core competencies as a source of competitive advantage include the following except a. brand appeal b. service management c. brand building d. business innovation e. technology development

Answers

Answer 1

Core competencies are unique strengths possessed by a company that allow it to perform better than its competitors. These competencies can be leveraged to create a competitive advantage that is difficult for other companies to replicate.

When it comes to core competencies, companies often focus on areas such as brand appeal, service management, brand building, business innovation, and technology development. These areas can be used to create a competitive advantage and set the company apart from its competitors. However, when it comes to the question at hand, it is important to note that one of these areas is not considered a core competency for creating a competitive advantage.

Based on the options given, it can be concluded that the answer to the question is A. Brand appeal is not considered a core competency for creating a competitive advantage, while the other areas mentioned (service management, brand building, business innovation, and technology development) are often viewed as crucial for building and maintaining a competitive edge.

To learn more about Core competencies, visit:

https://brainly.com/question/14438508

#SPJ11


Related Questions

What should you do if the system crashes during startup before you can log on?

Answers

You can attempt to boot using the settings of last known good. In order to launch Windows, the hardware setup from the most recent successful login is used.

Why does my computer crash right away?

If we're talking about the fundamental causes, a poor power supply is one among them. In this situation, you might want to make sure that everything is securely and appropriately plugged in. Another problem that may contribute to this one is overheating. If we dig deep into the issue, we might want to investigate the motherboard and hard drive.

Does a blue screen signify excessive heat?

Overheating: If your computer is overheating as a result of dust, broken fans, or overloaded hardware, the BSOD message may appear. Malware: Malware damages your important files on your computer, similar to a virus.

To know more about system crashes visit:-

https://brainly.com/question/29976636

#SPJ4

3.1.3 Select and Install a Network Adapter
In this lab, your task is to complete the following:
In the Support Office:
Select and install the network interface card with the fastest speed to connect to the local network.
Select and install the corresponding cable and connect the computer to the local area network.
In the workstation's operating system, confirm that the workstation has a connection to the local network and the internet.

Complete this lab as follows:
1.Above the computer, select Motherboard to switch to the motherboard view of the computer.
2. On the Shelf, expand Network Adapters.
3.Drag the 1000BaseTX network adapter to a free PCIe slot on the computer.
4. Connect the computer to the network as follows:
a. Above the computer, select Back to switch to the back view of the computer.
b. On the Shelf, expand Cables.
c. Drag the Cat5e cable from the Shelf to the port on the 1000BaseTX network adapter.
d. In the Selected Component window, drag the other connector to the Ethernet port on the wall outlet.
5. Confirm that the computer is connected to the local network and the internet as follows:
a. Above the computer, select Front to switch to the front view of the computer.
b. Click the power button on the computer case to turn the computer on.
c. After the operating system loads, right-click the Network icon and select Open Network and Sharing Center.
d. The diagram should indicate an active connection to the network and the internet.
5. You can also confirm the speed of the connection by selecting Ethernet 2 in the Network and Sharing Center.

Answers

The correct answer is Choose and set up a network adapter. The network adapter enables the computer or other device to connect to the internet or other local area networks (LANs) for communication.

The network adapter enables the computer or other device to connect to the internet or other local area networks (LANs) for communication. Tablets and laptops with wireless network adapters transform computer signals into radio waves that may be sent via antenna (visible or hidden). Click Properties from the context menu of My Computer. Click Device Manager after selecting the Hardware tab. Expand Network adapter to show a list of the installed network adapters (s). In order to connect to a wireless system, a wireless adapter is a hardware component that is often connected to a computer or other desktop device.

To learn more about network adapter click the link below:

brainly.com/question/28234637

#SPJ4

Engineering and Phishing Attacks
As we move into a more digitized world after the pandemic, customers and businesses are demanding more digital experiences. With a massive amount of online transactions being made every day and the need for secured business accounts, this creates a vibrant ecosystem for cybercriminals to take advantage of. what type of social engineering targets particular groups of people?

Answers

The correct answer is Password attack. Any of the several techniques used to fraudulently login into password-protected accounts is referred to as a password attack.

