How can software assist in procuring goods and services?
What is e-procurement software?
Do you see any ethical issues with e-procurement?
For example, should stores be able to block people with smartphones from taking pictures of barcodes to do comparison shopping?

Answers

Answer 1

Answer:

Answered below

Explanation:

E-procurement software is the enterprise software that integrates and automates an organisation's procurement processes.

E-procurement software assists in procuring goods and services by allowing customers to browse online catalogs and stores, add their goods to shopping carts and send their requisition. This process reduces errors and improves efficiency.

Ethics of procurement include integrity, impartiality, fairness and transparency. Stores shouldn't block customers from doing comparison shopping.


Related Questions

Research and discuss the LAMP (Linux, Apache, MySQL, and PHP) architecture. What is the role of each layer of this software stack

Answers

Answer:

Answered below

Explanation:

LAMP is an example of a web service stack. It is used for developing dynamic websites and applications. It's components include;

1) The Linux operating system, which is built on open source and free development and distribution. Types of Linux distributions include: Ubuntu, Fedora and Debian. This operating system is where sites and applications are built on.

2) The Apache HTTP server. Apache server is developed by the Apache software Foundation and is open source. It is the most popular web server on the internet and plays a role in hosting websites.

3) MySQL is a relational database management system that plays a role in the storage of websites data and information.

4) The PHP programming language is a scripting language for web development whose commands are embedded into an HTML source code. It is a popular server-side language used for backend development.

When passing a stream to a function, it must always be pass-by-__________.
a) value
b) address
c) reference
d) class
e) function

Answers

Answer:

C) Reference

Explanation:

Stream objects are usually passed to functions as parameters, similar to other kind of objects. When passing a stream parameter, it must always be pass-by-reference.

This means that a reference to the original object is being passed to the function and not the copy of the object. As such, the object can be modified within the function. Also, if the object is large or has a large memory, copying it may be inefficient as regards the memory space and the time.

Therefore, object references point to the same object even when they are passed to functions.

Which of the following components of a computer system defines the ways to use system resources to solve computing problems?
A) application programs
B) operating system
C) computer hardware
D) computer logo

Answers

Answer: A) application programs

Explanation: The problem solving capability of a computer system is made possible through the use of certain programs or group of programs specifically designed to tackle, manage or solve certain problems or task for the end users. Application programs are numerous and the problems at which they are targeted are diverse and usually different. Such that users would have to application programs based on the problem at hand. Application programs often leverage system capability and resources to help the fuction of written programs designed as applications for end users. Application programs includes : Microsoft office suite used to solve business related tasks such as writing, calculation, scheduling and so on., gaming applications and so on.

A) application programs

describe the six clauses in the syntax of an sql retrieval query. show what type of constructs can be specified in each of the six clauses

Answers

Answer:

Answered below

Explanation:

An SQL retrieval query is made up of up to six clauses that must be coded in a specific sequence and they consist of;

1) SELECT - This clause allows you list the columns you want.

2) FROM - This clause indicates the tables you are retrieving information from.

3) WHERE - The where clause indicates a condition.

4) GROUP BY - Let's you group your data into specific and more meaningful information.

5) HAVING - Puts a condition in your group.

6) ORDER BY - Orders your result rows in ascending or descending order.

what are some consequences of internet addiction​

Answers

Answer:

1. week eyesight

2. weak brain power

3. loss of concentration...

hope it helps u

What are the advantages and disadvantages of solving a problem that can be broken down into repetitive tasks with recursion as opposed to a loop? Explain your answer.

Answers

Answer:

Answered below

Explanation:

Recursion refers to the process of a function calling itself within its own definition. It calls itself repeatedly until a base condition is met and the loop breaks.

The advantages of recursion over loops include;

A) Recursion reduces time complexity.

B) Recursion is better at tree traversal and graphs.

C) Recursion reduces the time needed to write and debug code and also adds clarity to code.

Disadvantages of recursion include;

A) Recursion uses more memory because each function call remains in stack until the base case is met.

B) Recursion can be slow.

