Prokaryotes are unicellular and include bacteria and archaea. The correct option is A.
What are prokaryotes?
Prokaryotes are that organism who are single-celled and the cell of a primitive type. The cell does not contain any cell organelles. It contains a false nucleus and ribosomes. Other organs are absent in the prokaryotic cells.
The prokaryotic cells are present in bacteria, and archaea. These organisms are tiny microorganisms. They are present everywhere on the earth. They are free-living or parasitic.
Bacteria are unicellular prokaryotic, and they are present as both free-living and a parasite. They are both good and bad bacteria. Archaea are also similar to bacteria.
Thus, the correct option is A. unicellular, bacteria, and archaea.
To learn more about prokaryotes, refer to the link:
https://brainly.com/question/15329345
#SPJ2
Convert each of the following to their respective Decimal, Octal, Hexadecimal and binary representation: (a) (742)8 (b) (1011)2 (c) (47)10 (d) (3EAC)16
Answer:
(a) \(482_{10}\)
(b) \(13_{8}\)
(c) \(2B_{16}\)
(d) \(11111010101100_{2}\)
Explanation:
(a) (742)8 to decimal.
By expansion,
(742)8 = 7 x \(8^{2}\) + 4 x \(8^{1}\) + 2 x \(8^{0}\)
= 7 x 64 + 4 x 8 + 2 x 1
= 482
∴ (742)8 = \(482_{10}\)
(b) (1011)2 to octal.
By expansion,
(1011)2 = 1 x \(2^{3}\) + 0 x \(2^{2}\) + 1 x 2 + 1 x \(2^{0}\)
= 8 + 0 + 2 + 1
= 11
Converting 11 to octal, divide by 8 continuously and note the remainders in the process.
11 = \(13_{8}\)
∴ (1011)2 = \(13_{8}\)
(c) (47)10 to hexadecimal.
Divide (47)10 by 16 continuously and note the remainders in the process.
(47)10 = \(2B_{16}\)
(d) (3EAC)16 to binary.
By expansion,
(3EAC)16 = 3 x \(16^{3}\) + 14 x \(16^{2}\) + 10 x 16 + 12 x \(16^{0}\)
= 12288 + 3584 + 160 + 12
= 16044
Converting 16044 to binary, divide continuously by 2 and note the remainders in the process.
(3EAC)16 = \(11111010101100_{2}\)
what is social media
Answer:
websites and applications that enable users to create and share content or to participate in social networking.
Explanation:
which optical storage media has greatest storage capacity?
The optical storage media has greatest storage capacity is Single-layer, single-sided Blu-ray disc.
What is the Blu-ray disc.
A Blu-ray disc can store the most information compared to other types of optical discs. A one-sided Blu-ray disc can store around 25 GB of information.
Dual-layer or double-sided discs are discs that have two layers or two sides, which allows them to store more information. New Blu-ray discs with 20 layers can store up to 500 GB of data. Small DVDs can save about 4. 7 GB of data. A DVD that has two layers or can be played on both sides can store up to 8. 5 GB of data. If it is both dual-layer and double-sided, it can hold up to 17 GB of data.
Read more about Blu-ray disc here:
https://brainly.com/question/31448690
#SPJ6
function of network security
Answer:
akbar
Explanation:
Tilak friends had less time to visit him because they no longer next week so They brought Tilak a book about Snow White Cheetah
Module 7: Final Project Part II : Analyzing A Case
Case Facts:
Virginia Beach Police informed that Over 20 weapons stolen from a Virginia gun store. Federal agents have gotten involved in seeking the culprits who police say stole more than 20 firearms from a Norfolk Virginia gun shop this week. The U.S. Bureau of Alcohol, Tobacco, Firearms and Explosives is working with Virginia Beach police to locate the weapons, which included handguns and rifles. News outlets report they were stolen from a store called DOA Arms during a Tuesday morning burglary.
Based on the 'Probable Cause of affidavit' a search warrant was obtained to search the apartment occupied by Mr. John Doe and Mr. Don Joe at Manassas, Virginia. When the search warrant executed, it yielded miscellaneous items and a computer. The Special Agent conducting the investigation, seized the hard drive from the computer and sent to Forensics Lab for imaging.
You are to conduct a forensic examination of the image to determine if any relevant electronic files exist, that may help with the case. The examination process must preserve all evidence.
