which air carrier personnel are required to carry an faa airman certificate on his/ her person when performing the tasks which require the certificate?

Answers

Answer 1

Technicians, dispatchers, and cockpit crew. a person knowledgeable in a particular technical discipline or in mechanical or industrial processes. a person employed to perform practical work in a laboratory, technical school, or scientific facility.

A technician is an employee in the technology industry who possesses the necessary ability and technique as well as a practical comprehension of the theoretical underpinnings. Technicians are knowledgeable workers who are found in practically every field. Different systems and pieces of equipment are repaired, installed, replaced, and serviced. Technicians should be able to comprehend instructions and speak well because they frequently collaborate with other skilled individuals. Engineers are in charge of planning and implementing projects, whereas technicians are the "doers" and have the duty of finishing projects. Engineers must be able to recognize problems and come up with ways to repair them, whereas technicians only need to implement the solutions.

Learn more about Technicians here

https://brainly.com/question/7199470

#SPJ4


Related Questions

let f(n) and g(n) be positive and asymptotically increasing functions. prove: (f(n) g(n))/2 =⇥(max {f(n),g(n)}), using the definition of ⇥.

Answers

Given, f(n) and g(n) are positive and asymptotically increasing functions.To prove : (f(n)g(n))/2 =⇥(max {f(n),g(n)}), using the definition of ⇥.( )⇥( ) is defined as follows:If the ratio of two non-negative functions is bounded above by a constant c, then they are asymptotically equivalent i.e.:

if f(n)/g(n) <= c, then f(n) =⇥(g(n))Using the above definition,(f(n)g(n))/2 <= max {f(n),g(n)}

As, f(n) and g(n) are positive and asymptotically increasing functions,

Therefore, there exists a positive constant k and n₀

such that f(n) >= k and g(n) >= k for all n >= n₀.For max {f(n),g(n)}, let's say f(n) >= g(n) => max {f(n),g(n)} = f(n) and g(n)/f(n) <= 1Now, (f(n)g(n))/2 = f(n)*g(n)/2f(n)*g(n)/2 <= f(n)²/2Using above definition f(n)²/2 =⇥(f(n))Similarly, g(n)²/2 =⇥(g(n))Therefore, (f(n)g(n))/2 =⇥(max {f(n),g(n)})Thus, (f(n)g(n))/2 =⇥(max {f(n),g(n)}), using the definition of ⇥.

Learn more about asymptotically: https://brainly.com/question/28875727

#SPJ11

Does anyone know? If you do please answer.

Answers

whats the question..

What is the value of the variable moneyDue after these lines of code are executed?

>>> numSodas = 2
>>> costSodas = 1.50
>>> moneyDue = numSodas * costSodas

Answers

Answer:

3.0

Explanation:

To understand why there is a blank decimal, we have to understand that when you add multiply or subtract with a float (in python), the result will also be a decimal, even you use a blank decimal in the equation. A circumstance where the output would just plain 3, you would have to put in the following:

>>>int(moneyDue)

To insure it will output an int. However, it does not use that line of code, thus proving the answer is 3.0.

hope this helped :D

Answer:

3.0

Explanation:

edge

can you help me please can you unscramble this words for me
and the word list is on the bottom of the assignment

can you help me please can you unscramble this words for me and the word list is on the bottom of the
can you help me please can you unscramble this words for me and the word list is on the bottom of the
can you help me please can you unscramble this words for me and the word list is on the bottom of the
can you help me please can you unscramble this words for me and the word list is on the bottom of the

Answers

Answer:

1. Accountants and Auditors

2. Financial Managers

3. Teacher Assistants

4. Firefighters

5. Cashiers

6. Dental Assistants

7. Clergy

8. Registered Nurses

9. Computer User Support Specialists

10. Management Analysis

Explanation:

Hope this helps.

May I please have brainliest? :)

100 Points!
Think of a problem in society that could use data to help solve it. Answer the following questions in at least 1 paragraph (5-7 sentences).

What is the problem?
What data would you need to collect in order to gather more information to help solve this problem?
How would you collect this data?
How would the use of a computer help to solve this problem ? (make sure you explain in depth here).

Answers

Answer:

Attached in img below, didn't lke my answer for some reason.

