Hi, I know this will take a while that’s why I made the question worth so much.

Im making a tic tac toe game on MIT app inventor and the buttons work properly and they player’s turn from x to o but checking if somebody won doesn’t work and I would like somebody to tell me or code the reason why checking who won doesn’t work

Answers

Answer 1

Unfortunately, without access to your code and a specific description of what isn't working, it's difficult to determine why your code for checking who has won in a Tic Tac Toe game isn't working. Here are some general considerations that may be helpful:

Checking for a win: To check for a win, you'll need to compare the state of the Tic Tac Toe board to all of the possible winning combinations. This can be done by checking if three buttons in a row (either horizontally, vertically, or diagonally) are all filled with the same player's symbol (X or O).Checking for a draw: If all buttons are filled and there is no winner, then the game is a draw.Logical Errors: Ensure that the code for checking who has won or if there is a draw is correct and free of logical errors.

If you could provide more details on your code and what specifically isn't working, I would be better equipped to help.

Learn more about debugging an app here: https://brainly.com/question/23527660

#SPJ1


Related Questions

How do you draw a line in CodeHS?

Answers

rect(x, y, w, [h]) uses the x, y, width, and height to draw a rectangle on the screen. line(x1, y1, x2, y2) creates a line on the screen (a straight line connecting two points).

What is CodeHS line?The name of your function must be horizontalLine. You should receive a horizontal line of length 200 starting at position 100 if you call, for instance, horizontalLine(100, 200). Keep in mind that you can draw a line with a larger pen size OR use the advanced circle command (circle(radius, extent)) to create a circle with a curved end. Using the begin fill() command before Tracy starts moving and the end fill() command after the shape has been drawn, you may fill in your shape.In several languages, including JavaScript, the newline character is written as n. To add a new line to a string, simply add the character n whenever one is necessary.

To learn more about CodeHS line, refer to:

https://brainly.com/question/25979913

#SPJ4

What is the key difference between a static variable and a global variable A. Only one of them needs to be garbage-collected. B. They have different life time. C. They have different visibility D.They come from different parts of memory.

Answers

The key difference between a static variable and a global variable is They have different visibility.

In computer programming, a variable is a named container for a certain set of bits or type of data. A variable is an abstract storage place with an associated symbolic name that stores some known or unknown quantity of information referred to as a value (like integer, float, string etc...). Eventually, a memory address may be used to link or identify a variable. In addition to using the variable name or the variable itself, depending on the situation, the stored value is typically referenced by the variable name. The name can be used independently of the precise information it conveys thanks to the separation of name and content.

Here you can learn more about variable in the link brainly.com/question/17344045

#SPJ4

What is virtual private network in network security?

Answers

The ability to create a secure network connection when using public networks is known as a virtual private network, or VPN.

What is meant by virtual private network?The ability to create a secure network connection when using public networks is known as a virtual private network, or VPN. Your internet traffic is encrypted by VPNs, which also mask your online identity. Third parties will find it more challenging to monitor your internet activity and steal data as a result.A virtual private network, or VPN, is an encrypted connection made between a device and a network via the Internet. Sensitive data is safely delivered thanks to the encrypted connection. It allows the user to work remotely and prevents unauthorized individuals from listening in on the traffic. Virtual private network, or VPN, is a service that helps you remain anonymous online.

To learn more about virtual private network refer to:

https://brainly.com/question/16632709

#SPJ4

How many arguments does the "input" function expect to receive? A. one. B. two. C. zero. D. any number of arguments.

Answers

The "input" function expects one argument. If more than one argument is passed, it will ignore the additional arguments.

It is also possible to pass an optional second argument, which is a prompt string that is displayed before the user enters the input value.

When calling the "input" function, the single required argument is a string which specifies the prompt that is displayed to the user. This prompt string is used to provide instructions to the user, such as what type of input is expected. The optional second argument can also be a string which specifies the prompt that is displayed before the user enters the input value.

