using an if/else statement, write a function closesttothemark that takes two player inputs as number arguments. the function will return 'player 1 is closest' or 'player 2 is closest' depending on which player input is closest to the randomly generated number. note: due to the output being based off of a random factor, the tests provided below cannot determine if you have solved the prompt exactly. the test cases for this challenge check for the correct data types only.

Answers

Answer 1

The techniques include decision table testing, equivalence partitioning, and boundary value analysis (BVA).

What are the 3 types of test data?

When there is no data input, a program's behavior is measured using "blank data."

Valid test: A valid test assesses how a system reacts to real-world information.

An incorrect test evaluates unsupported commands or files.This test, which is typically conducted after smoke testing, is carried out to ensure that every significant feature of a program operates flawlessly both on its own and in conjunction with other components. Regression testing is broken down into sanity testing.Combinatorial testing is a testing method where the software product is tested using a variety of input parameter combinations. A bug-free product that can handle various input configuration combinations or scenarios is what is intended.

To learn more about decisions refer to:

brainly.com/question/30003917

#SPJ4


Related Questions

Software licensed as proprietary

is usually free of cost

often has lower quality than other types.

does not permit source code changes.

is rare in today’s marketplace.

can be redistributed by the user at will.

Answers

Software licensed as proprietary: C. does not permit source code changes.

What are the types of software license?

In Computer technology, there are four (4) main types of software programs based on usage rights and these include the following:

Freeware softwarePurchased licenseShareware softwareOpen source software

What is a software license?

In Computer technology, a software license can be defined as a formal agreement between an end user (customer) and the owner of a software program or software developer, that allows him or her to perform certain tasks with the software application (program).

In conclusion, the source code of any software that is licensed as a proprietary software application (program) cannot be modified or altered.

Read more on software here: brainly.com/question/25703767

#SPJ1

A DoS attack is a coordinated attempt to deny service by occupying a computer to perform large amounts of unnecessary tasks. (T/F)

Answers

True. A denial-of-service (DoS) attack is a type of cyberattack in which a malicious actor seeks to make a computer or network resource unavailable to its intended users by overwhelming it with traffic or other requests.

A denial-of-service (DoS) attack is a type of cyber attack in which an attacker attempts to make a computer or network resource unavailable to its intended users. This is typically accomplished by overwhelming the target with traffic, requests for resources, or other types of communication until the system is unable to function properly. DoS attacks are often launched using a network of compromised computers, or "bots," that are controlled by the attacker and used to generate large amounts of traffic.

The goal of a DoS attack is to disrupt normal traffic and prevent legitimate users from being able to access the targeted system or resource. DoS attacks can be carried out by a single individual or a group of attackers, and they can target a wide range of systems, including websites, online services, and networks.

Learn more about denial-of-service (DoS) here, https://brainly.com/question/14161453

#SPJ4

after reviewing your pie chart, you realize that it could be improved by resizing the segments. resizing the segments in proportion to each segment's relative value enables you to visually show the different values.T/F

Answers

True. Resizing the segments of a pie chart in proportion to each segment's relative value can be an effective way of visualizing the different values.

This approach allows the viewer to quickly and easily compare the relative sizes of the segments, which can be helpful in highlighting patterns or trends in the data. Additionally, making the segments proportional to their values can also make it easier to identify the largest and smallest segments, as well as any segments that are similar in size.

It's also worth noting that using a well designed legend is also helpful in identifying the meaning and value of each segment. This along with well defined labels for the segments and proportionality can be very effective for data interpretation.

Learn more about resizing here, https://brainly.com/question/14204825

#SPJ4

This data was entered starting in the top left of a spreadsheet. Friends Favorite Food Favorite Book Favorite Place Favorite Sport Chris Pizza A Separate Peace Beach Football Filip Ice Cream The Things They Carried Gym Tennis Ghjuvanni Chocolate Cake Lord of the Flies City Lacrosse Yosef Lacustrine High Low Medium What item is in cell B3? A Separate Peace A Separate Peace Chips Chips The Things They Carried The Things They Carried Ice Cream

Answers

The item in cell B3 is option A:"A Separate Peace"

What is the cell about?

