Pretend you work with a lot of different documents in an internship with a software development company. What kinds of actions can you take to keep your files, folder names, folder structure, and yourself organized? Be thorough in your answer.

Answers

Answer 1

In the case above, I will categories my files and also my folders using as names and structures. The file name will help me to know identify the file in  fast time.

What is file structure?

A file structure is known to be the ways or combination of depiction for data in files.

Hence, In the case above, I will categories my files and also my folders using as names and structures. The file name will help me to know identify the file in  fast time.

Learn more about files from

https://brainly.com/question/1178560

#SPJ1


Related Questions

The unit MIPS is used to measure the speed of a___.
A) Disk drive
B) Tape drive
C) Printer
D) Processor

Answers

Answer:

D) Processor

Explanation:

MIPS refers millions instruction per sec and is used to measure the speed of Processor.

what is spy x family?​

Answers

Is a Japanese magna series. Basically it’s about a spy having to build a family to execute a mission not knowing the daughter is a telepath and the mother he agrees to marry is a skilled assassin





Let me know if this helped

Answer:

Spy × Family, is a Japanese manga series written and illustrated by Tatsuya Endo. The story follows a spy who has to "build a family" to execute a mission, not realizing that the girl he adopts as his daughter is a telepath, and the woman he agrees to be in a marriage with is a skilled assassin.

An anime television series adaptation produced by Wit Studio and CloverWorks premiered on TV Tokyo and its affiliate stations in April 2022, and was licensed by Muse Communication in Asia and Crunchyroll worldwide. The second half aired from October to December 2022. A second season is set to premiere in October 2023 and an anime film, titled Spy × Family Code: White, will release on December 22, 2023.

By March 2023, Spy × Family had over 30 million copies in circulation, making it one of the best-selling manga series. The series has been praised for its storytelling, comedy, and artwork.

I personally, rate it a solid ⭐⭐⭐⭐⭐rating because it's GREAT!

Please Vote For Brainliest!

User enters menu items by name or an assigned item number.

Answers

Using the knowledge in computational language in python it is possible to write a code that uses enters menu items by name or an assigned item number.

Writting the code in python:

#Here, file1 is created as object for menu.txt and file2 as object for bill.txt

#It is done using the open() function.

#No module is required to be imported for this function.

#Here, r represents that this file will be used to read data

#and w represents "write"

file1 = open("menu.txt","r")

file2 = open("bill.txt","w")

#this is the welcome statement

print ("Welcome to the Delicious Restaurent:")

print("""Enter "I'm done" or "Exit" or "No" to stop the orders.\n""")

print("The menu is as follows:\nPlease enter the item no. to order.\n")

#readlines(): reads all the lines and return them as each line a string element in a list.

a=file1.readlines()

#we will iterate though each element and print it to the customer

for i in range(len(a)):

   print("{}) {}".format(i+1,a[i]))

   

#variable to store the total bill amount

total=0

#initialize the order variable with 1

order=1

#taking the input

order=int(input("\nEnter order: "))

#This loop will continue untill the customer will enter "exit" or "I'm done"

while(order not in ["i'm done", "I'm done" ,"Exit", "exit","No","no"]):

   

   #if customer enters "i'm done" or "exit", he will break out of loop

   if order in ["i'm done", "I'm done" ,"Exit", "exit","no","No"]:

       break

   

   #if customer enters any number between 1 to 12, that item will be added to his bill

   if order in range(1,13):

       

       print("Your order number {} is added.\n".format(order))

       

       #we will get that item by its order number

       item=a[order-1]

       

       #Here i am using string slicing to get the price(it is after the $ sign)

       #We will get the index of $ sign and use the number after that

       # for eg. "Egg burger $34.12"

       # indexi= 11 (Here $ is at 11th position)

       indexi=item.index('$')

       

       #prici will have the price

       prici=(item[indexi+1:])

       

       #add the price of that item to total value

       total+=float(prici)

       

       #write the item and its price to the output file

       file2.write(item)

       

   #For any other inputs, it will print ("Wrong choice")

   else:

       print("Wrong choice")

       

   #It will ask the user, if he/she needs more orders

   print("Do you want to add more")

   order=(input("Enter order: "))

   

   #it will convert the user input into an integer, if possible

   #because he may enter "exit" also.

   try:

       order=int(order)

   except:

       continue

#This is the case outside of the while loop.

