Define a function named des Vector that takes a vector of integers as a parameter. Function desVector () modifies the vector parameter by sorting the elements in descending order (highest to lowest). Then write a main program that reads a list of integers from input, stores the integers in a vector, calls des Vector (), and outputs the sorted vector. The first input integer indicates how many numbers are in the list. Ex: If the input is: 5 10 4 39 12 2 the output is: 39,12,10,4,2, Your program must define and call the following function: void desVector(vector& myVec)

Answers

Answer 1

The function `desVector()` sorts a vector of integers in descending order, while the main program reads, sorts, and outputs the vector.

Function `desVector()` takes a vector of integers as a parameter and modifies it by sorting the elements in descending order. The main program reads a list of integers, stores them in a vector, calls `desVector()`, and outputs the sorted vector. The function `desVector()` uses the `sort()` function from the `<algorithm>` library to sort the vector in descending order.

The main program prompts for the number of input integers, reads them using a loop, and appends them to the vector. Then it calls `desVector()` with the vector as an argument and prints the sorted elements using a loop. The program ensures that the `desVector()` function and the main program are defined and called correctly to achieve the desired output.

To learn more about program  click here

brainly.com/question/30613605

#SPJ11


Related Questions

with the advent of technology one can experience special features such as 3D theater experiences true or false

Answers

The answer would be true

Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?.

Answers

Answer:

A network license

Explanation:

search engine marketing search engines are online tools that help users find the information they need.

Answers

A digital marketing strategy called search engine marketing (SEM) is used to make a website more visible in search engine results pages (SERPs).

What is SEM and its importance?

The term "search engine marketing" describes a number of tactics and methods a business may employ to increase the amount of visitors coming from search engine results pages (SERPS) to a website.

In order to increase a website's visibility, SEM employs sponsored search, contextual advertising, and organic search results.

SEM, or search engine marketing, is a digital marketing technique used to improve a website's presence on search engine results pages (SERPs).

Search engine marketing (SEM) consists of three basic categories: pay-per-click (PPC), local, and organic SEO. All three are geared toward assisting you in gaining more exposure in search results.

In SEM, websites are promoted through improving their exposure in search engine results pages (SERPs), typically through paid advertising.

Learn more about search engine marketing refer to :

brainly.com/question/30052464

#SPJ4

Question-

What does search engine marketing mean and how  search engines are online tools that help users to find the information they need ?

When referring to hard drives, access time is measured in?
O kilobytes
O milliseconds
O megahertz
O bits per second

Answers

It is Milliseconds I think I’m not sure if it’s wrong I’m sorry

How does the brain influence your emotions, thoughts, and values?

Answers

Amygdala. Each hemisphere of the brain has an amygdala, a small, almond-shaped structure. The amygdalae, which are a part of the limbic system, control emotion and memory and are linked to the brain's reward system, stress, and the "fight or flight" reaction when someone senses a threat.

What are the effects of the brain?Serotonin and dopamine, two neurotransmitters, are used as chemical messengers to carry messages throughout the network. When brain areas get these signals, we recognize things and circumstances, give them emotional values to direct our behavior, and make split-second risk/reward judgments.Amygdala. The amygdala is a small, almond-shaped structure found in each hemisphere of the brain. The limbic systems' amygdalae control emotion and memory and are linked to the brain's reward system, stress, and the "fight or flight" response when someone perceives a threat.Researchers have demonstrated that a variety of brain regions are involved in processing emotions using MRI cameras. Processing an emotion takes happen in a number of different locations.

