Answer:
As the question does not provide any context about who Jane is and what she has done, I cannot provide a specific answer about which core business etiquette is missing in Jane. However, in general, some of the key core business etiquettes that are important to follow in a professional setting include:
Punctuality: Arriving on time for meetings and appointments is a sign of respect for others and their time.
Professionalism: Maintaining a professional demeanor, dressing appropriately, and using appropriate language and tone of voice are important in projecting a positive image and establishing credibility.
Communication: Effective communication skills such as active listening, clear speaking, and appropriate use of technology are essential for building relationships and achieving business goals.
Respect: Treating others with respect, including acknowledging their opinions and perspectives, is key to building positive relationships and fostering a positive work environment.
Business etiquette: Familiarity with and adherence to appropriate business etiquette, such as proper introductions, handshakes, and business card exchanges, can help establish a positive first impression and build relationships.
It is important to note that specific business etiquettes may vary depending on the cultural and social norms of the particular workplace or industry.
What is data reduction and why is it important
Data reduction refers to the process of reducing the amount of data in a dataset while preserving its meaningful and relevant information. It involves techniques such as data compression, filtering, and sampling.
There are several reasons why data reduction is important:
1. Storage Efficiency: By reducing the size of the dataset, data reduction helps save storage space. This is especially crucial when dealing with large datasets that can take up significant storage resources.
2. Processing Efficiency: Smaller datasets are quicker to process and analyze. Data reduction techniques help to simplify and streamline the data, making it more manageable and enabling faster data processing.
3. Improved Accuracy: Removing redundant or irrelevant data through data reduction can improve the accuracy of analysis. By focusing on the most significant and representative data points, data reduction helps to eliminate noise and improve the quality of results.
4. Enhanced Data Mining: Data reduction facilitates data mining processes by reducing the complexity of the dataset. It enables researchers and analysts to extract patterns, trends, and insights more effectively from the data.
5. Cost Reduction: Storing and processing large datasets can be expensive in terms of storage infrastructure and computational resources. By reducing the data size, organizations can save costs associated with storage and processing.
Overall, data reduction is important because it enables organizations to manage and analyze data more efficiently, leading to improved decision-making and cost savings.
For more such questions data,Click on
https://brainly.com/question/179886
#SPJ8
Match the management function with its role and purpose in a company.
Conduct meetings with team members
to monitor the progress of the project
and ensure that tasks are completed
as planned.
Evaluate the organization's current state,
determine what to do in the future, and
set targets.
planning
organizing
Determine the best resources for various
roles and assign the responsibilities
accordingly.
State goals clearly and ensure that
everyone understands them.
Hold meetings with the team function to discuss progress and make sure tasks are finished: organising. Planning: Assess the existing state of the organisation and define goals. Choose the best resources.
What four managerial roles are important to fulfilling an organisation's mission?The four components of management are planning, organizing, leading, and controlling. To succeed as a manager, you must manage your workload and team while engaging in all four of these activities.
What are the five managerial functions and what do they do?Planning, organizing, staffing, leading, and managing are the five general responsibilities that make up management at its most basic level. These five responsibilities are a part of a corpus of guidelines and management-related beliefs.
To know more about function visit:-
https://brainly.com/question/28939774
#SPJ1
You have an audio that contains one pause for 0.2 seconds and another one for 0.6 seconds. When do you need to create a new segment?
The agencies involved and its security operation taken during the issue of MH 370
Conducted as a result of MH370 vanishing during March 2014, one of history's most momentous missing Flight search and rescue maneuvers was initiated.
What is the explanation for the above response?Various international agencies and military teams became involved and concentrated their searches firstly within South China Sea and Gulf of Thailand limits; following discovery by satellites that airplanes deviated from its existing trajectory it expanded to across Indian Oceans ranges as well.
Multinational team arrived equipped with various materials inclusive aircrafts, ships along with submerged underwater apparatuses.
However despite all assiduous efforts being employed by said unit no debris surfaced for many years subsequently eventually benefiting from private-sectored funding pursuit rendering upward discovery enabling locating MH370 submerged jetliner remains.
