P3 Conduct primary and secondary research using appropriate methods for a computing research project that consider costs, access and ethical issues. P4 Apply appropriate analytical tools, analyse research findings and data.

Answers

Answer 1

When conducting research for a computing research project, it is important to consider costs, access, and ethical issues. To conduct primary research, one should use appropriate methods. Some of the primary research methods include surveys, interviews, observations, focus groups, and experiments. Primary research methods are expensive, but they produce original data. Secondary research methods, on the other hand, are less expensive, but they involve the use of pre-existing data. The internet is the most commonly used tool for accessing secondary research data. Some of the secondary research methods include books, journals, case studies, government publications, and research reports. The secondary research method may help the researcher to understand the topic better and give a direction on the way to conduct primary research.

To consider cost when conducting primary research, it is necessary to determine the amount of money that will be required to gather primary data. It is important to consider factors such as the cost of recruiting participants, the cost of collecting data, and the cost of analyzing data. In addition to considering costs, it is essential to consider access when conducting research. Access relates to how easy it will be to obtain data. Ethical issues should also be considered, and measures must be put in place to ensure that the data collected is reliable and valid. P4 Apply appropriate analytical tools and analyze research findings, and dataAfter conducting primary and secondary research and gathering the relevant data, it is necessary to analyze the data to obtain meaningful insights. Analyzing the data involves applying appropriate analytical tools to obtain results. There are several analytical tools that can be used to analyze data. They include statistical tools, qualitative analysis, and quantitative analysis. Statistical tools involve analyzing data using mathematical formulas and techniques. Qualitative analysis involves analyzing data using non-mathematical techniques. Quantitative analysis involves analyzing data using mathematical techniques. It is essential to select the appropriate analytical tools based on the type of data that has been collected and the research question that needs to be answered. The analysis process involves interpreting the data and identifying meaningful insights. It is essential to interpret the data and draw conclusions that can be used to make informed decisions. The insights that are obtained from the data analysis should be communicated effectively to the relevant stakeholders.

Learn more about Primary Research here: https://brainly.com/question/29787894.

#SPJ11


Related Questions

The movie star is so narcissistic that he never thinks of anyone but himself. What does narcissistic mean?A.personableB.brilliantC.amusingD.self-centered

Answers

The term "narcissistic" means self-centered. It is evident in the given sentence, "The movie star is so narcissistic that he never thinks of anyone but himself.

"The term "narcissistic" is an adjective that refers to people who are excessively self-centered and involved in self-admiration. A narcissist may lack empathy and may exhibit extreme behavior patterns characterized by arrogance, self-obsession, grandiosity, and disregard for the feelings of others. They often try to surround themselves with people who agree with their viewpoint, and they will go to great lengths to ensure that others share their perspective. Hence, option D is the correct answer.

To know more about  narcissistic  visit:

https://brainly.com/question/32186528

#SPJ11

Discuss Hard Drives and other storage Devices in computer
hardware. At least 150 words please

Answers

Hard drives and other storage devices play a crucial role in computer hardware by providing a means to store and retrieve data. They come in various forms, such as hard disk drives (HDDs), solid-state drives (SSDs), and external storage devices. These devices differ in terms of technology, capacity, speed, and portability, offering users a range of options for their storage needs.

Hard drives, commonly known as HDDs, are mechanical storage devices that use spinning disks to store data. They are widely used due to their large storage capacity and relatively lower cost per gigabyte. HDDs are commonly found in desktop computers and servers where ample storage space is required. However, they are slower in terms of data transfer speed compared to solid-state drives.

Solid-state drives, or SSDs, are newer storage devices that use flash memory technology. SSDs offer faster data access times, improved reliability, and better power efficiency compared to HDDs. They are commonly used in laptops, ultrabooks, and high-performance computing systems where speed and durability are prioritized over capacity.

In addition to HDDs and SSDs, there are other storage devices available such as USB flash drives, memory cards, and external hard drives. These devices provide portable and convenient storage options, allowing users to transfer and store data on the go.

Overall, storage devices are essential components in computer hardware as they provide the means to store and access data. The choice of storage device depends on factors such as storage capacity requirements, speed, reliability, and cost, allowing users to select the most suitable option based on their specific needs.

Learn more about technology here: https://brainly.com/question/11447838

#SPJ11

Rosalie will be giving a persuasive speech on organ donation and wants to distribute organ donor cards to her listeners when should she distribute the card: ________

Answers

If Rosalie will be giving a persuasive speech on organ donation and wants to distribute organ donor cards to her listeners she should distribute the card: After she has finished speaking.

When to distribute the cards

The right time that Rosalie would have to distribute the cards would be after she has finished speaking.

If Rosalie should distribute these cards when she is still speaking, then the audience will become distracted and might then be unable to pay full attention to what she has to say.

Learn more about persuasion here;

https://brainly.com/question/374313

#SPJ4

What is the advantage of an implementation of a stack that uses
the ADT
5pts
list over an implementation that uses
a linked list?

Answers

The advantages of an implementation of a stack that uses the ADT list over an implementation that uses a linked list are:ADT is a high-level description of operations, not just data structure.

ADT specifies the semantic behavior of the data, not the implementation ADT's design is independent of the implementation. The advantages of implementing a stack using an ADT (Abstract Data Type) list over implementing it using a linked list are as follows:

An ADT provides a high-level description of the operations that a data structure can perform. It specifies the meaning of the data rather than the implementation details. As a result, an ADT is not reliant on a specific implementation. It allows for greater flexibility in designing the underlying implementation. Advantages of using a linked list:Linked list provides dynamic size. You can create a stack and decide to allocate more memory space when needed. Linked list reduces time complexity.

Using linked list, you can quickly insert or delete elements at the beginning or end of the stack.

Learn more about data structure Here.

https://brainly.com/question/32540149

#SPJ11

read the source descriptions below and then answer the question. source 1: a blog published by iris dement. iris is a professional singer and wrote an article about breaking into the music business. she uses a number of pictures, personal stories, and quotes from other singers to support her point of view. she does not cite any information. source 2: an article published in the civil war by shelby foote. he is a graduate student who writes for the journal as a side job. he uses quotes from primary sources in his article and has a full works cited page.

Answers

Source 2, the article published in The Civil War by Shelby Foote, is more reliable and credible than Source 1, the blog published by Iris Dement.