To learn more about Amygdala, refer to:

https://brainly.com/question/24171355

#SPJ1

Consider you are asked to decode a secret message. The coded message is in numbers and each number stands for a
specific letter. You discover enough of the secret code to decode the current message. So far, you know:
• 1 represents “D”
• 2 represents “W”
• 3 represents “E”
• 4 represents “L”
• 5 represents “H”
• 6 represents “O”
• 7 represents “R”
Write a program that prompts the user for 10 numbers, one at a time, and prints out the decoded message. If the user
enters a number that is not one of those already deciphered, prompt him/her for a new number. Test your code with the
following input: 5 3 4 4 6 2 6 7 4 1

WRITE IN THE PROGRAMMING LANGUAGE: JAVA

Answers

Here is an example of a program in Java that prompts the user for 10 numbers, one at a time, and prints out the decoded message based on the code you provided:

import java.util.Scanner;

public class DecodeMessage {

public static void main(String[] args) {

Scanner scanner = new Scanner(System.in);

// Create a mapping of numbers to letters

char[] letters = {'D', 'W', 'E', 'L', 'H', 'O', 'R'};

int[] numbers = {1, 2, 3, 4, 5, 6, 7};

// Prompt the user for 10 numbers

StringBuilder decodedMessage = new StringBuilder();

for (int i = 0; i < 10; i++) {

System.out.print("Enter a number: ");

int input = scanner.nextInt();

// Check if the input is a valid number

boolean valid = false;

for (int j = 0; j < numbers.length; j++) {

if (input == numbers[j]) {

decodedMessage.append(letters[j]);

valid = true;

break;

}

}

// If the input is not a valid number, prompt the user again

if (!valid) {

System.out.println("Invalid number. Please enter a valid number.");

i--;

}

}

// Print the decoded message

System.out.println("Decoded message: " + decodedMessage.toString());

}

}

This program uses a Scanner to prompt the user for input, a StringBuilder to construct the decoded message, and two arrays letters and numbers to store the mapping of letters and numbers. The program uses a for loop to prompt the user for 10 numbers, and inside the loop, it checks if the input is a valid number (by checking if it exists in the numbers array) and, if it is, it appends the corresponding letter to the decoded message. If the input is not a valid number, the program prints an error message and the loop iterates again, prompting the user for a new number. Finally, it prints the decoded message.

The test input you provided will output "HELHOR"

which of the following terms is used to describe the interconnected network of information technology infrastructure users call cyberspace and the people, environment, norms and conditions that influence that network?

Answers

The terminology which is used to describe the interconnected network of information technology infrastructure users call cyberspace and the people, environment, norms and conditions that influence that network is: C. Cyber Ecosystem.

What is cybersecurity?

In Computer technology, cybersecurity can be defined as a preventive practice that is typically used for protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access, especially through the use of technology, frameworks, security policies, processes and network engineers.

What is Cyber Ecosystem?

In Cybersecurity, a Cyber Ecosystem simply refers to a terminology which typically connotes of all of the infrastructure that are associated with an interconnected network of information technology, that are referred to as cyberspace by the end users.

Read more on cybersecurity here: brainly.com/question/14286078

#SPJ1

Complete Question:

Which of the following terms is used to describe the interconnected network of information technology infrastructure users call cyberspace and the people, environment, norms and conditions that influence that network?

Artificial Intelligence

Network Governance

Cyber Ecosystem

Cyber Governance

Cyber Intelligence

what is more beneficial, learning react or node first? i know html, css, and js quite well. my goal is to become a fullstack react and node developer. should i learn node first, or should i

Answers

If you already know HTML, CSS, and JavaScript quite well, the question of whether you should learn Node.js or React first as you aspire to be a full-stack developer arises. Learning Node.js or React first depends on your preferred speciality, web development expertise, and design aims.

In terms of front-end design and development, React is an excellent choice. This technology allows you to create interactive user interfaces, and it's one of the most widely used front-end technologies on the market. To be a front-end developer, React should be your first choice. Also, if you want to be a full-stack developer and start with React, you will have to learn Node.js anyway, as Node.js is required to build React applications. While Node.js is often used in server-side web development, it can also be utilized in front-end development with the use of technologies like Electron. This technology may enable you to create desktop applications with the same front-end web design skills you already possess. To be a back-end developer, Node.js should be your first choice.In conclusion, learning React or Node.js depends on your preferred specialty, web development expertise, and design goals. If you want to be a front-end developer, React should be your first choice, and if you want to be a back-end developer, Node.js should be your first choice.