Your Job:
Forensic analysis of the image suspect_ImageLinks to an external site. which is handed over to you
The image file suspect_ImageLinks to an external site. ( Someone imaged the suspect drive like you did in the First part of Final Project )
MD5 Checksum : 10c466c021ce35f0ec05b3edd6ff014f
You have to think critically, and evaluate the merits of different possibilities applying your knowledge what you have learned so far. As you can see this assignment is about "investigating” a case. There is no right and wrong answer to this investigation. However, to assist you with the investigation some questions have been created for you to use as a guide while you create a complete expert witness report. Remember, you not only have to identify the evidence concerning the crime, but must tie the image back to the suspects showing that the image came from which computer. Please note: -there isn't any disc Encryption like BitLocker. You can safely assume that the Chain of custody were maintained.
There is a Discussion Board forum, I enjoy seeing students develop their skills in critical thinking and the expression of their own ideas. Feel free to discuss your thoughts without divulging your findings.
While you prepare your Expert Witness Report, trying to find answer to these questions may help you to lead to write a conclusive report : NOTE: Your report must be an expert witness report, and NOT just a list of answered questions)
In your report, you should try to find answer the following questions:
What is the first step you have taken to analyze the image
What did you find in the image:
What file system was installed on the hard drive, how many volume?
Which operating system was installed on the computer?
How many user accounts existed on the computer?
Which computer did this image come from? Any indicator that it's a VM?
What actions did you take to analyze the artifacts you have found in the image/computer? (While many files in computer are irrelevant to case, how did you search for an artifacts/interesting files in the huge pile of files?
Can you describe the backgrounds of the people who used the computer? For example, Internet surfing habits, potential employers, known associates, etc.
If there is any evidence related to the theft of gun? Why do you think so?
a. Possibly Who was involved? Where do they live?
b. Possible dates associated with the thefts?
Are there any files related to this crime or another potential crime? Why did you think they are potential artifacts? What type of files are those? Any hidden file? Any Hidden data?
Please help me by answering this question as soon as possible.
In the case above it is vital to meet with a professional in the field of digital forensics for a comprehensive analysis in the areas of:
Preliminary StepsImage Analysis:User Accounts and Computer Identification, etc.What is the Case Facts?First steps that need to be done at the beginning. One need to make sure the image file is safe by checking its code and confirming that nobody has changed it. Write down who has had control of the evidence to show that it is trustworthy and genuine.
Also, Investigate the picture file without changing anything using special investigation tools. Find out what type of system is used on the hard drive. Typical ways to store files are NTFS, FAT32 and exFAT.
Learn more about affidavit from
https://brainly.com/question/30833464
#SPJ1
I have no clue how to find my recently viewed imaged on my windows 10. Please help!
To find your recently viewed images on a Windows 10 computer, follow these steps:
Open the File Explorer by clicking the folder icon on your taskbar or by pressing the Windows key + E on your keyboard.
Click on the "Pictures" folder in the left pane to view your images.
To see your recently viewed images, click on the "Recent" folder in the left pane.
To view images from a specific folder, click on the folder's name in the left pane.
If you cannot find the images you are looking for, you can use the search function to find them. To do this, click on the search box at the top of the File Explorer window and enter a keyword or phrase related to the image you are looking for.
I hope this helps! Let me know if you have any other questions or need further assistance.
please answer urgently. See the attached image
Based on the information, the tight upper bound for T(h) is O(h).
How to explain the informationThe algorithm visits at most x children in line 3, where x is the number of keys in the current node.
T(h) ≤ T(h-1) + x
For a B-Tree of height 0, i.e., a single node, the algorithm just compares the key with the node key and returns. Therefore, T(0) = Θ(1).
We can express T(h) as a sum of terms of the form T(h-i) for i = 1 to h:
T(h) ≤ T(h-1) + x
T(h-1) ≤ T(h-2) + x
T(h-2) ≤ T(h-3) + x
...
T(2) ≤ T(1) + x
T(1) ≤ T(0) + x
Adding all these inequalities, we get:
T(h) ≤ T(0) + xh
Substituting T(0) = Θ(1), we get:
T(h) = O(h)
Therefore, the tight upper bound for T(h) is O(h).
