list four products that normally requires copyright protectio.​

Answers

Answer 1

The  four products that normally requires copyright protection are:​

Books and written literary works.Music compositions and sound recordings.Artistic creations such as paintings, sculptures, and photographs.Software programs and computer applications.

What is the copyright protection.

Books and written literary works need copyright protection to keep the original ideas and writings of authors safe. This stops people from copying, sharing, or making more copies without permission.

Copyright protection is important for music compositions and sound recordings to make sure that composers, songwriters, and performers have power over how their works are used, shared, and performed for the public.

Read more about copyright protection here:

https://brainly.com/question/27976194

#SPJ1


Related Questions

In which country is edx located in

Answers

Answer:

Explanation:

edX es una plataforma de cursos abiertos masivos en línea, conocidos por sus siglas en inglés como MOOC (Massive Online Open Course), basada en software de código abierto. Fue fundada por el Instituto Tecnológico de Massachusetts y la Universidad de Harvard en mayo de 2012 para hospedar cursos en línea de nivel universitario de un amplio rango de disciplinas, para todo el mundo sin costos para propiciar la investigación y el aprendizaje.3​ Cada una de estas dos instituciones contribuyen con 30 millones de dólares de recursos para este proyecto sin ánimo de lucro. El curso prototipo con el cuál empezó el programa fue Circuitos y Electrónica, que comenzó en diciembre de 2011, a través de MITx, el programa en línea y masivo del MIT.4​

EdX tiene más de 10 millones de usuarios registrados y es considerado el segundo proveedor más grande de MOOC en el mundo, después de Coursera que cuenta con 23 millones de usuarios registrados.5​

A finales de 2016, edX ofrecía 1300 cursos de los cuales 500 fueron lanzados en 2016. Del total de cursos que ofrece, 53 son pagados, conocidos como cursos de educación profesional, y 13 son elegibles para créditos universitarios. De acuerdo a una investigación realizada por Class Central, el costo promedio de un certificado de edX es de USD$53.6​

Actualmente hay más de 130 colaboradores entre institutos, organizaciones sin ánimo de lucro, corporaciones y organizaciones internacionales que ofrecen o planean ofrecer más de 500 cursos en el sitio web de edX.7​

Describe what should go into the blank space:
public class
A. a keyword
B. java syntax
C. a command
D. the name of the program

Answers

Answer:

d

Explanation:

Design and implement an algorithm that gets a list of k integar values N1, N2,...Nk as well as a special value SUM. Your algorithm must locate a pair of values in the list N that sum to the value SUM. For example, if your list of values is 3, 8, 13, 2, 17, 18, 10, and the value of SUM is 20, then your algorithm would output either of the two values (2, 18) or (3, 17). If your algorithm cannot find any pair of values that sum to the value SUM, then it should print the message

Answers

Answer:

The algorithm is as follows:

1. Start

2. Input List

3. Input Sum

4. For i = 0 to length of list - 1

4.1 num1 = List[i]

5. For j = i to length of list - 1

5.1 num2 = List[j]

6. If SUM = num1 + num2

6.1 Print(num1, num2)

6.2 Break

The algorithm is implemented in python as follows:

def checklist(mylist,SUM):

     for i in range(0, len(mylist)):

           num1 = mylist[i]

                 for j in range(i+1, len(mylist)):

                       num2 = mylist[j]

                       if num1 + num2== SUM:

                             print(num1,num2)

                                   break;

Explanation:

I'll explain the Python code

def checklist(mylist,SUM):

This line iterates from 0 to the length of the the last element of the list

     for i in range(0, len(mylist)):

This line initializes num1 to current element of the list

           num1 = mylist[i]

This line iterates from current element of the list to the last element of the list

                 for j in range(i+1, len(mylist)):

This line initializes num1 to next element of the list

                       num2 = mylist[j]

This line checks for pairs equivalent to SUM

                       if num1 + num2== SUM:

The pair is printed here

                             print(num1,num2)

                                   break;

In this exercise we have to use the knowledge of the python language to write the code, so we have to:

The code is in the attached photo.