100 Points! Think of a problem in society that could use data to help solve it. Answer the following

Lets computer know what to do when it starts up...
Cpu
Ram module
Rom Chip
Power supply
Hard Drive

Answers

Answer: the answer would be the "Rom chip"

Explanation:

The rom chip controls all aspects of the computer, this is also known as "BIOS" or "basic input/output system"

The system that lets the computer know what to do when it starts up is the Rom Chip. The correct option is C.

What is a ROM chip?

ROM stands for random access memory. This is the name of a chip present in the computer.  This chip stores permanent or semi-permanent information on the computer.

The ROM is the permanent storehouse of the computer. After you close the computer. The ROM store every piece of information that is done on the computer.

So, it will help the computer system to know what to do when it starts up.

There are three types of ROM in the computer:

PROM (Programmable read-only memory) EPROM (Erasable programmable read-only memory) EEPROM (Electrically erasable programmable read-only memory)

Thus, the correct option is C. Rom Chip.

To learn more about ROM chips, refer to the below link:

https://brainly.com/question/14478256

#SPJ2

Discuss the evolution of file system data processing and how it is helpful to understanding of the data access limitations that databases attempt to over come

Answers

Answer:

in times before the use of computers, technologist invented computers to function on disk operating systems, each computer was built to run a single, proprietary application, which had complete and exclusive control of the entire machine. the  introduction and use of computer systems that can simply run more than one application required a mechanism to ensure that applications did not write over each other's data. developers of Application addressed this problem by adopting a single standard for distinguishing disk sectors in use from those that were free by marking them accordingly.With the introduction of a file system, applications do not have any business with the physical storage medium

The evolution of the file system gave  a single level of indirection between applications and the disk the file systems originated out of the need for multiple applications to share the same storage medium. the evolution has lead to the ckean removal of data redundancy, Ease of maintenance of database,Reduced storage costs,increase in Data integrity and privacy.

Explanation:

the teacher has offered to buy 1,000 copies of the cd at a price of $5 each. msi could easily modify one of its existing educational programs about u.s. history to accommodate the request. the modifications would cost approximately $500. a summary of the information related to production of msi’s current history program follows:

Answers

MSI has an opportunity to modify their existing history program to meet the teacher's request for 1,000 copies of the CD.

The teacher has offered to buy 1,000 copies of the CD at a price of $5 each, and MSI can modify one of its existing educational programs about U.S. history to meet this request. The modifications would cost around $500. Here is a summary of the information related to the production of MSI's current history program:

1. The current history program is already developed and in use by MSI.
2. Modifying the existing program to accommodate the request would involve making changes to the content, format, or features of the program.
3. The modifications are estimated to cost approximately $500, which would cover the time and effort required to make the necessary changes.
4. The teacher is willing to purchase 1,000 copies of the CD at a price of $5 each, resulting in a potential revenue of $5,000 for MSI.
5. By accepting the teacher's offer, MSI can generate additional income and potentially increase the reach and impact of their educational program.

In summary, MSI has an opportunity to modify their existing history program to meet the teacher's request for 1,000 copies of the CD. This modification would cost around $500, but the potential revenue from selling the CDs is $5,000. By accepting the offer, MSI can generate additional income and broaden the reach of their educational program.

To know more about program visit:

https://brainly.com/question/33669493

#SPJ11

Select all correct statements below: Group of answer choices A redundant link's switch port will be blocked by STP until needed. An Ethernet network can only have one active path at any time. Both frames and packets are prevented from being retransmitted through a network indefinately due to the TTL feature. STP is used to prevent Ethernet network performance degradation. An IP network can only have one active path at any time.

Answers

Snhahshshshshshhshshshsshhshshshshhs

A customer seeks to buy a new computer for a private use at home.The customer primarily needs the computer to use the Microsoft PowerPoint application for the purpose of practice presentation skills.As a sales person what size hard disc would you recommend and why?

Answers

Answer:

The most common size for desktop hard drives is 3.5 inches,  they tend to be faster and more reliable, and have more capacity. But they also make more noise.

Explanation:

If you are continually deleting and installing programs or creating content, the disc must have good reliability.

Keep in mind that larger hard drives are also a little slower, so it is preferable to opt for two smaller ones. Large hard drives are partitioned so there is no problem gettin

chbdg good performance, but if you put everything on one big disk and it breaks, you will lose everything.

If you buy 2 small disks, check that the motherboard does not limit the speed of a second hard disk.