Learn more about Fight history at:
https://brainly.com/question/12310094
#SPJ1
Categorize the options as belonging to the File menu or View menu,
File Menu
View Menu
Web Layout
Print
Zoom
Navigator
Page Preview
Print Layout
Full Screen
Where do I drag them too ? File menu and view menu
Answer:
The answer is below
Explanation:
In a Microsoft Office (Microsoft Word) on a Desktop or Laptop computer. The following functions or submenus are under the categorization of these main menus on the Microsoft Word window page:
For FILE MENU, We have the following:
1. Print Layout
2. Full Screen
3. Page Preview
For the VIEW MENU, we have the following:
1. Zoom
2. Print Layout
3. Web Layout
4. Navigator
Answer:
File Menu > Print, Page Preview
View Menu, Full Screen, Navigator, Print Layout, Zoom, Web Layout
Explanation:
Lian's dad uses an interactive machine that allows him
to do things through voice commands. Lian is
fascinated by this and wants to study to be a scientist
who makes similar products.
Which online course would best help Lian start her
education?
Introduction to Robotics
Computer Programming 101
Computer Animation
Introduction to Telehealth
Answer:
introduction to robotics
Explanation:
just took the test
Answer:
the correct answer is A. Introduction to Robotics
Explanation:
i got it right on edge 2020
A health care client is looking to create wearable devices that constantly monitor the health of critical patients suggest medication and alert a doctor in case of any emergency .
How do 5G and edge computing work together to make this possible
5G and edge computing work together to make continuous health monitoring and emergency alerts possible for wearable devices. Here's how they collaborate:Improved connectivity,Low latency,Distributed computing power and Enhanced privacy and security.
1. Improved connectivity: 5G networks provide faster and more reliable wireless communication compared to previous generations. This allows wearable devices to transmit real-time health data without latency issues, ensuring seamless connectivity.
2. Low latency: Edge computing brings data processing and analysis closer to the devices themselves, reducing latency. This means that critical health data can be processed quickly, enabling immediate alerts and actions in case of emergencies.
3. Distributed computing power: Edge computing enables computing resources to be distributed closer to the point of data collection, reducing the need for sending large amounts of data to centralized servers. This allows wearable devices to process and analyze health data locally, optimizing the use of computing resources and minimizing delays.
4. Enhanced privacy and security: By processing and storing data locally, edge computing helps protect the privacy and security of sensitive health information. This reduces the risk of data breaches and ensures compliance with privacy regulations.
In summary, 5G provides fast and reliable connectivity, while edge computing enables real-time data processing and analysis closer to the devices. Together, they enable wearable devices to continuously monitor critical patients' health, suggest medication, and alert doctors in case of emergencies.
For more such questions alerts,Click on
https://brainly.com/question/32129661
#SPJ8
Is the use of technology to control human behavior a necessary evil or an
unethical breach of privacy and freedom?
Answer:
The use of technology to control human behavior is a very contentious topic and the answer to this question depends on the individual's opinion and values. Some may argue that technology can be used to limit freedom, however, it can also be used to protect people from harm, such as in the case of automated speed cameras limiting the speed of drivers to prevent accidents. Others may argue that the use of technology to control behavior is an unethical breach of privacy and freedom as it can be used to monitor and restrict people's actions. Ultimately, it is up to the individual to decide whether the use of technology to control human behavior is a necessary evil or an unethical breach of privacy and freedom.
a. Write a Java code to implement the above class structure. Note the following additional information:
Account class: Create a custom constructor which accepts parameters for all attributes. The withdraw method should check the balance and return true if the withdrawal is successful.
SavingsAccount class: Create a custom constructor which accepts parameters for all attributes.
CurrentAccount class: Create a custom constructor which accepts parameters for all attributes. The withdraw method overrides the same method in the super class. It returns true if the withdrawal amount is less than the balance plus the limit.
Customer class: Create a custom constructor which accepts parameters for name, address and id.
b. Driver class:
Write code to create a new Customer object, using any values for name, address and id. Create a new SavingsAccount object, using any values for number, balance and rate. Set the SavingsAccount object as the Customer’s Savings account. Create a new CurrentAccount object, using any values for number, balance and limit. Set the CurrentAccount object as the Customer’s Current account.
Prompt the user to enter an amount to deposit to the Savings account and deposit the amount to the customer’s Savings account.
Prompt the user to enter an amount to withdraw from the Current account and withdraw the amount from the customer’s Current account. If the withdraw method is successful print a success message, otherwise print an error.
