how does communication creates better relationships​

Answers

Answer 1

Answer:

Communication helps build relationships for several reasons. First, the more you listen, the more you learn about others' perspectives. Listening thoughtfully, without judgement or interruption, is also a show of caring and respect. With stronger relationships come deeper feelings of trust


Related Questions

Look at the following assignment statements:

word1 = "skate"
word2 = "board"

What is the correct way to concatenate the strings?


newWord = word1 / word2
newWord = word1 + word2
newWord = word1 * word2
newWord = word1 = word2

Answers

The correct way to concatenate the strings is:

newWord = word1 + word2

Answer:

newWord = word1 + word2

Explanation:

A STUDENT IS GRADED BASED ON EXAM PERFORMANCE AND CLASS ATTENDANCE.WHEN THE PERFORMANCE IS ABOVE 50% AND CLASS ATTENDANCE GREATER THAN 75%,THE STUDENT IS AWARDED "PASS".WHEN THE CLASS ATTENDANCE IS LESS THAN 75%,THE STUDENT RETAKES THE COURSE.OTHERWISE,THE SITS FOR A SUPPLEMENTARY EXAM.DRAW A PROGRAM FLOWCHART TO REPRESENT THIS LOGIC​

Answers

Here is a flowchart to represent the logic described:

The Flowchart

START

|

v

ENTER exam performance and class attendance

|

v

IF performance > 50 AND attendance > 75 THEN

|

v

DISPLAY "PASS"

|

v

ELSE IF attendance < 75 THEN

|

v

DISPLAY "RETAKE COURSE"

|

v

ELSE

|

v

DISPLAY "SUPPLEMENTARY EXAM"

|

v

END

Using symbols, flow charts depict the connections between input, processes, and output.

The planned structure of a program is analyzed by computer programmers using flow charts to ensure that all inputs, processes, and outputs have been considered and that all defects have been fixed. Flow charts are used to communicate ideas to stakeholders.

Read more about flowcharts here:

https://brainly.com/question/6532130

#SPJ1

1. Why does a computer have different types of ports?

Answers

Answer:

Computer ports are classified into two types based on the protocols used. A protocol is a set of rules and standards to be followed during data transfer and communication. Usually, data is transmitted in a particular pattern.

Explanation:

for a ser of rules and standards to be followed during data transfer and communication

definition speeh recognition

Answers

Answer:

the ability of a computer to identify and respond to the sounds produced in human speech.

Explanation:

Dad 220 module 4 lab

Answers

The end of this lab, students will have a basic understanding of DSP concept and be able to apply them to audio and video signals.

What is concept?

Concept is an idea or notion; a general notion or an abstraction. It is a thought or an understanding that is formed in the mind. Concept is usually a general idea or an understanding of something which is based on the observation of reality or experience. It is often used to describe a basic idea or principle that is essential to a particular topic or subject.

Understand the role of digital signal processing (DSP) in audio and video applications.

Learn how to apply basic DSP techniques, such as filtering, to audio and video signals.

Apply fundamental concepts of Fourier analysis to audio and video signals.

In this lab, students will learn how to use digital signal processing (DSP) techniques to manipulate audio and video signals. The lab will introduce basic concepts of DSP, such as Fourier analysis, filtering, and signal processing algorithms.

To learn more about concepts

https://brainly.com/question/28498043

#SPJ1

Students will have a fundamental understanding of DSP concepts by the conclusion of this lab and be able to apply them to audio and video signals.

What is concept?

A concept is an idea or thought, an abstract idea or idea in general. It is a mental construct that is either an idea or an understanding. Concept is typically a broad idea or comprehension of something that is based on experience or actual observation. It is frequently used to define a fundamental notion or precept that underlies a certain subject or topic.

Learn how to use filtering and other fundamental DSP methods on audio and video signals. Signals in audio and video can be analysed using the basic principles of Fourier analysis.

The lab will teach pupils how to manipulate audio and video signals using digital signal processing (DSP) methods. In the lab, fundamental DSP ideas like Fourier analysis, filtering, and signal processing techniques will be covered.