Source 2, written by Shelby Foote, demonstrates more credibility due to several factors. First, Foote is described as a graduate student who writes for the journal as a side job, indicating that he has knowledge and expertise in the field. Second, Foote supports his points with quotes from primary sources, which adds credibility to his arguments. Lastly, the fact that Foote includes a full works cited page shows that he has done thorough research and provides transparency for readers to verify his sources.

On the other hand, Source 1, the blog by Iris Dement, lacks the same level of credibility. While Dement is a professional singer, the blog format and personal anecdotes may not meet the same standards of reliability as a scholarly article. Additionally, the absence of citations or references to support the information presented makes it difficult for readers to verify the claims made by Dement.

In conclusion, Source 2, with its inclusion of primary source quotes and a works cited page, provides a stronger foundation of credibility compared to Source 1, which relies on personal stories and lacks citations. It is important to consider the reliability and credibility of sources when evaluating the information presented.

Learn more about article  visit

brainly.com/question/33363856

#SPJ11

In which method of speech arrangement does a speaker narrate a series of events in the order in which they occurred?

Answers

Chronological or sequential method of speech arrangements a speaker narrate a series of events in the order in which they occurred

The term chronological or sequential order refers to a speech organization technique where a speaker describes a sequence of events in the order in which they occurred.

In this approach, the speaker recounts a tale or provides information in a chronological or logical order, following a chronology.

This strategy makes it simple for the audience to follow the story and comprehend how the events developed. Historical reports, narratives, and experience-recounting frequently use chronological order.

To learn more about Chronological Method link is here

brainly.com/question/29547959

#SPJ4

. Define a function named analyze that takes two parameters named sentence and thresh: - sentence - a string of words - thresh-and int The function analyze should return the number of words from sentence whose length are greater than or equal to thresh. E.g. ⇒>s = "Show me what a fox looks like" → sigWords = analyze (s,3) s> print(sigWords) 5

Answers

The `analyze` function in Python splits a sentence into a list of words, checks if each word is greater than or equal to the `thresh` value, increments `count`, and returns the number of words with a length greater than or equal to `thresh`.

You can define the `analyze` function in Python as follows:

```python

def analyze(sentence, thresh):

   words = sentence.split()  # Split the sentence into a list of words

   count = 0

   for word in words:

       if len(word) >= thresh:

           count += 1

   return count

```

In this function, we first split the `sentence` string into a list of words using the `split()` method. Then, we iterate over each word in the list and check if its length is greater than or equal to the `thresh` value. If it is, we increment the `count` variable.

Finally, we return the value of `count`, which represents the number of words from the `sentence` whose length is greater than or equal to `thresh`.

Using the provided example:

```python

s = "Show me what a fox looks like"

sigWords = analyze(s, 3)

print(sigWords)  # Output: 5

```

The output will be `5`, indicating that there are five words in the sentence with a length greater than or equal to 3.

To learn more about Python visit-

https://brainly.com/question/14492046

#SPJ11

Write a review of the documentary screened in class two times. In the first instance, take the position of the advocate of composite structures in commercial aviation. In the second review, take the opposite side of advocating against the widespread use of composite structures in commercial aviation. Justify your answers beyond the material presented in the documentary for both cases. In the last section, write your own independent conclusion

Answers

Review 1: Advocate of Composite Structures in Commercial Aviation

Review 2: Advocate Against Widespread Use of Composite Structures in Commercial Aviation

The documentary screened in class provided a compelling case for the widespread use of composite structures in commercial aviation. The film highlighted the numerous benefits of composite materials, such as carbon fiber-reinforced polymers, in aircraft construction. One of the key advantages emphasized was the significant reduction in weight compared to traditional aluminum structures. This weight reduction translates into lower fuel consumption, leading to reduced operational costs and environmental impact.

Furthermore, the documentary showcased the superior strength-to-weight ratio of composite materials. This characteristic allows for increased design flexibility, enabling aircraft manufacturers to create aerodynamically efficient and structurally robust aircraft. Composite structures also offer enhanced resistance to corrosion and fatigue, reducing maintenance requirements and increasing the lifespan of the aircraft.

Additionally, the film explored the advancements in manufacturing technologies that have made composite structures more affordable and feasible for commercial aviation. The ability to produce complex shapes and integrated structures with composite materials opens up new possibilities for innovative aircraft designs.

Beyond the documentary, the use of composite materials in other industries, such as aerospace and sports, has already demonstrated their reliability and safety. Rigorous testing and certification processes ensure that composite structures meet and exceed regulatory standards, ensuring the highest level of safety for passengers and crew.

Despite the documentary's positive portrayal of composite structures, I find myself skeptical about their widespread use in commercial aviation. While it is true that composite materials offer weight reduction and increased strength, there are certain concerns that must be taken into consideration.

One issue is the potential for hidden damage or flaws in composite structures. Unlike traditional aluminum, which exhibits visible signs of wear and tear, damage to composites may not be easily detectable. This raises concerns about the long-term reliability and maintenance of composite aircraft.

Another concern is the cost associated with composite structures. While manufacturing technologies have advanced, the production of composite materials remains more expensive than traditional aluminum. This cost factor could lead to increased ticket prices for passengers or financial strain on airlines, especially in the case of smaller carriers.

Learn more about Commercial Aviation here:

https://brainly.com/question/30542185

#SPJ11

here are Six questions, answer ALL of them. Mark of each question are mentioned at the right margin. 1. Suppose you are an IT specialist of a Bank software system. You have to design a [CO3,C3, transaction system so that no conflicts can occur during the transaction time. You have Mark: 7] to design a class Instruction Counter which has a function printInstruction(int n) that can take a parameter n and print the prime number from 1 to nth term. Again, create two thread class (ThreadOne, ThreadTwo) so that both of the thread can call the method "printInstruction(int n)" of the Instruction Counter class. Again, write a main java class named "MultiProcessingDemo" with a main method that instantiate four objects of two threads(ThreadOne, ThreadTwo). Two threads from ThreadOne and two threads from ThreadTwo class. Your task is to process and run four threads simultaneously in the main method by considering the fact that when one thread printing with the printInstruction(n) function the other threads must be wait for the completion of the print of the starting thread. Design a JAVA application that can perform the task as given in the above scenario.

Answers

The given scenario mentions about creating an IT system for a bank with a transaction system that should not cause any conflicts during transaction time.