To know more about JavaScript visit:

brainly.com/question/16698901

#SPJ11

What are the limits of hashing and verifying that files haven’t changed?

Answers

The hashing function can take any number of key-value pairs and there is no specific limit to it.

What is hashing?

Hashing is a file-based algorithm for producing a fixed-length bit string value. A file is essentially a collection of data blocks. The length of the data is reduced by hashing to a fixed number or key that represents the original string.

When hashing is employed, the hash function may plot all of the keys and values to what the real size of the table is, demonstrating that the hashing function can take any number of key-value pairs with no restriction.

However, if the passwords are hashed in encryption, recovering the passwords is extremely difficult.

Thus, the hashing function can take any number of key-value pairs and there is no specific limit to it.

Learn more about the hashing here:

https://brainly.com/question/13106914

#SPJ1

in python, when does an object reach the end of its life?question 9 options:when its timeout value has expired.when it has been terminated by the destroy method.when it has passed the last statement that uses it.when it can no longer be referred to by the program that created it.

Answers

In Python, an object reaches the end of its life when it can no longer be referred to by the program that created it.

This is determined by the reference count of the object, which is the number of variables or other objects that refer to it. When the reference count of an object reaches zero, the object is eligible for garbage collection, which means that its memory can be freed for use by other objects. Python's automatic garbage collector periodically scans the heap to identify and delete objects that are no longer in use. When an object is deleted, its destructor method, if it has one, is called to perform any necessary cleanup. The destructor method can be used to release system resources, close open files, or perform other tasks. It is important to note that Python's garbage collector does not provide real-time guarantees for the deletion of objects, so it is generally a good practice to explicitly release system resources and close files when they are no longer needed, rather than relying on the garbage collector to do so.

learn more about python here:

https://brainly.com/question/30391554

#SPJ11

Question 7 what are some of the shortcomings of antivirus software today? check all that apply.

Answers

Answer:

Modern day anti-viruses have a few shortcomings:

1.) False detections. Anti-viruses use a set of algorithms to determine whether or not a application or library contains harmful code such as trojans or rats. But sometimes an anti-virus will flag a file it thinks is dangerous when the file is harmless.

2.) Disk space. Any file or executable takes up disk space in order to exist on your computer; anti-viruses are no exception to this. Anti-viruses may take up a large amount of space on your drive.

3.) Slows down computer. Anti-viruses are constantly loaded into memory to protect your computer. Due to this, they impact your computer's performance.

4.) Don't always work. Any dedicated virus creator will try find a way to bypass anti-viruses and sometimes may succeed. This makes anti-viruses completely useless when it comes to viruses that can bypass them.

give 4 example for echinodermis cnidarians poriferas platyhilminthes nematodes and annerids

Answers

Answer:

Among the largest and most important invertebrate phyla are Porifera (sponges), Cnidaria (jellyfish, corals, and sea anemones), Platyhelminthes (flatworms), Nematoda (roundworms), Mollusca (snails, bivalves, squids, and octopuses), Annelida (segmented worms), Arthropoda (horseshoe crabs, spiders, crabs, centipedes, ..

1.How is the Query wizard used on a table?
2.How is the form command used to create forms for a table?
3.How is the form created if we choose to use "split form"option?
4.What are the types of the form available ,if we use the"form wizard"?
5.How can we use the "Report wizard" to generate report of a table?​

Answers

1. The Query Wizard is used on a table to easily create queries that extract specific data by guiding users through a series of steps to define fields, criteria, and sorting options.

2. The Form command is used to create forms for a table by automatically generating a layout based on the table's structure, allowing users to input or view data.

3. When using the "Split Form" option, a form is created with two views: a datasheet view displaying the table's records and a single record view for editing or adding data. These views are synchronized, making data manipulation efficient.

4. The "Form Wizard" offers various form types, including columnar, tabular, datasheet, and justified forms, allowing users to customize the layout according to their needs.

5. The "Report Wizard" generates reports of a table by guiding users through selecting fields, grouping levels, and sorting options, resulting in a professionally formatted report for data analysis or presentation.

learn more about Query Wizard here:

https://brainly.com/question/29306855

#SPJ11

What is R0 used for?