In the given data, it is provided that the entries were made starting from the top left corner of the spreadsheet. The first column is labeled as 'Friend', second as 'Favorite Food', third as 'Favorite Book' and fourth as 'Favorite Sport'. So each entry belongs to one of these columns.

As per the data provided, "A Separate Peace" is the book that Chris, one of the friends mentioned, likes, and that information falls under the third column, 'Favorite Book' and it is the third row.

The answer is option A because, in a spreadsheet, data is usually entered starting in the top left corner, and each cell is identified by its row and column. In the given data, "A Separate Peace" is the third item in the second column, so it is located in cell B3.

Learn more about cell from

https://brainly.com/question/28435984

#SPJ1

Given list: (15, 17, 18, 28, 35, 50, 63, 67, 71, 87, 88, 91)
Which list elements will be compared to key 18 using binary search? Enter elements in the
order checked.

Answers

The list elements that will be compared to key 18 using binary search are(15, 17, 18, 28).

What is binary search?

Finding an element's location in a sorted array can be done using the searching method known as binary search. With this method, an array's middle is always searched for the element.

Only on a list of things that have been sorted can a binary search be used. We must first sort the elements if they are not already sorted. An effective algorithm for narrowing down a list of things is a binary search.

Therefore, the correct options are (15, 17, 18, 28).

To learn more about binary search, refer to the link:

https://brainly.com/question/12946457

#SPJ1

we encourage you to publish your seller information in the sellers.json file. visit the account settings page to review your current visibility status.

Answers

How to solved “encourage you to publish your seller information in the sellers.JSON file

Visit the account settings page to review your current visibility status”

After clicking on the action button you got a page with two option:

1) Confidential

2) Transparent

How to make your seller information transparent

Sign in to your AdSense account.Click Account.In the "Seller information visibility" section:Select Transparent.Add your business domain name if you have one.Your name, domain (if included), and your publisher ID will appear in the sellers.json file

What is JSON

 JavaScript object notation or JSON is a format used to store and transfer data.

Unlike XML (extensive markup language) and other formats that have a similar function, JSON has a data structure that is simple and easy to understand. That's why JSON is often used in the API.

JSON itself consists of two structures, namely:

A collection of paired values. In JSON, an example is an object. An ordered list of value , like an array.

JSON can also not only be used with JavaScript. The following are several other programming languages that support the use of this format:

PHP Pythons Ruby C++ perl

JSON function

JSON functions more or less the same as XML. Before JSON was created, this markup language format was often used in AJAX JavaScript (asynchronous JavaScript and XML) for data storage and transfer.

Thanks to the combination of the two, developers can create web pages where information can be updated without having to reload the page. This has become commonplace, especially with the booming trend of web applications.

Well, JSON has the same functionality. The difference is that it has several advantages that make it more commonly used than XML, including:

Lighter files Simpler code structure Code that is easy for humans to understand

Learn more about JSON File at https://brainly.com/question/29790553.

#SPJ4

Natalie is creating a game. The object of the game is for the player to get a cat to his toy in 10 moves or less. The game begins with the cat positioned at the top-left corner of the screen and the toy at the bottom-right corner of the screen. Natalie wants the player to be able to make the cat go 50 steps in one move by pressing an arrow key, and go 100 steps in one move by pressing the space bar. The number of remaining moves is decreased by one each time the player presses a key. The game will count down from 10 moves and display the number of moves remaining. If the move count reaches zero or the cat reaches his toy, then the game will start over. Natalie discovers that her program is not restarting when the number of remaining moves reaches zero. Consider the following code segment: if movesRemaining = 0 then What is wrong with this expression that Natalie wrote?