Passwords continue to be the most popular authentication technique for computer-based services despite its numerous acknowledged flaws, making it simple to circumvent security measures and access vital data and systems by gaining a target's password. Attackers frequently utilise social engineering because it is frequently simpler to take advantage of individuals than it is to identify a network or software weakness. Hackers frequently start a bigger operation to breach a system or network, steal sensitive data, or spread malware by using social engineering techniques.

To learn more about Password attack click the link below:

brainly.com/question/13103250

#SPJ4

1.16.3 Tower Builderpublic class FetchKarel extends SuperKarel{
public void run()
{
move();turnLeft();move();move();move()move();turnRight();move();takeBall();turnAround();move();move()turnLeft();move();move();move();move();turnLeft();putBall();}
}

Answers

A word or command is taught to Karel using functions. By using functions, we may simplify our program by dividing it into smaller, more manageable chunks.

Functions are another key idea in programming because they let you put a piece of code that performs a specific purpose inside a defined block and then call that code whenever you need it with a single, brief command rather than repeatedly typing the same code.

public class MidpointFindingKarel extends SuperKarel {

public void run () {

 putEndBeepers();

 while (frontIsClear()) {

  takeLastBeeperWest();

  takeLastBeeperEast();

 }

}

private void putEndBeepers() {

 move();

 putBeeper();

 while (frontIsClear()) {

  move();

 }

 turnAround();

 move();

 putBeeper();

Learn more about command here-

https://brainly.com/question/3632568

#SPJ4

A device that allows you to talk to someone else in another location, is called?

Answers

A device that allows you to talk to someone else in another location is called a telephone.

 

Telephones are electronic devices that use a network of wires, cables, and other infrastructure to transmit the human voice over long distances. These devices have been in use for over a century and have undergone significant changes in terms of design and functionality. Modern telephones can be classified into several types, such as landlines, mobile phones, and VoIP (Voice over Internet Protocol) phones.

Landlines are connected to the telephone network via a wired connection, mobile phones use wireless networks, and VoIP phones use an internet connection for communication. Telephones are widely used for personal and professional communication and have become an essential part of our daily lives.

Learn more about mobile phones here: brainly.com/question/23433108

#SPJ4

What is the median salary of a cybersecurity engineer?

Answers

Answer:Rank State Avg. Salary

4 Georgia $98,217

5 Pennsylvania $93,997

6 Washington $99,206

7 Texas $95,531

Explanation:Washington gets paid better

7.26 configure static routes
press enter
SFO>enable
SFO#configure terminal
SFO(config)#ip route 10.0.0.0 255.0.0.0 172.17.12.98
SFO (config)#ip route 0.0.0.0 0.0.0.0 160.12.99.1
SFO(config)#exit
SFO#copy run start
press enter to confirm

Answers

Press enter, SFO>enable, SFO#configure terminal, SFO(config)#ip route 10.0.0.0 255.0.0.0 172.17.12.98, SFO (config)#ip route 0.0.0.0 0.0.0.0 160.12.99.1, SFO(config)#exit, SFO#copy run start, press enter to confirm

When the complexity of a dynamic routing protocol is not needed, static routing is frequently employed. Static routing works well for routes that don't change very often and have just one (or a small number of) pathways leading there. A single-homed client connecting to an upstream provider is the traditional use case for static routing. Such linkages result in the formation of a stub network.

Static routes are manually defined. A destination prefix plus a next-hop forwarding address make up the route. When the next-hop address is accessible, the static route is turned on in the routing table and added to the forwarding table. Traffic sent to the designated next-hop address matches the static route.

Learn more about Route here:

https://brainly.com/question/3632568

#SPJ4

How do you verify that a device is recognized and enabled in Device Manager?

Answers

You have a device that is malfunctioning, which is the main cause of Unknown Device appearing in your Device Manager. Get the device's driver updated to resolve this problem.

What information about a device does Device Manager provide?

A graphic representation of the hardware that is installed on your computer is shown by Device Manager. When you need to monitor and manage hardware devices and their drivers, use this utility.

In Device Manager, how can I enable devices?