Some important information informed in the statement that we have to use in the code is:

StartInput ListInput SumFor i = 0 to length of list - 1num1 = List[i]For j = i to length of list - 1num2 = List[j]If SUM = num1 + num2Print(num1, num2)Break

So to make it easier the code can be found at:

def checklist(mylist,SUM):

    for i in range(0, len(mylist)):

          num1 = mylist[i]

                for j in range(i+1, len(mylist)):

                      num2 = mylist[j]

                      if num1 + num2== SUM:

                            print(num1,num2)

                                  break;

See more about python at brainly.com/question/26104476

Write a program that will open the file random.txt and calculate and display the following: A. The number of numbers in the file. B. The sum of all the numbers in the file. C. The average of all the numbers in the file. You must determine how many numbers are in the file by searching for the end of the list of numbers. You are not allowed to hard code the expected number of numbers into your code. The file random.txt is located in the Lab 4 Canvas Module. Here is the result you should get: Number of numbers: 200 Sum of the numbers: 105527 Average of the numbers: 527.635

Answers

Answer:

Here is the C++ program:

#include <iostream>  //to use input output functions

#include <fstream>  //to manipulate files

using namespace std;  //to identify objects like cin cout

int main(){  //start of main function

  ifstream file;   //creates an object of ifstream

   file.open("random.txt"); //open method to open random.txt file using object file of ifstream

       

    int numCount = 0;  //to store the number of all numbers in the file          

    double sum = 0;   //to store the sum of all numbers in the file

    double average = 0.0;   //to store the average of all numbers in the file

    int number ; //stores numbers in a file

                 

        if(!file){   //if file could not be opened

           cout<<"Error opening file!\n";    }   //displays this error message

       

       while(file>>number){   //reads each number from the file till the end of the file and stores into number variable

           numCount++; //adds 1 to the count of numCount each time a number is read from the file          

           sum += number;  }  //adds all the numbers and stores the result in sum variable

           average = sum/numCount;  //divides the computed sum of all numbers by the number of numbers in the file

     

       cout<<"The number of numbers in the file: "<<numCount<<endl;  //displays the number of numbers

       cout<<"The sum of all the numbers in the file: "<<sum<<endl;  //displays the sum of all numbers

       cout<<"The average of all the numbers in the file: "<< average<<endl;  //displays the average of all numbers

       file.close();     }  //closes the file    

   

Explanation:

Since the random.txt is not given to check the working of the above program, random.txt is created and some numbers are added to it:

35

48

21

56

74

93

88

109

150

16

while(file>>number) statement reads each number and stores it into number variable.

At first iteration:

35 is read and stored to number

numCount++;  becomes

numCount = numCount + 1

numCount = 1      

sum += number; this becomes:

sum = sum + number

sum = 0 + 35

sum = 35

At second iteration:

48 is read and stored to number

numCount++;  becomes

numCount = 1+ 1

numCount = 2    

sum += number; this becomes:

sum = sum + number

sum = 35 + 48

sum = 83

So at each iteration a number is read from file, the numCount increments to 1 at each iteration and the number is added to the sum.

At last iteration:

16 is read and stored to number

numCount++;  becomes

numCount = 9 + 1

numCount = 10    

sum += number; this becomes:

sum = sum + number

sum = 674 + 16

sum = 690

Now the loop breaks and the program moves to the statement:

       average = sum/numCount;  this becomes:

       average = 690/10;

       average = 69

So the entire output of the program is:

The number of numbers in the file: 10                                                                                                           The sum of all the numbers in the file: 690                                                                                                     The average of all the numbers in the file: 69

The screenshot of the program and its output is attached.