Answers

Answer: she forgot to write a loop program like while, or for

Explanation:

You want to allow traveling users to connect to your private network through the internet. Users will connect from various locations including airports, hotels, and public access points such as coffee shops and libraries. As such, you won't be able to configure the firewalls that might be controlling access to the internet in these locations.
Which of the following protocols would be most likely to be allowed through the widest number of firewalls?
L2TP
SSL
IPsec
PPTP
PPPoE

Answers

The SSL protocols would be most likely to be allowed through the widest number of firewalls.

What is SSL and why it is used?

Secure Sockets Layer, or SSL, is the industry-standard technology for maintaining a secure internet connection and protecting any sensitive data being sent between two systems. It does this by preventing criminals from reading and altering any information transferred, including potentially personal details. When two PCs or devices are connected to the internet or a private network, SSL offers a secure connection between them. One typical instance of SSL being used to encrypt communication is when a web browser and web server are communicating. The "S" stands for "secure" and changes the website's address from HTTP to HTTPS. Before the data reaches the server it is intended for, an SSL certificate encrypts it so that it cannot be read.

To learn more about SSL refer to:

https://brainly.com/question/10450768

#SPJ4

What is a parameter profile? What is a subprogram protocol?
The parameter profile of a subprogram contains the number, order, and types of its formal parameters. The protocol of a subprogram is its parameter profile plus, if it is a function, its return type. In languages in which subprograms have types, those types are defined by the subprogram’s protocol.

Answers

The parameter profile is the profile of the parameter that contains the order, number, and types of its parameter. The subprogram protocol is a program block that can be called repeatedly in the program by writing its name it.

The parameter profile can be described as the profile of the parameter and the parameter is used to determine some of the values in the subprogram or function.

The subprogram protocol is a protocol of block of a program that can be called repeatedly, this also contains a parameter profile and a function. The subprogram will return a value if the subprogram has been called in other blocks of a program.

Your question is incomplete, but most probably your full question was

What is a parameter profile? What is a subprogram protocol?

Learn more about subprogram here:

brainly.com/question/2280177

#SPJ4

a data analyst is working in a spreadsheet application. they use save as to change the file type from .xls to .csv. this is an example of a data transformation.
a. true
b. false

Answers

The statement of the data analysts that uses save as to change the file type from .xls to .csv is an example of data transformation is true.

What is data transformation?

Data transformation is the process of analyzing data by data analysts. This process is a process to change the data type to another data type so data analysts can perform an analysis of that data.

Since the given statement tells us the data analyst changes the file type it also means changing the data type, so the data analyst can perform an analysis of that data.

Thus, the given statement is an example of data transformation that is true.

Learn more about data transformation here:

brainly.com/question/29038466

#SPJ4

What are the two common places where files are saved?
O The Documents and The Hard Drive
O The Desktop and The Drawer
O The Desktop and the Documents folder
O The Files and The Desktop​

Answers

The files and the desktop

Jason recently purchases a wearable fitness tracker to count the number of steps he is taking each day. Which of the following technologies is used to determine how many steps he takes each day?
answer choices
Digitizer
Inverter
NFC
Accelerometer

Answers

Answer:

Accelerometer

Explanation:

Accelerometer tracks movement and speed, so it would probably be used to track steps


3. Linking an Excel worksheet object in Word means that
O A. you've pasted data into another document.
O B. you can no longer edit the Excel sheet.
C. any changes made will automatically be reflected in the Word document.
D. any changes made will not be reflected in the Word document.

Answers

Linking an Excel worksheet object in Word means that a person have pasted data into another document. Thus, option A is correct.

What is the Excel worksheet?

Cells in a worksheet, sometimes referred to as a spreadsheet. This can be used to enter and compute data. Columns and rows have been used to arrange the cells.

A workbook is where a worksheet is always kept. Many worksheets can be found in a workbook. It is a piece of software designed for the management, archival, and manipulation of structured data.

Excel Worksheet is crucial since it offers a wide range of capabilities to simplify the difficult process of handling data. One of the most often used business uses of Excel is business analysis.