C) Recursion

Which class of IP address allows for the greatest amount of subnets and host devices?

a. Class A
b. Class B
c. Class C
d. Class D

Answers

Answer:

A

Explanation:

Which tab is used to change the theme of a photo album slide show?
A. Home
B. Design
C. View

Answers

Answer:

b. design. Is your answer

Which one of these is a good reason for taking care to design a good computer human interface?
A. Not every user is a computer expert
B. Well-designed HCIs allow the software to be sold at a better price.
C. Well-designed HCIs use less computer resources
D. Well-designed HCIs allow the computer to run faster

Answers

A good reason for taking care to design a good computer human interface is that not every user is a computer expert.

What is computer human interface?

Human Computer Interface (HCI)  is known to be a technology that deals with the set up, execution and workings of computer systems and related scenarios for human use.

Note therefore that A good reason for taking care to design a good computer human interface is that not every user is a computer expert and as such it will help all computer users even if they are novice.

Learn more about computer human interface from

https://brainly.com/question/17238363

#SPJ2

A _____ area network is one step up from a _____ area network in geographical range.

Answers

Answer:

A metropolitan area network is one step up from a local area network in geographical range.

Explanation:

A metropolitan area network is one step up from a local area network in geographical range.

A network is a group of devices connected together for communication. Networks can be classified according to the area they cover, A metropolitan area network is smaller than a wide area network but larger than a local area network.

A local area network consist of computers network in a single place. A group of LAN network form a metropolitan network

A metropolitan network is a network across a city or small region. A group of  MAN form a wide area network.

Which code will allow Joe to print Coding is fun. on the screen? print("Coding is fun.") print(Coding is fun.) print = (Coding is fun.) print = Coding is fun.

Answers

Answer:

print(“Coding is fun.”)

Explanation:

The proper format for a print statement is usually you have the print statement followed by the string in quotes in parentheses.

Hope this helped!

Answer:

print(“Coding is fun.”)

Explanation:

A​ "responsive design" for mobile applications is a design that responds to a​ user's: A. digital device and screen size. B. needs. C. location. D. voice commands. E. gestures .

Answers

Answer:

A. digital device and screen size.

Explanation:

A​ "responsive design" for mobile applications is a design that responds to a​ user's digital device and screen size.

In Computer programming, a responsive web design makes it possible for various websites to change layouts in accordance with the user's digital device and screen size.

Hence, an end user's behavior and environment influences the outcome of their content and layout in a responsive design for mobile applications and websites.

This ultimately implies that, a responsive design is a strategic approach which enables websites to display or render properly with respect to the digital device and screen size of the user.

Let A and B be two sets of n positive integers. You get to reorder each set however you like. After reording, let ai be the i-th element of A and bi be the i-th element of B. The goal is to maximize the function n Π (i=1) ai^bi . You will develop a greedy algorithm for this task.

Required:
a. Describe a greedy idea on how to solve this problem, and shortly argue why you think it is correct (not a formal proof).
b. Describe your greedy algorithm in pseudocode. What is its runtime?

Answers

Answer:

Describe your greedy algorithm in pseudocode. What is its runtime?

***Help ***Which Paste Command is used to insert a new linked Excel worksheet into a PowerPoint presentation? A. Embed B. Use Destination Styles C. Keep Source Formatting D. Paste Special

Answers

Answer:

Embed is used to insert a new linked Excel worksheet into a PowerPoint presentation

Hope this answer correct :)

Which dashboard does the Control Room administrator need to reference to get a graphical representation of Events Distribution by Activity Type?
a) Bots
b) Workload
c) Insights
d) Audit

Answers

I think the answer would be D) Audit, I’m sorry if it comes out wrong

External network security threats can include management failure to support organization-wide security awareness, inadequate security policies, and unenforced security procedures.
A. True
B. False

Answers

Answer:

The answer is "Option B".

Explanation:

In external networking, it establishes the informal links beyond the size of the firm, which supports its career, and these networks may be used for help, invaluable guidance.

This system would be a different point of view to provide the privacy protection for the system connectivity, and in the internal system protects its system protects all its data, that's why it is false.