Sami is creating a web page for her dog walking business. Which item will set the theme for her page?

a) Background color
b) Heading color
c) Link color
d) Text color

Answers

Answer:

A

Explanation:

The issue “when a user deletes the data, whether all the copies are deleted or not is something that every needs to have a clear answer to” comes under which of the following?

Answers

The issue “when a user deletes the data, whether all the copies are deleted or not is something that every needs to have a clear answer to” comes under aspect of data deletion and data lifecycle management.

What is the deletion?

One need rules and practices to delete data to follow privacy laws, protect data, and meet user expectations. When a user gets rid of data, it is important to check if all copies of that data have been effectively removed from the system or storage.

Data Retention Policies: Organizations must create clear rules about how long they will keep certain data before getting rid of it.

Read more about deletion here:

https://brainly.com/question/30280833

#SPJ1

What is a formula? What is a function? (In the context of Excel)

Answers

Answer: A formula is an expression which calculate the value of a cell .A funcation is a predefined formula that performs calculations using specific values in particular order.According to context of excel.

pick a game that should never exist? and explain why you picked black ops 3?

Answers

Because for some kids it could be to violent.

Answer:

rocket league

Explanation:

get gud kid, see me in lobby

Plz answer me will mark as brainliest​

Answers

It is Performed by ALU

Question #4 Fill in the Blank What is the output for the following code? >>> answer = "Hello Dad" >>> answer.lower()​

Answers

The output is hello dad in all lowercase.

Answer: hello dad

Explanation:

this is the correction i got 100% correct

Daily requirements of 70 g of protein, 1 g calcium, 12 mg iron, and 3000 calories are needed for a balanced diet. The following foods are available for consumption with the cost and nutrients per 100 g as shown.
 
Protein
(g)
Calories
Calcium
(g)
Iron
Cost
GH¢
Brown Bread
12
246
0.1
3.2
0.5
Cheese
24.9
423
0.2
0.3
2
Butter
0.1
793
0.03
0
1
Baked Beans
6
93
0.05
2.3
0.25
Spinach
3
26
0.1
2
0.25
 
The objective is to find a balanced diet with minimum cost.
(a) Formulate a linear programming model for this problem.
(b) Use solver to find optimal solution and sensitivity report.         ​

Answers

Answer:

i think i know

Explanation:

A number is a palindrome if its reversal is the same as itself. Write a program reversenumber.java to do the following:
1. Define a method call reverse, which takes a 4-digit integer and returns an integer in reverse. For example, reverse(1234) should return 4321. (Hint: use / and % operator to separate the digits, not String functions)
2. In the main, take user input of a series of numbers, call reverse method each time and then determine if the number is a palindrome number, for example, 1221 is a palindrome number, but 1234 is not.
3. Enhance reverse method to work with any number, not just 4-digit number.

Answers

The given Java program takes a number as input from the user, reverses it, and checks if it is a palindrome. It uses the modulo and division operations to reverse the number. The program is not limited to 4-digit numbers and can handle numbers of any length.

```java

import java.util.Scanner;

public class ReverseNumber {

  // Method to reverse a given number

public static int reverse(int num) {

  int reversed = 0;

      // Reversing the number using modulo and division operations

  while (num != 0) {

    int digit = num % 10;

    reversed = reversed * 10 + digit;

    num /= 10;

  }

      return reversed;

}

  public static void main(String[] args) {

  Scanner scanner = new Scanner(System.in);

      // Taking user input

  System.out.print("Enter a number: ");

  int number = scanner.nextInt();

      // Reversing the number

  int reversedNumber = reverse(number);

      // Checking if the reversed number is equal to the original number

  if (number == reversedNumber) {

    System.out.println(number + " is a palindrome number.");

  } else {

    System.out.println(number + " is not a palindrome number.");

  }

      scanner.close();

}

}

```1. The `reverse` method takes an integer as input and reverses it using the modulo and division operations. It initializes `reversed` as 0 and in each iteration of the while loop, it separates the last digit of the input number using `num % 10`, appends it to `reversed` by multiplying it with 10, and then updates `num` by dividing it by 10.

