you manage a single domain named widgets. organizational units (ous) have been created for all company departments. computer and user accounts have been moved into their corresponding department ous. the ceo has requested the ability to send emails to managers and team leaders. he'd like to send a single email and have it automatically forwarded to all users in the list. because the email list might change frequently, you do not want the email list to be used for assigning permissions. what should you do? answer create a distribution global group. for each user on the email list, make their user account a member of the group. create an ou for the email list. create contact objects in the ou. add an email address to the ou. create a universal security group. for each user on the email list, make their user account a member of the group. create a contact object for each user on the email list. create a security global group. make all contact objects members of the group.

Answers

Answer 1

To fulfill the CEO's request, the best solution would be to create a distribution global group. This will allow the CEO to send a single email to the group and have it automatically forwarded to all users in the list. However, since the email list may change frequently, it's not recommended to use it for assigning permissions.

To create the distribution global group, you should first create an OU for the email list. Then, create contact objects in the OU for each user on the email list. You should also add an email address to the OU.After this, you need to create a universal security group. For each user on the email list, make their user account a member of the group. Finally, create a security global group and make all contact objects members of the group.By following these steps, you'll have a distribution global group that can be used by the CEO to send emails to managers and team leaders, without having to worry about assigning permissions. The group will automatically include all users on the email list, and any changes to the list can be easily made by adding or removing users from the OU.

For such more question on email

https://brainly.com/question/29515052

#SPJ11


Related Questions

what is LATEX ?
create a latex command

Answers

Latex is a software used for writing daily life issue like integrations,fractions ,limits .

Lets see an example

\(\\ \bull\tt\longmapsto \displaystyle{\int}vdx\)

\(\\ \bull\tt\longmapsto \displaystyle{\lim_{x\to 0}}\)

give another term for searching data in database​

Answers

Answer:

wmeme

Explanation:

kmemeemsjsjsjnssnnssnsnsnsns

PLEASE HELP IMMEDIATELY WILL GIVE BAINALIIST FOR CORRECT ANSWER

PLEASE HELP IMMEDIATELY WILL GIVE BAINALIIST FOR CORRECT ANSWER

Answers

Answer:

the awnser is 3

Explanation;

theres 4 so 3*4=12divided by 4 = 3

Answer:

the answer is 3

3/4 times 4 is 3

Computer _ rely on up to date definitions?

A. Administrators
B. Malware Scan
C. Firmware updates
D. Storage Drivers

Answers

Answer:  The correct answer is B. Malware Scan

Explanation:

The word "definition" only applies to antivirus and malware removal applications that scan for patterns using the definitions. The other choices do not use definitions. Firmware updates rely on images, storage drives use drivers and administrators are user privilege type.

What can queries provide that viewing a table in Datasheet view cannot provide?

Answers

Answer:

D) data from more than one table

Explanation:

Just took it!

How would be the human life in the absence of technology

Answers

Answer:

Horrible!

Explanation: this is because all of our food would go bad firstly. Refridegerators wouldn't work. Also NO social medie taking away social media  is like cutting off your O2 supply. No phones, no TV, no computers etc... but also our planet would be a better place. No pollution, no batteries harming the enviornment .

* implement a 4-bit dynamic shift cipher (we call it aggiecipher :)) that computes * out=in counter, where counter=<0,1,2,3,4,5,6,....,15,0,1,2,...> * you may ignore overflow. **/

Answers

I can help you implement a 4-bit dynamic shift cipher (aggiecipher) that computes out = in + counter, where counter = <0, 1, 2, 3, 4, 5, 6, ...., 15, 0, 1, 2, ...>.

The Python code that implements the aggie-cipher:

def aggiecipher(in_data):

   counter = 0

   out_data = []

   for i in range(len(in_data)):

       # Compute output by adding input and counter (mod 16)

       out = (in_data[i] + counter) % 16

       # Increment counter

       counter = (counter + 1) % 16

       # Add output to output data

       out_data.append(out)

   return out_data

This implementation takes in an array of 4-bit integers as input (in_data) and returns an array of 4-bit integers as output (out_data).