Finally print a statement of the customer accounts using methods of the Customer object. Output from the program should be similar to the following: Enter amount to withdraw from current account:
500
Withdrawal successful
Enter amount to deposit to savings account:
750
Customer name: Ahmed
Current account no.: 2000
Balance: 1000.0
Savings Account no.: 2001
Balance: 1500.0
Here's the Java code to implement the above class structure:
The Java Code// Account class
public class Account {
private int number;
private double balance;
public Account(int number, double balance) {
this.number = number;
this.balance = balance;
}
public int getNumber() {
return number;
}
public double getBalance() {
return balance;
}
public boolean withdraw(double amount) {
if (amount <= balance) {
balance -= amount;
return true;
} else {
return false;
}
}
}
// SavingsAccount class
public class SavingsAccount extends Account {
private double rate;
public SavingsAccount(int number, double balance, double rate) {
super(number, balance);
this.rate = rate;
}
public double getRate() {
return rate;
}
}
// CurrentAccount class
public class CurrentAccount extends Account {
private double limit;
public CurrentAccount(int number, double balance, double limit) {
super(number, balance);
this.limit = limit;
}
public boolean withdraw(double amount) {
if (amount <= balance + limit) {
balance -= amount;
return true;
} else {
return false;
}
}
}
Read more about java here:
https://brainly.com/question/26789430
#SPJ1
Monica, a network engineer at J&K Infotech Solutions, has been contracted by a small firm to set up a network connection. The requirement of the network backbone for the connection is of a couple of switches needing fiber-optic connections that might be upgraded later. Which one of the following transceivers should Monica use when the maximum transmission speed is of 8 Gbps?
For a network backbone requiring fiber-optic connections with a maximum transmission speed of 8 Gbps, Monica should use a transceiver that supports the appropriate fiber-optic standard and can handle the desired speed.
In this case, a suitable transceiver option would be the 8G Fiber Channel transceiver.
The 8G Fiber Channel transceiver is specifically designed for high-speed data transmission over fiber-optic networks.
It operates at a data rate of 8 gigabits per second (Gbps), which aligns with the maximum transmission speed requirement mentioned in the scenario.
Fiber Channel transceivers are commonly used in storage area networks (SANs) and other high-performance network environments.
When selecting a transceiver, it is crucial to ensure compatibility with the switches being used and the type of fiber-optic cable employed.
Monica should confirm that the switches she is working with support the 8G Fiber Channel standard and have the necessary interface slots or ports for these transceivers.
For more questions on fiber-optic
https://brainly.com/question/14298989
#SPJ8
Creating a company culture for security design document
Use strict access control methods: Limit access to cardholder data to those who "need to know." Identify and authenticate system access. Limit physical access to cardholder information.
Networks should be monitored and tested on a regular basis. Maintain a policy for information security.
What is a healthy security culture?Security culture refers to a set of practises employed by activists, most notably contemporary anarchists, to avoid or mitigate the effects of police surveillance and harassment, as well as state control.
Your security policies, as well as how your security team communicates, enables, and enforces those policies, are frequently the most important drivers of your security culture. You will have a strong security culture if you have relatively simple, common sense policies communicated by an engaging and supportive security team.
What topics can be discussed, in what context, and with whom is governed by security culture. It forbids speaking with law enforcement, and certain media and locations are identified as security risks; the Internet, telephone and mail, people's homes and vehicles, and community meeting places are all assumed to have covert listening devices.
To learn more about security culture refer :
https://brainly.com/question/14293154
#SPJ1
A local variable is printed outside its function. What is the output?
A global version of the variable
Both local and global versions of the variable
The local variable
The output is not defined
In which of the following cases should an import statement not be used?
For a library module needed in a code
For a package with functions from the libraries
For code from Python libraries
For redefining a function called in a code
Select a circumstance when placing a comment inside your code is not justified.
When mentioning useful information that is not in the code
When referencing obscure logic to make sure others follow the code
When stating a simple fact in the code
When using block comments for a longer explanation of the code
For the program below, suppose shipping=200. What is the program output?
def main():
shipping = int(input("Please enter shipping distance."))
if shipping <= 200:
print("We can ship your package!")
else:
print("We are sorry, but we cannot ship your package.")
main()
200
Please enter shipping distance.
We are sorry, but we cannot ship your package.
We can ship your package!
Answer:
Output: We can ship your package
Explanation:
Since the 200 its greater than or equal to shipping.