#Here, Total amount is printed in the bill.

file2.write("----------------------\n")

file2.write("Your Total amount is $"+str(total))

#We need to close those files as well

#close() function closes the file and frees the memory space acquired by that file.

file1.close()

file2.close()

See more about python at brainly.com/question/18502436

#SPJ1

One of the best places to get questions answered concerning company policy is from
✔ human resources

New employees usually receive handbooks and learn about company policies
✔ during new employee orientation


A positive work ethic means people want to do their best job without considering
✔ the amount of their salary

im asking a question cuz i couldnt find the answer on brainly. for who ever needs it

Answers

Answer:

I think you should look at what your question is before you ask it because the answers are already in you question lol.

Explanation:

One of the finest resources for getting responses to inquiries about corporate policy is from human resources.

Typically, handbooks are given to new hires, in which they can learn about corporate rules during new employee orientation.

People with strong work ethics strive to do their finest work without hesitation the amount of their salary.

What are human resources?

Human resources professionals hire, filter, and interview job candidates as well as assign newly hired employees to positions. They could also be in charge of training, employee relations, and salary and benefits. Labor relations experts administer and interpret labor contracts.

Therefore, the correct options are 1-human resources, 2-during new employee orientation, and 3-the amount of their salary.

To learn more about human resources, refer to the link:

https://brainly.com/question/13190588

#SPJ2

Draw the flow chart to find roots of Quadratic equation ax+bx+c=0

Answers

Using the knowledge in computational language in C++ it is possible to write a code that draw the flow chart to find roots of Quadratic equation.

Writting the code in C++:

#include <math.h>

#include <stdio.h>

int main() {

double a, b, c, discriminant, root1, root2, realPart, imagPart;

printf("Enter coefficients a, b and c: ");

scanf("%lf %lf %lf", &a, &b, &c);

discriminant = b * b - 4 * a * c;

// condition for real and different roots

if (discriminant > 0) {

root1 = (-b + sqrt(discriminant)) / (2 * a);

root2 = (-b - sqrt(discriminant)) / (2 * a);

printf("root1 = %.2lf and root2 = %.2lf", root1, root2);

}

// condition for real and equal roots

else if (discriminant == 0) {

root1 = root2 = -b / (2 * a);

printf("root1 = root2 = %.2lf;", root1);

}

// if roots are not real

else {

realPart = -b / (2 * a);

imagPart = sqrt(-discriminant) / (2 * a);

printf("root1 = %.2lf+%.2lfi and root2 = %.2f-%.2fi", realPart, imagPart, realPart, imagPart);

}

return 0;

}

See more about C++ code at brainly.com/question/19705654

#SPJ1

You are writing some work instructions to assist technicians with deploying new user desktops via cloning. What type of installation and boot method is this process most likely to use, and what are the boot requirements?

Answers

The use of  ADKs and OPKs resources and some of the requirement are:

Begin  the setup from boot media.Clean the hard disk clean and make new volume(s).Install an operating system image.Who are System builder?

A system builders is one who often deploy a program to a line of devices, and it is one who complete customizations such as apps, drivers, languages, and others.

Note that The use of  ADKs and OPKs resources and some of the requirement are:

Begin  the setup from boot media.Clean the hard disk clean and make new volume(s).Install an operating system image.

Learn more about boot from

https://brainly.com/question/1827627

#SPJ1

Pretend you work with a lot of different documents in an internship with a software development company. What kinds of actions can you take to keep your files, folder names, folder structure, and yourself organized? Be thorough in your answer

Answers

The kinds of actions that i will take to keep your files, folder names, folder structure, and yourself organized are:

I will make use of the Default Installation Folders.I will create one Place to place all Documents. I will make Folders using  Logical Hierarchy. I will also Nest Folders inside Folders.I will use the File Naming Conventions, etc.