This process is repeated until `num` becomes 0. Finally, the method returns the reversed number.

2. In the `main` method, we create a `Scanner` object to take user input. We prompt the user to enter a number, read it using `nextInt()`, and store it in the `number` variable.

We then call the `reverse` method to get the reversed number and store it in the `reversed Number` variable.

Finally, we compare `number` and `reversed Number` to check if the number is a palindrome or not. The result is printed accordingly.

3. The provided solution already works with any number, not just 4-digit numbers. This is because the `reverse` method separates the digits of the input number and reverses them regardless of the number of digits.

For more such questions palindrome,Click on

https://brainly.com/question/23161348

#SPJ8

When visiting a museum Liam takes a photo of a painting with a smartphone which stores to image file. Which of the folllowing best describes the difference between the painting itself and the photo of the painting stored on the smartphone

Answers

Answer: D. The phone can represent the photo in either digital or analog formats depending on the sampling technique that is used

Explanation:

Photos can either come out as analog or digital with digital formats having better overall quality overall. Digital photos are taken with digital cameras and so use electronic detectors while analog photography uses chemical processes.

The thing about photos taken by smartphones is that they can be represented as either digital or analog formats. It simply depends on the sampling techniques used.

A string s is a circular shift of a string t if it matches when the the characters are circularly shifted by any number of positions. For example, ACTGACG is a circular shift of TGACGAC, and vice versa. Detecting this condition is important in the study of genomic sequences. Write a program that checks whether two given strings s and t are circular shifts of one another.

Hint: The solution is a one-liner with indexOf() and string concatenation.

Answers

The solution
Nsmksmesmnwkwkwkkw

what word describes the complexity of document

Answers

Answer:

Explanation:

This study aimed to systematically identify and evaluate the readability and document complexity of currently available family history tools for the general public. Three steps were undertaken to identify family history tools for evaluation: (a) Internet searches, (b) expert consultation, and (c) literature searches. Tools identified were assessed...

what is the abbreviation of IP address​

Answers

Answer: Internet Protocol Address

Explanation: IP Address is the abbreviation of Internet Protocol Address

Hope this helps

--Wavey

the meaning of the abbreviation of IP address is: Internet Protocol address(IP address)

sorry if that isn't what you meant, but hope this helps

Plz answer me will mark as brainliest​

Answers

Expansion Slot
ROM
Hope this helped

Java Eclipse homework. I need help coding this

Project 9B - Tuition

package: proj9B
class: Tuition

Write code using the if, else if and else statements that will take care of the following.

We are going to be writing code for a college to determine the cost of a students tuition. Use the following information for your program.

Collect and store the users First and Last Name.
Collect and store the users age and number of quarter credits.
Process the information and print an invoice showing the above information and include a projected tuition cost.
Program Parameters

Tuition for a course is free for people over the age of 65.
There is a fifty percent discount for those between the ages of 60 and 65.
Full-tuition cost is $250.00 per credit
Maximum credits is 18 per quarter.
(Note: Use appropriate (DecimalFormat) code to get the two zeros to print)

Example Printout:

Michael, Smith
Age: 62, Credits: 15
“You saved 50 percent on the cost of this course because you are between 60 and 65. Your cost is $1875.00.”

OR if age is >65: “Wow, are you lucky. Age is sometimes a real cool thing. This course is free for you!”

Make sure that it compiles and runs. When it does, save it according to your teacher’s directions.

Answers

I've included my code in a text file. I hope this helps!

