Use the SAS dataset insure to (a) create a new SAS dataset insure10 that i. reads in only Name, Company, PctInsured, and BalanceDue ii. outputs records where Petinsured < 100 iii. only retains the variables Name, Company, and BalanceDue (b) based on the results of the last part, create a listing report which i. is sorted by BalanceDue (largest first) ii. displays Name, Company, BalanceDue iii. uses a dollar format for BalanceDue

Answers

Answer 1

To create a new SAS dataset insure10 that meets the requirements outlined in your question, you can use the following SAS code:
data insure10;
 set insure (keep = Name Company PctInsured BalanceDue);
 where PctInsured < 100;
 keep Name Company BalanceDue;
run;
The "set" statement reads in the original dataset "insure", while the "keep" option specifies that only the variables Name, Company, PctInsured, and BalanceDue should be retained.


To create a listing report that is sorted by BalanceDue (largest first) and displays Name, Company, and BalanceDue using a dollar format, you can use the following SAS code:
proc print data=insure10;
 var Name Company BalanceDue;
 format BalanceDue dollar10.2;
 sum BalanceDue;
 title "Listing Report for Insure10 Sorted by BalanceDue";
 title2 "Showing only Name, Company, and BalanceDue";
 title3 "BalanceDue total: ";
run;

To know more about dataset visit :-

https://brainly.com/question/31190306

#SPJ11


Related Questions

what process prepares a hard drive for use by an operating system?

Answers

Answer: The answer is the Boot as the boot sequence prepares 1 the either floppy or another storage device by starting it up and reading it 2 Bios 3 the operating system to be used by the user 4 internet so the booting of the machine.

Explanation:

Which of the following if statements uses a Boolean condition to test: If kids are under 10, they eat for free? (5 points)
if( kid < 10):
if( kid > 10 ):
if( kid == 10 ):
if( kid != 10 ):

Answers

Answer:

if( kid < 10 ):

Explanation:

Why would you most likely use a circle graph?
A. To show how many people in one city prefer paper bags and how
many prefer plastic bags
B. To show what percentage of people in one city prefer paper bags
to plastic bags
C. To show how many paper and plastic bags are used by the people
of one city over several years
D. To show the relationship between paper or plastic bag preference
and a person's city
SUBMIT

Answers

Answer: B. To show what percentage of people in one city prefer paper bags to plastic bags

Explanation:

1.16.2 Racing Karelpublic class FetchKarel extends SuperKarel{public void run(){move();turnLeft();move();move();move()move();turnRight();move();takeBall();turnAround();move();move()turnLeft();move();move();move();move();turnLeft();putBall();}}

Answers

Karel is about to compete in a race in his world, which is a racetrack. Karel needs to circle the racetrack eight times in order to return to where he started. That's your job.

Put a ball down every time Karel hits a corner so that by the time the game is through, each corner has eight balls. the url to your solution in an upload. Give Karel the Dog commands using the Java programming language. Karel is able to turn right and turn around in SuperKarel.

function turnRight(){

   turnLeft();

   turnLeft();

   turnLeft();

}

function turnAround(){

   turnLeft();

   turnLeft();

}

function yourFunctionName() {

   // Code that will run when you make a call to

   // this function.

}

Learn more about function here-

https://brainly.com/question/28939774

#SPJ4

. Web applications continue to____________ overtime. It require frequent changes in their structure and functionality.

A. increase
B. reduce
C. evolve
D. transform

Answers

Over time, web applications are still evolving. They frequently need to have their structure and functionality changed.

When requirements change frequently, which model is used?

The Agile technique should be used if delivery is anticipated quickly and requirements change frequently. The Waterfall approach is most frequently utilized when the requirements are clear and the project is vast.

Why do software specifications alter so frequently?

Successful teams must deal with the changing workplace environment since change is an honest fact of progress. Software development requirements might change as a result of both internal problems like flaws and external pressures like a new rival.

To know more about web applications visit:-

https://brainly.com/question/8307503

#SPJ1

The Publication Manual of the American Psychological Association, Seventh Edition is the official source for APA Style. With millions of copies sold worldwide in multiple languages, it is the style manual of choice for writers, researchers, editors, students, and educators in the social and behavioral sciences, natural sciences, nursing, communications, education, business, engineering, and other fields.
a. true
b. false

Answers

The statement about The Publication Manual of the American Psychological Association, Seventh Edition is true. This statement is aligned from the APA public statement about the The Publication Manual of the American Psychological Association, Seventh Edition.