How do I keep my folders organized?

For any kind of file arrangement it entails the act of keeping files in an organized manner that one can easily trace back if one is in need of that file.

There it is good to Sort your files every time such as once a week and as such:

The kinds of actions that i will take to keep your files, folder names, folder structure, and yourself organized are:

I will make use of the Default Installation Folders.I will create one Place to place all Documents. I will make Folders using  Logical Hierarchy. I will also Nest Folders inside Folders.I will use the File Naming Conventions, etc.

Learn more about files from

https://brainly.com/question/1012126

#SPJ1

Your boss sends you an e-mail with some criticism of a report you submitted. Which of the following is the best way to respond?

THAT REPORT WAS PERFECT!
I will work on incorporating your suggestions before our deadline.
Do not respond at all. She will come find you if she wants to know if you read the e-mail.


The answer is B for whoever needs it on brainly.

Answers

Answer:

the answer is b for whoever needs the help

Using any loop construct, write a java code to print the following:
1010101
10101
101
1​

Answers

Answer:

class Main {

 public static void main(String[] args) {

   for (int n = 0x55; n > 0; n /= 4) {

     System.out.println(Integer.toBinaryString(n));

   }

 }

}

Explanation:

Because the pattern is very regular, you can start with 0x55 (which is 0101 0101) and shift right 2 places everytime. Shift right 2 places is the same as dividing by 4.

what is cpu?
please give me right answer ​

Answers

Answer:

Explanation:

processor such as intel/amd processors

How is a collapsed qubit similar to a bit?

Answers

The collapsed qubit similar to a bit as it has a single value of either 0 or 1.

What is the difference between a qubit and a bit?

Note that a classical computer is one that has a memory composed of bits that is, each bit is known to hold a one or a zero.

Note also that a qubits (quantum bits) is one that can hold a one, a zero or can also superposition the both.

Hence, The collapsed qubit similar to a bit as it has a single value of either 0 or 1.

See full question below

How is a collapsed qubit similar to a bit? It can stay in a state of superposition. It is still dependent on its counterparts. It has a single value of either 0 or 1. It has numerous potential paths to follow.

Learn more about qubit from

https://brainly.com/question/24196479

#SPJ1

Write a function expand_string(a, pre, suf, num) that takes the parameters a,pre,sub and num appends the prefix pre, and suffux suf to the string a num times and returns the new extended string. Input: a=test, pre=pr, suf=su, num=2. Output: prprtestsusu. In Pyrhon, please. ​

Answers

Answer:99

Explanation:88

Differentiate between CD-R and CD RW

Answers

After writing to a CD-R, it becomes a CD-ROM. A Compact Disc Re-Writable (CD-RW) is an erasable disc that can be reused. The data on a CD-RW disc can be erased and recorded over numerous times. NOTE: CD-RW media may not be readable outside of the drive it was created in.

Explanation:

hope it will help you

: Chronic state of ____________________, unrealistic & excessive worry about two or more life ____________________

Answers

The Chronic state of  generalized anxiety disorder is an unrealistic and excessive worry about two or more life that  last for at least six months.

What disorder is chronic worry?

Generalized Anxiety Disorder, GAD, is known to be a form of an anxiety disorder that is known by:

chronic anxiety exaggerated worry tension and others.

Note that it is also called an excessive or unrealistic worry in regards to life circumstances that is said to occur for about at least six months.

Hence, The Chronic state of  generalized anxiety disorder is an unrealistic and excessive worry about two or more life that  last for at least six months.

Learn more about Generalized Anxiety Disorder from

https://brainly.com/question/22676443

#SPJ1

* Describe the five components of a
computer

Answers

Answer:

Computer systems consist of three components as shown in below image: Central Processing Unit, Input devices and Output devices. Input devices provide data input to processor, which processes data and generates useful information that's displayed to the user through output devices. This is stored in computer's memory.