Answers

R0, also known as the basic reproduction number, is used to measure the contagiousness or transmissibility of an infectious disease.

It is the average number of people that one infected person will transmit the disease to in a population that is completely susceptible to the disease. R0 is used by epidemiologists to predict the spread of an infectious disease and to determine what measures need to be taken to control or eliminate the disease. For example, if R0 is greater than 1, the disease will spread in a population, but if R0 is less than 1, the disease will eventually die out. Therefore, R0 is an important factor in public health decision-making and disease control.

Learn more about the RO Function: https://brainly.com/question/19044037

#SPJ11

I need help with my computer, I did a network reset because my wifi was acting up and I was told to do so, but now I can't connect to any network

I need help with my computer, I did a network reset because my wifi was acting up and I was told to do

Answers

Answer:

Turn off your netork, restart your computer and turn on the network back again,

if that doesn't works, try contacting a technician

Answer:

The best solution is to uninstall the network adapter's driver and allow Windows to reinstall it automatically. ... Press Windows key + X and click on Device Manager. Right-click on the network adapter and choose Uninstall. If prompted, click on Delete the driver software for this device.

Sasha's new company has told her that she will be required to move at her own expense in two years. What should she consider before making her decision?

Answers

To make her decision, Sasha should consider cost of living, job market, quality of life, social network, and career advancement before moving for her new job.


What is the rationale for the above response?  

Before deciding whether or not to move for her new job, Sasha should consider several key factors.

Firstly, she should research the cost of living in the area where she will be moving to, as well as job opportunities, salaries and stability of the job market. Secondly, she should consider the overall quality of life, including climate, recreational opportunities and community atmosphere.

Note as well that, Sasha should consider her current social network and the opportunity to build a new one in the area where she will be moving to. Finally, she should weigh the potential benefits and costs of the move in terms of her personal and professional goals to determine if it is the right decision for her.

Learn more about Decision Making at:

https://brainly.com/question/13244895

#SPJ1

2) Write out how to solve the following code using any addressing mode for (3,3) GPR. A[] is address 0x100, y is address 0x300, z is address 0x400, and x is using r0. Write comments besides each line of code. Similar to how it was done in class. Short a[50]; Int y,z; for( x=0; x<20; x++) { y = a[x + 3]; z = y + a[x+10]; }

Answers

Register R0 should be loaded with array A's base address using the instruction LD R0, #0x100.

The variable y address should be loaded into register R1. LD R2, #0x400: Variable z address should be loaded into register R2. LD R3, #0: Set the loop counter to 0 at startup. Name the beginning of the loop in the loop: statement. ADD R4, R3, #3: Determine the a[x+3] index and store it in register R4. LD R6, (R0+R4): Load the value of a[x+3] into register R6. ADD R5, R3, #10: Determine the index of a[x+10] and store it in register R5. ADD R2, R6, (R0+R5): Increase y by a[x+10] and store the outcome in z. ST R2, (R2): Place the outcome at the address of z in memory.

Learn more about variable here:

https://brainly.com/question/17344045

#SPJ4

How do you fix 404 that's an error the requested URL was not found on this server that's all we know?

Answers

Answer:

One simple way to fix a 404 error is to redirect the visitor to the homepage of the website. This can be done using a . htaccess file on an Apache web server.

For a single-frequency sine wave modulating signal of 3 khz with a carrier frequency of 30 khz, what is the spacing between sidebands?.

Answers

The spacing between sidebands would be 6 kHz. In physics and engineering, the term "frequency" refers to the number of occurrences of a repeating event per unit of time.

Frequency is typically measured in hertz (Hz), which is the number of cycles or occurrences per second. For example, a frequency of 1 Hz means that an event is happening once per second, while a frequency of 2 Hz means that the event is happening twice per second.

In a single-frequency sine wave modulating signal, the sidebands are located at the sum and difference frequencies of the carrier frequency and the modulating frequency.

