imagine a designer finishes a client project and wants to write a case study. they draft a case study that describes their role in the project, the goal of the project, and the target user. they also add sketches and wireframes, and their polished designs. what critical components are missing from the case study? select all that apply.

Answers

Answer 1

The critical components are mission from the case study is d. The research conducted and research findings

The case study is a vital insight for the clients. The designer write case study to tell to the clients how the work must be done and how they handle the work.

The critical component of case study is the most important component in case study which if this component is missing, the case study will not give the expected results and it can make the client have bad perception about the designer.

Since case study is a short written about how designer work so the critical component is the role in project, the goal of project, the target user, and the research finding and research conducted.

The research needed because it will inform about situation in case study and the project. So, this is a part of critical component.

You question is incomplete, but most probably your full question was

Imagine a designer finishes a client project and wants to write a case study. They draft a case study that describes their role in the project, the goal of the project, and the target user. They also add sketches and wireframes, and their polished designs. What critical components are missing from the case study?

a. The key challenges or constraints the designer faced

b. The designer’s learnings during the design process

c. The designer’s thoughts on how the design could be improved

d. The research conducted and research findings

Learn more about case study here:

brainly.com/question/3894201

#SPJ4


Related Questions

rita has been given a task of writing the multiples of 7 from 70 to 140 . What statements should she write to display these on the QB64 screen ?

Answers

Answer:

....

Explanation:

Please help! Answers that do not relate to this topic will be REPORTED!
A. What do input and output have in common?
1. the characteristic of being modal
2. the ability to be either relative or absolute
3. unidirectional flow of data and sequential access


B. Which of these is NOT a level at which reading and writing of data can take place?

1. characters

2. bytes

3. paths

4. fields


C. If a program closes abnormally, where may information be retained?
1. in a buffer
2. in a socket
3. in a modal window


D. Fill in the blank with the correct response.

If one is reading and writing objects to a file, one is making use of ______, which is a simplified process in Java.

Answers

Answer:

answer for number A is

2. the ability to be  either relative or absolute

B. 2 bytes

C. in a buffer

Explanation:

the type of secondary storage device that uses rigid metallic platters to store programs and very large data files.

Answers

The type of secondary storage device that uses rigid metallic platters to store programs and very large data files is a hard disk.

Hard disks use rigid metallic platters that provide a large amount of storage capacity. They store data and programs by altering the electromagnetic charges on the platter's surface. Hard disks are typically used to store programs and very large data files , and are often used as the primary storage device in a computer system.

A hard disk is a non-volatile storage device used to store digital data. It contains one or more spinning platters that are coated with magnetic material. When the disk spins, a read/write head moves across the platters, which can magnetically read and write data. Hard disks are used for long-term storage of large amounts of data, and are typically much larger than other storage devices like RAM, USB flash drives, and solid-state drives. Hard disks are also relatively inexpensive and are often used in computers, laptops, and other devices for long-term storage.

Learn more about hard disk:

https://brainly.com/question/28476555

#SPJ4

Which of the following is a key difference in controls when changing from a manual system to a computer system?A. Internal control objectives differ.B. Methodologies for implementing controls change.C. Internal control principles change.D. Control objectives are more difficult to achieve.

Answers

"Methodologies for implementing controls change"is a key difference in controls when changing from a manual system to a computer system. The correct answer is B.

When changing from a manual system to a computer system, the key difference in controls is the methodology for implementing those controls. In a manual system, controls may be implemented through procedures, forms, and physical security measures. In a computer system, controls may involve access controls, authentication, encryption, backups, and audit trails, which are implemented using software and hardware controls.

While the internal control objectives and principles remain the same, the specific controls needed to achieve those objectives and principles may differ when transitioning to a computer system. Additionally, control objectives may become more challenging to achieve due to the increased complexity and potential for errors in computer systems.

The correct answer is B.

