the owners of a computer repair shop want to better formulate strategies, so they should conduct a swot analysis to understand the strengths and weaknesses within their company and the opportunities and threats of the external environment.

Answers

Answer 1

True, the owners of a computer repair shop want to better formulate strategies, so they should conduct a swot analysis to understand the strengths and weaknesses within their company and the opportunities and threats of the external environment.

What do the proprietors of a computer repair facility wish to better define?

The proprietors of a computer repair shop are doing a SWOT analysis to recognize their company's strengths and weaknesses as well as the opportunities and dangers posed by the external environment in order to better shape their strategy.

                                 The advantages of conducting a SWOT analysis include those listed above.

What does SWOT analysis mean for a computer shop?

A SWOT analysis is a straightforward but effective approach for determining your operation's strengths and weaknesses. the advantages and risks you face in your particular industry. a detailed understanding of the marketing and sales environment you are operating in as well as how well your organization is performing.

Learn more about a swot analysis

brainly.com/question/29766396

#SPJ4


Related Questions

what transport protocol/ports do dns and dhcp use?

Answers

The uses of transport protocol/ports do dns and dhcp are described.

What is DNS?

DNS (Domain Name System) and DHCP (Dynamic Host Configuration Protocol) use different transport protocols and ports.

DNS primarily uses the User Datagram Protocol (UDP) as its transport protocol, although it can also use TCP. DNS uses port 53 for both UDP and TCP traffic. Most DNS traffic uses UDP, but if a DNS response exceeds the maximum length of a UDP packet (512 bytes), it will use TCP instead.

DHCP primarily uses UDP as its transport protocol. DHCP uses port 67 for the DHCP server and port 68 for the DHCP client. When a device requests an IP address via DHCP, it sends a broadcast packet to the local network on port 67.

The DHCP server receives the broadcast packet and responds on port 68 with an offer of an available IP address. The client then sends a request for that IP address, and the server sends an acknowledgement back to the client to confirm the assignment of the IP address.

To know more about Domain visit:

brainly.com/question/30408285

#SPJ4

Fill The Blank? ________ is used to display the contents of a cell on multiple lines.

Answers

The line break or "wrap text" feature is used to display the contents of a cell on multiple lines in Excel or Go0gle Sheets.

This feature is particularly useful when you have a long string of text that doesn't fit within a single cell, and you want to display it in a more readable format. When you apply the wrap text feature to a cell, Excel or Go0gle Sheets automatically adjusts the height of the cell to fit the content, and breaks the text into multiple lines.

This can make it easier to read and understand the contents of the cell, without having to adjust the column width or scroll horizontally.

Learn more about text wrapping: https://brainly.com/question/27962413

#SPJ4

Identify the following as being an advantage or not being an advantage of rfid systems used by zara.
a. Can reduce the time needed to take store inventory b. Can help find a product a customer wants that isn't available in store
c. Can eliminate the need for PoS systems
d. Can lower advertising co

Answers

The advantages of RFID system used by Zara are that it can reduce the time needed to take store inventory, and can help find a product a customer wants that isn't available in store.

It can eliminate the need for POS systems, can lower advertising costs are NOT an advantage of RFID systems used by Zara

Radio Frequency Identification System is referred to as an RFID system. It is an "Identification system employing wireless communication" that enables data to be transferred between "Antenna (or Reader/Writers)" and "RF Tags (or Data Carriers)," which are held by people or affixed to things. A radio communication system, in a sense.

There are several uses for RFID systems including consolidated administration of things and information is possible with an RFID system.

The following applications make up the majority of the uses for RFID in a production plant.

Workplace training (destination instruction)management of history (production history, work history, inspection history, etc.)ID (identification) typically refers to the specific identification of individuals or things.RFID is used to identify objects, just like barcodes and two-dimensional codes.Fingerprints and the iris of the eye are examples of biometrics used to identify persons in a unique way.

The identification system is known as ID system. It is a method for reading and recognizing data on people and things, including AIDC (Automatic Identification & Data Capture).

AIDC uses devices that combine hardware and software to identify data acquired from media such as barcodes, 2-dimensional codes, RFID systems, iris, fingerprints, voice, etc. without the need for human participation.

To learn more about RFID system click here:

brainly.com/question/25705532

#SPJ4

how about using subtotals that only work if you have numeric data to accumulate into subtotals and there are categories of data that have repeating items.?

Answers

This makes it easy to perform calculations like subtotals, averages, and other calculations to help you summarize and analyze your data.

What is summarize ?