A one page document that introduces you, your skills and background and asks for an interview is an example of what type of document? career portfolio resume cover letter job application

Answers

Answer:

That would be a cover letter.

Explanation:

Hope this helps!

Cover letter is the type of document, as A one-page document that introduces you, your skills and background and asks for an interview. Hence, option C is correct.

What is a Cover letter?

A cover letter for your job application is one page long and attached. Its purpose is to provide you with a brief overview of your professional background.

A CV gives detailed information about your professional past and educational credentials, whereas a cover letter is a brief document that summarizes your reasons for applying for the job.

Yes, a cover letter should go with your introduction. Give your name, the job you're applying for, and the source of your information. For instance, I'm Henry Candidate and I'm submitting my application for the open Account Manager position listed on LinkedIn.

Thus, option C is correct.

For more information about Cover letter, click here:

https://brainly.com/question/10626764

#SPJ5

what do you need to effectively colaborate

Answers

Answer:

Efficiency. Meetings are an essential element to collaboration but over the years, they’ve gotten a bad rap. After...

Trust. People need to feel safe to give and receive genuinely constructive feedback, be inspired by a common goal,...

Empathy. Every team member has an important part to play. Nevertheless, collaboration...

Explanation:

Select the correct answer from each drop-down menu.
raymond is assigned the task of backing up the data on a web server. however, he has limited storage place on the backup media.. which type
of backup should he choose and how would it benefit him?
raymond should select a(n)- incremental, differential, or full-
backup. the benefit of using this type of backup is that there is-no duplicity in flies, duplicity in files, or fast restoration-


Answers

Raymond should choose an incremental backup, and the benefit is that there is no duplicity in files, optimizing storage space and allowing for fast restoration.

What type of backup should Raymond choose and what is the benefit?

Raymond should select an incremental backup. The benefit of using this type of backup is that there is no duplicity in files.

An incremental backup strategy involves backing up only the files that have been created or modified since the last backup, regardless of whether it was a full or incremental backup. This means that only the changes made since the last backup are stored, reducing the amount of data to be backed up and the storage space required.

By choosing an incremental backup, Raymond can optimize his limited storage space on the backup media. Since only the modified or new files are stored, there is no duplicity in files, meaning that multiple copies of the same file are not stored redundantly. This helps in efficiently utilizing the available storage capacity.

Additionally, incremental backups allow for fast restoration. In case of data loss or system failure, only the latest full backup and the subsequent incremental backups need to be restored, saving time and reducing the overall restoration process.

In summary, selecting an incremental backup allows Raymond to maximize his limited storage space by avoiding duplicity in files, while also providing the benefit of fast restoration when needed.

Learn more about Raymond

brainly.com/question/31358837

#SPJ11

Which field involves the work of an electrical engineer?
a. power generation
b. computers/software
c. electronic /electrical gadgets
d. electrical infrastructure
e. all of these
f. only C and D

Answers

Answer:

Explanation:

All of these options involve the work of an electrical engineer. Electrical engineering is a broad field that covers a wide range of industries and technologies, including power generation, electronics, software, and electrical infrastructure.

HELP ASAP!!!!
What is the difference between your active and passive digital footprints?

Answers

A passive digital footprint is data you leave behind without knowing when using the internet. For example, your IP address, approximate location, or browser history. An active digital footprint is created when you deliberately submit information.

Strings need to be placed in

Answers

Answer:

glue

Explanation:

why do most operating systems let users make changes

Answers

By these changes you most likely are thinking of the term 'Over Clocking'
Over Clocking is used on most Operating Systems to bring the item your over clocking to the max.
Over Clocking; is mostly used for Crypto mining and gaming.

if the current date is march 1, 2023, which javascript statement(s) should you use to set an expiration date for a cookie that is one year in the future?

Answers

To set an expiration date for a cookie that is one year in the future from the current date of March 1, 2023 in JavaScript, you can use the following statement:

var d = new Date();

d.setTime(d.getTime() + (365 * 24 * 60 * 60 * 1000));

var expires = "expires="+ d.toUTCString();

document.cookie = "cookieName=cookieValue;" + expires + ";path=/";

In this statement, we first create a new Date object and set it to the current date and time using the new Date() constructor. Then we set the expiration date of the cookie to one year in the future by adding the number of milliseconds in a day (24 hours) multiplied by the number of days in a year (365) to the current time using the setTime() method.

