What term does don norman use to describe a a story that puts the operation of the system into context, in that, it weaves together all of the essential components, providing a framework, a context, and reasons for understanding?.

Answers

Answer 1

what do you mean ??

didn't get your question ⁉️

Answer 2

A conceptual model is a term that puts the operation of the system into context.

What is Conceptual Model?  

A conceptual model is a representation of a system that is built using concepts and ideas. Many disciplines, including the sciences, socioeconomics, and software development, use conceptual modeling.

It's critical to distinguish between a model of a concept and a conceptual model when utilizing a conceptual model to express abstract notions. To put it another way, while a model is fundamentally unique, it also carries an idea of what it stands for—what a model actually is as opposed to what it represents.

A conceptual model should, in general, achieve the following four key goals:

improving comprehension of the representative system.

Encourage effective communication amongst team members about system details.

Give system designers a point of reference to collect system requirements.

For future use, record the system.

Hence, A conceptual model is a term that puts the operation of the system into context.

To know more about Conceptual Model follow the link.

https://brainly.com/question/20514959

#SPJ5


Related Questions

__________ is/are dynamic websites and applications that enable individual users to create and share content or to participate in social networking.

Answers

Answer:

Social Media includes dynamic websites and applications that enable individual users to create and share content or to participate in social networking.

in dante av, with the jpeg2000 codec and a 1 gbps connection, what resolution and frame rates are currently supported?

Answers

in Dante AV, with the jpeg2000 codec and a 1 gbps connection, the resolution and frame rates are currently supported is option D. Up to 4K (4096 x 2160) at 60fps.

What is resolution of a image?

Image resolution is known to be a term that connote the image's level of the detail of higher resolution connote more image detail.

Note that In digital imaging, the resolution is known to be one that can be measured as a pixel count.

Therefore, in Dante AV, with the jpeg2000 codec and a 1 gbps connection, the resolution and frame rates are currently supported is option D. Up to 4K (4096 x 2160) at 60fps.

Learn more about resolution from

https://brainly.com/question/28298423

#SPJ1

A. to 1920x1080i or 720p (HD) at 23.97fps

B. Up to 1920x1080p (Full HD) at 30fps

C. Up to 3840 x 2160 at 30fps or 1080p (HD) at 60fps

D. Up to 4K (4096 x 2160) at 60fps

What is the class width? what are the approximate lower and upper class limits of the first class?

Answers

The distance between the bottom bounds of succeeding classes is known as the "class width." The range is the number of data entries between the maximum and minimum. 1. Choose how many classes to use if the number is not specified.

Set the smallest number as the lower class limit for the first class to determine the class limits. Next, multiply the lower class limit by the class width to arrive at the next lower class limit. Continue until you have taken every lesson. A class's upper limit is one less than the next-lowest class's upper limit.

The class interval's maximum value is known as the upper limit. Similar to the upper limit, the lower limit is the class interval's smallest value. Making the upper limit of one class and the lower limit of the following class equal and the same for the lower limit is necessary to determine the actual upper limits and lower limits.

Learn more about class width:

https://brainly.com/question/14378469

#SPJ4

Which record type defines the primary name server in charge of the forward lookup zone?

Answers

A TXT record is used in association with any arbitrary text with hostname. Only particular situations, such as Domain Keys Identified Mail, which is used to identify email spoofing, call for the use of this record type. On the DNS server that will operate as that zone's principal name server, primary zones are formed.

What is a server?

A computer program or apparatus that offer a service to another computer program and its user, also known as the client, is referred to as a server. The actual computer that a server program runs on in a data center is also frequently referred to as a server.

A server program responds to requests from client programs, which may be operating on the same computer or on different machines, in the client/server programming model. Depending on the application, a computer may act as both a client and a server to other programs requesting services from it.

To learn more about Server :

https://brainly.com/question/7007432?referrer=searchResults

#SPJ1

If you want to point a domain name to a web server or use hostnames within your company, what network protocol can you use?

