when elizabeth wants to go out to dinner, she checks her open table app to see which restaurants in her area have reservations available. open table is an example of

Answers

Answer 1

The best dining experiences, in our opinion at OpenTable, start with the best ingredients. Engineers can provide the greatest applications to customers and restaurant owners by participating in open source software projects.

How does the OpenTable reservation system work?

With OpenTable, you get access to a network of millions of customers and only ever pay for seated diners; no other fees apply to no-shows or cancellations. Provide an on-site or online waitlist, and control the door with ease using text messages with tables available for ordering and wait quote suggestions.

What kinds of reservations can you make at restaurants?

Currently, there are primarily two categories of restaurant reservation systems available on the market: those that offer both operator- and consumer-facing management platforms and reservation websites, and those that just offer tools for the operator.

To know more about open source software visit :-

https://brainly.com/question/29762628

#SPJ4


Related Questions

Can anyone help me answer this question?
Deep learning deals with how a machine provides information by processing data carried through the neural network and outputting the data.
Is this correct?

Answers

Deep learning deals with how a machine provides information by processing data carried through the neural network and outputting the data, is the correct statement.

What is deep learning in neural network?

Machine learning, which is simply a neural network with three or more layers, is a subset of deep learning. These neural networks make an effort to mimic how the human brain functions, however they fall far short of being able to match it, enabling it to "learn" from vast volumes of data.

Deep learning is a machine learning method that instructs computers to learn by doing what comes naturally to people. Driverless cars use deep learning as a vital technology to recognize stop signs and tell a pedestrian from a lamppost apart.

Thus, it is the correct statement.

For more information about deep learning in neural network, click here:

https://brainly.com/question/14632443

#SPJ1

a museum in london offers admission tickets on its website. in november, the museum will open a special exhibit. advanced sales have already gone up 25%. what cloud computing feature is responsible for handling the change in ticket sales activity?

Answers

The cloud computing feature responsible for handling the change in ticket sales activity is scalability.

What is scalability?

Scalability is the ability of a system, network, or process to handle a growing amount of work in a capable manner or its ability to be enlarged to accommodate that growth. It is an important characteristic of any system, process, or organization, as it allows for increased growth and efficiency.

Scalability allows the cloud computing system to increase or decrease its resources to meet the demand of increased or decreased ticket sales. This allows the museum to quickly adjust their ticketing system and accommodate the increased demand for tickets to the special exhibit.

To learn more about scalability
https://brainly.com/question/13260501
#SPJ4

discuss how the definition of privacy that is commonly used (freedom from observation) may differ from the definition of privacy from the information security perspective (freedom from unsanctioned intrusion).

Answers

The right to privacy is a fundamental human right that supports the freedoms of association, expression, and against discrimination.

What are privacy and its various forms?

Protection of privacy refers to the capacity to keep particular information private or restricted to a small group of people. Physical, virtual, third-party, and statutory privacy protection are the four different categories.

What does privacy have to offer?

A person's right to privacy is their unrestricted ability to make decisions about their lifestyle, values, friends, and information sharing. Lack of privacy breeds uniformity and self-censorship, which skews our beliefs and makes it harder for us to have productive debates.

To know more about privacy visit :-

https://brainly.com/question/2033492

#SPJ4

which of the following characteristics of cloud based hosting

Answers

The characyeristic of cloud based hosting is no obselesce.

Cloud hosting makes websites and applications  accessible using cloud resources. Except traditional hosting, solutions are not deployed on a single server. Rather, a network of connected physical and virtual  cloud servers hosts the application or website, ensuring greater scalability and flexibility.

Key features:

Solutions and applications  are deployed on a cloud network rather than an on-premises, single server.Resources scale to user needs.Organizations only pay for the resources they use.Cloud hosting could support SQL (including MySQL) or NoSQL databases.Solutions are controlled and automated  using mobile apps, APIs, and web portals.

Here you can learn more about hosting in the link brainly.com/question/28742495

#SPJ4

value stream mapping is a technique that originated at toyota, where it was referred to as . multiple choice question. material and information flow mapping data mapping work method and mistake mapping value flow mapping

Answers

The method of value stream mapping was developed at Toyota, where it was known as Material and Information Flow Analysis diagrams (MIFA).