The counter variable is initialized to 0 and is incremented by 1 after each input is processed.

The output is computed by adding the input value and the current value of the counter, and taking the result modulo 16 to keep it within the 4-bit range.

Read more about ciphertext here:

https://brainly.com/question/30143645

#SPJ1

given the following program excerpt, where should a debug output statement be placed to test the calculation of the result variable? 1. Result = 0
2. X = get next input
3. Y = get next input
4. Result = 2 * x + y
a. After 1. b. After 2. c. After 3. d. After 4.

Answers

To test the calculation of the result variable in the given program excerpt, a debug output statement should be placed after line 4, which is "After 4."

By placing the debug output statement after line 4, you can verify the value of the result variable after the calculation has been performed. This will allow you to see the actual value and ensure that the calculation is functioning as expected. Placing the debug output statement after line 1 or line 2 would not provide the correct value of result since the calculation has not yet occurred. Similarly, placing it after line 3 would not capture the updated value of result after the calculation. Therefore, to accurately test the calculation of the result variable, the debug output statement should be placed after line 4, "After 4."

To learn more about debug click here: brainly.com/question/9433559

#SPJ11

when does iron most likely to develop rust on it ​

Answers

Iron is most likely to develop rust when exposed to oxygen and water. It can be developed within a few hours or a few days.

Adam is using the software development life cycle to create a new game. He made an outline of what functionality the game will require, determined how long it will take to create the game, and made a list of people who could help him with the graphics. What should Adam do next

Answers

Answer:

Write pseudocode and create a mock-up of how the game will work and look

Explanation:

Since in the question it is mentioned that Adam wants to develop a new game for this he made an outline with respect to game functions needed, time period, people who help him.

After that, he writes the pseudocode i.e a programming language and then develops a model i.e mock up that reflects the working of the game and its look so that he would get to know how much work is pending.

Write method reverseString, which takes a string str and returns a new string with the characters in str in reverse order. For example, reverseString("ABCDE") should return "EDCBA".

Complete the reverseString method below by assigning the reversed string to result.

/** Takes a string str and returns a new string

* with the characters reversed.

*/

public static String reverseString(String str)

{

String result = "";

return result;

}

Answers

Answer:

The method written in Java is as follows:

public static String reverseString(String str){

    String result = "";

    int lentt = str.length();

    char[] strArray = str.toCharArray();

       for (int i = lentt - 1; i >= 0; i--)

           result+=strArray[i];

    return result;

}

Explanation:

This defines the method

public static String reverseString(String str){

This initializes the result of the reversed string to an empty string

    String result = "";

This calculates the length of the string

    int lentt = str.length();

This converts the string to a char array

    char[] strArray = str.toCharArray();

This iterates through the char array

       for (int i = lentt - 1; i >= 0; i--)

This gets the reversed string

           result+=strArray[i];

This returns the reversed string            

    return result;

}

See attachment for full program that includes the main method

def reverseString(str):

   y = str[::-1]

   return y

print(reverseString("ABCDE"))

The code is written in python. A function name reverseString is declared. The function takes an argument str.

Then a variable named y is used to store the reverse of our argument string.  

The keyword return is used to output the reversed string.

Finally, the function is called with a print statement.

The bolded portion of the code are keywords in python.

read more:  https://brainly.com/question/15071835?referrer=searchResults

Write method reverseString, which takes a string str and returns a new string with the characters in

what technology can collect information to make decisions, reach conclusions, and combine information in new ways?

Answers

The technology that can collect information to make decisions, reach conclusions, and combine the information in a new way is known as Artificial Intelligence.

Artificial Intelligence is a realistic computing process that simulates human intelligence.

Artificial Intelligence can perform several functions, including speech detection, machine intuition, etc.

