state the input process and output that takes place at the ATM and the point of sale​

Answers

Answer 1

Explanation:

The input process is by entering the card and pressing the pin number after that output receive the money


Related Questions

_____ is the process by which attitudes and behaviors are influenced as a result of receiving a message.

Answers

Persuasion is the process by which attitudes and behaviors are influenced as a result of receiving a message.

When individuals are exposed to persuasive messages, they may be persuaded to change their existing attitudes, beliefs, or behaviors. Persuasion involves the use of communication techniques to shape or reinforce opinions and encourage individuals to adopt a particular viewpoint or engage in specific actions.

The process of persuasion typically involves several key elements, including the source of the message (who is delivering it), the content of the message (what is being communicated), the audience (who is receiving the message), and the medium or channel through which the message is conveyed.

Know more about Persuasion here;

https://brainly.com/question/1597628

#SPJ11

True/False:Most applications don't use concurrency

Answers

The given statement "Most applications don't use concurrency" is false because most applications don't use concurrency.

Concurrency refers to the ability of an application to execute multiple tasks simultaneously. Many modern applications, especially those that run on servers, use concurrency extensively to improve performance and responsiveness. For example, web servers often handle multiple requests simultaneously, and modern databases use concurrency to allow multiple clients to read and write data simultaneously. Therefore, it's safe to say that most applications today use concurrency to some extent.

You can learn more about concurrency at

https://brainly.com/question/30464144

#SPJ11

Write 3 places clay can be found

Answers

Answer:

sediments , volcanic deposits

Explanation:

I need help!

A standard is a:

A. normal way of addressing business letters.
B. level of quality or performance that people accept as normal.
C. a document with specific rules and regulations.
D. set unit of measurement for a particular purpose.

Answers

Explanation:

The answer is B. level of quality or performance that people accept as normal

Answer:

A standard is a: level of quality or performance that people accept as normal.

Explanation:

Just did this and got it correct.

write an algorithm to print circumference of a circle​

Answers

Answer:

1 Start

2 Read the value of radius r of Circle

3. Give Pi = 3.14

4 Calculate area of Circle = Pi x r x r

5. Calculate Circumference of circle

( You can use either C= 2 X Pi X r Or Area (A) = Pi X r X r Circumference (C) = 2 X Pi X r A/r = Pi X r A/r = C/2 So C = 2 x ( A/r ) 5. Print area and Circumference

6. End.

When do you use a for loop instead of a while loop?

Answers

Answer:

i dont know.prob guess a short loop.

Explanation:

which of the following items in your pocket uses nfc technology? group of answer choices wallet credit card coin purse postage stamp

Answers

Out of the following items in your pocket, the credit card uses NFC technology.

What is NFC Technology?

NFC (Near Field Communication) technology is a wireless communication technology that enables data exchange between devices that are within a few centimeters of each other. NFC can be utilized for a variety of applications, including mobile payments and contactless ticketing, among others. The purpose of NFC technology is to allow people to transmit data wirelessly between two devices, such as smartphones, with a single tap.

Therefore, among the given items in your pocket, the credit card uses NFC technology. NFC-enabled credit cards are equipped with a tiny chip and an antenna that enables the chip to communicate with NFC-enabled devices.

Learn more about NFC (Near Field Communication) technology at https://brainly.com/question/32389818

#SPJ11

"Caller ID" is the feature that displays the telephone number of the caller on the telephone of the person he or she calls. With Caller ID now routine and widely used, it might be surprising that when the service was first available, it was very controversial because of privacy implications. (a) What aspect of privacy (in the sense of Section 2.1.1) does Caller ID protect for the recipient of the call? What aspect of privacy does Caller ID violate for the caller? (b) What are some good reasons why a nonbusiness, noncriminal caller might not want his or her number displayed?

Answers

Answer: Provided in the explanation section

Explanation:

please follow this explanation for proper guiding.

(a)

i. What aspect of privacy does Caller ID protect for the recipient of the call?

* The beneficiary of the call utilizing the Caller ID highlight becomes more acquainted with who precisely the guest is, independent of the guest being a decent/terrible individual or authentic/ill-conceived call.  