What is the Toyota Production System, or "lean"?

our renowned lean manufacturing process. The Toyota Production System establishes how we produce vehicles (TPS). It is an innovative manufacturing concept that seeks to maximize efficiency while getting rid of waste.

Where did lean originate?

Lean has its roots in Venice in the 1450s, contrary to popular belief, which holds that Henry Ford and Toyota invented it in the 1900s. Lean is a theory or style of thinking that emphasizes waste reduction and process streamlining in order to save time, space, resources, and money.

To know more about Information visit:-

https://brainly.com/question/15709585

#SPJ4

if you want to rotate a selected shape by a specific number of degrees, which of the following is the best option? a. drag the rotate handle on the shape. b. click the rotate button on the drawing tools format tab, and then select one of the rotate commands. c. drag the adjustment handle on the shape. d. click the rotate button on the drawing tools format tab, and then select one of the flip commands.

Answers

Select one of the Rotate commands by clicking the Rotate button on the Drawing Tools Format tab.

What happens if you hold down the shift key while dragging a shape's size handle?

Press and hold the OPTION key while dragging the scaling handle to quickly resize a photo, shape, WordArt, or other object while maintaining the object's center.

What will happen if you push the number key while holding down the Shift key?

Users who press the Shift key on their keyboard can type a single capital letter and convert the top number keys to symbols. On US keyboards, for instance, holding Shift while hitting A produces a capital "A," while holding Shift while pressing 1 produces an exclamation mark.

To know more about commands visit:-

https://brainly.com/question/3632568

#SPJ4

Two computers are built by different manufacturers. One is running a Web server and the other is running a Web browser. Which of the following best describes the ability of the two computers to communicate with each other across the Internet

Answers

A Web program called an online forum enables Internet users to converse with one another, albeit not in real-time.

A virtual meeting place where individuals may congregate to talk about things, ask questions, and exchange information is called an online forum. Users can submit messages, photographs, videos, and other types of content in internet forums, and other forum users can comment to these posts. Websites frequently host online forums, which can be either public or private. A web server allows a computer to transmit HTML-coded Web pages to client computers connected to a network upon request by delivering an HTTP request. A computer system known as a web server is used to store, process, and deliver web pages to users all over the Internet. It's in charge of delivering web content, including HTML documents, photos, and other things that the user's web browser requests.

Learn more about Web server here:

https://brainly.com/question/29756073

#SPJ4

Answer:

the guy above me has it

Explanation:

how to unlock iphone without passcode or face id 2022?

Answers

Using iTunes, iCloud and Recovery mode are few ways to unlock iphone without passcode or face id 2022.

There are several ways to unlock an iPhone without a passcode or Face ID, but it is important to note that some of these methods may only work if you have previously set up your iPhone to allow for alternative methods of unlocking. My knowledge cut off is in 2021, but I will share the most common ways to unlock an iPhone without a passcode or Face ID.

Using iTunes: If you have previously synced your iPhone with iTunes on your computer, you can use iTunes to erase your iPhone and unlock it. Connect your iPhone to the computer, open iTunes, and follow the prompts to restore your iPhone.iCloud: If you have enabled "Find My iPhone" on your iPhone, you can use iCloud to erase your iPhone and unlock it. Go to iCloud.com, sign in with your Apple ID, and select "Find My iPhone." Select your iPhone from the list of devices, and click "Erase iPhone."Recovery mode: You can also put your iPhone into recovery mode and restore it using iTunes. To do this, connect your iPhone to your computer, and put your iPhone into recovery mode by holding down the Home button and the power button simultaneously. Once in recovery mode, open iTunes, and follow the prompts to restore your iPhone.

Learn more about iCloud here:

https://brainly.com/question/29736769

#SPJ4

a marketing team wants to send an automated second email to subscribers who engaged with the original email. which sending method should they use?

Answers

An automated second email to subscribers who engaged with the original email can be sent using a triggered email. Triggered emails are automated emails that are sent based on a specific action or trigger, such as opening or clicking on an original email.

What is a triggered email?

Triggered emails, also known as behavioural emails or transactional emails, are those that are sent automatically in response to pre-defined events or conditions met by an individual via specific behaviours, actions, or other signals.