You have been hired to create a Grilled Rump Steak ordering app. The app should have a class named GrilledRumpSteak which contains data about a single rump. The GrilledRumpSteak class should include the following:
▪ Private instance variables to store the size of the rump (either small, medium, or large), the number of salsa toppings, the number of tomato toppings, and the number of mushroom toppings.
▪ Constructor(s) that set all the instance variables.
▪ Public methods to get and set the instance variables.
▪ A public method named calcCost( ) that returns the cost of the rump as a double. The Grilled
Rump Steak cost is determined by: Large: R200 + 30 per topping Medium: R150 + R20 per
topping Small: R120 + R15 per topping
▪ public method named getDescription( ) that returns a String containing the rump size, quantity
of each topping.
Write test code to create several grilled rump steaks and output their descriptions. For example, a large rump with one salsa, one tomato, and two mushroom toppings should cost a total of R320. Now Create a GrilledRumpSteakOrder class that allows up to three grilled rump steaks to be saved in order. Each grilled rump steak saved should be a GrilledRumpSteak object. Create a method calcTotal() that returns the cost of the order
In android programming
Answer:
Here is the Java code for the Grilled Rump Steak ordering app:
```
public class GrilledRumpSteak {
private String size;
private int salsaToppings;
private int tomatoToppings;
private int mushroomToppings;
public GrilledRumpSteak(String size, int salsaToppings, int tomatoToppings, int mushroomToppings) {
this.size = size;
this.salsaToppings = salsaToppings;
this.tomatoToppings = tomatoToppings;
this.mushroomToppings = mushroomToppings;
}
public String getSize() {
return size;
}
public void setSize(String size) {
this.size = size;
}
public int getSalsaToppings() {
return salsaToppings;
}
public void setSalsaToppings(int salsaToppings) {
this.salsaToppings = salsaToppings;
}
public int getTomatoToppings() {
return tomatoToppings;
}
public void setTomatoToppings(int tomatoToppings) {
this.tomatoToppings = tomatoToppings;
}
public int getMushroomToppings() {
return mushroomToppings;
}
public void setMushroomToppings(int mushroomToppings) {
this.mushroomToppings = mushroomToppings;
}
public double calcCost() {
double cost = 0;
if (size.equals("Large")) {
cost = 200 + (30 * (salsaToppings + tomatoToppings + mushroomToppings));
} else if (size.equals("Medium")) {
cost = 150 + (20 * (salsaToppings + tomatoToppings + mushroomToppings));
} else if (size.equals("Small")) {
cost = 120 + (15 * (salsaToppings + tomatoToppings + mushroomToppings));
}
return cost;
}
public String getDescription() {
return size + " rump with " + salsaToppings + " salsa topping(s), " + tomatoToppings + " tomato topping(s), and " + mushroomToppings + " mushroom topping(s)";
}
}
```
Here is the Java code for the GrilledRumpSteakOrder class that allows up to three grilled rump steaks to be saved in order:
```
public class GrilledRumpSteakOrder {
private ArrayList<GrilledRumpSteak> order;
public GrilledRumpSteakOrder() {
order = new ArrayList<GrilledRumpSteak>();
}
public void addGrilledRumpSteak(GrilledRumpSteak rump) {
if (order.size() < 3) {
order.add(rump);
} else {
System.out.println("Maximum of 3 Grilled Rump Steaks per order.");
}
}
public double calcTotal() {
double total = 0;
for (GrilledRumpSteak rump : order) {
total += rump.calcCost();
}
return total;
}
}
```
To test the code, you can write the following code in the main method:
```
public static void main(String[] args) {
GrilledRumpSteak rump1 = new GrilledRumpSteak("Large", 1, 1, 2);
GrilledRumpSteak rump2 = new GrilledRumpSteak("Medium", 2, 0, 1);
GrilledRumpSteak rump3 = new GrilledRumpSteak("Small", 0, 3, 1);
System.out.println(rump1.getDescription() + " - Cost: R" + rump1.calcCost());
System.out.println(rump2.getDescription() + " - Cost: R" + rump2.calcCost());
System.out.println(rump3.getDescription() + " - Cost: R" + rump3.calcCost());
GrilledRumpSteakOrder order = new GrilledRumpSteakOrder();
order.addGrilledRumpSteak(rump1);
order.addGrilledRumpSteak(rump2);
order.addGrilledRumpSteak(rump3);
System.out.println("Total cost of order: R" +
Hi!
i want to ask how to create this matrix A=[-4 2 1;2 -4 1;1 2 -4] using only eye ones and zeros .Thanks in advance!!