* Depending on how the call went or wound up, i.e., the discussion, business, messages passed on, the beneficiary would have the option to act in like manner and suitably dependent on the guest and his message's respectability, habits, morals, demonstrable skill, or telephone decorums, and so forth.  

* Also, the beneficiary gets the alternative to choose how to manage the call even before him/her picking the call, when he/she comes to know who the guest is through Caller ID include, the beneficiary gets security by either separating the call, sending or diverting the call, recording the call, not noting the call, or in any event, blocking or announcing the number in any case. Along these lines, the beneficiary's security is ensured from various perspectives.

ii. What aspect of privacy does Caller ID violate for the caller?

* Even however as it were, in fact it distinguishes, confirms, and validates the guest demonstrating he/she is who he/she professes to be. In any case, the guest ID highlight or innovation unveils numerous information and data about the guest, for example, his accurate phone number or PDA number, nation code, the specific phone or versatile transporter organize he/she is utilizing, and so on., as this data may make dangers the guest's security, (for example, character burglaries or just assailants caricaturing others utilizing this current guest's data), classification, it might cause accessibility issue for the guest as when the guest is besieged with ill-conceived calls, spam, and undesirable calls, there are chances their telephone numbers could and would be imparted to many advertising and selling organizations or industry without the guest's assent, there are chances somebody focusing on the guest may tap or wire his/her significant, basic business, social, expert, individual, or private calls for touchy data to assault them and abuse the bantered data. The guest certainly loses his/her secrecy, opportunity, directly for discourse, security, and wellbeing when passing on messages over the call when they know there could be somebody tapping or recording the call, or even the beneficiary may abuse the guest's character and his/her passed on data.  

* Hence, the guest doesn't get the opportunity from reconnaissance i.e., from being followed, followed, watched, and spying upon by trouble makers.  

* The guest would lose the control of their data on how it would be put away or utilized.  

* The guest probably won't get opportunity from interruptions.

(b).  What are some good reasons why a non-business, non-criminal caller might not want his or her number displayed?

* A non-business and a noncriminal guest would need to enjoy typical, common, and regular exercises; mingle and do his/her own day by day close to home, private, and public activities' assignments, occupations, occasions, social occasions, correspondences, individuals organizing, and so on., without making any whine about things, exposure stunts, without causing anyone to notice tail, screen, follow, question, or explore the guest superfluously except if the guest has enjoyed, asked, stated, discussed, or passed on any message that is unlawful, exploitative, wrongdoing, and culpable.  

* Such a guest would need total or most extreme namelessness, as to them, guest ID innovation just uncovers their own and private life exercises, correspondences, and so forth., to others to pass judgment on them, question them, and later cross examine and research them on their interchanges.  

* Such guests for the most part search for security in general.  

* Specifically, such guests need classification of their calls, discussions, messages, call logs, and so forth.  

* The beneficiary on occasion may get the guest's private unlisted number without the guest's assent or authorization.  

* The beneficiary may utilize the guest's telephone number and name to get a lot other data about him/her, which the beneficiary should, that would incorporate the guest's location (area) through an opposite catalog or just turning upward in any phone registry.  

* The beneficiary might not have any desire to talk, mingle, or work with the guest in view of the area (address), ethnicity (from the name), race, or district the guest is from.  

write a statement that decreases the variable shelflife by 4 if the variable outsidetemperature is greater than 90.

Answers

if(outsideTemperature > 90) shelfLife = shelfLife - 4; statement that reduces the variable shelflife by 4 if the variable outside temperature is higher than 90.

What determines temperature is the variable?

Due to its fractional value, temperature is a continuous variable. As an illustration, the current temperature is 30.5 degrees Celsius; this indicates that the variable is continuous rather than discrete.

What determines the outdoor temperature?

The high and low temperatures for each day are influenced by a variety of variables. The two most crucial factors are the amount of cloud cover and the direction of the wind. Warmer air from the south or cooler air from the north might be brought in by the direction of the wind.

To know more about variable shelflife visit :-

https://brainly.com/question/14844178

#SPJ4

Typically, in a star schema all ________ are given a simple, non-composite system-generated primary key, also called a surrogate key.

