're getting the most out of your investment.

AWS consulting services let your business journey into the cloud seamlessly with certified AWS consultants. With decades worth of experience in designing and implementing robust solutions, they can help you define your needs while executing on them with expert execution from start to finish! AWS Cloud Implementation Strategy.

The goal of AWS consulting is to assist in planning AWS migration, design and aid in the implementation of AWS-based apps, as well as to avoid redundant cloud development and tenancy costs. Project feasibility assessment backed with the reports on anticipated Total Cost of Ownership and Return on Investment.

Learn more about AWS consulting, here:https://brainly.com/question/29708909

#SPJ1

Note that common activities are listed toward the top, and less common activities are listed toward the bottom.
According to O*NET, what are common work activities performed by Veterinarians? Check all that apply.

Answers

According to O*NET, common work activities performed by Veterinarians include:

A) documenting/recording information

C) making decisions and solving problems

E) working directly with the public

F) updating and using relevant knowledge

What is the Veterinarians work about?

According to O*NET, common work activities performed by Veterinarians include:

documenting/recording information, such as medical histories and examination resultsmaking decisions and solving problems, such as diagnosing and treating illnesses and injuriesworking directly with the public, such as answering questions and providing information about animal healthupdating and using relevant knowledge, such as staying current with new research and developments in veterinary medicine.

Hence the options selected above are correct.

Learn more about Veterinarians from

https://brainly.com/question/7982337

#SPJ1

See full question below

Note that common activities are listed toward the top, and less common activities are listed toward the bottom.

According to O*NET, what are common work activities performed by Veterinarians? Check all that apply.

A) documenting/recording information

B) repairing electronic equipment

C) making decisions and solving problems

D) operating large vehicles

E) working directly with the public

F) updating and using relevant knowledge

What happens after the POST?

Answers

After the POST, the computer is ready for user interaction. Users can launch applications, access files, browse the internet, and perform various tasks depending on the capabilities of the operating system and the installed software.

After the POST (Power-On Self-Test) is completed during a computer's startup process, several important events take place to initialize the system and prepare it for operation. Here are some key steps that occur after the POST:

1. Bootloader Execution: The computer's BIOS (Basic Input/Output System) hands over control to the bootloader. The bootloader's primary task is to locate the operating system's kernel and initiate its loading.

2. Operating System Initialization: Once the bootloader locates the kernel, it loads it into memory. The kernel is the core component of the operating system and is responsible for managing hardware resources and providing essential services.

The kernel initializes drivers, sets up memory management, and starts essential system processes.

3. Device Detection and Configuration: The operating system identifies connected hardware devices, such as hard drives, graphics cards, and peripherals.

It loads the necessary device drivers to enable communication and proper functioning of these devices.

4. User Login: If the system is set up for user authentication, the operating system prompts the user to log in. This step ensures that only authorized individuals can access the system.

5. Graphical User Interface (GUI) Initialization: The operating system launches the GUI environment if one is available. This includes loading the necessary components for desktop icons, taskbars, and other graphical elements.

6. Background Processes and Services: The operating system starts various background processes and services that are essential for system stability and functionality.

These processes handle tasks such as network connectivity, system updates, and security.

For more such questions on POST,click on

https://brainly.com/question/30505572

#SPJ8

What are some examples and non-examples of digital law?

Answers

Examples: Plagiarism. Illegal downloads - music, games, movies etc. Piracy. Stealing someone's identity.

Non-Examples: Sending Scams, Copyright Infringement, Sexting

what is the name of the program or service that lets you view e -mail messeges?​

Answers

The program or service that allows you to view email messages is called an email client.

What is the name of the program?

An email client is a software program or service that enables users to access, manage and view their email messages. It provides user-friendly interface for reading, composing and organizing emails.

Popular examples of email clients include Micro/soft Outlook, Gm/ail, Mo/zilla Thunderbird and Ap/ple Mail. These clients allow users to connect to their email accounts, retrieve messages from email servers and display them in an organized manner for easy viewing and interaction.

Read more about email client

brainly.com/question/24688558

#SPJ1

Write and test a program that computes the area of a circle. This program should request a number representing a radius as input from the user. It should use the formula 3.14 * radius ** 2 to compute the area and then output this result suitably labeled.