What is APA?

APA stand for American Psychology Association. APA is standard format or a guide for documentation in academic documents like scholarly journal articles and books.  The guidelines in APA were developed to help reader to read comprehension in the documentation , for clarity of communication, and for "selected word which best reduces bias in language". The latest version of APA is the seventh edition.

Learn more about APA here

https://brainly.com/question/25874812

#SPJ4

Why do I get ""we restrict certain activity to protect our community""?

Answers

Unfortunately, if you see this notice in any form, it implies has temporarily disabled your account's ability to do certain actions.

What is communication?

The transfer of information is the standard definition of communication. The phrase can either be used to describe the message itself or the area of research referred to as communication studies that focuses on these transmissions. There are some differences of opinion regarding the exact definition of communication, such as whether inadvertent or unsuccessful transmissions are included and if communication creates meaning in addition to transmitting it. Communication models seek to give a concise overview of its key elements and how they work together. A common theme among them is the notion that a source use a coding scheme to convey information as a message. They transmit information across a channel to a recipient, who must decode it in order to comprehend its meaning.

To know more about communication visit:

https://brainly.com/question/13660256

#SPJ4

Does forwarding an email notify the original sender?

Answers

Whether forwarding an email notifies the original sender depends on the email client and the email server settings. Some email clients have the option to notify the original sender when an email is forwarded, while others do not. Additionally, some email servers also have options to notify the original sender when an email is forwarded, but it's not a standard. It's also possible that the email client or server used by the original sender can detect that an email has been forwarded, but it doesn't notify the sender.

So in summary, whether forwarding an email notifies the original sender is not something that can be determined generally, it depends on the specific email client and server settings.

Which statement is the best definition of social media?
A. Social media is designed to facilitate and be promoted by social
interactions.
O B. Social media is the exchange of information from newspapers.
O C. Social media is the advertising of products to potential
consumers.
D. Social media is designed to allow people to view local news on
television.

Answers

Answer: A. Social media is designed to facilitate and be promoted by social interactions.

Explanation:

Social media refers to websites and mobile apps that enable users to interact with each other in virtual communities and networks, through text, audio, and video. The platforms provide a space for users to share and exchange information, ideas, personal messages, and other content or to participate in social networking. It’s a user-driven medium, where people can interact and share information with each other easily and in a variety of ways.

A technician adds a second hard drive to a server with the goal of setting up a RAID 1 but the RAID is not working. Where should the technician look first to try to solve the problem?

Answers

A technician adds a second hard drive to a server with the goal of setting up a RAID 1, but the RAID is not working. He should look first at the RAID setup in the BIOS.

What is RAID?

Data is replicated onto many drives for higher throughput, error correction, fault tolerance, and improved mean time between failures when mirroring or striping data on clusters of low-end disk drives.

In Setup mode, you can add new Secure Boot variables. You should not leave Setup mode running indefinitely.

Therefore, he should first check the RAID configuration in the BIOS.

To learn more about RAID, refer to the link:

https://brainly.com/question/28963056

#SPJ1

How to fix error occurred during initialization of vm could not reserve enough space for object heap?

Answers

Answer:

space for object heap?

To fix the error "Could not reserve enough space for object heap", add the options "-Xmx<size>m" to set the maximum size for the object heap memory allocation. This must be set large enough to accommodate loading your application into memory, but smaller than your requested total memory allocation by 2GB.

Explanation:

How to fix "files required to play gta online could not be downloaded"?

Answers

The way to fix "files required to play GTA online could not be downloaded" are given below.

What is the GTA Gaming  about?

Here are a few steps that you can try to fix the "files required to play GTA Online could not be downloaded" error:

Check your internet connection: Make sure that you have a stable internet connection and that you are not experiencing any connectivity issues.Restart the game: Close the game, and then reopen it to see if the error persists.Clear the game's cache: Go to the in-game settings and clear the game's cache. This can help to resolve any issues with corrupted or outdated files.Verify the game files: Use the game's built-in file verification feature to ensure that all of the game files are present and not corrupted.Update the game: Make sure that you are running the latest version of the game, and that all updates have been installed.Reinstall the game: If none of the above steps work, you may need to uninstall and reinstall the game.

Contact Rockstar Games Support: If you still have the issue, you can contact the Rockstar Games support team for further assistance. They may have a solution or a fix for the problem.