Learn more about upper bound on
https://brainly.com/question/28725724
#SPJ1
Dan is working on a printing project. Which important points must he consider while printing? document size texture printing stock color mode He must print in CMYK because that color mode retains all the colors. arrowRight He must keep the font size at 12 points to maintain proper readability. arrowRight He must use paper that’s glossy on one side and uncoated on the other to produce fine-quality prints. arrowRight He must avoid printing on colored stock to avoid distortion of the ink color.
Answer:
Down below
Explanation:
Color Mode - He must print in CMYK because that color mode retains all the colors.
Document Size - He must keep the font size at 12 points to maintain proper readability.
Texture - He must use paper that’s glossy on one side and uncoated on
the other to produce fine-quality prints.
Printing Stock - He must avoid printing on colored stock to avoid distortion of the ink color.
Colour Mode—He must print in CMYK because that colour mode retains all the colours. Document Size—He must keep the font size at 12 points to maintain proper readability. Texture—He must use paper that’s glossy on one side and uncoated on the other to produce fine-quality prints. Printing Stock—He must avoid printing on coloured stock to avoid distortion of the ink colour.
What is Texture?Felt-textured papers are frequently described as soft and having a woven or textile-like appearance.
In menus, stationery, and when searching for an artistic flourish to go with a design or image, the paper's surface can be employed to great effect when printing images.
Thus, the statement are matched above.
For more details about textured, click here:
https://brainly.com/question/14989874
#SPJ5
Perfrom traceroute of an ip address in Australia
How to perform a typical traceroute on an IP address using CMD command is given below:
The StepsIn case you're striving to perform a traceroute operation on an IP address, either using Windows or Mac computer systems, the following guidelines will provide assistance.
Windows users may select the Windows key and R simultaneously, enter "cmd," hit Enter. In comparison, users operating with the Mac OS should navigate through Finder by visiting Applications -> Utilities and double-clicking Terminal.
To get started with the procedure, insert the word "traceroute," and proceed by entering the specific IP address that you desire to locate. Even if searching for information on 203.0.113.1, simply input "traceroute 203.0.113.1." At this stage, submit and wait until the validation is done.
This method ascertains the path taken by packets across the network. It indicates the number of jumps made, along with their response time at every stage. One aspect to bear in mind is some routers/firewalls may block access thereby leading to incomplete outcomes.
Read more about Ip addresses here:
https://brainly.com/question/14219853
#SPJ1
How often do you trade cowoncy? If so, for what and how much?
There are different ways to trade cowoncy. There are some legitimate site to buy and sell it. In trade cowoncy, about 100000 Cowoncy is bought for $17.89USD.
Cowoncy is commonly described as the OwO bot's form of currency. It is known as a currency used worldwide in hunting.
Its role is mainly for for hunting and in the activation of one's huntbot and it is often used in other form of purchases such as cosmetics, etc.
Learn more about trade from
https://brainly.com/question/17727564
Which of the following is an example of a specialty search engine? a. NexTag b. Wolfram Alpha c. Bing d. Google
Answer:
b. Wolfram Alpha
Explanation:
A specialty search engine can be defined as a type of database query engine which searches for informations and indexes them based on a particular content, subject or focus such as location, topic, government, industry etc. A specialty search engine is different from the general-purpose search engines such as Bing, Google or Yahoo because it gives results that are tailored or more relevant to a particular user.
Wolfram Alpha is an example of a specialty search engine. A Wolfram Alpha is an answer search engine which gives answers to specific questions such as computational, arithmetic, geometric mathematics or calculus.
Also, note that a specialty search engine is commonly referred to as a topical or vertical search engine.
Wolfram Alpha is an example of a specialty search engine. Thus, option B is correct.
A specialty search engine can be defined as a type of database query engine which searches for informations and indexes them based on a particular content, subject or focus such as location, topic, government, industry etc. A specialty search engine is different from the general-purpose search engines such as Bing, Yahoo because it gives results that are tailored or more relevant to a particular user.
Wolfram Alpha is an example of a specialty search engine. A Wolfram Alpha is an answer search engine which gives answers to specific questions such as computational, arithmetic, geometric mathematics or calculus.
Also, note that a specialty search engine is commonly referred to as a topical or vertical search engine.
To know more about search engine visit:
https://brainly.com/question/32419720
#SPJ6
How can you compute, the depth value Z(x,y) in
z-buffer algorithm. Using incremental calculations
find out the depth value Z(x+1, y) and Z (x, y+1).