Artificial Intelligence is categorized into four including:

Reactive machines,Limited memory, Theory of mind,Self-awareness.

Hence, in this case, it is concluded that the correct answer is Artificial Intelligence.

Learn more here: https://brainly.com/question/22826064

PART 1: TRUE OR FALSE ITEMS
1. Computers in Medicine Information technology plays an important role in medicine
2. Most people use data and information interchangeably
3. Data processing: is the process of converting data into information
4. Accurate-information is error free
5. The ALU and the CU of a computer system are jointly known as the central processing unit.
6. ROM With every new application and software there is greater demand for memory capacity
7. Laser printers produce a very high quality output, are very quiet and very fast.
8. There are two major types of programming languages.
9. The symbolic programming of Assembly Language is easier to understand and save a lotof time and effort of the programmer.
10. The Vertical scrollbar is used to scroll up and down the page​

Answers

Answer:

1. True

2. False

3. True

4. False

5. True

6. False

7. True

8. True

9. False

10. True

Explanation:

1. True - Computers and information technology play a crucial role in various aspects of medicine, including patient record management, diagnostic tools, medical imaging, research, and telemedicine.

2. False - Data and information are distinct concepts. Data refers to raw facts and figures, while information is processed and organized data that provides meaning and context.

3. True - Data processing involves transforming raw data into meaningful information through various operations such as organizing, analyzing, and summarizing.

4. False - Accurate information is free from errors or mistakes, but achieving complete accuracy is challenging, and there is always a possibility of errors.

5. True - The ALU (Arithmetic Logic Unit) and the CU (Control Unit) together form the central processing unit (CPU) of a computer system, responsible for executing instructions and performing calculations.

6. False - ROM (Read-Only Memory) is a non-volatile memory that stores permanent instructions and data. It does not change with new applications or software installations.

7. True - Laser printers are known for their high-quality output, quiet operation, and fast printing speed compared to other types of printers.

8. True - There are two major types of programming languages: high-level languages and low-level languages. High-level languages are more user-friendly and closer to human language, while low-level languages are closer to the computer's native language and require more technical knowledge.

9. False - Assembly language programming, although more low-level and closer to machine language, is considered more complex and time-consuming compared to higher-level symbolic programming languages.

10. True - The vertical scrollbar is typically used to scroll up and down a page or document, allowing users to view content that extends beyond the visible area of a window or screen.

Subject me not to trials,shame not my human form. "Explain".​

Answers

A girl living in a society where everyone has plastic surgery makes her feel increasingly out of place in the Korean body horror short Human Form.

What is Human form?

This animated short is a commentary on plastic surgery and humanity's obsession with what is considered to be "beauty," where we frequently idolize appearances.

It are impossible to achieve naturally and judge natural appearances as not looking "good enough" (which makes everyone a potential "fixer-upper" and gives the beauty industry more and more profits).

And given that several Asian nations have absurd beauty standards, this South Korean short is the ideal commentary on everything.

Therefore, A girl living in a society where everyone has plastic surgery makes her feel increasingly out of place in the Korean body horror short Human Form.

To learn more about Human form, refer to the link:
https://brainly.com/question/8509952

#SPJ5

Answer:

The poet seems to be humiliated and condemns himself for being human just physically. He is sure if Allah subjects him to examination, he would not be successful in it because he cannot tolerate or withstand them like a perfect human being.

Explanation:

Hope it will help ...

write a QBASIC program to calculate the perimeter of calculate the perimeter of circle [hint p=2pi r]​

Answers

Here's an example program in QBASIC that calculates the perimeter of a circle using the formula P = 2πr:

REM QBASIC program to calculate the perimeter of a circle

INPUT "Enter the radius of the circle: ", r

p = 2 * 3.14159 * r

PRINT "The perimeter of the circle is "; p

END

This program prompts the user to enter the radius of the circle, then calculates the perimeter using the formula P = 2πr. The result is displayed using the PRINT statement.