This can be achieved using class Instruction Counter which prints the prime numbers from 1 to nth term. Two thread classes are created - ThreadOne and ThreadTwo. Both of these threads will call the method "printInstruction(int n)" of the Instruction Counter class. To process and run four threads simultaneously, we need to consider the fact that when one thread starts printing with the printInstruction(n) function, the other threads must wait for the completion of the print of the starting thread.

This can be done using the wait() and notifyAll() methods of Java. The following is the Java application that performs the given task:public class InstructionCounter {public synchronized void printInstruction(int n) {for (int i = 1; i <= n; i++) {int count = 0;for (int j = 1; j <= i; j++) {if (i % j == 0) {count++;}if (count == 2) {System.out.print(i + " ");}}}public static void main(String[] args) {ThreadOne t1 = new ThreadOne();ThreadTwo t2 = new ThreadTwo();ThreadOne t3 = new ThreadOne();ThreadTwo t4 = new ThreadTwo();t1.start();t2.start();t3.start();t4.start();}static class ThreadOne extends Thread {public void run() {try {InstructionCounter ic = new InstructionCounter();ic.printInstruction(10);Thread.sleep(500);} catch (InterruptedException e) {e.printStackTrace();}}}static class ThreadTwo extends Thread {public void run() {try {InstructionCounter ic = new InstructionCounter();ic.printInstruction(10);Thread.sleep(500);} catch (InterruptedException e) {e.printStackTrace();}}}}The above code will print prime numbers from 1 to 10.

The synchronized keyword is used in the printInstruction() method to ensure that only one thread can access the method at a time.

The wait() and notifyAll() methods are not needed here as we are using synchronized keyword to ensure thread-safety.

Learn more about transaction system Here.

https://brainly.com/question/29387371

#SPJ11

: Threat Modelling As a group of security experts, you are to perform security analysis of a software company that provides a mobile app for accessing health services including requesting for lab tests to be done, booking appointments with specialty doctors and buying medicine. The system as two parts: the mobile app for customers to request for services and a web app for doctors, lab technicians and pharmacists to manage requests. Payment for the services are made through the mobile application. A third-party company handles all payments and gives the money to the software company daily. 5. List all possible attacks you think can be launched against this system. Group them into passive and active attacks. 6. Take 2 of the attacks and develop Boolean attack trees to show possible ways the attacks will be executed by an adversary.

Answers

Possible attacks on the system can be categorized into passive attacks and active attacks.

Passive attacks:

1. Eavesdropping: An adversary can intercept and capture network communications between the mobile app and the web app, potentially gaining unauthorized access to sensitive user and medical information.

2. Traffic analysis: By analyzing patterns and metadata of network traffic, an attacker could gather information about user behaviors, such as which services are most frequently requested, potentially leading to privacy breaches or targeted attacks.

Active attacks:

1. Man-in-the-Middle (MitM) attack: An adversary could position themselves between the mobile app and the web app, intercepting and modifying communications. This could allow them to manipulate requests, tamper with data, or inject malicious code, compromising the integrity and security of the system.

2. Injection attacks: Attackers might exploit vulnerabilities in the mobile app or web app to inject malicious code or commands. For example, SQL injection could allow an adversary to extract sensitive information from the system's database or modify its contents, leading to unauthorized access or data corruption.

Boolean attack tree for a MitM attack:

1. Gain physical proximity to the network traffic.

2. Intercept and redirect network traffic to a malicious server.

3. Establish a secure connection with the mobile app and web app separately.

4. Relay requests and responses between the legitimate parties while capturing data.

5. Modify or inject malicious content into the communications as desired.

Boolean attack tree for an injection attack:

1. Identify a vulnerability in the mobile app or web app.

2. Craft a malicious payload (e.g., SQL query) exploiting the identified vulnerability.

3. Inject the payload into the app, tricking it into executing the malicious code.

4. Gain unauthorized access to the system, bypassing security measures.

5. Manipulate or extract sensitive data, potentially compromising user privacy or system integrity.

These attack trees illustrate the possible steps an adversary might take to execute a MitM attack or an injection attack, emphasizing the importance of implementing strong security measures to mitigate these threats.

Learn more about Attacks on system

brainly.com/question/28482553

#SPJ11

Thirty (30) toddlers aged 1-2 years of age were tested in a psychological study of measuring attention span on a 15-minute Cocomelon video featuring dinosaurs. Researchers
found an average attention span of 10.25 minutes, with a standard deviation of 0.20 minute. Find the upper limit of a tolerance interval that includes 90% of the attention span
with 95% confidence

Answers

Given: $n = 30$, $\bar{x} = 10.25$ and $S=0.20$.The formula for finding upper limit of a tolerance interval that includes 90% of the attention span is given by:[tex][tex]$\bar{x} + k\dfrac{S}{\sqrt{n}}$where $k$[/tex][/tex] is the appropriate value from a standard Normal distribution.

Since 90% of the attention span is covered, 5% of the area is left on both tails.So,[tex]$\dfrac{100-90}{2} = 5\%$[/tex] on each tail. Using Z-table, the Z value corresponding to 5% on one tail is given by $1.645$.Therefore, the upper limit of a tolerance interval that includes 90% of the attention span is:[tex]$$\begin{aligned}\bar{x} + k\dfrac{S}{\sqrt{n}} &= 10.25 + 1.645\dfrac{0.20}{\sqrt{30}}\\&= 10.25 + 0.1288\\&= \boxed{10.38}\end{aligned}$$[/tex]Therefore, the upper limit of a tolerance interval that includes 90% of the attention span is $10.38$ minutes (approx.) with 95% confidence.

To know more about  Standard Normal distribution.  visit:

https://brainly.com/question/30390016

#SPJ11

Literature of the Colonial Period may be defined as a literary record of the period called the Age of Reason or Revolution. TrueFalse.

Answers

Answer:

fales

Explanation:

Literature of the Colonial Period refers to the literary works produced during the time when the American colonies were established and developed, typically from the early 17th century to the late 18th century. This period predates the Age of Reason or Revolution, which occurred later in the 18th century. The Age of Reason or Revolution is associated with the Enlightenment movement and significant historical events such as the American Revolution and the French Revolution. Therefore, the statement is false as the Colonial Period and the Age of Reason/Revolution are distinct periods in literary and historical contexts.

Concrete mixes using crushed stone aggregates typically have a higher water demand than those using river grävels. True False

Answers

False. Concrete mixes using crushed stone aggregates typically have a lower water demand than those using river gravels.

