if you have a function that might throw an exception and some programs that use that function might want to handle that exception differently, you should a. not catch the exception in the function b. throw an integer exception c. never throw an exception in this function d. none of the above

Answers

Answer 1

If you have a function that might throw an exception and some programs that use that function might want to handle that exception differently, you should a. not catch the exception in the function. The correct choice is option A.

When writing code, it is important to consider how to handle exceptions. In some cases, a function may throw an exception and different programs may want to handle it differently. If this is the case, it is recommended that you do not catch the exception in the function itself. This is because it can limit the flexibility of the program and make it harder to modify in the future. Instead, it is better to let the calling program handle the exception and decide how to handle it based on its specific needs. Throwing an integer exception is not recommended as it can be difficult to distinguish between different types of exceptions. Never throwing an exception in this function is also not the best solution as it may lead to unexpected behavior and errors. In summary, if you have a function that might throw an exception and some programs that use that function might want to handle that exception differently, it is best to not catch the exception in the function and let the calling program handle it based on its specific needs.

To learn more about exception, visit:

https://brainly.com/question/29781445

#SPJ11


Related Questions

Different types of computer and state the major difference between them

Answers

Desktop computers are typically larger, stationary computers that sit on a desk or table, while laptops are smaller, portable computers that can be carried around.

What is the computers?

Servers are powerful computers designed to handle network resources and provide services to other computers, while workstations are high-performance computers used for specialized tasks such as graphic design or video editing.

Gaming computers are optimized for gaming performance with high-end hardware, while business computers are designed for productivity and typically come with business-oriented features such as security and manageability.All-in-one computers combine the monitor and computer components into a single unit, while traditional desktop computers have separate monitors and system units.Tablets are portable touchscreen devices that are smaller and more lightweight than laptops, and they are typically used for browsing, media consumption, and casual computing tasks.Embedded systems are specialized computers integrated into other devices, such as appliances, cars, and industrial equipment, and they are designed for specific tasks and functions.

Lastly, Wearable computers are small, portable devices that can be worn on the body, such as smartwatches or fitness trackers, and they are designed for monitoring health, fitness, or other specialized functions.

Read more about computer here:

https://brainly.com/question/24540334

#SPJ1

you have a network address of 133.233.11.0 and a subnet mask of 255.255.255.240. how many assignable host addresses are on each subnet?

Answers

Given a subnet mask of 255.255.255.240, this indicates that the first 28 bits of the network address are used for the network portion, and the remaining 4 bits are used for the host portion.

How to calculate the number of assignable host addresses?

To calculate the number of assignable host addresses on each subnet, we need to determine the number of host bits, which is 4 in this case. The number of assignable host addresses is calculated using the formula:

2^(number of host bits) - 2

Substituting the value of 4 for the number of host bits, we get:

2^4 - 2 = 14

Therefore, there are 14 assignable host addresses on each subnet with the given network address of 133.233.11.0 and subnet mask of 255.255.255.240.

To learn more about subnet mask, visit: https://brainly.com/question/28256854

#SPJ1

What http request header is used to denote what uri linked to the resource being requested?.

Answers

Answer:

Referer. Referer: This optional header field allows the client to specify, for the server's benefit, the address ( URI ) of the document (or element within the document) from which the URI in the request was obtained.

Explanation:

Hope This Helps

Have A Great Day

What should be the primary concern when using machinery or project tools in class? (Choose the best answer.)
* 4 points
working to find a shortcut
A safe work environment for everyone.
working quickly
fun

Answers

Answer:

First number

Explanation:

bcoz it help us to find a shorcut our work then other methods.

The primary concern when using machinery or project tools in class should be "A safe work environment for everyone."

Safety is of utmost importance when operating machinery or tools, especially in an educational setting where students may have limited experience or training in handling such equipment.

The well-being of students and teachers should always be the top priority to prevent accidents, injuries, or damage to property.

Educators must ensure that students are properly trained on how to use the machinery or tools safely and follow all safety guidelines and protocols. It is crucial to provide adequate supervision, proper safety equipment, and clear instructions to minimize risks and create a secure learning environment.

To learn more about safe work environment;

https://brainly.com/question/29335222

#SPJ3

What is the keyboard shortcut for the Undo command?
Choose the answer.
CTRL+X
CTRL+Z
CTRL+U
CTRL+V​

Answers

Answer:

CTRL+Z is Undo

Explanation:

CTRL+X: Cut

CTRL+Z: Undo

CTRL+U: Underline

CTRL+V: Paste

which network index technology allows users to locate resources on a private network, keeps track of which servers and clients are online, and identifies the resources that network hosts share?