Summarize is a form of writing in which the main idea of a text is re-expressed in a shorter form. Summarizing is an important academic skill that involves taking a large amount of information and condensing it into a few sentences or a paragraph. Summarizing allows readers to quickly identify the main points of a text, which can be helpful when studying for exams or understanding complex material. Summarizing also helps improve writing skills by teaching readers to prioritize important information and identify key topics.

To learn more about summarize

https://brainly.com/question/30469689

#SPJ4

what the questions critical thinking chapter 4 quizlet?

Answers

In general, Quizlet is a website that provides a platform for creating and sharing study materials such as flashcards, quizzes, and games.

In the context of a critical thinking chapter 4 Quizlet, the study materials may focus on topics related to critical thinking skills such as problem-solving, decision-making, reasoning, and argumentation. The set may include sample questions and answers, definitions of key terms, and explanations of key concepts. The goal of the set would be to help students develop and improve their critical thinking skills by providing them with tools and resources for studying and practicing these skills.

Unfortunately, I cannot provide a direct answer to this question as the content of Quizlet sets can vary widely and change over time. Additionally, without knowing the specific Quizlet set being referred to, it is difficult to provide a comprehensive answer.

To know more about website visit:

https://brainly.com/question/19459381

#SPJ1

What types of questions do Boolean functions answer? Is the total cost of the trip within budget? Does the Boston trip cost more then the New York trip? Is travel the largest component of the total cost of the trip? Was last year's income greater than this year's income? all of the responses listed are the types of questions Boolean functions can answer

Answers

A boolean function is a mathematical function that translates parameters to a value, where the range (the function arguments) and domain (the function itself) have only certain permissible values.

What Boolean operators does the if function in Excel support?

The AND, OR, NOT, and a new function called XOR are examples of boolean operators, which Excel refers to as logical functions. These operators can be used in databases, spreadsheets, search engines, and any other situation where you're looking for specific information to narrow, expand, or exclude your findings.

What is a Boolean function?

Working with variables whose values are either 0 or 1 requires the use of a set of rules and procedures known as boolean algebra. In terms of propositional logic, the value 0 is equivalent to the letter F. 1. T is corresponding to the number 1.

To know more about  Boolean functions visit:-

https://brainly.com/question/640040

#SPJ4

The DELETE statement is used to delete existing records in a table. True/False?

Answers

A DML (Data Manipulation Language) instruction is DELETE. With this command, records from a table are deleted. It is not used to remove a table from the database; rather, it is only used to delete data from a table.

Does the Remove command delete tables?

The Data Manipulation Language, a subset of SQL that enables the alteration of data in databases, includes the Delete command. Existing records in a table can be deleted with this command. You can use this to either delete all the records from a table or selected records based on a criterion.

To eliminate every row from a table, which statement should be used?

Always use TRUNCATE TABLE to remove every record from a table. It is quicker to use TRUNCATE TABLE than.

To know more about DML visit:-

https://brainly.com/question/13441193

#SPJ4

what devices do not need device drivers to be manually installed?

Answers

Electronic devices that are plug-and-play begin operating as soon as they are connected to the host device (computer) because no device drivers need to be installed manually on the host device (computer).

Plug-and-play (PnP) :

It can be defined as a technology that is designed and developed to allow an operating system (OS) of a computer to automatically detect and configure a peripheral (input and output device) when they are connected to the computer.

On a related note, a plug-and-play device is an electrical device that can function as soon as it is connected to the host device (computer) since no device driver needs to be manually installed on the host device (computer).

Examples of plug-and-play devices in technology and computers include the following:

External hard-drive

Computer monitor

Keyboard

Web-cam

Mouse

Learn more about plug-n-play devices, visit:

brainly.com/question/17402566

#SPJ4

How do you do a Jeopardy game on PowerPoint?

Answers

Online, you can also find pre-made Jeopardy templates that you can download and modify to meet your particular game.

You can follow these instructions to make a Jeopardy game in PowerPoint: Create a new presentation by launching PowerPoint. Give each question a point value and make a slide for each Jeopardy category. For every query, make a slide that conceals the response. By including hyperlinks, connect the slide for the query to the slide for the category. Assign a point keeper to each team after dividing the players into groups. Choose a category and a point value before the game begins. Let the teams react after displaying the matching question slide. Display the solution once a team has responded, and if it is correct, provide points. Play on until you've answered every question or the timer goes out, whichever comes first.

learn more about Jeopardy here:

brainly.com/question/6269472

#SPJ4

what is amadeus selling platform connect

Answers

Amadeus Selling Platform Connect is a cloud-based platform that gives travel agents access to travel content and various features, including ticketing and itinerary management.

