Which of the following does cloud computing allow users to do? Check all of the boxes that apply.

access data from anywhere with an Internet connection

store pictures and music

store data

have a unique address for their computer

Answers

Answer 1

Answer:

a b c

Explanation:

there just right

Answer 2

Answer: a b c d

Explanation edge 2023


Related Questions

You work part-time at a computer repair store. You are building a new computer. A customer has purchased two serial ATA (SATA) hard drives for his computer. In addition, he would like you to add an extra eSATA port that he can use for external drives. In

Answers

Install an eSATA expansion card in the computer to add an extra eSATA port for the customer's external drives.

To fulfill the customer's request of adding an extra eSATA port for external drives, you can install an eSATA expansion card in the computer. This expansion card will provide the necessary connectivity for the customer to connect eSATA devices, such as external hard drives, to the computer.

First, ensure that the computer has an available PCIe slot where the expansion card can be inserted. Open the computer case and locate an empty PCIe slot, typically identified by its size and the number of pins. Carefully align the expansion card with the slot and firmly insert it, ensuring that it is properly seated.

Next, connect the power supply cable of the expansion card, if required. Some expansion cards may require additional power to operate properly, and this is typically provided through a dedicated power connector on the card itself.

Once the card is securely installed, connect the eSATA port cable to the expansion card. The cable should be included with the expansion card or can be purchased separately if needed.

Connect one end of the cable to the eSATA port on the expansion card and the other end to the desired location on the computer case where the customer can easily access it.

After all connections are made, close the computer case, ensuring that it is properly secured. Power on the computer and install any necessary drivers or software for the expansion card, following the instructions provided by the manufacturer.

With the eSATA expansion card installed and configured, the customer will now have an additional eSATA port available on their computer, allowing them to connect external drives and enjoy fast data transfer speeds.

For more question on computer visit:

https://brainly.com/question/30995425

#SPJ8

A client is

a computer that is disconnected from the network.

the same as a server.

a computer that requests a service.

a router.

Answers

Answer:

a computer that requests a service.

Answer:

A computer that requests a service

Explanation:

In computing, a client is a piece of computer hardware or software that accesses a service made available by a server as part of the client–server model of computer networks. The server is often (but not always) on another computer system, in which case the client accesses the service by way of a network.

plz mark as brainliest

Create a function that returns a dictionary containing the number of upper and lower case characters in a string (e.g. {'lower': 8, 'upper': 2}). Ignore whitespace characters. Your function should be able to handle an empty string, though.

Answers

Answer:

Explanation:

The following is written in Python and takes in the input string, then loops through it counting all of the upper and lower case letters and adds it to the dictionary.

string = input("input string: ")

upper_case = 0

lower_case = 0

for char in string:

   if char.isupper() == True:

       upper_case += 1

   elif char == ' ':

       pass

   else:

       lower_case += 1

letter_dict = {'upper_case': upper_case, 'lower_case': lower_case}

What are some of the strategies that you use for confronting a complex problem and breaking it down into smaller pieces? How might some of these strategies be useful to a computer programmer working on a CPU scheduler?

Answers

Answer:

Breaking it down I guess for me, you could take down all the possible things that you could do. Eliminating things, one by one. It could help working on a computer by not letting yourself get over-whelmed by all your programming and thinking "alright, this THEN this."

Explanation:

The strategies that you use for confronting a complex problem are:

First, define the issue.Use your inner eyes to visualize the issue. Break the problem into little pieces

Why are problem-solving strategies vital?

Solving problems involves the act of making the right choices. It is known to be a good and  effective way of problem-solving as one can get a good result from it.

Conclusively, by using the strategies give above, a computer programmer working on a CPU scheduler can be able to find out the issues that needs to be handled, where the problem is coming from and then solve it.

Learn more about CPU from

https://brainly.com/question/474553

Write a static generic method PairUtil.minmax that computes the minimum and maximum elements of an array of type T and returns a pair containing the minimum and maximum value. Require that the array elements implement the Measurable interface of Section 10.1.2.

Answers

Answer:

Explanation:

The following code is written in Java. It is hard to fully create the code without the rest of the needed code including the T class and the Measurable interface. Regardless the following code can be implemented if you have that code available.

 public static T minmax(ArrayList<T> mylist) {

       T min = new T();

       T max = new T();

       for (int x = 0; x < mylist.size(); x++) {

           if (mylist.get(x) > max) {

               max = mylist.get(x);

           } else if (mylist.get(x) < min) {

               min = mylist.get(x);

           }

       }

       

       return (min, max);

   }

(3) reasons why users attach speakers to their computer

Answers

Explanation

1.we connected speakers with computers for listening voices or sound . because the computer has not their own speaker.