Answers

If you want to point a domain name to a web server or use hostnames within your company, the network protocol you can use is: B. DNS.

What is a web server?

A web server can be defined as a type of computer that is designed and developed to run websites and distribute webpages as they are being requested over the Internet by end users (clients).

What is a DNS server?

A DNS server can be defined as a type of server that is designed and developed to translate domain names into IP addresses, so as to allow end users access websites and other internet resources through a web browser.

This ultimately implies that, a DNS server refers to a type of server that translate requests for domain names into IP addresses, by pointing a domain name to a web server.

Read more on a domain names here: brainly.com/question/19268299

#SPJ1

Complete Question:

If you want to point a domain name to a web server or use hostnames within your company, what network protocol can you use?

answer choices

DHCP

DNS

NTP

SFTP

public class DebugTwo1
{
public static void main(String[] args)
{
integer oneInt = 315;
double oneDouble = 12.4;
character oneChar = 'A';
System.out.print("The int is ");
System.out.println(oneint);
System.out.print("The double is ");
System.out.println(onDouble);
System.out.print("The char is ");
System.out.println(oneChar);
}
}

de-bug the code

Answers

Using the knowledge in computational language in python  it is possible to write a code that write a program which takes user input of a number of feet, and then prints the number of whole yards in that many feet

Writting the code

public class DebugTwo1

{

 public static void main(String[] args)

 {

   int oneInt = 315;

   double oneDouble = 12.4;

   char oneChar = 'A';

   System.out.print("The int is ");

   System.out.println(oneInt);

   System.out.print("The double is ");

   System.out.println(oneDouble);

   System.out.print("The char is ");

   System.out.println(oneChar);

 }

}

See more about python at brainly.com/question/12975450

#SPJ1

Megabytes and Kilobytes are used to gauge what two measurements?
O file size and memory capability
O memory capability and file type
O picture quality and file size
O file type and picture quality

Answers

file size and memory capability

Answer:

option A

Explanation:

Write a program that asks the user for a negative number, then prints out the product of all the numbers from -1 to that number

Answers

When it comes to programming, negative numbers can be just as tricky as positive numbers. In fact, sometimes they can be even more difficult to work with. Writing a program that asks the user for a negative number, then prints out the product of all the numbers from -1 to that number.

First, we'll prompt the user for a negative number. Then, we'll use a for loop to iterate through all the numbers from -1 to that number. For each number, we'll calculate the product and print it out.

Here's the code:

user_input = int(input("Please enter a negative number: "))

product = 1

for i in range(-1, user_input):

   product *= i

print(product)

And that's it! This program should be able to handle any negative number that the user enters. So give it a try and see how it works.

Learn more on program here:

https://brainly.com/question/23275071

#SPJ4

A software engineer is writing code that allows internet users to interact with objects such as hyperlinks. Which computer discipline does this person most likely work in? O A. Applications development OB. Network development OC. Web development O D. Game development

Answers

Answer:C. Web development

Explanation:

The computer discipline that  this person most likely work in is option c: Web development.

What is hyperlink in web designing?

In the act of designing a website, the use of the hyperlink (or link) is known to be an element or an item such as a word or button that is said to help one to points to another different location.

Note that if a person click on a link, the link will be the one to take you to the target  area of the link, which can be said to be a webpage, document or others.

Therefore, The computer discipline that  this person most likely work in is option c: Web development.

Learn more about Web development from

https://brainly.com/question/25941596

#SPJ1

It is called the internet of things because? a. objects have built-in intelligence b. sensors connect objects to the internet c. connecting the objects is a user option

Answers

It is called the internet of things because option b. sensors connect objects to the internet.

Why is it called the internet of things?

It was called so based on its developer known to be called Ashton who was said to be working in supply chain optimization and since he wanted to get   senior management's attention to the new tech, he was said to have called his presentation “Internet of Things”.