To know more about signals, visit:

https://brainly.com/question/28275639

#SPJ1

The complete question is,

how to store order information with a primary key of order id and foreign key of customer id for Dad 220 module 4 lab

Which core business etiquette is missing in Jane

Answers

Answer:

As the question does not provide any context about who Jane is and what she has done, I cannot provide a specific answer about which core business etiquette is missing in Jane. However, in general, some of the key core business etiquettes that are important to follow in a professional setting include:

Punctuality: Arriving on time for meetings and appointments is a sign of respect for others and their time.

Professionalism: Maintaining a professional demeanor, dressing appropriately, and using appropriate language and tone of voice are important in projecting a positive image and establishing credibility.

Communication: Effective communication skills such as active listening, clear speaking, and appropriate use of technology are essential for building relationships and achieving business goals.

Respect: Treating others with respect, including acknowledging their opinions and perspectives, is key to building positive relationships and fostering a positive work environment.

Business etiquette: Familiarity with and adherence to appropriate business etiquette, such as proper introductions, handshakes, and business card exchanges, can help establish a positive first impression and build relationships.

It is important to note that specific business etiquettes may vary depending on the cultural and social norms of the particular workplace or industry.

A structure that organizes data in a list that is commonly 1-dimensional or 2-
dimensional
Linear Section
Constant
No answertet provided
It intro technology

Answers

Answer:

An array.

Explanation:

An array can be defined as a structure that organizes data in a list that is commonly 1-dimensional or 2-dimensional.

Simply stated, an array refers to a set of memory locations (data structure) that comprises of a group of elements with each memory location sharing the same name. Therefore, the elements contained in array are all of the same data type e.g strings or integers.

Basically, in computer programming, arrays are typically used by software developers to organize data, in order to search or sort them.

Binary search is an efficient algorithm used to find an item from a sorted list of items by using the run-time complexity of Ο(log n), where n is total number of elements. Binary search applies the principles of divide and conquer.

In order to do a binary search on an array, the array must first be sorted in an ascending order.

Hence, array elements are mainly stored in contiguous memory locations on computer.

Create a data validation list in cell D5 that displays Quantity, Payment Type, Amount (in that order). Do not use cell references as the source of the list. Be sure to enter a blank space after each comma when entering the values.

Answers

Validating the cell D5 would ensure that the cell D5 do not accept invalid inputs.

How can one to create data validation?

To create data validation in the cell D5, we perform the following steps

Select the cell D5 in the Microsoft Excel sheetGo to data; select data validationGo to the Settings tab, then select the Whole number option under AllowNext, goto data then select condition.Set all necessary conditionsGo to the Input Message tab, then enter a custom message that displays when the user enters an invalid input.Check the Show input messageSet the error style under the Error Alert tabClick OK.

It is correct to state that rhe above steps validates the cell D5, and would ensure that the cell D5 do not accept invalid inputs.

Learn  more about data validation at:

https://brainly.com/question/31429699

#SPJ1

The power relationship on a transformer states that O Power in = power out + loss O Power in = 1/2 power out (Power in = 2 x power out O All of the above None of the above​

Answers

Answer:

D

Explanation:

The power relationship on a transformer states that Power in = power out + loss.

What relationship does input and output power have in a transformer?

The ratio between output voltage and input voltage exists the exact as the ratio of the number of turns between the two windings

The efficiency of a transformer exists reflected in power (wattage) loss between the primary (input) and secondary (output) windings. Then the consequent efficiency of a transformer stands equivalent to the ratio of the power output of the secondary winding, PS to the power input of the primary winding, PP  and exists thus high.

Therefore, the correct answer is option A) Power in = power out + loss.

To learn more about power

https://brainly.com/question/13787582

#SPJ2

To address cybercrime at the global level, law enforcement needs to operate
.

Answers

In order to address  cybercrime on a worldwide scale, it is imperative that law enforcement agencies work together in a collaborative and cooperative manner across international borders.

What is the cybercrime?

Cybercrime requires collaboration and synchronization among countries. Collaboration among law authorization organizations over different countries is basic for the effective request, trepidation, and conviction of cybercriminals.

In arrange to combat cybercrime in an compelling way, it is pivotal for law authorization to collaborate and trade insights, capability, as well as assets.