Therefore, it is vital to note that some of these steps may require a certain level of technical knowledge and experience. It's also important to keep in mind that the issue may not be related to the game or the user's device, but rather with the Rockstar Games

Learn more about Gaming from

https://brainly.com/question/28031867

#SPJ1

Can anyone please help me answer this question?
Users should not be involved throughout system development. True or False?

Answers

Answer: True

Explanation:

True. It is necessary for business users to be actively involved in the system development process, since they are the actual users of all the modules of the system, their inputs.

Which of the following best describes what a thesis for a historical essay should be?

A.
a well-researched fact
B.
a summary of an event
C.
an interpretive claim
D.
an uncontestable statement

Answers

A historical essay's thesis is most appropriately characterized as an interpretive claim. Argumentative historical thesis statements provide the author's viewpoint on a subject.

What is a thesis statement?

The thesis statement contains information about the subject being covered, the arguments put forth in the work, and the intended audience. Your thesis statement should be in the final sentence of your introduction, which is typically referred to as your first paragraph.

What is a historical writing thesis statement?

The statement that summarizes the historical argument is known as the thesis. The claim or thesis is cited by the Common Core State Standards as a crucial component of writing in history classes.

To know more about  interpretive visit:-

https://brainly.com/question/25064859

#SPJ1

An instance variable refers to a data value that

a is owned by an particular instance of a class and no other

b is shared in common and can be accessed by all instances of a

given class

Answers

The correct answer is b is shared in common and can be accessed by all instances of a.

A variable that is defined in a class but not within constructors, methods, or blocks is referred to as an instance variable. When an object is generated, instance variables are created that are available to all of the constructors, methods, and blocks in the class. The instance variable can be given access modifiers. The parameter value for a particular mapping is known as the instance value. You have the option of setting the instance value to a default value, a particular value, or the value of a mapping parameter. The transformation parameter's default value may be overridden by a mapping or mapplet argument.

To learn more about instances click the link below:

brainly.com/question/30039280

#SPJ4

Which of the following best describes what a thesis for a historical essay should be?

A.
a well-researched fact
B.
a summary of an event
C.
an interpretive claim
D.
an uncontestable statement

Answers

A historical essay's thesis is most appropriately characterized as an interpretive claim. Argumentative historical thesis statements provide the author's viewpoint on a subject.

What is a thesis statement?

The thesis statement contains information about the subject being covered, the arguments put forth in the work, and the intended audience. Your thesis statement should be in the final sentence of your introduction, which is typically referred to as your first paragraph.

What is a historical writing thesis statement?

The statement that summarizes the historical argument is known as the thesis. The claim or thesis is cited by the Common Core State Standards as a crucial component of writing in history classes.

To know more about thesis visit:-

https://brainly.com/question/15685188

#SPJ1

A simple machine increases the distance that a force needs to be applied from 3 meters to 27 meters, and the work done is 216 joules. How much force is applied?.

Answers

The work done is 216 joules, and a simple machine extends the distance over which a force must be exerted from 3 meters to 27 meters. The applied force is 8N.

By shifting the direction in which the force must be applied, the output force can be divided by the input force. 3N  W=△E  8N

A physical system known as a machine uses power to apply forces, regulate movement, and carry out an action. In addition to naturally occurring biological macromolecules like molecular machines, the phrase is frequently used to describe artificial devices that use engines or motors. Machines can be propelled by humans, animals, and natural forces like wind and water. They can also be propelled by chemical, thermal, or electrical energy. These machines typically have a system of mechanisms that shape the actuator input to produce a particular application of output forces and movement. They can also contain mechanical systems, which are generally referred to as computers and sensors that track performance and coordinate movement.

The six basic mechanisms that move a load were named by Renaissance natural philosophers as simple machines.

Learn more about machine here:

https://brainly.com/question/15197944

#SPJ4

In which order do the problem solving steps happen?
*
A) Try, Define, Prepare, and Reflect
B) Reflect, Prepare, Try, and Define
C) Define, Prepare, Try and Reflect
D) Reflect, Try, Prepare, Define

Answers

Answer:c

Explanation:

(words in italics were added to the US Constition by the Confederates; text in brackets was removed):

"WE, the People of the [United States] Confederated States, each State acting in its sovereign and independent character, in order to form a [more perfect Union] permanent Federal government, establish Justice, insure domestic Tranquility [provide for the common defense, promote the general Welfare], and secure the Blessings of Liberty to ourselves and our Posterity, invoking the favor and guidance of Almighty God, do ordain and establish this Constitution for the [United] Confederate States of America."