Amadeus Selling Platform Connect is a cloud-based travel agency platform that provides access to various travel content, such as flight schedules, hotel rates, car rentals, and other travel-related services, allowing travel agents to make bookings and reservations for their clients. It also offers a range of features, including ticketing, fare quoting, itinerary management, and reporting tools. The platform is designed to be user-friendly and offers a customizable interface to suit the individual needs of travel agencies of all sizes. It provides real-time access to the latest travel information, enabling agents to provide the best possible service to their clients.

Amadeus Selling Platform Connect is developed by Amadeus IT Group, a leading provider of technology solutions for the travel industry. The platform is available to travel agents around the world and can be accessed via web browser or mobile devices, making it a flexible and convenient option for agents who need to work on the go. Additionally, it offers integration with other Amadeus products and third-party solutions, allowing travel agents to streamline their workflow and improve efficiency. Amadeus Selling Platform Connect is regularly updated with new features and functionality, ensuring that travel agents have access to the latest technology to meet the evolving needs of their clients.

Learn more about travel agents here:

https://brainly.com/question/22212490

#SPJ4

what does the preprocessor command #include my-functions.hpp do?

Answers

To include the contents of a header file in the source code of your application, use the preprocessor directive include with "my-functions.hpp."

What does the C include preprocessor directive do?

The C preprocessor is told by the include directive to start with the first section of the original file before including the contents of the file that was supplied as part of the compiler's input stream. Declarations of variables, functions, and macros are typically seen in header files.

What use does the preprocessor instruction include serve?

The include directive instructs the preprocessor to accept and immediately insert the text of a file into the currently open file. Are statements are frequently inserted at the start of a programme.

To know more about preprocessor visit:-

https://brainly.com/question/28390245

#SPJ4

what desktop operating system is most likely to get infected with a computer virus?a. Linuxb. Mac OSc. Windows Phoned. Microsoft Windows

Answers

Answer: Microsoft Windows

Explanation: This operating system has very little build in security which makes it highly vulnerable to viruses. This is one of the reasons why there are so many windows anti virus software out there.

which sql statement is used to extract data from a database?

Answers

In SQL, data is extracted from a database using the SELECT statement. Here is an illustration of how it can be applied: SELECT column1, column2, column3, AND some column = some value FROM table name;

How does SQL data extraction work?

To extract data from a single table, use the SELECT statement with the FROM and WHERE clauses. The fields from which you want to extract or show the data are listed in the SELECT clause.

What are the methods for data extraction?

There are two alternatives for extraction methods: logical and physical. Full Extraction and Incremental Extraction are the other two options available for logical extraction. Direct data extraction from the source system is done all at once.

To know more about database visit:-

https://brainly.com/question/3804672

#SPJ4

what is considered specifying the location of a file or directory from the root directory?

Answers

A file or directory's location from the root directory (/) is specified by an absolute path.

What is the root directory's directory path?

How can I locate the root folder for my store? Your store's root folder is typically found in the "home" folder. To reach your root directory directly, use the path "/sub folder/site root folder" if you can't find it.

What do you refer to as a file's location in the path directory?

Through the file system tree structure, each file and directory can be reached by a distinct path, also referred to as the path name. The path name indicates where a directory or file is located in the file system.

To know more about root directory visit:

https://brainly.com/question/17009330

#SPJ4

Software maintenance process which reduces the amount of fragmentation between files.

Answers

The best way to reduce file fragmentation is to use regular disk defragmentation. Disk defragmentation is the process of rearranging fragmented data on a disk so that it is stored in contiguous blocks.

What is defragmentation ?

Defragmentation is the process of reorganizing fragmented data on a computer's hard drive so that the data can be accessed and stored more efficiently. This process is also referred to as "defragging" or "disk defragmentation". A fragmented hard drive is when the data stored on a hard drive is spread across multiple locations on the disk. This makes it difficult for the computer to access and store the data quickly and efficiently. Defragmentation reorganizes the data so that it is stored in contiguous blocks, making it easier for the computer to access and store the data. Defragmentation should be done regularly to ensure that data is stored and accessed quickly, improving performance.

To learn more about defragmentation

https://brainly.com/question/30426425

#SPJ4

which device on a network performs the task of network address translation?

Answers

The router executes NAT, enabling communication between host devices or computers on the LAN network and WAN or the internet.

What does networking's network address translation entail?