The water demand of a concrete mix refers to the amount of water required to achieve the desired workability and strength of the concrete. Crushed stone aggregates have a rougher surface texture compared to river gravels, which leads to increased internal friction within the mix. This increased friction allows for better distribution of the water throughout the mix, resulting in a lower water demand.

On the other hand, river gravels have smoother surfaces, which reduces the internal friction and can lead to a higher water demand. More water may be required to achieve the desired workability and to properly coat the aggregates in the mix. Therefore, concrete mixes using crushed stone aggregates typically require less water compared to those using river gravels.

To learn more about gravels here

brainly.com/question/28855557

#SPJ11

PLEASE HELPPP What words in the passage “working toward peace by Craig Kielburger “help you determined the tone? “ optimistic and reflective “ pick 5 words

Answers

The five additional words from the passage that contribute to understanding the tone is Hopeful, Contemplative, Empowering, Compassionate and Inspirational.

Hopeful: This word suggests a positive and optimistic tone, indicating a belief in the possibility of achieving peace and positive change.

Contemplative: This word implies a thoughtful and reflective tone, suggesting that the author encourages deep thinking and introspection about the topic of peace.

Empowering: This word conveys a tone that encourages and inspires individuals to take action and make a difference in promoting peace.

Compassionate: This word suggests a tone of understanding, empathy, and concern for others, emphasizing the importance of fostering compassion in working towards peace.

Inspirational: This word indicates a tone that uplifts and motivates readers, providing them with encouragement and inspiration to engage in peace-building efforts.

Collectively, these words indicate that the tone of the passage is likely to be optimistic, reflective, hopeful, contemplative, empowering, compassionate, and inspirational. The author aims to foster a positive mindset, encourage self-reflection, inspire action, promote empathy, and motivate individuals to actively contribute to creating a more peaceful world.

Know more about tone here:

https://brainly.com/question/819739

#SPJ8

8.- Write a C function to output 4V in the RC1 pin using a PWM signal at 1 kHZ. Consider a Fosc = 8 MHz. (Assume that the RC1 pin is already configured). Consider a power supply (Vcc) for the MCU of 5

Answers

The C function to output 4V in the RC1 pin using a PWM signal at 1kHz in a power supply (Vcc) of 5 is given below:#include#define _XTAL_FREQ 8000000 // Fosc = 8MHzvoid PWM_Init(){ TRISC1=0; // Make CCP1 pin as outputCCP1M3=1;

// Configure CCP1 module in PWM modeCCP1M2=1; //CCP1M1=0; //CCP1M0=0; PR2=249; //Load period value in PR2T2CKPS1=0; // Prescaler is 4T2CKPS0=2;CCPR1L=124; //Duty cycle is 50%TMR2ON=1; // Enable Timer2 moduleTMR2IF=0; // Clear Timer2 interrupt flag}void main(){ OSCCON=0x72; // Use internal oscillator at 8 MHzPWM_Init(); // Initialize PWM modulewhile(1){}}

How does the PWM function work?A pulse-width modulation (PWM) signal is generated by the CCP1 module when the PR2 register value, the TMR2 prescaler, and the duty cycle (CCP1CON<5:4>) are properly configured. The PWM signal is available at the RC1 pin when the CCP1 pin is set as output.The frequency of the PWM signal is determined by the formula:Fpwm = Fosc/4*(PR2+1)*TMR2_prescalerIn this case,Fpwm = 8 MHz / 4*(249+1)*4 = 1kHzThe duty cycle of the PWM signal is determined by the CCPR1L and CCP1CON<5:4> registers as follows:Duty Cycle = (CCPR1L * TMR2_prescaler + CCP1CON<5:4> * TMR2_prescaler * 256)/(PR2+1)/TMR2_prescaler * 100%In this case,Duty Cycle = (124 * 4 + 2 * 4 * 256)/(249+1)/4 * 100% = 50%Therefore, the above C function outputs a 4V PWM signal at 1kHz and 50% duty cycle on the RC1 pin when the power supply for the MCU is 5V.

To know more about  PWM visit:

https://brainly.com/question/32281599

#SPJ11

Etheinet security vulnerablity mean, Sniffers can order a Fic to nin in promiscuous mode. Nic processes ail fiames, not only those intended for its MAE addiest. Sniffers have legitimate uses, but may aiso be used unserupulously * True b. Palse

Answers

The statement "Sniffers have legitimate uses, but may also be used unscrupulously" is a true statement.

Network sniffers, also known as packet sniffers or protocol analyzers, are software tools that capture and analyze network traffic to diagnose and troubleshoot network issues. They can be used to identify network problems, test network security, and monitor network performance. Network sniffers are an essential tool for network administrators and security professionals to detect and respond to network attacks and other security vulnerabilities.

However, network sniffers can also be used by attackers to capture sensitive information such as passwords, usernames, and credit card numbers. Attackers can use sniffers to eavesdrop on network traffic and steal data from vulnerable devices.

Therefore, it is important to secure the network against these types of vulnerabilities to prevent unauthorized access to sensitive data.

Learn more about security vulnerabilities Here.

https://brainly.com/question/32091137

#SPJ11

The number of road accidents is increasing year by year in Oman. Prepare a detailed report on the Reduction of Road Accidents and Accident deaths. The report should contain the causes/reasons for road accidents and control measures that can be categorized under Enforcement, Engineering, and Education.

Answers

The number of road accidents is increasing year by year in Oman. This article will discuss the reduction of road accidents and accident deaths and will be segmented into three primary parts: causes/reasons for road accidents, enforcement, engineering, and education.

Causes/Reasons for Road Accidents: A range of factors could cause road accidents. These factors include driver behavior, automobile maintenance, and the roadway environment, amongst others. Distracted driving, driving under the influence, speeding, tailgating, and violating traffic signals are examples of driver behavior. Furthermore, cars that have not been adequately serviced and maintained, including brakes and tires, are more likely to experience a collision. Additionally, poorly maintained roads, inadequate lighting, and incorrect signage contribute to road accidents. Enforcement: Several enforcement measures might be implemented to minimize road accidents. These include enhanced police patrols and enforcement programs, automated traffic enforcement systems such as speed cameras, and sobriety checkpoints.

