what is meant by slide rule?​

Answers

Answer 1

Answer:

a manual device used for calculation that consists in its simple form of a ruler and a movable middle piece which are graduated with similar logarithmic scales.

Explanation:

^


Related Questions

I need answer ASAP. Place the box’s in the correct places

I need answer ASAP. Place the boxs in the correct places

Answers

Answer:

This is the order:

customer

order

accept order

notify kitchen

inventory kitchen

order

customer

i think, i'm sorry

What are the two main types of ad formats you can leverage for your Display campaign?

Answers

The two main types of ad formats for Display campaigns are image ads and video ads. Image ads include static images or animated graphics, while video ads include short videos promoting a product or service.

Image ads are a cost-effective way to create visually appealing and informative ads that can be used to convey a brand message. They come in various sizes and can be placed in different positions on a webpage. On the other hand, video ads are more engaging and can tell a story that can resonate with viewers. They offer a more immersive experience and can be effective in building brand awareness and driving engagement. However, they can be more expensive to produce and may not be suitable for all products or services. Ultimately, the choice between image and video ads depends on the campaign objectives and target audience.

learn more about campaign here:

https://brainly.com/question/14770924

#SPJ11

true/false. In this attack, WLANs are detected either by sending probe requests over a connection or by listening to web beacons. An attacker who discovers a penetration point can launch further attacks on the LAN. Some of the tools that the attacker may use to perform wardriving attacks are KisMAC and NetStumbler.

Answers

True. In a wardriving attack, WLANs are detected either by sending out probe requests over the air or by listening for web beacons.

What is WLANs?

WLANs (Wireless Local Area Networks) are computer networks that use radio waves to provide a wireless connection between different devices. WLANs can be used to connect computers, tablets, smartphones, and other devices to each other, to the internet, and to peripherals such as printers.

An attacker who discovers a weak point within the network can then launch further attacks to gain access to the LAN. Common tools used to perform wardriving attacks are KisMAC and NetStumbler.

To learn more about WLANs
https://brainly.com/question/12929109
#SPJ4

Which wireless protocols would provide the fastest connection with the longest range?

Answers

The wireless protocols that would provide the fastest connection with the longest range are Wi-Fi 6 and 5G.

What is Wi-Fi 6?

Wi-Fi 6 is the most recent Wi-Fi standard, which also known as 802.11ax. Wi-Fi 6 technology delivers faster wireless networking speeds, lower latency, and higher data capacity while also requiring less power than earlier Wi-Fi versions.

It also has the advantage of extending wireless range.What is 5G?5G stands for "fifth generation" wireless technology, which provides lightning-fast speeds and minimal latency. It offers download speeds of up to 20 Gbps, which is around 20 times faster than 4G.

It also allows more simultaneous connections without impacting speed, which means that several people in the same area can use it without slowing down the connection. It has a greater range, which allows it to transmit data over greater distances with minimal attenuation.

Learn more about WIFI at:

https://brainly.com/question/32117578

#SPJ11

which of these is not a capability of the advanced filter tool? a) filter in place b) copy selected records to a new location c) provide pop up filters d) specify the list range

Answers

Pop-up filters cannot be made with the complex filtering tool. A pop-up is a graphical user interface (GUI) display area that appears suddenly in the foreground of a visual interface. It is often a small window.

Which program generates pop-ups on the computer?

Adware, a type of malicious spyware, frequently bombards you with pop-up adverts. It can also track your web activity, record everything you type, and bother you by compiling personal data about you. This essay will go into adware in great detail., a type of malicious spyware, frequently bombards you with pop-up adverts. It can also track your web activity, record everything you type, and bother you by compiling personal data about you. This essay will go into adware in great detail.

A popup is a specific kind of educational or marketing offer that displays above your content and is designed to quickly attract the attention of your visitors. Popups typically include a call to action in an effort to urge your visitor to do the action you desire.

Ad pop-ups are also referred to as pop-ups. Pop-up forms appear on the page at the precise time and location that you specify in advance, as they claim to do. To maximize the form's conversion potential and drive more leads down the funnel, the objective is to capture leads at the most advantageous time feasible by focusing on both timing and placement.

