Which one of the following is true about the Publish-subscribe architectural style?

A. Robustness (ability for program to still thrive even with many errors occurring) is a major benefit

B. Email systems are usually designed in this style

C. Subscribers register their interest in information that publishers provide

D. The main responsibility of components is to transform data input streams into data output streams

Answers

Answer 1

Publish-subscribe architectural style is subscribers registering their interest in the information that publishers provide. The correct answer is C.

In the Publish-subscribe architectural style, subscribers express their interest or subscribe to specific types of information or events that publishers provide. Publishers are responsible for producing and disseminating information, while subscribers register their interest and receive the relevant information from the publishers.

Option A is not necessarily true about the Publish-subscribe architectural style. While robustness can be a desirable quality in any architectural style, it is not a defining characteristic of the Publish-subscribe style.Option B is incorrect. Email systems typically follow a different architectural style, such as client-server or peer-to-peer.Option D is not true for the Publish-subscribe architectural style. The main responsibility of components in Publish-subscribe is not limited to transforming data input streams into output streams. It focuses on the publication and consumption of information or events, rather than data transformation.

Therefore, the correct statement is option C: Subscribers register their interest in the information that publishers provide.

To learn more about Publish-subscribe, Visit:

brainly.com/question/31201125

#SPJ11


Related Questions

This version of the web evolved to support more dynamic content creation and social interaction.

Answers

Websites that emphasize user-generated content, usability, participatory culture, and interoperability for end users are known as "Web 2.0" sites.

A Web 2.0 enables users to communicate and work together as co-creators of user-generated content in a virtual community through social media discussion. This contrasts with the original generation of Web 1.0-era websites when users were only able to passively consume material. Social networking and social media sites, blogs, wikis, folksonomies, video and image sharing websites, hosted services, web apps, platforms for collaborative consumption, and mashup applications are a few examples of Web 2.0 elements.

Learn more about web 2.0 https://brainly.com/question/12105870?

#SPJ4

a cryptographic hash function is only considered strong if there exists no x and y such that h(x) = h(y).

Answers

Cryptographic hash functions are used in many different applications to ensure the integrity of data and protect against attacks. A hash function takes in input data and produces a fixed-length output that is unique to that input.


When we say that a cryptographic hash function is "strong," what we mean is that it is resistant to collision attacks. A collision occurs when two different inputs produce the same hash output. This is a problem because it means that an attacker could create a fraudulent input that would produce the same hash value as a legitimate input. This could be used to subvert security mechanisms, compromise data integrity, or bypass access controls.

To be considered strong, a cryptographic hash function must have no known collisions. This means that no two different inputs have been found that produce the same output. It is theoretically possible that there may exist some x and y such that h(x) = h(y), but if such inputs were found, it would be considered a significant weakness in the function.

To know more about Cryptographic  visit:-

https://brainly.com/question/32169652

#SPJ11

CORRECT ANSWER WILL BE MARK AS BRAINLIEST AND SPAM WILL BE REPORTED
What is the one major difference between ROM and RAM?
(dont want a copy paste answer from google if you are sure then only answer)

Answers

Answer:

ROM - Read Only Memory; Allows for the storage of files in a permanent state. Allowed to go back to Memory and get information from it at anytime and be able to work on it, at which point its turns to the RAM's job.

RAM - Random Access Memory; Allows for storage of files in a Temporary state. Files get cleared from RAM once file is closed or exited.

Which feature in Access 2016 will ensure that every foreign key in a table has a link to a primary key in another
table?

O References
O Referential Integrity
O Autocorrect
O Data Source Binding

Answers

Answer:

B

Explanation:

edge :p

why is an analog computer called special purpose computer​

Answers

Explanation:

Analog computer's and also called special purpose computer's as they are usually used for scientific work rather than personal purpose. It is powerful in solving differential equations. In comparison with digital computer's, it has less storage capacity and their performance is less accurate.

How do you set up a match function in Excel?