Note that Internet of Medical Things (IoMT) Sensors helps in the the collection of data  and also the sensors links  objects to the internet.

Therefore, It is called the internet of things because option b. sensors connect objects to the internet.

Learn more about internet of things from

https://brainly.com/question/14087456

#SPJ1

a complete model of the skeleton that could be useful for all practical applications would b a dissected human a dissected human a 3d computer generated model a 3d computer generated model such a model is impossible such a model is impossible a 2d computer generated model

Answers

A  complete model of the skeleton that could be useful for all practical applications would option C. such a model is impossible.

What is model skeleton?

A skeleton model is known to be a term that tells about a classic item that can be seen or found in a lot of medical settings.

Note that Doctors often have  a human skeleton model that can be accessible to quickly show the bone structure of the human body and this is often made to their patients.

Therefore, based on the above, A  complete model of the skeleton that could be useful for all practical applications would option C. such a model is impossible.

Learn more about model  from

https://brainly.com/question/28545111

#SPJ1

A complete model of the skeleton that could be useful for all practical applications would be

A. a 3D computer generated model

B. a 2D computer generated model

C. such a model is impossible

D. a dissected human

What is the maximum amount of memory supported by a 32-bit windows operating system?

Answers

The maximum amount of memory supported by a 32-bit windows operating system is known to be called  4 GB (that is about 4,294,967,296 amount in bytes) of RAM.

How much RAM does 32-bit Windows need?

In regards to the Storage, about 1GB of RAM is seen as the minimum system requirement that is known to be used for the 32-bit version of Windows 10.

Note that One bit in the register is one that can be used or reference as a single  byte in memory, so a 32-bit system can handle  a maximum of 4 GB of RAM.

Therefore, The maximum amount of memory supported by a 32-bit windows operating system is known to be called  4 GB (that is about 4,294,967,296 amount in bytes) of RAM.

Learn more about operating system from

https://brainly.com/question/22811693

#SPJ1

write a program with a car's gas mileage (miles/gallon) and the cost of gas (dollars/gallon) as floating-point input, and output the gas cost for 20 miles, 75 miles, and 500 miles.

Answers

A program with a car's gas mileage (miles/gallon) and the cost of gas (dollars/gallon) as floating-point input, and output the gas cost for 20 miles, 75 miles, and 500 miles is given below:

#include <stdio.h>

int main(void) {

  double milesperGallon;

  double costperGallon;

  double totalCost;

  double totalCost2;

  double totalCost3;

 

  scanf("%lf", &milesperGallon);

  scanf("%lf", &costperGallon);

 

  totalCost = (20 / milesperGallon) * costperGallon;

  totalCost2 = (75 / milesperGallon) * costperGallon;

  totalCost3 = (500 / milesperGallon) * costperGallon;

 

  printf("%0.2lf", totalCost);

  printf(" %0.2lf", totalCost2);

  printf(" %0.2lf\n", totalCost3);/* Type your code here. */

  return 0;

}

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

is in charge of installing, configuring, testing, and maintaining operating systems, application software, and system-management tools. Network Consultant Lead Technical Support Network Security Analyst Systems Engineer​

Answers

Systems Engineer​ is in charge of installing, configuring, testing, and maintaining operating systems, application software, and system-management tools.

What is Application system engineer?

An applications and systems engineer is known to be a career that is said to be found in information technology (IT) and they are known to be IT expert who are mandated with the responsibilities that tends to revolve around the work of designing as well as developing applications and also systems so that they can be able ot optimize company operations.

Note that the role of system engineer is that they help in analyzing, planning, implementing, maintaining servers, mainframes, mini-computers, etc.

Therefore, Systems Engineer​ is in charge of installing, configuring, testing, and maintaining operating systems, application software, and system-management tools.

Learn more about Systems Engineer​  from

https://brainly.com/question/27940320

#SPJ1

Answer:syestems engineer

Explanation:took the test I’m like that fr fr

Which of the following uses persistent memory chips to store data?
RAM
O Compact disc
Hard disk
Flash drive

Answers

The option that uses persistent memory chips to store data is known to be called Flash Drive.