Learn more about The "input" function:

https://brainly.com/question/10283950

#SPJ4

Write a program that prompts the user to enter 3 names. Store each name in a separate variable. Then display the names back to the user in every possible order. Print the first three combinations all on one line separated by commas. Print the second three combinations with one name per line

Answers

Here is a program in Python that implements this requirement:

# Prompt the user to enter 3 names

name1 = input("Enter the first name: ")

name2 = input("Enter the second name: ")

name3 = input("Enter the third name: ")

# Store the names in a list

names = [name1, name2, name3]

# First three combinations all on one line separated by commas

print(name1 + ", " + name2 + ", " + name3)

print(name1 + ", " + name3 + ", " + name2)

print(name2 + ", " + name1 + ", " + name3)

# Second three combinations with one name per line

print(name2 + ", " + name3 + ", " + name1)

print(name3 + ", " + name1 + ", " + name2)

print(name3 + ", " + name2 + ", " + name1)

This program will prompt the user to enter three names, store each name in a separate variable, and then display the names back to the user in every possible order. The first three combinations are displayed all on one line separated by commas, and the second three combinations are displayed with one name per line.

You can learn more about Python here brainly.com/question/30427047

#SPJ4

a(n) provides a detailed description of all tables found within the user/designer-created database.

Answers

A(n) data dictionary provides a detailed description of all tables found within the user/designer-created database. Data dictionary is used as entralized repository of information about data.

In computer and technology, A data dictionary also known as metadata repository generally can be described as a "centralized repository of information about data such as meaning, relationships to other data, origin, usage, and format". The definition of data dictionary refers to the IBM Dictionary of Computing. In the other side, Oracle also defines it as a collection of tables with metadata. Generally  a data dictionary is a centralized metadata repository.

Here you can learn more about data dictionary https://brainly.com/question/14960489

#SPJ4

a man dressed as a service technician asks monique for her system passwords so he can eradicate a problem on her computer. she gives him the passwords. monique is a victim of: a. peer-to-peer technology

Answers

Monique is a victim of social engineering. Social engineering is a type of attack that relies on manipulating people into providing sensitive information, such as passwords, to gain access to private data or systems.

What is social engineering?

Social engineering is a type of attack that uses social techniques to manipulate people in order to gain access to confidential information or resources. It is a non-technical form of hacking that takes advantage of people's trust and lack of knowledge to gain access to sensitive information. Social engineering attacks can be used to gain access to physical spaces, computer networks, or confidential information.

In this case, the "service technician" was not actually a technician and was simply trying to use Monique's trust in him to gain access to her system.

To learn more about social engineering
https://brainly.com/question/14828918
#SPJ4

assuming a data set with 2,306 training outcomes of which 895 are negatives, what is the entropy?

Answers

The entropy of the data set/database is 0.971 bits for a data set with 2,306 training outcomes of which 895 are negatives.

How to calculate entropy?

The entropy of a data set with 2,306 training outcomes, where 895 are negatives, can be calculated as follows:

Let's call the probability of a negative outcome p(neg) = 895/2306 and the probability of a positive outcome p(pos) = 1411/2306.

The entropy H can then be calculated as:

H = -p(neg) * log2(p(neg)) - p(pos) * log2(p(pos))

Plugging in the values:

H = -(895/2306) * log2(895/2306) - (1411/2306) * log2(1411/2306)

H = 0.971 bits

So the entropy of the data set is 0.971 bits.

To learn more about entropy, visit:

To learn more about data set/database, visit: https://brainly.com/question/25704927

#SPJ4

Our school is considering running the group raffle at an upcoming assembly to give away a prize. Write a brief explanation of what advice you would give them.

*Students should be able to explain with the term reasonable, unreasonable, and exponential, why running a group raffle in a school of most sizes is impossible. *

Answers

A brief explanation of what advice you would give them.

*Students should be able to explain with the term reasonable, unreasonable, and exponential, why running a group raffle in a school of most sizes is impossible.*

It is important to consider the legality and fairness of running a raffle, especially in a school setting. Here is some advice to consider:

Make sure the raffle is legal in your jurisdiction by checking with local laws and regulations.

