which of the following operating systems support windows powershell v2?

Answers

Answer 1

Windows PowerShell v2 is supported by the following operating systems -

1. Windows 7

2. Windows   Server 2008R2

3. Windows Server 2008

4. Windows Vista   (Service Pack 2or later)

How  is this   so?

These operating systems   provide built-in support for Windows PowerShell v2, allowing users to utilize its features and capabilities.

However, it's worth notingthat newer versions of Windows PowerShell have been released, such as   Windows PowerShell v3 and later, which offer additional enhancements and features.

Learn more about windows powershell v2 at:

https://brainly.com/question/14724948

#SPJ4


Related Questions

define Microsoft Excel 2010​

Answers

Answer:

a very very old Microsoft application that only people on old pc's use now

Explanation:

Answer:

Microsoft Excel is a Microsoft software program that allows users to organize, format, and calculates data using the formulas of a tablet.

This program is part of the Microsoft Office Suite and supports other Office Suite applications. Microsoft Excel can now be purchased on subscription via cloud via office 365, as can other Microsoft Office products.

Explanation:

In Excel, entering a value column and clicking on a cell in the low sheet below allows the cell to add all of the numbers entered above to the "auto sum" button. This takes place in the manual leader counts, which before the development of the modern table were a labor-intensive part of the business.

Microsoft Excel is also a key user technology, useful in training and professional development, in various types of simple case applications. MS Excel has been included in basic corporate computer graduation training for several years, and temporary employment agencies may examine individuals for a wide variety of clerical duties on their skills with Microsoft Word and Microsoft Excel.

The data visualization principle has changed the Microsoft Excel usage cases. Where companies have used Microsoft Excel for, say, hundreds of records in the past, most business cases today involve tablets containing less than a dozen values for each particular project.

Match the database function to its purpose
finds the largest number in a database that
matches conditions
DCOUNT
DMIN
adds the numbers in a field of records in a
database that matches conditions
finds the smallest number in a database that
matches conditions
DAVERAGE
counts the cells that contain numbers in a
database that matches conditions
DMAX
DSUM
averages values in a field of records in a
database that matches conditions
Icy ll

Answers

Answer:

DCOUNT

counts the cells that contain numbers in a database that matches conditions

DMAX

finds the largest number in a database that matches conditions

DMIN

finds the smallest number in a database that matches conditions

DSUM

adds the numbers in a field of records in a database that matches conditions

DAVERAGE

averages values in a field of records in a database that matches conditions

Explanation: I got it right

epeat the previous process using recursion. Your method should not contain any loops. How much space does your method use in addition to the space used for L?

Answers

To repeat the previous process using recursion, we can create a recursive function that calls itself with a modified version of the input until the base case is reached. In this specific case, the base case would be when the input list (L) is empty.

Here is an example of a recursive function that performs the process:

def recursive_process(L):

   if not L: # base case: if the list is empty, return

       return

   # perform the process on the first element of the list

   process(L[0])

   # call the function again with the rest of the list (excluding the first element)

   recursive_process(L[1:])

In terms of space usage, the function uses O(n) space in addition to the space used for the input list L. This is because for each recursive call, a new stack frame is created, and these stack frames take up memory. Since the function is called once for each element in the input list, the total space usage is proportional to the size of the input list.

Learn more about recursive function, here https://brainly.com/question/30027987

#SPJ4

epeat the previous process using recursion. Your method should not contain any loops. How much space

// This pseudocode is intended to display employee net pay values. // All employees have a standard $45 deduction from their checks. // If an employee does not earn enough to cover the deduction, // an error message is displayed

Answers

The pseudocode provided is designed to display the net pay values of employees. It specifies that all employees have a $45 deduction from their checks. However, if an employee does not earn enough to cover this deduction, the program should display an error message to notify the user.

Pseudocode


1. First, declare variables for employee's gross pay, net pay, and the standard deduction amount.
2. Assign the standard deduction amount of $45.
3. Get the employee's gross pay as input.
4. Calculate the net pay by subtracting the standard deduction from the employee's gross pay.
5. Check if the employee's gross pay is greater than or equal to the standard deduction.
  a. If yes, display the employee's net pay.
  b. If no, display an error message indicating that the employee's earnings do not cover the standard deduction.