2.Speakers are popular output devices used with computer systems.

3.Speakers are one of the most common output devices used with computer systems

Question 5/20
00:07:27
Agile Teams need to comply by the Agile Values and Principles but have flexibility to choose appropriate value-adding practices
Select the correct option(s) and click Submit.
True
False
SUBMIT

Answers

Explanation:

True. Is the true answer

c program that calculates the summation of integers from one to N. Allow the user to input an integer, then pass that number to a function that will calculate the sum of all integers up to N. For example, if the user inputs the number 5, then the function will return the sum 1 2 3 4 5. Allow the user to enter multiple integers, calling the function for each number. Use a sentinel value or similar method to terminate user input.

Answers

Answer:

Answered below.

Explanation:

#include <studio.h>

#include<conio.h>

void main(){

int I = 0;

int sumOfNumbers = 0;

int number;

printf("Input an integer: ");

("%d", &sumOfNumbers);

//Loop over while adding numbers

while(I <= number){

sumOfNumbers = sumOfNumbers + I;

I++;

}

printf("\n Sum of N numbers is: %d", sumOfNumbers);

getch();

}

what does ICT stand for?​

Answers

Information Communication Technology

ICT stands for 'Information Communication Technology'. Everyday usage of digital technology includes when you use a computer, tablet or mobile phone, send email, browse the internet, make a video call - these are all examples of using basic ICT skills and technology to communicate.

Information Communication Technology

If a 9V, 7W radio is on from 9am to 12pm. Calculate the amount of charge that flows through it, hence or otherwise the total number of free electrons that pass through at a point at the power supply terminals​

Answers

Answer:

Q=It

and

p=IV

Given, v=9V P= 7W

I=P/V

I =7/9

Also, time(t) from 9am to 12pm is 3hrs

Converting into sec =3×3600

t=10800

Q= 7/9 ×10800

Q =8400C

Write a program that replaces words in a sentence. The input begins with word replacement pairs (original and replacement). The next line of input is the sentence where any word on the original list is replaced. Ex: If the input is: automobile car manufacturer maker children kids The automobile manufacturer recommends car seats for children if the automobile doesn't already have one.

Answers

Answer:

In Python:

toreplace = input("Word and replacement: ")

sentence = input("Sentence: ")

wordsplit = toreplace.split(" ")

for i in range(0,len(wordsplit),2):

   sentence = sentence.replace(wordsplit[i], wordsplit[i+1])

print(sentence)

Explanation:

This gets each word and replacement from the user

toreplace = input("Word and replacement: ")

This gets the sentence from the user

sentence = input("Sentence: ")

This splits the word and replacement using split()

wordsplit = toreplace.split(" ")

This iterates through the split words

for i in range(0,len(wordsplit),2):

Each word is then replaced by its replacement in the sentence

   sentence = sentence.replace(wordsplit[i], wordsplit[i+1])

This prints the new sentence

print(sentence)

You are a Data Scientist at Anthem Blue Cross Blue Shield. You want to check if a patient will develop diabetes. Please write the R code to split the dataframe into test and training data. The proportion of split is 85/15, and the sample stratification needs to be done on the variable - age.

Answers

Answer:

666

Explanation:

You are a Data Scientist at Anthem Blue Cross Blue Shield. You want to check if a patient will develop diabetes. Please write the R code to split the dataframe into test and training data. The proportion of split is 85/15, and the sample stratification needs to be done on the variable

Christopher was looking at the TV while getting feedback on his opinion essay. What should he do differently? Don't get feedback from a trusted adult. Finish watching his TV show. Make sure the trusted adult likes the show on TV, too. Turn off the TV and face the person who is speaking.

Answers

Answer:

Turn off the TV and face the person who is speaking.

If D3=30 and D4=20, what is the result of the function
=IF(D4 D3, D3-D4, "FULL")?
0-10
O Unknown
O 10
O Full

Answers

Answer:

c. 10

Explanation:

Given

[tex]D3 = 30[/tex]

[tex]D4 = 20[/tex]

Required

The result of: [tex]=IF(D4 < D3,D3-D4,"FULL")[/tex]

First, the condition D4 < D3 is tested.