Develop clear and transparent rules for the raffle, including the method of selecting a winner, eligibility requirements, and how the prize will be awarded.Ensure the prize is suitable for the audience and consider the impact of the prize on the community.

Consider using an unbiased method of selecting a winner, such as a random draw.

Make sure that the proceeds of the raffle are used for a lawful purpose, such as supporting school programs or charitable causes.Clearly communicate the rules and process of the raffle to participants, and ensure that all participants understand and agree to the terms before participating.

Here you can learn more about a brief explanation

brainly.com/question/28329350

#SPJ4

which two cloud capabilities are combined to deliver sase? (choose two)
- Security as a Service;
- API as a Service;
- Network as a Service;
- Database as a Service;

Answers

Security as a Service; Network as a Service

The two cloud capabilities are combined to deliver sase are Security as a Service and  Database as a Service.

What is security as a service?

With security as a service (SECaaS), businesses may outsource cybersecurity management to a third party. Outsourced security solutions include functions including intrusion detection, antivirus administration, and data loss prevention.

What is Network as a Service?

Network as a Service (NaaS) is a flexible method of consuming enterprise network infrastructure that gives businesses the ability to keep up with innovation, adapt to quickly changing business needs, and enhance user experiences and network performance through a subscription model that is similar to the cloud.

What are the 2 main types of cloud services?

Infrastructure-as-a-Service (IaaS), platforms-as-a-Service (PaaS), and apps are the three primary categories of cloud computing services (SaaS).

Hence Security as a Service and  Database as a Service is a correct answer.

To know more about cloud services follow link https://brainly.com/question/13468612

#SPJ4

an employee reports that the antivirus software cannot obtain updates. the support technician notices that the license for the software has expired. the technician adds a new license to the software and completes the update service. what should the technician do next?

Answers

Document each test that was tried.

What stages should a troubleshooting procedure on a customer’s machine take?

Make a data backup. A technician implements a series of recommended fixes to a workstation computer problem after reviewing the manufacturer’s documentation.

Determine the issue.

Create a likely cause theory.

To discover the reason, put the theory to the test.

Make a plan of action to solve the problem and put it into action.

Verify complete system operation and, if necessary, put preventative measures in place.

The stages are as follows: identify the problem, develop a hypothesis of probable cause, test the theory, develop a plan (including any consequences of the plan), implement the plan, validate complete system operation, and record everything.

To learn more about  troubleshooting to refer;

https://brainly.com/question/30048504

#SPJ4

When the supervisor-to-subordinate ratio exceeds a manageable span of control, additional Teams, Divisions, Groups, Branches, or Sections can be established. Which NIMS Management characteristic does this describe? Possible Answers:
a.Management by Objectives
b.Comprehensive Resource Management
c.Formal Communication
d. Modular Organization

Answers

This describes the Modular Organization characteristic of the National Incident Management System (NIMS). Modular Organization refers to the structure of an incident management organization that is divided into functional or geographical units, with each unit having defined responsibilities, resources, and reporting relationships.

Modular Organization is a structure used in incident management that divides the organization into functional or geographical units. Each unit has defined responsibilities, resources, and reporting relationships. This structure allows for efficient and effective response by managing the span of control within manageable limits and providing a clear chain of command and unity of effort. It is a key characteristic of the National Incident Management System (NIMS).

Learn more about Modular Organization: https://brainly.com/question/12774819

#SPJ4

Which of the following is not one of the three Trojan horse components?
Group of answer choices
Payload
Dropper
Locker
Wrapper

Answers

A Trojan horse in computers is any malware that deceives people about its true purpose.

What is Trojan horse components?A Trojan horse in computers is any malware that deceives people about its true purpose. The word is taken from the myth of the trickery Trojan Horse in Ancient Greek literature, which resulted in the destruction of the city of Troy. An example of malware that impersonates trustworthy code or software is a Trojan Horse (Trojan). Once within the network, attackers have access to all actions that a regular user would be able to take, including exporting files, editing data, deleting files, and otherwise changing the device's contents. A Trojan horse in computers is any malware that deceives people about its true purpose.