Therefore the correct answer is option c ) provide pop up filters

To learn more about pop up filters  refer to :

https://brainly.com/question/30032577

#SPJ4

One of the distinguishing characteristics of computer-based fraud is that access occurs ________________________. A. Through the Dark Web where the value of the stolen funds can be stored on hidden servers B. In violation of computer internal controls whether by management override or other means C. With the intent to execute a fraudulent scheme or financial criminal act D. When a hacker or virus successfully bypasses the firewall protecting financial data

Answers

Answer:

Option A, Through the Dark Web where the value of the stolen funds can be stored on hidden servers

Explanation:

Content that is available on dark web can not be detected by search engines specially through the traditional browsers or standard browsing technology. Along with that it has tens of thousands of sites and at a time only  certain limited number of sites are available.

Money related frauds are basically driven by this dark web. Criminal enterprises determine personal details through various means and hence can derive your credentials and financial details. The criminal portions of the dark web makes trade in fraudulent information easy and accessible

Hence, option A is correct

Cathy designed a website for a cereal brand. When users view the website, their eyes first fall on the brand name, then they view the bright images on the page. Which design principle is Cathy using?

Answers

Hey there!

I would say the answer to this question is Movement.

If you look at the principles of design the definition of Movement is Movement is the path the viewer's eye takes through the work of art, often to focal areas.

In Cathy's design, it states that when viewers view her website their eyes first fall on the brand name, and then they view the bright images on the page.

Based on the information given you can conclude that the design principle that Cathy used was Movement.

I hope this helps,

Have a great day!

What is the term that is used to mean ensuring that data are not altered during transmission across a network or data storage

Answers

The term that is used to mean ensuring that data are not altered during transmission across a network or data storage is called data integrity.

Data integrity refers to the accuracy, reliability, and consistency of data over its entire lifecycle. The concept of data integrity means ensuring that data is complete, accurate, and consistent throughout its life cycle. This requires controlling the modification of data through data storage and transmission.A data integrity breach can occur if a single bit is missing or altered, causing the entire data set to be corrupt. The purpose of data integrity is to make sure that information remains accurate, complete, and reliable throughout its lifecycle. It's necessary to ensure that data is secured and maintained in a way that reduces risks such as data loss, data breaches, or unauthorized changes.The importance of data integrity can’t be overstated, as it is fundamental to many vital functions of a business such as decision making and business intelligence. Any organization must take necessary measures to maintain data integrity, whether through the use of encryption, backup and recovery procedures, or regular security updates.

To know more about data visit:

brainly.com/question/28346249

#SPJ11

how drone technology can impact recreation and entertainment​

Answers

Drones are become more advanced than ever before. Are now, they are starting to impact recreation. They are small, light, and can maneuver incredibly fast. They are being used in movies, skits, short films, and even high-end videos. Here are some ways drones are changing entertainment:

- Providing high-quality filming, even from 200 feet in the air.

- Reaching spaces where bulky helicopters cannot fit into safely

- Laser shows, where drones shine lights and lasers.

Right now, if you tried to hold your phone still to capture a video, you would not be able to do it. Upon checking the footage, you would see the camera shaking, even if it's just tiny bit. While you can lean it on a surface to fix this, it simply cannot be done in the air to capture. Not to worry, though, you've got drones. They can shoot a steady shot 200 feet in the air. The only thing that could rival drones are expensive, bulky choppers. The drones are cheaper and are mass produced.

However, drones are not only being used to filming movies and films. They are also being used for a different kind of entertainment: Shows. Drones move in formation and shine lights in the night sky, like we saw in the Winter Olympics. They are truly stunning(pics attached).

how drone technology can impact recreation and entertainment

How would be the human life in the absence of technology

Answers

Answer:

Horrible!

Explanation: this is because all of our food would go bad firstly. Refridegerators wouldn't work. Also NO social medie taking away social media  is like cutting off your O2 supply. No phones, no TV, no computers etc... but also our planet would be a better place. No pollution, no batteries harming the enviornment .

Check all of the file types that a Slides presentation can be downloaded as.

.JPEG
.doc
.xls
.PDF
.pptx
.bmp

Answers

Answer:

.JPEG

.PDF

.pptx

General Concepts:

Google

Slides has an option to download a wide multitude of formats

Explanation:

If we go into File, and then under Download, we should be able to see which file types that a Slides presentation can be downloaded as.

Attached below is an image of the options.