Answer:

I don't know mad ask to your mother or father mad

How would you use SQL to change a table's structure? What general types of changes are possible? Which commands are used to implement these changes?

Answers

The SQL is used to change a table's structure by:

The use of the SQL ALTER TABLE command.

How is it done?

The SQL ALTER TABLE command is known to  be that which is often used to alter the structure of an existing table.

It is known to help one to be able to add or delete columns, make or destroy indexes, alter the kinds of existing columns, rename columns or the table itself.

Note that  It can also be used to alter the comment for any kind of table and type of the table therein.

Learn more about SQL from

https://brainly.com/question/25694408

#SPJ1

The formula in the cell above would yield the result:

Answers

The result that would be yielded by the formula in the cell given would be 9.

What result would the COUNTA formula yield?

COUNTA is a formula that is used to count the number of cells in a given range of cells that have any values in them.

In the range (A1:I1), the number of cells with values would be 9 because cells A1 to I1 all have values in them.

Find out more on the COUNTA function at https://brainly.com/question/24211266.

#SPJ1

Assume the variable myWord references a string. Write a statement that uses a slicing
expression and displays the last 5 characters in the string.
What happens if the myWord is less than 5 characters long?

Please code in python please.

Answers

Answer:

"myWord[-5:]"

Explanation:

So whenever you slice a string, the syntax in python is expressed as:

string[a:b:c]

where a=start index (this is included in the sliced string)

b = end index (this is excluded from the sliced string)

c = increment

If any of these are included, they are set to default values, where a=0, b=len(string), and c=1.

The increment isn't necessary here, and it's just so you know the syntax a bit more

Anyways, I'm assuming when the question asks to display "the last 5 characters in the string" it means in order? e.g "abcdefghijk" -> "ghijk" and not "abcdefghijk" -> "kjihg"

The last piece of information to know is what a negative index represents.

For example if I have the piece of code

"

string = "hello world"

print(string[-1])

"

This will output "d", and the negative 1 represents the last letter. If you did -2, it would output the 2nd to last letter and so on.

So to print the last 5 characters, we simply use the -5 as the starting index.  

"

string = "hello world"

print(string[-5:])

"

This will print "world" or in other words, the last 5 letters. The reason for this is because the -5 in the first spot means the starting index is the 5th to last letter, and when you have the : after the -5, this is the way of telling python you're slicing the string, and not indexing 1 character. You don't need to include another value after that, because it will default to the last index of the string, or more specifically the last index + 1, since the last index is still included.

So the last thing to know, is that if the string isn't greater than 5 characters, it just prints the entire string, and no errors are raised. You can test this out your self as well. So whenever you have a string that's less than 5 characters the entire string is outputted.

Which of the following is an example of how cookies are used? To create a stronger password To customize advertisements based on your history To open a program on your computer To scan your hard drive

Answers

The one among the options that is an example of how cookies are used to customize advertisements based on your history.

What do cookies do?

A cookie is known to be a kind of a small text file that is said to be often saved on your computer if a person do visit any kind of websites.

Note also that  a cookie is often used to get one to often remember settings that they have their last visit to any website.

For example Amazon is known to often cookies to help to know if or when a person revisit the site.

Hence, The one among the options that is an example of how cookies are used to customize advertisements based on your history.

Learn more about cookies from

https://brainly.com/question/14102192

#SPJ1

Answer:

To customize advertisements based on your history

Explanation:

From coding with experience i know cookies are for history browsing

Explain an example of a blacklisting program and how it works

Answers

A blacklist might consist, for example, of a list of names developed by a company that refuses to hire individuals who have been identified as union organizers; a country that seeks to boycott trade with other countries for political reasons; a LABOR UNION that identifies firms with which it will not work

I'm doing a VHDL program in Vivado, using a zyboz7 20, which would have 2 teams, each of them with different buttons and led lights. The idea is to use one button to obtain when a team scores a goal, so it will be displayed in the 7 segment-display (for example, if the button is pressed once, the display will show a one, and so on). When any of the team gets to 3, the led light given to that team will turn on.