To learn more about Trojan horse components refer to:

https://brainly.com/question/9171237

#SPJ4

Write a for loop to print the numbers 76, 70, 64, ...34 on one line.

Expected Output
76 70 64 58 52 46 40 34

Answers

For i in range(350, 451, 2):

print(i, end=' ')

print()

It is typically the hypothesis a scientist or experimenter will attempt to refute or discard. It is denoted by H₀.

What do you mean by sample mean ?

The sample mean is a point estimate of the population mean. Therefore a point estimate of the mean oxide thickness for all wafers in the population is the mean of the sample data on the oxide thickness of semiconductor wafers.

To calculate the sample mean, we sum all the sample data and divide by the sample size which is 24.  We get 423.33 ≈423. A null hypothesis is a sort of hypothesis used in statistics that intends that no statistical significance exists in a set of given observations.  

It is a hypothesis of no difference.It is typically the hypothesis a scientist or experimenter will attempt to refute or discard. It is denoted by H₀.

For instance, H₀: µ = µ₀, where µ₀ is some null value or some claimed value. Whereas, the alternate hypothesis is the contradicting statement to the null hypothesis.

Therefore, For i in range(350, 451, 2):

print(i, end=' ')

print()

It is typically the hypothesis a scientist or experimenter will attempt to refute or discard. It is denoted by H₀.

Learn more about hypothesis on:

https://brainly.com/question/29519577

#SPJ1

With what other computer system software does a DBMS interac?

Answers

A software program called a database management system (DBMS) makes it simple for users to administer databases. It enables users to view and interact with the database's underlying data. These operations might be as simple as data queries or as complex as creating database schemas that significantly alter the structure of the database.

Additionally, DBMS provides secure, concurrent user interaction with a database without compromising data integrity or interfering with other users.

Using a DBMS, the following common database administration tasks can be carried out:

setting up authorization and authentication. Simple user account configuration, access policy definition, restriction-modification, and access scope modification. Administrators can utilize these processes to manage users in databases, restrict user actions, and restrict access to underlying data.

delivering data snapshots and backups.

To learn more about DBMS the given link:

https://brainly.com/question/13467952

#SPJ4

in a windows environment how many hops

Answers

In response to your inquiry, the IP packet should arrive at its destination after 30 hops.

The TTL reported by ping represents the packet's actual final TTL at the destination. Subtract the initial TTL of a packet (which is always 255) from the TTL that ping reports to determine how many hops it travels. To update just the modified computer policies, enter gpupdate /target: computer in the Command Prompt window and hit Enter. Instead of the previous command, enter gpupdate /target: computer /force to update all computer policies. In computer networking, the word "hop" describes how many routers a packet—a chunk of data—passes through on its way from its source to its destination. A hop may occasionally be tallied.

To learn more about IP click the link below:

brainly.com/question/26230428

#SPJ4

6. (10 pts) what is wrong with the following code? how should it be fixed? 1 public class h2classg { 2 final int x; 3 4 h2classg () {} 5 h2classg (int a) {x = a;} 6 } // end class h2classg

Answers

The problem with the code is that the instance variable x is declared final but it's not initialized in the default constructor (h2classg () {}). This results in a compile-time error.

How to correct the given the code?

To fix the code, initialize x in the default constructor:

public class h2classg {

   final int x;

   h2classg () {

       x = 0;

   }

   h2classg (int a) {

       x = a;

   }

}

What is compile-time error?

A compile-time error, also known as a syntax error, is an error that occurs when a program is being compiled, indicating that the code written does not follow the rules of the programming language and cannot be executed.

Compile-time errors prevent a program from being executed and must be fixed before the program can be compiled successfully.

To learn more about compile-time error, visit: https://brainly.com/question/27286142

#SPJ4

What are the characteristics of a progressive dimensioning system in engineering drawing

Answers

We shall discover what dimensions are in this post, along with the many dimensioning systems that are employed in engineering drawings.