Answers

The MATCH function finds a specific item within a range of cells and returns the position of the item within the range relative to other items.

What are Excel functions?

In Excel, functions are predefined formulas that perform specific calculations using values ​​from user input as arguments. All Excel functions have a specific purpose. Simply put, it calculates a certain value. Each function has an argument (the input value) to get the result value in the cell. Excel functions are ready-made formulas that make it easy to perform math, statistics, and logic tasks. Once you're familiar with using a function, simply enter the equals sign (=) in a cell, the name of the function, and the range of cells to apply it to.

To know more about excel functions visit:-

brainly.com/question/20893557

#SPJ4

Which BEST describes a third-generation computer? A. the CPU was used for the first time, computers could be owned by the general public, and a GUI was used B. used operating systems, keyboards, and monitors for the first time, and integrated circuits were used to supply electricity C. used artificial intelligence so that the computers become reasonably intelligent all on their own D. high-level programming languages, magnetic tape and disks for storage, and used small transistors to supply electricity

Answers

THIRD - GENERATION COMPUTER

C. used artificial intelligence so that the computers become reasonably intelligent all on their own

Third-generation computers were developed in the 1960s and marked a significant advancement in the development of computers. They were the first computers to use integrated circuits, which allowed for smaller and more powerful computers. Third-generation computers also featured the development of high-level programming languages, such as COBOL and FORTRAN, which made it easier for programmers to write and understand code. These computers also used magnetic tape and disks for storage, which were much more efficient than the punched cards used in earlier computers. Third-generation computers made use of artificial intelligence, which allowed them to perform tasks that required some level of independent thought and decision-making.

Hope This Helps You!

can someone help me plz.. I'll give brainliest​

can someone help me plz.. I'll give brainliest

Answers

Answer:

I don't really know but I wish you the best of luck

Answer :

its in the attachment

can someone help me plz.. I'll give brainliest

what storage method does the dre allow brokers to use for record retention?

Answers

The Data Recording and Electronic retention system (DRE) was established by the National Futures Association (NFA) to help guarantee that brokers retain specific data and documents for compliance purposes.

The NFA believes that the electronic storage of the information would enable more efficient record-keeping and reduce the costs of record retention for firms. As a result, the NFA has created a number of standards to ensure that the storage method complies with the relevant legislation.According to NFA rules, a broker may keep electronic records in either native file format or image format.

Additionally, the broker must ensure that the electronic storage medium is not only secure but that it is compatible with the software utilized by the broker's regulatory agency. In the case of the CFTC, the broker must ensure that electronic records can be made available in a timely and searchable manner.

To know more about Data Recording visit:

https://brainly.com/question/31927212

#SPJ11

Can covering up your laptop's camera with a sticky note damage it? I see some articles saying not to cover it and some to cover your camera.

Answers

Answer and Explanation:

I have a sticky note in front of my camera, just don't put the sticky part on the camera,

Bend it so that part of the sticky note is covering that top portion of your laptop, while also not covering your actually screen.

This makes sure that no one sees you if they were to hack into your camera with you knowing/not knowing

#teamtrees #PAW (Plant And Water)

Which best describes how an operating system works with the BIOS? It instructs the BIOS to complete a task. It allows user interaction with the BIOS. It translates instructions for the BIOS. It provides power to the BIOS.\

Answers

Answer:It translates instructions for the BIOS.

Explanation:just took the test :)

Answer:

C.  It translates instructions for the BIOS.

Explanation:

edge 2020

Mencione algunos ejemplos en donde sean utilizadas las máquinas de aire comprimido. Justifique su respuesta.

Answers

Answer:

Los ejemplos en los que se utilizan máquinas de aire comprimido incluyen

Donde se utilizan máquinas de aire comprimido incluye;

1) Compresor de aire, que es un dispositivo que utiliza energía mecánica para almacenar aire a presión, como

i) Aire obtenido en una gasolinera

ii) Aire presurizado utilizado para bombear neumáticos con una bomba de bicicleta manual

2) Equipo de ejercicio neumático, que previene ligeramente el movimiento mediante el uso de cilindros llenos de aire

Los ejemplos incluyen máquinas de entrenamiento de resistencia y máquinas de entrenamiento elípticas.