Answers

Typically, in a star schema all dimensions are given a simple, non-composite system-generated primary key, also called a surrogate key.  .

In a star schema, dimensions represent the descriptive attributes of a business process or entity. These dimensions are usually given surrogate keys .

which are artificial keys that are system-generated and used as unique identifiers for each dimension record. Surrogate keys provide a simple and efficient way to identify and relate dimension records in the star schema.

To know more about dimension visit:

https://brainly.com/question/33946851

#SPJ11

Which type of Wi-Fi device acts as the base station for wireless devices as well as providing a gateway to the external Internet

Answers

Answer:

A wireless router

Explanation:

A wireless router is a router and a wireless access point all in one

Hope this helps! :)

3 difference between single user operating system and multi user operating system​

Answers

Answer:

Explanation:

A Single User Operating System is designed for use by only one person at a time. This type of OS is typically used on desktop or laptop computers and not typically used on servers. Single User Operating Systems are generally more user-friendly and easier to use than Multi User Operating Systems.

A Multi-User Operating system allows multiple users to access the same computer system at the same time. Multi User Operating Systems have many uses but are particularly popular in business and educational settings where multiple people need to access a single computer system.

At a family reunion, your cousin takes a picture of both of you with her phone, orders a print of it, and mails it to you with a note apologizing for how weird it looks. You would use the word “bitmappy” instead of “weird” to describe the picture. Describe a situation that could have led to this problem. If you wanted to find information online that you could send to your cousin about how to avoid this problem, what are two or three keywords that you could use in your search?
Why is “less is more” such an important design principle, and why do so many people seem to want to violate this rule?

Answers

A bitmap is an image file format that can be used to create and store computer graphics. Weird means something strange or unusual.

What is the meaning of the phrase " less is more"?

Sometimes keeping things simple is preferable to making them complex or advanced. Simplicity is better than extensive adornment. He should not use a word such as 'weird' and  'bitmap' in the search.

The idiom is used to convey the idea that sometimes having less of something—a lesser amount of it—can be preferable to having more of it. That a straightforward strategy frequently outperforms a complex one.

Therefore, A bitmap is an image file format that can be used to create and store computer graphics. Weird means something strange or unusual.

To learn more about, less is more, refer to the link:

https://brainly.com/question/20556896

#SPJ1

hris has received an email that was entirely written using capitalization. He needs to paste this text into another document but also ensure that the capitalization is removed.

What should Chris do?

Answers

He should un caps lock it

is a virtue by which you need to secure information by limiting computer access to authorized personnel only.

Answers

Answer:

ummmmmmmmm

Explanation:

Confidentiality is a virtue which states that you need to secure information by limiting computer access to authorized personnel only.

Keeping confidential data is crucial especially if your business deals with very important information about a person and his security.

Trust is built between a company and a client. The client trusts the company to keep his information secure and confidential from outside parties. Once the confidentiality of the company is compromised, the business will suffer because clients will no longer trust the company to keep their data secure.

The data in column E shows the duration of each delivery. What type of data is this? Select all that apply.
Quantitative data
Qualitative data
Discrete data
Continuous data

Answers

Answer:

Explanation:

The type of data in column E, which represents the duration of each delivery, is quantitative data and continuous data.

Quantitative data refers to numerical information that represents quantities or measurements. In this case, the duration of each delivery is a numerical value that can be measured and compared.

Continuous data indicates that the values can take any real number within a specific range. Since the duration of deliveries can have decimal values and can theoretically take any value within a given range (e.g., 0.5 hours, 1.25 hours, etc.), it is considered continuous.

On the other hand, qualitative data refers to non-numerical information that describes qualities or attributes rather than quantities. Discrete data refers to numerical data that can only take specific, separate values, usually in whole numbers. In this case, neither qualitative data nor discrete data apply to the duration of deliveries.

Learn more about  Quantitative data and Continuous data here:

https://brainly.com/question/13191929

#SPJ11

Select the correct answer from each drop-down menu.
What should companies and industries practice to avoid the dangers from AI and robots?

Companies and industries should train (BLANK ONE)
and implement effective (BLANK TWO).