You can learn more about computer system at

https://brainly.com/question/22946942

#SPJ11

During active listening, which response is NOT an example of providing feedback to the speaker to show that you understand his or her thoughts?
A.
nodding your head
B.
turning your back to the speaker
C.
saying, "You're saying that his reaction made you feel appreciated?"
D.
saying, "Sorry to interrupt, but can you explain that part again?"

Answers

Answer:

The answer is D.

Explanation:

They/you are asking the speaker to clarify what they just said.

Answer:

B. turning your back to the speaker

Explanation:

"A mobile app platfrom to collabarate barber and customer" adding this to 4p analysis and describe it .....

Answers

The mobile app platform for barber-customer collaboration offers a convenient, efficient, and digital solution to connect barbers and customers.

By leveraging the 4P analysis, we can understand its product features, pricing strategies, digital presence, and promotional efforts to foster successful adoption and usage among the target audience.

Adding the mobile app platform to the 4P analysis framework, we can analyze the "collaboration between barbers and customers" concept as follows:

Product: The mobile app platform serves as the product in this analysis. It provides a digital platform that facilitates collaboration between barbers and customers. The app offers features such as appointment scheduling, service selection, communication tools, and feedback/rating systems. It aims to enhance the overall barber-customer experience, convenience, and efficiency.

Price: The pricing aspect of the mobile app platform depends on various factors, including the business model chosen. It could involve different pricing models such as a commission-based model where the platform charges barbers a percentage of their earnings or a subscription-based model where barbers pay a fixed fee to access the platform's features. Additionally, the app might allow customers to pay for services directly through the platform or offer promotional discounts or loyalty programs.

Place: The mobile app platform operates in the digital space, making it accessible to both barbers and customers through their smartphones or tablets. It transcends geographical limitations and enables collaboration between barbers and customers regardless of their physical location. The platform can target specific regions or expand its services globally based on the market demand and scalability.

Promotion: To promote the mobile app platform, marketing strategies can be employed. This may include digital advertising, social media campaigns, influencer collaborations, search engine optimization (SEO), and word-of-mouth referrals. Highlighting the benefits of easy booking, efficient communication, personalized experiences, and reliable service quality can attract both barbers and customers to use the platform.

Know more about 4P analysis here:

https://brainly.com/question/30608999

#SPJ11

Question 14 of 25
A computer programmer will often use a
by other programmers.
, which includes code written

Answers

A computer programmer often uses a programming language to write code that other programmers can understand and utilize.

How is this so?

Programming languages provide a set of syntax and rules that allow programmers to create software and applications.

By using a standardized programming language, programmers can communicate their ideas effectively and share code with others.

This promotes collaboration,reusability, and efficiency in software development, as code can be easily understood, modified, and built upon by different programmers.

Learn more about computer programmer at:

https://brainly.com/question/29362725

#SPJ1

which property of information security is most often affected by the sabotage or destruction of property?

Answers

The property of information security that is most often affected by the sabotage or destruction of property is availability.

Availability is one of the three key pillars of information security, along with confidentiality and integrity. Availability refers to the ability of authorized users to access information when they need it. When property is sabotaged or destroyed, it can prevent authorized users from accessing the information they need, thus affecting the availability of that information.

It is important to note that information security is not just about protecting information from unauthorized access, but also ensuring that authorized users can access it when they need to. Without availability, information security cannot be fully achieved.

Learn more about security here: https://brainly.com/question/25720881

#SPJ11


What types of customizations have you or would you make to your operating system, and why?

Answers

Answer:

Explanation:

I have made a couple of customizations to my OS, which is Windows 10. The first being that I activated dark mode, this feature turns the entire OS into a dark-themed color, including apps and menus. This makes using the computer for extended hours much easier on the eyes. The other very important customization I added was a hover taskbar. This allows me to add many important shortcuts to the taskbar which all appear when I hover over the taskbar. It makes my desktop much cleaner and I have quick and easy access to my most important applications.

