In 25 words or fewer, explain why businesses use social media to digitally market their products.

Answers

Answer 1

Due to the accessibility of social media platforms, businesses have the opportunity to follow their potential customers. Social media marketers need to know more about their target market's needs, wants, and interests in order to develop a more effective marketing plan to draw in these potential customers.

What is social media?

Social media is a term used to describe online communication. Social media systems enable users to have discussions, exchange information, and create content for the internet.

Users utilize social media networks, sometimes referred to as digital marketing, as a platform to create social networks and share information in order to develop a company's brand, boost sales, and enhance website traffic.

Hence, the significance of the social media is aforementioned.

Learn more about on social media, here:

https://brainly.com/question/18958181

#SPJ1


Related Questions

Which of the following describes why graphical interfaces quickly became popular after their introduction to the mass market?

A.superior usability
B.form over function
C.strong ISO standards
D.contextual design analysis of a market demographic

Answers

A.superior usability

assuming classfull routing, how many least number of bit positions to borrow from, to subnet 199.67.67.0 into 5 subnets.

Answers

Assuming classful routing, the IP address 199.67.67.0 falls under Class C, which by default has a subnet mask of 255.255.255.0. To subnet this network into 5 subnets, we need to borrow enough bits to create at least 5 subnets.

To find the minimum number of bits required to create 5 subnets, we need to find the smallest power of 2 that is greater than or equal to 5. The smallest power of 2 greater than or equal to 5 is 2^3 = 8. Therefore, we need to borrow 3 bits from the host portion of the IP address to create 8 subnets.
The new subnet mask would be 255.255.255.224, which means that each subnet will have a range of 32 IP addresses (30 usable addresses). The subnets would be:

- 199.67.67.0/27
- 199.67.67.32/27
- 199.67.67.64/27
- 199.67.67.96/27
- 199.67.67.128/27Note that when we borrow bits to create subnets, we reduce the number of host bits available, which means that each subnet will have fewer usable IP addresses. Also, it's important to note that classful routing is no longer used on the internet and has been replaced by classless routing, where the subnet mask can be varied to create any number of subnets and hosts within those subnets.
Hi! To subnet the IP address 199.67.67.0 into at least 5 subnets, you'll need to borrow a minimum number of bit positions from the host portion of the address while assuming classful routing.
199.67.67.0 is a Class C address, which has a default subnet mask of 255.255.255.0. The host portion of the address has 8 bits available. To create 5 or more subnets, you'll need to borrow at least 3 bits from the host portion (2^3 = 8), as borrowing 2 bits would only provide 4 subnets (2^2 = 4), which is not enough.
Therefore, the least number of bit positions to borrow for creating 5 subnets is 3.

To learn more about IP address click on the link below:

brainly.com/question/31026862

#SPJ11

Assuming classful routing, the IP address 199.67.67.0 falls under the Class C category, which by default has a subnet mask of 255.255.255.0. This means that all the 32-bit positions of the IP address are already assigned for network and host addresses.

To subnet this network into 5 subnets, we need to borrow some bit positions from the host portion of the IP address. We can use the formula 2^n, where n is the number of bit positions borrowed, to determine the number of subnets created.

To create 5 subnets, we need to borrow at least 3 bit positions since 2^3 = 8 subnets, which is more than 5. We cannot borrow fewer than 3 bit positions because 2^2 = 4 subnets, which is not enough.

Thus, we need to use a subnet mask with at least 3 additional bits in the host portion, which gives us a subnet mask of 255.255.255.224. This subnet mask uses 3 additional bit positions (11100000) in the fourth octet of the IP address, leaving us with 5 subnets of 32 IP addresses each.

Therefore, to subnet 199.67.67.0 into 5 subnets, we need to borrow at least 3 bit positions from the host portion and use a subnet mask of 255.255.255.224.

To learn more about routing visit : https://brainly.com/question/31367129

#SPJ11

A technician adds a second hard drive to a server with the goal of setting up a RAID 1 but the RAID is not working. Where should the technician look first to try to solve the problem?

Answers

A technician adds a second hard drive to a server with the goal of setting up a RAID 1, but the RAID is not working. He should look first at the RAID setup in the BIOS.

What is RAID?

Data is replicated onto many drives for higher throughput, error correction, fault tolerance, and improved mean time between failures when mirroring or striping data on clusters of low-end disk drives.

In Setup mode, you can add new Secure Boot variables. You should not leave Setup mode running indefinitely.