Blank one options:
A- HR resources
B- AI resources
C- Customers

Blank two options:
A- Testing programs
B- incentive programs
C- Marketing programs


I accidentally started the test before doing the lesson, I need some help. I will give brainliest for a correct answer.

Answers

To avoid the potential dangers associated with AI and robots, companies and industries should practice AI resources  and  AI- Testing programs

Blank one: B- AI resources

Companies and industries should invest in training their AI resources.

This involves providing comprehensive education and training programs for employees who work directly with AI and robotics technologies.

This training should encompass not only technical skills but also ethical considerations and best practices in AI development and deployment.

By ensuring that their AI resources are well-trained, companies can minimize the risks associated with AI and make informed decisions about its implementation.

Blank two: A- Testing programs

Implementing effective testing programs is crucial in mitigating the dangers of AI and robots.

These programs involve rigorous testing and validation of AI algorithms and robotic systems before they are deployed in real-world settings.

Thorough testing helps identify potential biases, errors, or unintended consequences that could pose risks to individuals or society at large.

Companies should establish robust testing protocols that include simulations, controlled environments, and real-world scenarios to evaluate the performance, safety, and reliability of AI and robotic systems.

For more questions on AI

https://brainly.com/question/20339012

#SPJ8

Ptolemy believed that Earth was at the center of the universe. Kepler believed that the sun was at the focus of Earth's elliptical orbit. Which of these statements best explains why Ptolemy and Kepler made different observations about the solar system?



The focus of their study was different.


or


They could not match the data with the observations.

Answers

Answer:

The correct option is;

They could not match the data with the observations

Explanation:

Ptolemy proposed the geocentric model based on the observation that the from there are equal number of above and below the horizons at any given time, which didn't match the data observed

Kepler believed the Sun was the focus of Earth's elliptical orbit due to disparities between data in Tycho Brahe's astronomical records and the geocentric model of the solar system.

Therefore, Ptolemy and Kepler made different observations about the solar system because they could not match the data with the observations.

Answer:

the second one.

Explanation:

They could not match the data with the observations.

you are using volatility to analyze the memory dump from a suspect computer. you are at the step of identifying unlinked dlls in a 64 bit windows computer. you will most likely use which volatility module?

Answers

To identify unlinked DLLs in a 64-bit Windows computer during memory dump analysis using Volatility, the most appropriate volatility module to use would be the "ldrmodules" module.

This module allows for the extraction and analysis of loaded modules, including DLLs, from memory. By examining the information provided by the "ldrmodules" module, analysts can identify any unlinked DLLs that may be present in the memory dump.

When analyzing a memory dump from a suspect computer, the "ldrmodules" module in Volatility proves useful for identifying unlinked DLLs in a 64-bit Windows environment. DLLs (Dynamic Link Libraries) are crucial components of the Windows operating system, and unlinked DLLs can indicate suspicious or malicious activity.

The "ldrmodules" module in Volatility allows analysts to extract information about loaded modules, including DLLs, from the memory dump. It provides details such as base addresses, file names, and module flags. By analyzing this information, analysts can determine if any DLLs are unlinked, meaning they are not associated with any running processes. Unlinked DLLs may indicate hidden or stealthy operations within the memory of the suspect computer.

Using the "ldrmodules" module, analysts can effectively identify unlinked DLLs and further investigate their purpose and potential implications. This module is specifically designed to assist in the analysis of loaded modules, making it the appropriate choice for identifying unlinked DLLs during memory dump analysis in a 64-bit Windows environment.

To learn more about memory dump: -brainly.com/question/23373913

#SPJ11

When creating a budget you musk track both your budgeted expenses and your blank expenses

Answers

Answer:

actual

Explanation:

A budgeted cost refers to expenses for transactions and operations that the company and the management have to make in the future based on forecasts and future goals.

Actual costs refer to costs incurred on actual operations and transactions during the period recently ended.

When creating a budget you must track both your budgeted expenses and your actual expenses.

write a public static method named meterstofeetandinches that will take a single argument of type float and will return a string. when called, and passed a distance value (in meters), this method must compute and return a string value with the equivalent distance in feet and inches.

