How do you find the average of a list in Python?

Answers

Answer 1

Answer:

using the Len() and sum() in built- function and using the mean() function from the statistics module


Related Questions

The substance of in the cylinder that you can not see sbd prevents

Answers

Welded The substance of in the cylinder that you can not see sbd prevents

The substance inside a welded cylinder will depend on the specific application and requirements of the cylinder. In general, the cylinder will contain a fluid such as hydraulic oil or a compressed gas such as nitrogen. The purpose of the fluid or gas is to create pressure that drives the movement of the piston or plunger within the cylinder. There are many different types of cylinders, and each one could potentially contain a wide range of substances depending on its purpose and function. Additionally, there may be substances that are invisible to eye, but it is unclear what you are specifically asking about.

Learn more about substance here:

https://brainly.com/question/24372098

#SPJ4

which sql statement is used to extract data from a database?

Answers

In SQL, data is extracted from a database using the SELECT statement. Here is an illustration of how it can be applied: SELECT column1, column2, column3, AND some column = some value FROM table name;

How does SQL data extraction work?

To extract data from a single table, use the SELECT statement with the FROM and WHERE clauses. The fields from which you want to extract or show the data are listed in the SELECT clause.

What are the methods for data extraction?

There are two alternatives for extraction methods: logical and physical. Full Extraction and Incremental Extraction are the other two options available for logical extraction. Direct data extraction from the source system is done all at once.

To know more about database visit:-

https://brainly.com/question/3804672

#SPJ4

What does a remote access server use for authorization? Remote access policies
A. SLIP or PPP
B. CHAP or MSCHAP
C. Usernames and passwords

Answers

Users can log in to the system remotely using credentials that are saved on an outside authentication provider.

Which authorization protocol is used?

Access-protected resources can be obtained via authorization protocols like OAuth2 and UMA, which eliminate the need for the resource owner to divulge their login information. An essential component of these protocols is interactive user permission.

What enables server remote access?

Any hardware and software combination that enables the remote access tools or information that normally resides on a network of IT devices is known as a remote access service (RAS). A remote access server, also referred to as a host computer, connects a client to it.

To know more about authorization visit:-

https://brainly.com/question/9560827

#SPJ4

What types of questions do Boolean functions answer? Is the total cost of the trip within budget? Does the Boston trip cost more then the New York trip? Is travel the largest component of the total cost of the trip? Was last year's income greater than this year's income? all of the responses listed are the types of questions Boolean functions can answer

Answers

A boolean function is a mathematical function that translates parameters to a value, where the range (the function arguments) and domain (the function itself) have only certain permissible values.

What Boolean operators does the if function in Excel support?

The AND, OR, NOT, and a new function called XOR are examples of boolean operators, which Excel refers to as logical functions. These operators can be used in databases, spreadsheets, search engines, and any other situation where you're looking for specific information to narrow, expand, or exclude your findings.

What is a Boolean function?

Working with variables whose values are either 0 or 1 requires the use of a set of rules and procedures known as boolean algebra. In terms of propositional logic, the value 0 is equivalent to the letter F. 1. T is corresponding to the number 1.

To know more about  Boolean functions visit:-

https://brainly.com/question/640040

#SPJ4

How do you do a Jeopardy game on PowerPoint?

Answers

Online, you can also find pre-made Jeopardy templates that you can download and modify to meet your particular game.

You can follow these instructions to make a Jeopardy game in PowerPoint: Create a new presentation by launching PowerPoint. Give each question a point value and make a slide for each Jeopardy category. For every query, make a slide that conceals the response. By including hyperlinks, connect the slide for the query to the slide for the category. Assign a point keeper to each team after dividing the players into groups. Choose a category and a point value before the game begins. Let the teams react after displaying the matching question slide. Display the solution once a team has responded, and if it is correct, provide points. Play on until you've answered every question or the timer goes out, whichever comes first.

learn more about Jeopardy here:

brainly.com/question/6269472

#SPJ4

what desktop operating system is most likely to get infected with a computer virus?a. Linuxb. Mac OSc. Windows Phoned. Microsoft Windows

Answers

Answer: Microsoft Windows

Explanation: This operating system has very little build in security which makes it highly vulnerable to viruses. This is one of the reasons why there are so many windows anti virus software out there.

help me answer this economic question

Answers

1. Government discourages monopoly in order to create competition and allows demand and supply to function normally. The Option C is correct.