The primary distinction between triggered emails and general promotional emails is that triggered emails are delivered to an individual one-to-one, whereas promotional emails are manually sent one-to-many (where a large number of people receive the same email at the same time).

To know more about triggered email, visit: https://brainly.com/question/28992864

#SPJ4

an application is described as a set of computer instructions that controls allocation of computer hardware and provides the capability of communicating with your computer. group of answer choices true false

Answers

Yes, an application is defined as a set of computer instructions that manages how computer hardware is allocated and gives you the capacity to communicate with your computer.

What kind of software is responsible for managing the computer's resource allocation?

Operating system (OS) Operating system (OS), program that controls how resources are distributed among different applications on a computer. The CPU, RAM, file storage, input/output (I/O) devices, and network connections are examples of common resources.

Is a piece of software an instruction set?

To control computers and carry out particular activities, software is a collection of instructions, data, or programs. Hardware, which describes a computer's external components, is the opposite of software.

To know more about operating system visit:-

https://brainly.com/question/29032385

#SPJ4

Write down the html tag to scroll the text in web- pages?​

Answers

Answer:

<marquee>Your Text Here</marquee>

Explanation:

To create scrolling text in HTML, you can use the <marquee> tag. This tag allows you to create dynamic, scrolling text on your web page. The syntax is: <marquee>Your Text Here</marquee>. You can also customize the scrolling speed, direction, and more using additional attributes.

Describe the two checkpoint mechanisms provided by Windows Server 2019

Answers

each virtual machine, you can select standard and production checkpoints starting with Windows Server 2016 and Windows 10. new virtual machines, production checkpoints are the default setting.

What is the difference between Windows and Windows Server?

Network connections on a desktop edition of Windows are restricted to 10–20. Based on the capacity of your hardware, a Windows server may accommodate well more than merely 20 network connections since it is not restricted to this number.

Windows Server OS is it free?

There is a Windows Server Basic Edition as well as a Windows Server Enterprise Edition for every version. The monthly cost for the Standard version is $20, while the Data Center version is $125.

To know more about Windows Server visit:

brainly.com/question/9426216

#SPJ4

Assignment 2.1 [30 points] Write a program that asks the user for an amount of money (entered in cents) and then tells the user how to make change for that amount using only quarters, dimes, nickels, and pennies. Use the strategy used in lesson 2.3 (i.e., you must use the modulus operator), and format your output exactly as in this sample screen output. Note that the pennies must be output first. enter number of cents: 119 pennies: 4 nickels: 1 dimes: 1 quarters: 4 You should be sure not to use any numbers other than 0 and 1 in your code in this program. Instead, you should define named constants at the top of the file.

Answers

Summarise the conversation you had with your classmates in a piece of writing. Our Method of Writing.

What is in a file?

1. On a computer, a file is an entity that houses data, information, preferences, or instructions used by a programme. Program files, data files, & system files are the three different sorts of files found on computers.

Why are files necessary?

User information. The main objective of a file system is to handle user data. This includes data retrieval, updating, and storage. Some file systems receive a bytes stream that are received and saved in a form that is efficient for the media as data to be stored.

To know more about  file visit:

https://brainly.com/question/14277907

#SPJ4

northern trail outfitters wants to create an email which displays different images based on data stored in a sendable data extension. what should they use to meet this objective?

Answers

In accordance with the requirements, SQL Query should be used to pull this data. A SQL SELECT statement retrieves records from a database table in accordance with clauses that specify criteria .

What is SQL?

Structured Query Language, or SQL, is its acronym. Databases can be accessed and manipulated using SQL. In 1986, the American National Standards Institute (ANSI) adopted SQL as a standard, and in 1987, the International Organization for Standardization (ISO) followed suit.

Structured Query Language, or SQL for short, is a programming language designed specifically for managing data in a relational database management system or for stream processing in a relational data stream management system.