3) Instrumentos musicales neumáticos que producen sonido debido al movimiento del aire en las tuberías. El ejemplo incluye el órgano de tubos

4) Algunas madres lactantes utilizan máquinas neumáticas en los extractores de leche para proporcionar leche materna almacenada a los bebés que el niño puede tomar mientras la madre no está

5) Se conecta una pistola de aire a una fuente o máquina de aire comprimido para proporcionar aire presurizado cuando sea necesario

Explanation:

Your program should read the input grammar from standard input, and read the requested task number from the first command line argument (we provide code to read the task number) then calculate the requested output based on the task number and print the results in the specified format for each task to standard output (stdout). The following specifies the exact requirements for each task number.
Task one simply outputs the list of terminals followed by the list of non-terminals in the order in which they appear in the grammar rules.
Example: For the input grammar
decl -> idList colon ID # idList -> ID idList1 # idList1 -> # idList1 -> COMMA ID idList1 #
## the expected output for task 1 is: colon ID COMMA decl idList idList1
Example: Given the input grammar:
decl -> idList colon ID # idList1 -> # idList1 -> COMMA ID idList1 # idList -> ID idList1 #
## the expected output for task 1 is:
colon ID COMMA decl idList idList1
Note that in this example, even though the rule for idList1 is before the rule for idList, idList appears before idList1 in the grammar rules.
Determine useless symbols in the grammar and remove them. Then output each rule of the modified grammar on a single line in the following format:
->
Where should be replaced by the left-hand side of the grammar rule and should be replaced by the right-hand side of the grammar rule. If the grammar rule is of form A → , use # to represent the epsilon. Note that this is different from the input format. Also note that the order of grammar rules that are not removed from the original input grammar must be preserved.

Answers

Here is an implementation of a Python program that reads an input grammar from standard input, and a task number from the command line argument, performs the requested task, and prints the results to standard output:

import sys

def task_one(terminals, nonterminals):

   print(' '.join(terminals + nonterminals))

def remove_useless_symbols(grammar):

   reachable = set('S')

   new_reachable = set('S')

   while new_reachable != reachable:

       reachable = new_reachable.copy()

       for lhs, rhs_list in grammar.items():

           if lhs in reachable:

               for rhs in rhs_list:

                   for symbol in rhs.split():

                       if symbol in grammar:

                           new_reachable.add(symbol)

   return {lhs: [rhs for rhs in rhs_list if all(symbol in reachable for symbol in rhs.split())] for lhs, rhs_list in grammar.items()}

def task_two(grammar):

   modified_grammar = remove_useless_symbols(grammar)

   for lhs, rhs_list in modified_grammar.items():

       for rhs in rhs_list:

           print(f"{lhs} -> {'# ' if not rhs else rhs}")

def read_grammar():

   grammar = {}

   for line in sys.stdin:

       lhs, rhs = line.strip().split(' -> ')

       grammar.setdefault(lhs, []).append(rhs)

   return grammar

if __name__ == '__main__':

   task_number = int(sys.argv[1])

   grammar = read_grammar()

   if task_number == 1:

       terminals = sorted(set(symbol for rhs_list in grammar.values() for rhs in rhs_list for symbol in rhs.split() if symbol.islower()))

       nonterminals = sorted(set(grammar.keys()))

       task_one(terminals, nonterminals)

   elif task_number == 2:

       task_two(grammar)

What is the explanation for the above program?

The program defines two functions task_one() and remove_useless_symbols() to perform the two tasks. The task_one() function takes a list of terminals and a list of non-terminals, concatenates them in the order they appear in the grammar rules, and prints the result to standard output. The remove_useless_symbols() function takes a dictionary representing the input grammar, removes any non-reachable or non-productive symbols, and returns a modified grammar in the format specified for task two.