Submit your definitions for the words below:

gigabyte
intranet
pixel
telecommunication
modem
raster graphic
vector graphic
digital
GUI

Answers

Answer:

1. gigabyte- Technology branded as GIGABYTE or sometimes GIGA-BYTE; formally GIGA-BYTE Technology Co., Ltd. it is a Taiwanese manufacturer and distributor of computer hardware. Gigabyte's principal business is motherboards.

2. intranet-a computer network for sharing information, collaboration tools, operational systems, and other computing services within an organization, usually to the exclusion of access by outsiders.

3.  pixel-a minute area of illumination on a display screen, one of many from which an image is composed.

4. telecommunication-the transmission of information by various types of technologies over wire, radio, optical or other electromagnetic systems.

5. modem- a  combined device for modulation and demodulation, for example, between the digital data of a computer and the analog signal of a phone line.

6. raster graphic-In computer graphics and digital photography, a raster graphic or bitmap image is a dot matrix data structure that represents a generally rectangular grid of pixels (points of color), viewable via a bitmapped display (monitor), paper, or other display medium.

7.  vector graphic-computer graphics images that are defined in terms of points on a Cartesian plane, which are connected by lines and curves to form polygons and other shapes.

8.  digital-expressed as series of the digits 0 and 1, typically represented by values of a physical quantity such as voltage or magnetic polarization.GUI-a system of interactive visual components for computer software.

9. GUI- displays objects that convey information, and represent actions that can be taken by the user. The objects change color, size, or visibility when the user interacts with them.punineep and 15 more users found this answer helpful4.0(6 votes)

Explanation:

On a piano, a keyu has a frequency, say fo. EACH HIGHER KEY (BLACK AND WHITE) HAS A FREQUENCY OF (F0) * r ^n , where n is the distance ( number of keys) from that that key, and r is 2^(1.0/12.0). Given an inital key frequency, output that frequency and the next 4 higher key frequencies. EX: IF THE INPUT IS 440 , THE OUTPUT IS in coral language

Answers

Answer:

// Program is written in Coral Programming Language

// Comments are used for explanatory purpose

// Program starts here

// Variable declaration

float f0

int numkey

//Prompt user for input

Put "Enter Initial Key Frequency: " to output

f0 = Get next input

//Initialize number of keys

numkey = 1

//Print first key frequency

Put "Key Frequencies: " to output

Put f0 to output

put " " to output

for numkey = 1; numkey <= 4; numkey = numkey + 1

  //Calculate next frequency

  f0 = f0 * RaiseToPower(2,(1.0/12.0))

  //Print Frequency

  Put f0 to output

  Put " " to output

//End of Loop

//End of program

Explanation:

Line 1 to Line 4 are comments

Line 5 and 6 are for variable declarations;

On line 5, variable f0 is declared as float

On line 6, variable numkey is declared as integer

Line 7 is a comment

Line 8 prompts user for input

On line 9, the user input us saved in variable f0

Line 11 initialized numkey to 1

Line 13 prints the string "Key Frequencies: " without the quotes

Line 14 prints the value of f0

Line 15 prints a blank

So, if for instance f0 = 440

Line 14 and 15 will print "440 " without the quote

Take note of the space after 440

Line 16 to 22 calculate and print the next 4 frequency using the given formula

which of the following are true about wpa3? (choose all that apply.) a. uses tkip b. requires pmf c. backward compatible d. strongest wireless encryption standard e. has only the enterprise variation

Answers

It requires PMF, backward compatible, and strongest wireless encryption standard. The correct options are b, c, and d.

What is WPA3?

The third version of the Wi-Fi Alliance's security certification procedure is called WPA3, or Wi-Fi Protected Access 3.

The most recent version of WPA2, which has been in use since 2004, is WPA3. In 2018, the Wi-Fi Alliance started certifying goods that had been WPA3-approved.

It requires the strongest wireless encryption standard, PMF, and backward compatibility.

Thus, the correct options are b, c, and d.