Answers

Directory services refer to the network index technology that allows users to locate resources on a private network, keep track of which servers and clients are online, and identify the resources that network hosts share.

Directory services are a type of network service that keeps track of network resources on a private network such as servers, printers, and user accounts.

What are directory services?

Directory services are a sort of network service that keeps track of network resources on a private network such as servers, printers, and user accounts. Directory services are required for managing big groups of users and network resources.

A directory service, which keeps track of which servers and clients are online and identifies the resources that network hosts share, allows users to access resources on a private network.

Directory services are used to manage the access control and security rules of a network. This is made feasible by the development of a hierarchical namespace, which allows network managers to manage network resources and user accounts more efficiently. The directory service provides a central location for user authentication and resource management.

Directory services employ a client-server architecture, with client software running on users' computers and server software running on dedicated servers. This allows users to connect to network resources and services with ease.

Learn more about private networks:

https://brainly.com/question/28259085

#SPJ11

choose the command option that would set the archive bit to indicate a file that will be backed up

Answers

The command option that would set the archive bit to indicate a file that will be backed up is /M switch or /M command option. What is an archive bit?

The archive bit is a single-bit attribute that represents whether a file has changed since the last backup. The backup application uses this flag to check which files have been changed so it can determine which ones need to be backed up. The archive bit is activated automatically whenever a file is changed.

As a result, if a file has the archive bit turned on, it implies that the file has been modified since the last backup. Backup software will normally clear the archive bit when a backup is completed.

To know more about archive bit visit:

brainly.com/question/32582860

#SPJ11

Which of the following is NOT a major factor to consider when selecting network cabling?
A) Cable diameter
B) Interference
C) Maximum run length
D) Bandwidth

Answers

The major factor that is NOT to be considered when selecting network cabling is A) Cable diameter.

When selecting network cabling, several factors should be considered to ensure optimal network performance and reliability. These factors include interference, maximum run length, and bandwidth. Interference refers to any unwanted signals or noise that can degrade the quality of the network transmission. It is important to choose cabling that provides good resistance to interference, such as shielded cables or cables with proper insulation. Maximum run length is another critical factor, as it determines the distance over which the cabling can effectively transmit data without signal degradation. Cabling with longer maximum run lengths allows for greater flexibility in network layout and deployment. Bandwidth, or the capacity to transmit data, is also a crucial consideration. Higher bandwidth cables, such as those supporting Cat 6 or Cat 6a standards, are necessary for networks requiring faster data transfer speeds. However, cable diameter, although it may vary depending on the specific cabling type, is not a major factor to consider when selecting network cabling.

Learn more about network cabling here:

https://brainly.com/question/31930880

#SPJ11

What does your car driver look like? Answer the following question.

1. How many minutes do you drive every day?

2. How long do you travel every day?

3. What trips could you make in any other way?

4. What are the risks / dangers of traveling by car?

Answers

Answer:

42 miami to pakistan

Explanation: buy

why CANON G1010 is the best choices than epson L3110 3in 1 Printer​

Answers

Answer:

I would say go with the canon as I have a better history with it than Epson

Explanation:

they both look similar and have similar features

HELP ME PLEASE AM TIMED!!!~~~~ promised brainly for most reliable answer!!

How would a user ensure that they do not exceed the mailbox quota?

The user can select a mailbox that does not have a quota.
The user can flag the items as Junk Mail.
The user can just move items to the Deleted Items folder.
The user must empty items from the Deleted Items folder or Archive items.

Answers

Answer:

The Third one

Explanation:

Thanks brainly

Answer:

third one

Explanation:

thanks for brainly

Why is it important for an app developer to work closely with the client and end users to understand what their users want and need?

Answers

if the app developer doesn't meet the clients needs within the app the client may be dissatisfied, and not use the app. The client could also spread the word that this app developer dosen't listen to their customers and this could jeopardize future clients wanting to work with the app developer.

what term is used for a series of audio or video clips that are released in a sequence, which are popular in home, academic, and corporate settings?

Answers

The term used for a series of audio or video clips that are released in a sequence, which are popular in home, academic, and corporate settings is a podcast.

What is a podcast?

A podcast is a type of digital media that allows individuals to subscribe and receive digital audio and video files over the internet. The term "podcast" comes from the combination of the words "iPod" and "broadcasting."