Next, we convert the expiration date to a UTC string using the toUTCString() method, and store it in a variable called expires.

Finally, we set the cookie by using the document.cookie property and specifying the name and value of the cookie, as well as the expires attribute and the path attribute, which sets the scope of the cookie to the root directory of the website.

To set an expiration date for a cookie that is one year in the future from the current date of March 1, 2023, the following JavaScript statement should be used:

var expirationDate = new Date();

expirationDate.setFullYear(expirationDate.getFullYear() + 1);

document.cookie = "cookieName=value;expires=" + expirationDate.toUT

In JavaScript, cookies can be created and set with an expiration date using the document.cookie property. To set an expiration date for a cookie that is one year in the future from the current date, a new Date object is first created, representing the current date and time. The setFullYear() method is then used to add one to the current year, which sets the year of the expirationDate object to 2024.

To set the cookie with the cookieName and value specified, the document.cookie property is assigned a string that includes the expires attribute followed by the expiration date formatted as a UTC string using the toUTCString() method. This sets the expiration date of the cookie to March 1, 2024, which is exactly one year after the current date of March 1, 2023.

""

Complete question

if the current date is march 1, 2023, which javascript statement(s) should you use to set an expiration date for a cookie that is one year in the future?

a: var expirationDate = new Date();

expirationDate.setFullYear(expirationDate.getFullYear() + 1);

document.cookie = "cookieName=value;expires=" + expirationDate.toUT

b: var expirationDate = new Time();

expirationDate.setFullYear(expirationDate.getFullYear() + 1);

document.cookie = "cookieName=value;expires=" + expirationDate.toUT

""

You can learn more about JavaScript  at

https://brainly.com/question/29846946

#SPJ11

what are some challenges that existing data centers face as they move toward supporting cloud computing? group of answer choices increased it labor costs to manager the cloud environment. greater energy consumption for the same load of applications.

Answers

As long as you have internet connectivity, cloud computing enables you to access resources, data, services, and applications from anywhere.

What is cloud computing?

Simply described, cloud computing is the distribution of computing services over the Internet ("the cloud"), including servers, storage, databases, networking, software, analytics, and intelligence, in order to provide speedier innovation, adaptable resources, and scale economies.

Here are the main challenges facing cloud computing, in brief:

concerns with cyber security.

cost containment and management.lacking in resources or knowledge.Governance/Control.Compliance.managing several clouds.Performance.creating a private cloud.

Here, there are a number of important difficulties that need to be addressed, including lengthy troubleshooting, application unavailability, migration agents, and cutover complexity.

As long as you have internet connectivity, cloud computing enables you to access resources, data, services, and applications from anywhere. Some tools and strategies will enable you to access information even if you are not connected to the internet.

To learn more about cloud computing refer to:

https://brainly.com/question/19057393

#SPJ4

What is a feature of readable code?

A) The code is interesting to read.
B) The code uses meaningful names for variables, procedures, and classes.
C) The code is all aligned to the left margin.
D) The code is as compact as possible to save space.

Answers

Answer:

C) The code is all aligned to the left margin.

Explanation:

Why is storage and important part of the computing process? It must be atleast five sentences.

Answers

Your computer needs storage because the processor needs a place to perform its magic — a scratchpad for mad doodles, if you will. All computers need storage. ... Memory is where the processor does its work, where programs run, and where information is stored while it's being worked on.

And why five sentences?

can someone help me on codehs. its 7.1.5: initials. here is what your supposed to do

Write a function called initials that will take a first and last name and return their initials using the following format:

initials("Tracy", "Turtle")
# => "T.T."
initials("Peter", "Parker")
# => "P.P."

Answers

Answer:

first = input( "What is your first name? " )

last = input( "What is your last name? " )

def initials():

   print ("Your initials are: "+first[0]+"."+last[0]+".")

initials ()

Explanation:

it works when I test but it won't submit. Hope this helps

Following are the program to prints the initials of the input value.  

Program Explanation:

Defining a class Main.Inside the class, a method "initials" is declared that takes two string variables "first, last" in the parameter.Inside the method, a return keyword is defined that uses the charAt method that returns the first character value of the parameters. In the next step, the main method is defined.Inside the main method, a print method is declared that calls initials method that accepts value in the parameter and prints its value.