For more details regarding WPA3, visit:

https://brainly.com/question/30353242

#SPJ1

Mention 2 precautionary
measures to be observed
when using ICT tools​

Answers

Answer:

ICT is the abbreviated form of Information and Communication. It included different technologies like mobile phones, computers, USBs etc.

Following are two precautionary measures which should be observed when using any kind of ICT:

Use of Antivirus: It can used to protect anything placed inside the technology especially from hacking and viruses which can create many issues.Backup Data: Creating a backup of the data stored in the device is important as it can be recalled when the device malfunctions. Backup of the data can be created through using USBs, CDs etc or through cloud storage

explain why it is safer for administrators to use two different accounts when working with a computer.

Answers

Using two different accounts for administrators is considered a best practice in computer security, as it helps to minimize security risks and enhance the overall security posture of a computer system.

What is administrators in computer system?

In a computer system, an administrator is a user with special privileges and permissions that allow them to manage and control various aspects of the system, including software and hardware configurations, user accounts, security settings, and data management.

Using two different accounts for administrators when working with a computer can enhance security in several ways:

Separation of duties: By using two separate accounts, administrators can ensure that their administrative tasks and daily work tasks are performed from different accounts, reducing the risk of accidental changes or deletions.Least privilege: When administrators use a separate account for administrative tasks, they only have the necessary privileges and permissions for that specific task, reducing the risk of unauthorized access to sensitive information.Audit trail: By using separate accounts, administrators can keep a clear record of who performed specific actions and when, making it easier to track and investigate any security incidents.Reduced risk of malware: Using a separate account for administrative tasks helps reduce the risk of malware infections, as it minimizes the number of applications running with administrative privileges, which are a prime target for malware.

Learn more about administrators in computer system click here:

https://brainly.com/question/28008806

#SPJ4

A broadcast network is one in which a transmission from any one attached station is received by all other attached stations over a shared medium. Examples are a bus-technology local area network, such as Ethernet, and a wireless radio network. Discuss the need or lack of need for a network layer (OSI layer 3) in a broadcast network.

Answers

Answer:

In a broadcast network such as radio network for example a walkie talkie, the broadcasted transmission is received equally by all receivers indiscriminately which may lead to dissemination of classified information to an unauthorized receiver, therefore, the network layer is required is needed to ensure proper routing of the information

Similarly, when the all the broadcasters in one location are each trying to send messages to different receivers at another given location, there would be potential for network congestion and it would be difficult to send information through the network

When there is need for priority service the presence of a network layer is needed in the network

However, when the above functions performed by the network layer is not required, then, the network layer can be excluded, such as the communication between layers 4 - 7 of the OSI model

Explanation:

Write and register an event handler that adds the class subtle to the h2 tag on mouseenter.

Answers

To register an event handler that adds the class "subtle" to the h2 tag on mouseenter, you can use JavaScript.

Here's an example of how you can achieve this:

// Get the h2 element

const h2Element = document.querySelector('h2');

// Create the event handler function

function handleMouseEnter() {

 // Add the "subtle" class to the h2 element

 h2Element.classList.add('subtle');

}

// Register the event handler

h2Element.addEventListener('mouseenter', handleMouseEnter);

In this code, we first select the h2 element using the querySelector method. Then, we define the handleMouseEnter function that adds the "subtle" class to the h2 element using the classList.add method.

Finally, we register the event handler using the addEventListener method, specifying the event type as "mouseenter" and passing in the handleMouseEnter function as the event handler.

Read more about JavaScript here:

https://brainly.com/question/22572418

#SPJ1

A 4"x6" photo is digitized using 10,000 pixels. An 11"x7" photo is digitized using 30,000 pixels. Which image will have the better resolution?
the 11"x7" photo

the 4"x"6 photo

the photos will have the same resolution

Answers

An image which will have the better resolution is: A. the 11"x7" photo.

What is a camera lens?

A camera lens can be defined as a transparent optical instrument that is used in conjunction with a digital camera, so as to refract rays of light coming into the lens.

What is a resolution?