Why do most Government discourages monopoly?

Monopolies are discourgaes in free-market economies because they stifle competition and limit consumer substitutes. Antitrust legislation is in place in the United States to limit monopolies, ensuring that one company cannot control a market and then exploit its customers.

2. A market dominated by a few large powerful firm that produce between 70 and 80 percent of the total output is known as oligopoly. The Option B is correct.

What does oligopolistic market means?

Oligopolistic markets are characterized by a small number of suppliers. They can be found in all countries and in a wide range of industries. Some oligopoly markets are highly competitive, while others are significantly less so, or appear to be.

Read more about monopoly

brainly.com/question/5832236

#SPJ1

what is considered specifying the location of a file or directory from the root directory?

Answers

A file or directory's location from the root directory (/) is specified by an absolute path.

What is the root directory's directory path?

How can I locate the root folder for my store? Your store's root folder is typically found in the "home" folder. To reach your root directory directly, use the path "/sub folder/site root folder" if you can't find it.

What do you refer to as a file's location in the path directory?

Through the file system tree structure, each file and directory can be reached by a distinct path, also referred to as the path name. The path name indicates where a directory or file is located in the file system.

To know more about root directory visit:

https://brainly.com/question/17009330

#SPJ4

what the questions critical thinking chapter 4 quizlet?

Answers

In general, Quizlet is a website that provides a platform for creating and sharing study materials such as flashcards, quizzes, and games.

In the context of a critical thinking chapter 4 Quizlet, the study materials may focus on topics related to critical thinking skills such as problem-solving, decision-making, reasoning, and argumentation. The set may include sample questions and answers, definitions of key terms, and explanations of key concepts. The goal of the set would be to help students develop and improve their critical thinking skills by providing them with tools and resources for studying and practicing these skills.

Unfortunately, I cannot provide a direct answer to this question as the content of Quizlet sets can vary widely and change over time. Additionally, without knowing the specific Quizlet set being referred to, it is difficult to provide a comprehensive answer.

To know more about website visit:

https://brainly.com/question/19459381

#SPJ1

- If a story was on a TV newscast instead of in written
form, how would it be different?

Answers

If a story was on a TV newscast instead of in written form, it would likely have a number of differences, including:

How different would they be?

Visuals: On TV, the story would be accompanied by images, video, and graphics that help to illustrate the events and make them more engaging to the audience.

Brevity: TV newscasts are typically shorter than written articles, so the story would need to be presented in a more concise and to-the-point manner.

Tone: The tone of the story would likely be more dramatic and attention-grabbing, as TV newscasters often use dramatic music, sound effects, and emotive language to grab the viewer's attention.

Storytelling Techniques: TV news stories often use various storytelling techniques, such as sound bites from people.

Read more about stories here:

https://brainly.com/question/24292088

#SPJ1

How we built our online Python compiler?

Answers

Setting up a server, designing a user interface, and developing a code execution engine are just a few of the crucial processes involved in building an online Python compiler.

Users can write, test, and run Python code in a web browser using an online Python compiler. Without the need for local software installation, it provides a practical and accessible solution for both novice and seasoned developers to explore with Python programming. A code editor, a console for displaying output, and functions like syntax highlighting, code completion, and error detection are generally included in online Python compilers. They might also assist with third-party frameworks and libraries. There are both free and paid online Python compilers available, and some of them have features that let multiple users collaborate on code.

Learn more about online Python compiler here:

https://brainly.com/question/30401995

#SPJ4

How to fix error: error:0308010c:digital envelope routines::unsupported

Answers

Fix Take away any external gadgets, reinstall the drivers, To fix, use the Windows Update Troubleshooter. Delete any third-party software, Repair, the disk, and Deactivate network adapters.

What does a computer driver do?

A driver is essentially a piece of software that enables communication between an operating system as well as a device.

What do psychologists mean by drivers?

Drivers are signals from our parents that we integrate as dysfunctional problem-solving techniques when we are still young. In order to reestablish our equilibrium when we feel questioned about our fundamental OK-ness, we engage them. However, the consequence might have short-term or long-term negative effects.