Network address translation is referred to as NAT. There is a method for translating a range of local private addresses to a public one prior to uploading the data. Most home routers use NAT, as do businesses that employ a significant number of devices to share a single IP address.

What sort of network address translation would you use?

The most straightforward instance is when NAT is turned on in both a DSL modem and a Wi-Fi router and they are both connected to a network. Through a Wi-Fi router, the host devices were linked to the public network.

To know more about network address translation visit:

https://brainly.com/question/30045682

#SPJ4

The substance of in the cylinder that you can not see sbd prevents

Answers

Welded The substance of in the cylinder that you can not see sbd prevents

The substance inside a welded cylinder will depend on the specific application and requirements of the cylinder. In general, the cylinder will contain a fluid such as hydraulic oil or a compressed gas such as nitrogen. The purpose of the fluid or gas is to create pressure that drives the movement of the piston or plunger within the cylinder. There are many different types of cylinders, and each one could potentially contain a wide range of substances depending on its purpose and function. Additionally, there may be substances that are invisible to eye, but it is unclear what you are specifically asking about.

Learn more about substance here:

https://brainly.com/question/24372098

#SPJ4

How do I fix Task Manager disabled by administrator?

Answers

There are a few actions you can take to re-enable the Task Manager if the administrator on your computer has deactivated it, By entering "regedit" into the Windows search bar and choosing the relevant result, you can access the Registry Editor.

The Windows operating system's Task Manager is a system utility application that enables users to track and manage the activities taking place on their computer. It offers real-time data about the computer's running programmes, network activities, and consumption of the CPU, RAM, and disc. You can use Task Manager to halt unneeded or unresponsive tasks, prioritise activities, and check comprehensive performance information. Additionally, it can be used to diagnose performance issues, stop or enable startup items and services, and monitor a computer's launch procedures. System administrators and advanced users who need to manage and improve their system performance might benefit from Task Manager.

Learn more about Task Manager here:

https://brainly.com/question/3692413

#SPJ4

What are two types of system encryption options using VeraCrypt?

Answers

The two system encryption options using VeraCrypt are "Encrypt the Windows system partition," and "Encrypt the entire system drive".

What is VeraCrypt?

Data encryption is offered for Windows, macOS, and Linux via the free and open-source encryption program VeraCrypt.

Both entire drives or partitions as well as specific files or folders can be encrypted using this method.

VeraCrypt provides two choices for system encryption:

When you select "Encrypt the Windows system partition," only the partition on which Windows is installed is encrypted; all other partitions are left unencrypted.By selecting "Encrypt the entire system drive," the entire hard disk, including all partitions and data, is encrypted.

Thus, these are the system encryptions using VeraCrypt.

For more details regarding encryption, visit:

https://brainly.com/question/30530076

#SPJ1

- If a story was on a TV newscast instead of in written
form, how would it be different?

Answers

If a story was on a TV newscast instead of in written form, it would likely have a number of differences, including:

How different would they be?

Visuals: On TV, the story would be accompanied by images, video, and graphics that help to illustrate the events and make them more engaging to the audience.

Brevity: TV newscasts are typically shorter than written articles, so the story would need to be presented in a more concise and to-the-point manner.

Tone: The tone of the story would likely be more dramatic and attention-grabbing, as TV newscasters often use dramatic music, sound effects, and emotive language to grab the viewer's attention.

Storytelling Techniques: TV news stories often use various storytelling techniques, such as sound bites from people.

Read more about stories here:

https://brainly.com/question/24292088

#SPJ1

What is the function of advanced IP Scanner?

Answers

An effective network scanner with a user-friendly UI is Advanced IP Scanner. All of the machines on your wired or wireless local network may be found and their ports can be scanned quickly with Advanced IP Scanner.

The application makes it simple to access a variety of network resources, including shared folders, FTP, HTTP, and HTTPS.Rapid and cost-free network scanning software is Advanced IP Scanner. You will be able to easily find every network machine and gain access to it. You can connect to a remote Computer using Radmin, turn it on and off with a single click, and do many other things. The sophisticated IP scanner from OpUtils is an easy-to-use IP scanning solution for intricate IT systems. It guarantees complete network coverage over IPv4 and IPv6 subnets and supernets using a variety of network protocols, including ICMP ping, SNMP scans, and ARP.

To learn more about network  click the link below:

brainly.com/question/15088389

#SPJ4

What is the ICD-10 code for driver injured in MVA?

Answers

Driver hurt in initial impact with unnamed motor vehicles in a traffic accident; ICD-10-CM Diagnosis Code V49. 40XA.