Write a statement to create a Google Guava Multimap instance which contains student ids as keys and the associated values are student profiles.

Answers

Answer: provided in the explanation section

Explanation:

Note: take note for indentation so as to prevent error.

So we import com.google.common.collect.Multimap;

import java.util.Collection;

import java.util.Map;

class Main {

   public static void main(String[] args) {

       // key as studentId and List of Profile as value.

       Multimap<String,Profile> multimap = ArrayListMultimap.create();

       multimap.put("id1", new ExamProfile("examStudentId1"));

       multimap.put("id1", new ELearningProfile("userId1"));

       multimap.put("id2", new ExamProfile("examStudentId2"));

       multimap.put("id2", new ELearningProfile("userId2"));

       // print the data now.

       for (Map.Entry<String, Collection<Profile>> entry : multimap.entrySet()) {

           String key = entry.getKey();

           Collection<String> value =  multimap.get(key);

           System.out.println(key + ":" + value);

       }

   }

}

// assuming String as the studentId.

// assuming Profile as the interface. And Profile can multiple implementations that would be

// specific to student.

interface Profile {

}

class ExamProfile implements Profile {

   private String examStudentId;

   public ExamProfile(String examStudentId) {

       this.examStudentId = examStudentId;

   }

}

class ELearningProfile implements Profile {

   private String userId;

   public ELearningProfile(String userId) {

       this.userId = userId;

   }

}

This code is able to iterate through all entries in the Google Guava multimap and display all the students name in the associated students profile.

John is analyzing an attack against his company in which the attacker found comments embedded in HTML code that provided the clues needed to exploit a software vulnerability. Using the STRIDE model, what type of attack did he uncover?

Answers

Answer:

Information Disclosure

Explanation:

Hello, the fact that the attacker was able to gather information from within the embedded HTML code suggests that the original developer did not properly store information, revealing potential issues or vulnerabilities in his/her design.

The STRIDE model stands for Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege.

Using the STRIDE model, one would say this would be a simple information disclosure attack, since the attacker used retrieved information to breach the system.

Cheer.

As Assembly language code runs on a CPU invoking functions and using the stack, it is clear that CPU registers are

Answers

Answer:

shared resources.

Explanation:

Assembly language is a low-level language that is used commonly in programming operating systems in large systems or in single task algorithms in embedded systems.

Its files are compiled in a CPU, using available resources like registers, buses, etc. All the content of the assembly program are read and compiled before execution.

The functions and statements invoked in the program shares the resources by duplicating the content of the registers  in variables.

Consider a set A = {a1, . . . , an} and a collection B1, B2, . . . , Bm of subsets of A (i.e., Bi ⊆ A for each i). We say that a set H ⊆ A is a hitting set for the collection B1, B2, . . . , Bm if H contains at least one element from each Bi – that is, if H ∩ Bi is not empty for each i (so H "hits" all the sets of Bi). We define the Hitting Set Problem as follows. We are given a set A = {a1, . . . , an}, a collection B1, B2, . . . , Bm of subsets of A, and an non-negative integer k. We are asked: is there a hitting set H ⊆ A for B1, B2, . . . , Bm so that the size of H is at most k? Prove that the Hitting Set problem is NP-complete

Answers

Answer:

Explanation:

This is actually quite straight forward to solve, first lets be mindful of the explanation so with this basis we can tackle future problems.

The solution may very well may be appeared in the accompanying manner:

This solution needs to display that the set H-one can without much of a stretch confirm in polynomial-time if H is of size k and meets every one of the sets B1.....Bm .

We lessen from Vertex Cover.Consider an example of the Vertex-Cover issue chart G=(V,E) and a positive whole number k.We map it to an occurrence of the hitting set issue as follows.The set An is of vertices V.

Also we know that For each edge e has a place with E we have a set Se Consisting of two end-purposes of e.It is anything but difficult to see that a lot of vertices S is a vertex front of G iff the relating components from a hitting set in the hitting set case.