Therefore, he should first check the RAID configuration in the BIOS.

To learn more about RAID, refer to the link:

https://brainly.com/question/28963056

#SPJ1

what is your favorite pokemon game

Answers

Answer:

all.

Explanation:

what is your favorite pokemon game

Answer:

pokemon moon

Explanation:

Write a program that gets a list of integers from input, and outputs non-negative integers in ascending order (lowest to highest). Ex: If the input is: 10 -7 4 39 -6 12 2 the output is: 2 4 10 12 39

Answers

Answer:

Following are the code to this question:

#include <iostream>//defining header file

using namespace std;

int main()//defining main method

{

   int a[]={10,-7,4,39,-6,12,2};//defining single deminition array and assign value

   int i,x,j,t; //defining integer variable

   cout<<"Before sorting value: ";  

   for(i=0;i<7;i++) //using loop to print value

   {

       cout<<a[i]<<" ";//print value

   }

   cout<<endl <<"After sorting value: ";

   for(i=0;i<7;i++)//defining loop to sort value

{  

 for(j=i+1;j<7;j++)//count array value

 {

  if(a[i]>a[j]) //defining condition to inter change value

  {

      //performing swapping

   t=a[i];  //integer variable t assign array value

   a[i]=a[j];//swapp value

   a[j]=t;//assign value in array

  }

 }

}

for(i=0;i<7;i++) //defining loop to print value

   {

       if(a[i]>=0) //defining condition to check positive value  

       {

       cout<<a[i]<<" ";//print value

       }

   }

   return 0;

}

Output:

Before sorting value: 10 -7 4 39 -6 12 2  

After sorting value: 2 4 10 12 39  

Explanation:

Following are the description to the above code:

In the above program code, Inside the main method, an array a[] is declared that assign some value, and another integer variable "i, j, x, and t" is declared, in which variable "i and j" are used in the loop, and "x, t" is used to sort value.In the next step, three main for loop is declared, in which the first loop is used to print array value.In the second loop, inside another loop is used that sorts array values.In the last loop, a condition is defined, that check the positive value in the array and print its values.

Answer:

integers=[]

while True:

      number=int(input())

      if number<0:

       break

      integers.append(number)  

print("",min(integers))

print("",max(integers))

Explanation:

Which of the following is NOT an important factor when choosing an insurance company?

Licensing

Price

Financial solidity

Location

Answers

Answer:

financial solidity

Explanation:

it will be always be ready while sound or not

A factor which isn't important when choosing an insurance company is: D. location.

What is an insurance company?

An insurance company is a business firm that is establish to collect premium from all of their customers (insured) for losses which may or may not occur, so they can easily use this cash to compensate or indemnify for losses incurred by those having high risk.

Generally, it is important to consider the following factors when choosing an insurance company:

LicensingPriceFinancial solidity

However, location is a factor which isn't important when choosing an insurance company.

Read more on insurance here: https://brainly.com/question/16789837

The World Cup might feature a team that represents:


Answers

France.

A country in Europe.

Anyone knows how to write a code to solve the following problem?
A idea I have is to map the bottom square ontop the top square starting from top left to bottom right, but m unsure if thats achievable
Language preferably in C++, java and python is also accepted

Anyone knows how to write a code to solve the following problem?A idea I have is to map the bottom square
Anyone knows how to write a code to solve the following problem?A idea I have is to map the bottom square

Answers

Answer:

import re

def solve(n, painting, k, stamp):

   # define a function to check if the stamp is inside the painting

   def is_in_painting(i, j):

       return i >= 0 and j >= 0 and i + k <= n and j + k <= n

   

   # define a function to check if the stamp matches the painting

   def matches_painting(i, j):

       for x in range(k):

           for y in range(k):

               if painting[i+x][j+y] != stamp[x][y]:

                   return False

       return True

   

   # try to match the stamp in each position

   for i in range(n):

       for j in range(n):

           if is_in_painting(i, j) and matches_painting(i, j):

               return True

   return False

# read in the input

input_string = """4

2

**

.*

1

*

3

.**

.**

***

2

.*

**

3

...

.*.

..."""

# parse the input string

input_lines = input_string.strip().split('\n')

n = int(input_lines.pop(0))

painting = [list(line) for line in input_lines[:n]]

input_lines = input_lines[n:]

k = int(input_lines.pop(0))

stamp = [list(line) for line in input_lines[:k]]

# solve the problem

if solve(n, painting, k, stamp):

   print("YES")

else:

   print("NO")

Explanation:

henry has been tracking volume allocations, and he is preparing to add capacity to his back-end server farm. he has decided to automate the volume allocation size. what cloud feature can henry take advantage of?