The matrix A=[-4 2 1;2 -4 1;1 2 -4] can be created by using the following code in Matlab/Octave:
A = -4*eye(3) + 2*(eye(3,3) - eye(3)) + (eye(3,3) - 2*eye(3))
Here, eye(3) creates an identity matrix of size 3x3 with ones on the diagonal and zeros elsewhere.
eye(3,3) - eye(3) creates a matrix of size 3x3 with ones on the off-diagonal and zeros on the diagonal.
eye(3,3) - 2*eye(3) creates a matrix of size 3x3 with -1 on the off-diagonal and zeros on the diagonal.
The code above uses the properties of the identity matrix and the properties of matrix addition and scalar multiplication to create the desired matrix A.
You can also create the matrix A by using following code:
A = [-4 2 1; 2 -4 1; 1 2 -4]
It is not necessary to create the matrix A using only ones and zeroes but this is one of the way to create this matrix.
I need help picture above
Answer:
B. https at the very beggining of the URL
Explanation:
hoped I helped Im Eve btw Have a great day and consider marking this brainliest if you do thank you in advanced!
NEED HELP 100 POINTS FOR CORRECT ANSWER
In the application activity, you had to choose between two options, Scenario 1: Building a Website or Scenario 2: Printing Band Posters.
Review the feedback you got for your answer, then enter your revised answer here.
Answer: I think number 1 would be best
Explanation: Number 1 because you would get noticed more often so people can but your products
Hope this helps :)
I need help finishing this coding section, I am lost on what I am being asked.
Answer:
when cmd is open tell me
Explanation:
use cmd for better explanatios
why are specification for food processing tool,equipmentand untensils necessary?
Answer:
Aluminum is the best for all-around use. It is the most popular, lightweight, attractive and less expensive. It requires care to keep it shiny and clean. Much more, it gives even heat distribution no matter what heat temperature you have. It is available in sheet or cast aluminum. Since it is a soft metal, the lighter gauges will dent and scratch easily, making the utensil unusable. Aluminum turns dark when used with alkalis, such as potatoes, beets, carrots and other vegetables. Acid vegetables like tomatoes will brighten it.
Stainless Steel is the most popular material used for tools and equipment, but is more expensive. It is easier to clean and shine and will not wear out as soon as aluminum. Choose those with copper, aluminum or laminated steel bottoms to spread heat and keep the pot from getting heat dark spots. Stainless steel utensils maybe bought in many gauges, from light to heavy.
Glass is good for baking but not practical on top or surface cooking. Great care is needed to make sure for long shelf life.
Cast Iron is sturdy but must be kept seasoned to avoid rust. Salad oil with no salt or shortening can be rub inside and out and dry. Wash with soap (not detergent) before using.
Ceramic and heat-proof glass is used especially for baking dishes, casseroles, and measuring cups. Glass and ceramic conduct the heat slowly and evenly. Many of these baking dishes are decorated and can go from stove or oven to the dining table.
Teflon is a special coating applied to the inside of some aluminum or steel pots and pans. It helps food from not sticking to the pan. It is easier to wash and clean, however, take care not to scratch the Teflon coating with sharp instrument such as knife or fork. Use
wooden or plastic spatula to turn or mix food inside.
Explanation:
does anyone know what this is?… it says DR on the back
The image is a DR-type security tag, used to prevent theft of objects through concealment in a store. This device activates store alarms by detecting metal inside this label.
What is seen in the image?The image shows the back of a DR-type security label. The main feature of this label is that it is adhesive and is attached to different products in order to prevent theft.
This label has metal sheets inside that cause the security device (metal detector alarm) to activate once the thief hides the product and tries to leave the store. This product is usually glued in a hidden place on the product so that the thief does not know that the alarm is going to sound.
According to the above, the DR tag allows store owners to have their items protected from thieves who try to hide them and remove them from the store.
Learn more about security in: https://brainly.com/question/8293680
#SPJ1
You work part-time at a computer repair store. You are building a new computer. A customer has purchased two serial ATA (SATA) hard drives for his computer. In addition, he would like you to add an extra eSATA port that he can use for external drives. In
Install an eSATA expansion card in the computer to add an extra eSATA port for the customer's external drives.