Here's a pseudocode representation:

```
DECLARE grossPay, netPay, standardDeduction
SET standardDeduction = 45
INPUT grossPay
SET netPay = grossPay - standardDeduction

IF grossPay >= standardDeduction THEN
   OUTPUT "Employee's net pay is: ", netPay
ELSE
   OUTPUT "Error: Employee's earnings do not cover the standard deduction"
ENDIF
```

This pseudocode takes the employee's gross pay as input, calculates the net pay, and displays either the net pay or an error message, depending on whether the gross pay covers the standard deduction.

To know more about  Pseudocode visit:

https://brainly.com/question/17442954

#SPJ11

user downloads a widget onto his android phone but is puzzled to see that when the widget is touched an app is launched. what is a possible cause?

Answers

Answer:

Explanation:

A possible cause for the behavior where touching a widget on an Android phone launches an app could be that the widget is incorrectly configured or associated with the wrong app.

Widgets on Android devices are intended to provide quick access to specific functions or information without opening the full application. They are typically placed on the home screen or in a widget panel. When a user interacts with a widget, it should perform the designated action associated with that widget.

If touching a widget launches an app instead of performing the expected action, it suggests that the widget's configuration may be incorrect. The widget may be associated with the wrong app, resulting in the app being launched instead of the intended widget behavior.

To resolve this issue, the user can try the following steps:

1. **Remove and Re-add the Widget**: Remove the problematic widget from the home screen or widget panel and re-add it. This can sometimes refresh the widget's settings and resolve any misconfigurations.

2. **Check Widget Settings**: Some widgets have settings that allow customization of their behavior. The user should verify the widget's settings to ensure they are correctly configured for the desired action.

3. **Reinstall the Widget or App**: If the issue persists, uninstalling and reinstalling the widget or the associated app can help resolve any underlying software conflicts or issues.

4. **Contact App Developer**: If the problem continues, reaching out to the app developer or widget provider for support can provide further assistance in troubleshooting the issue.

It's important to note that the specific cause can vary depending on the widget, app, and device configuration. The steps above provide general guidance to address the issue of a widget launching an app instead of performing its designated action.

Learn more about  widget here:

https://brainly.in/question/17825063

#SPJ11

What is the keyboard shortcut for pasting information that you have already copied to the clipboard?.

Answers

The keyboard shortcut for pasting data that has already been copied to the clipboard is CTRL + V.

A keyboard shortcut, also referred to as a hotkey, is a sequence of one or more keys used in computing to quickly launch a software application or carry out a preprogrammed action.

This procedure might be included in the operating system's or application program's standard functionality, or it might have been programmed by the user using a scripting language. A "key" is sometimes defined differently depending on the integrated keyboard; some keyboards with pointing devices also have keys. For instance:

Copy: Ctrl + CCut: Ctrl + XPaste: Ctrl + V

Learn more about keyboard shortcut https://brainly.com/question/12531147
#SPJ4

"Once a business operations analysis is completed and change needs to
that includes information
occur, many businesses will create a
technology. A
is a long-term plan of action created to achieve a
certain goal." Which of the following answers fits into both blanks?
A. scheduling plan
OB. technology strategy
C. business strategy
OD. communication plan

Answers

B. technology strategy fits into both blanks.

Which item would not generate a desktop alert by default in Outlook 2016?

new contact created
meeting request received
email received
task assignment received
i couldn't find this awnser and my teacher is extending our test period for another 20 minutes. please help

Answers

Answer:

New contact created does not generate a desktop alert by default.

Explanation:

edg.2021

Answer:

A

Explanation:

When speed increases, what happen to the value of torque?

Answers

Answer:

Torque increases as rotational speed increase from idle to a certain figure and then falls as the rotational speed increase

Explanation:

does some one have a presentation for pc viruses

Answers

Answer:

yes. don't get one. they huant ur pc and make ads pop up consistantly.

In a database, what is metadata? Compare this to cell phone metadata or document metadata (this has been in the news). How are they similar and how are they different?