What is wrong with each of the following?

shoNum + shoNum2 = shoTotal

shoNum = 10 * 4

Dim decPrice As Decimal = "$4.99"

shoCube = (shoSide)3

Answers

Answer:

The answer to this question is given below in the explanation section

Explanation:

shoNum + shoNum2 = shoTotal

in this code statement,  the order of operation is wrong because the calculation in programming always done at the right side of dependent variables.  so the correct statement of code is

shoTotal = shoNum + shoNum2;

shoNum = 10 * 4

This statement is programmatically correct, because the ShoNum value becomes 40 after performing the multiplication operation on its assigned value  (10 multiply by 4). However, it is noted that the empty space mostly ignored by the compiler. So, the correct is shoNum = 10*4;

Dim decPrice As Decimal = "$4.99"

The dollar sign is appeared in along with its value. So, if you assign value to a decimal variable, you need to assign only digit value (do not mix value with symbol or text) and also do not put quotation marks around value, if you put quotation marks around value then this value will be consider as a text value.

So, the correct statement is :

Dim decPrice As Decimal = 4.99;

shoCube= (shoSide)3

In this statement, cube is calculated of shoSide variable, mathematically it is right, but programmatically it is incorrect. Because, you missed the multiplication operation (*) between the operand shoSide and 3. it should

be as  shoSide raise to power 3.

the correct statement is : shoCube = (shoSide * shoSide *shoSide);

In the Scrum board, prioritizing the issue backlog is done in the ———- mode.

Answers

Answer:

The answer to this question is given below in the explanation section

Explanation:

Scrum Board is a tool that is used by the scrum teams to view the product backlog. The Scrum task board makes the sprint backlog visible for the team.

In the Scrum board, prioritizing the issue backlog is done in the Current View mode.

However, it is noted that in Scrum board there are two view modes (Tree view mode and List view mode) for the issues in the backlog. The issues that are prioritized is listed in the current view mode.  

Business: check ISBN-13) ISBN-13 is a new standard for identifying books. It uses 13 digits d1d2d3d4d5d6d7d8d9d10d11d12d13.

The last digit d13 is a checksum, which is calculated from the other digits using the following formula: 
 10-(d1 +3d2 +d3 +3d4 +d5 +3d6 +d7 +3d8 +d9 +3d10 +d11 +3d12)%10

If the checksum is 10, replace it with 0.
Your program should read the input as a string.
Here are sample runs: .

Enter the first 12 digits of an ISBN-13 as a string: 978013213080 The ISBN-13 number is 9780132130806
Enter the first 12 digits of an ISBN-13 as a string: 978013213079 The ISBN-13 number is 9780132130790
Enter the first 12 digits of an ISBN-13 as a string: 97801320 97801320 is an invalid input

Write the programm in C++

Answers

Answer:

Following are the code to this question:

#include <iostream>//defining header file

#include <string.h>//defining header file

using namespace std;//using package

char checksum(const char *x)//defining a method checksum  

{

int s=0,m,d;//defining integer variables

for (m= 1;*x;++x)//defining for loop for caLculate value

{

d=*x-'0';//use integer variable to remove last digit from input value  

s=s+m*d;//add value in s variable

m=4-m;//use m to remove 4 from m

}

return '0'+(1000-s)%10;//use return keyword to get value  

}

int main()//defining main method

{

char ISBNNum[14];// defining character array  

cout<<"Enter the first 12 digits of an ISBN-13 as a string:";//print message

cin>>ISBNNum;//input value from user end

if(strlen(ISBNNum)==12)//defining if block to check length

{

char a=checksum(ISBNNum);//defining char variable a to call method checksum

ISBNNum[12]=a;//use array to hold method value

ISBNNum[13]='\0';// use array to hold 13 character value

cout<<"The ISBN-13 number is "<<ISBNNum;//print number

}

else//defining else block

{

cout<<ISBNNum<<" is an invalid input"<<endl;//print message

}

return 0;

}

output:

please find the attachment.

Explanation:

In the given code a character method "checksum" is define that accepts a character as a parameter and inside the method, three integer variable "s,m, and d" is defined that uses the for loop to calculate the input value and use the return keyword for the return value.  Inside the main method, a char array "ISBNNum", is defined that input the value from the user-end and define the conditional statement.