Learn more about cybercrime  from

https://brainly.com/question/13109173

#SPJ1

Which is equal?
1 KB = 2,000 Bytes
1 MB » 1,000 KB
3 GB = 5,000,000 KB
O 8 TB = 7,000 MB
4 PB - 2,500,000 GB

PLEASE HELP 10points

Answers

Answer:

1 mb = 1000 kb

all others are wrong although it's 1024 KB that's makes 1 mb but the value can be approximated

Which of the following if statements uses a Boolean condition to test: "If you are 18 or older, you can vote"? (3 points)

if(age <= 18):
if(age >= 18):
if(age == 18):
if(age != 18):

Answers

The correct if statement that uses a Boolean condition to test the statement "If you are 18 or older, you can vote" is: if(age >= 18):

In the given statement, the condition is that a person should be 18 years or older in order to vote.

The comparison operator used here is the greater than or equal to (>=) operator, which checks if the value of the variable "age" is greater than or equal to 18.

This condition will evaluate to true if the person's age is 18 or any value greater than 18, indicating that they are eligible to vote.

Let's analyze the other if statements:

1)if(age <= 18):This statement checks if the value of the variable "age" is less than or equal to 18.

However, this condition would evaluate to true for ages less than or equal to 18, which implies that a person who is 18 years old or younger would be allowed to vote, which is not in line with the given statement.

2)if(age == 18):This statement checks if the value of the variable "age" is equal to 18. However, the given statement allows individuals who are older than 18 to vote.

Therefore, this condition would evaluate to false for ages greater than 18, which is not correct.

3)if(age != 18):This statement checks if the value of the variable "age" is not equal to 18.

While this condition would evaluate to true for ages other than 18, it does not specifically cater to the requirement of being 18 or older to vote.

For more questions on Boolean condition

https://brainly.com/question/26041371

#SPJ8

4.3 mini programs AP computer science

Answers

1.

name = input("Enter your name: ")

num1 = int(input("Hello "+name+ ", enter an integer: "))

num2 = int(input(name+", enter another integer: "))

try:

   if num1 % num2 == 0:

       print("The first number is divisible by the second number")

   else:

       print("The first number is not divisible by the second number")

except ZeroDivisionError:

   print("The first number is not divisible by the second number")

try:

   if num2 % num1 == 0:

       print("The second number is divisible by the first number")

   else:

       print("The second number is not divisible by the first number")

except ZeroDivisionError:

   print("The second number is not divisible by the first number")

2.

import random, math

num1 = float(input("Enter a small decimal number: "))

num2 = float(input("Enter a large decimal number: "))

r = round(random.uniform(num1, num2), 2)

print("The volume of a sphere with radius " + str(r) + " is " + str(round(((4 / 3) * math.pi * (r ** 3)), 2)))

I hope this helps!

If anybody goes through K through 12 can you please help me by putting the code for the 2.3.4 word definitions for coding​

If anybody goes through K through 12 can you please help me by putting the code for the 2.3.4 word definitions

Answers

Answer: if it helps there is a tutorial on YT that gives the answers if you just search  2.3.4 word definitions

Explanation:

in the situation above, what ict trend andy used to connect with his friends and relatives​

Answers

The ICT trend that Andy can use to connect with his friends and relatives​ such that they can maintain face-to-face communication is video Conferencing.

What are ICT trends?

ICT trends refer to those innovations that allow us to communicate and interact with people on a wide scale. There are different situations that would require a person to use ICT trends for interactions.

If Andy has family and friends abroad and wants to keep in touch with them, video conferencing would give him the desired effect.

Learn more about ICT trends here:

https://brainly.com/question/13724249

#SPJ1

Question 4
Fill in the blank to complete the “increments” function. This function should use a list comprehension to create a list of numbers incremented by 2 (n+2). The function receives two variables and should return a list of incremented consecutive numbers between “start” and “end” inclusively (meaning the range should include both the “start” and “end” values). Complete the list comprehension in this function so that input like “squares(2, 3)” will produce the output “[4, 5]”.

Answers

The increment function will be written thus:

ef increments(start, end):

return [num + 2 for num in range(start, end + 1)]

print(increments(2, 3)) # Should print [4, 5]

print(increments(1, 5)) # Should print [3, 4, 5, 6, 7]

print(increments(0, 10)) # Should print [2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12]

How to explain the function

The increments function takes two arguments, start and end, which represent the inclusive range of numbers to be incremented.

The goal is to create a list of numbers incremented by 2 (n+2) using a list comprehension.