Therefore, option A is correct.

Learn more about the Excel worksheet, refer to:

https://brainly.com/question/14719484

#SPJ1

Principals of I.T question

Answers

I think first option(let me know if I’m wrong) I apologize in advance if I’m wrong

You have an event on your website that triggers when users watch a video. Which of these is an example event parameter?
O Name of a video watched on your site
O How many users viewed a video on your site
O The devices users are on when watching a video on your site
O How many users opened the page containing a video on your site

Answers

A. One example of an event parameter for a video event is the name of the video watched on your site.

Event parameters are pieces of information that you can collect about an event. Parameters provide more information about how visitors interact with your website.

When someone views a product you sell, for example, you can include parameters that describe the product they viewed, such as the name, category, and price.

In this case, you could collect the name of the video that was watched, how many users viewed it, what device they were on, and how long they watched it. This information can help you understand how users are interacting with your videos and what types of videos they prefer.

For more questions like Event parameters  click the link below:

https://brainly.com/question/30036415

#SPJ4

Write the c++ program that will take form the user his/her personal details: firstname, lastname,
adres and will save them in the character arrays. The program should contain the function that
will return the number of characters stored in the particular strings.

Answers

Answer:

#include <iostream>

#include <cstring>

using namespace std;

const int MAX_LEN = 100;  // maximum length of character arrays

// Function to return the number of characters in a string

int getStringLength(char* str) {

 return strlen(str);

}

int main(){
   char firstName[MAX_LEN];

 char lastName[MAX_LEN];

 char address[MAX_LEN];

  // Get user's personal details

  cout << "Enter your first name: ";

  cin.getline(firstName, MAX_LEN);

  cout << "Enter your last name: ";

  cin.getline(lastName, MAX_LEN);

  cout << "Enter your address: ";

  cin.getline(address, MAX_LEN);

  // Print the number of characters in each string

  cout << "Number of characters in first name: " <<         getStringLength(firstName) << endl;

 cout << "Number of characters in last name: " << getStringLength(lastName) << endl;

 cout << "Number of characters in address: " << getStringLength(address) << endl;

 return 0;

}

Design 32*8 memory chip

Answers

From the early 1980s until the early 2000s, computers employed a form of memory module called a SIMM (single in-line memory module) that contained random-access memory.

What is Memory clip?

The connections on a SIMM are redundant on both sides of the module, unlike a dual in-line memory module (DIMM), which has been the most popular type of memory module since the late 1990s. JEDEC's JESD-21C standard was used to standardize SIMMs.

The majority of early PC motherboards (including XTs, early ATs, and 8088-based PCs) used socketed DIP chips for DRAM. Memory modules were developed to save motherboard space and facilitate memory expansion as computer memory capacity increased.

The memory of the board might have been increased by eight or nine single DIP chips, however just one additional memory module was required.

Therefore, From the early 1980s until the early 2000s, computers employed a form of memory module called a SIMM (single in-line memory module) that contained random-access memory.

To learn more about Memory chip, refer to the link:

https://brainly.com/question/30116949

#SPJ1

please match the tags with their function. group of answer choices a. alt [ choose ] b. src [ choose ] c. padding [ choose ] d. figcaption [ choose ]

Answers

The figure> tag designates self-contained material, such as diagrams, pictures, code listings, and drawings.

Even if the figure> element's content is connected to the main flow, its placement is separate from the main flow, therefore removing it shouldn't have an impact on the document's flow. The font style for the text included within the HTML font> tag is specified. The face of text in an HTML document is specified by the face attribute of the font> tag. If an image cannot be displayed, the alt attribute gives an alternative text for the region. In the event that a user is unable to view an image due to a sluggish connection, an error with the src element, or other circumstances, the alt attribute gives alternative information for the image.

Learn more about information here-

https://brainly.com/question/15709585

#SPJ4

What is a block of text with name and other information? A 9-letter word.