In the if block, it uses "ISBNNum" char array that checks its length equal to 12, if this condition is true it defines char a to call the method and hold its value and use the array to sore value in a and its 13 lengths it stores "\0", and print its value. If the condition is false, it will print input array value and print invalid input as a message.

which of the following are advantages of a wide area network, as opposed to a local area network? select two options

Answers

Answer:

Advantages of Wide Area Network as opposed to the Local Area Network:

Because of wide area network (WANs) connections are available from house to house, city to city, country to country. For ex: Internet.

WAN is connecting the devices with various wireless technologies such as: cell phone towers or satellites. All these are much harder to setup with LANs.

Local Area Network (LANs) connections can only operate in a local area, not bigger than a house or a floor in a office building and also you cannot buy a ethernet cable that can reach throughout entire building and Wi-Fi connection rapidly disconnected as you get further then few meters away.

Answer:

- provides access to other networks

- greater geographic reach

Explanation:

Wide area networks cover larger areas like a city, country, or multiple countries. They're managed by large groups or companies. Connections are typically made using routers and public networks such as phone, cable, or satellite systems. Ninety-nine percent of internet traffic is transmitted through cables. The remaining one percent is transmitted via satellite.

(Confirmed on EDGE)

I hope this helped!

Good luck <3

which of the following best describes information techonolgy (IT)?

Answers

Answer:

IT can be purchased; IS cannot be purchased

Explanation:

Yeah

Cindy visits her favorite website on a lunch break using a hospital computer. After she downloads a file, she notices that the computer is running very slowly. She realizes that the hospital system might be infected with malware, so she contacts the IT department. After this is resolved, she resolves to gain a better understanding of the forms of computer software designed to damage or disrupt a computer system, because a damaged system is incapable of providing the support required to manage healthcare information.

Required:
a. When Cindy researches this topic, what will she find in the difference between the two techniques used to create a malware attack?
b. Regardless of the form the malware assumes, what are some of the basic precautions Cindy or someone else at her institution should take to protect the computer system?

Answers

Explanation:

Remember, Malware is a word coined from the words Malicious-Software (Mal...ware). Thus, Malware could be defined as software that is intentionally designed by cybercriminals to gain access or cause damage to a computer or network.

a. Cindy may learn the difference between these two techniques used to create a malware attack:

through downloads from malicious websites: An attacker may design a malicious website; in which unsuspecting users who visit the site may click to download certain files, but these are actually malware software been installed.through malicious emails: This email may contain attachments which if opened or downloaded by an unsuspecting user would infect their computer with malware.

b. Here are some common suggestions;

Never open attachments from strange email addresses.install a paid antivirus software.be mindful of websites with too many ads.

what are computer that are held on hands called​

Answers

Answer:

palmtop computer os the computer

Answer:

I don't think this is the right answer but I'm gonna have to say a handheld computer.

Explanation:

You can store it in your pocket and you can use it while you hold it. I'm sorry if this isn't the right answer, I tried my best.

URGENT HELP PLEASE C+++
find the errors in the code below and correct them:




#include ;


using namespace std;




int main()


{


Const int number1, number2, product;


cout > number1, number2;


quotient = float (number1) / number2;


cout << quotient


return 0;


}

Answers

Answer:

#include using namespace std;

cout << quotient;

Explanation:

not #include ; using namespace std;

; doesn't belong

cout << quotient

forgot the ; at the end

what did people use to share or board cast information in electronic age​

Answers

Answer:

They share or broadcast information by making a letter or information in a papyrus material.