Learn more about functions on

https://brainly.com/question/10439235

#SPJ1

Design templates can be applied to presentations when _____.

they are opened
a new slide is added
all the slides are created
all of the above
none of the above

IT IS NOT WHEN A NEW S IS ADDED

Answers

Answer:

all of the above

Explanation:

The answer to this is all of the above. In the Microsoft Powerpoint software, you are able to add a design template as soon as you first open the software and begin creating your presentation. Aside from this, you can also add the design template you want to use when a new slide is added or all the slides have already been created. This is done by clicking on the Design tab in the top ribbon and choosing the desired template. From this tab, you are also able to select specific slides to which you want the design to be applied to.

Answer:

All of the above

Explanation:

EDG2021

Help need right now pls
Read the following Python code:
yards - 26
hexadecimalYards = hex (yards)
print (hexadecimalYards)
Which of the following is the correct output? (5 points)
A. 0b1a

B. 0d1a

C. 0h1a

D. 0x1a

Answers

Answer:

d. 0x1a

Explanation:

How does a machine learning model is deployed

Answers

Answer:

Explanation:

Deployment is the method by which you integrate a machine learning model into an existing production environment to make practical business decisions based on data. It is one of the last stages in the machine learning life cycle and can be one of the most cumbersome.

List the rules involved in declaring variables in python . Explain with examples

Answers

In Python, variables are used to store values. To declare a variable in Python, you need to follow a few rules:

1. The variable name should start with a letter or underscore.

2. The variable name should not start with a number.

3. The variable name can only contain letters, numbers, and underscores.

4. Variable names are case sensitive.

5. Avoid using Python keywords as variable names.

Here are some examples of variable declaration in Python:

1. Declaring a variable with a string value

message = "Hello, world!"

2. Declaring a variable with an integer value

age = 30

3. Declaring a variable with a float value

temperature = 98.6

4. Declaring a variable with a boolean value

is_sunny = True

Which of the following describes a codec? Choose all that apply.
a computer program that saves a digital audio file as a specific audio file format
short for coder-decoder
converts audio files, but does not compress them

Answers

Answer:

A, B

Explanation:

What is the output? answer = "Hi mom print(answer.lower()) I​

Answers

As you have included a syntax error inside your question, I will make assumptions on the code. I will assume your code is {
answer = “Hi mom”
print(answer.lower())
}

In this case the output would be “hi mom”. Please make sure to double check your questions before posting.

Answer: hi mom

Explanation: got it right on edgen

Addressing is an added feature on the Internet, and is not required for proper operation of the Internet, as packet switching is the principle communication feature. Group of answer choices True False

Answers

Answer:

True

Explanation:

The statement is true. Packet switching is a method that groups the data and transmit it over the digital network. It is basis for communication in the computer. When the two host decides to communicate the network creates a control function and data is transmitted. Addressing is an added and is not mandatory for the operations of the internet as packet switching.

Create a console-based computerized game of War named WarCardGameConsole in the Final Project Part 1 folder. This is C#
1. Use an array of 52 integers to store unique values for each card.
2. Write a method named FillDeck() that places 52 unique values into this array.
3. Write another method named SelectCard() that you call twice on each deal to randomly
select a unique card for each player, with no repetition of cards in 26 deals.
4. To pause the play between each dealt hand, use a call to ReadLine().
5. At the end of a play of the game of the 26 deals:
a. display the Computer’s and Player’s final scores
b. display who won the game
c. record the results in a text file (see step 6)
d. give the player the choice of stopping or playing again.
6. Record the results of each game in a text file:
a. The text file should be saved as FirstNameLastName Results.txt in your project
folder. The file will automatically save in WarCardGameConsole\bin\Debug folder.
b. At the beginning of your program you should check to see if your file exists;
 If not, your program will create it
 If it does exist, you program will open it.
c. At the of a play of the game you will record the results
d. When the player indicates they want to stop playing, the program should close the
file.
7. Your program must have meaningful comments, including your name.