Read this excerpt from the Constitution of the Confederate States.

On which event or issue can historians gain insight from this excerpt?

A.
Northern religion
B.
Southern secession
C.
Southern slavery
D.
the Union cause

Answers

Answer:

Á. Norther religion oooooooooooooooooo oooooooooooooooooo

9.13.5 Back Up a Workstation
You recently upgraded the Exec system from Windows 7 to Windows 10. You need to implement backups to protect valuable data. You would also like to keep a Windows 7-compatible backup of ITAdmin for good measure.
In this lab, your task is to complete the following:
• Configure a Windows 7-compatible backup on ITAdmin using the following settings:
o Save the backup to the Backup (D:) volume.
o Back up all of the users' data files.
o Back up the C: volume.
o Include a system image for the C: volume.
o Do not set a schedule for regular backups.
o Make a backup.
• Configure the Exec system to create Windows 10-compatible backups using the following settings:
o Save the backup to the Backup (E:) volume.
o Back up files daily.
o Keep files for 6 months.
o Back up the entire Data (D:) volume.
o Make a backup now.

Answers

To access a backup, go to Start > Settings > Update & Security > Backup. Select an external drive or network location for your backups after adding a drive.

Conveniently, Windows 10 has a tool called Recovery Drive Creator that backs up your operating system's system files. In the event that something terrible happens to the computer, you can then install or reinstall Windows using this recovery disc. Launch the setup after downloading the "Media Creation Tool" to upgrade Windows 7 to Windows 10. Then select "Upgrade this PC now" to switch from Windows 7 to Windows 10. Finally, hit the Install button after selecting "Keep personal files and apps."

Learn more about network here-

https://brainly.com/question/13399915

#SPJ4

8.7 Q2 need help pls

Answers

Below is an example of how you can write a loop in Python to print the words that start with "F" or "L" from the list w:

w = ["Algorithm", "Logic", "Filter", "Software", "Network", "Parameters", "Analyze", "Algorithm", "Functionality", "Viruses"]

for word in w:

   if word[0] == "F" or word[0] == "L":

       print(word)

The output of this code will be:

Logic

Filter

Functionality

What is the Programming language about?

The above code uses a for loop to iterate through the list of words w. The for loop starts with the line for word in w:. This line tells the loop to assign each element of the list w to the variable word in turn and execute the indented code block for each value.

The indented code block that follows the for loop starts with an if statement if word[0] == "F" or word[0] == "L":. This line checks if the first letter of the word stored in the variable word is "F" or "L". The square brackets [] after the variable name word are used to access an element in a list or a string.

Here word[0] is used to access the first letter of the word, since indexing in python starts from 0. The or operator is used to check if either the first letter is F or the first letter is L.

If the condition in the if statement is true, the code indented under the if statement is executed. In this case, the word is printed using the print() function. This will print all the words that starts with "F" or "L" from the list w.

Learn more about Programming language here: https://brainly.com/question/16936315

#SPJ1

a text that is ___ line spacing means that there is one clear line space between each lines of text

Answers

The distance between each line in a paragraph is known as line spacing. You can choose between single spaced (one line height) and double spaced line breaks in Word.

What is the distance between text lines?

Leading (which rhymes with bedding) is the traditional term for line spacing. Lead strips were typically used between lines of type in traditional print shops to create more vertical space. This phrase can occasionally be found in typesetting software. The ideal line spacing for the majority of text is between 120% and 145% of the point size.

What does Word's 2.0 line spacing mean?

Select Double under Design > Paragraph Spacing to double-space every paragraph in the manuscript. Pick the paragraphs you want to modify in order to double-space only those.

To know more about line spacing visit:-

https://brainly.com/question/13577257

#SPJ1

How to fix "windows subsystem for linux has no installed distributions"?

Answers

To fix the "Windows Subsystem for Linux has no installed distributions" error, you can try the following steps:

Open the Microsoft Store app on your Windows machine.Search for "Linux" and select the "Windows Subsystem for Linux" app.Install the app.Once the installation is complete, open the Command Prompt (cmd) or PowerShell and run the command: "wsl --install"Restart your computer.

After restarting, open the Command Prompt or PowerShell and run the command "bash" to start the Linux shell.

Once you are in the shell, you can install your preferred Linux distribution. If the above steps does not work, please check if you have the latest windows version and if your device meets the system requirements for WSL.