I am writing a code that requires me to identify a positive integer as a prime (or not). I have looked at references on how to find it but it does not work for what I am trying to do. Below is the set of instructions. I have written the first half of the code and verified that it works. I am stuck on how to write the logic that identifies the prime based on the instructions.
-----
Write a program that prompts the user to input a positive integer. It should then output a message indicating whether the number is a prime number.
Your program should use a loop to validate the positive integer and accept the input only when the user inputs a positive number.
Your code should be an efficient algorithm using the following note.
(Note: An even number is prime if it is 2. An odd integer is prime if it is not divisible by any odd integer less than or equal to the square root of the number.)
For the square root, import the math library (import math) and use math.sqrt() function)

Answers

import math

number = int(input("Enter a number: "))

while number < 0:

 number = int(input("Enter a number: "))

if number % 2 == 0:

 if number == 2:

   print("Your number is a prime.")

   exit()

 print("Your number is not a prime.")

 exit()

elif number % 2 == 1:

 i = 2

 while i <= math.sqrt(number):

   if number % i == 0:

     print("Your number is not a prime ")

     exit()

   i += 1

print("Your number is a prime.")

I hope this helps!

define computer graphics and name it's types​

Answers

Answer:

Computer graphics is an art of drawing pictures on Computer Screen.

Computer graphics is made up number of pixels. Pixels is the smallest unit which can be represented on computer screen.

Basically there are two types of Computer graphics:

Interactive  Computer graphicsNon Interactive Computer graphics. Interactive Computer graphics: In Interactive Computer Graphics there is a two way communication between computer and user. Here the user is given some control over the image. Non Interactive Computer graphics: is also known as passive computer graphics here in which user does not have any kind of control over the image.

Using Module operator, write a java program to print odd number between 0 and 1000​

Answers

Answer:

class OddNumber

{

  public static void main(String args[])  

       {

         int n = 1000;  //Store 1000 in Variable n typed integer

         System.out.print("Odd Numbers from 1 to 1000 are:");  // Print headline of output window

         for (int i = 1; i <= n; i++)  //For loop to go through each number till end

          {

            if (i % 2 != 0)  //check if number is even or odd.Not divisible by 2 without reminder means it is odd number