Right now, I just have one team in the program and the constraints. Also, I have trouble understanding the debouncing of the button, I don't know if I'm using the wrong algorithm to attack the debounce issue, but it's as if the clock was delayed or it's not taking some of the input, I have been looking to a lot of tutorials but I can't find a way in which the programs can work without any issue. I will show my code here and the constraint, I will also explain the code so it will be easier to modify it if anyone can help me with the debounce issue.

Program's code:

library IEEE;
use IEEE.STD_LOGIC_1164.ALL;
use IEEE.STD_LOGIC_UNSIGNED.ALL;
use IEEE.NUMERIC_STD.ALL;

entity sevenSementDis is
Port (
C : out STD_LOGIC;
won1: out STD_LOGIC;
team1, clk,reset: in STD_LOGIC;
SevenSD: out STD_LOGIC_VECTOR (6 downto 0));

end sevenSementDis;

architecture Behavioral of sevenSementDis is

type statetype is (Init,Gol,AnotherGol,victory);
signal state, nextstate: statetype;

signal clk_bit : INTEGER := 4;
signal clk_bit2 : INTEGER := 4;
signal count : STD_LOGIC_VECTOR (4 downto 0) := "00000";
signal clk_div : STD_LOGIC_VECTOR (4 downto 0) := "00000";
signal count_reset : STD_LOGIC_VECTOR (4 downto 0) := "00000";
signal clk_reset : STD_LOGIC_VECTOR (4 downto 0) := "00000";

begin
C<='0';

process (clk)
begin
if (clk='1' and team1='1') then
clk_div <= clk_div + '1';
end if;
end process;

process (clk_div)
begin
if (clk='1' and clk_div(clk_bit) = '1') then
count <= count + '1';
end if;
end process;

process(clk)
--variable Count : natural range 0 to 5 := 0;
begin

if rising_edge(clk) then

case(nextstate) is

when Init =>
SevenSD<="0111111";
won1<='0';
if count="00010" then
nextstate<=Gol;
else
nextstate<=Init;
end if;

when Gol =>
SevenSD<= "0000110";

if count="00011" then
nextstate<=AnotherGol;
else
nextstate<=Gol;
end if;

when AnotherGol =>
SevenSD<= "1001011";
if count="00100" then
nextstate<=victory;
else
nextstate<=AnotherGol;
end if;

when victory =>
SevenSD<= "1001111";
won1<= '1';


end case;
end if;
end process;

end Behavioral;

Explanation:

The ports: Won1 is the led light assigned to team 1. team1 is the button that I want to use when team 1 scores. The reset is also a button but I haven't been implemented. SevenSD is the 7-segment display. Clk is the clock and C is another led light that hasn't been implemented.

There are 4 states, Init(where the code starts), Gol (the team scores the first goal, which would also change the display), AnotherGol(team scores again and the display changes), and Victory (the display changes one last time and led light turns on). There are also state (which would take the actual state) and nextstate(which will tell the next state).

count is an integer that will be added when the button is 1 and the clk_div is also 1, it's the one that determines when to move to the next state. clk_bit is just the bits of the clock. clk_div is diving the clock to try to attack the debouncing issue. clk_bit2, count_reset,clk_reset are not implemented, they were created when trying to add the reset button, but when I erase them, the code just stops working at all.

the rest are some process to fight the debounce and the last one is the actual code, which goes around the different states until the victory state.

Answers

Answer:

como lo echo es echo si no tengo un pájaro es

Explanation:

un pájaro azul

Olivia is an amputee who wears a prosthetic right hand. Which technology would most help her operate a computer?

Answers

In the case of Olivia as an amputee who wears a prosthetic right hand. the technology that would most help her operate a computer is 'Nerve interface' technology.

What technology is needed for amputees?

'Nerve interface' technology is known to be used by amputees and it is said to be be thought to help in moving bionic limb.

The New technology that is said to often allows users to have greater control and precision if they are said to be using prosthetic hands is known to be 'Nerve interface' technology.