Answers

Henry can take advantage of the cloud feature called "Auto Scaling" to automate the volume allocation size in his back-end server farm.

Auto Scaling is a capability provided by cloud service providers that allows users to automatically adjust the number of resources (such as servers or instances) based on the current demand. It helps to optimize resource allocation and ensure efficient utilization of computing resources.

By using Auto Scaling, Henry can define scaling policies based on certain conditions, such as CPU utilization, network traffic, or other custom metrics. When the conditions are met, the Auto Scaling feature automatically adds or removes resources to match the demand. This ensures that the volume allocation size is adjusted dynamically to handle varying workloads.

With Auto Scaling, Henry can ensure that his back-end server farm can scale up or down based on demand, improving performance during peak periods and reducing costs during periods of low utilization. It allows for automated and efficient resource management, saving time and effort in manual capacity planning and allocation.

To know more about Auto Scaling, click here:

https://brainly.com/question/13947516

#SPJ11

Why is it important to check with your school for job openings?

Answers

It is essential to check with your school for job openings because they offer a range of benefits that other employers may not provide.

Firstly, working for your school allows you to stay in a familiar environment, where you already know the staff and students.

Secondly, working for your school enables you to be more flexible with your schedule, as you can work around school holidays and breaks.

Additionally, school jobs often provide a higher level of job security than other jobs. This means that if you perform well in your role, you are less likely to lose your job due to budget cuts or other factors.

Lastly, working for your school provides opportunities for professional growth and development, as schools often offer training and workshops for their staff.

Therefore, checking with your school for job openings can be a smart move for those seeking job stability, professional development, and a flexible work schedule.

For more such questions on job, click on:

https://brainly.com/question/28183134

#SPJ11

In pro tools, you cannot import the audio embedded in a video track. True or false

Answers

False. In pro tools, you can import the audio embedded in a video track.

In Pro Tools, you can import the audio embedded in a video track. Pro Tools is a professional digital audio workstation widely used in the music and post-production industry. It offers various features and capabilities to work with audio, including video integration.

Pro Tools allows users to import video files into their projects, and when a video file is imported, it automatically separates the audio and video components. This means that the audio from the video track can be accessed and manipulated separately within Pro Tools.

Once the video file is imported, Pro Tools provides options to extract, edit, and process the audio track independently. Users can work on the audio portion of the video, apply effects, mix it with other audio tracks, or sync it with other elements in the project.

The ability to import and work with audio from video tracks is particularly useful in post-production scenarios where tasks such as sound design, Foley, dialogue editing, and music composition are involved. Pro Tools offers a comprehensive set of tools and functionalities to handle audio and video content seamlessly, making it a preferred choice for professionals working in the audio and film industry.

To learn more about audio click here:

brainly.com/question/31845701

#SPJ11

Add criteria to this query to return only the records where the value in the DeptCode field is ENG or CIS. Run the query to view the results.

Answers

To add criteria to the query and filter the records based on the value in the DeptCode field, the following SQL query can be used:

SELECT *

FROM YourTableName

WHERE DeptCode IN ('ENG', 'CIS');

Replace "YourTableName" with the actual name of the table. This query uses the IN operator to specify multiple values for the DeptCode field. In this case, it filters the records to include only those where the DeptCode is either 'ENG' or 'CIS'.

It is required to replace "YourTableName" with the actual name of the table. Also, make sure to use the appropriate database management system and execute the query accordingly.

Learn more about SQL queries, here:

https://brainly.com/question/31663284

#SPJ4


What happens when you change just ONE character in your input string?

Answers

You must create a new string with the character replaced

question 3 which layer in the transmission control protocol/internet protocol (tcp/ip) model does ip use?

Answers

Network Layer. For the network, this layer, also referred to as the network layer, accepts and sends packets. These protocols include the robust Internet protocol (IP), the Address Resolution Protocol (ARP), and the Internet Control Message Protocol (ICMP).

What layer of the TCP/IP paradigm does the transport layer belong to?

Layer 4: The Transport Layer, which TCP/IP depends on to efficiently manage communications between two hosts. The transport layer creates this connection whenever an IP communication session has to start or stop.