Click Device Manager under Devices and Printers in the Hardware and Sound pane. Double-click the device category icon in the Device Manager window to enable the device. Click to choose the device to be enabled under the Device Manager category.

To know more about Device Manager visit:-

https://brainly.com/question/11599959

#SPJ4

when does spotify start collecting data for wrapped

Answers

Spotify begins collecting data for Wrapped when a user first creates an account on the platform.

When a user first creates an account for Spotify, the platform will start collecting data about the user’s listening habits. This data is then used to create an individual Wrapped profile for the user. Spotify will record a variety of data points including the user’s favorite artists, genres, and playlists.

The platform will also track the user’s total listening time, total number of songs listened to, and the user’s most listened to songs. All of this data is used to create an individual Wrapped profile for the user. The Wrapped profile is then used to create personalized playlists and other music-related insights.

These insights are used to help the user discover new music and artists. Additionally, the user can compare their profile with the overall Spotify Wrapped statistics to get a sense of how their listening habits compare to other users on the platform.

For more questions like Spotify click the link below:

https://brainly.com/question/14732679

#SPJ4

In vivo cross-linking supports a head-to-tail mechanism for regulation of the plant plasma membrane P-type H-ATPase

Answers

The proton-motive force necessary for the operation of all other transporters as well as for healthy growth and development is produced by a P-type proton-pumping ATPase in higher plants.

What is P-type H-ATPase?The proton-motive force necessary for the operation of all other transporters as well as for healthy growth and development is produced by a P-type proton-pumping ATPase in higher plants. The structure of the C-terminal regulatory domain of the plant plasma membrane proton pump has not been revealed by X-ray crystallographic investigations, but they have revealed information on the amino acids involved in ATP catalysis. The location of the C-terminal regulatory domain's interaction with the catalytic domains is still unknown, despite advances in our understanding of the enzymes involved in the signaling pathways that activate or inhibit this pump. Although clear chemical evidence for which amino acids are directly interacting with the C terminus is missing, genetic studies have shown that certain amino acids in different regions of the protein may be implicated.

To learn more about P-type proton-pumping ATPase refer to:

https://brainly.com/question/13472916

#SPJ4

Traverse the following tree by the in-order , pre-order nd post-order method :​

Answers

To traverse the figure in the form inorder, preorder and postorder we must change the sequence of the numbers depending on the case.

How to traverse the figure in the inorder form?

To traverse the figure in the inorder form we must carry out the following sequence, from the left subtree to the root then to the right subtree. So the numbers would be:

1 ,10 ,15,20, 22, 25, 32, 36, 43, 48, 50, 56, 58, 60, 75

How to traverse the figure in the preorder form?

To traverse the figure in the preorder form we must carry out the following sequence from the root to the left subtree then to the right subtree.

36, 25, 32, 20, 22, 10, 15, 1, 48, 43, 56, 50, 60, 58, 75

How to traverse the figure in postorder form?

To traverse the figure in postorder form we must perform the following sequence from the left subtree to the right subtree then to the root.

1, 10, 15, 20, 22, 25, 32, 75, 60, 58, 56, 50, 48, 43, 36.

Learn more about figures in: https://brainly.com/question/14982752

#SPJ1

How to fix error occurred during initialization of vm could not reserve enough space for 2097152kb object heap?

Answers

Answer:

To fix the could not reserve enough space for 2097152KB object heap error message, just change the -Xmx setting to something more conservative such as 512m or 1024m.

The sensory media through which messages are sent and received are _____________________.

Answers

Answer:

SMS

Explanation:

what was the first message sent between computers?

Answers

Answer:

the first message sent by computers was “lo”.

Explanation:

the phrase that was supposed to be sent was “login”, but the system crashed after the first two letters.

Which of the problems are unsolvable?a. Halting problemb. Boolean Satisfiability problemc. both a and bd. None of the mentioned

Answers

The halting problem is one of the more well-known unsolved puzzles. The following query is posed: A random Turing machine M over the alphabet = a, b, and an arbitrary string w over are given.

Is the halting issue intractable?

The Turing machine, a mathematical definition of a computer and programme, is a crucial component of the proof since Turing machines cannot solve the halting problem. One of the earliest instances of decision problems that were shown to be unsolvable.