Check all of the file types that a Slides presentation can be downloaded as. .JPEG.doc.xls.PDF.pptx.bmp
The answers are:
.JPEG
.PDF
.pptx

Hope this helped :D

select the name, creaturetype, creaturesubtype, gender, and appearance from litcharacters for creatures who have made 5 or more appearances (this includes characters that have made 5 appearances). order ascending by the character id. what is the first entry?

Answers

I'm sorry, but as an  I don't have access to a specific database or its data. Therefore, I cannot retrieve the first entry from the "litcharacters" table as requested.

To obtain the first entry from the "litcharacters" table with the given conditions, you would need to execute a SQL query on the database that contains the table. The query would look something like this:

SELECT name, creaturetype, creaturesubtype, gender, appearance

FROM litcharacters

WHERE appearance >= 5

ORDER BY character_id ASC

LIMIT 1;

Executing this query on the appropriate database would give you the first entry from the "litcharacters" table that meets the criteria of having 5 or more appearances.

Learn more about database here

https://brainly.com/question/24027204

#SPJ11

you plan to deploy the following azure web apps: webapp1, that uses the .net 6 runtime stack webapp2, that uses the asp.net v4.8 runtime stack webapp3, that uses the java 17 runtime stack webapp4, that uses the php 8.0 runtime stack you need to create the app service plans for the web apps. what is the minimum number of app service plans that should be created?

Answers

Since you need to create the App Service plans for the web apps, the minimum number of App Service plans that must be created is option A-1.

How does Azure webapp work?

Without needing to deploy, set up, and maintain your own Azure VMs, you may create an app in Azure using the platform offered by Azure Web Apps. The ASP.NET, PHP, Node. js, and Python may all be used to create web applications. Additionally, they incorporate well-known coding environments like GitHub and Visual Studio.

Microsoft developed and maintains Azure Web Apps, a platform for hosting websites based on cloud computing. It is a platform as a service that enables the publishing of Web apps using several frameworks and different programming languages, including proprietary ones from Microsoft.

Therefore, You can support up to 10 Web Apps by creating one App Service Plan. Any additional use of the other resources is unnecessary and not specified as a prerequisite.

Learn more about  azure web apps from

https://brainly.com/question/28813133
#SPJ1

See full question below

You plan to deploy the following Azure web apps:

WebApp1, which uses the .NET 5 runtime stack

WebApp2, which uses the ASP.NET V4.8 runtime stack

WebApp3, which uses the Java 11 runtime stack

WebApp4, which uses the PHP 8.0 runtime stack

You need to create the App Service plans for the web apps.

What is the minimum number of App Service plans that must be created?

A-1

B-2

C-3

D-4

The library is purchasing Argus TL2530P All-In-One Thin clients. What does it mean that the thin clients are 802.3at compliant?

Answers

In this set up, the servers are workstations which perform computations or provide services such as print service, data storage, data computing service, etc. The servers are specialized workstations which have the hardware and software resources particular to the type of service they provide.

1. Server providing data storage will possess database applications.

2. Print server will have applications to provide print capability.

The clients, in this set up, are workstations or other technological devices which rely on the servers and their applications to perform the computations and provide the services and needed by the client.

The client has the user interface needed to access the applications on the server. The client itself does not performs any computations while the server is responsible and equipped to perform all the application-level functions.

Each server handles a smaller number of thin clients since all the processing is done at the server end. Each server handles more thick clients since less processing is done at the server end.

Learn more about server on:

https://brainly.com/question/29888289

#SPJ1

[4]
) Describe what is involved in the clearing of bank cheques which the bank has collected in the
course of the day.


Plz any answer need it quickly help me if you know

Answers

Answer:

The clearing process begins with the deposit of a cheque in a bank. ... The cheque is passed for payment if the funds are available and the banker is satisfied about the genuineness of the instrument. The cheques that are unpaid are returned to the presenting bank through another clearing called the Return Clearing.

hopes this helps you?????????

Explanation:

Which of the following is a small file that is placed on the computer hard drive of visitors to an organization's site?
a. a cookie
b. a wiki
c. an antivirus
d. a bookmark

Answers

The option which is a small file that is placed on the computer hard drive of visitors to an organization's site is called "Cookie" Opton A)

How does a cookie work ?

A cookie is a small file   that is placed on a visitor's computer hard drive when they access a website.