Following are the illustration to the given question:

The solution must demonstrate that only if H is of size k and overlaps each one of the sets B1.....Bm, can one simply verify it in time complexity.You start with Vertex Cover and decrease from there.Considering the Vertex-Cover issue graph G = (V, E) with a positive integer k as an example.As shown below, we map this to a hitting set issue case V are the vertices of set A.It has the set Se that includes 2 end-points of e for each edge of e belonging to E.A vertex set "S" covers vertex "G" if the matching members from a hitting set were present in the striking setting instance.

Learn more set:

brainly.com/question/2264459

brainly.com/question/8053622

When an object reference is passed as a parameter to a method, modifying the members of that object from inside the method will result in a change to that object as seen from the client.
a. True
b. False

Answers

Answer:

A) True

Explanation:

Objects are known as reference types, meaning that they are always accessed by references, not copied. When a method is called, passing an object to it, Java passes a reference of that object to the method and when that reference is modified, the changes can be seen in the object itself. Therefore a mutable object can be mutated anywhere- either from where it is created or by a method it is passed to. Hence the need to always use privacy modifier keywords such as public, private or protected, to determine the exposure of class properties and methods.

A business has recently deployed laptops to all sales employees. The laptops will be used primarily from home offices and while traveling, and a high amount of wireless mobile use is expected.
To protect the laptops while connected to untrusted wireless networks, which of the following would be the best method for reducing the risk of having the laptops compromised?
A. MAC filtering
B. Virtualization
C. OS hardening
D. Application white-listing

Answers

C. OS hardening.

Making an operating system more secure. It often requires numerous actions such as configuring system and network components properly, deleting unused files and applying the latest patches.

The purpose of system hardening is to eliminate as many security risks as possible. This is typically done by removing all non-essential software programs and utilities from the computer.

Select all below that are not functions of the operating system of your computer?

a. Allocate memory
b. Direct information flow in the system
c. Format text documents
d. Provide a User interface

Answers

Answer:

c. Format text documents.

Explanation:

An operating system can be defined as a system software application that manages the interactions between the software and hardware resources of a computer, as well as providing essential services to other installed software applications.

The functions of the operating system of any computer is to;

1. Allocate memory.

2. Direct information flow in the system.

3. Provide a User interface.

Some examples of computer operating systems are Microsoft windows, Apple MacOS, Linux, Unix, Chrome OS etc.

The task of formatting text documents is performed by computer software applications such as Microsoft Word, notepad, wordperfect etc. Text formatting includes functions such as cut, paste, copy, bold, italics, font type, font size etc.

In a working diode, the junction Diode

Answers

A p-n junction diode is a basic semiconductor device that controls the flow of electric current in a circuit. It has a positive (p) side and a negative (n) side created by adding impurities to each side of a silicon semiconductor. The symbol for a p-n junction diode is a triangle pointing to a line. It flows electric current positive and negative

Given the Query Data Type, which of the following is incorrectly matched with the corresponding Storage Data Type?
a) Text : String
b) TRUE/FALSE: Boolean
c) Date : Date
d) Duration : Time

Answers

Answer:

c) Date : Date

Explanation:

A type of attribute of data is called data type in computer science, data types tells the interpreter how a person wants to use the data. The basic data types are supported by most of the programming languages, the basic data types are Integers, float, characters, strings, point numbers and arrays. The terminology may differ from one language to other.

Which of the following are characteristics of algorithms? Choose all that apply. They take a step-by-step approach to performing a task. They’re made up of Instructions posted on a website. They break the task into manageable steps. They identify the tasks that will repeat. They can be written in a computer language to create a program for a computer to follow.


Answer: They take a step-by-step approach to performing a task.
They break the task into manageable steps.
They identify the tasks that will repeat.
They can be written in a computer language to create a program for a computer to follow.

Answers

Answer:

They take a step-by-step approach to performing a task.

They break the task into manageable steps.

They identify the tasks that will repeat.

They can be written in a computer language to create a program for a computer to follow.

Explanation:

An algorithm is a step by step process that needs to be followed in order to solve logical, mathematical, well-defined instructions.

An everyday example of an algorithm is a recipe because it gives you steps to do in order to complete a task.