Answers

In a database, metadata refers to the data that describes other data. It provides information about a particular set of data, such as its structure, organization, and context. Comparing this to cell phone metadata and document metadata, there are similarities and differences between them.

Cell phone metadata refers to the information that describes the details of phone calls, such as the phone numbers involved, the duration of the call, and the time and date of the call. Document metadata, on the other hand, refers to the information that describes the details of a digital document, such as its author, creation date, and keywords.

The similarities between database metadata, cell phone metadata, and document metadata include:
1. All three types of metadata provide descriptive information about the primary data.
2. They help in organizing, understanding, and managing the primary data.
3. All types of metadata can be used for searching, filtering, and sorting the primary data.

The differences between database metadata, cell phone metadata, and document metadata include:
1. Database metadata describes the structure, organization, and context of data in a database, while cell phone metadata describes the details of phone calls, and document metadata describes the details of digital documents.
2. The specific information contained in each type of metadata varies depending on the nature of the primary data.

In summary, metadata in a database, cell phone, and document all serve the purpose of providing additional information about the primary data they describe, but the specific details and nature of that information vary depending on the context.

To learn more about databases visit : https://brainly.com/question/518894

#SPJ11

In order to link to another page on your web site, you need to know the target page name and:

a
The name of your web server

b
The character encoding of the target page

c
The numeric address of the target location

d
The path to the target page from your current page location

Answers

Answer:

I belive it would be D or C

Explanation:

Thats the only 2 answeres that would logically make since

What is the highest numeral in a binary code?

Answers

Answer:

The highest numeral in binary code is 1

In binary, you can only have 1s and 0s

if you're asking for the biggest number that can be represented, it's 255, which is 11111111. (this is 8 1s)

Explanation:

Is this a trick question? lol

May I have brainliest please? :)

Identify traits of entrepreneurs. Check all of the boxes that apply.
Entrepreneurs desire independence.
Entrepreneurs allow their fears to get in the way of their ideas.
Entrepreneurs usually want to work the same hours each day.
Entrepreneurs exercise discipline.
Entrepreneurs identify new ways to meet needs.
Entrepreneurs know how to take intelligent risks.

Answers

The traits of entrepreneurs are; a. Entrepreneurs desire independence. c.Entrepreneurs exercise discipline. d. Entrepreneurs identify new ways to meet needs. e. Entrepreneurs know how to take intelligent risks.

What is an entrepreneur?

An individual who bears the risk of starting a new business is known as an entrepreneur.

An entrepreneur is the one who is going to initiate, organize, perceive and manage an enterprise.

The one can bears all the risks and uncertainties associated with the setting up, running, and outcome of the enterprise.

The traits of entrepreneurs are;

a. Entrepreneurs desire independence.

c.Entrepreneurs exercise discipline.

d. Entrepreneurs identify new ways to meet needs.

e. Entrepreneurs know how to take intelligent risks.

Therefore, A, C, D and E are the correct options.

Learn more about Entrepreneurs here:

brainly.com/question/13897585

#SPJ2

A music producer is recording a soundtrack for a new television wildlife programme that is being produced in collaboration with the OU. The music producer wishes to use a sampling rate of 96 kHz with each sample being 3 bytes of data. The recording is being made on a single (mono) channel. i. How many bits are there in each sample? ii. How many bits per second are processed while the music is being recorded? Express your answer in scientific notation to 3 significant figures. iii. One piece of music is 5 minutes 10 seconds long, how many bits are processed in total? Express your answer in scientific notation to 3 significant figures. iv. If the sampling rate is reduced to 24 kHz how many bits will be processed using the same piece of music? Express your answer in scientific notation to 3 significant figures. v. What is the percentage decrease in the number of bits processed as a result of reducing the sampling rate from 96 kHz to 24 kHz. Express your answer to 2 decimal places.