To know more about drivers visit:

https://brainly.com/question/29851057

#SPJ1

I need the code to run this expected output in Java and I need it explained, please. (ignore the code I have)

Answers

The revised code that would help get the output you need is given below:

The Program

using System;

public class HelloWorld

{

   public static void Main(string[] args)

   {

       int num1 = 10, num2 = 100;

       bool bool1  = num1 < 25;

       Console.WriteLine (bool1);

       bool bool2 = (num2 != 15 && num2 != 7);

       Console.WriteLine (bool2);

       bool bool3 = (num2 % 2 == 0 && num2 > 0);

       Console.WriteLine (bool3);

       bool bool4 = (num1 >= 25 && num1 <= 35);

       Console.WriteLine (bool4);

       bool bool5 = (num2 > num1 && num2 != 10 && num2 != -2);

      Console.WriteLine (bool5);

   }

}

Read more about programs here:

https://brainly.com/question/26134656

#SPJ1

what transport protocol/ports do dns and dhcp use?

Answers

The uses of transport protocol/ports do dns and dhcp are described.

What is DNS?

DNS (Domain Name System) and DHCP (Dynamic Host Configuration Protocol) use different transport protocols and ports.

DNS primarily uses the User Datagram Protocol (UDP) as its transport protocol, although it can also use TCP. DNS uses port 53 for both UDP and TCP traffic. Most DNS traffic uses UDP, but if a DNS response exceeds the maximum length of a UDP packet (512 bytes), it will use TCP instead.

DHCP primarily uses UDP as its transport protocol. DHCP uses port 67 for the DHCP server and port 68 for the DHCP client. When a device requests an IP address via DHCP, it sends a broadcast packet to the local network on port 67.

The DHCP server receives the broadcast packet and responds on port 68 with an offer of an available IP address. The client then sends a request for that IP address, and the server sends an acknowledgement back to the client to confirm the assignment of the IP address.

To know more about Domain visit:

brainly.com/question/30408285

#SPJ4

What are the margins for Navy correspondence manual?

Answers

The Navy Correspondence Manual, which is the accepted manual for structuring and drafting Naval mail, specifies the margins for Navy correspondence.

The gap or separation between a page's edge and any text or images that are printed on it is referred to as a margin. They do a variety of tasks, such as assuring readability, allowing space for notes, and framing the information. Moreover, margins can be used in layout and design to add visual appeal and balance. To guarantee consistency and adhere to formatting standards, margins are often controlled and regulated in academic and professional writing. Moreover, the term "margins" can be used metaphorically to denote the outside limits or borders of anything, such as the profit margins of a business or the boundaries of an individual.

Learn more about margins here:

https://brainly.com/question/30156555

#SPJ4

what is amadeus selling platform connect

Answers

Amadeus Selling Platform Connect is a cloud-based platform that gives travel agents access to travel content and various features, including ticketing and itinerary management.

Amadeus Selling Platform Connect is a cloud-based travel agency platform that provides access to various travel content, such as flight schedules, hotel rates, car rentals, and other travel-related services, allowing travel agents to make bookings and reservations for their clients. It also offers a range of features, including ticketing, fare quoting, itinerary management, and reporting tools. The platform is designed to be user-friendly and offers a customizable interface to suit the individual needs of travel agencies of all sizes. It provides real-time access to the latest travel information, enabling agents to provide the best possible service to their clients.

Amadeus Selling Platform Connect is developed by Amadeus IT Group, a leading provider of technology solutions for the travel industry. The platform is available to travel agents around the world and can be accessed via web browser or mobile devices, making it a flexible and convenient option for agents who need to work on the go. Additionally, it offers integration with other Amadeus products and third-party solutions, allowing travel agents to streamline their workflow and improve efficiency. Amadeus Selling Platform Connect is regularly updated with new features and functionality, ensuring that travel agents have access to the latest technology to meet the evolving needs of their clients.

Learn more about travel agents here:

https://brainly.com/question/22212490

#SPJ4

What are two types of system encryption options using VeraCrypt?

Answers

The two system encryption options using VeraCrypt are "Encrypt the Windows system partition," and "Encrypt the entire system drive".

What is VeraCrypt?

Data encryption is offered for Windows, macOS, and Linux via the free and open-source encryption program VeraCrypt.