Answers

The block of text with name and other information is called a "bio" or "biography."

What is the block of text?

A biography is a written account of a person's life. It typically includes information such as the person's name, date of birth, education, career, and other significant events and accomplishments. Biographies can be written about living people or historical figures.

Therefore, Biographies often include information about a person's early life, education, and career, as well as any significant events or accomplishments that have taken place in their life. They may also include personal details about the person's family, relationships, and hobbies.

Learn more about block of text from

https://brainly.com/question/20169296

#SPJ1

Can you only give someone an brainliest one time per a certain number of days?

Answers

Answer:

no, you can give It as much as you want

Explanation:

speaking of which...?

as a windows administrator for a large company, you are asked to grant temporary software installation permissions to the sales department. which of the following would be the most efficient method for accomplishing this task?
A. restart
B. delete
C. Modify.

Answers

C: Modify would be the most efficient method for granting temporary software installation permission.

Software installation is the process of the large-scale distribution of software and application on an organizational level. System administrators are frequently bombarded with various software installation requests that need validation individually in order to authorize the software installation.

Therefore, as a Windows administrator for a large company, you will be allowing temporary software installation permission to the sales department through modify option.

You can learn more about software installation at

https://brainly.com/question/13033768

#SPJ4

The components of a Distributed Database include the following: Network Processor, Remote data processor, Data dictionary, and local data processor. Explain the function of each of the above components.

(Advanced Database Systems Course)

Answers

Answer:

The Network Processor is responsible for handling the communication between the various components of the distributed database. It sends and receives data between the remote and local data processors.

The Remote Data Processor is a computer system that stores and manages data at a remote location. It is responsible for storing and retrieving data from the database as well as performing other tasks such as data backup and recovery.

The Data Dictionary is a central repository of information about the data in the distributed database. It stores metadata about the data, such as its structure, relationships, and dependencies.

The Local Data Processor is a computer system that stores and manages data at a local location. It is responsible for storing and retrieving data from the database as well as performing tasks such as data backup and recovery. It communicates with the Remote Data Processor through the Network Processor.

what Deforestation means

Answers

It is the second one.

Cutting down of trees which decreases the forest areas in the world.
It means taking out the trees in a summary. So it is the second one.

Select the correct answer.
What is the real-time protection feature in antivirus software?
O A.
OB.
O C.
O D.
a feature that prevents downloading malicious files over the Internet
a feature that prevents the user from downloading malware
a feature that protects computer hardware from theft
a feature that blocks websites that are not suitable for children
Reset
Next

Answers

The real-time protection feature in antivirus software is a feature that prevents downloading malicious files over the Internet. The correct option is A.

What is an antivirus software?

Real-time protection refers to the requirement for protection whenever you use a computer. A type of software called antivirus is used to stop, scan for, find, and remove viruses from a computer.

Most antivirus programs run automatically in the background after installation to offer real-time protection against virus attacks.

Therefore, the correct option is A, a feature that prevents downloading malicious files over the Internet.

To learn more about antivirus software, refer to the link:

https://brainly.com/question/29356216

#SPJ1

When looking to advertise your business to mobile users, social media advertising can be really effective because…
A it allows you to target people who have ad blockers enabled
B it can be seen by people who aren’t logged into their accounts
C it allows you to target people based on their likes and interests
D it doesn’t cost too much to spread your ads far

Answers

When looking to advertise your business to mobile users, social media advertising can be really effective because it allows you to target people based on their likes and interests.

What is business? The term business often refers to an entity that operates for commercial, industrial, or professional reasons. The concept begins with an idea and a name, and extensive market research may be required to determine how feasible it is to turn the idea into a business.Businesses often require business plans before operations begin. A business plan is a formal document that outlines the company's goals and objectives and lists the strategies and plans to achieve these goals and objectives. Business plans are essential when you want to borrow capital to begin operations.Furthermore, a business plan can serve to keep a company's executive team on the same page about strategic action items and on target for meeting established goals.