Answers

i. Each sample consists of 24 bits of data.ii. The processing rate while recording is 2.304 x 10^6 bits/s.iii. The total number of bits processed for a 5 minutes 10 seconds music piece is 7.1344 x 10^8 bits.iv. If the sampling rate is reduced to 24 kHz, the number of bits processed is 5.76 x 10^5 bits.v. The percentage decrease in the number of bits processed is 75%.

i. Each sample consists of 3 bytes of data, and since 1 byte is equal to 8 bits, there are 3 * 8 = 24 bits in each sample.

ii. The sampling rate is 96 kHz, which means 96,000 samples are processed per second. Since each sample is 24 bits, the number of bits processed per second is 96,000 * 24 = 2,304,000 bits/s.

iii. The duration of the music is 5 minutes 10 seconds, which is equivalent to 310 seconds. Since there are 2,304,000 bits processed per second, the total number of bits processed is 2,304,000 * 310 = 713,440,000 bits.

iv. If the sampling rate is reduced to 24 kHz, the number of samples processed per second becomes 24,000. With each sample still being 24 bits, the number of bits processed per second is 24,000 * 24 = 576,000 bits/s.

v. The percentage decrease in the number of bits processed is given by ((original bits - new bits) / original bits) * 100. Substituting the values, ((2,304,000 - 576,000) / 2,304,000) * 100 = 75%.

To know more about original bits visit :

https://brainly.com/question/33445462

#SPJ11

Johnny receives a new version of a the game Solitaire in an email. After running the program, a back door is installed on his computer without his knowledge. What kind of attack is this

Answers

The kind of attack that Johnny experienced is known as a "Trojan horse" attack.

This type of attack involves a malicious program that disguises itself as a legitimate software or application, in this case, the new version of Solitaire that Johnny received in the email. Once Johnny runs the program, the back door is installed on his computer without his knowledge, allowing the attacker to gain unauthorized access and control of Johnny's computer. Trojan horse attacks can be very dangerous and can result in theft of sensitive information or even total system compromise. It is important for users to be cautious when downloading and running programs from unknown sources and to have up-to-date antivirus software installed on their computers.

learn more about "Trojan horse" here:

https://brainly.com/question/16558553

#SPJ11

Write an expression that evaluates to true if and only.

Answers

bool Answer(bool a, bool b, bool c)

{

return (a != b) || (b != c);

}

this was made is c# as you were not very described in what language you needed

plssss helppp meee with itt

plssss helppp meee with itt

Answers

..................................d

A company technician goes on vacation. While the technician is away, a critical patch released for windows servers is not applied. According to the national institute of standards and technology (nist), what does the delay in applying the patch create on the server

Answers

According to the National Institute of Standards and Technology (NIST), the delay in applying the patch caused vulnerability.

NIST describes a vulnerability as a flaw that could be exploited unintentionally or maliciously to result in a security breach. In addition to the delays in applying patches, other instances of vulnerabilities include insufficient physical security, untested software, and incorrectly installed hardware.

An information system's vulnerability creates a flaw or opportunity that hackers can take advantage of to access a computer system without authorization.

Follow the link below to learn vulnerability assesment

https://brainly.com/question/25633298

#SPJ4

assume you run the __________ command on a computer. the command displays the computer's internet protocol

Answers

Assuming you run the ipconfig command on a computer, the command displays the computer's Internet Protocol. Here's a long answer explaining it:IPCONFIG command:IPCONFIG (short for Internet Protocol Configuration) is a command-line tool used to view the network interface details and configuration of TCP/IP settings.

It displays the computer's current configuration for the Network Interface Card (NIC). It also shows whether DHCP is enabled or disabled, IP address, Subnet Mask, and the Default Gateway, as well as DNS server details, and more.TCP/IP Settings:TCP/IP stands for Transmission Control Protocol/Internet Protocol, and it is the protocol suite used for internet communication. Every computer on the internet has an IP address, which is a unique numeric identifier that is used to send data to a specific device over the internet.

A Subnet Mask determines which part of the IP address is used to identify the network and which part identifies the specific device. The Default Gateway is the IP address of the router that the computer uses to connect to other networks. Lastly, DNS (Domain Name System) servers translate human-readable domain names into IP addresses, making it easier for users to remember website addresses.Along with IP address details, the ipconfig command displays other useful network details such as network adapters present on the device, link-local IPv6 addresses, the MAC address of the adapter, and more.