What is persistent memory used for?

In computer science, the term persistent memory is seen as any king of system or method as well as  apparatus that is known to be used for saving efficiently of all type of data structures .

Note that the flash drives is seen as a small electronic device that is known to be made up of a flash memory that is used for saving data or sharing  it to or from a computer.

Therefore, The option that uses persistent memory chips to store data is known to be called Flash Drive.

Learn more about memory chips from

https://brainly.com/question/4239281

#SPJ1

in packet switching, the voice signal is first digitized and then chopped up into a series of packets.

Answers

In packet switching, the voice signal is first digitized and then chopped up into a series of packets: True.

What is packet switching?

Packet switching can be defined as a data transmission mode in which an information or message (voice signal) is chopped into different packet parts that are independently sent, over the optimum route for each packet, and then, reassembled at the destination.

In packet switching, the information or message (voice signal) would first be digitized and then, chopped up into a series of packets comprising the voice information alongside the source and destination.

In conclusion, packet switching is a technology which enhanced and facilitated long-distance digital data communication.

Read more on packet switching here: https://brainly.com/question/28090820

#SPJ1

Complete Question:

In packet switching, the voice signal is first digitized and then chopped up into a series of packets. True or False?

Which individual is generally considered the first computer programmer?
A. Bill Gates
B. Grace Hopper
C. Larry Page
D. Lady Ada Lovelace

Answers

Answer:

D. Lady Ada Lovelace

Explanation:

The Answer you're looking for is:

D. Lady Ada Lovelace

Explanation:

Augusta Ada King, Countess of Lovelace was an English mathematician and writer, chiefly known for her work on Charles Babbage's proposed mechanical general-purpose computer, the Analytical Engine. She was the first to recognize that the machine had applications beyond pure calculation, and to have published the first algorithm intended to be carried out by such a machine. As a result, she is often regarded as the first computer programmer.

Proof Of Answer:

The image below I hope this helped you.

mary is creating a website to document her adoption of a 1-year old little girl from kazakhstan. her friend shauna makes the following recommendations and suggests that mary follow them.

Answers

Shauna tells Mary that she should consider using a code editor to enter her code.

What is a code editor?

Code editors are known to be tools that are said to be used by a lot of  programmers as well as web developers to write and also to be able to edit code.

Note that they are people who are known to be used for making  software, applications and also other forms of web development purposes.

Before the introduction of code editors, developers as well as programmers are known to make use of text editors such as Notepad on Windows and ithers.

Therefore, Shauna tells Mary that she should consider using a code editor to enter her code.

Learn more about code from

https://brainly.com/question/6418860
#SPJ1

.

Mary is creating a website to document her adoption of a 1-year old little girl from Kazakhstan. Her friend Shauna makes the following recommendations and suggests that Mary follow them.

Shauna tells Mary that she should consider using ____ to enter her code.

answer choices

a code editor

hand coding

her favorite browser

wireframe

Describe some of the most rewarding aspects this career offered the interviewee.
Explain other rewarding aspects of this career.

Answers

As an Agricultural Engineer, the  most rewarding aspects this career offered is that:

It gave the  Interviewee an opportunity to be  able to be involved in a lot of work as well as revaluations and it is very fun to work in.

What is the role of an Agricultural Engineer?

The role of an Agricultural engineers is known to be any person that tries to solve agricultural problems such as power supplies, the efficiency of machinery, and others.

Based on the above, As an Agricultural Engineer, the  most rewarding aspects this career offered is that:

It gave the  Interviewee an opportunity to be  able to be involved in a lot of work as well as revaluations and it is very fun to work in.

Learn more about Agricultural Engineer from

https://brainly.com/question/27903996

#SPJ1

See question below

Career Interview

Interviewee: ___Brian Woodbury____

Career: ____Agricultural Engineer_________

Describe some of the most rewarding aspects this career offered the interviewee.