A resolution can be defined as the number of pixels that are contained in an image (picture or photo) or on a display monitor of a computer system such a laptop.

In this scenario, we can infer an logically deduce that an image which will have the better resolution is the 11"x7" photo because it has a higher number of pixel (30,000 pixels) than the 4"x"6 photo.

Read more on resolution here: https://brainly.com/question/14294025

#SPJ1

counseling is considered urgent crisis counseling

Answers

Answer:

yes

Explanation:

why is it important to use safe hand tool?​

Answers

Safe tool use contributes to a safer, more efficient work environment.
Using one is safer, hence the name, and can prevent serious injuries you could get without using it

Write a program that has three classes. GymMember, VIPMember, DiscountedMember.
Put a private int into the GymMember class called membershipFee. private int membershipFee
Create a method in in all three classes called public void payFeeAmount()
A VIPMember pays $30 more a month for a membershipFee. A DiscountedMember pays $20 less per month for a membershipFee. The normal membershipFee is $50 a month.
You must use the super method in your VIPMember and DiscountedMember constructors.
Write your classes so that they will compile with the given code: public class Main { public static void main(String args[]) { GymMember regularMember = new GymMember (50); GymMember VIPMember = new VIPMember (50); GymMember cheapMember = new Discounted Member (50); System.out.println(" Regular="+regularMember.payFeeAmount()); System.out.println(" VIP="+VIPMember.payFeeAmount()); System.out.println(" Discounted="+cheapMember.payFeeAmount()); } } ant Java Declaration Console xd> Main [4] |Java Application Volumes/clipsEclipse.app/Contents/Eclipse/plugins/org.eclipse.just.oparjdk.hotspot.jre.ful.macosx.x86_64_16.01.20210528-1205)/bi(java (Sep 2021, 10:11:08 AM-10:11:09 AM Regular 50 VIP=80 Discounted=30

Answers

Here's the program that has three classes. GymMember, VIPMember, and DiscountedMember:

method in in all three classes are called public void payFeeAmount()

import java.util.*;

class GymMember{

   private int membershipFee;

   public GymMember(int membershipFee){

       this.membershipFee = membershipFee;

   }

   public void payFeeAmount(){

       System.out.println(this.membershipFee);

   }

}

class VIPMember extends GymMember{

   private int membershipFee;

   public VIPMember(int membershipFee){

       super(membershipFee);

       this.membershipFee = membershipFee + 30;

   }

   public void payFeeAmount(){

       System.out.println(this.membershipFee);

   }

}

class DiscountedMember extends GymMember{

   private int membershipFee;

   public DiscountedMember(int membershipFee){

       super(membershipFee);

       this.membershipFee = membershipFee - 20;

   }

   public void payFeeAmount(){

       System.out.println(this.membershipFee);

   }

}

public class Main{

   public static void main(String args[]){

       GymMember regularMember = new GymMember(50);

       GymMember VIPMember = new VIPMember(50);

       GymMember cheapMember = new DiscountedMember(50);

       System.out.print("Regular = ");

       regularMember.payFeeAmount();

       System.out.print("VIP = ");

       VIPMember.payFeeAmount();

       System.out.print("Discounted = ");

       cheapMember.payFeeAmount();

   }

}

When you run the program, you get the following output:

Regular = 50

VIP = 80

Discounted = 30

Learn more about classes and method from the given link

https://brainly.com/question/20216706

#SPJ11

write the step by approach to re saving a document using the save as option

Answers

Press save as and then choose your location to save it and then click save

9.
Write an application that computes and displays the day on which you become (or
became) 10,000 days old. Save the application as Ten ThousandDaysOld.java.
TI

Answers

Answer:

Explanation:

The following code is written in Java and it asks you for your age and then prints out the exact date from your birthday that you will turn 10,000 days old.

import java.util.Calendar;

import java.util.Date;

import java.util.Scanner;

public class Main {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("What is your age?");

       int age = in.nextInt();

       int daysLeft = (10000 - (age*365));

       Date birthday = new Date();

       Calendar cal = Calendar.getInstance();

       cal.setTime(birthday);

       cal.add(Calendar.DATE, daysLeft);

       Date modifiedDate = cal.getTime();

       System.out.println(modifiedDate);

   }

}

Which of the following statements represents the pros and cons of Internet regulations?