To know more about command visit:

brainly.com/question/27962446

#SPJ11

Assuming that you run the command on a computer that displays the computer's Internet Protocol (IP) address, the command is ipconfig.

Therefore, the answer is ipconfig. An IP address is an exclusive number linked to all Internet activity you do. The websites you visit, emails you send, and other online activities you engage in are all recorded by your IP address.

IP addresses can be used for a variety of reasons, including determining the country from which a website is accessed or tracking down individuals who engage in malicious online activities.

To know more about displays  visit:-

https://brainly.com/question/33443880

#SPJ11

what is the flaw in using lines of code to compare the productivity of functional languages and that of imnperative languages?

Answers

Using lines of code as a measure of productivity is not a reliable way to compare the productivity of functional languages and imperative languages, or any other programming languages for that matter. This is because lines of code is not a consistent measure of the complexity or functionality of a program.

For example, a program written in a functional language might be able to accomplish a certain task using fewer lines of code than a program written in an imperative language, but that doesn't necessarily mean that the functional program is more productive or better in any way. Additionally, the way that lines of code are counted can vary depending on the individual or organization doing the counting, which can make it difficult to compare the productivity of different languages using this metric. It is generally better to use more robust measures of productivity, such as the time it takes to develop and maintain a program, or the number of bugs and other issues that are found in the code.

Learn more about imperative languages, here https://brainly.com/question/16034730

#SPJ4

identify the tools on the boxes. write the answer

identify the tools on the boxes. write the answer

Answers

Answer:

im going off of what i know =( 2 screw driver 3 zip ties 5 needle nose plyers 8 can air

Explanation:

Subject me not to trials,shame not my human form. "Explain".​

Answers

A girl living in a society where everyone has plastic surgery makes her feel increasingly out of place in the Korean body horror short Human Form.

What is Human form?

This animated short is a commentary on plastic surgery and humanity's obsession with what is considered to be "beauty," where we frequently idolize appearances.

It are impossible to achieve naturally and judge natural appearances as not looking "good enough" (which makes everyone a potential "fixer-upper" and gives the beauty industry more and more profits).

And given that several Asian nations have absurd beauty standards, this South Korean short is the ideal commentary on everything.

Therefore, A girl living in a society where everyone has plastic surgery makes her feel increasingly out of place in the Korean body horror short Human Form.

To learn more about Human form, refer to the link:
https://brainly.com/question/8509952

#SPJ5

Answer:

The poet seems to be humiliated and condemns himself for being human just physically. He is sure if Allah subjects him to examination, he would not be successful in it because he cannot tolerate or withstand them like a perfect human being.

Explanation:

Hope it will help ...

Explicar en qué sectores están divididos los procesos de producción y su importancia para el desarrollo tecnológico y económico del país. Indique dos ejemplos en cada sector

Answers

Answer:

Un sector económico es una rama de la economía en específico, caracterizada por englobar dentro de sí una serie de actividades interrelacionadas según cómo cada una contribuye al desarrollo económico del país. Una clasificación general popular de la economía es la división en los siguientes cuatro sectores:

1) Sector primario. El sector primario es el sector económico que abastece de materias primas y alimentos. Este sector abarca los sectores de agricultura, ganadería, caza, pesca y extracción de minerales. El procesamiento de estas materias primas se realiza en el sector secundario.

2) Sector secundario. Este sector se conoce como industria. Esto incluye todas las empresas y actividades que procesan las materias primas del sector primario. Los productos suelen ser revendidos al consumidor por el sector terciario.

3) Sector terciario. Este sector incluye los servicios comerciales: empresas que quieren obtener ganancias vendiendo sus servicios. El sector terciario incluye tiendas, catering, teatros, peluquerías, mayoristas, empresas de transporte, arrendadores, agencias de empleo, contables, abogados, consultores y empresas TIC.

4) Sector cuaternario. El sector cuaternario es el de servicios no comerciales, el único sector económico sin ánimo de lucro. Este sector incluye los servicios gubernamentales y los servicios subvencionados por el gobierno. Los ejemplos son hospitales, hogares de ancianos, cuerpos de bomberos, defensa, salud, trabajo social, educación y cultura.