In the TCP/IP model, what is Layer 3?

Data segments are transmitted between networks using packets at Layer 3 (Network). This layer gives the data segments source and destination IP addresses when you message a friend.

To know more about Network Layer visit :-

https://brainly.com/question/14715896

#SPJ4

What layer is being used when using recording cameras at intersections to identify red light violators

Answers

The Application Layer is also responsible for making sure that the appropriate communication partners are present at each end of a communication, that the requested quality of service is available.

In the Open Systems Interconnection (OSI) model, the Application Layer is the topmost layer. This is the layer at which user-level software interfaces with the network to transmit and receive data. Applications that use the network to perform work typically operate in this layer. The Application Layer is responsible for making sure that the appropriate communication partners are present at each end of a communication, that the requested quality of service is available, and that communication is in compliance with any applicable constraints and protocols

A red light violator is defined as someone who drives through an intersection while the traffic light is red. Red light running is a leading cause of urban crashes and results in many injuries and fatalities every year. To catch red-light violators, authorities often install recording cameras at intersections, which record images of vehicles that run the red light.

To know more about Application Layer visit:-

https://brainly.com/question/30156436

#SPJ11

Which scenario might indicate a reportable insider threat security incident?

Answers

The scenario might indicate a reportable insider threat security incident is a coworker removes sensitive information without authorization. The correct option is b.

What is threat security?

Any situation or occurrence that may negatively affect an organization's operations, assets, users, other organizations, or the country through the use of a system, whether through illegal access, information deletion, disclosure, modification, or denial of service.

Threats can be broken down into four groups: conditional, veiled, direct, and indirect.

Therefore, the correct option is b, A coworker removes sensitive information without authorization.

To learn more about threat security, refer to the link:

https://brainly.com/question/17488281

#SPJ1

The question is incomplete. Your most probably complete question is given below:

A coworker uses a personal electronic device in a secure area where their use is prohibited.

A coworker removes sensitive information without authorization

Coworker making consistent statements indicative of hostility or anger toward the United States in its policies.

Proactively identify potential threats and formulate holistic mitigation responses

When you write a check, why do you always begin writing the amount of the check as far to the left as you can?

Answers

Answer:

You start at the left without leaving any paces so no one can add any more numbers.

Explanation:

6. Python indexes lists beginning with the number 1.
True

False

Answers

Answer:

True

Explanation:

Python is like coding

Write a formula that would return a TRUE result if the sum of the first five numbers in a column of data are negative

Answers

Answer:

Hhgfchhgfhhgffxfghh

Explanation:

Tggh

Which Application program saves data automatically as it is entered?
MS Word
PowerPoint
MS Access
MS Excel

Answers

The application program that saves data automatically as it is entered is the MS Access.

The Application program that saves data automatically as it is entered MS Access. The correct option is C.

What is MS Access?

Microsoft Access is a database management system that includes a graphical user interface, the relational Access Database Engine, and software-development tools.

It is a component of the Microsoft 365 software package and is available as a standalone product or as part of the Professional and higher editions.

Data kept in Access may be found and reported on with ease. Make interactive data entry forms. a variety of data sources can be imported, transformed, and exported.

Access is often more effective at managing data because it makes it easier to keep it structured, searchable, and accessible to several users at once.

MS Access is an application tool that automatically saves data as it is entered.

Thus, the correct option is C.

For more details regarding MS access, visit:

https://brainly.com/question/17135884

#SPJ2

The ___performs communication with the hardware

Answers

Answer:

I think the answer is the operating system

Answer: Drivers

Explanation:

In order for the operating system to talk to your hardware, it needs drivers.

Write a program that asks the user to enter seven ages and then finds the sum. The input ages should allow for decimal values.

Sample Run
Enter Age: 25.2
Enter Age: 26.7
Enter Age: 70
Enter Age: 30
Enter Age: 52.6
Enter Age: 24.4
Enter Age: 22
Sum of Ages = 250.9

Answers

In python codes, a software that asks the user to enter seven ages and then calculates the sum was created.

What is a program?A programme is a planned series of actions that a computer is instructed to perform in a particular order.A series of instructions are contained in the programme of the modern computer that John von Neumann first outlined in 1945. The machine executes each instruction one at a time. A location that the computer may access is frequently where the application is kept.Python is a well-known programming language for computers that is used to build websites and applications, automate procedures, and do data analysis.A programme is an organised sequence of instructions that a computer must follow in order to complete a task. The programme in a contemporary computer, as described by John von Neumann in 1945, contains a one-at-a-time sequence of instructions that the computer follows. A storage space that the computer can access is often where the software is placed.