[tex]D4 < D3 = 20 < 30[/tex]

Since 20 < 30, then:

[tex]D4 < D3 = True[/tex]

The condition is true, so:

D3 - D4 will be executed.

[tex]D3 - D4 = 30 - 20[/tex]

[tex]D3 - D4 = 10[/tex]

Hence, the result of the function is 10

explain the different type of shift register counter ​

Answers

Answer:

Shift registers are also used as counters. There are two types of counters based on the type of output from right most D flip-flop is connected to the serial input. Those are Ring counter and Johnson Ring counter.

There are two types of shift register counters. They are given below:

Ring counter.Johnson ring counter.

What do you mean by Shift register counter?

The shift register counter may be defined as a sequence of a specific number of core registers that are significantly interconnected to one another in order to provide a clock-driven data shift.

A shift register is a set of f FFs that can be connected within the series and the stored data can be moved in the registers sequentially as per the command or instruction is given.

They are also utilized as counters. The type of shift register counter is based on the output from the D flip-flop which is connected to the serial input from the rightmost side.

Therefore, the two types of shift register counters are well mentioned above.

To learn more about Shift register, refer to the link:

https://brainly.com/question/14096550

#SPJ6

You are helping a friend in college with his network connection. He would like a high speed connection between his computers so he can play Super Blast with others. In this lab, your task is to complete the following: Choose an appropriate router that will provide security and the fastest local connection. Connect the router to both computers and to the dorm internet connection. Request new TCP/IP information from the router on both computers. Configure Windows Firewall on both computers. Turn on Windows Firewall for both the Private and the Public network profiles. Add an exception for the SuperBlast program only for the Private network profile.

Answers

Solution :

Set up the router as follows:

On the Shelf, expand the Routers. And read the description for each of the devices. Drag the Ethernet [tex]$100/1000TX$[/tex] router with the firewall to the Workspace.

Connection of the router as follows:

Above the router, select the Back to switch to the back view of the router. Then select the cable currently connected to the wall plate and then drag it to a [tex]$LAN$[/tex] port on the router. Above the Dorm-[tex]$PC2$[/tex] computer, select [tex]$\text{back}$[/tex] to switch to the back view of the computer. On the Shelf, expand Cables. Select a Cat5e [tex]$RJ45$[/tex] cable. In the Selected Component window, drag the connector to the [tex]$LAN$[/tex] port on the computer. In the Selected Component window, drag the other connector to a [tex]$LAN$[/tex] port on the router. Select a Cat5e [tex]$RJ45$[/tex] cable. In the Selected Component window, drag a connector to the [tex]$WAN$[/tex] port on the router. In the Selected Component window, drag the other connector to the port on the wall plate.

Provide power to the router as follows:

On the Shelf, select the power adapter. In the Selected Component window, drag the DC power connector to the power port on the router. In the Selected Component window, drag the AC adapter connector to the surge protector. Above the router, select Front to switch to the front view to verify power and network activity lights.

Request new [tex]$TCP/IP$[/tex] information from the router for Dorm-PC as follows:

On the [tex]$\text{Dorm-PC}$[/tex] monitor, select Click to view [tex]$\text{Windows 10}$[/tex].In the Search field on the taskbar, enter command prompt. Under Best Match, select Command Prompt. Enter [tex]$\text{ipconfig}$[/tex] /renew and press [tex]$\text{Enter}$[/tex] to request new [tex]$TCP/IP$[/tex] information from the router. In the notification area, right-click the Network icon and select Open Network and Sharing Center. The network information map should indicate an active connection to the Firewall Network and the internet.

Configure Windows Firewall on [tex]$\text{Dorm-PC}$[/tex] as follows:

In Network and Sharing, select Windows Firewall. From the left menu, select Turn Windows Firewall on or off. Under Private network settings, select Turn on Windows Firewall. Under Public network settings, select Turn on Windows Firewall. Click OK.

what is subnetting. what does subnetting mean

Answers

Answer:

Subnetting is the practice of dividing a network into two or more smaller networks. It increases routing efficiency, enhances the security of the network and reduces the size of the broadcast domain.