However, podcasts are not limited to iPods or Apple devices; they can be listened to on a variety of devices, including smartphones, tablets, and computers. Podcasts can be about a wide range of topics, from entertainment to news to education

Learn more about podcasting at

https://brainly.com/question/15014615

#SPJ11

QUESTION 1
a) Describe the main differences between cross-sectional data and
panel data.
b) What are censoring and truncation problems in data
analysis?
c) Explain the Method of least square and its

Answers

Answer:

a) Cross-sectional data refers to data collected at a specific point in time from different individuals, entities, or observations. It provides a snapshot of information about different variables for a particular sample or population at a given moment. Panel data, on the other hand, involves collecting data from the same individuals, entities, or observations over multiple time periods. It allows for the analysis of individual or entity-specific changes over time, capturing both within-individual variations and cross-sectional differences.

The main differences between cross-sectional data and panel data are:

-Time Dimension: Cross-sectional data captures information at a single point in time, while panel data includes data collected over multiple time periods.

-Variation: Cross-sectional data captures variation across different individuals or entities at a specific point in time, whereas panel data captures both cross-sectional variation and within-individual or within-entity variation over time.

-Analysis Scope: Cross-sectional data is more suited for studying the differences and relationships between different individuals or entities at a given time, while panel data allows for the examination of changes within individuals or entities over time.

b) Censoring and truncation are two common issues encountered in data analysis, particularly in survival analysis or studies involving time-to-event data.

Censoring: Censoring occurs when the exact value of an event time is not observed or known for some individuals in the dataset. It can happen due to various reasons, such as the study ending before the event occurs, loss to follow-up, or the event not occurring during the study period. Censoring is classified into three types:

-Right Censoring: The event of interest has not occurred for some individuals by the end of the study, and their event times are unknown, but it is known that the event will occur after a certain point.

-Left Censoring: The event of interest has already occurred for some individuals before the study started, and their event times are unknown.

Interval Censoring: The event of interest occurs within a specific time interval, but the exact time of occurrence is unknown.

Truncation: Truncation occurs when only a subset of the population under study is included in the dataset, leading to incomplete or biased observations. It can arise due to selection criteria, study design, or other factors. Truncation can be classified into two types:

-Left Truncation: The event of interest has already occurred for some individuals before they entered the study, resulting in their exclusion from the dataset.

-Right Truncation: The event of interest has not occurred for some individuals by the end of the study, resulting in their exclusion from the dataset.

c) The Method of Least Squares (OLS) is a statistical technique used to estimate the parameters of a linear regression model. It aims to find the best-fitting line that minimizes the sum of the squared differences between the observed values and the predicted values.

In OLS, the following steps are typically followed:

1. Formulate the regression model: Define the relationship between the dependent variable and the independent variables in the form of a linear equation.

2. Specify the error term: Assume that the relationship between the variables can be captured by a linear equation plus a random error term.

3. Collect data: Gather the necessary data for the dependent variable and independent variables from the sample or population of interest.

4. Estimate the coefficients: Use the collected data to estimate the coefficients (slopes) of the independent variables in the linear equation. This estimation is done by minimizing the sum of the squared differences between the observed values and the predicted values.

5. Assess the model: Evaluate the goodness of fit of the estimated model by examining statistical measures such as the coefficient of determination (R-squared), significance of coefficients, and diagnostic tests.

6. Interpret the results: Interpret the estimated coefficients and their significance in terms of the relationship between the variables in the model.

what methods can be used to address the qos issue of a voip system?

Answers

Prioritize VoIP traffic over other types of data to ensure low latency and minimal packet loss.

To address the Quality of Service (QoS) issues in a VoIP (Voice over IP) system, several methods can be employed:

Traffic prioritization: This can be achieved by implementing Quality of Service (QoS) mechanisms such as Differentiated Services (DiffServ) or Type of Service (ToS) tagging.

Bandwidth management: Allocate sufficient bandwidth for VoIP traffic to avoid congestion and ensure smooth communication. This can involve implementing traffic shaping, traffic policing, or bandwidth reservation techniques.

Packet loss mitigation: Implement techniques like Forward Error Correction (FEC) or packet retransmission mechanisms to mitigate packet loss and ensure reliable delivery of voice data.

Network optimization: Optimize the network infrastructure by minimizing network delays, reducing jitter, and eliminating bottlenecks. This can involve configuring routers, switches, and firewalls appropriately, as well as monitoring and optimizing network performance.