In computing terms, algorithms can be represented with flow charts, pseudocodes, or high-level languages.

Some of its characteristics include:

They can be written in a computer language to create a program for a computer to follow.They identify the tasks that will repeat. They take a step-by-step approach to performing a task. They break the task into manageable steps.

Answer:

So your answer will be

A.

C.

D.

E.

Explanation:

Edge2021

Exercise 4: Bring in program grades.cpp and grades.txt from the Lab 10 folder. Fill in the code in bold so that the data is properly read from grades.txt. and the desired output to the screen is as follows: OUTPUT TO SCREEN DATAFILE Adara Starr has a(n) 94 average Adara Starr 94 David Starr has a(n) 91 average David Starr 91 Sophia Starr has a(n) 94 average Sophia Starr 94 Maria Starr has a(n) 91 average Maria Starr 91 Danielle DeFino has a(n) 94 average Danielle DeFino 94 Dominic DeFino has a(n) 98 average Dominic DeFino 98 McKenna DeFino has a(n) 92 average McKenna DeFino 92 Taylor McIntire has a(n) 99 average Taylor McIntire 99 Torrie McIntire has a(n) 91 average Torrie McIntire 91 Emily Garrett has a(n) 97 average Emily Garrett 97 Lauren Garrett has a(n) 92 average Lauren Garrett 92 Marlene Starr has a(n) 83 average Marlene Starr 83 Donald DeFino has a(n) 73 average Donald DeFino 73

Answers

Answer:

Here is the C++ program:

#include <fstream>  //to create, write and read a file

#include <iostream>  // to use input output functions

using namespace std;  //to access objects like cin cout

const int MAXNAME = 20;  //MAXNAME is set to 20 as a constant

int main(){  //start of main() function

ifstream inData;  //creates an object of ifstream class

inData.open("grades.txt");  //uses that object to access and opens the text file using open() method

char name[MAXNAME + 1];   // holds the names

float average;   //stores the average

inData.get(name,MAXNAME+1);  //Extracts names characters from the file and stores them as a c-string until MAXNAME+1 characters have been extracted

while (inData){  //iterates through the file

 inData >> average;  //reads averages from file using the stream extraction operator

 cout << name << " has a(n) " << average << " average." << endl; //prints the names along with their averages

 inData.ignore(50,'\n');  //ignores 50 characters and resumes when  new line character is reached. It is used to clear characters from input buffer

 inData.get(name,MAXNAME+1);}  //keeps extracting names from file

return 0; }

Explanation:  

The program is well explained in the comments added to each line of the code. The program uses fstream object inData to access the grades.txt file. It gets and extracts the contents of the file using get() method, reads and extracts averages from file using the stream extraction operator. Then program displays the names along with their averages from grades.txt on output screen.

The grades.txt file, program and its output is attached.

Write a function called count_occurrences that takes two strings. The second string should only be one character long. The function should return how many times the second string occurs in the first string.

Answers

Answer:

Here is the Python function:

def count_occurrences (string1 , string2):  # method that takes two strings as parameter and returns how many times second string occurs in first

   count = 0  #counts number of occurrence of string2 in string1

   for word in string1:  #iterates through each word of the string1

       for character in word:  #iterates through each character of each word in string1

           if character == string2:  # checks if the character in string1 is equal to the character of string2

               count = count + 1  #adds 1 to the count of string2 in string1

   return count  #returns number of times the string2 occurs in string1

#in order to check the working of the function add the following lines to the code:    

first_str = input("Enter the first string: ")  #prompts user to enter first string

second_str = input("Enter the second string (one character long): ") #prompts user to enter second string which should be one character long

occurrence = count_occurrences(first_str,second_str)  #calls count_occurrences method by passing both strings to it

print(second_str,"occurs",occurrence,"times in",first_str) #prints how many times the second_str occurs in the first_str on output screen

Explanation:

The program is well explained in the comments added to each statement of the above code. I will explain the program with an example:

Suppose

string1 = "hello world"

string2 = 'l'

So the method count_occurrences() should return how many times l occurs in hello world.

count is used to count the number of occurrences of l in hello world. It is initialized to 0.