Program:

public class Main //defining a class Main

{

   static String initials(String first, String last)//defining a String method initials that input two variables in the parameter

   {

       return first.charAt(0)+"."+last.charAt(0)+".";//using charAt method that returns first character value

   }

 public static void main(String[] as) //defining main method

 {

   System.out.println(initials("Tracy", "Turtle"));//using print method that calls initials method that accepts value in parameter

   System.out.println(initials("Peter", "Parker"));//using print method that calls initials method that accepts value in parameter

 }

}

Output:

Please find the attached file.

Learn more:

brainly.com/question/2810164

can someone help me on codehs. its 7.1.5: initials. here is what your supposed to doWrite a function

3 Negative ways of using the Internet​

Answers

Answer:

1. It rots the mind of children

2. It's to too addicting

3. can show bad things.

Explanation:

1. Cyber bullying.
2. Gambling (playing games where you win money)
3. Identity theft, hacking.

When opening and closing a security container, complete the _____.
a. SF 701
b. SF 700
c. SF 702
d. SF 703

Answers

Option c is correct. SF 702 is the answer to this question. SF 702 is used to open and close security containers. Track security containers.

The security container can be opened and closed at any time. However, if possible, security containers should only be opened for privacy and security reasons. Security containers should use all possible safeguards such as guard protection, password protection, fingerprint protection, etc. Standard Form (SF 702) – Security Container Inspection Sheet. A standard form (SF 702 Security Container Sheet) tracks who opens, closes, and inspects security containers containing sensitive information.

SF 702 or "Security Container Check Sheet" is used to record the opening and closing of the data carrier. An area check is carried out in the SF 701 after the daily check is finished. The

SF 702 must be stored and disposed of according to a component records management program. SF 702 will be stored in the NDC until the next conformance inspection by a higher level control center.

Know more about information here:

https://brainly.com/question/29244533

#SPJ4

PLS HELP) Early word processors ran on devices that looked like digital _______?

Answers

i looked it up it just says true

Answer: Typewriter

Explanation:

Electronic typewriters enhanced with embedded software became known as word processors. The Brother-EP20, an early word processor. One example of those machines is the Brother EP-20, which was introduced in 1983. This electronic typewriter featured a small dot matrix display on which typed text appeared.

How are the waterfall and agile methods of software development similar?

Answers

The waterfall and agile methods of software development are similar in that they both aim to develop software in an organized and efficient manner. However, they differ in the approach they take to achieve this goal.

The waterfall method is a linear, sequential method of software development. It follows a defined process with distinct phases, such as requirements gathering, design, implementation, testing, and maintenance. Each phase must be completed before the next phase can begin, and changes to the software are not allowed once a phase is completed.

On the other hand, Agile method is an iterative and incremental approach to software development. It emphasizes on flexibility, collaboration, and customer satisfaction. Agile method encourages regular inspection and adaptation, allowing for changes and improvements to be made throughout the development process. Agile methodologies, such as Scrum and Kanban, follow an incremental approach, where the software is developed in small chunks called iterations or sprints.

Both Waterfall and Agile approach have their own advantages and disadvantages and are suitable for different types of projects and teams. It is important to choose a method that aligns with the specific needs and goals of the project and the team.

Write a white paper or PowerPoint presentation demonstrating that you understand the essential elements of a patch
management program. Evaluate at least three patch management software solutions, recommend one, and describe why
you are making this recommendation
Use the list provided in the lesson as your template and search the Internet for information on patch management
concepts and vendor solutions to help create your plan.

Answers

Answer:

When is this due?

Explanation:

I will write it

what is the system that connects application repositories, systems, and it environments in a way that allows access and exchange of data over a network by multiple devices and locations called?

Answers

The system that connects application repositories, systems, and it environments in a way that allows access and exchange of data over a network by multiple devices and locations is called Cloud integration.

What is cloud data integration?

Into the cloud Data integration involves consolidating disparate data from multiple systems where at least one endpoint is a cloud source.

In a simplified way, we can say that the cloud storage system works via the internet: you send data from your device to remote servers and, in this way, free up internal memory space on your machine and can access your files at any time and from any place.

See more about Cloud integration at brainly.com/question/24918185

#SPJ1

Larry has created a web page using HTML 4.01. He hasn’t included the declaration in the file. When he opens the page in a browser, Larry sees a page load error. Why does Larry need to use the declaration in an HTML file?
A.
to define the HTML version in which the page is written
B.
to define the web language in which the page is written
C.
to tell the browser what the content is
D.
to check whether the code is error-free

Answers

Answer:

To define the html version in which the page is written.