Note that the value of π is approximated as 3.14159 in this example. You could increase the precision by using a more accurate value of π or by using QBASIC's built-in constant for π, which is named PI.

Answer:

A QBASIC program to calculate the perimeter of a circle

DECLARE SUB CIRCUM (R)

CLS

INPUT “ENTER RADIUS"; R

CALL CIRCUM (R)

END

SUB CIRCUM (R)

C=2*3.14 * R

PRINT "CIRCUMFERENCE OF CIRCLE "; C

END SUB

you are working with the penguins dataset. you want to use the arrange() function to sort the data for the column bill length mm in ascending order. you write the following code: penguins %>% add a single code chunk to sort the column bill length mm in ascending order.

Answers

To sort the 'bill_length_mm' column in ascending order using the 'arrange()' function with the penguins dataset, you can write the following code: ```R penguins %>% arrange(bill_length_mm) ``` This code will sort the penguins dataset by the 'bill_length_mm' column in ascending order using the 'arrange()' function.

To use the arrange() function in dplyr package to sort the data for the column "bill length mm" in ascending order, you can write the following code: penguins %>% arrange(`bill length mm`) The %>% operator is used to pipe the penguins data frame into the arrange() function. The backticks around the column name "bill length mm" are used because the column name contains spaces, which is not a valid syntax in R. The arrange() function will sort the data in ascending order based on the values in the "bill length mm" column. The sorted data frame will be returned as the output. Note that this code will only sort the data frame by the "bill length mm" column in ascending order. If you want to sort by multiple columns, you can simply add additional arguments to the arrange() function, such as arrange(penguins, column1, column2, ...).

Learn more about data here-

https://brainly.com/question/13650923

#SPJ11

pls anser im timed plssss

pls anser im timed plssss

Answers

Answer:

Print Nothing

Explanation:

there is no other option to put out " your a b student" which makes no sense, also A is an obvious no, but there is no code for you to say option B, so option C is your last option

When you instruct a computer or mobile device to run an application, the computer or mobile device answer its software, which means the application is copied from storage to memory?

Answers

I believe loads

not for sure what the question is

How can the Playback feature adjust your audio recording?

Answers

Answer:

If said playback was recorder on editing software then there is a good chance that it could be changed for editing porpuses.

Explanation:

the memwrite control bit for memory is set to 1, when the memory is in the write mode and it is set to 0 when the memory is in the read mode.

Answers

The memwrite control bit is a vital component in memory systems that governs access modes, specifically distinguishing between write and read operations. When the CPU needs to write data to memory, the memwrite control bit is set to 1, indicating the write mode. Conversely, when the CPU intends to read data from memory, the memwrite control bit is set to 0, signaling the read mode.

In most computer memory devices, such as dual-ported memories, there are separate read and write ports. The memwrite control bit acts as a selector, determining which port will be utilized based on its value. When the memwrite control bit is set to 1, data is written to memory using the designated write port. Conversely, when the memwrite control bit is set to 0, data is read from memory using the assigned read port.

In summary, the memwrite control bit is a crucial signal that governs memory access and specifies whether the CPU intends to read from or write to memory. It serves as a determinant for selecting the appropriate port and enables efficient data transfer between the CPU and memory subsystem.

Learn more about CPU

https://brainly.com/question/31034557

#SPJ11

Minor changes to objects which only take effect at render time are called:
alterations
manipulations
transformations
modifiers

Answers

Answer:

modifiers

Explanation:

The modifiers are the change that is minor with respect to the objects that have an impact at the render time

Therefore as per the given situation, the last option is correct as it fits to the current scenario

And, the rest of the options would be incorrect

The same is to be considered and relevant

Hence, the modifier is the correct option

How would I search snowboarding outside of Minnesota in my browser?

Answers

The way to search for snowboarding outside of Minnesota in your browser is to use the search tool to type likely words such as  Popular Downhill Skiing Destinations and then you will see different options to choose from.

What does browsing entail?