The first loop iterates through each word of string1. The first word of string1 is "hello"

The second loop iterates through each character/letter of each word. So the first letter of "hello" word is 'h'.

The if condition if character == string2: checks if the character is equal to string2 i.e. l.

character = "h"

string2 = "l"

The are not equal so the program moves to the next character of word hello which is e. The if condition again evaluates to false because e is not equal to l. So the program moves to the next character of word hello which is l.

This time the if condition evaluates to true because

character = "l"

string2 = "l"

character == string2

l == l

So the if part is executed which has the following statement:

count = count + 1

So the count is added to 1. count was 0 previously. Now

count = 1

Next the program moves to the next character of word hello which is l. This time the if condition evaluates to true because the character l matches with string2. So count is again incremented to 1. count = 2.

Next the program moves to the next character of word hello which is o. The if condition evaluates to false as o does not match with string2 i.e. l. So the count remains 2.

Next the first loop moves to the next word of the string1 = "world". The inner (second) for loop iterates through each character of "world" from "w" to "d" and checks if any character is equal to string2. Only one character is equal to string2 in "world". So count is incremented to 1. Hence count = 3

After the loop ends the statement return count returns the number of times string2 occurs in the string1. So the output is:

l occurs 3 times in hello world  

Answer:

def count_occurrences(sentence, thing_to_count):

   times = 0

   for word in sentence:

       for letter in word:

           if letter == thing_to_count: times += 1

   return times

Explanation:

I got 100%

Compute their Cartesian product, AxB of two lists. Each list has no more than 10 numbers.

For example, given the two input lists:
A = [1,2]
B = [3,4]

then the Cartesian product output should be:
AxB = [(1,3),(1,4),(2,3),(2,4)]

Answers

Answer:

The program written in Python is as follows: (See Attachments for source file and output)

def cartesian(AB):

     if not AB:

           yield ()

     else:

           for newlist in AB[0]:

                 for product in cartesian(AB[1:]):

                       yield (newlist,)+product  

A = []

B = []

alist = int(input("Number of items in list A (10 max): "))

while(alist>10):

     alist = int(input("Number of items in list A (10 max): "))

blist = int(input("Number of items in list B (10 max): "))

while(blist>10):

     blist = int(input("Number of items in list B (10 max): "))

print("Input for List A")

for i in range(alist):

     userinput = int(input(": "))

     A.append(userinput)

print("Input for List B")  

for i in range(blist):

     userinput = int(input(": "))

     B.append(userinput)  

print(list(cartesian([A,B])))

Explanation:

The function to print the Cartesian product is defined here

def cartesian(AB):

This following if condition returns the function while without destroying lists A and B

    if not AB:

         yield ()

If otherwise

    else:

The following iteration generates and prints the Cartesian products

         for newlist in AB[0]:

              for product in cartesian(AB[1:]):

                   yield (newlist,)+product

The main method starts here

The next two lines creates two empty lists A and B

A = []

B = []

The next line prompts user for length of list A

alist = int(input("Number of items in list A (10 max): "))

The following iteration ensures that length of list A is no more than 10

while(alist>10):

    alist = int(input("Number of items in list A (10 max): "))

The next line prompts user for length of list B

blist = int(input("Number of items in list B (10 max): "))

The following iteration ensures that length of list B is no more than 10

while(blist>10):

    blist = int(input("Number of items in list B (10 max): "))

The next 4 lines prompts user for input and gets the input for List A

print("Input for List A")

for i in range(alist):

    userinput = int(input(": "))

    A.append(userinput)

The next 4 lines prompts user for input and gets the input for List B

print("Input for List B")  

for i in range(blist):

    userinput = int(input(": "))

    B.append(userinput)

This line calls the function to print the Cartesian product

print(list(cartesian([A,B])))

Confidentiality, integrity, and availability (C-I-A) are large components of access control. Integrity is __________. ensuring that a system is accessible when needed defining risk associated with a subject accessing an object ensuring that a system is not changed by a subject that is not authorized to do so ensuring that the right information is seen only by subjects that are authorized to see it