The program also defines a read_grammar() function that reads the input grammar from standard input and returns a dictionary representing the grammar. The main code block reads the task number from the first command line argument, reads the input grammar using read_grammar(), and performs the requested task using the appropriate function. For task one, the program first calculates the list of terminals and non-terminals by iterating over the grammar rules, extracting the symbols using string splitting and filtering for lowercase letters and non-lowercase letters respectively.

Learn more about Phyton:
https://brainly.com/question/18521637
#SPJ1

What is the missing word?
if numA< numB: # line 1
numX = numA # line 2
numA > numB: # line 3
numX = B # line 4

Answers

Answer:

The answer is elif

Explanation:

I got it right in the assignment

The missing word in the given statement is as follows:

if numA< numB: # line 1

        numX = numA # line 2

        elif numA > numB: # line 3

        numX = B # line 4.

What is Elif?

Elif may be characterized as a short "else if" function. It is used when the first if statement is not true, but you want to check for another condition. If the statement pairs up with Elif and the else statement in order to perform a series of checks.

According to the context of this question, if-elif-else statement is used in Python for decision-making i.e the program will evaluate the test expression and will execute the remaining statements only if the given test expression turns out to be true. This allows validation for multiple expressions.

Therefore, The missing word in the given statement is Elif.

To learn more about Elif function in Python, refer to the link:

https://brainly.com/question/866175

#SPJ5

What is an Array? 20 POINTS!!!
a. the total number of items in the collection

b. how you could order items in the collection (for example, date, price, name, color, and so on)

c. a unique address or location in the collection (for example, page number in an album, shelf on a bookcase, and so on)

d. the type of item being stored in the collection (for example, DC Comics, $1 coins, Pokémon cards, and so on)

Answers

Answer:

I'm about 99% sure it's C: a unique address or location un the collection

Create a paper of at least 1,800 words describing the situation you selected and explaining the logic that would support an array.

Answers

Answer:

I dont know about 1800 words but I sure can tell you abit about array

Explanation: Array in simple sense refers to a collection of similar data. It holds data which is homogeneous in nature, meaning they are all alike. The use of array provide a lot of advantages in the fields of computer programming. When you declare a variable for an array, you can store as much data as you wish in the same variable without having to declare many variables. A 2X2 dimensional array can also be used in programming which represents matrices as well. The search process in an array too is really convenient and time saving. Also in an array, accessing an element is very easy by using the index number.

Look at the examples of type on a background.

Which example best shows the use of contrast to help the reader distinguish the type on the background?

Answers

An example of using contrast to help the reader distinguish the type on the background would be using a light colored font (such as white or pale yellow) on a dark background (such as black or dark blue). This creates a high contrast between the font and the background, making it easy for the reader to read the text.

What is background?

In order to convey meaning and amplify the qualities of a piece of art, contrast in art refers to the technique of placing dissimilar visual elements next to one another.

Artists use a variety of tools at their disposal, such as shadows, light, color, size, and composition, to create contrast. A background is a part of your artwork that is typically situated behind or around the subject.

Learn more about background on:

https://brainly.com/question/23198052

#SPJ1

which statements are correct? check all that apply. charge q is positive. charge q is negative. the electric field is uniform. the electric field is nonuniform. if charge a is negative, it moves away from charge q. if charge a is positive, it moves away from charge q.

Answers

The correct statements are as follows: Charge q is positive. Charge moves away from charge q when it is positive. The electric field is uniform.

Explanation: Charge refers to the fundamental property of matter which makes it interact with electromagnetic fields. The interaction is through electric and magnetic forces.

Charge q is positive is one of the correct statements which means that charge q is positively charged. If two charges have the same sign, they will repel each other.

Charge q is negative is not a correct statement. We do not know the charge of charge q, whether it is positive or negative. If two charges have opposite signs, they will attract each other.

The electric field is uniform is one of the correct statements which means that the electric field is uniform throughout the space and does not change. When there are two charges, a positive charge will move toward a negative charge, while a negative charge will move toward a positive charge.