It is used to store information   about the visitor's interactions with the websiteand can be accessed by the website during subsequent visits.

Users can choose to accept or reject cookies,delete existing   cookies, or configure their browser to prompt for cookie acceptance on each website visit.

Learn more about Cookie at:

https://brainly.com/question/14252552

#SPJ1

Janae started an essay on the computer at school. She would like to work on it when she gets home, but she does not have a flash drive. What technology would allow her to work on the essay on any device as long as there is internet access?

Answers

Answer:

The answer is "Cloud Computing".

Explanation:

The term, cloud computing also is known as accessible on-demand, it uses central computer services through specific active user management, especially for cloud services.

It is used to define storage systems accessible through the Internet for several users.  It offers rapid innovation, scalable resources, or advantages of scale to computing resources, that's why she uses cloud computing technology.

Is the computer a device that calculates and has the independence and initiative for the actions it performs?

Answers

Answer:

The answer is "True".

Explanation:

In this question, the given statement is true because the computer is a device that receives information as input, analyzes information utilizing a program that provides relevant information for the processed data, and in this, it performs numerous calculation and all the calculation will be store in its memory, which is used in the future for collect data on hard drives.

tiny electrical paths to connect everything together is called ? A. graphic card B. audio card C. CPU D. Motherboard

Answers

Answer:

Option C, or the CPU.

Explanation:

The audio card simply translate code into sound, the graphic card turns code into graphics, CPU runs electric through tons of little electric pathways, and the motherboard is the object of which all of the above are rested on and connects them together.

Imagine that you just received a summer job working for a computer repair shop. One of your first tasks is to take apart a computer that is having trouble and identify the problem. Identify and describe several main components that you will find once you open the computer. Do you think all computing devices have these components? Once you fix the problem and put the computer back together again, how will software help the computer turn on?

Answers

Identify main components of a computer, discuss their presence in computing devices, and describe how software helps the computer turn on after a repair.

What is computer?
A computer is an electronic device that can be programmed to accept and process data into information according to a set of instructions. It consists of hardware components such as the CPU, memory, storage devices, input/output devices, and software components such as the operating system and applications.


As a computer repair technician, some main components to identify when opening a computer are the motherboard, CPU, RAM, hard drive, power supply, and cooling system; not all computing devices have the same components. Software such as the BIOS and operating system will help the computer turn on and function properly.

To know more about software visit:
brainly.com/question/1022352
#SPJ1

Please help quick i only have 45 minutes left on this test
Answer choices :

radio link protocol

Bob's fingers

laptop

phone company

radio waves

fire trucks

electric current

dispatcher

sound waves

Please help quick i only have 45 minutes left on this testAnswer choices : radio link protocolBob's fingerslaptopphone

Answers

Answer: phone company, radio link protocol, electric current, sound waves

Explanation: if something is wrong, I'm very sorry

Dumas, who has excellent mechanical aptitude, owns a computer with two hard drives. One
drive is used for the operating system and the other drive is used for his personal files. He
decides to install a third disk in a RAID 1 configuration to protect the disk with his files
against data loss. He is not too concerned about data loss on the disk with the operating
system because he could easily reinstall the OS, so that disk is not included in the RAID
configuration. When he is done, he powers up his computer, no error messages are displayed,
yet he is distraught because all his data is lost. Why would this happen?
O The new drive was smaller than the original drive so the data from the original did not
fit.
O He didn't back up his data. When RAID is configured all data on participating drives is
lost.
O The RAID expansion card is not seated properly so the RAID drives are not being
detected.
Since the new drive had no data, and RAID 1 mirrors data, it erased the data on the
original.

Answers

Answer:

He didn't back up his data. When RAID is configured all data on participating drives is lost.

Explanation:

because i'm asian

He didn't back up his data. When RAID is configured all data on participating drives is lost would this happen. Hence, option B is correct.


What is operating system?

The operating system is the most important piece of software that operates on a computer. It manages the computer's memory, processes, software, and hardware. Using this technique, you can communicate with the computer even if you don't comprehend its language.

Examples of operating systems include Apple macOS, Microsoft Windows, g's Android OS, Linux, and Apple iOS.

All of the hardware and software are under the direction of the computer's operating system. It performs core tasks such handling input and output, controlling files, memory, and processes, and controlling peripheral devices like disk drives and printers.

Thus, option B is correct.