To learn more about business plan refer to:

https://brainly.com/question/25492268

#SPJ4

Differentiate between a Homogeneous Distributed Database and a Heterogeneous Distributed Database. Give any THREE advantages of implementing a distributed database system.

(Advanced Database Systems Course)

Answers

Answer:

A homogeneous distributed database is a distributed database system in which all components are of the same type, such as the same type of DBMS. A heterogeneous distributed database is a distributed database system in which components may be of different types, such as different DBMSs.

Advantages of implementing a distributed database system include:

1. Increased Availability: By distributing the data across multiple nodes, the system can continue to operate even if one of the nodes fails.

2. Improved Performance: By distributing the workload across multiple nodes, the system can process more data in less time.

3. Greater Scalability: The system can be easily scaled to meet the needs of a growing business.

Explanation:

QUICK 100!!!!
What is the scope of the variable hardness?

class pencil:
color = 'yellow'
hardness = 2
class pencilCase:
def __init__(self, color, art):
self.color = 'black'
self.art = 'wolf'
def __str__(self):
return self.color + " " + self.art
# main part of the program
pencilA = pencil()

limited to the pencilCase class
limited to the pencilCase class

accessible to all parts of the program
accessible to all parts of the program

limited to the pencil class
limited to the pencil class

limited to the main part of the program

Answers

Answer:

The variable "hardness" is limited to the "pencil" class

Explanation:

As we can see in the program - the line where the variable "hardness" is declared and defined is set under the instruction "class pencil:" which is the python syntax keyword for defining a class

Python uses indentation as a way of declaring scopes and in your example no indentation is used, that's why I'm making an assumption "pencil" belongs to class "pencil".

Next time please use indentation. :))

There are several types of software development methods, but almost all of them are based onthe ________ model.
A. Modification
B. Waterfall
C. Developer
D. Integration

Answers

There are several types of software development methods, but almost all of them are based on the  Waterfall model.

The correct option is B.

What is software and examples?

In this context, "software" relates to the programs, applications, and scripts that are now executing on a device. It may be compared to the component of a system that can be changed, as opposed to the hardware, which is always there. Application software system programming are the two primary subcategories of software.

Is developing software a difficult skill?

Hard abilities often come from formal education or specialized training. They include abilities like mastering the use of a certain tool, bit of software, or piece of equipment. Soft skills are more often seen as character traits that you have developed over the course of your life.

To know more about Software visit:

https://brainly.com/question/985406

#SPJ4

Agnes wants to make sure that she knows which steps to take to avoid spillage. You advise Agnes to do all of the following except: a. Check all E-mails for possible classified information. b. Ensure all file names and subject headers identify the sensitivity of the information. c. Store classified data on her PDA when traveling. d. Properly mark and store all removable media.

Answers

Agnes is advised to do all of the following except C: 'Store classified data on her PDA when traveling.'

In the context of computer science, spillage is a security incident in which sensitive information is transmitted to an information system that is not authorized to store or process that information.

Thus, in the situation where Agnes wants to ensure that she knows which steps to take in order to avoid spillage. Agnes is advised to do to:

check all E-mails for possible classified information. make sure all names of files and subject headers identify the sensitivity of the information. to properly mark and store all removable media.

You can leanr more about spillage at

https://brainly.com/question/29871474

#SPJ4

Complete the sentence about a presentation delivery method.
A(n) presentation software
allows you to transmit your presentations over the Internet using [streaming technology
Reset
Next

Answers

A Webcast allows you to transmit your presentations over the Internet using Streaming Technology.

What is presentation delivery?

Presentation software is a computer program that allows users to create and display presentations. These presentations can include text, images, videos, and other multimedia elements. They are often used in educational or business settings to convey information to an audience.

Therefore, One of the key features of many presentation software programs is the ability to transmit presentations over the Internet using streaming technology. Streaming technology allows the presentation to be viewed in real-time, as it is being transmitted, rather than requiring the viewer to download the entire presentation before viewing it.