Answers

#include<stdio.h>  

int main()  

{  

int meter = 40;  

double inch, feet;  

inch = 39.37 * meter;  

feet = 3.281 * meter;  

printf ("The value of 40 meter in Inches is: %.2f \n", inch);  

printf ("The value of 40 meter in feet is: %.2f", feet);  

return 0;  

}  

What is public static method ?

A static method in Java is a method that is an instance of a class rather than a member of it. Unlike methods defined in an instance, which may only be accessed by that particular object of a class, a method is accessible to every instance of a class. A static method is a component of a class specification rather than the objects it creates. A static method, as contrast to instance methods, is called without first constructing an object of the class and is referred to by the class name. In plainer language, these are methods that are available regardless of whether an object has been created yet and do not need an invocation object.

To know more about public static method , visit

https://brainly.com/question/26763726

#SPJ4

Isabela wants to edit a presentation for her science class. she is in the main view of the powerpoint application. how can she access her presentation? go to the backstage view, and click options. click the file tab, and click the open option. click the quick access toolbar, and click the open option. type in the name of the file in the search field, and click open.

Answers

The Isabela access her presentation for her science class by clicking the file tab, and clicking the open option.

What is power point presentation?

Power point presentation is a softwere which display the data with the help of collection of slides.

Isabela wants to edit a presentation for her science class. She is in the main view of the powerpoint application.

Form the main view to access her presentation, Isabela need to follow the following steps-

Click the file tab which is at the main menu.Now she need to click the open option, which appers under the file tab.

Thus, the Isabela access her presentation for her science class by clicking the file tab, and clicking the open option.

Learn more about the power point presentation here;

https://brainly.com/question/24653274

Answer: It’s B, Click the File tab, and click the open option

Explanation:

just got it right on edge

do you see any undesirable effects of humans communicating more and more via computer networks rather than in person or over the telephone.? what dont you like and why? what do you like about it?

Answers

As an AI language model, I do not have personal preferences or feelings, but I can provide some insights. There are certainly some undesirable effects of humans communicating more and more via computer networks.

One potential downside is that online communication lacks the nuance and nonverbal cues that we pick up in face-to-face interactions. This can lead to misunderstandings, misinterpretations, and miscommunication. Additionally, relying solely on computer networks can result in a lack of meaningful connection and a feeling of isolation or loneliness.
On the other hand, there are also some benefits to communicating via computer networks. It allows us to connect with people from all over the world in real time, which can foster greater understanding and empathy across cultures. It also makes it easier to maintain relationships with people who live far away or have busy schedules.
Overall, it's important to strike a balance between communicating online and communicating in person or over the phone. Both forms of communication have their own strengths and weaknesses, and it's up to individuals to decide what works best for them in different situations.

Learn more about computer networks here:

https://brainly.com/question/13399915

#SPJ11

Which jobs are most likely to be replaced by robots and what effect will this have

Answers

Answer:

Here we go. Generally the robots are designed in order to do the work which has very much risk and Humans find it too laborious or hard to do. The robots will be used for the army, or as laborers. In my country Nepal, there's a restaurant where robots are used as waiters. They take order from you and provide you the food. The robots can be used for various purposes but I don't think they will be appointed for the job of higher authority. The use of robots will have massive effect in human life. The use of robots and appointing them in various jobs will cause the problem of unemployment. The poor will be affected and their existence may get into problem. This is one effect but there can be many effects from the use of robots. Using robot in army can reduce human deaths but also people get unemployed. There is both advantage and disadvantage from their use.

Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.

Answers

Answer:

I am using normally using conditions it will suit for all programming language

Explanation:

if(minimum){

hours=10

}

does trend in computing important for organization management?explain​

Answers

Answer:

Yes

Explanation:

Trend analysis can improve your business by helping you identify areas with your organisation that are doing well, as well as areas that are not doing well. In this way it provides valuable evidence to help inform better decision making around your longer-term strategy as well as ways to futureproof your business.