To learn more about SQL visit :

https://brainly.com/question/20264930

#SPJ4

Where can a user add, rename, and reorder slides in order to create a custom slide show?
O Define Custom Show dialog box
O Navigation pane
O Set Up Slide Show dialog box
O Slide Sorter view

Answers

Answer:

Slide Sorter view

Explanation:

In PowerPoint, the Slide Sorter view allows a user to add, rename, and reorder slides in order to create a custom slide show. The user can select the slides they want to include in their custom show, and then use the options in the Ribbon or right-click menu to arrange the slides in the desired order. The user can also add new slides to the custom show by clicking the "New Slide" button in the Home tab, or by copying and pasting existing slides from the original presentation. Additionally, the user can rename slides in the Slide Sorter view by double-clicking the slide's title and typing in a new name.

The 9 course staff compete in a race. In how many distinct ways can the 3 medals (gold, silver, bronze) be awarded if Aleks wins either a silver or a gold?Hint: Think about the two cases separately. ______

Answers

This is the number of permutations of 9 distinct objects taken three at a time without repetition. So, the number of ways through which medals can be awarded is as follows:

[tex]^9P_3[/tex] = 9 × 8 × 7 = 504 ways.

What do you mean by Permutation and combination?

Permutation and combination may be defined as the various ways in which objects from a set may be selected, generally without replacement, to form subsets. This selection of subsets is called a permutation when the order of selection is a factor, a combination when order is not a factor.

A permutation is an act of arranging objects or numbers in order. Combinations are the way of selecting objects or numbers from a group of objects or collections, in such a way that the order of the objects does not matter.

Therefore, this is the number of permutations of 9 distinct objects taken three at a time without repetition. So, there are 504 ways through which medals can be awarded.

To learn more about Permutations, refer to the link;

https://brainly.com/question/1216161

#SPJ1

62) an assistant referee signals that the ball has passed over the touch line. a defender inside the penalty area violently strikes an attacker after the ball leaves the field of play. what decision should the referee make?

Answers

The ball has crossed the goal line, according to an assistance referee, but the referee cannot see his flag.

Is Windows Defender as reliable antivirus programme?

Yes, Microsoft Antivirus is indeed a suitable option for rudimentary malware defence. However, there are more better antivirus alternatives available if you want more comprehensive device protection against internet dangers.

How can I tell if Windows Defender is installed on my machine?

To see the status of Windows Defender Antivirus, use the Windows Defender security app. Start entering Security into the Start menu on your Windows device. The Windows Defender security app will then launch in the search results. Choose threat & virus protection.

To know more about Defender visit:

https://brainly.com/question/29352945

#SPJ4

A computer program performs the operation 2 ÷ 3 and represents the result as the value 0.6666667. Which of the following best explains this result?

Answers

Because of the limits of utilizing a floating-point representation, the precision of the result is limited.

What is floating-point representation?

A floating-point representation in the IEEE 754-2008 standard (referred to as IEEE 754 from here on) is an unencoded component of a floating-point format that represents either a finite integer, a signed infinity, or some type of NaN. Because of the limits of utilizing a floating-point representation, the precision of the result is limited. The representation of binary integers in exponential form is known as floating-point representation. The floating-point format divides the number into two parts: the left side is a signed, fixed-point integer known as a mantissa, and the right side is the exponent.

Here,

Because of the limitations of employing a floating-point representation, the precision of the output is limited.

To know more about floating-point representation,

https://brainly.com/question/14287067

#SPJ4

hypothetically, say that you create a custom waf rule to block all traffic from canada. does that mean that anyone who resides in canada would not be able to access your website? why or why not?

Answers

No, blocking all traffic from Canada does not necessarily mean that anyone who resides in Canada would not be able to access your website.

What is website?

A website is a collection of webpages, images, videos and other digital assets that share a common domain name and are typically hosted on at least one web server. Websites are accessed by typing a URL into a web browser.

This is because while a custom WAF rule can be used to block IP addresses originating from Canada, it is not possible to know whether the user accessing the website is actually located in Canada or not. For example, if someone is traveling to another country but accessing the website from a Canadian IP address, they would be blocked even though they are not actually located in Canada. Furthermore, a user located in Canada could use a VPN to mask their IP address and access the website from a different country, thus bypassing the custom WAF rule. Therefore, blocking all traffic from Canada does not guarantee that users from Canada will be blocked from accessing the website.

To know more about website click-
https://brainly.com/question/28431103
#SPJ4

given a /32 global routing prefix and a /64 prefix, how many bits would be allocated for the subnet id?