Both entire drives or partitions as well as specific files or folders can be encrypted using this method.

VeraCrypt provides two choices for system encryption:

When you select "Encrypt the Windows system partition," only the partition on which Windows is installed is encrypted; all other partitions are left unencrypted.By selecting "Encrypt the entire system drive," the entire hard disk, including all partitions and data, is encrypted.

Thus, these are the system encryptions using VeraCrypt.

For more details regarding encryption, visit:

https://brainly.com/question/30530076

#SPJ1

how about using subtotals that only work if you have numeric data to accumulate into subtotals and there are categories of data that have repeating items.?

Answers

This makes it easy to perform calculations like subtotals, averages, and other calculations to help you summarize and analyze your data.

What is summarize ?

Summarize is a form of writing in which the main idea of a text is re-expressed in a shorter form. Summarizing is an important academic skill that involves taking a large amount of information and condensing it into a few sentences or a paragraph. Summarizing allows readers to quickly identify the main points of a text, which can be helpful when studying for exams or understanding complex material. Summarizing also helps improve writing skills by teaching readers to prioritize important information and identify key topics.

To learn more about summarize

https://brainly.com/question/30469689

#SPJ4

How do I fix Task Manager disabled by administrator?

Answers

There are a few actions you can take to re-enable the Task Manager if the administrator on your computer has deactivated it, By entering "regedit" into the Windows search bar and choosing the relevant result, you can access the Registry Editor.

The Windows operating system's Task Manager is a system utility application that enables users to track and manage the activities taking place on their computer. It offers real-time data about the computer's running programmes, network activities, and consumption of the CPU, RAM, and disc. You can use Task Manager to halt unneeded or unresponsive tasks, prioritise activities, and check comprehensive performance information. Additionally, it can be used to diagnose performance issues, stop or enable startup items and services, and monitor a computer's launch procedures. System administrators and advanced users who need to manage and improve their system performance might benefit from Task Manager.

Learn more about Task Manager here:

https://brainly.com/question/3692413

#SPJ4

A user interface is the portion of the application that allows the user to control and to interact with the program.A. TRUEB. FALSE

Answers

The area of the application that enables the user to interact and control the software is known as the user interface. TRUE.

Is the user interface the part of the application that lets the user interact and control the software?

The point of interaction and communication between people and computers is the user interface of a device (UI). This group may include desktop monitors, keyboards, mice, and other pointing devices. Additionally, it explains how a user engages with a software or website.

What does the user interface make up?

The component of the machine that manages human-machine interaction is known as the user interface or human-machine interface. Examples of the tangible components of the Human Machine Interface that we can feel and touch include membrane switches, rubber keypads, and touchscreens.

To know more about user interface visit:-

https://brainly.com/question/23682502

#SPJ4

The DELETE statement is used to delete existing records in a table. True/False?

Answers

A DML (Data Manipulation Language) instruction is DELETE. With this command, records from a table are deleted. It is not used to remove a table from the database; rather, it is only used to delete data from a table.

Does the Remove command delete tables?

The Data Manipulation Language, a subset of SQL that enables the alteration of data in databases, includes the Delete command. Existing records in a table can be deleted with this command. You can use this to either delete all the records from a table or selected records based on a criterion.

To eliminate every row from a table, which statement should be used?

Always use TRUNCATE TABLE to remove every record from a table. It is quicker to use TRUNCATE TABLE than.

To know more about DML visit:-

https://brainly.com/question/13441193

#SPJ4

how to popen python folder

Answers

One of the ways to open a python folder is through a platform. This task is done using Visual Studio.

First, we need to launch Visual Studio 2022. This is done through the start window. The next step is to select the Open option which is at the bottom of the Get started column.

Another way is if Visual Studio is already running, you need to select the File > Open > Folder command instead. Now user needs to Navigate to the folder containing your Python code, then choose Select Folder.

Another way to open a python can be done through the command line.

Learn more about Python at:

https://brainly.com/question/30401479

#SPJ4

which protocol is responsible for delivering packets to the right computers?

Answers

The Internet Protocol (IP) is responsible for delivering packets to the right computers on a network.

What is the IP?

IP is a network layer protocol that provides a unique address, known as an IP address, to every device connected to the network.

When a packet is sent, it contains both the source and destination IP addresses, allowing routers and other networking devices to direct the packet to its intended destination based on the destination IP address.