To learn more about program, refer to:

https://brainly.com/question/23275071

When they are retrieved, memories are often altered before they are stored again. This process is called _____.Please type the correct answer in the following input field, and then select the submit answer button or press the enter key when finished.

Answers

When they are retrieved, memories are often altered before they are stored again this process is called the retrieval practice effect.

What is Retrieval Practice Effect?

The technique of retrieving information from memory in order to improve learning is known as retrieval practice. When you retrieve anything from your memory, the connections that hold it there are strengthened, increasing the likelihood that you'll be able to recall it in the future.

Thus, the process is called a Retrieval Practice effect When they are retrieved, memories are often altered before they are stored again. The technique of retrieving information from memory in order to improve learning is known as retrieval practice.

Learn more about Retrieval Practice here:

https://brainly.com/question/15010721

#SPJ1

"Once a business operations analysis is completed and change needs to
that includes information
occur, many businesses will create a
technology. A
is a long-term plan of action created to achieve a
certain goal." Which of the following answers fits into both blanks?
A. scheduling plan
OB. technology strategy
C. business strategy
OD. communication plan

Answers

B. technology strategy fits into both blanks.

As an IT head, you require your employees to login to an intranet portal in your organization. The portal contains a login form in which users have to type their name and password. The password can be a combination of numbers and letters. Which data type is most suitable for a password field?
The (BLANK)data type is most suitable to define a password field.

Answers

Answer:

The answer is Text.

got it right on plato.

I promise you string is NOT the answer it's text

Explanation:

The password data type is most suitable to define a password field.

What is password?

Password is defined as a word, phrase, or string of characters used to distinguish between a procedure or user that is permitted and one that is not. A password is typically a random string of characters made up of letters, numbers, and other symbols. When only numeric characters are allowed, the matching secret is frequently referred to as a personal identification number (PIN).

Most often, passwords are made up of letters, numbers, and spaces. We use string data types as a result. Additionally, it depends on the programming language we are using. NIST advises using sha-256 or better. You will need 256 bits to save this sha-256 hashed password because a hashing method always yields a result of a predetermined length.

Thus, the password data type is most suitable to define a password field.

To learn more about password, refer to the link below:

https://brainly.com/question/28114889

#SPJ2

1. What is material science?

Answers

Answer:

Explanation:

The study of the properties of solid materials and how those properties are determined by a material’s composition and structure is material science.

Answer:

The scientific study of properties and applications of materials of construction or manufacture.

Explanation:

Information below:

1. What is material science?

Which is non executable statement used to write some information.​

Answers

Answer:

Programming command that is not run or executed when being read by the computer. For example, a commonly used nonexecutable statement is REM (remark) used in batch files and other Microsoft Windows and DOS programs.

write a program that prints the contents of a file to the console. on each line, output the line number. ask the user to specify a file name.

Answers

The user to input the file name, read the contents of the file line by line, and print each line with its line number to the console.

To write a program that prints the contents of a file to the console with line numbers and asks the user to specify a file name, you can follow these steps:
1. Ask the user for the file name.
2. Open the specified file.
3. Read the file line by line.
4. Print each line with its line number.
5. Close the file.
Here's a Python example:
python
def main():
   # Step 1: Ask the user for the file name
   file_name = input("Please enter the file name: ")
   # Step 2: Open the specified file
   with open(file_name, 'r') as file:
       # Step 3: Read the file line by line
       for line_number, line in enumerate(file, start=1):
           # Step 4: Print each line with its line number
           print(f"{line_number}: {line.strip()}")
   # Step 5: Close the file (automatically done using 'with' statement)
if __name__ == "__main__":
   main()
This program will ask the user to input the file name, read the contents of the file line by line, and print each line with its line number to the console.

Learn more about file visit:

https://brainly.com/question/30020838

#SPJ11

to combat filesharing, the recording and film industries have used:

Answers

To combat file-sharing, the recording and film industries have used several measures, including legal action, digital rights management (DRM), and the use of licensed services. Unauthorized file-sharing is a widespread issue that affects the music and film industries, as well as authors and other creators of copyrighted works.