             {

               System.out.print(i + " "); //print odd numbers

             }

          }

       }

}              

Other Questions
There are 4 white and 8 red roses in a bouquet. Find the ratios.The ratio of the number of all roses to the number of red roses Use the Regression tool on the accompanying wedding data, using the wedding cost as the dependent variable and attendance as the independent variable. Complete parts a through c. Click the icon to vie 3. How did/does Netflix align with the innovation cycle?4. What type of innovation did Netflix deliver? How has itchanged?5. What's next for Netflix? Use the quadratic formula to find the roots: -2x^2 + 11x = 15 Creative thinking is the ability toa. identify defects in logic that weaken arguments. b.to learn how to develop sound and rational arguments when persuading others to support you.c. look at things from a new perspective and to come up with fresh solutions to problems.d. filter and use the data found to solve the problem that we face. Question 38 (2.5 points) Which of the following is not a fallacy? a.Generalisation b.False Autonomyc. False Cause d.Appeal to authority Cash and Noncash Share Issuances Chavoy Corporation was organized on July 1. The company's charter authorizes 100,000 shares of $ 1 par value common stock. On August 1, the attorney who helped A website, such as Amazon or E-Bay, provides Amrod Company's information, allows customers to download Amrod's forms, and an order to Amrod is made by a customer who downloaded the form and contacted Steinar loaned a friend $9,500 to buy some stock 3 years ago. In the current year the debt became worthless.a. How much is Steinar's deduction for the bad debt for this year? (Assume he has no other capital gains or losses.) $ ________ as a ________ bad debt. b. What can Steinar do with the deduction not used this year? The remaining $ ________ can be carried forward as a ______ and deducted in future years, subject to _________ 25 Mark Question (URGENT)the case study refers to several factors that influence modernorganisations to change.(a) Identify and shortly describe seven (7) factors from thecase study. (15)(b) ExplExtract 1: Robots replacing humans in the workplace More and more modern organisations utilise robots to replace humans in the workplace. Although all industries are affected by robots, there are some Suppose that Susan enjoys sugar in her coffee. She has very particular preterences. and she must have exactly four spoonts of sugar for each cup of cottee, et be the number of cups of coflee. and S be the number of spoonfuls of sugar. Also. let P. be the price of a cup of collee and P. bethe nricc of a spoont of stoar. SunDosc Susan has to snend on Coitcc and Stigar V 8 9 2. A so.the price of a spoonful of Sugar is P. = $.25.Straph Susan S Price Constmption curve for prices. re = Sl. rc = 32. and rc = So. Picase put the number ot cups of coffee (C) on the honzontal axis, and the number of spoontils of Sugar (S) on the vertical axis Be sure to graph each budget constraint associated with each price ot ottee, Identity Susan's optimalDuncle on each Daager constranne. and make sure your scape is labeled caretary and accurately. In your answers, label all intercepts, kinks, coordinates, slopes, and axes. Revealed Preference 1. In a 3-good world, let A stand for the bundle (7,9,2), B stand for the bundle (8,5,5), and C stand for the bundle (6,6,8). When prices are ($2,$4,$1), Betty chooses C. On a different date, prices are ($5,$3,$3) and she chooses A. On yet another different day, when prices are ($3,$1,$4), she chooses B. For each pair of bundles ( A and B,A and C,B and C) examine if one is directly revealed preferred to the other, or if one is indirectly revealed preferred to the other, or neither is directly/indirectly revealed preferred to the other. Match each geographic feature to the correct geographic region.NorthwestWestSouthwestMidwestSoutheastMid-AtlanticNortheastGeographic FeatureGeographic Regionmany bays andgood harborsGreat Basin DesertGreat PlainsGrand CanyonRocky MountainsEvergladesrocky coastline and small coastal islands This cartoon shows the thirteen states as pillars that hold America together.What is the cartoons message about ratification?A. Each state can survive on its own, so no state needs the Constitution.B. The eleven ratifying states are strong enough to hold the country together.C. The country will not survive unless all thirteen states ratify the Constitution. Read this sentence: The dining room chairs were light and easy to move. In contrast, the table was heavy and cumbersome. Based on the sentence, what does the word cumbersome mean? Awkward to move Light to lift Oddly shaped Removable A company purchased factory equipment for $680,000. It is estimated that the equipment will have a $50,000 salvage value at the end of its useful life of 9 years. What will be the depreciation expense in the second year of use of the equipment if the company uses the double. declining balance method for calculating depreciation? Sylvia set a treadmill for 38 minutes and so far she has run 61/ of the minutes which is the best estimate for the number of Sylvia has run so far Devise six controls (you can decide how to spread them across the five risks). For each control, explain what type of control it is and estimate its effectiveness (For three of them use qualitative approach, for the other three use quantitative - estimate calculate residual risk and perform cost benefit analysis, explaining in detail your estimations). You must explain how each control can be audited, what new risks they introduce, and how those risks should be incorporated into your risk analysis. Since no applicable classification system existed in the use-offorce training continuums, Schneider (2012) designed a framework for the private security industry to determine training and skills requirements. The motive behind this classification and categorisation system was to base the groupings on risk level and equipment, and not on job description since the latter is fairly limiting and does not allow for transitioning to a higher risk level and for the change in equipment type that might be needed. Provide a comprehensive discourse on the structure of the practical use-offorce training model for the private security industry as designed by Gavriel Schneider XYZ Inc. gave on lease a crane to Alexander Contractors under a 4-year non- cancellable agreement which started from 1 January 2022. Annual payment for the same was $ 35,000 first payment from 1 January 2022. XYZ took responsibility of bearing insurance, maintenance and taxes on this crane. Estimated life of asset is 10 years and cost of $ 250,000. Expected fair value of asset at the end of lease term of 4 years is $ 55,000. There was no purchase or bargain or renewal option in the agreement. Both the companies closed their books of accounts every year at 31st December.What will be the treatment of these entries in the Income Statement and Financial Statements of both the parties at the end of 2022 in the light of IFRS 16 Write a story about being in the year 3000