What does engineering drawing progressive dimensioning mean?

Running parallel dimensions or progressive dimensioning are not practical when there is a lack of space. In these situations, overlaid running dimensioning, a more straightforward method, can be utilized to utilise the dimensions.

What does "progressive dimensioning" mean to you?

It uses a streamlined dimensioning method and controls cumulative mistake. It has a single origin and only has arrowheads that point in one direction. This can be utilized in situations with little space and no issues with legibility.

To know more about progressive dimensioning visit:-

https://brainly.com/question/3882192

#SPJ1

What value of x will produce the output:HelloMikex = "A"if(x == "A"):print('Hello')else:print('Hi')print('Mike')

Answers

The value of x that will be produced as a result of the program would be any given input that is NOT "A"

What is an Output?

This refers to the result that is given in a computer interface and in this case, a programming input and this is the result that is gotten after all the conditions are met and the program executes.

From here, I can see that conditional statements "If else" is used and if the user inputs "A", it would print "Hello", but the output is "Hello Mike" and this is shown because an input that is NOT "A" was put.

Read more about programming outputs here:

https://brainly.com/question/20727977
#SPJ1

34.121.234.52.65 is a class____IP address

Answers

There are four distinct sorts of addresses: public, private, global, and local. A public address system is an electronic device that consists of loudspeakers, amplifiers, and microphones.

Other relevant tools. As a result, the perceived volume increases. Private IP addresses are reserved for internal usage exclusively and are concealed by a router or other NAT device. These contrast with public addresses, which can be used outside of a home or workplace network and are accessible to everyone. A private address is also known as a local IP address. Roles that are linked to party records are referred to as party roles. Each type of party is capable of receiving a variety of party responsibilities. In order to solve the long-anticipated issue of IPv4 address exhaustion, the Internet Engineering Task Force (IETF) developed IPv6, which is intended to replace IPv4. In December 1998, IPv6 became a draught standard for the IETF, and on July 14, 2017, it was approved as an Internet standard.

Learn more about IPv6 here:

https://brainly.com/question/29065228

#SPJ4

what is dijkstra's two-stack algorithm used for?

Answers

It takes an infix expression as input and uses two stacks, one for the operands and one for the operator, to create a correctly ordered postfix expression that can be easily evaluated.

What is Dijkstra's two-stack algorithm?

Dijkstra's two-stack algorithm, also known as the Marshalling Yard Algorithm, is used to parse mathematical expressions written in infix notation and convert them to equivalent expressions in postfix notation (RPN).

The Dijkstra algorithm is a one-source shortest path algorithm. Single source here means that only one source is specified and the shortest path from the source to all nodes must be found.

To know more about Algorithm visit:

https://brainly.com/question/22984934

#SPJ4

Break and continue statements allow you to:
A. prevent flags.
B. control a sentinel value.
C. close loops.
D. alter the flow of a program.

Answers

Answer:

D: Alter the flow of a program

Explanation:

Break statements are used to terminate the current loop and resume execution at the next statement. Continue statements are used to skip over the part of a loop where an external condition occurs/is triggered, but will go on the complete the rest of the loops.

Therefore, the answer is D because both of these statements alter the flow of a program whether it is terminating or skipping.

Each of the following are advanced strategies you may use to help you conduct a search on the internet except _____. Using a wild card in your search trying a different search engine doing a boolean search entering keywords into a web crawler.

Answers

Each of the following are advanced strategies you may use to help you conduct a search on the internet except entering keywords into a Web crawler .

Correct answer: letter D.

Other advanced strategies include using a wild card in your search, trying a different search engine, and doing a Boolean search. These strategies can help you narrow down the results of your search and make it easier to find the information you are looking for.

Entering keywords into a web crawler is not an advanced strategy to help you conduct a search on the internet.

Learn more about keywords :

https://brainly.com/question/26355510

#SPJ4

Select all of the following ways you can calculate percentages of normal populations between 2 values. a. z-tables b. Excel c. Slide rule d. Some Calculators e. Mean Tables

Answers

Z-tables and M-tables can be used to calculate the normal population percentages that differ between two values. As a result, options A and E are the correct ones.