Jackson has been working as a sales manager at a large company for 8 months and oversees about 100 sales representatives. For the most part, Jackson does a good job of motivating his employees and overall team sales have remained consistent. However, Jackson has a particularly dominating management style. He tends to micro-manage and tells even the most successful sales reps with 20+ years of experience how they should be doing their jobs. He has called out several sales reps in a meeting and put them on the spot to justify their sales techniques. Jackson does not respond very well to criticism from other people.
a.Thoroughly analyze why the conflict has occurred.

b.Identify and explain how this conflict can be viewed and resolved from the point of view of one of Jackson’s employees.

c.Identify and explain how this conflict can be viewed and resolved from the point of view of one of Jackson’s managers.

Answers

Answer:

a. The conflict in this situation has occurred because of Jackson's dominating management style. He tends to micro-manage and control every aspect of his employees' work. This type of management style can be demotivating and may lead to conflicts between the manager and employees. Additionally, Jackson's tendency to call out sales reps in meetings and put them on the spot can make them feel embarrassed and demoralized.

b. From the point of view of one of Jackson's employees, the conflict can be viewed as a result of Jackson's lack of trust in his employees. They may feel that Jackson does not have faith in their abilities and that he is overly critical of their work. To resolve this conflict, Jackson should start delegating more responsibilities to his employees and trust them to make decisions and work independently. He should also recognize and appreciate their successes, rather than just focusing on their mistakes.

c. From the point of view of one of Jackson's managers, the conflict can be viewed as a result of his management style. Jackson's micro-managing approach may lead to inefficiencies and delays in decision-making, as employees may feel that they cannot make decisions without his approval. To resolve this conflict, Jackson's managers should provide him with feedback on his management style and encourage him to delegate more responsibilities to his employees. They should also provide him with training on how to manage employees effectively and how to give feedback in a constructive and respectful manner.

Explanation:

__________ help to prevent systemic bacterial dissemination by producing chromatin structures loaded with antimicrobial substances. Select one: a. Inflammasomes b. Neutrophil extracellular traps c. RIG-1-like helicases d. Granulomas e. Plasmacytoid dendritic cells

Answers

b. Neutrophil extracellular traps. Neutrophil extracellular traps (NETs) help to prevent systemic bacterial dissemination by producing chromatin structures loaded with antimicrobial substances.

These structures are released by neutrophils, a type of white blood cell, in response to bacterial infections. NETs consist of DNA strands decorated with histones and antimicrobial proteins that can trap and kill bacteria, preventing their spread to other parts of the body. The release of NETs is an important innate immune response mechanism to contain bacterial infections locally and minimize their systemic dissemination.

Neutrophil extracellular traps (NETs) are an important defense mechanism of the innate immune system. When neutrophils encounter bacteria, they can undergo a process called NETosis, where they release chromatin structures called NETs. NETs are composed of DNA strands from the neutrophil's nucleus, which are decorated with histones and antimicrobial proteins. These structures form a sticky mesh that can trap bacteria and prevent their spread.

The antimicrobial substances present in NETs, such as defensins and cathelicidins, have potent bactericidal properties and can directly kill the trapped bacteria. Additionally, the DNA strands themselves can have antimicrobial effects by binding to and neutralizing bacterial toxins.

Learn more about DNA strands here:

https://brainly.com/question/29668302

#SPJ11

What is that tool that makes liquid metal? Ik I might sound dumb but I'm rlly curious
(the thing on the right)​

What is that tool that makes liquid metal? Ik I might sound dumb but I'm rlly curious(the thing on the

Answers

Answer:

it’s called a solder. It’s used to permanently fuse two metals together. And they’re used in many different areas like construction, technology, etc.

That pic that you have i think is a computer chip or something similar.

So a solder is the tool that is used to make metal into liquid.

hope this helps and pls mark me brainliest :)

your company is experiencing a growth spurt and is ready to invest in a more sophisticated disaster recovery plan. currently the backup plan consists of a few spare computers in a storage closet, and data on the servers is duplicated weekly to an off-site backup service. the company owners have committed to acquiring additional servers to duplicate critical servers in their current network, and they want the servers to be configured identically to the servers now in use. the new servers will be stored at an off-site data center and updated every time the on-site servers are updated. what type of disaster recovery site is your company creating?

Answers

The type of disaster recovery site is warm site.