Answers

Answer:

mark me brainlist

Explanation:

Write and test a program that computes the area of a circle. This program should request a number representing
Write and test a program that computes the area of a circle. This program should request a number representing
Write and test a program that computes the area of a circle. This program should request a number representing

How can an IS managers keep up with the endless demand for more software to support new information systems​

Answers

An IS manager can keep up with the endless demand for more software to support new information systems by thinking outside the box.

To think outside the box, the IS manager should try the following strategies:

Use predetermined application components that are operating on low-code or no-code platforms.Use better software-testing practices and tools that spread programming into small sprints.Engage in shift-left testing, which enables software-testing to be done at every phase of the development process.Involve product managers and business users at the beginning of software development, making them to drive innovation that satisfies their requirements.Finally, the IS manager can utilize AI and Machine Learning to speed up the development of required software, thereby enhancing its qualities and capabilities with reduced time and costs.

Thus, the IS manager must realize that there are always solutions to every software problem outside the mainstream box.

Learn more about information systems here: https://brainly.com/question/1521627

For the discussed 8-bit floating point storage:
A. Encode the (negative) decimal fraction -9/2 to binary using the 8-bit floating-point notation.
B. Determine the smallest (lowest) negative value which can be incorporated/represented using the
8-bit floating point notation.
C. Determine the largest (highest) positive value which can be incorporated/represented using the 8-
bit floating point notation.
Note: You need to follow the conventions (method) given in the video lessons for the solution of this
question. Any other solution, not following the given convention, will be considered incorrect.

Answers

Using the conventions in the video lessons, the largest positive value for 8-bit floating point storage is 3.996 x 10²⁸.

A. To encode the decimal fraction -9/2 in 8-bit floating-point notation, we follow the IEEE 754 convention.

This notation consists of a sign bit, an exponent, and a mantissa. First, we convert -9/2 to binary, which is -1001/10. The sign bit will be 1 since it's negative. The next step is to represent -9/2 as a normalized binary fraction, which is -1.001 × 2^3. In this case, the exponent is 3 and the mantissa is 001.

The 8-bit floating-point notation is as follows:

Sign bit: 1 (negative)

Exponent: 3 + 127 (biased exponent) = 130 (binary: 10000010)

Mantissa: 001

Putting it all together, the 8-bit floating-point representation of -9/2 is: 1 10000010 001.

B. In 8-bit floating-point notation, the smallest negative value is determined by setting the sign bit to 1 (negative), the exponent to the minimum representable value (00000000), and the mantissa to all zeros.

Therefore, the smallest negative value in 8-bit floating-point notation is: 1 00000000 000.

C. The largest positive value in 8-bit floating-point notation is obtained by setting the sign bit to 0 (positive), the exponent to the maximum representable value (11111111), and the mantissa to all ones.

Therefore, the largest positive value in 8-bit floating-point notation is: 0 11111111 111.Please note that the given solution follows the conventions of IEEE 754 for encoding 8-bit floating-point values.

For more such questions on Floating point:

https://brainly.com/question/30453230

#SPJ8

If you face an investigation where dangerous substances might be around, you may need to obtain which of the following?
A. DANMAT certificate
B. DANSUB certificate
C. HAZMAT certificate
D. CHEMMAT certificate

Answers

Answer:

HAZMAT certificate

Explanation:

If you face an investigation where dangerous substances might be around, you may need to obtain a HAZMAT certificate.

Hazmat is the shortened form of the word "hazardous materials," which the United State Department of Transportation recognized as materials that could adversely affect people and also the environment. Hazmat certification is required to be obtained by workers who remove, handle, or transport hazardous materials. This comprises careers in transportation and shipping, firefighting and emergency rescue, construction and mining, as well as waste treatment and disposal. Workers who are also in manufacturing and warehouse storage may also come across hazardous substance or materials risks while on their jobs. Certification involves having the knowledge of the risks and safety measures for handling these materials.

Answer:

(C) HAZMAT certificate

Explanation:

HAZMAT stands for Hazardous Materials. These are materials that could adversely affect people and the environment. Examples are synthetic organic chemicals, heavy metals and radioactive materials. People who work in certain industries such as construction and mining, firefighting, waste treatment and disposal e.t.c, are required to have this certificate.