Answers

Answer: ensuring that a system is not changed by a subject that is not authorized to do so

Explanation: Access control refers to pribcues which are employed in the bid thlo ensure the security of data and information. It provides the ability to authenticate and authorize access to information and data thereby preventing unwarranted access and tampering of the information. Integrity in terms of data security and access control is is concerned with modification to an existing or original data by unauthorized sources. When unauthorized addition or subtraction occurs on a data, the integrity of such data has been compromised. Therefore, authorization is required whenever a source is about to access certain information whereby only those with the right authorization code will be allowed, Inputting an incorrect pass code after a certain number of tries may result in system lock down as access control detects a a possible intrusion

Other Questions
PLEASE HELP! I Will Give You 20 POINTS!! Solve with absolute value. -|12-3.5x|=-5 Under identical conditions, separate samples of O2 and an unknown gas were allowed to effuse through identical membranes simultaneously. After a certain amount of time, it was found that 6.23 mL of O2 had passed through the membrane, but only 3.85 mL of of the unknown gas had passed through. What is the molar mass of the unknown gas? Which is an application of the trimethylsilyl (TMS) group in organic synthesis? The table shows the solution to the equation |2x - 4| - 3 = 3:Step 1|2x - 4 = -3 + 3Step 2|2x - 4 = 0Step 32x - 4 = 0Step 4 2x = 4Step 5x = 2which is the first incorrect step? (1 point)Step 1Step 2Step 3Solution is correct 4. pasar -- to pass:Ana Marapor la calle.bll i lli5. abrir -- to open:Emilio y Anael libro. Select the choice that translates the following verbal phrase correctly to algebra: (2 points) the product of 12 and y increased by 11 12y + 11 12(y + 11) 12(11y) 12+ 11y the sum of 81 and a number is greater than 4 times the same number Jenae helps maintain her school web site and needs to create a web site poll for students. Which tool will she use? Dickinson's use of figurative language in this poem expresses the idea that ?? How many real solutions exist for this system of equations?A. ZeroB. OneC. TwoD. Infinite The ratio of the profit, material cost and production labour of an article is 5:7:13.If the material cost is 840 more than that of labour , find the total cost of producing the article. Plsss help me. Mean of 11,10,12,12,9,10,14,12,9 is . For a body of Mass m moving in a circle of radius r if its velocity is halved, what will be the effect on the value of centripetal force? HURRY Find the domain and range ( 2,3), ( -2, 4), ( 4, 8) , ( -2, 5) How many pennies could you have if:When you break the pennies into groups of 2, you have 1 penny left over AND when you break the pennies into groups of 3, you have 1 penny left over? Style generally refers to distinctive ____________of art and architecture that are common to a culture, era, or to a group of artists working at the same time or toward a common artistic goal. FOR BRAINLIEST!!! ASAP SUPER EASY!! One coin is randomly selected from a jar containing 20 pennies, 15 nickles, 3dimes, and 12 quarters. Find the odds of a value greater than $0.10. *6:193:4712:5008:12 The equation shows the relationship between the amount of money (y) remaining in Leigh's money box and the number of months (X)Function 2y = -9x + 60Which statement explains which function shows a greater rate of change?O Function 1 shows a greater rate of change, because Morgan spends $10 each month and Leigh spends $9 each month.O Function 1 shows a greater rate of change, because Morgan spends $10 each month and Leigh spends $60 each month.O Function 2 shows a greater rate of change, because Morgan spends $10 each month and Leigh spends $60 each month.O Function 2 shows a greater rate of change, because Morgan spends $50 each month and Leigh spends -$9 each month. Our solar system is made up of the Sun and the astronomical bodies that orbit it. But you may be surprised to learnthat all the planets and nearly every asteroid in the solar system orbit the Sun in the same plane and in the samedirection. They all move counterclockwise, if viewed from above Earth's North Pole. What do you think caused thisphenomenon? Aerobic vs Anaerobic QuizizzAnaerobic activity will increase yourSleep CycleWater IntakeNutritionPower