If charge a is negative, it moves away from charge qIt is not a correct statement. The negative charge will move towards the positive charge and vice versa. If the charges have the same sign, they will repel each other.

If charge a is positive, it moves away from charge qIt is one of the correct statements. Positive and negative charges attract each other. So, when charge a is positive, it moves away from charge q as the charges have the same sign. The distance between them increases.

To learn about the electric field here:

https://brainly.com/question/19878202

#SPJ11

Explain any TWO (2) data information that shall be covered under "Safety Data Sheet" and elaborate why do you think the information is needed

Answers

Safety data sheets include details about chemical items that assist users in evaluating the risks. They outline the risks the chemical poses and include details on handling, storage, and emergency procedures in the event of an accident.

The properties of each chemical, its physical, health and environmental properties, protective measures, and precautions for handling, storage and transportation of the chemical are contained in a safety data sheet (formerly called safety data sheet).

Provides recommendations for each individual chemical on topics such as:

PPE, or personal protective equipmentfirst aid techniquescleanup procedures for spills

To learn more on Safety Data Sheets, here:

https://brainly.com/question/28244620

#SPJ4

Why is the ISPM 15 Code/Marking used?

Answers

The ISPM 15 (International Standards for Phytosanitary Measures No. 15) code/markings are used for a specific purpose related to international trade and the movement of wood packaging materials (WPM). The primary objective of ISPM 15 is to prevent the spread of pests and diseases that can be carried by wood packaging materials.

Wood packaging materials, such as pallets, crates, and dunnage, can harbor harmful insects and pathogens. When these materials are transported across international borders, there is a risk of introducing pests or diseases to new regions, which can have devastating consequences for agriculture, forestry, and ecosystems.

To address this risk, the ISPM 15 code/markings set out guidelines for treating WPM through approved methods such as heat treatment or fumigation. Treated WPM is then marked with a specific stamp or branding that certifies its compliance with ISPM 15 standards. This marking serves as evidence that the wood packaging has undergone appropriate treatment, reducing the risk of pest or disease transmission.

The use of ISPM 15 code/markings promotes phytosanitary measures and helps ensure that international trade involving wood packaging materials is conducted in a manner that protects plant health and minimizes the spread of pests and diseases across borders.

To learn more about phytosanitary, visit:

https://brainly.com/question/33281097

#SPJ11

You have been hired to develop the website for a popular speaker. He has asked that you include the PowerPoint slides from his last major presentation on his website. However, you know that most users won’t download PowerPoint slides. What method would you suggest for including the slides on the website?

Answers

The method would you suggest for including the slides on the website are:

First one need to Download WOWSlider and then register for it.Then one can make your slider. You need to have some images ready to add to the slideshow that you want to make.Then Export your slider.You also need to add the slider to your own webpage.

What are the different ways of creating slides?

PowerPoint are known to be one that gives about different ways to create a presentation.

One can use Blank presentation, one can also used  other Design Template and also From AutoContent Wizard.

Note that in the case above, The method would you suggest for including the slides on the website are:

First one need to Download WOWSlider and then register for it.Then one can make your slider. You need to have some images ready to add to the slideshow that you want to make.Then Export your slider.You also need to add the slider to your own webpage.

Learn more about slides from

https://brainly.com/question/24653274

#SPJ1

Unscramble the risks of sharing files on the Intern
the lines.

1.RBOEKN RFIAEWLL
2. RPIACY
3. LMARWAE
4. RVIUS
5.WADEAR

Answers

Answer:

Broken Firewall, Piracy, Malware, Virus, adware

Explanation:

Please give brainliest if this helps

Here are the unscrambled words:

"lopo corma" unscrambles to "colo rampo" or "color campo."

"tilismokanmer" unscrambles to "mortalismoken" or "moralist token."

"issancenare" unscrambles to "resistancean" or "ancestriesan."

"sadakru" unscrambles to "darksau" or "asrakud."