Hence, In the case of Olivia as an amputee who wears a prosthetic right hand. the technology that would most help her operate a computer is 'Nerve interface' technology.

Learn more about prosthetic from

https://brainly.com/question/973195

#SPJ1

You receive a request for a report on your office’s productivity. How should you respond to that e-mail?

A. Wait until you have completed the report to respond, even if it takes months.

B. Let the sender know that because you cannot write the report in twenty-four hours, you will not be able to help them at all.

C. Tell the sender that you have received their e-mail and will work on the report.

The answer is the thrid one C.

Answers

In the case above, the ways that one need to respond to that e-mail is that:

Tell the sender that you have received their e-mail and will work on the report.

Check more about email below.

What is the email about?

A response email is known to be a kind of an email that is made reply to another email.

Note that In business, this is said to be a type of email that a person will have to write in regards to  inquiry response email, declining an invitation and others.

Hence, In the case above, the ways that one need to respond to that e-mail is that

Tell the sender that you have received their e-mail and will work on the report.

Learn more about  e-mail from

https://brainly.com/question/24688558

#SPJ1

What is the purpose of secondary
memory?

Answers

Answer:

secondary memory is usually used as mass storage.

Each of the flowchart segments in Figure 3-24 is unstructured. Redraw each segment so that it does the same processes under the same conditions, but is structured.

Answers

The segments of the flowcharts have been recreated such that  it does the same processes under the same conditions, but is structured. Their respective pseudo codes have also been created. See the attached pdf.

What is a pseudo code?

A pseudo code is a notation used in program design that looks like a simplified computer language.

Why is it important for flow chart to be structured?

This preference derives from the fact that such flowcharts are easier to understand and produce less mistakes in human perception.

The organized flowchart primarily aids the mission in the development of new algorithms by encapsulating a variety of data points within an interconnected depiction.

Learn more about flowcharts at;
https://brainly.com/question/6532130
#SPJ1

What is the value of six sigma ? How dose it relate to agile management

Answers

For an agile team, Six Sigma would provide them with a structured approach for empirical problem solving.

Which of the following tasks are suitable for creating an algorithm? Choose all that apply

Answers

A tasks are suitable for creating an algorithm are:

giving directions to a location.solving a math problem.tracking money in a bank account.tracking the number of items in inventory.

What is algorithm?

An algorithm is known to be a form of a procedure that is often employed in the act of solving a problem or carrying out a computation.

Note that in the case above, A tasks are suitable for creating an algorithm are:

giving directions to a location.solving a math problem.tracking money in a bank account.tracking the number of items in inventory.

See options below

giving directions to a location

saving time writing a computer program

solving a math problem

tracking money in a bank account

tracking the number of items in inventory

Learn more about algorithm from

https://brainly.com/question/24953880

#SPJ1

What is the significance of the TCP three-way handshake for applications that utilize TCP as transport protocol?

Answers

The  significance is that It helps to make sure that the 2 sides know that they are in sic or ready to transfer data.

What is the benefit about?

TCP's three-way handshake is said to have two vital functions.

It helps to make sure that the 2 sides know that they are in sic or ready to transfer data It gives room for both sides to come to agreement in regards to the initial sequence numbers, that was or is to be sent and acknowledged during the handshake.

Hence, The  significance is that It helps to make sure that the 2 sides know that they are in sic or ready to transfer data.

Learn more about TCP from

https://brainly.com/question/17387945

#SPJ1

84 104 101 32 97 110 115 119 101 114 32 105 115 32 53 48 33 There's a way to make this meaningful; find it!

Answers

The question is about identifying the various ways of manipulating numbers. One of such is using following pair:

Input Format: Decimal ASCIITransformed Output String.

Using the above process, the result given is 50.

What is ASCII?

ASCII is the acronym for American Standard Code for Information Interchange.

Another way of approaching the above problem is by bucketizing.

The act of describing a problem, discovering the origin of the problem, finding, prioritizing, and selecting alternatives for a solution, and executing a solution is known as problem solving.

Similarly, bucketizing is a data organizing technique that decomposes the space from which geographic data is gathered into areas.

