QUICK which statement about copyright is not correct

1. you must file the paperwork to own the copyright
2. you do not need permission when you create a hyperlink that links to another website.

Answers

Answer 1

Answer:

2.  you do not need permission when you create a hyperlink that links to another website.

Explanation:


Related Questions

What is the output? x = 9 % 2 if (x == 1): print ("ONE") else: print ("TWO")

Answers

The output of the python program written will result in the console displaying ONE.

The program assigns the value of the remainder when 9 is divided by 2 to x

The value of the remainder would be 1

The program is then instructed to display ONE if the value of is one otherwise it should display TWO.

THEREFORE, since the value of x in the program is 1 ; then ONE will be displayed.

Learn more :https://brainly.com/question/4982426

A variable of type unsigned char stores a value of 255. If the variable value is decremented, what exception will occur

Answers

Answer:

No exception will occur

Explanation:

Given

Unsigned Char

Value  = 255

Operation = Decrement

Required

What type of exception occurs?

Let's assume the variable is a.

So, we have that

a = 255

The range of values of an unsigned char a is 0 to 255

So, when a is decremented by 1, the new value of a becomes 254

254 is still within the range of 0 to 255.

Hence, no exception will (or is excepted to) occur


8. Input device which allows you to input drawings which input device which allows you to input drawings ​

Answers

Answer:

bro is there any answers that you could provide?

if not, the only thing i can think of is the turtle program.

Explanation:

g Write a program that allows a user to input any text in your program. Using the tools that we have discussed, your program should output how many unique words were in the input and then output how many words were unique.

Answers

Answer:

Explanation:

The following function/program is written in Java. It asks the user for a sentence as an input and then splits that sentence into an array of words. Then it creates an arrayList for all of the unique words, comparing each word in the sentence with all of those in the ArrayList. If a word is found in the ArrayList it cancels the loop and moves on the next word in the sentence. Finally, it counts all of the unique words in the ArrayList and prints that total to the screen.

public static void uniqueWords() {

       Scanner in = new Scanner(System.in);

       System.out.println("Enter a sentence:");

       String sentence = in.nextLine();

       String words[] = sentence.split(" ");

       ArrayList<String> uniqueWords = new ArrayList<>();

       for (int x = 0; x < words.length; x++) {

           boolean exists = false;

           for (int i = 0; i < uniqueWords.size(); i++) {

               if (words[x].equals(uniqueWords.get(i))) {

                   exists = true;

                   break;

               }

           }

           if (exists == false) {

               uniqueWords.add(words[x]);

           }

       }

       System.out.println(uniqueWords.size());

   }

To connect to devices in another country, you would need to connect to a
WAN
MAN
LAN
PAN

Answers

Answer:

WAN

Explanation:

wide area network

Answer:

To connect to devices in another country, you would need to connect to a WAN

Explanation:

WAN stands for A wide area network which can connect to other countries and broad ranges.

Claudia is allowed to work from home 3 days per week. She takes home sensitive personnel files on a flash drive for use while at home. The company does not allow remote access to the company servers, but Claudia is free to use either a cloud-based version of the application or have it installed on her home machine. Which type of application category would you recommend Claudia use at home?

Answers

Answer:

Installed software

Explanation:

Since we are told that she is often allowed to work from home 3 days in a week in which She takes home with her sensitive files that is contained in her flash drive for use while at home which means that in a situation where her company does not allow remote access to the company servers in which she is only free to either make use of a cloud-based version of the application or have it installed on her home machine the type of application category i would recommend her to use at home is for her to INSTALLED SOFTWARE on her home machine reason been she mostly work from home and secondly if software is installed on her machine it would make it more easier for her carry out her tasks from home.

what is the effects of computer and internet attacks​

Answers

Answer:

ads, damage, or bugs

Explanation:

please tell fast plzzzzzz.​

Answers

Answer:

True

Explanation:

Microsoft Excel is an example of a(n) application.

entertainment
education
communication
productivity

Answers

Answer:

d

Explanation:

Answer:

productivity

Explanation:

u cant just say "A, B, C, or D" cause all the choices are randomized

just for future reference

(Numerical Data Representation) How many bits per word are required to represent the following positive decimal integers: a.0 through 100b.0 through 255c.0 through 256d.0 through 10,000,000

Answers

Answer:

a. 7 bits

b. 8 bits

c. 9 bits

d. 24 bits

Explanation:

Required

Number of bits per word

The formula to get the number of bits per word is:

[tex]2^n = N[/tex]

Where

n = bits

N = numbers

Solving (a) 0 to 100

There are 101 digits between 0 and 100 (inclusive)

So:

[tex]N = 101[/tex]

Substitute 101 for N in [tex]2^n = N[/tex]

[tex]2^n = 101[/tex]

101 can not be expressed as an exponent of 2.