For a carrier frequency of 30 kHz and a modulating frequency of 3 kHz, the upper sideband will be located at:

30 kHz + 3 kHz = 33 kHz

And the lower sideband will be located at:

30 kHz - 3 kHz = 27 kHz.

The spacing between sidebands is the difference between the frequency of the upper sideband and the frequency of the lower sideband. In this case, the spacing between sidebands is:

33 kHz - 27 kHz = 6 kHz.

Learn more about frequency here, https://brainly.com/question/5102661

#SPJ4

________ is the keyboard shortcut for the Spelling command.A. F1B. F2C. F7D. F12

Answers

Answer:

(C) F7

Explanation:

Which type of operating system is permanently programmed into a hardware device?

A. Embedded OS
B. Firmware
C. Mobile OS
D. Hypervisor

Answers

Answer:

B.FIRMWARE

Explanation:

An operating system that is permanently etched into a hardware device (such as a keyboard or a video card).

The type of operating system is permanently programmed into a hardware device is firmware. The correct option is B.

What is firmware?

A platform's hardware components are configured and controlled by firmware, which is often computer code. As a result, firmware typically executes as the first piece of code when a device is turned on, serving as the cornerstone upon which system trust is based.

Firmware is a class of software that is permanently included in a device's read-only memory. It offers instructions on how to operate the device and reduces hardware-level security risks. Essentially, firmware refers to software that is integrated into a piece of hardware.

It is referred to as embedded software at times. A microcontroller, a component of the microprocessor that instructs the microprocessor on what to do, serves as an illustration.

Therefore, the correct option is B. Firmware.

To learn more about firmware, refer to the link:

https://brainly.com/question/28945238

#SPJ2

is it safe for me to use normal glue to stick things on my laptop like stickers or pics?

Answers

Answer:

I think you should be fine, as long as you're just sticking it to the backside of your laptop. (For MacBooks, this is the part of the laptop with the apple symbol.) You can easily wash glue off with a cleaner such as Goo Gone or Pledge. There's better solutions, like ordering a case for your computer and putting the stickers on there, but I guess it's fine to stick them onto your computer. I'll attach a photo of an example of case with stickers.

Hope this helps! Feel free to give me Brainliest if you feel this helped. Have a good day, and feel free to comment any questions below you may have. :)

is it safe for me to use normal glue to stick things on my laptop like stickers or pics?

It is safe to use normal glue to stick things on my laptop like stickers or pics. On the back of the laptop cover, this glue can be used.

What are glues?

Any non-metallic substance applied to one or both sides of two distinct items that binds them together and prevents their separation is an adhesive, also known as glue, cement, mucilage, or paste.

superglue, sometimes called cyanoacrylate, is a kind of adhesive that joins quickly and may be used on a range of surfaces and materials. This fast-bonding glue has the advantage of eliminating the need for nails, clamps, and other fasteners. Superglues are waterproof, quick-setting, and will dry clear.

Therefore, stickers and pictures can be safely adhered on my laptop using regular adhesive. This glue can be applied to the laptop cover's rear.

To learn more about glues, refer to the link:

https://brainly.com/question/13225566

#SPJ2

______ greetings are used when we talk to friends or family members.

A)Formal

B)Informal

C)Gestures

D)None of these​

Answers

Answer:

B. Informal

Explanation:

You know your parents, greet them normally

Answer:

Informal

Explanation:

Replace the nulls values of the column salary with the mean salary.

Answers

When data is combined across lengthy time periods from various sources to address real-world issues, missing values are frequently present, and accurate machine learning modeling necessitates careful treatment of missing data.

What is Column salary?

One tactic is to impute the missing data. A wide range of algorithms, including simple interpolation (mean, median, mode), matrix factorization techniques like SVD, statistical models like Kalman filters, and deep learning techniques.

Machine learning models can learn from partial data with the aid of approaches like replacement or imputation for missing values. Mean, median, and mode are the three basic missing value imputation strategies.

The median is the middle number in a set of numbers sorted by size, the mode is the most prevalent numerical value for, and the mean is the average of all the values in a set.