Laws governing safe driving, seatbelt usage, and speed limits should also be created and enforced to minimize the likelihood of accidents. Engineering: Engineering measures could also be used to reduce road accidents. These measures include safety enhancements such as installing traffic signals, speed limit indicators, and rumble strips. Furthermore, adequate signage and road markings can assist in making the road safer. Education: Education programs can help to reduce road accidents. These initiatives should be aimed at both drivers and pedestrians. Educational initiatives should include information on safe driving techniques, the dangers of distracted driving, and pedestrian safety practices. In conclusion, it can be stated that road accidents are a major issue in Oman. To reduce the number of accidents and fatalities, a comprehensive approach that involves enforcement, engineering, and education should be implemented.

To know more about   safe driving, seatbelt usage,   visit:

https://brainly.com/question/4942297

#SPJ11

Within this data collection system, a learner's response is scored on every trial.

Estimation
Latency
Trial-by-trial
Interval

Answers

C) The data collection system that scores a learner's response on every trial is referred to as a "trial-by-trial" data collection system.

What is a data collection system?

A data collection system is a system used to collect, measure, and analyze data. In the field of educational research, data collection systems are used to collect data on student performance.

What is the meaning of "trial-by-trial"?

A trial-by-trial data collection system is a type of data collection system in which a learner's response is scored on every trial. This means that each time a learner responds to a question, the system scores their response. The following terms are related to data collection systems: Estimation Latency Interval.

Hence, Correct option is C.

Learn more about data collection system Here.

https://brainly.com/question/32511641

#SPJ11

What size conductor is needed for internal wiring of a circuit in a General Use panel for a 480V three-phase motor load with a name plate rating of 21 amp FLA? 8 AWG

Answers

Size conductor is needed for internal wiring of a circuit in a General Use panel for a 480V three-phase motor load with a name plate rating of 21 amp FLA is 12 AWG.

You must consult the relevant electrical code and take into account factors like conductor ampacity and voltage drop in order to determine the size conductor required for the internal wiring of a circuit in a General Use panel for a 480V three-phase motor load with a nameplate rating of 21 amp FLA (Full Load Amperes).

It is impossible to give a precise response without exact details on the conductor type, insulation rating, installation technique, and the particular electrical code being adhered to.

But according to accepted procedures and under normal circumstances, a 12 AWG wire is frequently adequate for a 21 amp FLA three-phase motor load at 480V. This is based on the supposition that the conductor is copper, has a sufficient insulation rating, and has been fitted normally.

To learn more about conductor link is here

brainly.com/question/14405035

#SPJ4

read the two sets of stage directions in the passage. then explain how you would set the stage to show that a time shift has occurred if you were the director.

Answers

The stage directions are essential elements that direct the actors' movements and provide the readers with a picture of what is happening in the play. Meanwhile, a time shift is the method of skipping a period or changing the time of the plot. The director is responsible for choosing how to present the play on stage, including setting the scene, managing actors, and creating the environment.

To show that a time shift has happened, the director would set the stage in a way that suggests that time has passed between the two stage directions. Here's how the director can set the stage to show a time shift has occurred: Set the stage: The director should change the physical layout of the location to show that a change of time has happened. For example, the director can replace some of the props used in the first scene with new ones. In addition, if there are any changes to the setting, such as night changing to day or vice versa, the director may adjust the lighting to reflect the new location. Use dialogue: The director may use the dialogue to indicate a time shift. In the conversation, the actors might mention events or actions that happened in the past or future. Costume and Make-Up: Costume and makeup can be used to show the passing of time. For example, actors could wear different clothes or have other hair and makeup to suggest that time has passed. In conclusion, the director may use various methods to set the stage to show that a time shift has occurred, including adjusting the lighting, using dialogue, and modifying costumes and make-up.

Learn more about Stage Direction here: https://brainly.com/question/30279274.

#SPJ11

A3 Suggest an appropriate bus arrangement and justify your proposal: (a) Generation plant (b) 132kV substation (2 marks) (3 marks)

Answers

The radial bus arrangement is a suitable choice for connecting a generation plant to a 132kV substation due to its simplicity, reliability, cost-effectiveness, flexibility, and ease of control and monitoring.

For the given scenario of connecting a generation plant to a 132kV substation, an appropriate bus arrangement would be a radial bus arrangement.

A radial bus arrangement consists of a single power source connected to multiple distribution points in a unidirectional manner. In this case, the generation plant acts as the power source, and the 132kV substation serves as the distribution point.

Justification for a radial bus arrangement:

Simplicity: A radial bus arrangement is relatively simple to design, install, and maintain. It involves a single power source connected directly to the distribution points, eliminating the need for complex interconnections.

Reliability: With a radial bus arrangement, the power flow is unidirectional, meaning any fault or disturbance occurring at one distribution point is less likely to affect the other distribution points. This improves the overall reliability of the system.

Cost-effectiveness: Radial bus arrangements require fewer components and less extensive infrastructure compared to more complex bus arrangements like ring or mesh networks. This makes it a cost-effective option, especially for smaller-scale generation plants connected to a single substation.

Flexibility: Radial bus arrangements allow for future expansion and modifications to the system. Adding or removing distribution points can be easily accomplished without major disruptions to the existing infrastructure.

Control and monitoring: A radial bus arrangement simplifies control and monitoring of the system, as there is a clear hierarchy and flow of power from the generation plant to the substation. This facilitates efficient operation and maintenance activities.

Overall, a radial bus arrangement is a suitable choice for connecting a generation plant to a 132kV substation due to its simplicity, reliability, cost-effectiveness, flexibility, and ease of control and monitoring.

Learn more about Cost-Effectiveness at

brainly.com/question/19204726

#SPJ4

How would you create an expiration time for a cookie to last one
day?

Answers

To create an expiration time for a cookie to last one day, you can set the time in seconds for one day and add it to the current timestamp.You can adjust this value to set different expiration times for your cookie.

This can be done in various programming languages, but here is an example using JavaScript:```var now = new Date();var time = now.getTime();time += 24 * 60 * 60 * 1000;var expires = new Date(time);document.cookie = "cookieName=cookieValue; expires=" + expires.toUTCString() + "; path=/";```In this example, `24 * 60 * 60 * 1000` is the number of milliseconds in one day. You can adjust this value to set different expiration times for your cookie.

To know more about  various programming languages visit:

https://brainly.com/question/31602220

#SPJ11

frame 10 sentences using hit in simple present tense

Answers

He will hit the ball with great force The teacher hits the chalkboard to get the student's attention The rain hits the roof, creating a soothing sound The chef hits the pan with a sizzling sound as he cooks. The torrential rain hits the ground with relentless force, causing widespread flooding The renowned pianist's fingers gracefully hit the key, producing a melodic symphony of sound The sniper takes careful aim and hits the target with unparalleled accuracy from a great distance.The scientist conducts experiments in the lab, aiming to hit upon a groundbreaking discovery. The sun hits the horizon, casting a beautiful orange glow across the sky. The comedian's jokes hit the audience's funny bones and they burst into laughter.