So, we substitute 101 for the closest number greater than 101 that can be expressed as an exponent of 2.

So:

[tex]2^n = 128[/tex]

Express 128 as an exponent of 2

[tex]2^n = 2^7[/tex]

Apply law of indices

[tex]n = 7[/tex]

Hence, 7 bits are required

Solving (b): 0 through 255

There are 256 digits between 0 and 255 (inclusive)

So:

[tex]N = 256[/tex]

Substitute 256 for N in [tex]2^n = N[/tex]

[tex]2^n = 256[/tex]

Express 256 as an exponent of 2

[tex]2^n = 2^8[/tex]

Apply law of indices

[tex]n = 8[/tex]

Hence, 8 bits are required

Solving (c): 0 through 256

There are 257 digits between 0 and 256 (inclusive)

So:

[tex]N = 257[/tex]

Substitute 257 for N in [tex]2^n = N[/tex]

[tex]2^n = 257[/tex]

257 can not be expressed as an exponent of 2.

So, we substitute 257 for the closest number greater than 101 that can be expressed as an exponent of 2.

So:

[tex]2^n = 512[/tex]

Express 512 as an exponent of 2

[tex]2^n = 2^9[/tex]

Apply law of indices

[tex]n = 9[/tex]

Hence, 9 bits are required

Solving (d): 0 through 10000000

There are 10000001 digits between 0 and 10000000 (inclusive)

So:

[tex]N = 10000000[/tex]

Substitute 10000000 for N in [tex]2^n = N[/tex]

[tex]2^n = 10000000[/tex]

10000000 can not be expressed as an exponent of 2.

So, we substitute 10000000 for the closest number greater than 101 that can be expressed as an exponent of 2.

So:

[tex]2^n = 16777216[/tex]

Express 16777216  as an exponent of 2

[tex]2^n = 2^{24[/tex]

Apply law of indices

[tex]n = 24[/tex]

Hence, 24 bits are required

I need a C++ program to ask the user to put in different numbers until zero is pressed then the program counts the numbers that are put in and finds the sum of the numbers and the negative numbers.

Answers

Answer:

#include <iostream>

using namespace std;

int main()

{

int input = 0;

int count = 0;

int sum = 0;

int sumNegative = 0;

while (true) {

 cout << "Enter a number: ";

 cin >> input;

 if (input == 0) break;

 count++;

 sum += input;

 if (input < 0) {

  sumNegative += input;

 }

}

cout << "Count of the numbers: " << count << endl;

cout << "Sum of all the numbers: " << sum << endl;

cout << "Sum of the negative numbers: " << sumNegative << endl;

}

Explanation:

Your requirements regarding the sum and the negative numbers was a bit vague so I just did something you can probably adjust easily to your liking.

With which feature or menu option of a word processing program can you make an image like this?
You can get this image using the
option of a word processing program.
Reset
Next

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is Chart.

You can insert an image like as given in the question using the Chart feature in the word processing document. This image called the bar graph chart.

You can insert a chart in your word processing document going through the Insert tab, then find the chart option under the Illustrations group of the command.

As you click on the chart, different types of charts will be shown to you. You can click on the required chart and insert it into the document. The inserted chart can be customized while double-clicking on the inserted chart.

Cartesian Coordinate Robot is sometimes called? *

Answers

Answer:

rectilinear

Explanation:

give me a code that draws a house with a roof in python. Please Answer!!!

