Identify and explain the major computer programming milestones that occurred in 1801, 1840, 1937, and 1983. Use details to support your answer.

Answers

Answer 1

While working on the Analytical Engine in 1883, Ada Lovelace & Charles Babbage created the first programming language.

Why do people program computers?

Writing code to support certain activities in a computer, application, or software program and giving them instructions on how to do is known as computer programming.

Is a profession in computer programming a worthwhile one?

The US Bureau of Labor Statistics projects a 10% reduction in computer programmer employment between 2021 and 2031. Despite this drop, they predict that 9,600 new positions for computer programmers will open up annually as a result of individuals who will change careers or retire.

To know more about computer programming visit:

https://brainly.com/question/14618533

#SPJ1


Related Questions

a device is response for making the connection between the local loop and the customer premise equipment, usually a data terminal equipment (dte) device such as a router?

Answers

The statement is true. A device, typically a data terminal equipment (dte) device like a router, is responsible for connecting the local loop to the client premises equipment.

What is data terminal equipment ?Data terminal equipment (DTE) refers to any device that is used to transmit or receive data over a communication link. DTE devices are typically connected to a communication network through a communication interface, such as a modem or network interface card (NIC).Examples of DTE devices include computers, servers, routers, switches, hubs, and other networking equipment. These devices are typically used to transmit and receive data, as well as to perform various functions such as routing, switching, and networking.DTE devices are usually contrasted with data communication equipment (DCE), which refers to devices that provide the physical connection between DTE devices and the communication network. Examples of DCE devices include modems, network interface cards (NICs), and other types of communication interfaces.

To learn more about router refer :

https://brainly.com/question/28180161

#SPJ4

the work breakdown structure (wbs) can only be prepared with a complex, specialized desktop pc application. a. true b. false

Answers

This statement is false. A project management method called a work breakdown structure (WBS) uses a step-by-step process to finish big projects with many of moving parts.

What is work breakdown structure ?In project management and systems engineering, a work-breakdown structure is a deliverable-focused division of a project into more manageable parts. A essential project deliverable that divides the team's work into digestible chunks is a work breakdown structure.The WBS's main objective is to plan the project's timetable. The length of each work is planned in relation to its necessary predecessors and subsequent tasks. The WBS then offers a comprehensive plan so the project manager may understand how the project should develop and effectively manage the workflow.Depending on the complexity of your projects, you can add extra levels to WBS charts, which typically contain three. Initiation, planning, execution, control, and closeout are the five project phases that branch from the primary deliverable at the top and serve as control accounts.

To learn more about project management refer :

https://brainly.com/question/16927451

#SPJ4

you're working on a search ad that's not performing as expected. you specifically want more users to click on the ad. what action might improve the click-through rate on your ad?

Answers

Changing the call-to-action message of the ad's click-through  might improve the click-through rate on your ad

What action may increase the ad’s click-through rate?Adding sitelink descriptions to your campaigns or ad groups allows you to include two extra lines of content beneath each sitelink heading, which has been proved to enhance click through rates. By utilizing this functionality, our advertisements will stand out and push down other advertisements in the sponsored search results.We’re working on a Search Ad that isn’t doing as well as it could. You especially want more people to click on the advertisement. What activity could boost your ad’s click-through rate? Changing the ad’s call-to-action message may increase the ad’s click-through rate.

To learn more about ad’s Click through refer:

https://brainly.com/question/29766564

#SPJ4

Finish the code to open a file to retrieve its contents.
import csv
inFile = open('pets.txt','___')

Answers

Answer:

import csv

inFile = open('pets.txt','r')

which of the following is true about python keywords? a. they can begin with a number, letter, or hyphen b. they are case sensitive c. they are written in uppercase d. they can be a maximum of 6 characters long

Answers

According to the question we have Python keywords are case sensitive, and that much is true.

What purposes serves Python?

Python is a well-liked coding language used to build websites and applications, automate procedures, and do data analysis. Python is an all-purpose language, which means it may be used to make many various types of applications and isn't tailored for any particular issues.

Is learning Python difficult?

No, most people don't find learning Python difficult. Python is really regarded as one of the simplest programming things to learn. If you've never authored a foot of Python code before, you can learn to program in Python, but it will take time and you should prepare for some frustrating times.

To know more about Python visit :

https://brainly.com/question/18502436

#SPJ4

What is information output from an information system to facilitate decision making?.

Answers

The information output from an information system to facilitate decision making is generally referred to as business system reporting.

What is an information system?

An information system (IS) can be defined as a collection of computer systems and Human Resources (HR) that is used by a business organization (company or firm) to obtain, store, compute, and process data, as well as the dissemination of information, knowledge, and the distribution of digital products from one location to another.

The components of an information system (IS).

In Computer technology, there are different components of an information system (IS) and these include the following:

DataProceduresSoftwareHardware

What is the decision making process?

The decision making process can be defined as a cognitive process that involves gathering (obtaining) information, analyzing them, and then evaluating alternatives, so as to enable the proper selection of an optimum solution (choice) to a particular problem.

In Business management, business system reporting simply refers to all of the information output from an information system (IS) that are generated in order to facilitate proper decision making.

Read more on information system here: brainly.com/question/24944623

#SPJ1

use the command line interface (cli) to answer the following questions: according to the command line help, which switch can you use with the killall command to kill a process only if it is running as a specific user? view the contents of the /root/.bash profile file. what is the last word in the file? what is the value for the shell environment variable? list the iptables firewall rules. which tcp services have been allowed through the firewall for the input chain?

Answers

1) Note that according too the Command Line Interface, the switch can you use with the killall command to kill a process only if it is running as a specific user is (-g)

2) given the contents of the /root/.bash profile file, the last word in the file is: PATH

3) The value of the shell environment variable are:
user, term, home, and path.

4) to list all iptable rules on Linux, we:

Open the terminal app or login using ssh command: $ ssh useratserver-name.To list all IPv4 rules: $ sudo iptables -S.Get list of all IPv6 rules: $ sudo ip6tables -S.To list all tables rules: $ sudo iptables -L -v -n | more.Just list all rules for INPUT tables:

5) to check which TCP services have been allowed through the firewall for the input chain:

you must use "systemctl status firewalld"

What is a command line interface?

A command-line interface (CLI) is a text-based UI used to run applications, manage computer files, and communicate with the computer. CLIs are also known as command-line user interfaces, console user interfaces, and character user interfaces.

Using precise commands via a command-line interface can be more efficient and faster than navigating between GUI tabs and dialogs. This may be very useful when performing extremely repetitious activities across numerous systems, and it highlights the advantages of a command-line interface.

Learn more about a shell environment:
https://brainly.com/question/28902960?
#SPJ1

Write a C++ program that enables users to choose the looping statement they want to use by combining conditional statements and looping statements. The initiative will
Allow users to specify the starting and ending numbers that will be displayed using the looping statement they have chosen.

Answers

Answer:

#include <iostream>

using namespace std;

int main()

{

   int start, end, choice;

   cout << "Enter the starting number: ";

   cin >> start;

   cout << "Enter the ending number: ";

   cin >> end;

   cout << "Choose a looping statement: " << endl;

   cout << "1. for loop" << endl;

   cout << "2. while loop" << endl;

   cout << "3. do-while loop" << endl;

   cin >> choice;

   if (choice == 1)

   {

       for (int i = start; i <= end; i++)

       {

           cout << i << endl;

       }

   }

   else if (choice == 2)

   {

       int i = start;

       while (i <= end)

       {

           cout << i << endl;

           i++;

       }

   }

   else if (choice == 3)

   {

       int i = start;

       do

       {

           cout << i << endl;

           i++;

       } while (i <= end);

   }

   else

   {

       cout << "Invalid choice" << endl;

   }

   return 0;

}

what function can you use to record the start and end times of a block of code, and then use the difference between the resulting values to determine the elapsed time in seconds?

Answers

The difference in function BetweenTimePeriod() determines how much time has passed between the two periods. Without returning it, the main() method displays the outcome (using call by reference technique).

Block of code: What does that mean?

Block codes are employed in software development to convert methods or software code to particular forms in order to reduce errors inside the code, if any. Block coding has applications in the domains of telecommunication, theory, and coding theory.

How should block code be written?

Add three backticks (') to the editor and then the language or code you want to be in your code block to add a distinct code block or snippet.

To know more about  block of code visit:

https://brainly.com/question/14466244

#SPJ4

all of the wireless users on the third floor of your building are reporting issues with the network. every 15 minutes, their devices disconnect from the network. within a minute or so they are able to reconnect. what type of attack is most likely underway in this situation?

Answers

Note that where all of the wireless users on the third floor of your building are reporting issues with the network, and every 15 minutes, their devices disconnect from the network, and within a minute or so they are able to reconnect again, the type of attack is most likely underway in this situation is: " Disassociation attack" (Option D)

What is a Disassociation attack?

Note that a disassociation attack is a type of wireless networking attack that involves disrupting or severing the connection between a wireless device and a wireless access point (WAP).

The goal of a hacker with the disassociation attack is to prevent the wireless device from communicating with the WAP, which can prevent the device from accessing the Internet or other network resources.

This type of attack can have serious consequences, such as disrupting business operations, stealing sensitive information, or causing financial losses.

Some ways to ensure the prevention of disassociation attacks are:

to use strong security measures, such as encryption, authentication, and access controls, and to regularly update the firmware and security settings of wireless devices and WAPs.

Learn more about a Disassociation Attack:
https://brainly.com/question/15000254
#SPJ1

Full Question:

All of the wireless users on the third floor of your building are reporting issues with the network. Every 15 minutes, their devices disconnect from the network. Within a minute or so, they are able to reconnect. What type of attack is most likely underway in this situation?

A. WPS attack

B. Downgrade attack

C. Brute force attack

D. Disassociation attack

arrange the two open excel workbooks on the screen vertically, ensuring that the e05 fall seminars file is active.

Answers

In the Open dialog box, click the down arrow next to the View tool on the toolbar. In Excel, a drop-down menu is visible. The drop-down menu's Arrange Icons option is selected.

How to arrange the two open Excel workbooks on the screen vertically?You should view all of the workbooks that are open.Click Arrange on the Window menu.Choose one of these: to set up windows. in order for them to look like this. Click. as tiled squares of equal size. Tiled. vertically, top to bottom. Horizontal. vertically, left to right. Vertical.To open the file, double-click it as usual, and then instantly press and hold the Alt key. Holding Alt down will cause the new instance dialog box to appear. If you're sure you want to launch a new instance, click Yes. Done!

To learn more about workbooks  refer,

https://brainly.com/question/5450162

#SPJ4

why is my Microsoft store not loading i have Wi-Fi and its strong I've tried everything I know I'm not resetting Microsoft so that's out da window pls help me

Answers

Answer:

Try restarting Windows, restarting in Safe Mode, or checking for updates for Microsoft Store

what kind of software can help a web developer check her online content for accessibility issues

Answers

WAVE is a set of tools created by WebAim for assessing how accessible web material is for people with impairments. It is one of the most widely employed tools for visualizing accessibility concerns on a web page.

How do I employ developer tools for accessibility?

To access Chrome Developer Tools, right-click anywhere on the page in Chrome and choose "Inspect." Select the "Accessibility" tab from the "Elements" tab. The Accessibility Tree is the first item on the list. To access Firefox Developer Tools, right-click anywhere on the page and choose "Inspect Element."

What are developer tools for accessibility?

This is a library of utility and testing code for accessibility. The accessibility audit, which consists of a set of audit rules screening for common accessibility issues and an API for applying these rules to an HTML page, is its primary component.

Which of the four accessibility types is there?

The four basic principles of the Web Content Accessibility Guidelines (WCAG) indicate that content must be POUR: Perceivable, Operable, Understandable, and Robust.

To know more about accessibility visit:

https://brainly.com/question/18626934

#SPJ4

what is the purpose of using ethernet bonding? (select two.) answer increases network performance provides increased bus speeds enables dual remote access (dra) over a wan link increases read and write operations between the system bus and network adapters provides a failover solution for network adapters

Answers

By connecting National insurance contributions or switch ports together, a variety of physical interconnections to the network can be established. Ethernet bonding offers enhanced results and some fault tolerance.

What purposes does Ethernet serve?

Ethernet remains an widely used type of access point and is employed to communicate devices across a network. Polypropylene is utilized for local networks because of its great speed, security, and dependability in places where it is specifically needed, including company offices, grounds of educational institutions, and hospitals.

How would Ethernet ports function?

Once it hooks in, you insert the other end of the cord into slot on the second phone. The two entities are then connected as a result of this. You can accomplish this from a computer to your router, your router to your modem, your router to your switch, or any other device that includes an Ethernet port.

To know more about Ethernet visit:

https://brainly.com/question/26956118

#SPJ4

in three to five sentences, describe how technology helps business professionals to be more efficient. include examples of hardware and software.

Answers

Answer:

Technology helps business professionals to be more efficient in a number of ways. For example, hardware such as computers and laptops allow professionals to process and analyze data quickly, while software such as productivity suites and project management tools help them to organize and manage their work. In addition, technology helps professionals to communicate and collaborate with colleagues and clients more effectively, through tools such as email, videoconferencing, and instant messaging. Overall, technology enables professionals to work more efficiently by providing them with the tools and resources they need to complete tasks quickly and effectively. Some examples of hardware and software that can help business professionals to be more efficient include:

Hardware:

Computers and laptops

Smartphones and tablets

Printers and scanners

Software:

Productivity suites (e.g. Microsoft Office)

Project management tools (e.g. Trello)

Communication and collaboration tools (e.g. Slack, Zoom)

Explanation:

State what each extension are stands for:
BAT
COM
XLS
TXT

Answers

The file's extension informs your computer which program created or can open the file and which icon to use.

What are some of the computer extensions?.bat : Batch file.com : MS-DOS command file.txt : Plain text file.xls Microsoft Excel fileExcel Binary File Format is represented by files having the XLS extension.Text, Text File (filename extension), Textile, Tomorrow X Together, and TXT are all examples of TXT."commercial" is abbreviated as ".com." Although most business websites do use this domain, a site doesn't always need to be for profit to use.bat. Microsoft's initial filename extension for batch files.

To learn more about the computer extensions refer to:

https://brainly.com/question/28578338

#SPJ1

Why did many societies feel it necessary to adopt some level of government involvement in market economies?

Answers

They believed that in order to deliver public goods, some level of government intervention in market economies was required.

How do you define market?

The market was defined as the total population of buyers and sellers in the area or region under review. This issue could include Earth as well as a slew of other countries, areas, states, and cities. The forces of supply and demand in the market determine the value, expense, and cost of the items sold.

What is market and its type?

The place where two or more parties exchange goods, services, and information is called the market. A market should ideally be a location where at least two people can conduct commerce.

To know more about market visit:

https://brainly.com/question/14176679

#SPJ1

list any two advantages of data sorting​

Answers

Answer:

1 ) it helps arrange all records in a table.

2 ) it is able to deal well with a huge list of items.

Explanation:

there is no additional storage is required .

Games only recently became a part of human life—in about 1100 CE.

A.
True
B.
False

Answers

Answer:

B. False

Explanation:

Games have been around for a long time. The earliest games were played in ancient Egypt.

what focus area of information security describes the wholeness and completeness of information without unauthorized modifications?

Answers

The focus area(s) of information security are given below::

A. Availability: Preventing unlawful information delays or denials through availability

B. Integrity: Refusing to allow the unauthorized addition, deletion, or modification of information

About Information Security:

Information security, often known as InfoSec, refers to the methods and devices that businesses employ to safeguard their data. This includes setting up the appropriate policies to bar unauthorized users from accessing either personal or professional data. Network and infrastructure security, testing, and  auditing are just a few of the many areas that infosec, a rapidly expanding and dynamic profession, encompasses.

Sensitive data is protected by information security from unauthorized actions such interruption, destruction, change, scrutiny, and recording. It is important to protect the security and privacy of sensitive data, including financial information, intellectual property, and account information for customers.

Private information theft, data tampering, and data erasure are all effects of security events. Attacks have a real cost as well as the potential to interfere with business operations and harm a company's reputation.

To know more about information security visit:

https://brainly.com/question/6019784

#SPJ4

The question is incomplete. Below is the complete question:

what focus area of information security describes the wholeness and completeness of information without unauthorized modifications?

a. Privacy

b. Availability

c. Integrity

d. Reliability

oneview is a social media platform that provides a space for its users to save, organize, and tag links of their favorite websites. the users can also share these links with other members of the platform. oneview is an example of a .

Answers

A social networking platform called Oneview gives users a place to save, categorize, and tag links to their preferred websites. Additionally, users can distribute these links to other platform users.

What's new with HPE One View?

Checking connectivity from the appliance to the managed servers during remote support.

Open the web console for each Superdome Flex server partition.

Superdome Flex 280 firmware baseline support in SP/SPT.

For Superdome Flex servers, HPE OneView shows data on power, thermal measures, and cooling fan speed.

Support port remapping for communications between OneView and iLO (ProLiant and C7000).

Storage

Support for the storage systems Alletra 6000 and Alletra 9000 from HPE.

Integration of partners

With VMware vSphere Lifecycle Manager, HPE OneView for VMware vCenter now supports integrated OS, driver, and firmware updates (vLCM).

The ability to log missing alerts that were created while HPE OneView was disconnected has been added to HPE OneView for Microsoft System Center.

Improved data collecting choices, vCenter maintenance mode alert muting, and the ability to display SSD wear statistics are among new features added to HPE OneView for VMware vRealize operations.

Server inventory with health status monitoring, firmware and driver monitoring, network and storage fabric inventory, and HPE ProLiant and Synergy server inventory are all provided via the HPE OneView addon for Windows admin center.

Learn more about firmware and driver from here

https://brainly.com/question/24440921

#SPJ4

The "shrinking" of time and space as air travel and the electronic media make it easier for people of the world to communicate with one another refers to _____.
the World Wide Web
the global village
e-commerce
social networking

Answers

Answer:

the global village

Explanation:

PLEAS help me with the number triangle

Answers

Answer:

 public static void makeNumberTriangle() {

   for(int i=1; i<=5; i++) {

     for(int j=1; j<=i; j++) {

       System.out.printf("%d ",j);

     }

     System.out.println();

   }

 }

Explanation:

You were very close!

Once the location is acquired (ip address 88. 151. 243. 8) what does your computer do with that information?.

Answers

When you search for the IP address, it will take you to the requested webpage.

An IP address is a one-of-a-kind identifier for a device on the internet or a local network. IP is an abbreviation for "Internet Protocol," which is a collection of rules that governs the format of data transferred over the internet or a local network.

IP addresses, in essence, are the identifiers that allow information to be exchanged between network devices: they contain location information and make equipment available for connection. The internet requires a method to distinguish between various computers, routers, and webpages. IP addresses enable this and are a critical component of how the internet operates.

An IP address is a numeric string separated by periods. IP addresses are represented as a string of four digits, such as 192.158.1.38. Each integer in the set can have a value ranging from 0 to 255. As a result, the whole IP addressing range is 0.0.0.0 to 255.255.255.255.

Learn more about IP Address here https://brainly.com/question/29345454

#SPJ4

what is a type of worksheet that contains fields and controls that enable a user to easily enter or edit data

Answers

Type of worksheet that contains fields and controls that enable a user to easily enter or edit data is form.

What is form?

A form is a document designed with a standard structure and format that facilitates the retrieval, organization, and manipulation of information, whether printed or online. Forms and the many controls and objects that you can add to forms simplify entering data into worksheets and improve the appearance of worksheets. You can also do this yourself with little or no VBA (Microsoft Visual Basic for Applications) code.

Spreadsheet forms are not the same as Excel templates. Templates are preformatted files that you can use to start creating workbooks the way you want them. Forms contain fields, drop-down lists, and other controls that make it easy for people using the worksheet to enter or edit data. For more information on templates you can download, see Excel Templates.

Learn more about form https://brainly.com/question/19169731

#SPJ4

Harold offers to sell Emma his farmland in Bryson County. After discussing the sale at length in front of their friends Nicole and Jackson, Harold and Emma orally agree on a price of $120,000 for the land. The next day, Emma goes to the bank and withdraws $120,000 to pay Harold for the land. When Emma presents the $120,000 to Harold, Harold tells Emma he was just joking and does not wish to sell the land. Emma tries to enforce the deal, and Harold continues to refuse by saying that the deal was not in writing, and, therefore, it is unenforceable. The contract between Harold and Emma for the sale of the land:_________



a. Is not enforceable because of the theory of promissory estoppel.


b. Is not enforceable because it violates the statute of frauds.


c. Is enforceable, because there are witnesses to the deal.


d. Is enforceable because it complies with the statute of frauds

Answers

Due to a statute of frauds violation, Harold and Emma's agreement to sell the land is not valid.

what kinds of contracts are governed?Six distinct kinds of contracts are governed by the statute of frauds. Outside of the scope of the law, contracts are enforceable without a written agreement. In contrast, an oral contract will be regarded as legally voidable if it is the only one in a situation where the law calls for a written one.Oral amendments are not enforceable if the statute of frauds requires a written agreement to be in place. Modifications made orally are nonetheless valid even though the contract's provisions stipulate that they must be made in writing. It is allowed to present oral testimony regarding a later written agreement.      

To learn more about Contracts refer to:

https://brainly.com/question/5746834

#SPJ4

true or false? a content offer is something you create and publish in exchange for personal information, like an email address and a name.

Answers

The given Statement is  TRUE.

What is  E-mail id?Electronic mail, also known as email, is identified by an email ID or address when it is sent over the internet. The email requires a sender and recipient address, just like regular mail. All email addresses have the same structure since the 1980s: a distinctive name, followed by  and the domain name. The chosen name you used to create your account is called an email ID. or "nickname" are frequent IDs. The mail server that distributes your message on behalf of your mail client typically adds the Message-ID, which is similar to a digital fingerprint for a message. Email is a term used to describe a means of instantaneously transmitting communications from one system to another through the internet.

To learn more about E-mail id refer to:

https://brainly.com/question/24688558

#SPJ4

real world situations that are too expensive or dangerous to test can be represented using computer _________

Answers

real world situations that are too expensive or dangerous to test can be represented using computer simulation.

What is simulation in computer?Computer simulation is the process of mathematical modeling carried out on a computer and intended to forecast the behavior or result of a physical or real-world system. Computer simulation is the process of using a computer to simulate the behavior of another system in order to reflect the dynamic reactions of a first system. A simulation makes use of a computer software that acts as a mathematical model or description of a real system.A simulation is the repeated imitation of how a system or process would work in the actual world. Models are necessary for simulations; the model reflects the essential traits or behaviors of the chosen system or process, whilst the simulation depicts the model's development over time.

To learn more about Computer simulation refer to:

https://brainly.com/question/15182181

#SPJ4

Which of the following skills would be easiest to learn from a simulation video game?

A.
how to shoot a three-pointer in basketball

B.
how to throw a football long distances

C.
how to juggle different kinds of objects

D.
how to interpret the gauges in a plane’s cockpit

Answers

Answer:

Just throw it

Explanation:

jump and throw the pointer


Unacceptable question

write scripts that accomplish the following tasks. each script should be individually written and not combined with other questions. make sure your spacing is correct if you copy it from the complier. 1) write a function that when called will print out your name. (10 points)

Answers

The print() function prints the specified message to the screen, or other standard output device.

What do you mean by printf() function?

A string can be printed to stdout using the formatting function known as printf in C++. The fundamental concept behind a C++ printf call is to supply a string of characters that must be written exactly as they are in the program. The format specifier in C++'s printf is also substituted with the actual value during execution.

Write a function that when called will print out your name:

Import java.io.Console;

Public class PrintYourName {

Public static void main(String[] args) {

Console console = System.console();

// Your code goes below here

String firstName = “Sam”;

Console.printf(“Hello, my name is %s\n”, firstName);

}

}

You must include the %s placeholder as part of the string and then send in the value you want to replace it separated by a comma.

To learn more about printf() function, visit:

https://brainly.com/question/13034531?referrer=searchResults

#SPJ4

Other Questions
What holy text outlines moral guidelines and the history of islam for its followers?. A capital gain i Ointeret earned from a mutual fund money a of property tock an employee paid to an employee for ale or ervice There are 4 classrooms for fifth grade and 4 classrooms for sixth grade at a school. Each classroom has 20 students. A teacher is planning a field trip for some fifth and sixth grade students at this school. The teachers knows the following information: 90% of fifth and sixth grade students have permission to go on the trip. 4 teachers are going on the trip. The school requires 1 parent volunteer for every 8 students going on the trip. Part AHow many parent volunteers are needed to go on the trip? Show your work or explain your answer. Enter your answer and your work or explanation in the space provided. What is the name of the structure in the inner ear which serves to maintain a sense of equilibrium and orientation in space?. an elderly woman is given scopolamine while on a cruise. she becomes very agitated and confused and is taken to the sick-bay of the ship. the nurse knows that which is a likely reason for these symptoms? Provide the missing statement and reasons for the following proof: A project manager can identify personnel who will be directly responsible for each task in the project's development by using aNo:Select one:A.Work package report.B.Milestone designation chart.C.Responsibility assignment matrix.D.Merrill report. "I'll catch it," said Hawkeye, "if you want me to." What is the best estimate of 49.13 0.58?A. 80B. 40C. 25D. 50 Music Company A charges a $ 15 membership fee and $ 0.75 each to download a song. Music Company B charges $ 0.90 each todownload a song with no membership fee.a. For what number of songs will both companies charge the same amount? Justify your answer using mathematics.____songsYou anticipate that you will download 150 songs. Which company should you choose if you want to spend the least amount ofmoney? Justify your answer using mathematics. The length of a rectangle of fixed area varies inversely as the width. If thelength of the rectangle is 6 feet when the width is 12 feet, find the length of therectangle when the width is 4 feet One way the federal reserve can counter unemployment and stimulate spending is by? Find k so that Kx^2+12x+9 is the square of a binomial needs, wants, interests and desires that propel people in certain directions are known as group of answer choices motives. drives. incentives. habits. - 4.5N = 135 What is N? Write the equation of the line in point-slope form. (hint the y intercept is (0, -5) show work 100 points + brainlist if correct and well explained:What are the vertex and range of y = |3x + 6| 4? (2, 4); < y < (2, 4); 4 y < (0, 4); < y < (0, 4); 4 y < What does the amplitude of sound refer to?the sounds volumethe sounds frequencythe sounds durationthe sounds pitch The trp operon in e.coli regulates genes that code for enzymes required for synthesis of the amino acid tryptophan. the trp operon is a repressible operon. when tryptophan is not available in the environment, the trp repressor protein is____. therefore, rna polymerase can bind to the___to begin transcription. A successful career path as a police officer involves_____.A. high school educationB. police academy trainingC. career-long leamning as an officerD. all of the above