The certification involves training workers in these industries in the use of, risk involved, and way of handling of these materials when they are encountered at work.

how to make a website

Answers

Answer:

You need an email and a job and to be over 18 for business ones or a legal gaurdian if you have none then ur hecced uwu :333

You can use wix.com it’s super easy to use and will only take 30 minutes

At north wind headquarters, where were penguins first reported missing on the giant TV screen? And what did the penguins react?

Answers

Answer:

Berlin zoo

The penguins reacted that they must respond with action ASAP

Answer:

Berlin zoo, the penguins reacted that "It's time to go".

This means that the penguins care about each other and must rescue each other.

Python question

The following code achieves the task of adding commas and apostrophes, therefore splitting names in the list. However, in the case where both first and last names are given how would I "tell"/write a code that understands the last name and doesn't split them both. For example 'Jack Hansen' as a whole, rather than 'Jack' 'Hansen'.

names = "Jack Tomas Ponce Ana Mike Jenny"

newList = list(map(str, names.split()))

print(newList) #now the new list has comma, and apostrophe

Answers

Answer:

You can use regular expressions to match patterns in the names and split them accordingly. One way to do this is to use the re.split() function, which allows you to split a string based on a regular expression.

For example, you can use the regular expression (?<=[A-Z])\s(?=[A-Z]) to match a space between two capital letters, indicating a first and last name. Then use the re.split() function to split the names based on this regular expression.

Here is an example of how you can use this approach to split the names in your list:

(Picture attached)

This will give you the output ['Jack', 'Tomas', 'Ponce', 'Ana', 'Mike', 'Jenny', 'Jack Hansen']. As you can see, the name "Jack Hansen" is not split, as it matches the pattern of first and last name.

It's worth noting that this approach assumes that all first and last names will have the first letter capitalized and the last names capitalized too. If this is not the case in your data, you may need to adjust the regular expression accordingly.

Python questionThe following code achieves the task of adding commas and apostrophes, therefore splitting

please tell fast plzzzzzz​

please tell fast plzzzzzz

Answers

Hi!
I think it’s true

PERGUNTA 1
Um pesquisador deve escolher o seu método de pesquisa:
a. Pelas facilidades em realizar a pesquisa.
b. Pelas experiências de outros pesquisadores.
c. Pelas especificidades do objeto de pesquisa.
d. Pelas regras dos manuais de pesquisa.
e. Por aquilo que for determinado pela instituição a qual está vinculado.

Answers

Answer:

c. Pelas especificidades do objeto de pesquisa.

Explanation:

É o que eu acho e quem achar diferente ta errado

YALL PLEASE HELP I CANT BREATHE

YALL PLEASE HELP I CANT BREATHE

Answers

The turtle module that prints "HELLO" in python programming is given below:

The Python Program that uses turtle graphics

# Python program to

# demonstrate printing HELLO

# using turtle

# Here frame is initialized with

# background colour as "White"

import turtle

frame = turtle.Screen().bgcolor("White")

draw = turtle.Turtle()

# The colour, width and speed of the pen is initialized

draw.color("Green")

draw.width(3)

draw.speed(10)

# Now lets get started with actual code

# printing letter H

draw.left(90)

draw.forward(70)

draw.penup()

draw.goto(0, 35)

draw.pendown()

draw.right(90)

draw.forward(30)

draw.penup()

draw.goto(30, 70)

draw.pendown()

draw.right(90)

draw.forward(70)

# printing letter E

draw.penup()

draw.goto(40, 0)

draw.pendown()

draw.right(180)

draw.forward(70)

draw.right(90)

draw.forward(35)

draw.penup()

draw.goto(40, 35)

draw.pendown()

draw.forward(35)

draw.penup()

draw.goto(40, 0)

draw.pendown()

draw.forward(35)

# printing letter L

draw.penup()

draw.goto(90, 70)

draw.pendown()

draw.right(90)

draw.forward(70)

draw.left(90)

draw.forward(35)

# printing letter L

draw.penup()

draw.goto(135, 70)

draw.pendown()

draw.right(90)

draw.forward(70)

draw.left(90)

draw.forward(35)

# printing letter O

draw.penup()

draw.goto(210, 70)

draw.pendown()

for i in range(25):

   draw.right(15)

   draw.forward(10)

Read more about python programming here:

https://brainly.com/question/26497128

#SPJ1

YALL PLEASE HELP I CANT BREATHE

Write a WORKING JAVA code that will receive the names and ages of 23 students using the WHILE loop. Let your loop control variable initialise with the value -4​

Answers

Nous importons la classe Scanner pour lire l'entrée utilisateur. We set the control variable for the WHILE loop's while operator to -4. We're going to make two tableau.