Answers

A /32 global routing prefix is a type of IPv4 address that provides a single host with a unique IP address. This prefix uses 32 bits in total, with no bits allocated for the subnet ID.

A /64 prefix is a type of IPv6 address that provides a single subnet with a unique IP address space. This prefix uses 64 bits in total, with 64 bits allocated for the subnet ID.

In summary, 0 bits would be allocated for the subnet id in /32 global routing prefix, and 64 bits would be allocated for the subnet id in /64 prefix.

Learn more about subnet id here:https://brainly.com/question/27960959

#SPJ4

g when executing a search warrant for digital evidence what is the first step that you must take?

Answers

Electronic evidence can be searched for and taken in accordance with search warrant specifications. The most popular approach, as well as the approach that typically encounters the least resistance both on the scene and in a court of law.

How is electronic proof acceptable in court?

If an electronic document meets with the criteria for admissibility set forth by the Rules of Court and applicable legislation and is authenticated in accordance with the procedures outlined by these Rules, it may be used as evidence.

On a crime scene, how is digital evidence gathered?

There are several places where digital evidence can be gathered. Computers, mobile phones, digital cameras, hard drives, CD-ROMs, USB memory sticks, servers, cloud computers, and so on are common sources. RFID tags are a non-obvious source.

To know more about Electronic evidence visit :-

https://brainly.com/question/28346310

#SPJ4

how often does a disk need to be defragmented? when the windows operating tool shows a fragmentation rate of 15% or greater periodically and especially after prolonged storage of large files when the windows operating tool shows a fragmentation rate of at least 25% at least every six months

Answers

At least once a month, defragment. You can defragment your disk whenever it has a fragmentation higher than 10%. It is easy to defragment Windows 10, Windows 8, or Windows 7 as frequently as required.

What occurs throughout defragmentation?

Disk defragmentation collects all of a file's fragments and places them in one location. Additionally, it ensures that all programs are in their respective locations and that all free disk space is collected.

What does defragmenting accomplish?

Defragmentation speeds up data access and improves storage utilization. Some software platforms routinely defragment data automatically, while others demand that the user employ a specialized program on occasion.

To know more about Defragment visit:

https://brainly.com/question/30229200

#SPJ4

devices that add computer-generated information on top of the real world that a user sees offer a(n) experience

Answers

Devices that add computer-generated information on top of the real world that a user sees offer a(n) augmented reality experience.  

What is information technology, and what are some examples?

The study of or use of computers and telecommunications for data archiving, retrieval, transmission, or sending is known as information technology, or IT. Although computers and their networks are sometimes referred to as "IT," the phrase also refers to other information dissemination technologies, such as television and cellphones.

Why is it called information technology?

In its most basic form, the term IT (Information Technology) refers to every activity that involves computers. IT, or information technology, is the term used to describe the use of technology in a company to process data, coordinate operations, and solve business problems.

To know more about information visit-

https://brainly.com/question/29244533

#SPJ4

Think of a situation in the not-too-distant future in which an autonomous robot, for example a factory manufacturing robot or a self-driving car, through some unfortunate coincidental combination of circumstances accidentally causes a human serious injury or even death. In a case such as this, who should be held responsible for the crime and damages? Can the developer or team of developers who wrote the code justifiably be held responsible? Is it simply considered a mechanical malfunction and nobody is held responsible, but the machine is destroyed?

Answers

Machines do not have souls and hence cannot have a will. They do what they are programmed to do. Any error that a machine no matter how intelligent, makes must be considered vicarious. This means that the makes must all be held liable for their errors.

What is Vicarious liability?

Vicarious liability is a type of stringent, secondary liability that derives from the common law theory of agency, respondeat superior, or the superior's responsibility for the actions of their subordinate.

Attachment of blame to a person for injury or losses caused by another person in a negligence action or criminal prosecution (also known as "imputed culpability"). Vicarious responsibility is a type of tort that holds an employer liable for a tort committed by his employee while the latter is on the job.

There are various forms of business insurance available to protect business owners from vicarious liability claims, including general liability, errors and omissions, and umbrella insurance, which covers everything not covered by general liability insurance.