Which of the following statements represents the pros and cons of Internet regulations?

Answers

Answer:

Internet regulations increase net security but lead to monopolizing of services.

Explanation:

Internet regulations can be defined as standard rules or laws that restricts or control the use of the internet, as well as stating the acceptable usage of the internet in a particular location.

The pros and cons of Internet regulations is that, Internet regulations increase net security through the use of encryption and authentication proceses but lead to monopolizing of services.

A monopoly is a market structure which is typically characterized by a single-seller who sells a unique product in the market by dominance. This ultimately implies that, it is a market structure wherein the seller has no competitor because he is solely responsible for the sale of unique products without close substitutes. Any individual that deals with the sales of unique products in a monopolistic market is generally referred to as a monopolist.

For example, a public power company is an example of a monopoly because they serve as the only source of power utility provider to the general public in a society.

Answer:

Regulatory practices provide more security for the consumer but may create monopolies in the industry, reducing consumer choice.

Explanation:

edg2021

Internet regulations increase net security but could lead to monopolizing of services.  Properly done, Internet regulations benefit industry, government, and consumers by providing more online security, regulating prices for services, and decreasing liability. However, some regulations could also lead to unfair service practices, slow technological advances, and possibly contribute to technology monopolies.

4
Select the correct answer from the drop-down menu.
Which two technologies support the building of single-page applications?
and
are two technologies helpful in building single page applications.
Reset
Next

4Select the correct answer from the drop-down menu.Which two technologies support the building of single-page

Answers

Answer:

DROP DOWN THE MENUS PLEASE SO WE CAN ACTUALLY ANSWER THE OPTIONS!!

Explanation:

We need to see the questions please!  (  :

Answer:

Angular JS

and

React

Explanation:

I got it right lol

in an sql statement, which of the following parts states the conditions for row selection? in an sql statement, which of the following parts states the conditions for row selection? (a) Where (b) From (c) Order By (d) Group by

Answers

The part that states the conditions for row selection in an SQL statement is the "WHERE" clause.

What is the purpose of the "WHERE" clause in an SQL statement?

The "WHERE" clause in an SQL statement is used to specify the conditions for row selection from a table. It allows you to filter the rows based on specific criteria, such as column values meeting certain conditions or comparisons. The "WHERE" clause comes after the "FROM" clause, which identifies the table or tables involved in the query. By using logical operators like "AND" and "OR" within the "WHERE" clause, you can construct complex conditions for row selection. The conditions can include comparisons (e.g., equals, not equals, greater than, less than), pattern matching using wildcards (e.g., LIKE operator), and checking for null values (e.g., IS NULL operator). The "WHERE" clause enables you to retrieve only the rows that meet the specified conditions, making your queries more precise and targeted.

Learn more about: "WHERE"

brainly.com/question/29795605

#SPJ11

Which of the following numbers might this code generate: random.randint(1,9)?

0
10
11
1

Answers

Answer:

1

Explanation:

In Python programming language, the random.randint function is an abbreviation for random integers.

Basically, the random.randint is used for generating or creating a random integer numbers.

The syntax for this code can be written as;

A = random.randint(1,9)

Print ("Random number between 1 and 9 is % s" % (A))

Note, the numbers between 1 and 9 are 1, 2, 3, 4, 5, 6, 7, 8 and 9.

From the answer choices given (0, 1, 10 and 11), the only number that matches the requirement is 1.

Therefore, the number this code random.randint (1,9) might generate is 1.

What is one advantage of top-down programming design?

Answers

Answer:

programing design results in many Salary. it starts from 40000

Answer:

(D) It presents a solution from start to finish.