In this way, IP provides the necessary addressing and routing functions to ensure packets are delivered to the correct device on a network.

Read more about internet protocol here:

https://brainly.com/question/17820678

#SPJ1

what does the preprocessor command #include my-functions.hpp do?

Answers

To include the contents of a header file in the source code of your application, use the preprocessor directive include with "my-functions.hpp."

What does the C include preprocessor directive do?

The C preprocessor is told by the include directive to start with the first section of the original file before including the contents of the file that was supplied as part of the compiler's input stream. Declarations of variables, functions, and macros are typically seen in header files.

What use does the preprocessor instruction include serve?

The include directive instructs the preprocessor to accept and immediately insert the text of a file into the currently open file. Are statements are frequently inserted at the start of a programme.

To know more about preprocessor visit:-

https://brainly.com/question/28390245

#SPJ4

how to display the contents of the comments in the current document in simple markup?

Answers

Depending on the structure of the document and the programming language used to analyse it, there are many ways to display the contents of comments in a document.

In a Word document, how do you display comments?

Simply click the Comments button in the top-right corner of your Word window to transition between the contextual view and the Comments pane.

Which command enables you to browse comments and keep track of edits made to a document?

To the right of the Track Changes command on the Review tab, select the Display for Review command. Choose your preferred choice from the drop-down menu.

To know more about document visit:-

https://brainly.com/question/13406067

#SPJ4

what devices do not need device drivers to be manually installed?

Answers

Electronic devices that are plug-and-play begin operating as soon as they are connected to the host device (computer) because no device drivers need to be installed manually on the host device (computer).

Plug-and-play (PnP) :

It can be defined as a technology that is designed and developed to allow an operating system (OS) of a computer to automatically detect and configure a peripheral (input and output device) when they are connected to the computer.

On a related note, a plug-and-play device is an electrical device that can function as soon as it is connected to the host device (computer) since no device driver needs to be manually installed on the host device (computer).

Examples of plug-and-play devices in technology and computers include the following:

External hard-drive

Computer monitor

Keyboard

Web-cam

Mouse

Learn more about plug-n-play devices, visit:

brainly.com/question/17402566

#SPJ4

What is the ICD-10 code for driver injured in MVA?

Answers

Driver hurt in initial impact with unnamed motor vehicles in a traffic accident; ICD-10-CM Diagnosis Code V49. 40XA.

What codes are used to describe injuries?

The V00–Y99 External Cause Codes in the ICD-10 are supplementary codes that record particular information regarding an injury or health occurrence.

When coding injuries, which code is executed first?

When there are multiple burns, start sequencing with the code that represents the burn with the highest degree. Sequence the code that represents the burn with the highest degree first when the admission or encounter is being made for the purpose of treating multiple exterior burns.

To know more about code visit:-

https://brainly.com/question/17293834

#SPJ1

A _____ is a computer employed by many users to perform a specific task, such as running network or Internet applications.
A) cache
B) register
C) server
D) bus

Answers

A c) server is a computer employed by many users to perform a specific task, such as running network or internet applications.

Servers are central to modern computing and are used in a variety of settings, including businesses, government agencies, and educational institutions. They are designed to handle the demands of multiple users and provide a reliable and secure platform for running applications and storing data.

Some common types of servers include web servers, database servers, file servers, and email servers. These servers are responsible for serving up web pages, storing and retrieving data, providing access to shared resources, and delivering emails, among other tasks.

Learn more about server: https://brainly.com/question/7007432

#SPJ4

a software developer wants to create an application that will work on windows and apple ios operating systems. what can the developer do to make this task easier?

Answers

Use the API of each operating system. Python is a general-purpose programming language commonly used to build websites and mobile applications.

What is Python, a popular universal programming language to create?

Python is a computer programming language commonly used to build websites and software, automate tasks, and perform data analysis. Python is a general-purpose language. H. It can used to create a wide variety of programs and is not specific to any particular problem.

Who developed the Python programming language?

Guido Van Rossum

The idea of ​​Python was developed in the late 1980s by Guido van Rossum at his Centrum Wiskunde & Informatica (CWI) in the Netherlands. It was considered the successor to the ABC programming language. It was inspired by his SETL and was able to provide excellent handling and interfacing with the Amoeba operating system.  