The question of Boolean satisfiability: Is it insoluble?

The XOR-3-SAT problem defined by each CNF formula can therefore be solved, and based on the answer, it is reasonable to conclude either that the 3-SAT problem is solvable or that the 1-in-3-SAT problem is.

To know more about programme visit:-

https://brainly.com/question/14618533

#SPJ4

When opening and closing a security container, complete the _____.
a. SF 701
b. SF 700
c. SF 702
d. SF 703

Answers

Option c is correct. SF 702 is the answer to this question. SF 702 is used to open and close security containers. Track security containers.

The security container can be opened and closed at any time. However, if possible, security containers should only be opened for privacy and security reasons. Security containers should use all possible safeguards such as guard protection, password protection, fingerprint protection, etc. Standard Form (SF 702) – Security Container Inspection Sheet. A standard form (SF 702 Security Container Sheet) tracks who opens, closes, and inspects security containers containing sensitive information.

SF 702 or "Security Container Check Sheet" is used to record the opening and closing of the data carrier. An area check is carried out in the SF 701 after the daily check is finished. The

SF 702 must be stored and disposed of according to a component records management program. SF 702 will be stored in the NDC until the next conformance inspection by a higher level control center.

Know more about information here:

https://brainly.com/question/29244533

#SPJ4

I need help can someone please help me?
Your page should have three "divs" with the class "rectangle"

Answers

It isn’t divs=rectangle, you did it correctly below, with the div class=“rectangle”

Refer to the previous question. Program Java1210.java has an even better solution to the problem. What is it called

Answers

Refer to the previous question. Program Java1210.java has an even better solution to the problem  it is  called generics.

What is generics?Generics are types that have parameters. The goal is to make it possible for methods, classes, and interfaces to take type (Integer, String, etc., and user-defined types) as a parameter. Generics may be used to build classes that interact with various data types.A method of computer programming known as generic programming involves writing algorithms in terms of later-specified types that are then instantiated as necessary for particular types that are supplied as inputs.Stronger type-checking, the removal of casts, and the ability to create generic algorithms are all made possible by generics. Many of the things that we use in Java today would not be feasible without generics.

To learn more about generics refer to:

https://brainly.com/question/28564198

#SPJ4

What has happened when the system boots, but the memory count is incorrect?

Answers

Answer: Try taking the memories out of the slot and passing a rubber over the connector parts, maybe it will work normally.

Explanation:

what family of technology helps us gather, store, and share information?

Answers

Answer:

ITC’s are the family of technology

Explanation:

:)

Elton started his own tree trimming business. When a tree limb accidentally fell on a customer’s house, they sued Elton for a million dollars and won. Elton lost everything in the lawsuit—his home, his car, and his life savings. What type of business structure did Elton MOST likely use?

A.
limited liability partnership (LLP)

B.
limited liability company (LLC)

C.
corporation

D.
sole proprietorship

Answers

Answer:

D

Explanation:

2. Write a program code using if...else if...else statement asking the user to enter an option between "Fiction" or "Nonfiction" books using upper case function. Accept number of copies from the user. Calculate and display the total price based on the following table Note: Total Price = Rate per book X No of copies


fiction 50
non fiction 30
other invalid​

Answers

Answer:

option = input("Enter 'Fiction' or 'Nonfiction' book: ").upper()

copies = int(input("Enter number of copies: "))

if option == "FICTION":

   rate_per_book = 50

   total_price = rate_per_book * copies

   print("Total price for " + str(copies) + " copies of fiction book: " + str(total_price))

elif option == "NONFICTION":

   rate_per_book = 30

   total_price = rate_per_book * copies

   print("Total price for " + str(copies) + " copies of nonfiction book: " + str(total_price))

else:

   print("Invalid option")

This code uses an if...elif...else statement to check the user's input for the option of "Fiction" or "Nonfiction" books. The input is converted to upper case using the upper() function to ensure that the user's input is not case-sensitive. The number of copies is accepted from the user as an integer, and the total price is calculated based on the rate per book and the number of copies. The total price is then displayed. If the user enters an invalid option, the code will print "Invalid option".