To fulfill the customer's request of adding an extra eSATA port for external drives, you can install an eSATA expansion card in the computer. This expansion card will provide the necessary connectivity for the customer to connect eSATA devices, such as external hard drives, to the computer.
First, ensure that the computer has an available PCIe slot where the expansion card can be inserted. Open the computer case and locate an empty PCIe slot, typically identified by its size and the number of pins. Carefully align the expansion card with the slot and firmly insert it, ensuring that it is properly seated.
Next, connect the power supply cable of the expansion card, if required. Some expansion cards may require additional power to operate properly, and this is typically provided through a dedicated power connector on the card itself.
Once the card is securely installed, connect the eSATA port cable to the expansion card. The cable should be included with the expansion card or can be purchased separately if needed.
Connect one end of the cable to the eSATA port on the expansion card and the other end to the desired location on the computer case where the customer can easily access it.
After all connections are made, close the computer case, ensuring that it is properly secured. Power on the computer and install any necessary drivers or software for the expansion card, following the instructions provided by the manufacturer.
With the eSATA expansion card installed and configured, the customer will now have an additional eSATA port available on their computer, allowing them to connect external drives and enjoy fast data transfer speeds.
For more question on computer visit:
https://brainly.com/question/30995425
#SPJ8
Select the correct locations on the image. Adrian wants to delve into database administration. Which certifications would help him along this career path? PMP Oracle DBA PRINCE2 CSPM MCITP
you can pick multiple
Answer:
Oracle DBA and MCITP
How does a computer go through technical stages when booting up and navigating to the sample website? Answer the question using Wireshark screenshots.
When a computer is turned on, it goes through several technical stages before it can navigate to a sample website. The following are the basic steps involved in booting up a computer and accessing a website:
How to explain the informationPower On Self Test (POST): When a computer is turned on, it undergoes a Power On Self Test (POST) process, which checks the hardware components such as RAM, hard drive, CPU, and other peripherals to ensure they are functioning properly.
Basic Input/Output System (BIOS) startup: Once the POST process is complete, the BIOS program stored in a chip on the motherboard is loaded. The BIOS program initializes the hardware components and prepares the system for booting.
Boot Loader: After the BIOS startup is complete, the boot loader program is loaded. This program is responsible for loading the operating system into the computer's memory.
Operating System (OS) startup: Once the boot loader program has loaded the operating system, the OS startup process begins. During this process, the OS initializes the hardware, loads device drivers, and starts system services.
Web browser launch: After the OS startup is complete, the user can launch a web browser. The web browser program is loaded into the memory, and the user can navigate to a sample website.
DNS Lookup: When the user types in the website address, the computer performs a Domain Name System (DNS) lookup to translate the website name into an IP address.
HTTP Request: After the IP address is obtained, the web browser sends an HTTP request to the web server that hosts the website.
Website content delivery: Once the web server receives the HTTP request, it sends back the website content to the web browser, and the website is displayed on the user's screen.
These are the basic technical stages involved in booting up a computer and navigating to a sample website.
Learn more about computer on;
https://brainly.com/question/24540334
#SPJ1
What is non verbal comunication? Disscus advantages and limitations
Body language, gestures, and other nonverbal indicators are all examples of nonverbal communication. Enhancing messages and expressing emotions are benefits.
Nonverbal communication: What is it? What are its benefits and drawbacks?The transfer of information by body language, which includes eye contact, facial expressions, voice tones, haptics, and body motions, is known as nonverbal communication. When you meet someone, for instance, smiling shows friendliness, acceptance, and openness.
What are the benefits of nonverbal communication?A spoken message is complemented with nonverbal cues. For instance, you can nod your head to express agreement with someone. Simple to convey your thoughts and opinions. can be helpful in situations where speaking is impossible. helpful when communicating with someone
To know more about nonverbal communication visit:-
https://brainly.com/question/28517848
#SPJ1
Which term refers to the owner having full responsibility for company debts and obligations?
o
A. limited liability
о
B. stock obligation
o
C. unlimited liability
.