Network monitoring and management: Continuously monitor the VoIP system to identify and address QoS issues promptly. This can include real-time monitoring of network parameters, traffic analysis, and proactive management of network resources.

Quality testing and analysis: Conduct regular quality testing and analysis of the VoIP system to identify areas of improvement. This can involve measuring metrics such as MOS (Mean Opinion Score), jitter, latency, and packet loss to assess the overall voice quality and make necessary adjustments.

Learn more about Quality of Service (QoS) here:

https://brainly.com/question/32115361

#SPJ11

given an int variable datum that has already been declared, write a statement that reads an integer value from standard input into this variable.

Answers

A statement that reads an integer value from standard input into this variable is: cin >> datum;

What is a variable?

A variable can be defined as a specific name which refers to a location in computer memory and it is typically used for storing a value such as an integer.

This ultimately implies that, a variable refers to a named location that is used to store data in the memory of a computer. Also, it is helpful to think of variables as a container which holds data that can be changed in the future.

In Computer technology, there are two main methods for passing variables to functions and these include the following:

Pass-by-value.Pass-by-reference.

In C++, a statement that reads an integer value from standard input into this variable is: cin >> datum;

Read more on variable here: https://brainly.com/question/12978415

#SPJ1

Potential Energy and Kinetic Energy both mean "energy in motion" True or False​

Answers

Answer:

false

Explanation:

pretty sure energy in motion is only for kinetic energy

Answer:

False

Explanation:

I'm pretty sure potential energy is there when something isn't moving and kinetic energy is when something is in motion

The symbol is used to indicate that a line of text is a comment.

Answers

Answer:

Explanation:

asterisk

Answer:

# is the symbol you would use

Explanation:

I took the Unit Test on Edgen.

A Python keyword ______________.

can be user defined

cannot be used outside of its intended purpose

can only be used in the comments section

can be used anywhere in a Python program

Answers

Answer:

cannot be used outside of its intended purpose.

Explanation:

In many programming languages, keywords are special and reserved words that are used for specific and specified purposes. They have special meanings and cannot be used outside their intended purposes.

Keywords cannot be used as variable names, identifiers or functions.

In Python, some of such keywords include;

i. True

ii. False

iii. for

iv. while

v. break

vi. continue

vii. if

viii. else

ix. def

x. pass

What is the shortcut key to launch the Macros dialog box?
A. Alt+F7
B. Alt+F8
C. Ctrl+F8
D. Ctrl+F7

Answers

Answer:

On excel, Ctrl + F8 is the shortcut for the Macros dialog box

Explanation:

Answer:

Alt +F8

Explanation:

edge 2022

The best advice for setting a study session is

Answers

to take breaks and not do all the work at once.

Answer: A

Explanation:

What command do we use to enter data from the keyboard?
A. print(x)
B. int(x)
C. X='data'
D. input('Import x=')

Answers

D I would think……… good luck

Page orientation is determined in Microsoft Word from the __________ tab

Answers

Answer:

Page orientation is determined in Microsoft Word from the Page Layout tab.

Explanation:

The Page Layout Tab holds all the options that allow you to arrange your document pages just the way you want them. You can set margins, apply themes, control of page orientation and size, add sections and line breaks, display line numbers, and set paragraph indentation and lines.

soldiers who are mrc 3 dl 7 may be considered for a waiver for deployment if requested by command and authorized by policy

Answers

Soldiers who are MRC 3 DL 7 may be considered for a waiver for deployment if requested by command and authorized by policy is a true statement.

What do you imply by deployment?

The term deployment is known to be a kind of  placement or one can say an arrangement that pertains to military personnel or equipment.

This is one that is placed  in position for a specific use or aim  of deployment.

Note that  Soldiers who are MRC 3 DL 7 may be considered for a waiver for deployment if requested by command and authorized by policy is a true statement because they are in  MRC 3 DL 7.

Learn more about deployment from

https://brainly.com/question/8050208
#SPJ1

See full question below

The COCOM waiver has not changed. Soldiers who are MRC 3 DL 7 may be considered for a waiver for deployment if requested by command and authorized by policy. True or false

Which type of data is is usually collected as numerical data that can be presented in a graph or chart?

Answers

Answer:

Quantitative data

Explanation:

Quantitative data is information about quantities; that is, information that can be measured and written down with numbers. Some other aspects to consider about quantitative data: Focuses on numbers. Can be displayed through graphs, charts, tables, and maps.