Learn more about Vicarious liability:
https://brainly.com/question/16891800
#SPJ1

You have just installed a new hard disk drive into your computer but it is not being recognized by the motherboard within the BIOS/UEFI. You have verified the drive is properly connected to the motherboard and the power supply with the correct cables, but it still is not recognized. Which of the following actions would BEST solve this problem

Answers

The BEST solution to this issue would be to update the firmware on the motherboard.

What is the disadvantage of only testing server connections by attempting to use them?

It only need a functional link and a set up IP. It employs ICMP requests to inquire about the status of network hosts. It is impossible to determine whether a problem is a network issue or an issue with an application.

Do I have to turn on virtualisation in the BIOS?

This makes it possible for an operating system to use the computer's CPU power more effectively and efficiently, resulting in speedier performance. Many virtual machine programs also need this capability to function, and it must be enabled for them to do so.

To know more about  motherboard visit:-

https://brainly.com/question/24119833

#SPJ4

an administrator at cloud kicks needs to export a file of closed won opportunities from the last 90 days. the file should include the opportunity name, id, close date, and amount. how should the administrator export this file?

Answers

The latest setup modifications that you and other admins make are tracked by Setup Audit Trail. When there are several admins, audit history is extremely helpful.

Field values from the past will remain untouched. Field values that already exist will be converted. The field's current values will be removed. The Setup Audit Trail keeps track of any alterations or activities carried out inside an org throughout the course of the last six months. Either Read-Only or Read/Write access can be given. Instead of a group of users that often varies, sharing rules function best when they are established for a specific group of users that you can identify or forecast in advance. While importing from a different system, identify- There is no Record ID yet, therefore external ID.

To know more about tracked please click the below link.

https://brainly.com/question/29755751

#SPJ4

the customer's age is stored in the variable age and the price is stored in the variable price. which piece of code will correctly decide the price for each ticket.

Answers

The variable number1 is being used in the code above to store the value 10. Any kind of data can be stored in variables.

Objects that can be kept in variables Why is it vital to give the variable a meaningful name?

Anything that is significant to hold or refer back to can be stored in variables. is it crucial to give a variable a meaningful name? In order for the programmer to remember what the variable means, it must have meaning.

How may a variable be represented by a bag?

By storing just one thing—a value written on a sticky note and put inside a designated bag—the baggy represents a variable. Like the value of a variable, the value in the bag can be altered at any time.

To know more about variable price visit:-

https://brainly.com/question/20738483

#SPJ4

question 1 given the architecture and terminology we introduced in chapter 1, where are files stored?

Answers

The primary topics of Introduction to Medical Terminology include the fundamental concepts of human anatomy.

The primary topics of Introduction to Medical Terminology include the fundamental concepts of human anatomy and physiology as well as the common medical expressions referring to the body systems. An example patient case study is presented at the start of each chapter to show how commonplace medical language is utilized. Using a student-friendly approach, the chapter's content has been logically split into sections that cover medical terminology, an introduction to anatomy and physiology, coverage of diseases and conditions, diagnostic procedures, surgical and therapeutic treatments, and drug therapy. Each chapter review includes a variety of exercises that have been tried and tested in the classroom to help students grow and deepen their understanding of medical terminology. The text has been complemented by medical illustrators with expertise in producing colorful, detailed graphics.

Learn more about Medical Terminology here:

https://brainly.com/question/29871496

#SPJ4

Which connection type can support gigabit ethernet?

Answers

Answer:

Cat-5e cable

Explanation:

Final answer:

The connection types that can support gigabit ethernet include Cat5e, Cat6, and Cat7 cables. Gigabit ethernet refers to the speed of data transmission, specifically one billion bits per second.

Explanation:

The connection types that can support gigabit ethernet include Cat5e, Cat6, and Cat7 cables. Among these, the Cat5e cable has a limit of 1 gigabit per second, but Cat6 and Cat7 cables can support speeds beyond this. It's important to understand that gigabit ethernet refers to the speed at which data is transmitted, which in this case is one billion bits per second.

Learn more about Gigabit Ethernet here:

https://brainly.com/question/33716696

#SPJ6

Manuel wants to participate in a local internship. What is most likely to be TRUE about his experience?