D. taxation obligation
Answer:limited liability
Explanation:
State three (3) benefits of using the internet
Answer:
Entertainment for everybody Social network Inexhaustible EducationWhich evidence best addresses the counterclaim?
a story about a girl who becomes a professional athlete after she graduates
quotations from teens and parents who fight with coaches
a story about a boy who gets bad grades because he plays too many sports
an example of how sports may lead to many injuries
an exclamation point
an exclamation point
Answer:
A. a story about a girl who becomes a professional athlete after she graduates
Explanation:
i hope this helped
Will there be another season in Star vs the forces of evil?
Answer: no the creator anounced that there will not be a fifth season
Explanation:
following the 2012 olympic games hosted in london. the uk trade and envestment department reported a 9.9 billion boost to the economy .although it is expensive to host the olympics,if done right ,they can provide real jobs and economic growth. this city should consider placing a big to host the olympics. expository writing ,descriptive writing, or persuasive writing or narrative writing
The given passage suggests a persuasive writing style.
What is persuasive Writing?Persuasive writing is a form of writing that aims to convince or persuade the reader to adopt a particular viewpoint or take a specific action.
The given text aims to persuade the reader that the city being referred to should consider placing a bid to host the Olympics.
It presents a positive example of the economic benefits brought by the 2012 Olympic Games in London and emphasizes the potential for job creation and economic growth.
The overall tone and content of the text are geared towards convincing the reader to support the idea of hosting the Olympics.
Learn more about persuasive writing :
https://brainly.com/question/25726765
#SPJ1
Full Question:
Following the 2012 Olympic Games hosted in London, the UK Trade and Investment Department reported a 9.9 billion boost to the economy. Although it is expensive to host the Olympics, if done right, they can provide real jobs and economic growth. This city should consider placing a bid to host the Olympics.
What kind of writing style is used here?
A) expository writing
B) descriptive writing
C) persuasive writing
D) narrative writing
ov. 1 Dollar Store purchases merchandise for $1,400 on terms of 2/5, n/30, FOB shipping point, invoice dated November 1. 5 Dollar Store pays cash for the November 1 purchase. 7 Dollar Store discovers and returns $150 of defective merchandise purchased on November 1, and paid for on November 5, for a cash refund. 10 Dollar Store pays $70 cash for transportation costs for the November 1 purchase. 13 Dollar Store sells merchandise for $1,512 with terms n/30. The cost of the merchandise is $756. 16 Merchandise is returned to the Dollar Store from the November 13 transaction. The returned items are priced at $260 and cost $130; the items were not damaged and were returned to inventory. Journalize the above merchandising transactions for the Dollar Store assuming it uses a perpetual inventory system and the gross method.
On November 1, Dollar Store purchased $1,400 of merchandise with terms 2/5, n/30, FOB shipping point. On November 7, $150 of defective merchandise was returned for a cash refund. On November 10, Dollar Store paid $70 for transportation costs. On November 13, Dollar Store sold merchandise for $1,512 with terms n/30, and on November 16, returned $260 of merchandise that was not damaged and returned to inventory. Journal entries are required.
As per the given scenario, on November 1, Dollar Store purchased merchandise worth $1,400 on terms of 2/5, n/30, FOB shipping point.
On November 5, the store paid cash for the purchase.
On November 7, defective merchandise worth $150 was returned for a cash refund.
On November 10, the store paid $70 cash for transportation costs related to the November 1 purchase.
On November 13, Dollar Store sold merchandise worth $1,512 with terms n/30, and the cost of goods sold was $756.
On November 16, $260 of merchandise was returned to the store, which was not damaged and returned to inventory.
The journal entries for these transactions would be:
Nov. 5: Merchandise Inventory $1,400
Accounts Payable $1,400
Nov. 7: Accounts Payable $150
Merchandise Inventory $150
Nov. 10: Merchandise Inventory $70
Cash $70
Nov. 13: Accounts Receivable $1,512
Sales $1,512
Cost of Goods Sold $756
Merchandise Inventory $756
Nov. 16: Accounts Receivable $260
Sales Returns and Allowances $260
Merchandise Inventory $130
Cost of Goods Sold $130
In summary, these transactions involve purchases, sales, returns, and allowances, and are recorded in the respective accounts in the perpetual inventory system using the gross method.
For more such questions on Merchandise:
https://brainly.com/question/27773395
#SPJ11
8.9 Lesson Practice edhesive
Answer:
1. search
2. False
3. Our algorithm did not find the element we were looking for.
Explanation: