which of the following are examples of broad classes of expenses on the income statement? multiple select question. cost of goods sold dividend expense retained earnings interest expense taxes general and administrative expenses

Answers

Answer 1

They consist of depreciation or amortisation, research and development, general and administrative expenses, and cost of products sold. We all incur three main categories of costs fixed, variable, and periodic.

Expenses are the costs that the business must incur in order to make a profit. The depreciation of equipment, staff salaries, and supplier payments are a few instances of regular expenses. Financial statements that must be provided are the income statement, balance sheet, and statement of cash flows. These three statements can be used by traders as educational tools to assess a company's financial health and to quickly determine its underlying value.

What is amortisation?

The cost of products supplied, selling, general, and administrative costs, depreciation or amortisation, as well as research and development costs, are among them.

To learn more about development from given link

brainly.com/question/28011228

#SPJ4


Related Questions

task paneA __________ is a window that can remain open and visible while you work in the document.

Answers

A window that can stay open as well as visible while you collaborate in the document is known as a task pane.

What is document?

Document is a written, typed, or printed record of something such as a contract, agreement, or other legal document. Documents can be stored in a variety of formats, including paper, digital, and audio. Documents are used to provide evidence and information, and can be used to establish the identity of a person or to prove a legal claim. Documents can also be used to record transactions, store information, and communicate information. Documents are important resources for businesses, government agencies, and individuals. They are an essential part of the way we conduct business, as they are integral to the exchange of information. Documents can also help protect organizations and individuals in the event of a dispute or legal action.

To learn more about document
https://brainly.com/question/30005386
#SPJ4

True or False: With contemporary antivirus protection it is now possible to ensure a virus or malware never will attack your computer.

Answers

False. With contemporary antivirus protection it is now possible to ensure a virus or malware never will attack your computer.

Why is antivirus security so crucial?

Once on your computer or laptop, malware may steal your data, encrypt it so you can't access it, or even completely destroy it. You must always use antivirus software and keep it updated if you want to protect your data and gadgets.

Is it ok to go without an antivirus program?

Antiviral software is still unquestionably required overall, although some devices require it more than others. The only gadgets that don't need antivirus software installed are iPhones. Devices running Windows, macOS, and Android still need antivirus software.

To know more about antivirus visit

brainly.com/question/14313403

#SPJ4

The Ntuser.dat file loads registry information for the current user logged onto a system in the HKEY_CURRENT_USER (HKCU) registry hive. True or False?

Answers

Yes, The Ntuser.dat file loads registry information for the current user logged onto a system in the HKEY_CURRENT_USER (HKCU) registry hive.

Where can I get the Ntuser DAT file?

NTUSER. DAT can be found under C:usersdefaultntuser. dat in Windows Vista and later versions of Windows. Other paths exist for earlier operating systems, such as C: Documents and Settingsusername>ntuser.

What causes a Windows 10 user profile to become corrupt?

One of the following factors is known to contribute to this error: The user profile is damaged or not present. Virus attacks, power outages, and disk write mistakes all jeopardize the integrity of the file system. faulty memory or a failing hard drive are examples of hardware issues.

To know more about operating system visit:

https://brainly.com/question/6689423

#SPJ4

select all that apply. it may be possible to simplify event handler code by using which of the following?

Answers

Using a primitive variable from the list below may make the event handler code simpler.

What is meant by primitive variable?

Primitive and reference type variables are the two types of variables used in Java. Primitive types are any of the fundamental kinds, including int, boolean, char, short, float, long, and double. They are not treated the same way by the JVM as reference types, which are used to point objects like Strings, Threads, Files, and others.

Primitive data types define the nature and size of variable values. They are the fundamental pieces of data manipulation and can never be broken down into more basic data types. In Java, there are eight different types of primitive data types: Boolean, char, byte, int, short, long, float, and double.

To learn more about primitive variable refer to :

https://brainly.com/question/8040894

#SPJ4

networking essentials (version 2) - modules 1 - 4: internet connection: getting online pre-test exam

Answers

The characteristic of a SOHO network is option D: It is a small network that connects a few computers to each other and to the internet.

What does SOHO stand for?

The SOHO network, also known as a single office, tiny office, or home office network, primarily refers to a business category with a few employees, typically between one and ten. It is a particular local area network connection, or LAN, designed for usage in small enterprises.

Therefore, based on the above, one can say that  SOHO network enables PCs in a home office or remote office to access centralized, shared services or connect to a corporate network.

Learn more about SOHO network  from

https://brainly.com/question/10674980
#SPJ1

See full question below

networking essentials (version 2) - modules 1 - 4: internet connection: getting online pre-test exam

What is a characteristic of a SOHO network?

It consists of multiple LANs with backbone infrastructure connections.

It is a large network, such as those used by corporations and schools, with hundreds or thousands of interconnected hosts.

It is a collection of interconnected private and public networks.

It is a small network that connects a few computers to each other and to the internet.

What list will be referenced by the variable list_strip after the following code executes?

Answers

The list referenced by the variable list_strip after the code executes will be [1, 2, 3, 4], as list_strip was created as a copy of list_org, with list_org.copy(), and then the last element of the list was removed with list_strip.pop().

What is code executes?

Code executes instructions written in a programming language to perform a specific task or set of tasks. It is the process that carries out the instructions in a computer program. Code is written in a programming language, such as C++, Java, or  Python, by a programmer using a text editor or other development environment. The code is then compiled into a format that is executable by the computer, and then executed, or run, to perform the desired tasks.

list_org = [1, 2, 3, 4, 5]
list_strip = list_org.copy()
list_strip.pop()
The list referenced by the variable list_strip after the code executes will be [1, 2, 3, 4], as list_strip was created as a copy of list_org, with list_org.copy(), and then the last element of the list was removed with list_strip.pop().

To learn more about code executes
https://brainly.com/question/28224061
#SPJ4

tim an it technician has implement identification and detection techniqeues based on the ability to distinguish legitimate traffic

Answers

According to the provided statement, he is attempting to safeguard the network for IDS evasions.

What distinguishes a technician?

According to the definitions, technicians are experts or trained in the practical parts of their profession, they use information in a practical way, they use their practical experience to solve issues that are also practical, and their knowledge is practical.

Is being a tech a skill?

The precise technical and soft skills that IT technicians need to master in order to thrive in their occupations are known as IT technician skills. Digital hard skills are vital because the majority of IT professionals are accountable for software and hardware upkeep as well as computer installs and repairs.

To know more about Technician visit:

https://brainly.com/question/28015204

#SPJ4

The complete question is-

Robin, an IT technician, has implemented identification and detection techniques based on the ability to distinguish legitimate traffic from illegitimate traffic over the network. Which of the following is he trying to achieve?

a researcher conducted an experiment in whice he compared two methods of teaching if there were 10 people

Answers

A researcher ran an experiment in which he contrasted two teaching strategies for a class of ten students. then using 10 as a teaching strategy.

What is a good number of people for an experiment?

When utilizing qualitative methods, 30 is more than sufficient and a respectable sample size, but when using quantitative methods and analysis, less than 100 is insufficient for even a basic statistical analysis.

It is fairly simple to differentiate instruction and learning. Giving lessons on a specific subject to a group of students is the simple definition of teaching. Learning, on the other hand, is obtaining knowledge through study, instruction, and experience.

Face-to-face lectures involve students and instructors interacting in real time, which is one of the key contrasts between face-to-face and online training. In contrast, online students study at their own pace, going through lectures and other course materials.

To learn more about teaching method refer to :

https://brainly.com/question/22786034

#SPJ4

Write a program that first reads in the name of an input file, followed by two strings representing the lower and upper bounds of a search range. The file should be read using the file.readlines() method. The input file contains a list of alphabetical, ten-letter strings, each on a separate line. Your program should output all strings from the list that are within that range (inclusive of the bounds). Ex: If the input is: inputi.txt ammoniated millennium and the contents of input1.txt are: aspiration classified federation graduation millennium philosophy quadratics transcript wilderness zoologists the output is: aspiration classified federation graduation millennium Notes: • There is a newline at the end of the output. • input1.txt is available to download. • In the tests, the first word input always comes alphabetically before the second word input.

Answers

Input:

input1.txt

classified

zoologists

what are the two strings representing the lower and upper bounds of a search range?

The lower bound of a search range is typically represented as a string that is less than or equal to the target value, while the upper bound of a search range is typically represented as a string that is greater than or equal to the target value.

input_file = 'input1.txt' #input('File name:')

start = 'ammoniated' #input('Upper bound:')

end = 'millennium' #input("Lower bound:")

with open(Input_file, 'r') as f:  

 contents = f.readlines()

for i in range(len(contents)):

 if  (contents[i] >= start) and (contents[i] <= end):

   print(contents[i],end='')

input_file, start and end are supposed to be user enterable, but I have commented them out and hard coded them for ease of testing.

To learn more about strings refer to:

https://brainly.com/question/20813205

#SPJ4

a _____ is a security event that constitutes a security incident in which an intruder gains access to a system without having authorization to do so.

Answers

A security incursion is a security event that results in a security incident in which an unauthorized user gains access to a system.

What are an intruder and an intrusion?

Attackers who try to compromise a network's security are known as intruders. They launch an attack on the network to gain illegal access. There are three different categories of intruders: miscreants, masqueraders, and covert users.

What is in charge of figuring out whether an intrusion has happened?

The analyzer is in charge of figuring out whether an intrusion has taken place. This component's output serves as a notification of an intrusion. An IDS's user interface enables a user to monitor system output or modify the system's behavior.

To know more about security visit:-

https://brainly.com/question/28070333

#SPJ4

What is the output?

>>>import time
>>>time.localtime()

the number of seconds since the epoch

the date

the time

the user's time zone

the time-zone offset

Answers

The output from the given function include the following;

A. the number of seconds since the epoch.

B. the date.

C. the time.

What is a function?

In Computer technology, a function can be defined as a named portion of a block of executable code that is written to perform a specific task and output a specific information (result), which is usually a single, related action.

This ultimately implies that, a function comprises a group of related statements (block of code) that would only run and returns a data when it is called.

In this scenario, the given time() function would output the following information:

The number of seconds since or after the epochThe date (day of the year or the month).The time.

Read more on output here: https://brainly.com/question/23462518

#SPJ1

True or False: PCAOB standards suggest that auditors emphasize nonroutine transactions as contrasted to routine transactions in their consideration of internal control.

Answers

According to PCAOB rules, auditors should focus more on nonroutine transactions when evaluating internal control than on routine transactions. The effectiveness of internal control is typically given negative assurance in an auditor's report on internal control.

What is PCAOB?

A routine, nonroutine, and estimation transaction audit of internal control over financial reporting was performed concurrently. As a result of the Board's determinations regarding the audit's scope of internal control over financial reporting, the PCAOB and the U.S. Securities and Exchange Commission were engaged to conduct the audit. For audits, the modified standard will be in effect. The internal control report needs to contain. a declaration of management's obligation to create and maintain effective internal controls over financial reporting for the organisation.

To learn more about concurrently from given link

brainly.com/question/15695656

#SPJ4

In class we have discussed how would you analyze a RAM dump. Which of these approaches can be used to analyze a RAM dump?(Select all the apply)
a. Use a file carver to look for information
b. Reconstruct the RAM file system using Autopsy
c. Use a strings finder to look for information
d. Copy the dump into a virtual machine and see what happens to the RAM in the virtual machine

Answers

Use a file carver to look for information and Use a strings finder to look for information to analyse a RAM dump.

What is file carving?The method of file carving entails attempting to restore files without this metadata.To do this, analyse the raw data and determine what it is like a text, executable, PNG, mp3, etc.. The simplest approach to do this is to check for the file signature or magic digits that indicate the start and/or end of a specific file type. For instance, the hexadecimal value is the first four bytes of every Java class file. File carving can be carried out with the aid of either free or paid software.It is frequently done in conjunction with computer forensics investigations or with additional recovery attempts such as hardware repair by data recovery businesses. So, options a and c are correct.

To learn more about Software, refer:

https://brainly.com/question/24852211

#SPJ4

the data management body of knowledge (dmbok) defines the planning, implementation, and control of activities that apply quality management techniques to data as

Answers

Data quality is the design, implementation, and control of actions that apply quality management approaches to data in order to ensure that it is fit for consumption and satisfies the needs of data consumers, according to the Data Management Body of Knowledge.

What is Data Management?

The organising carrying out, and supervising of data-related quality management operations. The planning and implementation are defined by the Data Management Body of Knowledge. The Data Management Book of Knowledge is a thorough reference for data management specialists regarding global data management standards and procedures. to share knowledge on maturity models for data management, deliverables and metrics, roles and responsibilities, and best practises to harmonise management techniques across the industry.

To act as a practical foundation for putting these approaches into effect in any kind of business.

To learn more about practises from given link

brainly.com/question/26035095

#SPJ4

Which is NOT a valid sparkline type?
O line
O column
Owin/loss
O bar

Answers

Answer: bar
Bar is not a valid sparkling type

answer key and retrieve the spreadsheet from guided practice: spreadsheet formatting in cell b8, enter a formula to add the quantities of each item in cell a10, key and indent discount in bold font

Answers

The formula to add the quantities of each item in cell

What is formula?

Formula is a set of instructions that expresses a relationship between different values, variables, or numbers. It is used in mathematics, physics, chemistry, economics, and other sciences to calculate an answer from given data. Formulas are made up of symbols and numbers and can be used to solve complex problems or equations. Formulas are also used in everyday life, such as when calculating taxes, measuring ingredients for a recipe, or making financial decisions. Formulas help to make calculations easier and more accurate.

In cell B8, enter the formula “=SUM(A2:A7)” to add the quantities of each item in cell A10. To key and indent the discount, highlight the discount cell and select the bold font option.

To learn more about formula
https://brainly.com/question/29779294
#SPJ1

True or False? In order for the contents of an included file to be treated as html, it must be use the .html file extension

Answers

False. In order for the contents of an included file to be treated as HTML, it does not necessarily need to use the .html file extension.

When the data can flow across a cable in both directions, this is known as full duplex communication. Explanation: In a duplex type of topology or communication, data or information can be transferred in both directions

Answers

When data can flow across the cable in both directions, this is known as full duplex communication.

What is Duplex Communication?

A point-to-point system with two or more connected parties or equipment that can communicate with one another in both directions is known as a duplex communication system.In many communication networks, duplex systems are used, either to provide a reverse way for the monitoring and remote adjustment of equipment in the field, or to provide simultaneous communication in both directions between two linked parties. Full-duplex (FDX) and half-duplex (HDX) are the two different forms of duplex communication technologies.A full-duplex system allows for simultaneous communication between both sides. Simple telephone service is an illustration of a full-duplex equipment; callers can simultaneously speak and be heard by call recipients on both ends.Neither party may communicate with the other simultaneously in a half-duplex or semi-duplex system; instead, one way at a time is exchanged. Walkie-talkies, which are two-way radios with push-to-talk buttons, are an illustration of a half-duplex gadget.

Correct Question: When data can flow across the cable in both directions this is known as a what communication?

To learn more about Communication from the given link

https://brainly.com/question/25793182

#SPJ4

Question 8 of 10 What is one advantage of replacing a network's copper wires with fiber optic cables? A. It allows more LANs to be connected to the same WAN. B. It saves money because the cables are less expensive. OC. It enables multiple network devices to share a single IP address. OD. It provides the network with more bandwidth.​

Answers

One advantage of replacing a network's copper wires with fiber optic cables is option D. It provides the network with more bandwidth.​

What is the purpose of fiber optic cable?

For long-distance and high-performance data networking, fiber optics are utilized. Additionally, it is frequently utilized in telecommunications services like internet, television, and telephones.

They are known to be used to transmit data signals in the form of light and travel hundreds of miles far more quickly than those used in conventional electrical cables. Optic cables and optical fiber cables are other names for them.

Therefore, Fiber optic cables provide advantages over copper cables. expanded bandwidth. Copper cables have a constrained bandwidth because they were first made for voice transmission. Faster speeds, greater distances, improved dependability, thicker and more durable construction, increased future flexibility, and lower total cost of ownership are some of the benefits.

Learn more about fiber optic cables from

https://brainly.com/question/116766
#SPJ1

in this lab, your task is to: configure windows update to: install updates for other microsoft products when windows is updated. allow the installation of feature updates to be deferred 60 days. allow quality updates to be deferred 30 days. configure windows to automatically download manufacturers' apps and custom icons for devices.

Answers

On the ITAdmin desktop system in your company, you must modify how Windows Update searches for and installs updates.

How do feature updates and quality updates differ from one another?

A feature update adds new features and enhances existing ones. It may be postponed for 60 days. A good update will have security upgrades. This much time can be put off: 30 days.

How much time can I put Windows Update on hold?

Additionally, you have the option of pausing feature updates for a device for up to 35 days after the setting is set. The device will check Windows Update for relevant feature updates when the pause option expires automatically after 35 days. The device's feature updates can then be paused once again after.

To know more Windows visit :-

https://brainly.com/question/13502522

#SPJ4

True or False: As with the initial development of the system, implemented changes are formally reviewed and not tested before installation into operational systems.

Answers

Before being incorporated into operating systems, implemented changes are formally vetted but not tested, just like during the system's initial development. This claim is untrue.

What exactly does implementation mean?

After implementation, users can take control of the system's operation for use and evaluation. It comprises preparing for a smooth conversion and instructing users on how to utilise the system.

What in T/F software testing is false?

Untrue T/F Preventive maintenance focuses solely on fixing flaws in an existing system without introducing new functionality, giving little to no value to the organisation. Untrue T/F Change-implementation and change-design are not important maintenance tasks.

To learn more about system implementation visit:

brainly.com/question/14274204

#SPJ4

Multiple Choice Questions
1. Which one of the following statements best describes computer privacy?
(a) Securing a computer from fires and earthquakes.
(b) Protecting a computer from a power surge.
C) Preventing your friend from viewing your computer data without your permission.
(d) Preventing important computer files from getting accidentally deleted.
urity measures can you adopt to help protect your computer an​

Answers

''Preventing your friend from viewing your computer data without your permission'' is the one describes computer privacy.

What is computer security and privacy?The goal of data privacy is to protect data from unauthorised access, theft, and loss. It's crucial to maintain data security and confidentiality by practising good data management and avoiding unauthorised access that might lead to data loss, change, or theft.Because it provides you control over your identity and personal data, internet privacy is crucial. If you don't have that control, anyone with the means and the will may use your identity to further their interests, such as selling you a more costly trip or robbing you of your funds.Data protection is the focus of security, whereas user identity protection is the focus of privacy. However, the exact distinctions are more nuanced, and there may be certain places where they overlap. Security refers to safeguarding information from unauthorized access.

Learn more about Data security refer to :

https://brainly.com/question/27034337

#SPJ4

When evaluating a programming language the category Reusability describes:

Answers

This idea explores how tightly bound a language is to a specific platform, how readily code can be disseminated, and how easily libraries can be created and shared.

What notation does Prolog use for expressing arithmetic operations?

One illustration was the nomenclature for arithmetic operators. Prolog will internally use the syntax is(11,+(2,*(3,3))) although we may also write 11 is 2 + 3 * 3. Infix operators are used to describe such functors that can be written between their arguments.

What aspect of contemporary programming language design is widely viewed as being more crucial?

Readability− The readability and comprehension of the programs is a key criterion for evaluating a programming language. Therefore, readability in the context of the issue domain must be taken into account in a decent programming language.

Learn more about programming here:

https://brainly.com/question/11023419

#SPJ4

Programs that perform business functions, such as general ledger and accounting, are examples of ________.a) application softwareb) system softwarec) firmwared) operating systems

Answers

Applications software includes, for instance, general ledger and accounting programs that carry out business operations.

What is software for application systems? Examples of application software include programs that carry out administrative tasks like general ledger and accounting.A particular kind of computer program called application software carries out particular professional, academic, and personal tasks.Each program is made to help users of it do a range of tasks, some of which might be connected to productivity, creativity, or communication.Accounting, purchasing, project management, risk management and compliance, and supply chain management are just a few of the everyday business tasks that are managed by firms using enterprise resource planning (ERP) software.An illustration of application software is shown below:Spreadsheet, presentation, word processing, and multimedia software are just a few examples of the types of software available.Business software that is frequently used:Desktop publishing applications, asset management software, billing software, payroll software, asset accounting software, and word processing software.

To learn more about Applications software refer]

https://brainly.com/question/26954052

#SPJ4

Cybersecurity is the protection of digital devices and their connected networks from danger and threats as well as protecting personal information on a system by detecting, preventing and responding to attacks

Answers

The statement given about the process and significance of cybersecurity is definitely true.

What is Cybersecurity?

Cybersecurity may be defined as a type of process that involves the protection of digital devices and their connected networks from danger and threats as well as protecting personal information on a system by detecting, preventing, and responding to attacks.

It is the complete mechanism through which individuals and organizations reduce the risk of cyber attacks. Cyber security's core function is to protect the devices we all use such as smartphones, laptops, tablets, and computers, and the services we access both online and at work from theft or damage.

Therefore, the statement given about the process and significance of cybersecurity is definitely true.

To learn more about Cybersecurity, refer to the link:

https://brainly.com/question/28004913

#SPJ1

Draw a flowchart to print Hello world 10 timer. ​

Answers

Can you please like this so I get points I need help with my problem but don’t have points

Answer:

hope that helps...

p.s. I hope the writing is readable :(

The default view that PowerPoint opens in is called ____ view.
a. Slide
b. Normal
c. Standard
d. Edit

Answers

Correct answer:- (b) Normal

The default view that PowerPoint opens in is called the normal view.

What is a default view sometimes known as?

The Normal view in PowerPoint is the default view. The normal view is the one in which we may format, add slides, and modify.

Which slide in PowerPoint is the default?

When you create a new presentation, by default, a Title slide will be added since Micro-soft believes that the first slide in your presentation should be for the title. Two text boxes can be included on a title slide.

What makes it a default?

When a borrower ceases making the required payments on a loan, a default happens. Whether the debt is secured, like a mortgage secured by real estate, or unsecured, like credit cards or student loans, defaults can happen.

To know more about power point visit:

https://brainly.com/question/23714390

#SPJ4

Which of the following memory access types tend to be fastest?

Question 14 options:

heap


linked list


stack


registers

Answers

The memory access type that tends to be fastest is stack memory. The correct option is c.

What is a heap or stack memory?

The access pattern of the stack makes allocating and releasing memory from it simple (a pointer or integer is simply increased or decreased), whereas the heap requires much more intricate bookkeeping for an allocation or release.

Stack-based memory allocation is very straightforward and frequently much faster than heap-based memory allocation because data is added and removed in a last-in, first-out fashion (also known as dynamic memory allocation).

Therefore, the correct option is c, stack.

To learn more about heap or stack memory, refer to the below link:

https://brainly.com/question/29216876

#SPJ1

T/F BEFORE means before the changes are made in memory but after the changes are permanently saved to disk

Answers

False indicates after the modifications have been permanently saved to disc but before the changes are made in memory.

What is COMMIT?  

The transactional command used to save database changes triggered by a transaction is called COMMIT. All database transactions that have occurred since the last ROLLBACK or COMMIT command are saved when you use the COMMIT command. If you haven't used the COMMIT command, you can use the ROLLBACK command to recover a table's values. By specifying the required fields and putting constraints on the rows to be included in the output, you can choose only a portion of the contents of the table. a cursor attribute that may be added to a cursor or cursor variable's name.

To learn more about ROLLBACK from given link

brainly.com/question/29853510

#SPJ4

A ________ monitors network traffic for particular network segments or devices and analyzes network, transport, and application protocols to identify suspicious activity

Answers

A network intrusion detection system (NIDS) monitors network traffic for particular network segments or devices and analyzes network, transport, and application protocols to identify suspicious activity. NIDS are designed to detect and alert on potential security threats or anomalies that may indicate a breach or attack on a network.

A network intrusion detection system (NIDS) is a type of security software designed to monitor a network for malicious activity or policy violations. NIDSs operate by analyzing network traffic and comparing it against a set of rules or criteria to identify potentially malicious activity.

NIDSs can be configured to monitor specific protocols, ports, or traffic patterns and to alert administrators when suspicious activity is detected. They can also be configured to take automatic action in response to certain types of activity, such as blocking traffic from a particular IP address or triggering a system lockdown.