Answers

import turtle

window = turtle.Screen()

tr = turtle.Turtle()

tr.forward(100)

tr.left(90)

tr.forward(100)

tr.left(90)

tr.forward(100)

tr.left(90)

tr.forward(100)

tr.back(100)

tr.left(120)

tr.forward(75)

tr.right(78)

tr.forward(60)

window.mainloop()

In my code, we use the turtle module for the graphics to draw the house with a roof.

i lost my account!-_-​

Answers

Answer:

and?

Explanation:

thx for the points btw

Which group scope can be used to assign permissions to resources only in the domain in which the group is created

Answers

Answer: Domain local group

Explanation:

Domain Local Group is a form of group in a Windows Server network in Microsoft which is used by an administrator to assign permissions to the resources that are in same domain.

Their scope is strictly restricted to their particular domain. It should also be noted that they've open membership which simply implies that members form other domain can be added to them. One has to first know the users that have identical job responsibilities in order to use the domain local group, then identify the network resources that are similar which users want to access.

What are two main components to using functions (there are three from you to choose from)? What do each do? Why are they important?

Answers

Answer:

function is a self-contained program segment that carries out some specific, well-defined task. Every C program consists of one or more functions. One of these functions must be called main. Execution of the program always begins by carrying out the instructions contained in main. Note that if a program contains multiple functions then their definitions may appear in any order. The same function can be accessed from several different places within a program. Once the function has carried out its intended action, control is returned to the point from which the function was accessed. Generally speaking, a function processes information passed to it from the calling portion of the program, and returns a single value. Some functions, however, accept information but do not return anything.

A function definition has two principal components: the first line (including the argument declarations), and the so-called body of the function.

The first line of a function takes the general form data-type  name(type 1  arg 1,  type 2  arg 2,  ...,  type n  arg n)

where data-type represents the data type of the item that is returned by the function, name represents the name of the function, and type 1, type 2, ..., type n represent the data types of the arguments arg 1, arg 2, ..., arg n. The allowable data types for a function are:

int       for a function which returns an integer value

double    for a function which returns an floating-point value

void      for a function which does not return any value

The allowable data types for a function's arguments are int and double. Note that the identifiers used to reference the arguments of a function are local, in the sense that they are not recognized outside of the function. Thus, the argument names in a function definition need not be the same as those used in the segments of the program from which the function was called. However, the corresponding data types of the arguments must always match.

The body of a function is a compound statement that defines the action to be taken by the function. Like a regular compound statement, the body can contain expression statements, control statements, other compound statements, etc. The body can even access other functions. In fact, it can even access itself--this process is known as recursion. In addition, however, the body must include one or more return statements in order to return a value to the calling portion of the program.

A return statement causes the program logic to return to the point in the program from which the function was accessed. The general form of a return statement is:

return  expression;

This statement causes the value of expression to be returned to the calling part of the program. Of course, the data type of expression should match the declared data type of the function. For a void function, which does not return any value, the appropriate return statement is simply:

return;

A maximum of one expression can be included in a return statement. Thus, a function can return a maximum of one value to the calling part of the program. However, a function definition can include multiple return statements, each containing a different expression, which are conditionally executed, depending on the program logic.

Note that, by convention, the main function is of type int and returns the integer value 0 to the operating system, indicating the error-free termination of the program. In its simplest form, the main function possesses no arguments. The library function call exit(1), employed in previous example programs, causes the execution of a program to abort, returning the integer value 1 to the operating system, which (by convention) indicates that the program terminated with an error status.

The program segment listed below shows how the previous program factorial.c can be converted into a function factorial(n) which returns the factorial (in the form of a floating-point number) of the non-negative integer n:

double factorial(int n)

{

 /*

    Function to evaluate factorial (in floating-point form)

    of non-negative integer n.

 */

 int count;

 double fact = 1.;

 /* Abort if n is negative integer */

 if (n < 0)

  {

   printf("\nError: factorial of negative integer not defined\n");

   exit(1);

  }

 /* Calculate factorial */

 for (count = n; count > 0; --count) fact *= (double) count;

 /* Return value of factorial */

 return fact;      

}

Explanation:

shows a document in its final form: ____ shows a document in its first form.
Final; Original Markup
Original; No Markup
Final Markup: No Markup
No Markup: Original

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This question is about a feature in Word processing software such as ms word. This feature is related to review the document. While reviewing the document, you can keep the track of changes in the document.

There are different options available to show the markup or not.