Answer:

hola

Explanation:

Using the regular expression library in a programming language that you know, write a short program to check whether a filename conforms to the Linux rules for filenames.

Answers

Regular expressions can be used to verify that filenames conform to Linux rules.

There should be no period at the beginning of the filename, and no special characters. Here is a straightforward Python application that makes use of regular expressions to check that a filename complies with the Linux filename conventions: check filename(filename) import re def: pattern is "[a-zA-Z0-9_]+$" If pattern and filename match, then return False if not: give False A filename is sent to the check filename() function, which returns Yes if the filename complies with Linux's filename conventions and False otherwise.

The regular expression pattern used in this function matches any string that consists of one or more alphanumeric characters or underscores.

To know more about Python, click here:

https://brainly.com/question/30391554

What keyword is used to define an interface?

Answers

The keyword used to define an interface is 'interface'. Interface generally can be defined as a shared boundary across which two or more separate components of a computer system exchange information.

In Java, an interface is a collection of abstract methods that can be implemented by a class. An interface is used to define a set of methods that a class must implement, allowing for more structured and organized code. Here is an example of how an interface is defined using the interface keyword:

interface MyInterface {

void method1();

void method2();

}

Any class that implements this interface must provide an implementation for the methods method1() and method2().

Here you can learn more about interface https://brainly.com/question/14235253

#SPJ11

Please.. I want to answer quickly.. in computer or in
clear handwriting.. and thank you very much
2. The data below is actually the length of Item 01 of a Kitchen Organizer for its plate rack. Considering the data given in \( \mathrm{cm} \) and with a standard is \( 55+/-5 \mathrm{~cm} \). Do the

Answers

Without the actual data provided, it is not possible to determine whether the given data is within the standard range or not. The conclusion depends on comparing the actual data with the specified standard range of

55±5 cm.

The given data is within the standard range for the length of Item 01 of the Kitchen Organizer plate rack.

Explanation:

To determine if the given data is within the standard range, we need to compare it to the specified standard of

55

±

5

c

m

55±5cm.

If the given data falls within the range of

55

±

5

c

m

55±5cm, then it is considered within the standard.

To know more about data visit :

https://brainly.com/question/21927058

#SPJ11

A large, planned update that addresses multiple problems, or adds multiple features to software is a ________.

Answers

Answer: Service Pack

Explanation:

.............. 1010111 needs to be transferred w.ith odd parity and the answer is
A. 01010111
B.11010111
C.10101110
D.10101111

Answers

Answer:

A. 01010111

Explanation:

This is because in odd parity, the number on the far left (the 8th number) would always be a 0

A! your answer is A- 01010111

When you accelerate to avoid a collision which step of the IPDE process are you using?

Answers

The step of the IPDE process that should be used When you accelerate to avoid a collision is an execute.

In the term of computer and technology, IPDE stands for Identify, Predict, Decide, and Execute.  IPDE process or IPDE strategy also should be used in off-road driving. IPDE process including several activities, such as Identify any objects or conditions that may cause you trouble while driving and also Predict activity through what results might occur when you encounter the object or condition. IPDE has a function to help us to provides a means of arriving at the diagnosis of major categories.