Learn more about presentation delivery from

https://brainly.com/question/12829009

#SPJ1

Other Questions
What is the meaning of the word characterization? How can you use music in your everyday life to express process and or understand the different emotions that you feel? What is wrong with the following piece of mRNA? TACCAGGATCACTTTGCCA Multiple Choice It contains A. O It does not include an equal number of As and Ts. It does not include an equal number of Gs and Cs. It contains T and not U. Is Hamlet more fearful or more eager to avenge his father's death? salons are required to be inspected by an authorized agent of the board at least once every How do you promote good learning? How can I find someone location using coordinates? Fruit farmers graft branches from trees with desirable characteristics on to the trunks of other trees in a process called grafting. The resulting tree produces fruit identical to the source tree. Which term best describes grafting?A sexual reproductionB buddingC meiosisD asexual reproduction a(n) ____ is a temporary view of the data that is removed when you close the datasheet. Janine, a professional home inspector, notices a lot of small holes burrowed in a home's attic beams. This could indicate the presence of which pest?a. fire antsb. slugsc. wood-boring beetlesd. wood waspsv find a formula for rn for the function f(x) = (3x)2 on [1, 5] in terms of n. Why did the pigs get the job of teaching and organizing how would you describe their leadership skills do you think it is a good idea for them to take the lead? 1.All business processes must be owned by one and only one functional area in any organization.TrueFalse2.Which of the following define Efficiency in terms of organizations?a. making a system slowerb. making a system rightc. asking if a systems adds valued. optimizing how a system completes its function3. Business process management includes methods and tools to support the design, analysis, implementation, management, and optimization of business processes.TrueFalse4. In todays business environment, it is rare for a company not to have a significant Web presence. This trend can be attributed primarily to:a. Technological pressuresb. None of thesec. Government regulationsd. Social responsibility5. The Internet reduces the barriers of entry for new competitors in an established industryTrueFalse6. The Internet can both reduce and increase the bargaining power of suppliers, depending on the specific circumstancesTrueFalse7 In recent years, companies such as Walmart and Amazon.com have offered streaming videos for rent on their Web sites. This is another example of how new technology has (check all that apply) (Select 2):a. Increased the threat of substitute productsb. Increased the suppliers bargaining powerc. Decreased the buyers bargaining powerd. Increased the threat of new entrants8. Selecting and adhering to a single competitive strategy is sufficient to counter all of Porters five forces and be successful in the long term.TrueFalse9. Business-IT alignment refers to the synchronization of a companys IT operations with its:a. Business objectivesb. Business environmentc. Infrastructured. Business processes10. A business process has inputs and outputsTrueFalse What are the 4 main types of economic systems? Taxonomy consists of all of the following activities EXCEPT __________.a.classificationb.identificationc.nomenclatured.staining Which of the following does NOT describe enzymes? O Some enzymes are purely protein. O Each enzyme is chemically specific. O Enzymes work by raising the energhof activation. O Some enzymes are protein plus a cofactor. Using the following steps, prepare an outline for a critical review of Silas Marner:Review characters, plot, and setting. Make notes.Write your review of characters, plot, and setting in the form of notes. Think about the strengths and weaknesses of each.Search the novel for strengths in technique. Again make notes. Pay attention to strong or weak character development, strong or weak plot, how setting helps character development and action or overpowers them. Also search sources about Silas Marner for perspectives on George Eliot's methods and/or themes (and don't forget to record the necessary facts about those sources for proper crediting).Write your outline.Submit your outline below (include your thesis at the top of your outline).https://media-release.glynlyon.com/o_eng02_2016/9/silas_marner.pdfLink to the paragraph a ____ file is a text file with a .sql extension that contains sql commands. Add commas, colons, and semicolons to the following sentence Use exact spelling and cor-rect spacing.Alice got to go to Six Flags and she went to the water park. What are the three significance of humility?