Learn more about fix problem, here https://brainly.com/question/20371101

#SPJ4

Which of the following is true of the way many large digital media vendors are using Digital Rights Management technology

Answers

They are moving away from DRM because of some key flaws in the technology. They accept DRM alternatives such as: B. Requiring customers not to unlawfully redistribute the digital files.

Digital Rights Management (DRM) is a method of protecting copyrights in digital media. This approach includes the use of techniques to restrict the copying and use of copyrighted works and proprietary software.

In a sense, digital rights management allows publishers or authors to control what paying users can do with their work. For an organization, implementing a digital rights management or process can prevent users from accessing or using certain assets and help the organization avoid legal issues arising from unauthorized use. Today, DRM plays an increasingly important role in data security.

With the advent of peer-to-peer file-sharing services such as torrent sites, online piracy has become the bane of copyrighted material. DRM technology does not catch those involved in copyright infringement. Instead, it makes it impossible to steal or share content in the first place.

Know more about DRM here:

https://brainly.com/question/30195657

#SPJ4

A deceptive email is typically used in a phishing attack. Which of the following is most likely a legitimate email address

Answers

Fraudulent emails are commonly used in phishing attacks. Below are the most likely legitimate email addresses and cybersecurity.

The art of protecting Internet-connected systems, such as computers, servers, mobile devices, electronic systems, networks and data, from malicious attacks is known as cybersecurity. Cybersecurity can be divided into her two parts: cyber and security. Cyber ​​refers to technology, including systems, networks, programs, and data. Security is about protecting systems, networks, applications and information. Sometimes it is also called electronic information security or information technology security.

Cybersecurity is a set of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, theft, damage, alteration, or unauthorized access.”

“Cybersecurity is a set of principles and practices designed to protect our computing resources and online information from threats."

Know more about phishing attacks here:

https://brainly.com/question/24156548

#SPJ4

What are the first items you should check when you have installed a new device and it is not working properly?

Answers

The ability to update device drivers is recognized in Device Manager. To see if it is enabled and recognized, check in device manager.

Which of the following circumstances makes driver rollback the most appropriate tactic?

The optimum time to use Driver Rollback is when you need to go back to an earlier driver version after installing a driver that isn't working properly.

How can a newly installed driver be removed from Windows 10 in the best way?

Start by typing Remove in Settings, which you can access by pressing Windows+I. the option to add or uninstall apps. If the device or driver package you want to uninstall is listed among the applications, choose uninstall.

To know more about  Device Manager visit:-

https://brainly.com/question/20741359

#SPJ4

What percentage of phishing emails have caused data breaches?

Answers

96% of phishing attacks arrive by email. Another 3% are carried out through malicious websites and just 1% via phone.

ABOUT PHISHING

Phishing is an attempt to get someone's data information with deception techniques. The data that becomes the target of phishing are personal data (name, age, address), account data (username and password), and financial data (credit card, account information).

Phishing activities are intended to lure people to provide personal information voluntarily without realizing it. Even though the information shared will be used for criminal purposes.

Phishing actors usually appear as authorized parties or institutions. By using fake websites or e-mails that look convincing, many people have been tricked.

Phishing data information obtained can be directly used to deceive victims. Or, it can also be sold to other parties to take irresponsible actions such as misusing accounts. This cyber crime action is indeed dangerous.

Learn more about phishing at https://brainly.com/question/24156548.

#SPJ4

how should you secure your home wireless network for teleworking

Answers

1. Own your router and modem instead of renting.

2. Keep your router up to date.

3. Ensure your router admin credentials are secure.

4. Ensure your WiFi network password is strong, and you’re using WPA2 security.

5. Remove unnecessary connected devices.

6. Consider periodically rotating your WiFi password.

Additional Security Measures for Remote Work

Looking for additional steps to maximize security in the new era of remote work? One key measure is to use a unique, long, and complex password to log into your Mac or Windows device. On top of that,i recommend protecting your login process with the added layer of multi-factor authentication(MFA). And, to secure your data in the event your laptop is lost or stolen, it’s important to have full disk encryption enabled.

A canceled US Treasury check for the purchase of Alaska is an example of which of the following?

A.
personal narrative
B.
photographic image
C.
primary source document
D.
secondary source document

Answers

An illustration of a primary source document is a cancelled US Treasury cheque for the acquisition of Alaska. Any document, artefact, or diary would qualify as a primary source in the study of history.

Is the Fed the same as the U.S. Treasury?