Explanation:

Explain why microcomputers are installed with TCP/IP protocols?​

Answers

Answer:

microcomputers are installed with TCP/IP protocols because its a set of standardized rule that allows the computer to communicate on a network such as the internet

Implement a class Clock whose getHours and getMinutes methods return the current time at your location. (Call java.time.LocalTime.now().toString() and extract the time from that string.) Also provide a getTime method that returns a string with the hours and minutes by calling the getHours and getMinutes methods. Provide a subclass WorldClock whose constructor accepts a time offset. For example, if you live in California, a new WorldClock(3) should show the time in New York, three time zones ahead. Which methods did you override

Answers

Answer:

Explanation:

The following code was written in Java. It uses the LocalTime import to detect the current time. Then it creates a getHours, getMinutes, and getTime method to correctly print out only the hours and minutes in a simple format. Then it does the same for the WorldClock subclass which takes in the time offset as an int parameter and adds that to the hours in your own timezone.

class Clock {

   public String getHours() {

       String hours = java.time.LocalTime.now().toString().substring(0,2);

       return hours;

   }

   public String getMinutes() {

       String min = java.time.LocalTime.now().toString().substring(3,5);

       return min;

   }

   public String getTime() {

       String time = getHours() + ":" + getMinutes();

       return time;

   }

}

class WorldClock extends Clock {

   int timeZone = 0;

   public WorldClock(int timeZone) {

       super();

       this.timeZone = timeZone;

   }

   public String getHours() {

       String hours = String.valueOf(Integer.parseInt(super.getHours()) + 3);

       return hours;

   }

   public String getTime() {

       String time = getHours() + ":" + super.getMinutes();

       return time;

   }

}

class Test {

   public static void main(final String[] args) {

       Clock myClock = new Clock();

       System.out.println("My Time: " + myClock.getTime());

       WorldClock worldClock = new WorldClock(3);

       System.out.println("My Time + 3: " + worldClock.getTime());

   }

}

what is digital literacy? describe three examples of digital literacy skills

Answers

Digital literacy means having the skills you need to live, learn, and work in a society where communication and access to information is increasingly through digital technologies like internet platforms, social media, and mobile device

Examples of Digital Literacy skills:

What is digital literacy?

ICT proficiency.

Information literacy.

Digital scholarship.

Communications and collaborations.

Digital learning.

Digital identity.

Project Description:
In the following project, you will edit a worksheet that will be used to summarize the operations costs for the Public Works Department.
Instructions:
For the purpose of grading the project you are required to perform the following tasks:
Step Instructions Points Possible
1. Start Excel. Download and open the file named go16_xl_ch03_grader_3g_hw.xlsx. 0.000
2. In the Expenses worksheet, calculate row totals for each Expense item in the range F5:F9. Calculate column totals for each quarter and for the Annual Total in the range B10:F10. 8.000
3. In cell G5, construct a formula to calculate the Percent of Total by dividing the Annual Total for Salaries and Benefits by the Annual Total for Totals by Quarter. Use absolute cell references as necessary, format the result in Percent Style, and then Center. Fill the formula down through cell G9. 12.000
4. Use a 3-D Pie chart to chart the Annual Total for each item. Move the chart to a new sheet and then name the sheet Annual Expenses Chart. 8.000
5. For the Chart Title, type Summary of Annual Expenses and format the chart title using WordArt Style Fill - Blue, Accent 1, Shadow. Change the Chart Title font size to 28. 6.000
6. Remove the Legend from the chart and then add Data Labels formatted so that only the Category Name and Percentage display positioned in the Center. Change the Data Labels font size to 12, and apply Bold and Italic. 8.000
7. Format the Data Series using a 3-D Format effect. Change the Top bevel and Bottom bevel to Circle. Set the Top bevel Width and Height to 50 pt and then set the Bottom bevel Width and Height to 256 pt. Change the Material to the Standard Effect Metal.
Note, the bevel name may be Round, depending on the version of Office used. 4.000
8. Display the Series Options, and then set the Angle of first slice to 125 so that the Salaries and Benefits slice is in the front of the pie. Select the Salaries and Benefits slice, and then explode the slice 10%. Change the Fill Color of the Salaries and Benefits slice to a Solid fill using Green, Accent 6, Lighter 40%. 4.000
9. Format the Chart Area by applying a Gradient fill using the Preset gradients Light Gradient – Accent 4 (fourth column, first row). Format the Border of the Chart Area by adding a Solid line border using Gold, Accent 4 and a 5 pt Width. 6.000
10. Display the Page Setup dialog box, and then for this chart sheet, insert a custom footer in the left section with the file name. 4.000

Answers

Answer:

pelo o que diz na database é que você n é ser humano normal por perguntar isso!!