The Phi factor () for bending in a concrete beam a. is always 0.90. O b. varies between 0.65 and 0.90, depending upon the amount of tensile steel in the beam. O c. depends upon the span length. O d. bending moments don't require phi-factors. Question 2 1 pts Phi factors (0) O a. increase the beam strength because we always underestimate it. b. reduce the beam load so the beam can support it. O c. reduce the calculated beam strength because of uncertainties in design and construction. O d. increase the beam load to provide a better factor of safety. Question 3 1 pts Minimum steel requirements are necessary O a. to be sure that more steel is sold for buildings. O b. to prevent premature and possibly catastrophic beam failures. O c. to make sure that all beams have a certain moment capacity. O d. to help hold up the beam stirrups. Question 4 1 pts A reinforced concrete beam designed for moment with Ultimate Strength Design (USD) O a. needs more steel than a Working Stress Design (WSD). b. doesn't need to be designed for shear. O c. needs less steel than a Working Stress Design (WSD). d. has a higher factor of safety than a Working Stress Design (WSD). a Question 5 1 pts The allowable concrete shear strength in a beam O a. is doubled when no stirrups are included. O b. is always the same, regardless of whether stirrups are included. O c. depends upon the length of the span. O d. is halved when no stirrups are included. Question 6 1 pts The allowable concrete shear strength in a joist or a slab O a. is doubled when no stirrups are included. b. is always the same, regardless of whether stirrups are included. O c. depends upon the length of the span. O d. is halved when no stirrups are included. Question 7 1 pts Concrete in a reinforced beam O a. is used to resist compression. O b. Is used for fireproofing. O c. is used to resist shear. O d. All of the above. Question 8 1 pts Steel stirrups in a reinforced con ete eam are primarily used O a to hold up the top steel. O b. for fireproofing, c. to resist shear. O d. All the above. Question 9 1 pts The phi factor () for shear in a concrete beam 0 a. is always 0.75. O b. varies between 0.65 and 0.9, depending upon the amount of tensile steel in the beam. O c. depends upon the span length. d. Shear doesn't require a phi factor. Question 10 1 pts Steel stirrups in a concrete beam spaced farther apart than d/2 are good for O a. holding up the top steel. O b. nothing as far as shear strength is concerned (Phi Vs-0) O c. Both a. and b. d. None of the above.

Answers

The Phi factor () for bending in a concrete beam varies between 0.65 and 0.90, depending upon the amount of tensile steel in the beam. Hence, the correct option is B. varies between 0.65 and 0.90, depending upon the amount of tensile steel in the beam.

Hence, the correct option is C. reduce the calculated beam strength because of uncertainties in design and construction.Question 3:Minimum steel requirements are necessary to prevent premature and possibly catastrophic beam failures. Hence, the correct option is B. to prevent premature and possibly catastrophic beam failures.Question 4:A reinforced concrete beam designed for moment with Ultimate Strength Design (USD) needs less steel than a Working Stress Design (WSD). Hence, the correct option is C. needs less steel than a Working Stress Design (WSD).

The phi factor () for shear in a concrete beam varies between 0.65 and 0.9, depending upon the amount of tensile steel in the beam. Hence, the correct option is B. varies between 0.65 and 0.9, depending upon the amount of tensile steel in the beam.Question 10:Steel stirrups in a concrete beam spaced farther apart than d/2 are good for nothing as far as shear strength is concerned (Phi Vs-0). Hence, the correct option is B. nothing as far as shear strength is concerned (Phi Vs-0).

To know more about Phi factor visit :-

https://brainly.com/question/13251451

#SPJ11

Water is added to a dry soil to increase its degree of saturation to 50%, If the void ratio is 0.54, the change in water content (%) is Select one: a. 2.7 b. 10 c.0.5 Water is added to a dry soil to increase its degree of saturation to 50%. If the void ratio is 0.54, the change in water content (96) is Select one: a. 27 b. 10 e COS

Answers

The change in water content (%) is 10 if water is added to a dry soil to increase its degree of saturation to 50%.

The initial degree of saturation can be found out using the following expression: sr = S / (1 + e)where, sr is the degree of saturation, S is the water content of the soil, and e is the void ratio. Substituting the values of sr = 0.5 and e = 0.54 gives us: S / (1 + 0.54) = 0.5

Hence, the initial water content, S = 0.43. The final water content will be that which results in a degree of saturation of 50%. This can be found using: sr = Sf / (1 + e)where Sf is the final water content. Substituting sr = 0.5 and e = 0.54 gives us:0.5 = Sf / 1.54

Hence, the final water content is Sf = 0.77. The change in water content can be found using the expression:(Sf - Si) / Si × 100where Si and Sf are the initial and final water contents respectively. Substituting the values, we get:(0.77 - 0.43) / 0.43 × 100 = 0.779 × 100 ≈ 10Therefore, the change in water content (%) is 10.

More on saturation: https://brainly.com/question/8897192

#SPJ11

What would a complete summary of "A Modest Proposal" need to include?a description of Swift’s argumentan explanation of how Swift uses satire to convey his real messagean objective toneinformation about Swift’s life and backgroundthe writer’s opinion of Swift’s essay

Answers

A complete summary of "A Modest Proposal" would need to include a description of Swift’s argument, an explanation of how Swift uses satire to convey his real message, and an objective tone.

It may also include information about Swift’s life and background, but the writer's opinion of Swift’s essay is not necessary.The essay "A Modest Proposal" by Jonathan Swift is a satirical article that criticizes the British government's policies towards the poor in Ireland. He claims that the government can solve the problem of poverty and overpopulation in Ireland by selling the children of the poor as food to the rich in England.

Swift's argument is that since the poor are so destitute, selling their children as food will provide them with a source of income and remove the burden of supporting them. He then goes on to argue that since children are tender meat, they will make a delicious meal for the rich.Swift uses satire throughout the essay to convey his real message. He pretends to be serious about his proposal, using a calm and objective tone. This makes his argument more convincing and allows him to highlight the absurdity of the situation.