To know more about Python visit here:

https://brainly.com/question/30391554

#SPJ4

Identify the following as being an advantage or not being an advantage of rfid systems used by zara.
a. Can reduce the time needed to take store inventory b. Can help find a product a customer wants that isn't available in store
c. Can eliminate the need for PoS systems
d. Can lower advertising co

Answers

The advantages of RFID system used by Zara are that it can reduce the time needed to take store inventory, and can help find a product a customer wants that isn't available in store.

It can eliminate the need for POS systems, can lower advertising costs are NOT an advantage of RFID systems used by Zara

Radio Frequency Identification System is referred to as an RFID system. It is an "Identification system employing wireless communication" that enables data to be transferred between "Antenna (or Reader/Writers)" and "RF Tags (or Data Carriers)," which are held by people or affixed to things. A radio communication system, in a sense.

There are several uses for RFID systems including consolidated administration of things and information is possible with an RFID system.

The following applications make up the majority of the uses for RFID in a production plant.

Workplace training (destination instruction)management of history (production history, work history, inspection history, etc.)ID (identification) typically refers to the specific identification of individuals or things.RFID is used to identify objects, just like barcodes and two-dimensional codes.Fingerprints and the iris of the eye are examples of biometrics used to identify persons in a unique way.

The identification system is known as ID system. It is a method for reading and recognizing data on people and things, including AIDC (Automatic Identification & Data Capture).

AIDC uses devices that combine hardware and software to identify data acquired from media such as barcodes, 2-dimensional codes, RFID systems, iris, fingerprints, voice, etc. without the need for human participation.

To learn more about RFID system click here:

brainly.com/question/25705532

#SPJ4

Other Questions
PLEASE HELP MEEEEEEEWrite an analysis essay based on camera angles such as close-up shots used in the movie Edward Scissorhands. Your essay should focus on the ways in which Tim Burton uses camera angles across films to achieve the desired effect. developing problem-solving skills in the hospital setting is important and can take place with the following step: This model recognizes that important relationships exist between people who may have conflicting views on various issues. in the selection from silent spring, who or what is responsible for the white powder that has fallen on the town and its surroundings? what is fl oz in l conversion? How does a reverse osmosis water purification system operate? (1 point) 1. Untreated water is subjected to low pressure, causing it to move through a highly permeable membrane, which captures contaminants. 2. Untreated water is subjected to high pressure, causing it to move through a highly permeable membrane, which captures contaminants. 3. Untreated water is subjected to low pressure, causing it to move through a semi-permeable membrane, which captures contaminants. 4. Untreated water is subjected to high pressure, causing it to move through a semi-permeable membrane, which captures contaminants, 1. Exercise 4E Write the following scales in the form of 1:n, where n is a whole number. (a) 5 cm represents 4 m (c) 5 cm represents 4 km (d) 4 cm represents 5 km Fill in the blank. "The organization most likely to result from the impact of IT is the ____________ Organisation" in the context of tree-building, what do we mean when we say parsimonious? Cheryl is a social worker who wants to do the best she can for her clients. She has gotten into the habit of saying yes to requests from her clients no matter how impractical those requests are. Which skill has Cheryl MOST likely overused? A. collaboration B. professionalism C. flexibility D. follow-through What is Ralph Corporation's margin of safety in dollars? Margin of Safety in dollars = Total budgeted (or actual) sales - Break-even sales Which of these statements best describes an element? An element is composed of three subatomic particles. An element is formed when two atoms of the same kind are bonded together. An element is formed when two or more different atoms combine chemically. An element is composed of identical atoms. WORKSHEET - STEM-CHANGING VERBS Complete the following sentences with the correct form of the stem-changing verb. 1. Yo ______________________ una Coca~Cola. (querer) 2. Nosotros ______________________ una limonada. (preferir) 3. A qu hora ______________________ la clase? (comenzar) 4. T ______________________ hambre? (tener) 5. A qu hora ______________________ Uds.? (volver) 6. Nosotros ______________________ muy tarde. (volver) 7. En el invierno no ______________________ mucho aqu. (nevar) 8. Pero en la primavera, ______________________ mucho. (llover) 9. ______________________ Ud. ir al cine? (poder) 10. Ustedes ______________________ la puerta, por favor. (cerrar) 11. Qu ______________________ t de esta blusa? (pensar) 12. A qu hora ______________________ la profesora de espaol? (venir) 13. Cunto ______________________ los zapatos? (costar) 14. Yo ______________________ el telfono. (colgar) 15. ______________________ t bien al ftbol? (jugar) Which phrase best describes the word photosynthesis?(1 point)Responsesthe process by which green plants use sunlight to make foodthe process by which green plants use sunlight to make foodthe study of camerasthe study of camerasthe study of human lifethe study of human lifethe process of choosing pictures from a set What is the furies greek mythology? cells that engulf bacteria or cell debris within loose connective tissue are Word processing softwareVideo recording device like a camera or a phoneThroughout this course, youve been busy helping people in all kinds of careers solve issues or create projects in their line of work. Now its time to focus on you! In this activity, you will take the results from your O*Net Interest Profiler and the knowledge youve gained in the past units and use both to decide what might be a great career for you! You will put all this information together and create a Career Action Plan.Part 1: Laying the PathwaySave this word document as Laying the Pathway.Part 2: Compiling the PaperworkGreat! Youve laid out your pathway. Now, we need to gather all the papers youll need to apply for jobs.Step 1: ResumeNow for the next part of your Career Action plan, the first thing you are going to do is create a resume. Create your resume document from a template. You might find one in your word processing program or by searching the internet for a free resume template. Then, make sure your resume contains the following components:Is your resume filled in? Is it nice and neat, with everything spelled correctly? Great! Remember to save your Resume to include in your Career Action Plan.Step 2: Cover LetterNow, we will work on your cover letter. Remember, a cover letter is a document that explains in your own words and more detail why you are the perfect candidate for the job you are applying for. This is how your cover letter should break down:Proofread your cover letter for errors. If you are satisfied with it, save it under Cover Letter to include in your Career Action Plan.Step 3: Job ApplicationWith your resume and cover letter, you will usually need to fill out a job application that is specific to the company you are applying to. Much of the information will be a repeat of what is in your resume, but job applications make it easier for a human resources manager to know exactly where to look for specific information.Use a search engine to find a free mock job application form. Take the information you put in your resume and fill out the job application. Save this as Job Application.Part 3: Its Time to SellYou may not have chosen Marketing as your career pathway, but we all must sell a bit when it comes to finding a job. We are selling ourselves! In an interview, it is important to help the recruiter or employer to understand what you are all about and how you will be a benefit to the company. Look back over the tips youve learned so that you can put your best foot forward.One thing that we must think about in interviews is proper business etiquette, or behavior. Remember when you were little, and your parents were constantly reminding you to mind your manners? Well, this idea of manners and polite behavior is especially important when you get a job. The way you act will reflect on the company that you work for, so if you are polite, hardworking, and courteous, this will benefit your employer. It will also make you much more likely to get along with your coworkers! Some rules of business etiquette include:Being on time (show respect for others schedules)Dressing appropriately (be a good visual representative of your company)Speaking politely (use proper titles and avoid interrupting others or using bad language)Avoiding gossip (dont repeat things about coworkers)Showing interest in others (make eye contact, dont play with your phone while in a conversation)Write emails respectfully (dont be sarcastic, type in all caps, or fail to sign an email)In this part of your Career Action Plan, you will video yourself during a mock interview. Have a partner read you the questions below (or if that is not possible, read them out loud to yourself). Then answer, looking at the camera as if it is the interviewer. Use appropriate business etiquette in your interview so that your prospective employer will want you to represent their company. Remember to speak clearly and smile!Interview QuestionsCan you tell me a little bit about yourself?Why are you applying for this position?What have you learned in your classes to prepare you for this position?How would you be a good fit for this position?What are your strengths and weaknesses?Remember to answer all five questions in your interview. Save your video to upload with the rest of your plan. You can name it Interview.You did it! Congratulations! You have completed your Career Action Plan.Submit the following documents:DO NOT DO VIDEO NOT NEEDED I WILL DO THAT the pressure indicated by the question mark is the __________. A company that is highly leveraged is considered to have ________.A) high risk with high rewardB) low risk with high rewardC) high debtD) a liquidity crisisE) high accounts receivable How to read a DAQ file in Matlab?