PLEASE ANSWER SOON I NEED IT TODAY
If you plan on operating several applications at a time, the amount of RAM should be considered when purchasing a computer.

a. True

b. False

Answers

Answer:

true

Explanation:

true because the more ram the more efficient the computer can run, but also depends on what applications you're running.

A .true
Is the answer

What are the two functions in C that allow a programmer to randomly move the file cursor within a file stream, thus enabling random access. Please write down the names of the two functions and separate them by a comma only. As an example, assume the two functions are abc, and abe, you will write down your answer as abc,abe

Answers

Answer:

seekp(),tellp()

Explanation:

The two functions in c ++ that allow a programmer to randomly move the file cursor within a file stream are : seekp(),tellp()

The functions place cursor in file stream and also access the values

Create another method: getFactorial(int num) that calculates a Product of same numbers, that Sum does for summing them up. (1,2,3 ... num) Make sure you use FOR loop in it, and make sure that you pass a number such as 4, or 5, or 6, or 7 that you get from a Scanner, and then send it as a parameter while calling getFactorial(...) method from main().

Answers

Answer:

The program in Java is as follows;

import java.util.*;

public class Main{

public static int getFactorial(int num){

    int fact = 1;

    for(int i =1;i<=num;i++){

        fact*=i;

    }

    return fact;

}

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 System.out.print("Number: ");

 int num = input.nextInt();  

 System.out.println(num+"! = "+getFactorial(num)); }}

Explanation:

The method begins here

public static int getFactorial(int num){

This initializes the factorial to 1

    int fact = 1;

This iterates through each digit of the number

    for(int i =1;i<=num;i++){

Each of the digits are then multiplied together

        fact*=i;     }

This returns the calculated factorial

    return fact; }

The main begins here

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

This prompts the user for number

 System.out.print("Number: ");

This gets input from the user

 int num = input.nextInt();  

This passes the number to the function and also print the factorial

 System.out.println(num+"! = "+getFactorial(num)); }}

arrange the following numbers from the highest to the lowest. ⅔,-7,0. no file or photo​

Answers

Answer:

2/3, 0, -7

Explanation:

“What is an example of the vocabulary word foreshadow?” This question could be a
a.
Potential question
c.
Flashcards question
b.
Vocabulary definition
d.
Both A and C


Please select the best answer from the choices provided

A
B
C
D

Answers

Answer:

D) Both A and C

Explanation:

Answer:

D

Explanation:

In a multimedia presentation, when might voice-over be a better choice than placing the text on the screen?
when you have very little to say
when your audience is bored
when you have a lot to say
when you don’t want to write

Answers

Um, it is quite the battle between C and D, but knowing school they probably think D is lazy, so my final answer is C. Sorry if I'm wrong <3

In a multimedia presentation, the option that might be the voice-over  when you have a lot to say.

What is multimedia presentation?

A multimedia presentation is known to be a presentation where a person is said to often stand by themselves to present information via slides, video, etc.

In a multimedia presentation, the option that might be in the case of voice-over is when you have a lot to say as it is better to put it in a video format.

Learn more about multimedia from

https://brainly.com/question/24138353

#SPJ2

NEED HELP ASAP! You are looking for information in the online catalog for your local library. Which field would you not expect to see in a library's catalog or database?
A. Author
B. Title
C. Year
D. Phone number

Answers

Answer:

The answer is D

Explanation:

     

In the reverse outlining technique, which of the following techniques is involved in assessing the structure of the new outline? Select one.

Question 3 options:

Discovering content that should be deleted, added, or rearranged


Identifying confusing sentences that mischaracterize the content


Incorporating various forms of advanced organizers, such as headings or bulleted lists


Identifying citations or paraphrases that are improperly formatted

Answers

In the reverse outlining technique, the technique involved in assessing the structure of the new outline is incorporating various forms of advanced organizers, such as headings or bulleted lists

The correct answer to the given question is option C.

Reverse outlining is a revision strategy that helps writers evaluate the organization and coherence of their written work. It involves creating an outline based on an existing draft and then analyzing the outline to assess the structure and flow of the content.

By examining the outline, writers can identify sections or points that may need to be deleted if they are irrelevant or repetitive. They can also determine areas where additional content should be added to provide clarity or support their arguments. Additionally, the outline allows writers to assess the order and sequence of their ideas and make necessary rearrangements to improve the overall structure of the piece.