Larry has created a web page using HTML 4.01. He hasnt included the declaration in the file. When he

One way to run a shell script is to make it executable by using the x permission and then typing _____ prior to the script name when you run the script itself. Group of answer choices ./

Answers

Answer:

robuk

Explanation:ummm

Other Questions
The____side of the____controls the right side of the body.a0 A. lefta0 B. righta1 A. cerebruma1 B. cerebelluma1 C. spinal cord PLEASE HELPPP!! I'M STUCK ON THISS 7. In the US, which domestic economic trend accelerated during WWII?a. A decline in the standard of livingb. A reduction in industrial productionC.Greater opportunities for womend. Increased unemployment 75 to its simplest radical form I have a writing assignment due soon, will give brainlyest to best answer!!!The thing they want me to write about is: Write an informative essay on a Greek mythical character. Your essay will use research to summarize the plot of the myth and explain the mythical character's cultural significance. MUST BE AT LEAST TWO PARAGRAPHS!!!!! asey wants to buy some instruments for his niece and nephew. He has $40 to spend. Based on the prices listed below, what is the estimated total, rounded to the nearest dollar? Which explains why he can afford the tambourine and xylophone?Tambourine: $13.95Xylophone $23.50The estimated total to the nearest dollar is $38, so he can afford them.The estimated total to the nearest dollar is $37, so he can afford them.The estimated total to the nearest dollar is $36, so he can afford them. The estimated total to the nearest dollar is $37.45, so he can afford them. What is the area of the triangle abc? the shop keeper at an inn receives 175 letters a week (7 days). How many letters does he receive in a day Structure of a NerveMatch the connective tissue component of a nerve with its description.Surrounds a group of fascicles to form a nerve (Click to select) Endoneurium Perineurium EpineuriumSurrounds groups of axons to form fascicles (Click to select) Endoneurium Perineurium EpineuriumSurrounds each axon (Click to select) Epineurium Endoneurium Perineurium A genotype is a person's genetic material or makeup, whereas a phenotype is the person's observable characteristics. True or false Find all of those elements on the periodic table why did james polk believe that slavery would not spread into the new territories acquired from mexico? Asses how a young person could use social media to promote respect for the different rights in the bill of rights?? Match each line with the literary device it demonstrates."Dawn and dangers, our deeds are done.""I was born as free as Caesar. We both have fed as well and canendure the winter's cold as well as he.""Beware the ides of March.""O Error soon conceived, thou never com'st unto a happy birth.""And do you now put on your best attire?And do you now cull out a holiday?And do you now strew flowers in his way?""But men like horses...""All that I live by is with the awl""We are two lions.""A foe to tyrants and my country's friend.""An owl, hooting and shrieking..."Choose...Choose...Choose...Choose...Choose...Choose...Choose...Choose...Choose...Choose...((("((( A cliff diver of 61.0 kg steps off of a cliff 24 m above the ground. Assuming no air resistance, determine the speed of the diver the instant before they reaches the ground. To calculate the variance of a portfolio consisting of 5 stocks, you would need to calculate____variance terms and _____covariance terms.5,5 ; 5,10 ; 25,25 ; 25,10 ; 10,10Consider two perfectly negatively correlated risky securities A & B has expected rate of return of 10% and a standard deviation of 16%. B has an expected rate of return of 8% and a standard deviation of 12%. The risk free portfolio that can be formed with the two securities will earn ___ rate of return.Lets assume you are studying a portfolio that consists of two risky assets. Do you need to know the risk-free rate to determine: (i) the optimal risky portfolio? (ii) the minimum variance portfolio? Point B is between A and C. AC = 42, BC = x + 12, and AB = x +6.Find the value of x. The molar mass of water (HO) is 18.02 g/mol. Yun has 0.025 mol of HO for a laboratory experiment.How many grams of water does she have? The common law developed the law of contract to allow certainty and freedom in commercial dealings. Parliamenthas, however, intervened to ensure that this freedom to contract is not abused"Explain and discuss this statement in particular with regard to:The sources of English law.The necessary ingredients for an enforceable contract; and the rights of persons who are not party to a contract;The exclusion of liability for personal injury. A project screening criterion that allows the company to compare long-term versus short-term projects, projects with different technologies, and projects with different commercial objectives is:__________