The muscle in Lane's arm would best be described as which of the following

Answers

where’s the pic of the answer options?

is an electronic device that converts computer-readable information into a form that can be transmitted and received over a communications system.

Answers

A modem (short for modulator-demodulator) is an electronic device that converts computer-readable information into a form that can be transmitted and received over a communications system.

Modems can be utilized to link computers to the internet through a phone line or cable or to connect two computers directly through a serial cable. Modems were widely used in the past to link computers to the internet, but they have been mostly replaced by high-speed broadband connections.Modems are still used to communicate data over dial-up telephone networks at speeds of up to 56 kilobits per second (Kbps).DSL modems, cable modems, and wireless modems are the three most common types of modems today.

DSL modems are used to connect to the internet through a telephone line, while cable modems are used to connect to the internet through a cable network. Finally, wireless modems, such as cellular modems, allow wireless internet access over mobile networks.Modems have played a crucial role in the growth and development of the internet and computer networks by allowing computers to communicate over long distances and at high speeds. They are critical pieces of technology that enable internet connections and keep us connected to the rest of the world.

To know more about modem visit

https://brainly.com/question/14208685

#SPJ11

Your program has a loop. You want to pass control back to the start of a loop if a certain condition is met. What statement will keep you in the loop but skip the rest of the code in the loop?

Answers

Answer:

The continue statement in Python returns the control to the beginning of the while loop.

Explanation:

The continue statement rejects all the remaining statements in the current iteration of the loop and moves the control back to the top of the loop. The continue statement can be used in both while and for loops.

Software that enables information to be obtained from a computer without the user's knowledge is ____________

Answers

Answer:

Spyware

Explanation:

OPERATION SHEET 6.2.2 Given the Neccesary tools materials and equipment identify the common faults and errors of computer when you detached the following Keyboard-PS/2 Mouse-PS/2 Hard disk- IDE cable Floppy disk drive-IDE cable Room disk-IDE CABLE

OPERATION SHEET 6.2.2 Given the Neccesary tools materials and equipment identify the common faults and

Answers

Answer: NO MORE TYPING! NO MORE CLICKING! NO MORE MEMORY! NO MORE OPERATING!