For more information about operating system, click here:

https://brainly.com/question/6689423

#SPJ2

Write a brief reflection paper on Slideshare. What and how will you put it to use in the future? What kind of resources do they have that could help you? Would you ever think about uploading your own resources to Slideshare? How can Slideshare benefit you professionally? How could it benefit you personally?

Answers

SlideShare is a popular online platform where users can upload, share, and view presentations, documents, and videos. It offers a range of resources that can be beneficial both personally and professionally.

In the future, I would put Slideshare to use by utilizing its vast collection of presentations and documents to enhance my understanding of various topics. It provides access to valuable educational materials and expert insights, making it a valuable learning resource.Personally, Slideshare can benefit me by expanding my knowledge and helping me stay updated with the latest trends and developments in different fields. Professionally, it can be useful for creating and sharing presentations that showcase my skills and expertise, establishing credibility within my industry.

SlideShare's resources can help me with research, studying, and gaining insights into different subjects. It also allows users to upload their own resources, which could be a great opportunity to share my knowledge and contribute to the platform's content. By doing so, I can establish myself as an expert in my field and potentially gain recognition from a wider audience.

In conclusion, Slideshare is a valuable platform that offers a wide range of resources that can benefit me both personally and professionally. Its vast collection of presentations, documents, and videos can enhance my learning and provide opportunities for sharing my own knowledge. By utilizing SlideShare, I can stay updated, expand my expertise, and connect with a larger community of learners and professionals.

Learn more about PowerPoint Presentation:

brainly.com/question/14498361

#SPJ11

Which two protocols manage neighbor discovery processes on IPv4 networks? a. ICMP and ARP b. IPv4 and IPv6 c. TCP and UDP d. BGP and OSPF.

Answers

The two protocols that manage neighbor discovery processes on IPv4 networks are ICMP and ARP.

Explanation:

ICMP (Internet Control Message Protocol) and ARP (Address Resolution Protocol) are two protocols used to manage neighbor discovery processes on IPv4 networks.

ICMP is used to diagnose network problems and send error messages. It is also used to discover the IP address of a device on the network.

ARP is used to map an IP address to a MAC address. When a device wants to send a packet to another device on the network, it needs to know the MAC address of the device. ARP resolves the MAC address of a device based on its IP address.

Together, ICMP and ARP manage the neighbor discovery processes on IPv4 networks. ICMP helps devices discover each other's IP addresses, while ARP helps devices map those IP addresses to MAC addresses.

To get similar answer on ICMP (Internet Control Message Protocol):

https://brainly.com/question/27961582

#SPJ11

An ethical hacker is running an assessment test on your networks and systems. The assessment test includes the following items:
•Inspecting physical security
•Checking open ports on network devices and router configurations
•Scanning for Trojans, spyware, viruses, and malware
•Evaluating remote management processes
•Determining flaws and patches on the internal network systems, devices, and servers
Which of the following assessment tests is being performed?
A. Active assessment
B. Passive assessment
C. Internal assessment
D. External assessment

Answers

Answer: Internal assessment

Explanation:

Based on the assessment performed such as the inspection of the physical security, checking open ports on network devices and router configurations and the scanning for Trojans, spyware, viruses, and malware etc, it can be infered that these are related to an internal assessment.

An internal assessment is the finding and the exploitation of vulnerabilities based on the perception of an inside attacker whom possesses a login to the network.

Which statement best describes network security?

Answers

Answer:

B.network security means all personal information is kept safe the network is not compromised and only authorized users had access Im pretty sure they

Explanation:

network security means all personal information is kept safe the network is not compromised and only authorized users had access Im pretty sure they

what is the name of the dark strip along the bottom of the windows environment?
a. navigation bar
b. toolbar
c. taskbar
d. shortcuts menu

Answers

The taskbar is a small strip of icons that appears at the bottom of a computer screen and indicates which windows are open at any one time.

What does a computer taskbar do?

A minimized application is still accessible from the taskbar since it is still displayed on the desktop. They have what is known as desktop presence. Users may see the open primary programs and some auxiliary windows on the computer and rapidly switch between them by using the taskbar.

How come it's called a taskbar?

The phrase "taskbar" in computing refers to the program desktop bar that is used in Windows Xp 95 and later revisions to start and monitor apps. Similar interface components can be found in other desktop environments as well.