Explain other rewarding aspects of this career.

write sql queries to answer the following questions: a. which students have an id number that is less than 50000? b. what is the name of the faculty member whose id is 4756? c. what is the smallest section number used in the first semester of 2008?

Answers

Looking at how to write SQL queries to answer the following questions:

- Which students have an ID number that is less than 50000?

the first question, we can use the following SQL query:

SELECT * FROM students WHERE id < 50000;

This will return all students who have an ID number that is less than 50000.

- What is the name of the faculty member whose ID is 4756?

the second question, we can use the following SQL query:

SELECT name FROM faculty WHERE id = 4756;

This will return the name of the faculty member whose ID is 4756.

- What is the smallest section number used in the first semester of 2008?

the third question, we can use the following SQL query:

SELECT MIN(section) FROM classes WHERE semester = '200801';

This will return the smallest section number used in the first semester of 2008.

SQL is a powerful tool for querying data in databases.

Learn more on sql queries here:

https://brainly.com/question/27851066

#SPJ4

software that does not have access to computer resources and relies on the operating system for this access is called

Answers

Answer:

Application software.

Explanation:

passwords can be used to restrict access to all or parts of the cisco ios. select the modes and interfaces that can be protected with passwords.

Answers

The three modes and interfaces that can be protected with passwords are:

VTY interfaceconsole interfaceprivileged EXEC mode

What is information security?

Information security can be defined as a preventive practice which is typically used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technologies, encryption, frameworks, processes and network engineers.

What is a password?

A password can be defined as a string of characters, phrase or word that is designed and developed to distinguish an unauthorized user from an authorized user, especially through an identification and authentication process.

In conclusion,  the access of an end user to the VTY interface and console interface of Cisco IOS can be restricted by using passwords.

Read more on password here: brainly.com/question/19116554

#SPJ1

Complete Question:

Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)

VTY interface

console interface

Ethernet interface

boot IOS mode

privileged EXEC mode

router configuration mode

Besides redundancy, what other problems are associated with the nondatabase approach to processing data?

Answers

Besides redundancy, Difficulties accessing related data, limited security features, limited data sharing features, and potential size limitations are associated with the nondatabase approach to processing data.

If you're not using a database to store and process your data, you're likely to run into some serious difficulties. First and foremost, you'll be dealing with redundancy - data that's duplicated in multiple places and is thus difficult to keep track of.

Second, accessing related data can be a challenge, as you'll need to write custom code to fetch it from wherever it's stored.

Third, security features are likely to be limited, making it easy for unauthorized users to access your data. Fourth, data sharing features are likely to be limited as well, making it difficult to share data among different users or applications. Finally, you may run into size limitations, as data that's not stored in a database can be harder to manage effectively.

Learn more here:

https://brainly.com/question/14531687

#SPJ4

The focus and goal of ______ is the determination of the most effective means of translating business processes into a physical system, including hardware and software.

Answers

The focus and goal of physical design is the determination of the most effective means of translating business processes into a physical system, including hardware and software.

What is SDLC?

SDLC is an abbreviation for system development life cycle and it can be defined as a strategic traditional methodology that defines the key steps, phases, or stages for the design, development, and implementation of high quality systems.

In Computer technology, there are seven (7) phases involved in the development of a system and these include the following;

PlanningAnalysisDesignDevelopment (coding)TestingDeploymentMaintenance

In this context, we can reasonably infer and logically deduce that the focus and goal of physical design is to determine the most effective means to translate all business processes into a physical system, including hardware and software.

Read more on system development here: https://brainly.com/question/2587761

#SPJ1

Complete Question:

The focus and goal of ______ is the determination of the most effective means of translating business processes into a physical system, including hardware and software.

A) logical design

B) a flowchart

C) physical design

D) a workflow chart

this standards organization is concerned with the request for comments (rfc) documents that specify new protocols and update existing ones

Answers

Internet Engineering Task Force (IETF) is concerned with the request for comments (RFC) documents that specify new protocols and update existing ones.