By pretending to be serious, Swift is able to use satire to expose the hypocrisy and inhumanity of the British government's policies towards the Irish poor.

Learn more about A Modest Proposal Here.

https://brainly.com/question/29786933

#SPJ11

The Premier University president has asked you to create a presentation to the university board of trustees that
summarizes improvements made or underway to the university’s information security program. The president will
present to the board at the next meeting.
Tasks
For this part of the project:
 Create a professional PowerPoint presentation summarizing improvements to Premier University's
information security program (as indicated in previous parts of this project)
o Keep in mind that the audience is non-technical
 Describe why the improvements are important to the university
 Use the template of your choice and include SmartArt on at least three of the slides
 Include your name in the lower left or right corner of the initial title slide

Answers

To create a presentation to the university board that summarizes improvements made or underway to the university’s information security program, here are some of the ways you could approach the task.

Slide 1: Title SlideThe initial title slide should have the following information:Name of the presentationThe name of the presenterDate of presentationPresentation to the University BoardUniversity nameLogo or imageSlide 2: IntroductionOn the introduction slide, provide a brief summary of the presentation, including a short introduction to the improvements made in the university's information security program. Explain the importance of information security for a university and how it can impact the university's overall goals and objectives.

Slide 3: The Need for Information SecurityThis slide should describe why information security is important for the university. Discuss the risks of cyberattacks and breaches and the need to secure personal, financial, and confidential information.Slide 4: Improvements to the Information Security ProgramThis slide should provide an overview of the improvements made or underway to the university’s information security program. Use SmartArt to illustrate the changes made. Examples of changes made include the implementation of multifactor authentication, data encryption, system updates, security awareness training for faculty and staff, and network segmentation.Slide 5: How Improvements Addressed Existing RisksThis slide should explain how the improvements made address the risks that were identified.

Use SmartArt to illustrate the changes made. Describe how these improvements help to minimize the risks of a breach and keep sensitive data safe.Slide 6: Future Improvements and RecommendationsThis slide should summarize future improvements that the university could make to enhance its information security program. Use SmartArt to illustrate these recommendations. Describe the benefits of implementing these improvements and how they will help the university to achieve its goals and objectives.Slide 7: ConclusionThe final slide should summarize the key points of the presentation, including a summary of the improvements made to the university’s information security program. Thank the audience for their time and invite questions. Finally, include your name in the lower left or right corner of the initial title slide.

To know more about Slide visit:

https://brainly.com/question/31115456

#SPJ11

BASIC TENSE LOGIC.
Please show it mathematically
Consider the following schema: FHA → A
Determine whether or not it is valid. If it is valid, prove this; if it isn’t show this by constructing a countermodel.

Answers

The given schema, FHA → A, can be proven to be valid in basic tense logic. A countermodel cannot be constructed to show its invalidity. The schema holds true under all possible interpretations of the tense operators and atomic propositions.

In basic tense logic, the schema FHA → A can be interpreted as "If in the future, it will be the case that H, then it is the case that A." To determine its validity, we need to evaluate whether this implication holds true under all possible interpretations.

To construct a countermodel, we would need to find an interpretation in which the antecedent (FHA) is true, but the consequent (A) is false. However, in this case, it is not possible to construct such a countermodel because the schema holds true in all interpretations.

This can be demonstrated mathematically using semantic reasoning or through the truth table approach, where all possible combinations of truth values for H and A are considered, and it can be observed that whenever FHA is true, A is also true. Therefore, the given schema FHA → A is valid in basic tense logic.

Learn more about tense here: https://brainly.com/question/30131203

#SPJ11

) AmaTao is considering enlisting the assistance of big data. Both structured and unstructured data are affected. Give TWO examples of unstructured data in this regard.
1(b) In MS Access, if you wish to store some comments of unknown length and some integers ranging around 20000, what data type should you choose to store the comments and what field size should you use for the integers?
1(c) In MS Excel, what function should you use if you wish to find the largest value of a group of numbers?

Answers

1(b) In MS Access, if you wish to store some comments of unknown length and some integers ranging around 20000, you should choose Memo data type to store the comments and Long Integer field size to store the integers.The syntax for the MAX function is:=MAX(range)

Memo Data type:Memo data type is used to store long texts, notes, comments, or large paragraphs that may contain a maximum of 65,536 characters.Long Integer field size:It is used to store positive and negative integer values that range from -2,147,483,648 to 2,147,483,647.1(c) In MS Excel, MAX function should be used if you wish to find the largest value of a group of numbers.The MAX function is an in-built function in Excel that is used to find out the maximum value of a given range of cells that may contain numeric values. It ignores all non-numeric cells in the range provided and returns the largest value. The syntax for the MAX function is:=MAX(range).

To know more about  In MS Excel, MAX function visit:

https://brainly.com/question/30206243

#SPJ11

The time it takes for a vehicle from the arrival on a toll booth, press ticket at a ticket-dispensing machine, and then leave the toll booth is normally distributed with mean time of
20 seconds and standard deviation of 3 seconds. If a sample of 15 vehicles is observed, what is the probability that the sample variance will exceed 12?

Answers

The probability that the sample variance will exceed 12 for a sample of 15 vehicles is approximately 0.0197.

To calculate the probability that the sample variance will exceed 12, we need to use the chi-square distribution. Since the sample size is 15, we have n-1 degrees of freedom, where n is the sample size. In this case, we have 15-1 = 14 degrees of freedom.

Using the chi-square distribution table or a statistical software, we can find the critical value for a chi-square distribution with 14 degrees of freedom that corresponds to a significance level of 0.05 (or 5%).

Next, we calculate the chi-square statistic using the formula:

Chi-square statistic = (n-1) * (sample variance) / (population variance)

Given that the population variance is the square of the standard deviation (3 seconds), the population variance is 3^2 = 9.

Substituting the values into the formula, we get:

Chi-square statistic = (14) * (12) / (9) = 18.67

Finally, we compare the chi-square statistic to the critical value. If the chi-square statistic exceeds the critical value, then the probability that the sample variance exceeds 12 is the area under the chi-square distribution curve beyond the critical value.

Using statistical software or chi-square distribution tables, we find that the probability is approximately 0.0197, or approximately 1.97%.

Therefore, the probability that the sample variance will exceed 12 for a sample of 15 vehicles is approximately 0.0197.