To know more about taskbar visit:

https://brainly.com/question/4908632

#SPJ4

What is a software routine that collects information about the devices operation?

Answers

Network management agent is a software routine that collects information about a device’s operations.

Network management is a process that monitors, configures, and manages network performance. As network complexity grows its ability to operate effectively depends upon the quality of network management. A network management agent is software that collects information from the network, network devices like routers and switches can also be used to access information.

Some benefits of effective network management include network visibility, performance optimization, and downtime detection. Network management is very important to ensure service delivery, reliability, and overall performance.

You can learn more about network management at

https://brainly.com/question/27961985

#SPJ4

Question # 10
Dropdown
Complete the sentences describing a computer innovation.
Software and technology that allow people to work together on a task are known as BLANK.
A. game-based learning
B. augmented reality
C. collaboration tools
HELP ME!

Answers

Answer:collaboration tools

Explanation:

Which of the following is NOT a method for applying the SDLC model?
ITIL
Lean
IPO
Agile

Answers

Answer:

IPO is not a mehod for applying the SDLC .

Other Questions
Calculate the pH of a saturated solution of each of the following compounds at 25Ca. Pb(OH)2 (K,,-1.2 10-15) pH = B. Ni(OH)2 (Kn = 1.6 10-16) pH = c. Fe(OH)2 (Kn = 1.8 10-15) pH = Calculate the NPV and IRR without mitigation. Enter your answer for NPV in millions. For example, an answer of 510,550,000 should be entered as 10,55 . Do not round intermediate calculations. Round your answers to two decimal places, NPV: $ million IRR: % b. How should the environmental effects be dealt with when this project is evaluated? 1. The environmental effects if not mitigated could result in additional loss of cash flows and/or fines and penalties due to ill will among customers, community, etc. Therefore, even though the mine is legal without mitigation, the company needs to make sure that they have anticipated all costs in the "no mitigation" analysis from not doing the environmental mitigation. II. The environmental effects should be ignored since the mine is legal without mitigation. III. The environmental effects should be treated as a sunk cost and therefore ignored. IV. The environmental effects if not mitigated would result in additional cash flows. Therefore, since the mine is legal without mitigation, there are no benefits to performing a "no mitigation" analysis. V. The environmental effects should be treated as a remote possibility and shoufd only be considered at the time in which they actualify occur. what is 36 rounded to the greatest place value Maximum s-character is observed ina) Triple bonded carbon atom b) Double bonded carbon atomc) Single bonded carbon atom d) Carbon atom of benzene can any one help me with this Translate the equation 3(g+h)=12 into a sentence. suppose you own stock in national advertising which had earnings of $2.50 per share last year. if yesterday's closing price was $41.50, what is the price-earnings ratio of the stock? What is the major area of research in Antarctica today?climate changehuman demographicssolar energybiodiversitygiving 50 POINTS ASAP What is a flower? Name the whorls of a flower. how to find vertical displacemetn of a charge as it moves along an eletric frield ASAP!!!what is critical to the company Sany's profits and sustainablegrowth??. Please write five sentences! Based on this output table, what is the average coding test score for the beginner coder? coding test score coder status mean n standard deviation advanced 93. 2000 3 5. 00000 intermediate 89. 5000 2. 70711 beginner 73. 3333 3 6. 42910 total 84. 7500 8 10. 51190 Choose the correct form of the verb invitar in the present tense to fill in the blank.You all (formal) _____________ a sus padres a su graduacin. Determine the overall charge on particles with the subatomic makeups given. Why are there not many vaccines for fungal & parasite disease as we have for viral and bacterial disease? the superior co. has preferred stock outstanding that pays a $4.50 dividend annually and sells for $44.58 per share. what is the rate of return? group of answer choices 11.38 percent 8.89 percent 10.09 percent 8.23 percent Find the mean of the sampling distribution of sample means using the given information. Round to one decimal place, if necessary. =51 and =9; n=36 The codon for the amino acid found at the carboxyl-terminus of a polypeptide is located closest to the ___ end of the corresponding mRNA. The following may be observed in the Defensive Stage.A) Marked change in their behavior with increased volume or tone of voiceB) Decreased physical activity and lethargyC) More defensive, less rational behavior, unresponsive to supportive approachD) A and C In the eyes of clients and managers, the most essential public relations task is?