A.
He will be required to quit college so he can participate full-time.

B.
He will receive a lot of money for his work with the company.

C.
He will be graded on his ability to show up on time and complete tasks.

D.
He will be involved in aspects of the experiential learning cycle.

Answers

Answer:

c i think sorry if it's wrong

Explanation:

Other Questions
a straight line passes through point (2,6) and 9,20) what is the equation of the line in slope-intercept form carlos naturals makes bulk quantities of cleaning fluids. the company currently sells 1,000 containers a month at a price of $22 per unit. the addition of a new disinfectant can fetch them $25 per unit for the improved product. it would cost them a total of $3,800 per month to make that alteration. what would be the effect on operating income? on october 20 of the current year, grimm co. consigned 40 freezers to holden co. for sale at $1,000 each and paid $800 in transportation costs. on december 30, holden reported the sale of 10 freezers and remitted $8,500. the remittance was net of the agreed 15% commission. what amount should grimm recognize as consignment sales revenue for the current year? the owner of a store that sells custom kitchen cabinets wishes to use a target return-on-sales pricing approach to establish a price for a typical section of cabinets. assume that variable costs total $200 per unit, fixed cost is $44,000, and the storeowner desires a target profit of 20 percent return on sales at an annual volume of 400 cabinets. what price should be charged for a typical cabinet section? Lena and Ivan each ran every day as part of an exercise routine. Lena ran 3 miles each day for x days. Ivan ran 4 miles each day for y days.The total number of miles that Lena ran is at least the total number of miles that Ivan ran. Write an inequality describing this relationship. Really please help me out instead of getting the points I added a picture below which compact sets does there exist a number m such taht every open cover contains a finite subcover of m elemens Read this sentence from roosevelt's speech "the new nationalism". "it demands of the judiciary that it shall be interested primarily in human welfare rather than in property, just as it demands that the representative body shall represent all the people rather than any one class or section of the people." which illustration would best represent the main idea expressed in the quotation? a tariff has the effect of: a. raising the price of the imported product. b. increasing the demand for the imported product. c. increasing the supply of the imported product. d. increasing the demand for the exported product. which of the following properties can be inferred from the stars orbital period?0 the planet's orbital radius 0 the planet's mass 0 both the planet's orbital radius and its mass 0 neither the planet's orbital radius nor its mass A cup of coffee is considered a _______.A) precipitateB) soluteC) solutionD) solvent 1. contrast leadership for quality and lean six sigma as quality initiatives for xerox. how did their motivations differ? what differences or similarities are evident in the principles behind these initiatives and the way in which they were implemented? Consider the flask diagramed below with the following pressures 492 torr H2 and 0.376 atm for N2. What are the final partial pressures of H2 and N2 after the stopcock between the 2 flask is opened? (Assume the final volume is 3.00L). What is the total pressure in torr? after a subtotal gastrectomy for cancer of the stomach, a client develops dumping syndrome. the client asks the nurse, 'what does that mean? how would the nurse explain- dumping syndrome? How does someone become a carrier for sickle cell anemia The density of titanium is 4.54 g/mL. The water level in a graduated cylinder initially at 25.0 mL rises to 31.0 mL after a piece of titanium is submerged. What is the mass, in grams, of the titanium? Kenton compared gas mileage for three cars.Car A450 miles for 15 gallonsCar B651 miles for 21 gallonsCar C598 miles for 23 gallonsWhich car has the best rate of miles per gallon? Car A has the best rate at 30 miles per gallon. Car B has the best rate at 31 miles per gallon. Car C has the best rate at 26 miles per gallon. All three cars had the same rate of miles per gallon. An astronaut is doing a spacewalk on a long tether from the International Space Station (mass of 420,000 kg). His spacesuit includes a very sensitive gravitometer, which indicates the gravitational force acting on the astronaut and his spacesuit from the ISS is 7.0 E7 N. If the mass of the astronaut in his suit is 250 kg, how far away from the ISS is the astronaut if G = 6.67 E11 N*m2/kg2?A. 0.100 kmB. 0.200 kmC. 0.500 kmD. 1 km a child is stung by a bee and now fears all flying insects. this best illustrates: group of answer choices a) stimulus generalization b) secondary reinforcement c) shaping d) spontaneous recovery.