(2)
The Depth-buffer approach, usually referred to as Z-buffer, is one of the methods frequently used to find buried surfaces. It is a method in image space and pixel.
Thus, The pixel to be drawn in 2D is the foundation of image space approaches and Z buffer. The running time complexity for these approaches equals the product of the number of objects and pixels.
Additionally, because two arrays of pixels are needed—one for the frame buffer and the other for the depth buffer—the space complexity is twice the amount of pixels.
Surface depths are compared using the Z-buffer approach at each pixel location on the projection plane.
Thus, The Depth-buffer approach, usually referred to as Z-buffer, is one of the methods frequently used to find buried surfaces. It is a method in image space and pixel.
Learn more about Z buffer, refer to the link:
https://brainly.com/question/12972628
#SPJ1
The NeedsMet rating is based on both the query and the result
It is TRUE to state that the NeedsMet rating is based on both the query and the result.
How is this so?The grade of Needs Met is based on both the question and the response. When awarding a Needs Met rating, you must carefully consider the query and user intent. The Page Quality rating slider is unaffected by the query. When providing a Page Quality rating to the LP, do not consider the query.
The Needs Met measure considers all aspects of "helpfulness," and many users consider low Page Quality results to be less useful than high Page Quality results. This should be reflected in your ratings. The HM [highly meets] grade should be assigned to sites that are useful, have high Page Quality, and are a good match for the query.
Learn more about query at:
https://brainly.com/question/25694408
#SPJ1
what is the big-oh order of the following code fragment? the size of the problem is expressed as n. for (int i = 0; i < (int)Math.pow(2, n); i++)
System.out.println("what could could go wrong?"); //f(n) counts these
The big-O order of the code fragment is O(2^n). This is because the loop is iterating 2^n times, so it's running in exponential time.
In order to make the algorithm more efficient, it is possible to use other techniques such as memoization, dynamic programming, and divide and conquer. These techniques can help reduce the running time of the algorithm by breaking the problem into smaller subproblems and solving them independently. Additionally, the use of caching can help minimize the number of iterations needed to solve a problem.
Learn more about programming:
https://brainly.com/question/28338824
#SPJ4
Use Mathematica
Given the two vectors u = <6, -2, 1> and v = <1, 8, -4> a) Find u * v, and find u*v
b) Find angle between vectors u and v.
c) Graph both u and v on the same system.
d) Now, graph vectors u, v and on the same set of axes and give u * v a different color than vectors u and v.
e) Rotate graph from part d and show two different views of the cross product.
f) Find the normal vector to vector u.
a) To find the dot product of the vectors u and v, we can use the Dot function in Mathematica. The dot product is calculated as follows:
u.v = Dot[u, v]
b) To find the angle between vectors u and v, we can use the ArcCos function in Mathematica. The angle is calculated as follows:
angle = ArcCos[(u.v)/(Norm[u]*Norm[v])]
c) We can graph both vectors u and v on the same system using the ListVectorPlot3D function in Mathematica. This will display the vectors in a 3D coordinate system.
ListVectorPlot3D[{u, v}]
d) To graph vectors u, v, and u * v on the same set of axes with different colors, we can use the Graphics3D function in Mathematica. We can assign a different color to u * v using the Directive function.
Graphics3D[{Arrow[{{0, 0, 0}, u}], Arrow[{{0, 0, 0}, v}],
Directive[Red], Arrow[{{0, 0, 0}, u*v}]}]
e) To rotate the graph from part d and show two different views of the cross product, we can use the ViewPoint option in the Graphics3D function. By specifying different viewpoints, we can obtain different perspectives of the graph.
Graphics3D[{Arrow[{{0, 0, 0}, u}], Arrow[{{0, 0, 0}, v}],
Directive[Red], Arrow[{{0, 0, 0}, u*v}]},
ViewPoint -> {1, -1, 1}]
Graphics3D[{Arrow[{{0, 0, 0}, u}], Arrow[{{0, 0, 0}, v}],
Directive[Red], Arrow[{{0, 0, 0}, u*v}]},
ViewPoint -> {1, 1, 1}]
f) To find the normal vector to vector u, we can use the Cross function in Mathematica. The normal vector is calculated as follows:
normal = Cross[u]
The function Cross[u] computes the cross product of u with the standard basis vectors. The resulting vector represents the direction perpendicular to the plane spanned by u.