If you want to show a document in its final form then you need to select No Markup.

If you want to show a document in its first form then you need to select Original.

So, the correct answer is:

No Markup: Original

You can find these functionalities in Ms word going through the Review tab, then under the Tracking group, and then select these options from Track changes drop down menu.

write a pseudocode to calculate the volume of a cylinder​

Answers

Answer:

10.50, height = 15.01, and pi = 3.1415.

In dynamic programming, the technique of storing the previously calculated values is called A. Saving value property B. Storing value property C. Memoization D. Mapping

Answers

Answer:

C. Memoization

Explanation:

Given that Memoization is a computing strategy that is applied in storing the previously calculated values such that values can easily be recalled to execute similar problems or further problems. It is also used in making recurring algorithms productive

Hence, in this case, In dynamic programming, the technique of storing the previously calculated values is referred to as MEMOIZATION

Examples of applying successful visual design principles to bring a web page together are _________________. (Choose all that apply)

Question 2 options:

a)

balance, contrast, and unity


b)

balance, contrast, and similarity


c)

gestalt, unity, and hierarchy


d)

gestalt, scale, and simplicity


e)

balance, control, and dominance

Answers

Answer:

I believe it's b

Explanation:

I'm straight

In python:

Assign sum_extra with the total extra credit received given list test_grades. Full credit is 100, so anything over 100 is extra credit. For the given program, sum_extra is 8 because 1 + 0 + 7 + 0 is 8.

Sample output for the given program with input: '101 83 107 90'

Sum extra: 8

Answers

Answer:

Following are the code to this question:

list_val = input()#defining a integer variable for input value

test_grades = list(map(int, list_val.split()))#defining test_grades as a list

sum_extra = -999 #defining sum_extra that holds negative integer value

sum_extra = 0#defining sum_extra that holds value

for y in range(len(test_grades)):#defining a for loop to check range of list  

   if(test_grades[y] > 100):# defining if block that check list value is greater then 100

       sum_extra = sum_extra + (test_grades[y] - 100)#use sum_extra variable to hold extra value and add this value

print('Sum extra:', sum_extra)#print value

Output:

101 83 107 90

Sum extra: 8

Explanation:

In the above code a, "list_val" variable is declared, that uses an input method to input the values and declared a "test_grades" variable that uses a list method to add all values in the list.

In the next step, the "sum_extra" variable is declared, which holds some values and defines a for loop to check the range of the "test_grades", and define a if block, that checks list value is greater than 100. If the condition is true, it will remove the extra value, and add it into the sum_extera variable and add its value, and at the last use, print variable to print its value.

In python:

Assign sum_extra with the total extra credit received given list test_grades. Full credit is 100, so anything over 100 is extra credit. For the given program, sum_extra is 8 because 1 + 0 + 7 + 0 is 8.

Sample output for the given program with input: '101 83 107 90'

Sum extra: 8

Answers

Answer:

test_grades = []

tryagain = 'y'

while tryagain.lower() == 'y':

   grade = int(input("Grade: "))

   test_grades.append(grade)

   tryagain = input("Another Input: ")

sum_extra = 0

for i in test_grades:

   if i > 100:

       sum_extra = sum_extra + (i - 100)

print(sum_extra)

Explanation:

This line initializes an empty list test_grade

test_grades = []

This line prepares the user for input

tryagain = 'y'

The following iteration is repeated until the user stops input

while tryagain.lower() == 'y':

This prompts the user for grade

   grade = int(input("Grade: "))

This appends the grade to the list

   test_grades.append(grade)

This asks if there is another grade to be input

   tryagain = input("Another Input: ")

This initializes sum_extra to 0

sum_extra = 0

This iterates through test_grade

for i in test_grades:

The following if condition gets the grades greater than 100 and sums the extra credit

   if i > 100:

       sum_extra = sum_extra + (i - 100)

This prints the extra credit

print(sum_extra)

A network manager is interested in a device that watches for threats on a network but does not act on its own, and also does not put a strain on client systems. Which of the following would BEST meet these requirements?

a. HIDS
b. NIDS
c. NIPS
d. HIPS

Answers

Answer:

Option b (NIDS) is the correct choice.