"tanconstinople" unscrambles to "constipationel" or "saintconstantlop."

Unscrambled words are words that have been rearranged or scrambled in a random order, and the task is to rearrange the letters back into their correct order to form a valid word.

It's a word puzzle or game where you are given a set of jumbled letters and you need to figure out the original word by rearranging the letters correctly. Unscrambling words can be a fun way to test your vocabulary, language skills, and problem-solving abilities.

Learn more about puzzle on:

brainly.com/question/30357450

#SPJ6

disadvantages of using lossless compression rather than lossy compression​

Answers

Answer:

Larger files

Explanation

Lossless advantages and disadvantages Advantages: No loss of quality, slight decreases in image file sizes. Disadvantages: Larger files than if you were to use lossy compression.

Compression, Explained. We use compression to make files smaller, so that they take up less storage space and can be downloaded more quickly.

Lossless vs. Lossy Formats.

Lossy Compression. Lossy compression is useful because of its ability to shrink a file to a more convenient size

Select the Pixel Format to be either Mono8 or BayerRG8.

Ensure ISP Enable is not selected (disabled).

From the Image Compression Mode drop-down, select Lossless.

Select the Adaptive Compression Enable checkbox to allow dynamic updates to compression tables to achieve a better compression ratio.

what is the molecular activity of mattern

Answers

Matter is made up of extremely tiny particles called atoms and molecules. Atoms and molecules make up the three common states of matter on Earth—solids, liquids, and gases. The particles of a liquid are attracted to one another, are in motion, and are able to move past one another.

- BRAINLIEST answerer

Which of these examples shows inappropriate physical behavior
A.argumentative
B.Refusal to follow instruction
C.ergonic
D.physical

Answers

Answer:

B. Refusal to follow instruction

Explanation:

Refusal to follow instructions which are ethical, legal, and reasonable, given by the supervisor or manager, by the open display of physical action and, not acting or communicating as directed is known as insubordination

When an employee mocks or displays similar behavior openly which are forms of insubordination, the employee will be subject to disciplinary action

A grade 8 girl types her age as 18 years old as to gain access to a certain website. Is this statement ethical or unethical? Give atleast 2 reasons for both options.

Answers

Answer:

The answer is ethical.

Explanation:

Because first off she is lying about her age and second apparently she is too young to get in the website.

What is the code for CodeHS 4.8.5 factorial? I searched everywhere for the answer but I can't find it.

What is the code for CodeHS 4.8.5 factorial? I searched everywhere for the answer but I can't find it.

Answers

Some of the discovered problems with your code after debugging are:

You're not using the range function correctly. Range is range(start, stop, increment). So if the input is 4, your range is range(3,4,1). Start at 3, stop at 4, and increment by 1.So, given the range, your loop is only iterating once

What is Debugging?

Debugging is the process of identifying and fixing defects in computer programs, software, or systems. It is a crucial step in computer programming and software development.

Looking at your code, it is discovered that you have problems with the range function, for loop, and calculation and some possible solutions are given above.

Read more about debugging here:

https://brainly.com/question/15079851

#SPJ1

black and white squares codehs, i need the whole code (40 points for correct answer)

Answers

Answer:

speed(0)

penup()

setposition(-100,0)

count=0

def make_squares(i):

if i % 2 == 0:

begin_fill()

for i in range(4):

forward(25);

left(90)

end_fill()

penup()

pendown()

for i in range(6):

pendown()

make_squares(i)

penup()

forward(35)

Explanation:

The SDLC is cyclical in nature, meaning that any of the five stages can be
revisited at any time during a project.


O True
O False

Answers

Answer:

True.

Explanation:

Software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.

Some of the models used in the software development life cycle (SDLC) are; waterfall model, incremental model, spiral model, agile model, big bang model, and V-shaped model.

The five (5) standard stages of development in software development are;

I. Analysis.

II. Design.

III. Implementation (coding).

IV. Testing.

V. Maintenance.

The SDLC is cyclical in nature, meaning that any of the five stages can be revisited at any time during a project. This is possible because the stages of development are not performed only once but recurring at regular intervals.