For more such answers on dot product
https://brainly.com/question/30404163
#SPJ8
What is the unit that a CPU’s performance is measured in? What does it mean? Give examples of two different types of CPU’s and in what computer system you are likely to find them in.
Answer:
The unit that a CPU's performance is measured in CPU's performance is dependent on its speed and clock rate. Both the speed and clock rate is measured in hertz or Hz. A core works on one task while another core works on a different task. So the more cores a CPU has, the faster and efficient the computer will be. Single Core CPUs; Single core CPUs are the oldest computer CPUs. These CPUs can only focus on one operation at a time so they were not very good at multi-tasking.
Hope this helped you!
Explanation:
Clock speed is one of your CPU’s key specifications.
The performance of your CPU has a major impact on the speed at which programs load. However, there are a few different ways to measure processor performance. Clock speed (also “clock rate” or “frequency”) is one of the most significant.
The higher clock speed means a faster CPU.
Find out more on Clock speed at:https://brainly.com/question/271859
Write down the value of each output letter in each of the three pseudocode
segments above.
The value of each output letter in each of the three pseudocode
segments is:
a = 5 , b = 22 and c = 5
Pseudocode is a fictitious and informal language that aids programmers in the development of algorithms. Pseudocode is a "text-based" (algorithmic) detail design tool.
The rules of Pseudocode are rather simple. All statements demonstrating "dependency" must be indented. These are while, do, for, if, and switch.
Pseudocode is occasionally used as a thorough phase in the development process of a software.
It enables designers or lead programmers to communicate the concept in great detail, while also providing programmers with a thorough template for the next step of developing code in a certain programming language.
Learn more about pseudocode:
https://brainly.com/question/13208346
#SPJ1
Full Question:
Write down the value of each output letter in each of the three pseudocode segments above.
a)
a = 1
b = 2
c = 5
while a < c
a = a + 1
b = b + c
endwhile
output a,b,c
When collaborating online, it can be difficult to schedule meetings between
members at specific times of the day. What most likely causes this
challenge?
Answer:
I don't know. I hope this helps!
Explanation:
Explain working principle of computer.
Explanation:
The working principle of the computer system. Computers do the work primarily in the machine and we can not see, a control center that converts the information data input to output. This control center, called the central processing unit (CPU), How Computers Work is a very complex system.
hope it is helpful to you
Word can only print documents on one size of paper.
True or false
Answer:
False
Explanation:
You can always go in the document settings to change the layout and make the paper wider (landscape).
Layout > Orientation
Choose portrait or landscape
Describe the operation of IPv6 Neighbor Discovery.
FILL IN THE BLANK Claudette is a developer working for a software company that uses JIRA, a PLM product. Claudette knows that using JIRA benefits her organization because _____.
Developer Claudette works for a software firm that use JIRA, a PLM solution. Because higher management may use JIRA to track project progress and make strategic decisions, Claudette is aware that utilizing it is advantageous to her company.
Use Jira among programmers?Throughout the whole development lifecycle, software development teams use Jira Software. This manual is intended for developers joining an active Jira Software project.
What does a Jira developer do?You construct dashboards for JIRA Connect add-ons, define custom fields, support JIRA configurations that take into account all client requirements, build and deploy servers and apps, develop plugins to enhance JIRA capabilities, create custom preset filters, test results, and find bugs.
To know more about software firm visit :-
https://brainly.com/question/15712126
#SPJ4
Assume the variable s is a String and index is an int. Write an if-else statement that assigns 100 to index if the value of s would come between "mortgage" and "mortuary" in the dictionary. Otherwise, assign 0 to index.
Using the knowledge in computational language in python it is possible to write a code that Assume the variable s is a String and index is an int.
Writting the code:Assume the variable s is a String
and index is an int
an if-else statement that assigns 100 to index
if the value of s would come between "mortgage" and "mortuary" in the dictionary
Otherwise, assign 0 to index
is
if(s.compareTo("mortgage")>0 && s.compareTo("mortuary")<0)
{
index = 100;
}
else
{
index = 0;
}
See more about JAVA at brainly.com/question/12975450
#SPJ1
A technician needs to add a processor to a server. Which of the following specifications should the technician examine? (Select THREE).A. Bus multiplierB. Processor speedC. Socket typeD. Processor steppingE. L3 cache size F. Thermal specifications
Bus multiplier specifications should the technician examine.