Explanation:

NIDS helps to detect suspicious internet activity. Throughout order to determine all congestion, along with all network packets, unfaithful user information was indeed probably recommended. They were indeed technologies that are already constructively divided up in less than service providers that ineffectively investigate traffic through the systems on something they have been located.

All those other available options aren't closely linked to the scenario in question. Therefore this obvious response is the correct one.

Which of the columns (A) to (I) in the truth table below is correct for the expression
¬(r *(qV ¬p))
? (Answer (J) if none of them is correct).
p q r (A) (B) (C) (D) (E) (F) (G) (H) (I)
F F F T T F T F T T T T
F F T F F T T F T F F F
F T F T T F T T T T T F
F T T T F F T T F F T T
T F F F T T F F T T T F
T F T F T T F F F F F T
T T F F T T F F T T T F
T T T F F T F F F F T T

Answers

Answer:

tftftftftftftftftftftftftftftftftftftftftftftftftftftttttftfffftftftftttttfftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftfttftftftftftftftftftftftftftftftftftftftftftftftfttftftftfttfftftftftftftftftftftftftftfttttttttttttttttttttttfffffffffffffffffffftftftfttttttttftftftftftftftftftftftftftftftftftftftftfttftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftfftftftftftftftftfttftftftftftftftftftftftfftftftffftftfftfftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftfftfftftftftftftftftftftftftfftftftftftftftftftftftfftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftfftftftffftftftfftftftftftftftfftftftftftftftftftftftftftftftftfttftftftftftgtftftgtftgtftgtftgtftfftftfftfftfftfftftftftftftftftftftftftftftftftftftftftftfftftftftftftftftftftftftftftftfftfftfftftftftfttfftftftftftftftfftftftftftftftftftftftftftftftftftftftftftftftffftftftftftftftftftftftftftftftfftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftfftftftftftftftftftftftftftftftftfftfftftftftftftftftftftftfftftfftftftftfftftfftftftfftftftftftftftfftftttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttt

Answer:

brooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo

Explanation:

Editing is the process of cutting out the bad parts. True or false?

Answers

Answer:

true

Explanation:

your welcome

Answer:

ttrue ................

An array is said to be dual if it has an even number of elements and each pair of consecutive elements sum to the same value. Return true if the array is dual, otherwise return false.

Answers

Answer:

def is_dual( array):

   if len(array) % 2 == 0:

       count = 0

       for i in range(0, len(array)//2, 2):

           if array[i] + array[i+1] == array[0] + array[1]:

               count += 1

       if count == len(array)//2:

           return True

       else:

           return False

Explanation:

The python program defines a function called is_dual that accepts an array parameter and check if the array is dual. If it meets the condition, the function returns true but returns false when the array is not dual.

please tell fast plzzzzzz​

Answers

Answer:

(1001) =9

(45)= 101101

Consider the classes Food, Cheese, and Velveeta where Cheese is a subclass of Food and Velveeta is a subclass of Cheese. State which of the following lines of code are legal.

Cheese c =new Food( );
Velveeta v =new Food( );
Cheese c =new Velveeta( );
Food f =new Velveeta( );
Food f =new Cheese( );

Answers

Answer:

Cheese c =new Velveeta( );

Food f =new Velveeta( );

Food f =new Cheese( );

Explanation:

The super-class is the parent class from which features and attributes are inherited from while the subclass or the child class is the class inheriting from the super or parent class.

In Java, the object instance of a class is created with the syntax;

class_name instance_name = new class_name();

Food is the super or parent class of Cheese (which makes Cheese its subclass) and Cheese is the parent class of Velveeta. The extends keyword is used to denote inheritance.

Question 5
2 pts
The type of control structure that
causes a branch forward at some
point, causing a portion of the
program to be skipped, is:
a selection structure.
O a seguential structure
a repetition structure
a loop structure

Answers

Answer:

Selection structure.

Explanation:

In a decision structure (selection structure), there is a branch forward at some point, which causes a portion of the program to be skipped. A loop structure (repetition structure) contains a branch to a previous statement in the program module, which results in a block of statements that can be executed many times.