Which graphic file format would you choose if you needed to make an animated graphic for a website?

ai

png

gif

py
please help

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct option for this question is gif.

Gif is a series of images that are used as animated graphics for a website. A gif is the file format of an animated image. You may have seen many animated images on websites like stickers etc.

other options are not correct because:

ai: is adobe illustrator file format

png: png is an image file format but not for an animated image

py: py is a file extension of the python file.

Answer:

gif

Explanation:

Other Questions
Which quote from "The Celebrated Jumping Frog of Calaveras County" supports the idea that Mark Twain is portraying the narrator as a fool?-Simon Wheeler backed me into a corner and blockaded me there with his chair, and then sat me down and reeled off the monotonous narrative which follows this paragraph.-In compliance with the request of a friend of mine, who wrote me from the East, I called on good-natured, garrulous old Simon Wheeler, and inquired after my friend's friend, Leonidas W. Smiley, as requested to do, and I hereunto append the result.-I found Simon Wheeler dozing comfortably by the bar-room stove of the old, dilapidated tavern in the ancient mining camp of Angel's. . . .-I did not think that a continuation of the history of the enterprising vagabond Jim Smiley would be likely to afford me much information concerning the Rev. Leonidas W. Smiley, and so I started away. Draw the simplified curved arrow mechanism for the reaction of butan-2-one and CH3Li to give the major product. Simplify tan 5 + tan 5 so that it is written as a trigonometric function of one number. Why have studies of domestic violence been critiqued for having a heterosexist bias? The U.S. government in the 1940s and 50s made a push to promote the idea of the ___, asupposedly stable family unit of two married parents and their children extended family blended family homeostatic family nuclear family how does the german officer ensure that none of the 80 passengers in the cattlecar will try to escape? is this an effective strategy? If a tariff is imposed on imports of shrimp into the united states, u.s. consumers ________ and the u.s. economy will ________. can you explain two different ways you could find measure of CFD can u explain in words and what is the measure of this angle y=[3/2] x+3.Pls help me .Its a graph sum A consumer's perceived current state is also known as his or her _____ state.a. desiredb.idealc.actuald.sociale.compatible I need help with this please Please solve these quickly and show work Suchitra works at the local supermarket. She gets paid $22.50 per hour. Her time cardis shown belowDay In OutMonday 9:00 a.m. 5:00 p.m.Tuesday 9:00 a.m. 6:00 p.m.Wednesday 8:30 a.m. 5:30 p.m.Thursday 9:00 a.m. 4:30 p.m.Friday 9:00 a.m. 4:00 p.m.a How many hours did Suchitra work this week?b .Find her weekly wage simplify. assume that no denominator is equal to zero ( show work ) help please!!! When and where in India was the first trade Centre of the English established? Suppose two people, person I and person 2, want to produce a playground to share between them. The value of the playground of size s to each person is s. where s wis the number of pounds spent building it. Show that under voluntary contributions the size of the playground is 1/4 and that the efficient size is 1. Consider a circle whose equation is x2 + y2 2x 8 = 0. Which statements are true? Select three options.The radius of the circle is 3 units.The center of the circle lies on the x-axis.The center of the circle lies on the y-axis.The standard form of the equation is (x 1) + y = 3.The radius of this circle is the same as the radius of the circle whose equation is x + y = 9. The following are acceptable methods of land description in deeds EXCEPT A. metes and bounds B. government survey C. recorded plat D. house number and street name a client changed from fifo to lifo for accounting for inventory and appropriately discuss the change in the footnotes. this change does not have a material effect on the financial statements in the current year but the change is expected to have material effect in later years. in the current year auditors report the auditor should: A teenager swears at the dinner table, and as a result, her parents take away her iPad for one week. The teenager is now much less likely to swear at the dinner table, illustrating:A) positive punishment.B) positive reinforcement.C) negative punishment.D) negative reinforcement.