Here you can learn more about IPDE https://brainly.com/question/2624496

#SPJ4

Other Questions
Points of a linear function are listed in the table below.+- 13 -6376140 13 1What is the slope of the table?Write an equation of the table in point-slope form:Write another point-slope form equation:There will be three extra answers left over!+ y - 61 = 3(x + 13): -32 y - 1 = -3(x - 7).: 3:: y - 40 = -3(x + 6):: y - 13 = 3(x - 3) What does the dialogue between Scrooge and Nephew (Fred) reveal about their relationship? PLEASE ANWSER ASAP DUE IN 2 MINUTES Can someone explain interval and set notation With trade, everyone gets more of the things they want than they would if they were self-sufficient. in this way, trade can be driven entirely by? please help meCan the measure of an exterior angle of a triangle ever exceed 180? Explain your reasoning. residual standard deviation 2 % 0 % the risk-free return during the sample period was 7%. calculate jensen's measure of performance for tiger fund. The following C program reads a byte of data from Port B, finds the square, wait for two second and then send it to Port C.Debug the errors in the following C program for the PIC16 microcontroller and write the corrected program. (2marks per error identified and correction) #include void MAIN (void){unsigned char;TRISD = 0x00;TRISB = 0x00;while (1)readbyte = PORTB;readbyte = readbyte__delay_ms(2000);readbyte = PORTD;}} how to calculate the number of processes created when the following program is run? Wes mixed different juices to make fruit punch. He filled one-half of the punch bowl with orange juice. Then he filled half of the remaining space with grape juice. Finally, he filled the rest of the punch bowl with 300mL of cherry juice.How many liters of fruit punch did Wes make? If a 0.5kg cart is loaded with three 1.5-kg bricks, then the total mass of the loaded cart would be 5.0 kg. If it is moving with a speed of 2.0m/s, what is its momentum? A researcher believes that 47.5% of people who grew up as the only child have an IQ score over 100. However, unknown to the researcher, this figure is actually 50%, which is the same as in the general population. To attempt to find evidence for the claim, the researcher is going to take a random sample of 400 people who grew up as the only child. Let be the proportion of people in the sample with an IQ score above 100. Customers of the Shiny Car Wash were surveyed to see which type of service they purchased. Given are the results of the survey in a frequency table. Sedan SUV/Truck TotalExpress 11 Deluxe 17 24Works 10 Total 40 75Which category has the lowest marginal frequency? SUVs/Trucks who purchased the Express service Sedans who purchased the Deluxe service Customers who drove SUVs/Trucks Customers who purchased the Express service Identify the technical term that is being described in each item. Choose from the pool of words inside the box and write the correct answers on your answer sheet. ___________1. Introduces the topic or problem. _______________ 2. Compose the title of research, full name of the researcher & subject for which the research is presented._______________ 3. It contains most of the citations and analysis_______________ 4. Sources or references _______________ 5. Summarizes all the data gathered _______________ 6. Collection of studies & researches_______________ 7. Tools used in your research_______________ 8. The individual who responds to a survey questionnaire and provides information._______________ 9. Brief discussion of the research from introduction to conclusion_______________10. All the information collected through surveys, interviews, or observations.pa answer naman PO yung maayos naman sana thank you! there are 46 students going on a field trip to the museum. if 7 students can fit in each van , how many vans are needed for all 46 students to go to the museum Muscle cells store only enough ATP to complete a few contractions. After using up the readily available ATP, muscle cells can form additional ATP from which of the following? a) glycolysis b) creatine phosphate c) hydrolysis d) the Calvin cycle e) cellular respiration Last year "ABC" Company had $121646 of assets, $76058 of sales, $19170 of net income, and an equity multiplier of 1.81369. The new CFO believes the firm has excessive fixed assets and inventory that could be sold, enabling it to reduce its total assets to $99391, Sales, costs and net income would not be affected, and the firm would maintain the equity multiplier at the same level (1.81369). By how much would the reduction in assets will change the ROE value? In London today, four times the high temperature was more than twice the high temperature plussixty-six. In interval form, what are the possible temperatures A. Develop an estimated regression equation that relates risk of a stroke to the persons age, blood pressure, and whether the person is a smoker. Please round your answers to three decimal places. Enter negative value as negative number. B. Is smoking a significant factor in the risk of a stroke? explain. Use Ashley and joe each improved their yards by planting hostas and ornamental grass. They bought their supplies from the same store. Ashley spent $152 on 12 hostas and 8 bunches of ornamental grass. Joe spent $66 on 6 hostas and 3 bunches of ornamental grass. Find the cost of one hosta and the cost of one bunch of ornamental grass. bill is replacing his 15ft long by 12 ft wide deck. his new deck will add 5 feet to the length and 4 feet to the width. if a drawing of the new deck uses a scale of 1 inch =2.5 feet, fin the dimensions of the deck in the drawing