Explanation:

where may you learn more about comparing and contrasting jiskha

Answers

You can learn more from diving and searching it in the internet. There alot of journal or website that review something, including jiskha.  

What is internet?

Internet is a worldwide system of computer networks that connect a computer one in another around the world. The computer in this term is not only for a CPU but also all the device that can compute and connect to the network such as handphone, android, tablet and laptop.

Because of you are looking for jiskha comparing and contrasting, you might use this keyword to find a website or journal contains that information:

Jiskha reviewJiskha advantageJiskha disadvantage

Learn more about internet searching here

https://brainly.com/question/512733

#SPJ4

Design a four-bit synchronous counter with parallel load. Use T flip-flops, instead of the D flip-flops used in Section 5.9.3.

Answers

A 4-bit Synchronous Down Counter begins counting from 15 (1111 in binary) and decreases or counts down to 0 or 0000 before being reset to begin a new counting cycle. The AND Gate input changes in a synchronous down counter.

Do D flip-flop counters synchronize?

Chronological counter (D flipflops) a carry-input (count-enable) and carry-output 4-bit synchronous flip-flop-based counter. The flipflops in this circuit all change states simultaneously because a single clock signal is directly coupled to each flipflop.

A 4-bit synchronous up counter: how is it created?

four-bit synchronized UP counter JK flip flops were used in the design of the 4 bit up counter displayed in the diagram below. Each flip flop has a parallel connection to an external clock pulse. JK flip flop is recommended for designing the counters.

To know more about synchronous counter visit:-

https://brainly.com/question/29664785

#SPJ4

Calculate the charge flow if the energy transferred is 5. 25kj and the potential difference is 15 volts.

Answers

The charge flow if the energy transferred is 5.25 kJ and the potential difference is 15 volts is 350 Coulomb.

The charge flow can be calculate as follows:

The effort required to shift a unit charge from one location to another is a potential difference. It comes from:

V = E/Q

Where V is potential difference, E is energy and Q is charge. Given that:

V = 15 V, E = 5.25 kJ = 5.25 * 10³ J.

V = E/Q

15 = 5.25 * 10³ /Q

Q = 350 Coulomb

Therefore, 350 Coulomb of charge flow results from a 5.25 kJ energy transfer and a 15 volt potential differential.

Learn more about charge at https://brainly.com/question/92510

#SPJ4

Answer:350

Explanation:

Hyperspace toolbar
Lists the menu options most frequently accessed by a user. In addition to buttons for your most common workflows. Includes the Print and Logout buttons.

Answers

The hyperspace toolbar contains menu command shortcuts that are utilized frequently; click once to open the selected toolbar option.

The toolbar options can also be opened by using the keyboard; hold down the "Ctrl" key while selecting numbers 1 through 9, starting with "Appts" as number 1. To open the appointment desk, press and release #1 while holding down the Ctrl key. The main end-user interface for Epic, hosted on Citrix, is called Hyperspace, and it acts as the gateway to all other Epic apps. Users of Epic are undoubtedly accustomed to the Hyperspace login page. Depending on their individual jobs, Hyperspace users see distinct menus, tasks, and alternatives after logging in.

Learn more about Hyperspace here:

https://brainly.com/question/28265866

#SPJ4

Why is it important to take precautions such as turning off a computer and discharging electricity before
opening the case on a computer?
O The case requires battery operation only when being opened.
O The case is locked until the computer is unplugged.
/
O Memory will be lost if the case is removed while connected to electricity.
O The internal components are static sensitive.

Answers

The reason why is it important to take precautions such as turning off a computer and discharging electricity before opening the case on a computer is: "The internal components are static sensitive." (Option D)

What is the rationale for the above response?  

It is important to take precautions such as turning off a computer and discharging electricity before opening the case on a computer because the internal components of a computer are sensitive to static electricity.

Static electricity can build up in the body or in clothing and can cause a discharge of electricity when in contact with sensitive electronic components. This discharge can damage or destroy the components, leading to the malfunctioning or failure of the computer.

By turning off the computer and discharging any residual electricity, the risk of a static discharge is minimized.