Why are Z-Tables useful?

By minimizing the I/O utilization and CPU cycle consumption inherent with database access, the IBM Z Table Accelerator is a piece of software that aids businesses in enhancing the efficiency of their mainframe programs. Your applications are optimized by the IBM Z Table Accelerator using indexes and in-memory access strategies.

The total set of "less-than" probabilities can be calculated using the z-score formula for a wide range of z-values.

To know more about IBM, visit:

https://brainly.com/question/17355332

#SPJ1

Would an "index of accessibility to radial highways" be considered discrete numerical data or ordinal categorical data?

Answers

An "index of accessibility to radial highways" would typically be considered ordinal categorical data, as it is an ordering of categories.

Why an index of accessibility to radial highways?

An "index of accessibility to radial highways" is ordinal categorical data because it is a classification of categories (e.g., very accessible, moderately accessible, slightly accessible, not accessible) rather than a numerical measurement that can be used to perform mathematical operations like addition, subtraction, multiplication, and division.

An index of accessibility to radial highways is a classification of accessibility levels into categories, rather than a numerical value, making it ordinal categorical data. It is a ranking system, not a continuous measurement that can be used in mathematical operations.

To learn more about data, visit: https://brainly.com/question/179886

#SPJ4

which tcs unit is designed specifically to help in building rapid prototypes

Answers

The "TCS IgnioDevOps" unit is specifically designed to assist in building rapid prototypes. It provides tools, methodologies, and practices to enable quick development and deployment of prototypes for testing and validation purposes.

TCS IgnioDevOps is a unit within TCS (Tata Consultancy Services) that focuses on enabling DevOps practices and methodologies for efficient software development and delivery. It offers a comprehensive suite of tools, frameworks, and services designed to streamline the software development lifecycle and foster collaboration between development and operations teams.

IgnioDevOps encompasses various aspects such as continuous integration, continuous delivery, infrastructure automation, configuration management, and monitoring.

By leveraging automation, DevOps principles, and agile methodologies, TCS IgnioDevOps aims to accelerate development cycles, improve software quality, enhance collaboration, and enable the rapid delivery of applications, thereby supporting organizations in building and deploying prototypes more efficiently.

Learn more about prototypes  here:

https://brainly.com/question/29784785

#SPJ12

what event convinced netflix to switch to a cloud-based service?

Answers

When we had a significant database corruption in August 2008 and were unable to mail DVDs to subscribers for three days, that is when Netflix decided to start using the cloud.

What is software?

Software is defined as a group of guidelines, facts, or software used to run machines and carry out particular activities. The entirety of a computer system's programs, functions, and routines are collectively referred to as software.

A cloud-based utility is software that employs cloud application technology to give up-to-date information to all users while centrally storing data. The application is frequently accessed online or through an app, and the data is typically kept on distant servers.

Thus, a software product or service known as a cloud access security broker (CASB) sits in between a company's on-premises infrastructure and a cloud provider's infrastructure.

To learn more about software, refer to the link below:

https://brainly.com/question/29809198

#SPJ1

What types of E&M services were identified as the top three CERT errors in E&M servicecategories? What did these errors consist of?

Answers

The Comprehensive Error Rate Testing (CERT) program is described in this instructional guide, which was created by the CERT A/B MAC Outreach & Education Task Force to inform clinicians on how to write medical records correctly and persuasively.

The CERT program was put in place by the Centers for Medicare & Medicaid Services (CMS) to track erroneous payments made under the Medicare Fee-for-Service (FFS) program.

This tool examines a random sample of all Medicare FFS claims to evaluate whether the provider or supplier who submitted the claim by letter had supporting documentation. Professionals in the medical review then examine the submitted documentation to determine whether the claim was appropriately paid or refused.

To guarantee that claims are supported as billed, providers must submit sufficient proof.