What codes are used to describe injuries?

The V00–Y99 External Cause Codes in the ICD-10 are supplementary codes that record particular information regarding an injury or health occurrence.

When coding injuries, which code is executed first?

When there are multiple burns, start sequencing with the code that represents the burn with the highest degree. Sequence the code that represents the burn with the highest degree first when the admission or encounter is being made for the purpose of treating multiple exterior burns.

To know more about code visit:-

https://brainly.com/question/17293834

#SPJ1

a software developer wants to create an application that will work on windows and apple ios operating systems. what can the developer do to make this task easier?

Answers

Use the API of each operating system. Python is a general-purpose programming language commonly used to build websites and mobile applications.

What is Python, a popular universal programming language to create?

Python is a computer programming language commonly used to build websites and software, automate tasks, and perform data analysis. Python is a general-purpose language. H. It can used to create a wide variety of programs and is not specific to any particular problem.

Who developed the Python programming language?

Guido Van Rossum

The idea of ​​Python was developed in the late 1980s by Guido van Rossum at his Centrum Wiskunde & Informatica (CWI) in the Netherlands. It was considered the successor to the ABC programming language. It was inspired by his SETL and was able to provide excellent handling and interfacing with the Amoeba operating system.  

To know more about Python visit here:

https://brainly.com/question/30391554

#SPJ4

How to fix error: error:0308010c:digital envelope routines::unsupported

Answers

Fix Take away any external gadgets, reinstall the drivers, To fix, use the Windows Update Troubleshooter. Delete any third-party software, Repair, the disk, and Deactivate network adapters.

What does a computer driver do?

A driver is essentially a piece of software that enables communication between an operating system as well as a device.

What do psychologists mean by drivers?

Drivers are signals from our parents that we integrate as dysfunctional problem-solving techniques when we are still young. In order to reestablish our equilibrium when we feel questioned about our fundamental OK-ness, we engage them. However, the consequence might have short-term or long-term negative effects.

To know more about drivers visit:

https://brainly.com/question/29851057

#SPJ1

How we built our online Python compiler?

Answers

Setting up a server, designing a user interface, and developing a code execution engine are just a few of the crucial processes involved in building an online Python compiler.

Users can write, test, and run Python code in a web browser using an online Python compiler. Without the need for local software installation, it provides a practical and accessible solution for both novice and seasoned developers to explore with Python programming. A code editor, a console for displaying output, and functions like syntax highlighting, code completion, and error detection are generally included in online Python compilers. They might also assist with third-party frameworks and libraries. There are both free and paid online Python compilers available, and some of them have features that let multiple users collaborate on code.

Learn more about online Python compiler here:

https://brainly.com/question/30401995

#SPJ4

how to popen python folder

Answers

One of the ways to open a python folder is through a platform. This task is done using Visual Studio.

First, we need to launch Visual Studio 2022. This is done through the start window. The next step is to select the Open option which is at the bottom of the Get started column.

Another way is if Visual Studio is already running, you need to select the File > Open > Folder command instead. Now user needs to Navigate to the folder containing your Python code, then choose Select Folder.

Another way to open a python can be done through the command line.

Learn more about Python at:

https://brainly.com/question/30401479

#SPJ4

I need the code to run this expected output in Java and I need it explained, please. (ignore the code I have)

Answers

The revised code that would help get the output you need is given below:

The Program

using System;

public class HelloWorld

{

   public static void Main(string[] args)

   {

       int num1 = 10, num2 = 100;

       bool bool1  = num1 < 25;

       Console.WriteLine (bool1);

       bool bool2 = (num2 != 15 && num2 != 7);

       Console.WriteLine (bool2);

       bool bool3 = (num2 % 2 == 0 && num2 > 0);

       Console.WriteLine (bool3);

       bool bool4 = (num1 >= 25 && num1 <= 35);

       Console.WriteLine (bool4);

       bool bool5 = (num2 > num1 && num2 != 10 && num2 != -2);

      Console.WriteLine (bool5);

   }

}

Read more about programs here:

https://brainly.com/question/26134656

#SPJ1

A user interface is the portion of the application that allows the user to control and to interact with the program.A. TRUEB. FALSE

Answers

The area of the application that enables the user to interact and control the software is known as the user interface. TRUE.

Is the user interface the part of the application that lets the user interact and control the software?

The point of interaction and communication between people and computers is the user interface of a device (UI). This group may include desktop monitors, keyboards, mice, and other pointing devices. Additionally, it explains how a user engages with a software or website.