Some criteria for selecting area borders include the amount of things contained inside them or their physical arrangement (e.g. minimizing overlap or coverage).

A bucket data structure utilizes key values as bucket indices and stores things with the same key value in the appropriate bucket.

As a result, the job necessary to address the problem is completed.

Learn more bout Decimal ASCII:
https://brainly.com/question/26307436
#SPJ1

Enter the database function in cell i6 that determines the average salary of all full-time employees with at least one dependant.

Answers

Based on the given spreadsheet, the database function that needs to be entered into cell I6 to find the average salary of all full-time employees is =AVERAGEIFS(D5:D34,B5:B34,"FT",C5:C34,">=1")

What does the AverageIfs formula find?

You can use the AverageIfs formula to find the average of a specific group of numbers from a spreadsheet based on the shared categories that these numbers fall under.

After typing in the =AverageIfs function, you then input the range from which the category will be specified. In this case that is D5:D34. The next entry would be the range the category is picked from which is  B5:B34. The function will be FT for Full time workers.

Then use C5:C34 to find out the number of dependents that are equal to or greater than 1.

The digit returned is the average salary of all full-time employees.

Find out more on the AverageIf function at https://brainly.com/question/13661607

#SPJ1

Other Questions
He collection of information from respondents via their answers to questions is known as ________. A client has been diagnosed with acute rhinosinusitis caused by a bacterial organism. What antibiotic of choice for treatment of this disorder does the nurse anticipate educating the client about what is the summary of the poem After Dark written by Sheila Simmons? Solve the quadratic equation 2x2-1 = 7 x. write your answer correct to two decimal places could anyone help me with this? After incubation, does the antibiotic extend into the agar beyond the zone of inhibition? how does your answer tie in with minimum inhibitory concentration (mic)? Evaluate the sum (for math nerds)[tex]i {}^{0!} + i {}^{1!} + i {}^{2!} + i {}^{3!} + ... + i {}^{100!} [/tex]Note that :[tex]i = \sqrt[]{ - 1} [/tex] This is a human hereditary disease that is caused by a dominant allele but does not show up in affected individuals until they are in middle age:________ If the graph of f(x) = 4 ^ x is shifted 6 units up, then what would be the equation of the new graph? The charge nurse is rounding on clients in restraints. Which of the following situations would require immediate intervention by the nurse Richard III was positively identified by both the morphology of the skeleton and comparison of DNA sampled from a living relative. Marty wants to watch two fireworks shows at the sametime. The best view is from a point that is between andequidistant from each of them. If the shows are locatedat the park and the highschool shown, at which pointwould Marty get the best view? Which disease is related to a malfunctioning pancreas brainly What is an example of economic interdependence during World War II?A.) American companies suspending trade with Germany and its alliesB.) The United States creating manufacturing jobs for war materials C.) The United States moving the Pacific Fleet from California to Pearl HarborD.) American companies continuing to trade with countries fighting with Germany When individuals engage in a behavior for some external payoff or to avoid a punishment, they:____. When new small business owners define their competitors, the first step is to define a _________ that reveals the potential new customers. POSSIBLE OUTCOMES!!!A bag contains 1 white (W), 3 blue (B1, B2, B3), and 2 red (R1, R2) marbles.a. Find the probability of tossing a head and drawing a red marble. Explain your reasoning.b. Find the probability of drawing two blue marbles if the first marble is not replaced. Explain your reasoning. Money demand is given by md/p = 1000 .2y - 1000i. given that p = 200, y = 2000, and i = .10, real money demand is equal to? as part of a competition, diego must spin around in a circle 6 times and then run to a tree. the time he spends on each spin is represented by S AND THE TIME HE SPEND RUNNING is R. He gets to the tree 21 seconds after he starts spinning. If it takes diego 1.2 seconds to spin around each time, how many seconds did he spend running There is a need for a more sophisticated means of managing and tracking the complex movement of goods from place to place throughout a supply chain. Which of the following is one example of a mechanism used to manage and track inventory