Answers

Answer:

Here is a console-based C# program for the card game War:

Explanation:

using System;

using System.IO;

namespace WarCardGameConsole

{

   class WarCardGame

   {

       // Array to hold 52 cards

       int[] deck = new int[52];

       // Player and computer scores

       int playerScore;

       int computerScore;

       // File to record results

       StreamWriter results;

       // Fill deck with cards

       void FillDeck()

       {

           // Add cards to deck

           for (int i = 0; i < deck.Length; i++)

           {

               deck[i] = i;

           }

       }

       // Select random card

       int SelectCard()

       {

           // Generate random index

           Random rand = new Random();

           int index = rand.Next(deck.Length);

           // Remove selected card from deck

           int card = deck[index];

           deck[index] = deck[deck.Length - 1];

           Array.Resize(ref deck, deck.Length - 1);

           // Return selected card

           return card;

       }

       // Play one round of war

       void PlayRound()

       {

           // Select cards for player and computer

           int playerCard = SelectCard();

           int computerCard = SelectCard();

           // Display cards

           Console.WriteLine($"Player card: {playerCard}  Computer card: {computerCard}");

           // Check who has higher card

           if (playerCard > computerCard)

           {

               playerScore++;

               Console.WriteLine("Player wins this round!");

           }

           else if (computerCard > playerCard)

           {

               computerScore++;

               Console.WriteLine("Computer wins this round!");

           }

           else

           {

               Console.WriteLine("Tie! No points awarded.");

           }

           // Pause before next round

           Console.WriteLine("Press any key to continue...");

           Console.ReadKey();

       }

       void PlayGame()

       {

           // Fill deck with cards

           FillDeck();

           // Play 26 rounds

           for (int i = 0; i < 26; i++)

           {

               PlayRound();

           }

           // Display final scores

           Console.WriteLine($"Player final score: {playerScore}");

           Console.WriteLine($"Computer final score: {computerScore}");

           // Determine winner

           if (playerScore > computerScore)

           {

               Console.WriteLine("Player wins the game!");

           }

           else if (computerScore > playerScore)

           {

               Console.WriteLine("Computer wins the game!");

           }

           else

           {

               Console.WriteLine("Tie game!");

           }

           // Record results in file

           results.WriteLine($"{DateTime.Now} - {playerScore} to {computerScore}");

           // Play again?

           Console.Write("Play again? (Y/N) ");

           string input = Console.ReadLine();

           if (input.ToUpper() == "Y")

           {

               // Restart game

               playerScore = 0;

               computerScore = 0;

               PlayGame();

           }

           else

           {

               // Close file and exit

               results.Close();

               Environment.Exit(0);

           }

       }

       static void Main(string[] args)

       {

           // Create game object

           WarCardGame game = new WarCardGame();

           // Check if results file exists

           if (!File.Exists("JohnDoe Results.txt"))

           {

               // Create file

               game.results = File.CreateText("JohnDoe Results.txt");

           }

           else

           {

               // Open existing file

               game.results = File.AppendText("JohnDoe Results.txt");

           }

           // Play game

           game.PlayGame();

       }

   }

}

Define the three overarching domains that contain application software, system software and hardware layers along with the
layers of abstraction in each, and explain in detail how each of these layers, whether software or hardware, interacts with the
others. Explain your answer in 3-5 sentences.

Answers

Answer:

The three overarching domains that contain application software, system software and hardware layers are:

- The kernel: This is the lowest level of software, and it interacts directly with the hardware.

- User space: This is where most applications live, and it is separate from the kernel to protect the stability of the system.

- Shells and GUIs: These provide a way for the user to interact with the system.

The hardware layer is the lowest level, and it consists of the actual physical components of the system. The software layers sit on top of the hardware, and they are responsible for running the system. The application software is the highest level, and it consists of the programs that the user runs. The system software is in the middle, and it consists of the operating system and other utilities that manage the system.

Explanation:

Hope this helps!

The three overarching domains in computing are application software, system software, and hardware layers, which interact through standardized interfaces and protocols to execute tasks and processes seamlessly.

Overarching domains in computing represent distinct layers, where application software serves as the user-facing programs tailored to specific tasks, system software acts as a mediator managing essential system functions and services, and hardware encompasses tangible components like CPUs, memory, and devices.

These domains collaborate harmoniously through standardized interfaces and protocols, enabling seamless interactions that harness the combined power of software and hardware, cultivating a flourishing digital landscape with the artistry of functionality and innovation.