When you're searching, you want to finish a task; when you're browsing, you can be seeking for ideas, entertainment, or just additional information. When you are searching, you are actively looking for solutions, whereas when you are browsing, you are merely viewing the results.

An application program known as a browser offers a way to see and engage with all of the content on the World Wide Web. Web pages, movies, and photos are included in this.

Note that by typing key words using your browser such as snowboarding, you will see defferent result.

Learn more about Browser search from

https://brainly.com/question/22650550

#SPJ1

A software development company has created an application called FileCleanUp. When the application is run on a user device, it searches for all files (including pictures, videos, and documents) that have not been accessed in the past month, stores them on the company’s Web server, and deletes them from the user device. The application runs once each day. Users have the ability to manually retrieve files from the server if they are needed.
Which of the following is most likely to be a harmful effect of using FileCleanUp?
A. It prevents users from accessing frequently used files when there is no Internet connectivity.
B. It prevents users from accessing infrequently used files when there is no Internet connectivity.
C. It prevents users from accessing frequently used files when there is reliable Internet connectivity.
D. It prevents users from accessing infrequently used files when there is reliable Internet connectivity.

Answers

Answer:

B

Explanation:

The app will delete files that have not been accessed in the past month and store them on a web server. This means that the user cannot access those files unless they have an internet connection

The app will delete files that have not been accessed in the past month and store them on a web server. This means that the user cannot access those files unless they have an internet connection.

What is Software development?

Supercomputing and other computing methods are sometimes used interchangeably. Yet, there are times when the synonyms aren't clear. To assist clarify some similarities and differences between various computer types, here are some common analogies.

While supercomputing typically refers to the process of complex and massive calculations used by supercomputers, high-performance computing (HPC) is the utilization of several supercomputers to execute difficult and huge computations.

Supercomputers are often known as parallel computers since they can perform parallel processing. Parallel processing is the simultaneous use of many Processors to solve a single calculation.

Therefore, The app will delete files that have not been accessed in the past month and store them on a web server. This means that the user cannot access those files unless they have an internet connection.

To learn more about Software, refer to the link:

https://brainly.com/question/985406

#SPJ6

how is computer Science used in entretainment?​

Answers

Answer:

video editing

Explanation:

there are many ways

What predefined match policy allows viewers to watch a claimed video but does not allow ads to display on the video

Answers

Answer:

The correct response is "Track".

Explanation:

Tracks encourage the individual that listens to that same music video to miss or ignore that same starting of almost any soundtrack at a certain moment. It might also impact an individual who accompanies a facility that implements or obeys guests.

For obvious reasons, a digital ad service can track client's internet search engine behavior patterns to continue providing accurate recommendations.

In a print statement, you can set the ________ argument to a space or empty string to stop the output from advancing to a new line. true false

Answers

In a print statement, a user can set the end argument to a space or empty string, in order to stop the output from advancing to a new line.

What is a print statement?

A print statement can be defined as a line of code that is used to send data to the print or println method of a programming system such as compiler.

In Computer programming, an end user can set the end argument to a space or empty string, in order to stop the output from advancing to a new line by using a print statement.

Read more on print statement here: https://brainly.com/question/21631657

Check the devices that are external peripheral devices:

Check the devices that are external peripheral devices:

Answers

Answer:

Mouse, and keyboard

Explanation:

Common Sense

what is force tell me please​

Answers

Explanation:

the push or pull that tends to change a body from motion to rest or rest to motion is force

Arthur Meiners is the production manager for Wheel-Rite, a small manufacturer of metal parts. Wheel-Rite sells 10,378 gear wheels each year. Wheel-Rite setup cost is $45 and maintenance cost is $0.60 per sprocket per year. Wheel-Rite can produce 493 gear wheels per day. The daily demand for the gear wheels is 51 units. Show your work.
1. What inventory management model should we use to solve this problem?
Model for discount purchases
Model Economic Quantity to Order
Model Economic Quantity to Produce
Model to handle dependent demand
2. What is the optimal amount of production? 3. What is the maximum inventory level of gear wheels that will be in the Wheel-Rite warehouse? 4. What is Wheel-Rite's annual setup cost? 5. What is the annual cost of maintaining Wheel-Rite?