Learn more about static sensitive at:

https://brainly.com/question/18354578

#SPJ1

Can someone please help me answer this question?
Which programming language is the best? State reason.

Answers

Answer:

for me I think it is English

Explanation:

because I people don't know how to speak the programed computer can easily translate the language you know to English for people how don't no your language

Answer:

There is no single “best” programming language as each language has its own strengths and weaknesses that make it better suited for certain tasks than others. Different languages may have different goals and purposes, so the best language for a particular project will depend on what the project is trying to accomplish. For example, if the project requires a lot of web development, then a language like JavaScript may be the best choice whereas if the project requires a lot of data analysis, then a language like R or Python may be the best choice. Ultimately, the best language for a given project depends on the specific requirements of the project.

Explanation:

There is no one "best" programming language; the choice of language depends on the specific task or project at hand. Each programming language has its own strengths and weaknesses, and the most appropriate language for a given task can vary depending on factors such as the type of application, the skills of the development team, and the resources available.

It's worth noting that many popular languages like Python, JavaScript, and C++ are general-purpose and can be used to build a wide variety of applications. Some other languages like R, SQL, and Julia are specialized in specific areas like data analysis or databases.

Ultimately, the most important thing is to choose a language that your team is comfortable working with and that is well-suited to the task at hand.

With 802.1Q trunking, frames from the native VLAN are not tagged. Frames from all other VLANs are tagged.
If the native VLAN on one end of the trunk is different than the native VLAN on the other end, the traffic of the native VLANs on both sides cannot be transmitted correctly on the trunk.
The native VLAN is VLAN 1 by default, but may be configured.

On each switch, use the following commands to complete this lab:
SwitchA>ena
SwitchA#conf t
SwitchA(config)#int range gi 0/1 - 2 SwitchA(config-if-range)#switchport trunk native vlan 10
(press Ctrl + Z)
SwitchA#copy run start

Answers

A frame is dropped by an 802.1Q trunk port if it receives a tagged frame with the same VLAN ID as the native VLAN. Therefore, when setting devices on a switch port on a Cisco switch,

Configure them so that they don't deliver tagged frames on the native VLAN.

I saw this in a course material for the Cisco Networking Academy: "A frame is dropped by an 802.1Q trunk port if it receives a tagged frame with the same VLAN ID as the native VLAN. Therefore, when setting devices on a switch port on a Cisco switch, configure them so that they don't deliver tagged frames on the native VLAN."

I attempted to test it on Packet Tracer, but the outcome is not what I expected.

I employ this topology DeviceInterface f0/1Interface f0/2Switch CTrunk port: PC A -> f0/2 Switch C f0/1 -> f0/1 Switch D f0/2 -> PC E. VLAN 20Switch DTrunk port, VLAN 10Access port native. Access port VLAN 20 Native VLAN 20

Then I used my PC to send a broadcast ping request.

Learn more about VLAN here:

https://brainly.com/question/14530025

#SPJ4

Which of the following best describes what a thesis for a historical essay should be?


A.

a well-researched fact

B.

a summary of an event

C.

an interpretive claim

D.

an uncontestable statement

Answers

Answer:

C. an interpretive

Explanation:

Other Questions
Thorium-234 has a half-life of 24 days. How many grams of thorium-234 would remain from 100 g after 72 days? Show your problem-solving technique. Two charged spheres 10 cm apart attract each other with a force of 3.0 x 10^-6 N. What electrostatic force will result if both charges are doubled and the distance remains the same? Fix the dependent clause below to make it a complete sentence:Whenvever I forget my jacket. Please help, Find the perimeter Why did the United States support independence for Panama in the early 1900's?Please help What would be the y- intercept for the function y=3x-6? Can you please help me on this it says fully simplify using only positive exponents 5x8y7/25x4y GRADE 7 MATHEMATICS (QUARTER 2)SUBJECT TEACHER:GENERAL INSTRUCTIONSCORE:Read and analyze carefully the given questions.IL You may refer to your module pages 22 - 27.Directions: Choose the letter of the best answer and write in the space provided before the number,1. In the expression x2, 2 is what we callA BaseB. ExponentC. MultiplyD. Divide2. Find the product of (x) (**)A x?B. 22D. X3. What is the product if 2x is multiplied by 5x?A 10xB. 7x2C. 10xD. 3x4. Divide 32a9bc2 by 4a-0%A. 8a+b+c2B. 8ac2 C. 8a 0042D. Sa+bc5. Multiply 2x by 13xyA. 26xyB. 26x3y2C. 26xD. 26xy6. What is the product of 2x3 +3x2 + 4x and x + 1?A 2 + 2x + 3x2 + 4x B. 2X* + 5x + 7x2 + 4x C. 5x + 7x3 + 4x + 2x D. 7* *4x3 + 2x + 5x7. What polynomial is obtained if 27x*y* + 18x2y3 + 9x^y is divide by 3xy?A 9xy + 6x2y3 + 3y B. 9xy + 6x3y C 9xy + 18xy + 6xD. 9x+y + xy + 3x8. What expression will satisfy the given statement: (a + 3)(_) = a + 6a + 9A a-3B. -3-aC. a + 3D. -3 + a9. Find the product of (x-1) and (x + 1).A x + 1B. X?- 1c. x + x + 1D. X2 - x + 110. What will be the first term of the product of (2x - 1)?A 4x2B. 4xC. 1D. 2x11. Multiply (4y - 5d) (4y + 50)A. 16y2 + 2502B. 4y + 50 C. 16y2 - 25d2D. 4y - 5012. Evaluate ( x - 3)(x2 + 3x + 9)A. x2 - 81B. x - 27C. X + 9x + 27D. X - 9x + 2713. Solve (x-6)A. x2 + 12x - 36B. x2 + 36 C. X2 - 36D. x2 - 12x + 3614. What is the area of the square whose side is 2x + 5?A 4x2-20%-25 B. 4x2 - 20x + 25 C. 4x2 + 20x - 25D. 4x2 + 20x + 2515. Evaluate (x + 4)'A x + 12x2 + 48x + 64 B. X- 12x2 - 48x - 64 C. X - 12x2 + 48x - 64 D. x + 12x2 - 48x + 64GRADE 7 MATHEMATICSQUARTER 2 (WEEK 7-8)Directions: Choose the letter of the best answer and write in the space provided before the number. This circle graph shows how Jimmy spent his time during the last 24 hours.How much more time did he spending watching T.V. and Talking on the Phone than he did Going to School?8 hours5 hours1.92 hours1.2 hours find the area of the figure. what is the reasoning for the constant feeling of a lump in your throat ?? what are the causes of environmental change? A 50-mm cube of the graphite fiber reinforced polymer matrix composite material is subjected to 125-kN uniformly distributed compressive force in the direction 2, which is perpendicular to the fiber direction (direction 1). The cube is constrained against expansion in direction 3. Determine: a. changes in the 50-mm dimensions. b. stresses required to provide constraints. What do the men discover during their captivity in chapter 13?They discover a world of living beings inside the cavernous interior of the moon.They discover that the Selenites are able to learn their language.They learn that the Selenites have found their sphere and they are trapped.They realize a partnership will never work, and they should each go their separate ways. What force causes a resistance in motionwhen two surfaces are touching? 3. Consider a large windmill 30m in diameter. On a windy day, suppose that the windmill entrains a stream of air at a speed of 40 mph. Downstream of the windmill, the entrained stream exits over a large diameter at a speed of 20 mph. The pressure is 2atm at the inlet and equals atmospheric pressure at the outlet. Find the power (in megawatts) generated by the windmill. Density of air is 1.2 kg/m3 URGENT COMPLETE THIS Review Conceptual Example 8 before starting this problem. A block is attached to a horizontal spring and oscillates back and forth on a frictionless horizontal surface at a frequency of 3.96 Hz. The amplitude of the motion is 5.95 x 10-2 m. At the point where the block has its maximum speed, it suddenly splits into two identical parts, only one part remaining attached to the spring. (a) What is the amplitude and (b) the frequency of the simple harmonic motion that exists after the block splits What lower body exercise do you prefer? *SquatsJumping Lunges How were the tsar and his family executed