Learn more about overarching domains here:

https://brainly.com/question/31608948

#SPJ7

At which stage should Joan discuss the look and feel of her website with her website designer?
At the
stage, Joan should discuss the look and feel of her website with her website designer.

At which stage should Joan discuss the look and feel of her website with her website designer?At thestage,

Answers

Answer:

Development stage: It is great to talk with the website designer during the development stages to understand the goals

Answer:

At the planning stage maybe?

Explanation:

I'm not positive but in plato it discusses this in the Website Development Proccess lesson.

Two lists: 3 2 9 and 1 4 6 become one list of 1 2 3 4 6 9 by comparing 3 & 1 followed by 3 & 2 etc. What is the name of the algorithm that has been used?

Answers

The algorithm used to merge the two sorted lists is called Merge Sort.

What is the algorithm?

An algorithm is a set of instructions or a step-by-step procedure for solving a problem or performing a task. It is a precise and unambiguous description of how to solve a problem or accomplish a specific goal and can be implemented in software code or other forms of computation. Algorithms are used in a wide range of applications, from computer programming and data analysis to mathematical modeling and scientific research. Some common examples of algorithms include sorting algorithms, search algorithms, optimization algorithms, and machine learning algorithms.

The algorithm used to merge the two sorted lists into a single sorted list is called Merge Sort. It is a divide-and-conquer algorithm that involves breaking down the input list into smaller sub-lists, sorting each sub-list recursively, and then merging the sorted sub-lists to produce the final sorted list. In the case of merging two sorted lists, the algorithm compares the first elements of each list and inserts the smaller element into the final list, and then proceeds to compare the next elements until all elements are merged into the final sorted list.

To learn more about the algorithm click here

https://brainly.com/question/13800096

#SPJ1

IoT is an interaction between the physical and the digital world ? True or False​

Answers

Answer:

The given statement is true.

Explanation:

IoT stands for internet-of-things. When we talk about internet of things, we are talking about the physical devices and the software that is used. IoT can simply be defined as a connection between physical and digital world.

The physical world consists of sensors, actuators etc

While the digital consists of the algorithms and programs.

Hence,

The given statement is true.

John Doe, the Netcare Hospital's IT director, is in charge of network management. He has asked
for your assistance in developing a network solution that will meet the needs of the hospital. The
hospital is expanding, and the management of the hospital has made funds available for network
upgrades. The medical staff would like to be able to access medical systems from any of the
patient rooms using laptop computers. Access to patient medical records, x-rays, prescriptions,
and recent patient information should be available to doctors and nurses. John purchased new
servers for the data center and installed them. The wireless LAN (WLAN) has about 30 laptops,
with another 15 due in six months. The servers must be highly available. The hospital's patient
rooms are located on floors 6 through 10. Doctors should be able to roam and connect to the
network from any floor.
According to a radio-frequency report, a single access point located in each communication closet
can reach all of the rooms on each floor. The current network is comprised of ten segments that
connect to a single router that also serves the Internet. Routing Information Protocol Version 1
is used by the router (RIPv1). The new back-end servers are housed in the same segment as those
on floor 1. John mentions that users have complained about slow server access, he would like to see a proposal for upgrading the network with faster switches and providing faster access to the
servers. The proposal should also include secure WLAN access on floors 6–10. Include an IP
addressing scheme that reduces the hospital's reliance on Class C networks. He wishes to reduce
the number of Internet service provider-leased networks (ISP).


Draw a logical diagram of the existing network. (8)

Answers

Because the servers in the back end are situated within the identical segment as those found on the first floor, user response times have drastically declined.

How to solve

At present, the network structure is made up of ten distinguishable segments that are all unified through one router.

This router utilizes Routing Information Protocol Version 1 (RIPv1) for the regulation of its routing dynamics.

There is a Wireless Local Area Network (WLAN) spanning across thirty laptops with an estimated fifteen more to be joined onto it in half a year's time. In each communications closet, there is a separate access point extending its reach over all six to ten stories.

Read more about network management here:

https://brainly.com/question/5860806
#SPJ1

In Python, the expression “a ** (b ** c)” is the same as “(a ** b)

Answers

Answer: False

Explanation: When two operators share an operand and the operators have the same precedence, then the expression is evaluated according to the associativity of the operators. For example, since the ** operator has right-to-left associativity, a ** (b ** c) = a ** b ** c. While on the other hand, (a ** b) = a ** b.