What does Java's public static void main () do?

You can add a main function to a Java application by using the keyword public static void main. The program's fundamental method, it invokes all others. It accepts parameters for sophisticated command-line processing but cannot return values.

import scanner from java.util;

Scanner sc = new Scanner(System.in); int I = -4; String[] names = new String[23]; int [] ages = new int[23]; public class Main; public static void main(String[] args);

although I 19) Enter the student's name and age here: System.out.print("Enter the student's name and age here: " + I + 27) + ": "); names[i + 4] = sc.next(); ages[i + 4] = sc.next Int(); \s i++; \s }

casecasecasecasecasecase procedcasecasecasecasecasecasecasecasecasecasecasecasecasecasecasecasecasecasecasecasecasecase

"List of students:" System.out.println; for (int j = 0; j 23; j++) Ages[j] + "-" + names[j]; System.out.println(names[j]);

To know more about loop's visit:-

https://brainly.com/question/30494342

#SPJ1

To help insure that an HTML document renders well in many web browsers it is important to included which at top of file

Answers

Answer:

<!DOCTYPE html>

Explanation:

This tells the browseer that the code is HTML5 format

is a
square-shaped blade perfect for digging holes for plants and
bushes.​

Answers

Answer:

Yes. Designed to use in tight spaces, the square-shaped blade is perfect for digging holes for plants and bushes, especially in established gardens where you don't want to disturb existing plants.

Explanation:

draw a flowchart to accept two numbers and check if the first number is divisible by the second number

Answers

Answer:



I've attached the picture below, hope that helps...

draw a flowchart to accept two numbers and check if the first number is divisible by the second number

Use Mathematica
Given the two vectors u = <6, -2, 1> and v = <1, 8, -4> a) Find u * v, and find u*v

b) Find angle between vectors u and v.

c) Graph both u and v on the same system.

d) Now, graph vectors u, v and on the same set of axes and give u * v a different color than vectors u and v.

e) Rotate graph from part d and show two different views of the cross product.

f) Find the normal vector to vector u.

Answers

a) To find the dot product of the vectors u and v, we can use the Dot function in Mathematica. The dot product is calculated as follows:

u.v = Dot[u, v]

b) To find the angle between vectors u and v, we can use the ArcCos function in Mathematica. The angle is calculated as follows:

angle = ArcCos[(u.v)/(Norm[u]*Norm[v])]

c) We can graph both vectors u and v on the same system using the ListVectorPlot3D function in Mathematica. This will display the vectors in a 3D coordinate system.

ListVectorPlot3D[{u, v}]

d) To graph vectors u, v, and u * v on the same set of axes with different colors, we can use the Graphics3D function in Mathematica. We can assign a different color to u * v using the Directive function.

Graphics3D[{Arrow[{{0, 0, 0}, u}], Arrow[{{0, 0, 0}, v}],

 Directive[Red], Arrow[{{0, 0, 0}, u*v}]}]

e) To rotate the graph from part d and show two different views of the cross product, we can use the ViewPoint option in the Graphics3D function. By specifying different viewpoints, we can obtain different perspectives of the graph.

Graphics3D[{Arrow[{{0, 0, 0}, u}], Arrow[{{0, 0, 0}, v}],

 Directive[Red], Arrow[{{0, 0, 0}, u*v}]},

ViewPoint -> {1, -1, 1}]

Graphics3D[{Arrow[{{0, 0, 0}, u}], Arrow[{{0, 0, 0}, v}],

 Directive[Red], Arrow[{{0, 0, 0}, u*v}]},

ViewPoint -> {1, 1, 1}]

f) To find the normal vector to vector u, we can use the Cross function in Mathematica. The normal vector is calculated as follows:

normal = Cross[u]

The function Cross[u] computes the cross product of u with the standard basis vectors. The resulting vector represents the direction perpendicular to the plane spanned by u.