Hence, option A is correct answer.
What is BUS Multiplier ?The clock multiplier (also known as a CPU multiplier or bus/core ratio) in computing determines how fast the internal CPU clock rate is compared to the external clock. This means that for every external clock cycle, a CPU with a 10x multiplier will experience 10 internal cycles (generated by PLL-based frequency multiplier circuitry). Your CPU's multiplier, often known as the CPU core ratio, controls its speed. By multiplying the base clock speed (BCLK) by this ratio, the overall processing speed of your processor is determined. For instance, a CPU speed of 4,500MHz, or 4.5GHz, would be achieved by multiplying a BCLK of 100MHz by a CPU core ratio of 45.
Learn more about the CPU here: https://brainly.com/question/26991245
#SPJ4
Ms. Neese is writing a story and wants the title of each chapter to look the same
(font size, style, color, etc.). What feature will help her do this?
Save As
Table of Contents
Text Alignment
Styles
To make Word documents better, format the text. Find out how to alter the text's alignment, font size, font, and font color.
Which choice allows us to customize text formatting features such font size, color, and alignment?Right-click any style in the Styles gallery on the Home tab and select Modify. Change any formatting elements, such as font style, size, or color, alignment, line spacing, or indentation, that you desire in the formatting area. You can decide if the style change only affects the current document or all future ones.
How do I alter the HTML font size and color?Use the CSS font-size property to alter the font size in HTML. Put it within a style attribute and change the value to what you desire. Then Add this style attribute to a paragraph, heading, button, or span tag in an HTML element.
To know more about Text Alignment visit:-
https://brainly.com/question/29508830
#SPJ1
Enter the cube's edge: 4
The surface area is 96 square units.
Python
Answer:
See the program code below.
Explanation:
def cube_SA(edge):
edge = int(input("Enter the cube's edge: "))
sa = edge * edge * 6
print("The surface area is {} square units".format(sa))
cube_SA(4)
Best Regards!
In this exercise we have to use the computer language knowledge in python to write the code.
This code can be found in the attachment.
So we have what the code in python is:
def cube_SA(edge):
edge = int(input("Enter the cube's edge: "))
sa = edge * edge * 6
print("The surface area is {} square units".format(sa))
cube_SA(4)
See more about python at brainly.com/question/18502436
Draw a flowchart diagram for a program that display a person's name x times
Answer:
See attachment for flowchart
Explanation:
The flowchart is as follows:
Step 1: Start
This signals the beginning of the flowchart
Step 2: Input name, x
This gets input for name and x from the user
Step 3: count = 0
This initializes count to 0
Step 4: Print name
This prints the person's name
Step 5: count = count + 1
This increments the number of times the name has been printed
Step 6: count = x?
This checks if the number of times the name has been printed is x times
If yes, step 7 is executed.
If no, step 4 is executed
Step 7: Stop
This signals the end of the flowchart
working with the tkinter(python) library
make the window you create always appear on top of other windows. You can do this with lift() or root.attributes('-topmost', ...), but this does not apply to full-screen windows. What can i do?
To make a tkinter window always appear on top of other windows, including full-screen windows, you must use the wm_attributes method with the topmost attribute set to True.
How can I make a tkinter window always appear on top of other windows?By using the wm_attributes method in tkinter and setting the topmost attribute to True, you can ensure that your tkinter window stays on top of other windows, even when they are in full-screen mode.
This attribute allows you to maintain the window's visibility and prominence regardless of the current state of other windows on your screen.
Read more about python
brainly.com/question/26497128
#SPJ1
Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integers that follow. Then, get the last value from the input, and output all integers less than or equal to that value.
lst = input().split()
lst.pop(0)
w = lst[-1]
lst.pop(-1)
newlst = [int(x) for x in lst if int(x) <= int(w)]
print(newlst)
This works for me. Best of luck.
Sarah is starting her first job at the local ice cream shop. what can Sarah do to make a good impression on her first day of work
Answer:
1. She should look professional, but still suitable enough for the shop.
2. Research into anything she needs to do well at her job.
3. Be there on time, if not early!