What does the user interface make up?

The component of the machine that manages human-machine interaction is known as the user interface or human-machine interface. Examples of the tangible components of the Human Machine Interface that we can feel and touch include membrane switches, rubber keypads, and touchscreens.

To know more about user interface visit:-

https://brainly.com/question/23682502

#SPJ4

What are the margins for Navy correspondence manual?

Answers

The Navy Correspondence Manual, which is the accepted manual for structuring and drafting Naval mail, specifies the margins for Navy correspondence.

The gap or separation between a page's edge and any text or images that are printed on it is referred to as a margin. They do a variety of tasks, such as assuring readability, allowing space for notes, and framing the information. Moreover, margins can be used in layout and design to add visual appeal and balance. To guarantee consistency and adhere to formatting standards, margins are often controlled and regulated in academic and professional writing. Moreover, the term "margins" can be used metaphorically to denote the outside limits or borders of anything, such as the profit margins of a business or the boundaries of an individual.

Learn more about margins here:

https://brainly.com/question/30156555

#SPJ4

A _____ is a computer employed by many users to perform a specific task, such as running network or Internet applications.
A) cache
B) register
C) server
D) bus

Answers

A c) server is a computer employed by many users to perform a specific task, such as running network or internet applications.

Servers are central to modern computing and are used in a variety of settings, including businesses, government agencies, and educational institutions. They are designed to handle the demands of multiple users and provide a reliable and secure platform for running applications and storing data.

Some common types of servers include web servers, database servers, file servers, and email servers. These servers are responsible for serving up web pages, storing and retrieving data, providing access to shared resources, and delivering emails, among other tasks.

Learn more about server: https://brainly.com/question/7007432

#SPJ4

Other Questions
overview, es una opcion del menu: the following code segment is intended to remove all duplicate elements in the list mylist. the procedure does not work as intended. what are two typical ways that a service can be classified? PLEASE HELP 25 POINTS!! NO LINKS information dictating the primary sequence of a polypeptide is permanently maintained within a cell in which of the following forms?O DNAO RNAO GeneO Steroids after adding ethlyene glycol to the dissolved 3-nitrophthalic acid in step 1, what is the desired temperature for the reaction? An electron moves from point i to point f, in the direction of a uniform electric field. During this motion:. What is the main cause of uremia? what is mpc environment meaning ? PLS HELP ITS DUE TODAY Imagine you are an American alive at the outbreak of WWII in 1939. Think about whether you would want the United States to get involved in the war or to not be involved in the war. Write a persuasive letter to President Roosevelt to explain why we should or should not join the war. Include terms that we learned in Unit 9 such as isolationist and pacifists. Your letter should be creative but based on historical facts that we have learned about the war in our Class Connect sessions and OMS lessons. Your letter should be at least two full paragraphs in length, 5-7 sentences each, and should follow a standard letter format with a greeting and salutation at the end. choose the statement that would best fit under an organizations integrity-based ethics code. 10. Which is the bigger portion, of a 12 inch pizza, or % of a 9 inch pizza? Give a reason for youranswer. i^{11} + i^{16} + i^{21} + i^{26} + i^{31} deloria points out the corrupt narrative surrounding wounded knee by comparing the _______________ medals of honor given out to the 7th cavalry on that day to the 3 that were awarded to the more than 64,000 south dakotans who fought in world war ii.a.12b.35c.18d.7e.26 Researchers wanted to explore what psychological and social impact time spent watching TV and playing electronic games might have on children between the ages of five and seven. They included a representative sample of just over 11,000 children. When they were five and then again when they were seven, the children's mothers were asked to describe how well adjusted their offspring were, using a validated Strengths and Difficulties (SDQ) questionnaire. This experimental design best matches which category? A. Clinical Trial B. Population Survey C. Case-Control Study D. Cohort Study question content area gizmo inc. purchased a 1-year insurance policy on october 1 for $2,880. journalize the adjusting entry on december 31. if an amount box does not require an entry, leave it blank. dateaccountdebitcredit Fill in the blanklychees are a sweet asian fruit that is used as an ingredient in certain cocktail drinks. suppose the popularity of lychees decreases by a lot and the labor costs to grow and harvest lychees increases by a little. in this scenario, the equilibrium price would ___ and quantity would ___.O decrease; increase O decrease; decrease increase; increase O increase; decrease what does the intellectual property is the works, on inventions or creations of an individual, group or business? Need help, please, thanks! What is the Lewis structure for HBr?