What is disaster recovery site?

Disaster recovery site is a secondary site of server to storage the data same as the data in main server.

Disaster recovery site is created for the purpose if the data in main server is loss or can't be access, the data in secondary storage can replace them.

Three type of disaster recovery site is,

Cold site is disaster recovery site but it not provide hardware element.Warm site is disaster recovery site with hardware element but the data not fully transferred to new hardware element.Hot site is disaster recovery site with hardware element and the data fully transferred to new hardware element.

Since, the question tell us the backup plan is to duplicated data in weekly period then is warm site.

Learn more about disaster recovery site here:

brainly.com/question/14086328

#SPJ4

Other Questions
The nurse hears some adventitious heart sounds when auscultating the anterior chest. what could the nurse be hearing? Edwin Hubble found out that what appeared to be large clouds in space were not gas, but _____.A. galaxiesB. large starsC. cometsD. the Oort cloud 1. Is it more important to measure the success of your success or the success of the project? Why or why not (5pts)2. Discuss the value and concerns of the financial value of a project and how this aspect might be considered? (5pts)3. What are outcome statements, and what are the three key elements of defining a quality measure of success? (5pts)4. Why is it that sometimes the business does not realize the benefits of a project? (5pts) Jenny is buying gifts for her family. So far she spent $25.90, and she has two more gifts to buy. She started with the total of $60 to spend on all of her gifts Calculate B for the figure below7 mi4 miO 6.28 miO 28 mi25.12 miO 12.56 miPLEASEEEE HELPPPP Find the missing angles for every point here Cells of which bacterial genotype would be able to utilize lactose as an energy source?A)I^+O^+Z^-Y^+B)I^+O^+Z^+Y- /F (ISO^+Z^-Y^+)C)I^+OCZ^+Y- /F (I^+O^+Z^-Y^+)D)ISO^+Z^+Y^+Option C is right but I don't know why, if it can be explained to me. A structure made up of a hemisphere attached to a cylinder is built. The hemisphere has a radius of 50m, while the cylinder has a height of 160m. The builder decides to paint the curved surface of the hemisphere in order to improve the appearance of the structure. Given that he will be charged $5.20/m for painting services, will he exceed his budget of $280 000? Use a three-column chartto list three important changes in city design,communication, and transportation.CityDesignCommunication a shipment contains 10 televisions, of which two are defective. a sample of three televisions is selected at random. what is the probability that the sample contains no defective televisions? The actions an organization should take while an incident is in progress are defined in a document referred to as the ____ plan. 1. Find the net change in the value of the function between the given inputs.f(x) = 6x 5; from 1 to 62. Find the net change in the value of the function between the given inputs.g(t) = 1 t2; from 4 to 9 Columbus Corp. has annual sales of $80,000,000; its average inventory is $20,000,000; and its average accounts receivable is $16,000,000. The firm buys all raw materials on terms of net 35 days payable deferral with $180,000 cost of the good sold per day. The firm is searching for ways to shorten the cash conversion cycle. If inventory conversion can be lowered to 92 days and average collection period can be shortened to 68 days while payable deferral, cost of the good sold, and annual sales remain constant, how much is the increase in firms free cash flow? a follow-up question a troubleshooter asks to get additional information about a problem situation is called a(n) . _________is often referred to as the "energy currency of the cell." Please do not spell the entire name of the molecule, use its acronym. a duck flew at 18 miles per hour for 3 hours than at 15 miles per hour for 2 ours how far did the duck fly in all Work out the value of the missing angle x. Jack Ltd is a market leader in the manufacture of apple juice. They operate a reorder level system of inventory management, and the following information is available for green apples:Average usage 800 per dayMinimum usage 540 per dayMaximum usage 1260 per dayLead time for replenishment Reorder quantity 16-20 per dayReorder quantity 19,500 applesRequired:a) Calculate the reorder levelb) Calculate the maximum level of inventoryc) Calculate the minimum (buffer) inventory level Which of the following is the independent variable in this experiment? (Velocity)A. The distance the ball travels B. The mass of the ball C.The time it takes the ball to travel D.The average velocity of the ball please help this will get my math teacher off my case which im in need of