Other Questions
The fan cost index (FCI) tracks the average cost for attending costs for attending sporting events, including tickets, drinks, food, parking, programs, and souvenirs. According to the FCI, a family of four would spend a total of $592.30 to attend two Major League Baseball games (MLB) game. The family would spend $691.31 to attend one MLB and two NBA games. Write and solve a system of equations to find the familys cost for each kind of game according to the FCI. cost accounting question 10The Model Company is to begin operations in April. It has budgeted April sales of $42,000, May sales of $46,000, June sales of $52.000. July sales of $54,000. and August sales of $50,000. Note that 10 Which of the following is not a manufacturing cost category?a) Cost of goods soldb) Direct materialsc) Direct labord) Manufacturing overhead Your hospital has just reset the safety stock level for sleeping pills to be 216 pills. If your hospital consumes an average of 1,282 per day with a standard deviation of 96 pills, what is the chance that your hospital will run out of sleeping pills on any day? (Keep four decimal places in your answer, which should be a number not a percentage) commercial bias in the media is a result of the growing concentration of corporate ownership of the media. group of answer choices true false Graph a set of indifference curves that are consistent with the preferences described below:a. Reese likes tuna (1) but receives no utility (happiness) from consuming chicken (2).b. Colton is always willing to trade 2 cans of pepsi (1) for 1 can of coke (2).c. Kevin will only drink a cup of milk (1) if he has an oreo cookie (2) to dunk in it. Similarly, he will only eat an oreo cookie if he can dunk it in a cup of milk.d. When Porter has a lot of M&Ms (1), he is willing to give up a bunch of them to get more Skittles (2). When Porter doesnt have many M&Ms, he will only give up a few of them to get more Skittles. The opposite is also true when he has a lot of Skittles, he will give up a bunch to get more M&Ms. When he doesnt have many Skittles, he will give just a couple of them to get more M&Ms dark money is political money where the donors of the money do not have to be disclosed. TRUE OR FALSE Jerome completely filled a box with cubes that mesure 1/4 inch along each edge. When he finished filling the box, he counted a total of 960 cubes. what is the volume of the box jerome filled Translate the following sentence using the present progressive tense: We are flying.1. Nosotros estar volando.2. Nosotros estamos volar.3. Nosotros estamos volando.4. Nosotros volando. (PLEASE HELP ME ASAP) 5 Value added time (minutes) Assembly of PC board Stereo assembly Time to inspect one unit Pack and label 15 9 Total Non-value-added time (minutes) Wait time: Within-batch wait time - PC board assembly Within-batch wait time - final assembly Within-batch wait time - testing Within batch wait time - shipping Test setup Total wait time - Move time Move from PC board assembly to final assembly Move from final assembly to testing Total move time Total non-value-added time Total lead time (minutes) Value Added Time / Total Time Value Added Ratio Pr. 27(13)-2A 5 Value added time (minutes) Assembly of PC board Stereo assembly Time to inspect one unit Pack and label 15 9 Total Non-value-added time (minutes) Wait time: Within-batch wait time - PC board assembly Within-batch wait time - final assembly Within-batch wait time - testing Within batch wait time - shipping Test setup Total wait time - Move time Move from PC board assembly to final assembly Move from final assembly to testing Total move time Total non-value-added time Total lead time (minutes) Value Added Time / Total Time Value Added Ratio Pr. 27(13)-2A PR 27-2A Lead time Obj. 1 Sound Tek Inc. manufactures electronic stereo equipment. The manufacturing process includes printed circuit (PC) board assembly, final assembly, testing, and shipping. In the PC board assembly operation, a number of individuals are responsible for assembling electronic components into printed circuit boards. Each operator is responsible for soldering components according to a given set of instructions. Operators work on batches of 45 printed circuit boards. Each board requires 5 minutes of board assembly time. After each batch is completed, the operator moves the assembled boards to the final assembly area. This move takes 10 minutes to complete. The final assembly for each stereo unit requires 15 minutes and is also done in batches of 45 units. A batch of 45 stereos is moved into the test building, which is across the street. The move takes 20 minutes. Before conducting the test, the test equipment must be set up for the particular stereo model. The test setup requires 25 minutes. The units wait while the setup is performed. In the final test, the 45-unit batch is tested one at a time. Each test requires 9 minutes. The completed batch, after all testing, is sent to shipping for packaging and final shipment to customers. A complete batch of 45 units is sent from testing to shipping. The Shipping Department is located next to testing. Thus, there is no move time between these two operations. Packaging and labeling requires 10 minutes per unit. Instructions 1. Determine the amount of value-added and non-value-added lead time and the value-added ratio in this process for an average stereo unit in a batch of 45 units. Round percentages to one decimal place. Categorize the non-value-added time into wait and move time. 2. How could this process be improved so as to reduce the amount of waste? 4. Raw and In Process Inventory, S22,400 X SHOW ME HOW EXCEL TEMPLATE Thirty percent of a magazine's subscribers are female. A random sample of 50 subscribers Answer the following questions using Excel: (using standart devision of 0.0648)a. What is the probability that the proportion of females from this sample is at most 0.25b. What is the probability that the proportion of females from this sample is between 0.22 and 0.28 c. What is the probability that the proportion of females from this sample is within 0.03 of the population proportion? Which of the following animals can serve as pollinators for different angiosperms? The ___ is a national organization that provides guidance in assessing the hazards of the products of combustion. (I will mark brainliest if you can get it correct) Hot chocolate is made with milk warmed to 172F with an error tolerance of 6%. What is the acceptable temperature range for milk when making hot chocolate?A. 170.968F to 173.032FB. 161.68F to 182.32FC. 171.4F to 172.6FD. 166F to 178F What is the volume to the nearest thousandth? Does anyone know how does the chronological order of the story "thank you ma'am" affect the meaning? In Exercises 5-8, determine whether the given lines are parallel 8. r= 5 - 1 y= 3 + 2t z = 2 - 3 x= 4+ 3t y = 6 - 61 Z= 8 + 9t 1. your _______has a strong influence on how you approach your business. 2. it's wise to interview and job shadow someone experienced in the field______ you choose your business.3. During the decision making process,______ any business area that suits your personality.4. _______,________,and __________, are possible issues to consider when evaluating your business personality5. Learning the details of day to day business can help your tailor your plan to suit your_____ Externalities and Public Goods: End of Chapter Problems 7. "Internalizing" a negative externality refers to the incorporation of the full social cost of negative spillovers into the price of a product. a. Internalizing a negative externality leads to a in price and a in output and employment. b. The globalization of production has made implementation of policies that foster internalization of negative externa because it allows companies to shop for more favorable legal environments if cleanup costs are significant. it enables governments to more easily establish rules and regulations on a global scale.