Learn more about NIDS, here https://brainly.com/question/20556615

#SPJ4

Other Questions
Please help me with this in multiple sclerosis the myelin sheaths around the axons of the brain and spinal cord are damaged and demyelination results. how does this disease manifest at the level of the action potential? i) action potentials move in the opposite direction on the axon. ii) action potentials move more slowly along the axon. iii) no action potentials are transmitted. in multiple sclerosis the myelin sheaths around the axons of the brain and spinal cord are damaged and demyelination results. how does this disease manifest at the level of the action potential? i) action potentials move in the opposite direction on the axon. ii) action potentials move more slowly along the axon. iii) no action potentials are transmitted. only i only ii only iii only ii and iii request answer Shahina has 550g of apples and plenty of the other ingredients. Can she make apple crumble for 6 people?Explain how you got your answer.By the way for 8 people it is:700g of apple, 40g butter, 240g sugar and 180g flour A social media company updates its application with new features, which prove to be extremely unpopular and are eventually removed. Another technology company adopts one of the features for its new application, and within weeks of the first company's failure, the second company is successful in an emerging market.Which features of global culture are represented in this scenario? a jeans maker is designing a new line of jeans called slams. slams will sell for $295 per unit and cost $188.80 per unit in variable costs to make. fixed costs total $68,000. (round your answers to 2 decimal places.) Because many services involve a process of continuous interaction between the service organization and the customer, _____ marketing is an important strategy. trial-and-error learning is based on the idea that learning often occurs by . noticing the consequences of our actions to guide future behavior analyzing and understanding problems watching as another person is reinforced or punished for their behavior random behavior that is immediately forgotten One of the most important concepts in marketing is the price elasticity of demand, which is theA. degree to which the price of a product affects consumers' purchasing behavior.B. point at which the costs of producing a product equal the revenue made from selling the product.C. price that consumers consider reasonable and fair for a product.D. percentage a product is marked up in response to consumer demand.E. percentage change in quantity demanded in response to a percentage change in price.Answer: E Bashar drew a regular pentagon with sides that are 5 inches long. Then he drew a pentagon with sides that are half the length of the first pentagon's sides. What is the length of the sides of the second pentagon? ecall that one of the ten parts of the definition of a vector space says that if is a vector space, then there exists a vector in such that for all in hceggg suppose a sample of a radioactive substance weighs 32 mg. one year later, the sample weighs 25.5 mg. what is the half-life of this substance? (round your answer to two decimal places.) functional/professional touch is the most highly dictated, generally by implicit cultural rules. true If anyone can help me out that will be great! 3 tyy*brainliest + 50 points* (03.03 MC)The diagram below shows two waves. At which letter (A-D) on the diagram is constructiveinterference going to occur?abcd bipedalism is one of the most important characteristics of hominin evolution. the appearance of bipedalism led to anatomical changes that are considered to be distinguishing characteristics of hominin fossils. the evidence for bipedalism is supported by fossil evidence from more than 4 million years ago and 3.6-million-year-old footprints in volcanic ash. recently, however, scientists have focused on the link between tooth structure and diet in the evolution of the early hominins, specifically in australopithecus species. detailed studies of hominin dental features have provided evidence of an important dietary shift that led to adaptive radiation within this genus. most of the evidence comes from analyses of tooth size and shape, microscopic wear patterns on teeth, and jaw structure. the evidence suggests that fibrous plant materials became more important through the pliocene, perhaps as critical components in the diet of some species. what is the most likely evolutionary link between bipedalism and changes in the diet of early hominids? Lily convinced her parents to have her birthday party at Flyzone Trampoline park. As soon as she gets there , lily spends 3/4 of an hour eating birthday cake with her friends in all , lily spends 2 1/4hours at Fly zone . LMNO is a parallelogram. If NM\ =\ x+32\ and\ OL=2x+22,\NM = x+32 and OL=2x+22, find the value of x and then find NM and OL 2. Which of the following services would you expect a depository institution to offer?a. Pension fund managementb. Electronic funds transferc. Accounting transfer management (ATM)d. Inventory control of revenuese. All of the above3. The Banking Act of 1933 gave the Federal Reserve System the authority to:a. Allows banks to set their own interest ratesb. Ban interest on demand depositsc. Require customers to have minimum deposits before they can use many of the banks servicesd. Declare that credit cards can and do replace moneye. Do all of the above Sometimes people who speak different languages are in a community together and must develop a way of communicating. Similarly, their offspring must also find a way to communicate. The main difference between the speech of the first generation and the speech of the second generation is...A) The speech of the first generation tends to include a larger vocabularyB) The speech of the second generation tends to include a larger vocabularyC) The speech of the first generation tends to have more complex grammar rulesD) The speech of the second generation tends to have more complex grammar rulesE) Minor because there is typically no difference between the speech of the first generation and the speech of the second generation Supply-side economics is a theory that maintains that increasing the supply of goods and services is the engine for economic growth. It advocates tax cuts as a way to encourage job creation, business expansion, and entrepreneurial activity.