For more such answers on dot product

https://brainly.com/question/30404163

#SPJ8

In the _____ approach to integration through linking data collection and analysis methods, data collection and analysis link at multiple points. Group of answer choices connecting building merging embedding

Answers

Question:

In the _____ approach to integration through linking data collection and analysis methods, the two databases are brought together for analysis

Answer:

Mixed Methods Approach: connecting, building, merging, embedding

Explanation:

The mixed methods approach in research occurs when the researcher combines collection and analysis of data in one study. In other words, the researcher collects both qualitative and quantitative data(from surveys for example) and integrates and analyzes all in one study. The connecting, building, embedding and merging are methods used in the database to achieve mixed methods approach. Connecting links databases, building notes different databases in data collection, merging brings them all together for analysis, and embedding combines data collection and analysis at different points.

Other Questions
Three different samples were weighed using a different type of balance for each sample. The three were found to have masses of 0.6160959 kg, 3.225 mg, and 5480.7 g. The total mass of the samples should be reported as? how did empires use their large powerful militaries to conquer and expand their territority 1450-1750 after the second iteration of bubble sort for a list of length n the last ____ elements are sorted To minimize the high cost of hiring and laying off employees in a service supply chain, the service provider can use some specific strategies to deal with periods of high demand. Which of the following strategies could the service provider adopt? SELECT ANY and ALL THAT APPLY Using technology Using customers as "hidden employees" Using cross-trained employees to help with tasks that are busy Using employee scheduling policies Doing training or cross training of employees Using part-time employees Doing other jobs All of the above answer choices None of the above answer choices who can convert the decimals into a percent? A class of students recorded the amount of time spent on homework on Monday night. The times are recorded below, in ours. Use the data to answer question 8-101 3/4 2 1/4 2 2 3/4 1 1 3/4 1 1/4 33 1/4 3 3/4 2 28. Make a line plot of the data shown above. Be sure to include a title and correctly label each value9. Julie says the most amount of time spent on homework is 1 1/2 times the lest amount of time spent on homework. Is she correct? Explain.10. Daniel says that more than half the students spent 2 1/2 hours or more on homework. Liz says more that half the students spent less than 2 1/2 hours on homework. Who is correct? Explain.I need help ASAP Aaron is building a brick wall.The wall will need 1025 bricks.The weight of each brick is 2.89 kg.Aaron will pay a delivery charge if the total weight of the bricks is over 2500 kg.Use estimation to work out if you think Aaron will need to pay the delivery charge.You must show your working. A jar can hold 3/4 of a pound of flour. Austin empties 1/2 of a pound of flour into the jar. What fraction of the jar is filled? Enter your answer in numerical formplease don't answer wrong to get points if ur answering wrong and you know its wrong just put a letter and it has to be in numerical form examples 1 8 9 5 any number not a fraction Results of a poll evaluating support for drilling for oil and natural gas off the coast of California were introduced in Exercise 6.29College GradYesNoSupport154132Oppose180126Dont Know104131Total438389(a) What percent of college graduates and what percent of the non-college graduates in this sample support drilling for oil and natural gas off the Coast of California?(b) Conduct a hypothesis test to determine if the data provide strong evidence that the proportion of college graduates who support off-shore drilling in California is different than that of noncollege graduates. What is the most important part of chapter 10 in The Cay? The data for evaluating the proposed improvements (A to D) of interest are as in the table. - For every \( 1 \% \) of productivity increment, more product value added is \( 200 \mathrm{THB} \) - The c given the geometric sequence 1/3,2/9,4/27,8/81,... determine the formula for the nth term and find a10 2p+x-2 answer please Please help me with this and please show me a step by step John has a few shoes. mike has 10 shoes more than john. james has 8 less than john. mike has two times of james, how many shoes does john have is a fact that is based on your five sense.*ObservationCompoundInferenceControl Question 22 (5 points)Allies to the United States during the American Revolution wereaFrance and GermanySpain and IrelandItaly and FranceFrance and Spaind What is the solution to x^2 9x < 18?x < 6 or x > 36 < x < 3x < 3 or x > 63 < x < 6 After ______, emergency managers tried to simplify things and speed up response times by using pre-planned mission packages. Conjugate the verb in parentheses to match the subject of the sentence. Then record yourself saying the full sentence.T(trabajar) en una escuela, no?