To learn more about CERT the given link:

https://brainly.com/question/3449068

#SPJ4

What's a danger of adding a lot of made up
money to the economy?

A). Prices will deflate (decrease)
B). There is no danger
C). Prices will inflate (rise)

Answers

Answer: C) Prices will inflate

Explanation:

C) Prices will inflate (rise) in the danger of adding a lot of made-up money to the economy. This is because adding a large amount of money to the economy increases the supply of money, which can lead to a decrease in the value of money and an increase in prices. This is known as inflation. When there is too much money chasing too few goods, prices go up and the value of money decreases. This can lead to a decrease in purchasing power, which can negatively affect the economy.

Which options must be used with DISM to save changes to an image? (Choose all that apply.) A. /unmount-image. B. /commit. C. /mountrw. D. /mount-image.

Answers

a. /commit & b. /unmount-image In order to save modifications to an images, options must be used with DISM.

Visual representations of things are called images. It can communicate information visually in two dimensions, three dimensions, or in some other way. An artefact that resembles a subject can be an image, such as a photograph or other two-dimensional representation. An image is a dispersed amplitude of colour in the context of signal processing (s).

The word "picture" may specifically refer to a 2D image in optics.

To be a visual representation, an image does not need to utilise the complete visual system. Greyscale images, which rely solely on the visual system's sensitivity to brightness across all wavelengths and ignore colour, are a common illustration of this. An picture is still a visual representation of something in black and white.

Learn more about images here:

https://brainly.com/question/29752618

#SPJ4

Other Questions
what is the relationship between stimulus and behavior in operant conditioning? how does it differ from classical conditioning? a building suffered uninsured fire damage. the damaged portion of the building was refurbished with higher quality materials. the cost and related accumulated depreciation of the damaged portion are identifiable. to account for these events, the owner should: Sarah owns a business which manufactures musical instruments. There has been an increase in sales and profits over the last two years but there has been a fall in demand for some products. She employs 50 skilled production workers. She wants.to recruit five more factory workers to make pianos but she needs fewer workers to make violins. She intends to carry out a job analysis for the factory workers who make pianos. Sarah uses on-the-job training for new workers joining the business.a. Explain two features Sarah could include in an induction training programme. [6]b. Explain two advantages of on-the-job training for this business. [6] thickness measurements of a coating process are made to the nearest hundredth of a millimeter. the thickness measurements are uniformly distributed with values 0.12, 0.13, 0.14, 0.15, 0.16. determine the mean and variance of the coating thickness for this process. round your answers to four decimal places (e.g. 98.7654). (a) mean (in millimeters) (b) variance (in millimeters2) Use this information to complete the following problems. Make a Punnett square to illustrate your answer.1. Mom has O blood and dad has O blood. What blood type(s) will their children have? the long-time rule of monarchy and aristocracy in 15th to 18th century France.O enlightened despotO Ancien RgimeO heliocentricO absolutism belief that people are noticing you more than they really are crossword 6. Which of the following is the additiveinverse of -(2 9)?A. -7B. -1/7C. 1/7D. 7 how to find x and y intercepts Why all lines of longitude converge or meet at the two poles? What was the norths reaction to abolitionism please someone help fast 1. you need to pay $100,000 in five years from now. you talk to your bank, and they will give you an interest rate of 3% per annum on money you deposit today. how much money do you need to invest today in order to meet the required future payment, A sailor is up a mast so that her eyes are 10 meters above water. A lighthouse is 40 meters tall. From how far away will the sailor first see the lighthouse? what is an example of large services in oracle cloud infrastructure(oci)? Help pls for 20 points Mrs. Adesso wants to take her class on a trip to either the science center or natural history museum. The science center charges $8 per student, plus a flat fee of $5 for a group tour. The natural history museum charges $5 per student, plus a flat fee of $20 for a group tour. For what number of students is the cost of the trip the same at each museum? When office supplies are purchased for cash which of these accounts is credited? if a population is not in hardy-weinberg equilibrium, we can conclude that: Describe the Privy Council and what they didelizabethan England