Thus, When data is combined across lengthy time periods from various sources to address real-world issues, missing values are frequently present, and accurate machine learning modeling necessitates careful treatment of missing data.

Learn more about Data, refer to the link:

https://brainly.com/question/10980404

#SPJ4

(ANYONE GOOD AT PYTHON!?)
Write a program that outputs some Leaderboard. Pick something that interests you.

You must have a minimum of 3 rows of data and 2 columns (name can be one).


I created 6 variables called player_1, player_2 and player_3, points_1, points_2 and points_3. Be sure to use meaningful names. I centered the names and right-justified the total points. You may format your data to your liking, but the output must be in clean rows and columns.

Answers

Answer:

# Python Recap

def main():

runTimeInMinutes = 95

   movieTitle = "Daddy Day Care"

   print(movieTitle)

   movieTitle = "Hotel for Dogs"

   print(movieTitle)

   print(runTimeInMinutes)

main()

Explanation:

What do you understand by the following malicious programs (i) computer virus (ii) worm (iii) trojan horse (iv) sweeper (v) malware (vi) spyware.​

Answers

Answer:

Computer virus- A computer virus is a type of malware that attaches to another program (like a document), which can replicate and spread after a person first runs it on their system. For instance, you could receive an email with a malicious attachment, open the file unknowingly, and then the computer virus runs on your computer.

Worm virus- A computer worm virus is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers.

Trojan horse virus- A Trojan Horse (Trojan) virus is a type of malware that disguises itself as legitimate code or software. Once inside the network, attackers are able to carry out any action that a legitimate user could perform, such as exporting files, modifying data, deleting files or otherwise altering the contents of the device.

Sweeper virus- Sweeper virus is a fake anti-spyware program known to be an updated version of the rogue anti-spyware program Virus Doctor. Virus Sweeper is a program that when it is installed starts to perform actions such as scanning your computer without your permission.

Malware- Malware is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy.

Spyware- Spyware is any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission. Spyware is a kind of malware that secretly gathers information about a person or organization and relays this data to other parties.

What is the purpose of the CC option in an email?
A.
Create a carbon copy of the message.
B.
Save the message as a template for future use.
C.
Send a copy of the message to one or more people.
D.
Forward a message to multiple recipients.
( Edmentum MSE )

Answers

Answer:

c

Explanation:

send a copy of the messege

I need help with this question

What is the “digital divide”?

A. the gap between people who are very skilled using the Internet and people who are less skilled.

B. the gap between the time before Smartphones debuted and the time they became widely used.

C. the gap between people who have readily available Internet access and people who do not.

D. the gap between the time before the Internet debuted and the time it became popular.

Answers

Answer:

C IS YOUR ANSWERexplanation is available

Explanation:

The digital divide describes the gap between people who have access to affordable, reliable internet service (and the skills and gadgets necessary to take advantage of that access) and those who lack it. ... The Access Divide—This is the most visible digital divide.

Answer:

option c is the answer....

To improve readability, what color background should I use
with dark purple text.

Answers

Answer:

umm probably white or any light color

Explanation:

cuz if you put similar colors whether color or the darkness it will be hard to read cuz its similar. ofc if you do a dark color for text you can use a much lighter shade of that color

Forests are crucial to the health of our planet because they __________. A. Can easily be cut down to make room for agriculture and cattle grazing B. Provide homes for species of plants that are used to make medicines C. Clean and protect the atmosphere by absorbing carbon dioxide and releasing oxygen D. Provide fuel and lumber for houses and industries

Answers

Answer:

C

Explanation:

Trees release oxygen :)

Answer:

C. clean and protect the atmosphere by absorbing carbon dioxide and releasing oxygen

Explanation:

Other Questions
Determine the two positive integers each square root falls between.10. 2811. 312. 5913. 11514. 77215. 140 Could yall help me PLEASEestimate the circumference of a quarter whose diameter measures 1.205 inches.7.6 in.1.9 in.2.4 in.3,6 in. Could anyone give a hand? When researchers measured eeg activity of participants watching amusing film clips, people showed more activation in the:________ How do emerging markets such as China differ from industrialized countries such as the United States in terms of the environment for corporate entrepreneurship in technology sectors? Emerging markets are growing more rapidly and thus are attractive for corporate entrepreneurship in technology sectors. The operating environment for entrepreneurs is more complex in emerging econo-mies such as China than in developed economies. Entrepreneurs need to scan developing countries more carefully due to the complexity of the environment. Emerging markets also differ in terms of the prevalent forms of capitalism. Most tend to be characterized by a state directed (e.g., China) or an oligarchic (e.g., India) form of capitalism. Most industrialized countries, on the other hand, tend to have entrepreneurial (e.g., the United States) or a big firm (e.g., Japan) type of capitalism if two protons are added to an oxygen nucleus, the result is Find the value of x. Draw a triangle and label each interior angle before solving.Then find the angle measures of the polygon.Angle one: 2x, angle two: x, angle 3: (X + 8) which of the following is true? a hiatal hernia protrudes through the inguinal canal. hiatal hernia symptoms usually develop early in the disease. hiatal hernias are strongly associated with colon cancer. patients with a hiatal hernia can be asymptomatic. 1). High levels of pressure to act unethically were more often reported by college graduates than by those with a high school diploma or less. True /False2). Politics has to do with public influence and control. True/ False3). When Laura, a service manager at a graphic design company shared with her boss, "This was a great week. While you were on vacation we had a power outage that shut down the office. However, I quickly formulated and implemented a plan for everyone in the design department to work from home so we still met all of our deadlines." Lauras actions are an excellent example of Henry Fayol's __________ principle?a.Esprit de corpsb.Centralizationc.Orderd.Initiativee.Scalar chain4). ____ refers to who is ultimately responsible for getting things done.a.Specialization of laborb.Chain of Commandc.Communicationd.Delegatione.Authority5). In the U.S., unemployment among whites and blacks is about the same.True/False6). One of the top-ten workplace hot spots that trigger unethical and illegal conduct is little or no recognition of achievements. True/False7). One of the purposes of issues management is to minimize the "surprises" which accompany social and political change. True/False8). According to the Economist magazines Top 10 list of leadership qualities, _____________was Number 1.a.Excellent communication skillsb.Concern for the environmentc.Strong financial backgroundd.A sound ethical compasse.Critical thinking and problem solving9). Like all employees, older workers need to be managed according to their individual abilities, not as members of a demographic group.True/ False10). Managers in the 2020 workplace will need to have the ability to learn new skills, leverage the latest technology, and apply new knowledge to a fast-changing set of business conditions. True/False when chipping or scraping paint at a minimum you should wear what personal protective equipment Which passage from the excerpt shows that the narrator is using logos?A. Well, it was about a month after we sprayed for the final time andI'm sitting at my desk in the trailer thinking about the drainageproject at KuchingB. they love those shorts, by the way, the shiny material and the tightmachine-stitching, the whole country, men and women andchildren, they can't get enough of themC. A hundred and twenty inches of rain, they've got to figure a way tokeep it out of the hut, and for centuries, this was it.D. for the first time in maybe a year I'm not smearing mosquitoes allover the back of my neck Please tell my if I am right. Thanks :) Suppose that f(x,y) is a smooth function and that its partial derivatives have the values fx(3, -8)=5 , and fy (3, -8)=1 . Given that f(3,-8)=2 , use this information to estimate the following values: Estimate of (integer value) f(3, -7) Estimate of (integer value) f(4, -8) Estimate of (integer value) f(4, -7) What might happen to a desert biome if the area received more rain than it normally receives over an extended period of time? Describe some of the changes that you might expect to see A is the father of C. D is the son of B. E is the mother of A. B is married to A. How is D related to E? help me please im stuck here how to create diagram that demonstrates the stepby step procedures in performing a mail merge. please answer its about to be due Question ( 30 Marks )Evaluate the different aspects of project planning ineach of the different life cycle phases f(x, y) = x2 i xy j x2 y2 = 4 (a) find the work done by the force field on a particle that moves once around the circle oriented in the clockwise direction.