What is a document?

A document can indeed be described as a legal document or simply as a piece of paper that lists the numerous laws that must be upheld by the country of origin. This article was written.

The internet engineering task force is basically an operating star school that describes the internet protocols that the individual need to follow, they also check that there are any new updates that are to be made being defined by them.

Learn more about Internet Engineering Task Force, here:

https://brainly.com/question/10979842

#SPJ1

Why is standard deviation not a valuable statistical tool for system monitoring?

Answers

The reason why  standard deviation is not a valuable statistical tool for system monitoring is option a. It needs a normally distributed dataset which monitoring data doesn't often have. (Multiple Peaks, Long Tails, etc).

What standard deviation means?

The term standard deviation (or simply written as σ) is known to be one that  is said to measure of the way that the dispersion of the data is in relation to that of its the mean.

Note that when the standard deviation is said to be low, it connote the fact that the data are said to be clustered around the mean.

But if the standard deviation is said to be high, it connote or indicates that the data are said to be more spread out.

Therefore, The reason why  standard deviation is not a valuable statistical tool for system monitoring is option a. It needs a normally distributed dataset which monitoring data doesn't often have. (Multiple Peaks, Long Tails, etc).

Learn more about standard deviation from

https://brainly.com/question/475676

#SPJ1

This problem has been solved!

See the answer

Why is standard deviation not a valuable statistical tool for system monitoring?

a. It needs a normally distributed dataset which monitoring data doesn't often have. (Multiple Peaks, Long Tails, etc)

b. The model is prone to causes errors in reporting mechanisms.

c. It can't be calculated across diverse datasets.

d. Most monitoring systems do not have the capability to do advanced calculations.

Write a function that takes a number k as input, and then reads in k names (one at a time), storeing them in a list, and then print them in reverse (do not to use the reverse method)

Answers

A function that takes a number k as input, and then reads in k names (one at a time), storing them in a list, and then prints them in reverse is given below.

The Function

#include <bits/stdc++.h>

using namespace std;

// Function for checking if digit k

// is in n or not

int checkdigit(int n, int k)

{

   while (n)

   {

       // finding remainder

       int rem = n % 10;

       // if digit found

       if (rem == k)

           return 1;

       n = n / 10;

   }

   return 0;

}

// Function for finding nth number

int findNthNumber(int n, int k)

{

   // since k is the first which satisfy the

   // criteria, so consider it in count making count = 1

   //  and starting from i = k + 1

   for (int i = k + 1, count = 1; count < n; i++)

   {

       // checking that the number contain

       // k digit or divisible by k

       if (checkdigit(i, k) || (i % k == 0))

           count++;

       if (count == n)

       return i;

   }

   return -1;

}

// Driver code

int main()

{

   int n = 10, k = 2;

   cout << findNthNumber(n, k) << endl;

   return 0;

}

Read more about programming here:

https://brainly.com/question/23275071
#SPJ1

a system always needs the 4-pin auxiliary power connector, and sometimes needs the p1 connector as well.

Answers

The given statement that a system always needs the 4-pin auxiliary power connector, and sometimes needs the p1 connector as well is false.

At the station's main bus or designated sub-bus, auxiliary power is electrical energy that is supplied by a different source and acts as a backup for the main power source. In contrast to an online unit, an offline unit offers electrical isolation between the main power supply and the vital technical load.

The static inverter in the auxiliary power supply converts the electricity used for interior lighting, displays, air conditioning, etc. The static inverter is installed to provide power that has low voltage and consistent frequency even when there is a propulsive inverter.

Auxiliary power units, sometimes known as APUs, enable aircraft to function independently of ground support machinery such ground power units, external air conditioning units, or high pressure air systems.

Learn more about auxiliary:

https://brainly.com/question/26960026

#SPJ4

The viewer of an olap report can change its format. which term implies this capability?