Answers

1. The appropriate inventory management model to solve this problem is the Economic Quantity to Produce (EOQ) model. The EOQ model is used to determine the optimal order quantity or production quantity that minimizes the total cost of inventory, taking into account three cost types: setup, production, and holding.

2. To calculate the optimal amount of production using the EOQ model, we need the following information:
- Demand per year (D) = 10,378 gear wheels
- Setup cost (S)= $45
- Production rate per day (P) = 493 gear wheels
- Working days per year (W) = 365 (assuming no downtime)

The formula to calculate the EOQ is:

EOQ = sqrt((2 * D * S) / (P * (1 - (D / (P * W)))))

Plugging in the values:

EOQ = sqrt((2 * 10,378 * 45) / (493 * (1 - (10,378 / (493 * 365)))))

Calculating this equation will give you the optimal amount of production.

3. The maximum inventory level of gear wheels that will be in the Wheel-Rite warehouse can be calculated by multiplying the optimal amount of production (EOQ) by the number of production cycles in a year. The number of production cycles can be calculated by dividing the annual demand (D) by the optimal amount of production (EOQ) and rounding up to the nearest whole number.

Maximum inventory level = EOQ * ceil(D / EOQ)

4. Wheel-Rite's annual setup cost can be calculated by multiplying the setup cost (S) by the number of production cycles in a year.

Annual setup cost = S * ceil(D / EOQ)

5. Wheel-Rite's annual cost of maintaining inventory can be calculated by multiplying the holding cost per unit (which is the maintenance cost per sprocket per year) by the average inventory level. The average inventory level can be calculated by dividing the maximum inventory level by 2.

Annual cost of maintaining inventory = (Holding cost per unit) * (Average inventory level)

In this case, the holding cost per unit is $0.60 per sprocket per year, and the average inventory level can be calculated as (Maximum inventory level / 2).

Please note that you need the calculated EOQ value from question 2 to answer questions 3, 4, and 5.8

7.3.4: Find the Error

Answers

Answer:

my_string = "hello!"

# One of the two lines below will cause an error.

# Each line is an attempt to replace the first

# letter of myString with H. Comment out the

# line you think is incorrect.

# my_string[0] = "H"

my_string = "H" + my_string[1:]

print(my_string)

Explanation:

The numeric or alphanumeric error code is being used to identify the type of error. Following are the description of the error code in the given question:

Incorrect code:

my_string[0] = "H" // this line give the error that is "'str' object does not support item assignment".

Correct code:

my_string = "hello!"#defining the string variable that is "my_string"

my_string = "H" + my_string[1:]#using string variable that perform slicing and hold its value

print(my_string)#print my_string value

Code Explanation:

Defining the string variable that is "my_string".In the next line, the string variable is used that adds "H" to the first index value and performs slicing, and holds its value. Using the print method that prints the "my_string" variable value.

Output:

Please find the attached file.

Find out more about the error here:

brainly.com/question/13106116

7.3.4: Find the Error
7.3.4: Find the Error
Other Questions
How many 3/5 inch snicker bar are in 3 inches of snickers bars. Which set of ordered pairs does not represent a function?{(-8,-2), (0, 2), (-6, 2), (-4,-1)}{(-6,-4), (-9, 0), (5, -7), (-3,-4)} {(1,6), (-3, 6), (6, 3), (0, -4)}{(6, 7), (-3, 8), (7,-2), (-3,-3)} choose the command option that would set the archive bit to indicate a file that will be backe up BRAINLIEST!! In the early Cold War, Germany, Korea, and Taiwan allA. abandoned capitalism and democracy and embraced a communist modelB. switched from communism back to capitalismC. illustrated the ability of the economic question to split countriesD. were made United Nations Security Council members to keep them allies A plot of land has an area of 33. 75 square feet. Jackson wants to put a 4-foot by 4-foot shed on the land. He can only do this if the height of the trapezoid is at least 4. 5 feet. What is the height of the trapezoid? feet. Are the following statements true or false? If false, correct them.1.An investor who wishes to sell shares immediately should ask his or her broker to enter a limit order.2.Then ask price is less than bid price.3.An issue of additional shares of stock to the public by Microsoft would be called IPO.4. An ECN (Electronic Communication Network) is a computer link used by security dealers primarily to advertise prices at which they are willing to buy or sell shares. A. For each of the codons given, list all the possible tRNA anti-codons that could pair, based on wobble. (Write the anticodons 5' - 3' with a space between). a) ACA b) UUC c) GCA d) UGU e) AUA B. Now look carefully at the tRNAs (anticodons) that you have suggested. Which of these potential tRNAs would cause biological problems in that they are incompatible with the genetic code? For each case where there is a problem, state why Victoria goes out to lunch and the bill is $20.40. She wants to leave a 15% tip. What will the total cost of her meal be? 50 points help me out Which of the following would NOT be a consequence of a lack of protein? swelling of the belly stunted growth lethargy kwashiorkor prion disease A boat is headed north at a velocity of 8 km h-1. A strong wind is blowing whose pressure on the boats superstructure causes it to move sideways to the west at a velocity of 2 km h-1. There is also wave present that flows in a direction 30 south of east at a velocity of 5 km h-1. What is the velocity of the boat? A firm has the production function Q=F(K,L)=K1/2L1/4, where K>0 and L>0. It chooses its inputs K of capital and L of labor in order to maximize its profit =PQrKwL, where P,r and w are the given positive prices of output, capital and labor, respectively. (a) Show that the two first-order necessary conditions for profit maximization imply that rK=1/2 PQ and wL=1/4PQ. which food would be inappropriate for a baby with galactosemia? group of answer choices breast milk sugar solution apple juice soybean formula orange juice To get from her home to a friend's house, Georgia must go past a school, then a post office:Signs tell Georgia that the distance she walks from home to the school is 7/8 mile, and the distance from the school to the post office is 5/6 mile.The whole trip from home to her friend's house takes Georgia 42 minutes. If Georgia can walk a mile in 18 minutes, then how many miles is the distance from the post office to her friend's house? a 65-year-old retina receives only about _____ as much light as its 20-year-old counterpart. a nurse's response to aggressive behavior on the unit is influenced by which characteristic of the nurse? I need help with some of the answers... How did Caesars political strengths help him come to power? Choose four correct answers.He caused some patricians to be resentful of his popularity with the lower classes.He gained great leadership skills as a military commander.He was considered a gifted orator.He defied the senators authority and did what he pleased.He was born into a noble family, so he could hold high government office.He was a reformer who had the support of the common people. The management of a department store is interested in estimating the difference between the mean credit purchases of customers using the store's credit card versus those customers using a national major credit card. You are given the following information. Assume the samples were selected randomly. Store's Card Major Credit Card Sample size 64 49 Sample mean $140 $125 Population standard deviation $10 $8 Refer to Exhibit 10-6. At 95% confidence, the margin of error is On January 1, 2017, Pruit Company purchased 85% of the outstanding common stock of Salty Company for $525,000. On that date, Salty Companys stockholders equity consisted of common stock, $150,000; other contributed capital, $60,000; and retained earnings, $210,000. Pruit Company paid more than the book value of net assets acquired because the recorded cost of Salty Companys land was significantly less than its fair value. During 2017 Salty Company earned $222,000 and declared and paid a $75,000 dividend. Pruit Company used the partial equity method to record its investment in Salty Company.Required: Prepare the investment related entries on Pruit Companys books for 2017.Prepare the workpaper eliminating entries for a workpaper on December 31, 2017.