While identifying confusing sentences that mischaracterize the content, incorporating advanced organizers, or identifying improperly formatted citations or paraphrases are important aspects of the writing and revising process, they are not specifically involved in assessing the structure of the new outline in the reverse outlining technique. The focus of reverse outlining is primarily on evaluating the organization and coherence of the content.

For more such questions on technique, click on:

https://brainly.com/question/12601776

#SPJ8

reasons why users attach speakers to their computer

Answers

Answer:

To listen to sounds or voices because maybe the computer doesn't have its own speakers

Other Questions
What is the minimum amount of heat required to completely melt 20. 0 grams of ice at its melting point?(1) 20. 0 J (3) 6680 J(2) 83. 6 J (4) 45 200 J One type of card stock which may be used for the cover of a booklet is uncoated paper with weight marked as 65 lb. The standard thickness of 65# card stock is 9.5 points (0.0095"). A manufacturer determines that the thickness of 65# card stock produced follows a uniform distribution varying between 9.25 points and 9.75 points.a) Sketch the distribution for this situation.b) Compute the mean and standard deviation of the thickness of the 65# card stock produced.c) Compute the probability that a randomly-selected piece of 65# card stock has a thickness of at least 9.4 points.d) Compute the probability that a randomly-selected piece of 65# card stock has a thickness between 9.45 and 9.75 points. All else equal, which of the following would reduce the value of the multiplier for an economy? Select one: O An increase in the marginal propensity to import O b. An increase in the marginal propensi Find the inverse Laplace transform of F(s) 1 /s^2 + 3s - 100 Given that the probability of error in transmitting a bit over a communication channel is 8 10^4, compute the probability of error in transmitting a block of 1024 bits. Note that this model assumes that bit errors occur at random, but in practice errors tend to occur in bursts. Actual block error rate will be considerably lower than that estimated here America has been called a country of pragmatists ( , / ; ) although the American devotion to ideals is legendary. a 31 kgkg child slides down a playground slide at a constant speed. the slide has a height of 3.8 mm and is 7.0 mm long. TRUE / FALSE. "asapQuestion 2 [CLO-6] While Present Worth is a very popular metric in estimating a project's profitability, it can't be used alone in evaluation. O True O False" What is the slope of the line shown below? (-2,-3) (-4,-9) two slits, each of width 1.8um and separated by the center-to-center distance of 5.4um, are illuminated by plane waves from a krypton ion laser with a wavelength of 461.9 nm. a) Illustrate and explain the Gross Domestic Product (GDP) and unemployment for Malaysia for the years 2018-2021 using graphs. b) Identify the macroeconomic problems that Malaysia is currently facing and discuss how the Malaysian government and Bank Negara Malaysia can mitigate the identified macroeconomic problems. You are asked to audit a project on Patient Life Cycle Management in a reputed hospital . How will you conduct the audit and what data you would like to collect during the audit process? 1.42pointsReturn to questionItem 4Problem 6-52 (LO 6-4)Jordan took a business trip from New York to Denver. She spent two days in travel, conducted business for nine days, and visited friends for five days. She incurred the following expenses:Airfare $ 510Lodging 3,100Meals 775Entertainment of clients 620Required:How much of these expenses can Jordan deduct? technical writing oftentimes requires writing in the ,.........due to making instructions easier to understand If 20 lb of rice and 30 lb of potatoes cost $21.80, and 30 lb of rice and 12 lb of potatoes cost $17.52, how much will 10 lb of rice and 50 lb of potatoes cost? If there is a very strong correlation between two variables, then the coefficient of correlation must be _____.a. much larger than 1, if the correlation is positiveb. much smaller than 1, if the correlation is negativec. Both answers are correctd. None of the above Let a EC with a < 1. Find the set of all z EC such that |z-a| < | 1-az| Where in a plant cell do the light-dependent reactions of photosynthesis occur? ________ focuses on studying customer behavior and perceptions in order to provide the business intelligence necessary to identify new opportunities and to provide superior customer service. The Caffeine Coffee Company uses the modified internal rate of return. The firm has a cost of capital of 9 percent. The project being analyzed is as follows ($38,000 investment): Use Appendix A and Appendix B for an approximate answer but calculate your final answer using the formula and financial calculator methods. Year Cash Flow 1 $20,000 2 19,000 3 12,000 What is the modified Internal rate of return? (Do not round intermediate calculations. Enter your answer as a percent rounded to 2 decimal places.) Internal rate of return____%