Answers

The viewer of an olap report can change its format. The term implies this capability is online. The correct option is D).

What is an OLAP report?

OLAP is Online analytical processing. It is used for analytical multidimensional queries of computers.

It is a technology used by many businessmen, and It is a powerful technology that is used for discoveries of data and limitless viewing reports and analytical calculations.

It is also used in report timing and for data viewing, and it has broader categories for databases.

Therefore, the correct option is D) online.

To learn more about the OLAP report, refer to the link:

https://brainly.com/question/26691784

#SPJ1

The question is incomplete. Your most probably complete question is given below:

A) processing. B) analytical. C) dimension. D) online.

the critical path of a network is the part 2 a. path with the fewest activities. b. path with the most activities. c. longest time path through the network. d. shortest time path through the network.

Answers

The critical path of a network is the part option. c. longest time path through the network.

What is the critical path of a network?

In regards to project management, a critical path is known to be the way or sequence of project network functions that is known to add up to form one of the  longest total timeframe even if that longest timeframe has float or not.

This is know  to be the factor that helps to determines the shortest time that is known to be possible to finish  the project.

Therefore, The critical path of a network is the part option. c. longest time path through the network.

Learn more about critical path from

https://brainly.com/question/14728281

#SPJ1

Other Questions
Commas or no commas Three playful dolphins swam right past EnriqueRivera's boat. An employee of the department store receives 10% off all purchases. The employee purchases a shirt for $46.99. Determine the cost of this purchase. if two groups of numbers have the same mean, then group of answer choices their standard deviations must also be equal. their medians must also be equal. their modes must also be equal. other measures of location need not be the same. What point is the poet making when he has the narrator, Perseus, admit, that he "thirsted to destroy" and might have continued to kill anyonewho crossed his path? How does the poet develop the importance and significance of this message with other poetic techniques in the poem? In behavioral learning, a ________ is a need that moves an individual to action and a(n) ________ is the action taken by a consumer to satisfy it. At highway speeds, anautomobileis capable of an acceleration of about 1.6m/s2. at this rate, how long does it take to accelerate from 80km/hto 110km/h? What is the relative location of the tropic of capricorn in relation to the equator. A company packages bottles of olive oil in cylindrical cardboard tubes completely wrapped with paper. If each tube has a diameter of 3 inches and is 11 inches tall, approximately howmany square inches of paper is needed to wrap each tube? (Use 3.14 to approximate w.)O 78O104118160 Britain reacted to the American Declaration of Independence by gathering its military forces in Boston. gathering its military forces in New York. setting up winter headquarters in New Jersey. granting the colonies independence. some investment advisors say that its reasonable to expect a 7%7% return over the long term in the stock market. assuming that you begin with $1000$1000 and leave your money invested, use a loop to calculate and display how much money youll have after 10, 20 and 30 years. use the following formula for determining these amounts: ???? what are three or four components of a well-thought-out, achievable, and reasonable business strategy? what mistakes do companies make when developing their strategies Complete the following table Please Help - Easy Question Algebra 2. New-task buying is an in-between process in which some review of the buying situation is done. false true someone is breathing at a rate of 3 to 4 times per minute, what should you do next? 1. A group of 12 students goes on aschool field trip. Of all the studentson the trip, 6 are in third grade.Which fraction is equivalent to?A. 1/3B. 1/4C. 1/6D. 1/2 47 Which aspects of a story best help the reader understand the author's purpose? Select three options.AimageryplotOrepetitionOsettingtone The table shows the cost of 4 movie tickets at two theaters. Theater Cost ($) Movies Galore 30 Star Cinema 31 What equation can be used to model the total cost y for x tickets at Star Cinema? Write the equation in the form Many experts on policing believe that the single greatest obstacle to achieving accountability for police behavior is? List all pairs of congruent angles, and write a proportion that relates the corresponding sides for each pair of similar polygons. \triangle D F G \sim \triangle K M J