The recording and film industries have also used licensed services to provide access to their works in a controlled and secure environment. Licensed services such as music and video streaming services provide a convenient and affordable way for consumers to access copyrighted works while respecting the rights of copyright owners. These services typically use DRM technology and other security measures to protect the works from unauthorized use.

In conclusion, the recording and film industries have used various measures, including legal action, DRM technology, and licensed services, to combat file-sharing and protect their copyrighted works. These measures have been effective to some extent, but the issue of unauthorized file-sharing remains a significant challenge for the industries and the creators of copyrighted works.

To know more about recording visit:

https://brainly.com/question/3191148

#SPJ11

The ____ command displays pages from the online help manual for information on Linux commands and their options.

Answers

The correct answer is Reference material is available on subjects like instructions, subroutines, and files using the man command.

One-line explanations of instructions identified by name are provided by the man command. Additionally, the man command offers details on any commands whose descriptions include a list of user-specified keywords. The abbreviation "man" stands for manual page. Man is an interface to browse the system reference manual in unix-like operating systems like Linux. A user can ask for a man page to be displayed by simply entering man, a space, and then argument. The argument in this case might be a command, utility, or function. The Windows equivalent of man is HELP. For illustration: C:\> HELP Type HELP command-name to get more information about a particular command. ASSOC displays or changes associations for file extensions.

To learn more about  man command click the link below:

brainly.com/question/13601285

#SPJ4

Other Questions
what is the answer to that question Calculate Kp for the reaction below. COF2(g)12CO2(g)+12CF4(g) Express your answer using two significant figures. I am just going to ask this question again because I keep getting a scam answer state the assumption made for deriving the efficiencyof gas turbine? how will you measure the volume of the solid objects in this experiment? archimades will mark brainliest Air enters the turbocharger compressor of an automotive engine at 85 kPa, 17C, and exits at 261.96 kPa. The air is cooled by 15C in an intercooler before entering the engine. The isentropic efficiency of the compressor is 73.17%. 1) Determine the enthalpy value of the air at the end of the isentropic process (he), in kJ/kg. 2) Assuming he is 400.98 kJ/kg (which could be correct or incorrect), find the actual temperature of the air entering the engine, in Kelvin. At back-to-school night, a third-grade teacher tells parents, "Your children will be learning new academic skills, having those skills tested and compared to other children, refining their motor skills through play and sports, and developing friendships outside of the family circle." What period of human development is this teacher describing According to this amendment is it okay to quarter a soldier in a house without the owner's permission in a time of war? What is the frequency of a red light in the air where its wavelength is 6.8x10^-7? Does anyone want to make a sentence with the word Basin in it???????Definition: An area of land that is drained by rivers and its tributaries (small scale) What aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process using the bare minimum requirements Seymour has 5 candy bars that he would like to split equally among 4 children. How much candy will each child get? to make sweet tea, a cook dissolved 152.395 grams of sugar (c6h6o2, fw = 110 g/mol) in 5.19 l of water at 32.34 c. what is the molality of this sugar solution? A rectangular garage has a perimeter of 46 meters and an area of 130 square meters. What are the dimensions of the garage? what is the purpose of the fast fourier transform? a. it allows you to fit the plot with a trendline. b. it allows you to plot the velocity v. the position instead of velocity v. time. c. it takes the signal from the position domain and represents it in the frequency domain instead. d. it allows you to look at the trajectory of the device. Dr. Ortega gave Austin, one of her patients, 180 micrograms of medication. Based on Austin's height and weight, she expects that there will be about 162 micrograms remaining in his body after one hour. Dr. Ortega knows that the amount of medication remaining in Austin's body will continue to decrease each hour.Write an exponential equation in the form y=a(b)x that can model the amount of medication in Austin's body, y, x hours after the medicine was administered.Use whole numbers, decimals, or simplified fractions for the values of a and b.y = To the nearest microgram, how much of the medication can Dr. Ortega expect to remain in Austin's body after 6 hours? micrograms Real GDP per capita is an indicator of living standards in a country. OA) true O B) false Which of the following statements about the Catholic Church and the Protestant Reformation is true?A) The humanist movement of the Renaissance strengthened the Catholic Church. B) Before the Protestant Reformation, religion was not an important force in Europe. C) The Catholic Church had issues with corruption, which led to the Protestant Reformation. D) The Catholic Church's practice of receiving Holy Communion was criticized by many, which led to the Protestant Reformation. sana travels 5 miles west, then 4 miles north, then 8 miles east how far is she from her starting point? (Pythagoras thereom)