Learn more about probability

brainly.com/question/31828911

#SPJ11

Other Questions
according to the hersey-blanchard situational leadership model, a leader should try to when group members are able, willing, and confident. several times, family members have asked a nurse to share personal prescriptions when they were in need of pain medication or antibiotics. which type of rules or standards should govern the nurse's moral decision? Which of the following description of the different types of liquid medications is CORRECT? Fats or oils suspended in liquid are called an elixir Syrup derived from an active medication is called an emulsion A mixture in which solids are fully dissolved is called a solution Sweetened alcohol and water is called an extract By pipeline with an internal diameter of 72 mm flows 4500 kg/h of water contaminated with formic acid. The mole fraction of the acid is 15% and the temperature of the mixture is 20oC. Determine the character of the mixture flow. Check what effect the change in the shape of the pipeline cross-section from circular to square will have on the assumption that the liquid velocity remains unchanged. You should create an interaction between quantitative predictors and qualitative predictors.TrueFalse which one of the following is correct a) the tag provides metadata about the html document. metadata will be displayed on the page, and will be machine parsable. b) the tag provides metadata about the html document. metadata will not be displayed on the page and will not be machine parsable. c) the tag provides metadata about the html document. metadata will not be displayed on the page, but will be machine parsable. d) the tag provides metadata about the html document. metadata will be displayed on the page, and will be machine parsable. Create a history of the problem of osteoporosis that could lead to this scenario, including the experiences and actions of the primary character involved; a list of other persons/characters (nurses, staff, patients, etc.) involved, including their roles and previous actions that led to the scenario outcome(s); and future actions the primary character may take to address the situation, as well as evaluation criteria for determining the effectiveness of these actions. Remember to include the disease progression in this case and any evaluations (i.e. lab, radiological exams, etc.) that one would expect with the disease progression. This information may be presented in a concept map or narrative form, or in any form of the students choosing. Finally, remember to cite your references in APA format and include a reference page. johns property measures 1.2 miles by 500 feet. how many acres does john have (In C++) (Huffman Code Tree Program) (Relatively Simple)Write a C++ program that reads three text files given as command line parameters.-The first file is an inorder traversal of a Huffman code tree-The second parameter is the postorder traversal of the same Huffman code tree-The third file is the encoded text, given as ASCII 0s and 1sThe program should:-Compute the Huffman code tree from the two traversals.-Decode the text, writing the output to standard output (cout).The format of the inorder and postorder traversals is integer values separated by whitespace.The leaves of the tree will be values < 128, representing the ASCII value of the letter.The internal nodes of the tree will be values 128 and greater.Create a makefile that builds an executable named "decode".Here is an example run and some test values:./decode inorder.txt postorder.txt encoded.txtinorder.txt: 10 128 33 134 121 133 117 138 114 135 106 131 71 143 100 140 32 145 101 141 89 130 108 137 99 144 111 142 116 139 120 129 98 136 104 132 46postorder.txt: 10 33 128 121 117 133 134 114 106 71 131 135 138 100 32 140 143 101 89 108 130 99 137 141 111 116 120 98 129 104 46 132 136 139 142 144 145encoded.txt: 10100110000110110101001011110010100010011111011111010001111101001 11100111001110111100010001010010111110101010001011111100000001111 101100100110011011011110100001 Which of the following statements regarding financial strengths and weaknesses is(are) CORRECT?1. Inadequate retirement savings is a financial weakness.2. Very general financial goals are considered a financial strength.3. Determining financial strengths and weaknesses is an objective process.4. Lack of a valid will is considered a financial weakness if a will is necessary to protect the interest of heirs.A. 1 onlyB. 1 and 4C. 3 and 4D. 1, 2, 3, and 4 1. Culture reigns supreme when it comes to an organization's capacity to properly implement strategy. It is important to not undervalue the role that culture plays in the successful execution of a strategy. Why is this statement relevant?2. The success of any organization depends on the implementation of a plan and the achievement of the targeted results. Any approach cannot, however, be successfully implemented by a single person or even a small group of people. The implementation must be able to involve all of the company's employees. Organizational culture is the key in this.3. The attitudes, viewpoints, traits, and qualities that all employees share make up an organization's culture. They are all aware that a fresh approach must be taken in order to attain greater organizational growth. Employees support the implementation of the strategy so that everyone benefits from it, not just the owners and top management. Therefore, it is important to consider the influence of culture when implementing any strategy. For a chemical transformation that releases heat (exothermic), the temperature of the system rises. For a endothermic process, the temperature decreases. Categorize the dissolution of MgSO, and NH4Cl as eithe endothermic, exothermic or neither.MgSO4-NH4CI- Assume 1 Degree of freedom system. Objects have equal masses m= 2 kg. Stiffness is 100 N/m. Neglect radius of pulley. Find: 1. Write static equilibrium condition 2. Equation of motion of total system 3. Natural frequency 4. Determine the displacement of lower mass as a function of time during the transient response. Initial position of upper mass is 10 mm up the incline from static equilibrium position. Initial velocity is zero. k www m 0 E Upload Choose a file How does pyrethrins pesticides produce in the industry indetails? with the reactions that happened Write code that when executed in PowerShell, will satisfy the following requirements:Retrieve a list of the provider drives in the current session.Only include the provider and name columns in the results.Sort the results by provider in descending order.Display the results inside the console window.Format the results as a list. CanGhana be described as a welfare state?(1500 words) Which of the following is/are grammar(s) for the language L = {al blck i, j, k >0} ? Ltfen bir ya da daha fazlasn sein: S-> ASB, B->BBC, C-> ECC OS->ABC, A->a | A, B-> BB, C->CCC OS->aAbBCC, A-> | A, B->| B, C-> | CC OS->ABC, A-> A, B->EbB, C-> | CC OS->aA, A->aAlaB, B->bBC, C->CCC OS-> XC, X->aX | aXb, C-> CCC S->aAbBCC, A->a | A, B->bbB, C->CCC OS-> | as a bBb, B->bBb CCC, C->CCC S-> XC, X->aXaXb, C->CCC The following array is to be sorted in ascending order: {20, 16, 40, 35, 55, 12, 5, 10} c. If the original array above is sorted by quicksort, what will the array look like after the first call to the partition() helper method (assuming that it uses a pivot of 35)? Please explains in details how to :a. create function for file access: allocating file inLinux/Unix ?b. create function for file access: setting file size inLinux/Unix? indicate which of the following substances can exist as cis-trans isomers: 1- chloropropene, 2-chloropropene, 1 pentene, 2-pentene. show these structures