Other Questions
During the time of the Roman Empire, German tribes often used Roman coins instead of their own currency. a. What is medium of exchange? b. Why might the Roman coins provide German tribes with a medium of exchange? From an economist's perspective, an important consideration for policies to address global warming is: Group of answer choices A lawsuit that can arise from the enactment of the policies The market for recyclable inputs The supply and demand for recycled products The marginal cost and marginal benefit of the policies 1 2 3 4 5 6 7 8 9 10 Which expression is equivalent to (x Superscript one-half Baseline y Superscript negative one-fourth Baseline z) Superscript negative 2?StartFraction x Superscript one-half baseline Over y z squared EndFractionStartFraction x Superscript one-half baseline Over y Superscript one-fourth Baseline z squared EndFractionStartFraction y Superscript one-half Baseline Over x z squared EndFractionStartFraction x z squared Over y Superscript one-half EndFraction Help me pls with showing work ill give brainliest find the excluded values The proof that QPT QRT is shown.Given: SP SRline segment Prove: QPT QRTTriangle P Q R is shown. Angle P Q R is cut by a perpendicular bisector to form midpoint T on side P R. Point S is on line Q S. Lines are drawn from points P and R to point S. Line segments P S and S R are congruent.What is the missing reason in the proof?Statements Reasons1. SP SR 1. given2. ST PR 2. converse of the perpendicular bisector theorem3. PT RT 3. ?4. QT PR 4. ST and QT name the same line.5. QP QR 5. perpendicular bisector theorem6. QPT QRT 6. HL theoremdefinition of perpendicular bisectordefinition of congruencereflexive propertysubstitution property biologically significant fatty acids usually have . a. an odd number of oxygen atoms b. an odd number of oxygen atoms and an odd number of carbon atoms c. an odd number of carbon atoms d. an even number of carbon atoms A company sells widgets where the cost per unit of labor is$w, and the cost of capital is$r. The company's production technology is given the following Cobb-Douglas functionQ=KaLbwhereQis number of widgets produced, whileKis the amount of capital used, andLis the total amount of labour employed. 3USI2055-E1 3 BUSI2055-E1 (a) Using the Lagrangian multiplier method, what is the cost minimizing quantity of capitalK, and labourLgivenQ=Q? (b) Assume thata=b=1,w=2,r=8, andQ=100. Using the Lagrangian multiplier, estimate the increase in cost (in terms of percentage) when production rises from 100 to 102 widgets. should there be more stages of ultra instinct than mastered ultra instinctif not what new forms should he have. I am lost and I really don't understand this. Opium was introduced in China by theBritishJapaneseItaliansFrench which type of volcano is made from low viscosity lavas that can flow long distances? what do you do find the last time a heroin addict has been convicted of two counts of felony theft for stealing packages off of porches to support his habit. which of the following is not a common justification for sentencing this type of offender to community corrections rather than prison or jail? Individuals convicted under the Anti-Bribery Convention of the Organization for Economic Cooperation and Development will most likely be required to ________. Which two statements correctly associate a body of water with a geographic feature? CHOOSE TWO.The Tigris River is located on the Peloponnesian peninsula.The Mediterranean Sea borders the Italian Peninsula.The Tyrrhenian Sea surrounds the Peloponnesian peninsula.The Tiber River is located on the Italian Peninsula.The Aegean Sea borders the Iberian Peninsula. which data collection technique would be the most effective way of investigating the relationship between political preferences and the economic status of north americans? Rectangle PQRS has vertices at P(-3, 5), Q(8, 5), R(8, 0) and S. The coordinates of point S areResponses #2Scientists determined that excess fertilizer from a pig farm entered a shallow lake. The fertilizer initially caused anincrease in aquatic plants in the lake. However, as the plants died and decomposed, there was a decrease in oxygenlevels in the water. The intensity at which a fish species is affected by oxygen levels in the water varies. Trout are thefirst to feel the effects at oxygen levels below 5.0 parts per million. Carp been able to survive levels down to about 1.0ppm for extended periods.What will most likely happen to the trout and carp populations in the lake if low oxygen level,or hypoxia, continue over an extended period? Explain using the concepts of range oftolerance and abiotic factors. What does it mean to have Gram-positive cocci?