Other Questions
Peptidyl transferase is an enzyme that functions to enable the creation of a polypeptide chain during the process of translation.How does peptidyl transferase perform this function?AnswerAPeptidyl transferase decreases the amount of energy needed to create a peptide bond between amino acids.BPeptidyl transferase speeds up translation by allowing more codons into the ribosome.CPeptidyl transferase increases the length of the polypeptide chain by transferring energy to the amino acids.DPeptidyl transferase creates the mRNA from the information in the template strand of DNA. How did the U.S. Constitution solve a problem created by the Articles of Confederation? It avoided the issue of states rightsIt allowed the states to elect representatives.It enabled the federal government to collect taxesIt prevented the amendment of federal laws. Which of the following provides evidence to support the theory of seafloor spreading? Fossils of same plants and animals found in different seas Continents look like puzzle pieces that can be fit into one another Tectonic plates move apart at a divergent boundary located at the mid-ocean ridge Molten magma hardens into rock and no longer aligns with the North and South poles of Earth How did the colonists get access to British ships during the Boston TeaParty? The Valley of Ashes represent of the following EXCEPTA. hopes and dreamsB. wasted livesC. greedD. moral decay Brenda is using the article "GM Foods--Not Good For You" from the magazine Food and Health in her essay about genetically modified foods. What is the correct order to list the information in a Works Cited entry according to MLA guidelines?Option One: Steven, Fiona.Option Two: "GM Foods--Not Good For You."Option Three: Food and Health,Option Four: 4 Sept. 2013, pp. 89-90.*Please, this will be graded soon. I'll give Brainliest.* This man suggested Jefferson write the declaration because he was from Virginia, abetter writer and more well-liked than himO John AdamsO Sam AdamsO Patrick HenryO George Washington what is approximately equal to[tex] \sqrt{47} [/tex]A: 40B: 7C: 16D: 9.4 You paddle a canoe with a force of 325 N. You and the canoe have acombined mass of 250 kg. What is the acceleration of the canoe?A. 0.8 m/s2B. 0.3 m/s2C. 1.9 m/s2D. 1.3 m/s2 Which of the following connects the middle ear to the back of the nose and helps keep thepressure equal?A: Eustachian tubesB: Semicircular canalsC EardrumsD: Ossicles The function of a cell depends primarily on itslife spanb.colorstructured.movement PLEASE SOMEONE HELP I TRULY DO NOT UNDERSTAND Find F^-1(x), the inverse of F(x).f(x)-9x^3-4Show your work please because I dont understand. PLS HURRY!!! BRAINLIEST WILL GET 24 POINTSWhat is one reform implemented by the Canadian government in an attempt to satisfy residents of Quebec that favor independence? A. The government reduced the federal income tax rates for residents of Quebec. B. The government enacted harsher punishments for violations of religious freedom. C. The government awarded additional seats in the Canadian Parliament to Quebec. D. The government established English and French as the two official languages of Canada. are 48 boys in the sixth grade. The number of girls in the sixth grade is 56.says the ratio of the number of boys to the number of girls in the sixth grade is 8: 7.mine if Emma is correct.ma is correct, explain how she arrived at the answer.e is not correct, determine the correct ratio of boys to girls.chnad to show your work someone help me fast its due at 8 pm But anyways please dont report my questions I like having fun with friends and doing hw but Im not doing hw Im just bored,please dont but Im so blessed to have these two Rosie is my niece and foxy is me and thinkheats pet lol Mary was recently hired at Marshall Industries as a repairperson. Upon starting her new job, she was informed that if she chose not to join the union representing her fellow repair workers, she would still have to pay a fee to the union. Apparently, Marshall operates under a(n)__________.A. illegal arrangement, since nonmembers can never legally be required to pay fees to unions.B. closed shop agreement.C. union shop agreement.D.agency shop agreement When adding 32.83 to a certain number, the sum is 37.63, as seen below. What number should go in the box to complete the addition problem?The decimal 32.83 is added to an unknown whole number and 8 tenths to equal 37.63. 2 3 4 5 why is it important for credibility that immigration statistics on the US state departments website are updated regularly? Which word or phrase best completes the diagram?Features of the _____CareerMakes up 14 percent of the workforceInvolves organizing files and maintaining recordsIs present in many different industriesA. TransportationB. SalesC. Office AdministrationD. Food Service