The Federal Reserve and the U.S. Treasury are independent organisations. The Treasury oversees the management of all monies received by and disbursed by the government. The Federal Reserve's main duty is to maintain economic stability by controlling the amount of money in circulation.

What is the difference between a Treasury and a Bond?

Unlike Treasury bonds, which have a maturity of more than 10 years, Treasury bills expire in a year or less. Treasury bill instruments have a low return on investment because of their short maturity time.

To know more about document  visit:-

https://brainly.com/question/20696445

#SPJ1

Rigging Tools and Rigging
Equipment Hardware

Answers

Rigging hardware refers to the different pieces of equipment used to safely lift and move loads on a crane system.

It also includes the tools used to distribute the weight of the load evenly as it is lifted. There are many different types of crane rigging equipment. Hoist crews help move heavy loads from one location to another on a construction or industrial site safely. These devices can include chain block winches, lever blocks, cranes, mechanical hoists, pulleys, trolleys, lifting slings, pulleys, pulley blocks, and many more. Rigging screws are used to provide a means to adjust length and tension. They are also used with tie rods for masts, towers, other structures, and engineering applications. Rigging screws generally have oblong eyes or clevis end fittings for connection to shackles, wire rope assemblies, pad eyes, and the like.

To learn more about crane system please click on  below link.

https://brainly.com/question/29654544

#SPJ4

Other Questions
In mixed fraction please Question is the picture. In a survey, a group of students were asked to name their favorite type of game. There were 5 students who chose other types of games. What are the characteristics of jazz music how is jazz similar to classical music how is it different? Describe your historical and current element in detail.Use complete sentences in your responses.. Use academic vocabulary in your responses.. Tell me where you got your information from Enter your answer and show all the steps that you use to solve this problem in the space provided. What is the result when 2 x 3 9 x 2 + 11 x 6 2 x 3 - 9 x 2 + 11 x - 6 is divided by x 3 x 3 ? Show your work. 3/7 of 7//1 can please explain this to evaluate function expressions A woodpecker can live 27 years, a swallow 3 times less, and a crow lives 45 years longer than a swallow. How many years can a crow live? Why must a conference committee meet on a compromise bill? Debugging Exercise 3-1 | Instructions DebugThree1. 1 // This class calculates a waitperson's tip as 15% of the bill 2 public class DebugThree1 The files provided in the code editor to the right contain syntax and/or logic errors. In each case, determine and fix the problem, public static void main(String args]) remove all syntax and coding errors, and double myCheck50. 90 double yourCheck19. 95 System. Out. Println("Tips are") calcTip(nyCheck); calctip(yourcheck); run the program to ensure it works properly 7 GRADING Write your Java code in the coding area on the right. Use the Run Code button to execute and run the code and the Test button to run a series of pre-configured tests against your project. 10 public void calcTip (double bill) 12 13 14 15 16 17 18 19 20 final double RATE = . 15; double tip; tip checkRATE; System. Out. Println("The tip should be at Least "tip); Once you are happy with the test results, click Grade to submit your project for grading Write a system of equations for the coefficients of a polynomial of degree 2 that passes through (1, - 2), (- 2, 7) and (- 5, - 2) Solve the system. Complete the sentence. Lobbyists of ______________ use access to political leaders and other federal members to attempt to influence environmental policy. the courts Congress interest groups the presidency Identify the slope, and y -intercepts and graph the linear equation.4. y=1-35. 5x +3y = 156. y = 3 identify tamerlane (timur the lame) and the cultures he was connected to. describe his methods of spreading his territory and at least two ways he maintained power (pages 146-147, paragraph that starts on 146 and ends at the top of 147). How much deduction is allowed in income tax? Myra blended 24 oz of orange sherbet when making 5/8 of smoothie. How many ounces of orange sherbet are needed for one batch? he image below shows the body being cut along what plane? Image of the brain being cut vertically, divided into left and right portions. Image Courtesy of 3DScience.com Frontal Oblique Sagittal Transverse when a firm creates a global web of value creation activities, the company disperses different stages of the value chain to those locations in the world where perceived value is maximized or where the costs of value creation are minimized. !PLEASE HELP! 35 POINTS! How does the total amount of work used to move a storage box 10 meters across the floor with a force of 20-N compare to moving the same storage box 8 meters with the same amount of force?How much work is required to move each box? How do those numbers compare with one another? Which requires more work? 1. How do these abolitionists differ in their tactics against slavery?2. Which of these tactics do you believe are the most effective for the long term? Why?