Explanation:

there are four layers to ios, the operating system used by iphones, ipods, and ipads. the __________ layer is how applications interact with ios.

Answers

Answer:

core layer

Explanation:

iOS has four abstraction layers: the Core OS layer, the Core Services layer, the Media layer, and the Cocoa Touch layer.

hopefully this helps u out :)

Which of the following is not a characteristic of a large database?
a) Optstore items in a filing cabinet.
b) Stores items in a computer such as music.
c) stores large amounts of items such as an online store.
d) can be used as a small recipe book.​

Answers

C is the correct answer

What has global css rulesets of an angular 8 project mcq.

Answers

In order to conserve the angular momentum, Angular speed (w) often increases. The 'none of the above' option has global CSS rulesets of an angular 8 project mcq.

The angular momentum of a rigid object is known as the product of the moment of inertia and the angular velocity.

Angular speed is described as how quickly an object rotates. it is seen as the change in the angle of the object per unit of time.

See full question below

What has global CSS rulesets of an angular 8 project mcq.

A. e2e

B. None of the above

C. App

D. node_modules

Learn more from

https://brainly.com/question/24336703

What has global css rulesets of an angular 8 project mcq.
Other Questions
Identify the total number of molecules in the chemical formula: 6CH4 a 6 b 10 c 24 d 30 Calculate the volume (in milliliters) occupied by a 0.327 g sampleof CO2 gas at 22.5 degrees Celsius and 755 torr. what is the sum? complete the equation 3 1/7 + (-5 4/7) The strategy in which you learn something by repeating it over and over is called a. revision c. reduction b. relearning d. repetition he home health nurse is preparing to hang an iv bag of total parenteral nutrition (tpn) on a client. at what rate should the nurse set the iv infusion pump? round to the nearest whole number. answer in numbers and decimals only. what's the value of x Which two of the calculations give the same answer?12 31.4 +2.61.4 x 32.1+2.4 Does anyone know to code for 2. 12. 5 four corners in Codehs will mark brainliest Who declared Christianity the official religion of the Roman Empire?A.NeroB.TheodosiusC.ConstantineD.Diocletian john and alisha randomly met each other at the local movie theater. which factor will most likely affect their first impression of each other? please choose the correct answer from the following choices, and then select the submit answer button. answer choices personality intelligence physical attractiveness sincerity Many American Indian tribes practiced assimilation, which meant theyshared their culture with white settlers.discarded white American culture entirely.abandoned their own cultures entirely.adopted white American culture as their own. what does career advancement mean?a. trying out different jobs that are unrelatedb. staying in one cluster and getting a job with more responsibilityc. staying with the job because you like itd. going to college to get a degree for your career n addition to testing shmoo formation in the two mutant strains of yeast, the scientists also tested shmoo formation in wild-type yeast. what is the purpose of including wild-type yeast cells in the experiment? in addition to testing shmoo formation in the two mutant strains of yeast, the scientists also tested shmoo formation in wild-type yeast.what is the purpose of including wild-type yeast cells in the experiment? to show normal shmoo formation under the experimental conditions to show what happens to shmoo formation when both fus3 kinase and formin are absent to allow the scientists to see the interaction between fus3 kinase and formin to show the difference between symmetrical and asymmetrical growth What unique property of water allows for some insects to "walk" on water 2 pointsand not sink? *AdhesionCohesionSpecific HeatSurface Tension Which of these is a complex number?A. 8/3 + sqrt-7/3B. 9+3 sqrt5 /2C. 2- 1/sqrt11D. 5 sqrt1/3 - 9/sqrt7 Poorer countries are more likely than wealthier countries to a. promote equality of opportunity. b. ensure equal access to education. c. experience civil war. d. have government programs to help the homeless. 8. At track practice, a student runs around an oval shaped 400 meter long track 4times. Determine the distance and displacement of the student. What is living things reproduction? If you want another good app for math I suggest Conects what is the simplest form of 180/200