Automation can be of key importance for any organization and administrator. knowing how to set up automated processes can allow for more focus to specialized and important activities which take more of a manual engagement level. choose the best option for an automated process used to backup files. group of answer choices son backup system protection grandfather backup differential backup

Answers

Answer 1

Since Automation can be of key importance for any organization and administrator. Automation process used to backup files is option D: differential backup.

Why is automation crucial for a company?

By automating business processes, bottlenecks that waste time and money are removed. Every aspect of the firm benefited from the increases in productivity and compliance, which also led to enhanced customer service and performance.

Therefore, Higher productivity, dependability, availability, improved performance, and lower operating costs are all advantages of automated processes. Automation in industrial settings improves production reliability while reducing costs.

Learn more about Automation from

https://brainly.com/question/11211656
#SPJ1


Related Questions

Peterson Electronics uses a decentralized collection system whereby customers mail their payments to one of six regional collection centers. The checks are deposited each working day in the collection center's local bank, and a depository transfer check for the amount of the deposit is mailed to the firm's concentration bank in New York. On average, 7 days elapse between the time the checks are deposited in the local bank and the time the funds become collected funds (and available for disbursements) at the concentration bank. Peterson is considering using wire transfers instead of depository transfer checks in moving funds from the six collection centers to its concentration bank. Wire transfers would reduce the elapsed time by 5 days. Depository transfer checks cost $0.50 (including postage), and wire transfers.cost $19. Assume there are 250 working days per year. Peterson can earn 8 percent before taxes on any funds that are released through more efficient collection techniques. Assume that there are 365 days per year. Determine the net (pretax) benefit to Peterson of using wire transfers if annual sales are $61m. Round your answer to the nearest dollar. Enter your answer in whole dollars. For example, an answer of $1.20 million should be entered as 1,200,000 not 1.20. Don't forget the negative sign if it is negative.
Hint: There are six centers so multiply by the wire transfer cost by six.
Hint: Sales occur 365 days out of the year but someone has to be in the office to make a wire transfer.

Answers

Peterson Electronics should use wire transfers because it reduces elapsed time by 5 days.

Peterson Electronics uses a decentralized collection system whereby customers mail their payments to one of six regional collection centers. The checks are deposited each working day in the collection center's local bank, and a depository transfer check for the amount of the deposit is mailed to the firm's concentration bank in New York. Peterson is considering using wire transfers instead of depository transfer checks in moving funds from the six collection centers to its concentration bank. Wire transfers would reduce the elapsed time by 5 days. The net pretax benefit to Peterson of using wire transfers is $154, 000 per annum. Wire transfers are expensive compared to depository transfer checks which cost $0.50 (including postage). But it will reduce the elapsed time by five days. Therefore, it is more efficient. Peterson can earn 8 percent before taxes on any funds that are released through more efficient collection techniques. There are 250 working days in a year. Therefore, there will be 250/365 days of collection.  The annual sales of Peterson are $61 million. Sales occur 365 days out of the year but someone has to be in the office to make a wire transfer. A wire transfer cost $19. There are six centers so the wire transfer cost is multiplied by six.

Therefore, the net pretax benefit to Peterson of using wire transfers is $154, 000 per annum.

To know more about elapsed time visit:

brainly.com/question/16277579

#SPJ11

What are the missing parts to produce the following output?

What are the missing parts to produce the following output?

Answers

Answer:

1.for

2.2

Explanation:

HELP ME PLS DUE TONIGHT WILL GIVE BRAINLIEST

HELP ME PLS DUE TONIGHT WILL GIVE BRAINLIEST

Answers

Hello, detailed code is available below. I will also add the source file in the attachment. Wish you success!

   

HELP ME PLS DUE TONIGHT WILL GIVE BRAINLIEST

A top investment bank is in the process of building a new Forex trading platform. To ensure high availability and scalability, you designed the trading platform to use an Elastic Load Balancer in front of an Auto Scaling group of On-Demand EC2 instances across multiple Availability Zones. For its database tier, you chose to use a single Amazon Aurora instance to take advantage of its distributed, fault-tolerant, and self-healing storage system. In the event of system failure on the primary database instance, what happens to Amazon Aurora during the failove

Answers

Answer:

Following are the solution to the given question:

Explanation:

Initially, Aurora will try and establish a new DB instance in the same AZ as the previous example. When Aurora can do it, he will try to create a new DB instance in another AZ.

Aurora will try and construct a new DB instance in the same disponibility zone as the original example if there is not an Amazon Aurora Replica (i.e. single instance) that does not execute Aurora Serverless. The replacement of the original example was better managed and may not work if there is, for example, an issue that impacts broadly the entire Access Service.

What will you see on the next line?
>>>int(12.8)
___

What will you see on the next line?>>>int(12.8)___

Answers

Answer:

12

Explanation:

When you use the int() function on a float, it only cuts off everything past the decimal. Literally all it does. Also, the int() function doesn't round the number. Thus, proving the answer is 12.

hope i helped :D

Answer: 12

Explanation: got it right on edgen

what is the by stander effect

Answers

Answer:

The bystander effect is a theory that people are less likely to help if there are others around.

hope this helped :D

Which measures would you recommend be used to reduce the security risks of allowing Wi-Fi, Bluetooth, and NFC devices to be used to access your company's networks and information systems? (Choose all 2 choices.) 1. MDM systems 2. Effective access control and identity management, including device-level control 3. Because the Physiqal layer is wireless, there is no need to protect anything at this layer 4. Whitelisting of authorized devices

Answers

When it comes to reducing security risks, there are measures that could be employed to reduce the risk of Wi-Fi, Bluetooth, and NFC devices from accessing a company's networks and information systems. The recommended measures include:

MDM systemsEffective access control and identity management, including device-level controlTherefore, the correct answers are 1. MDM systems and 2. Effective access control and identity management, including device-level control.

What are MDM systems?

MDM (Mobile Device Management) systems enable businesses to safeguard their data, applications, and network connectivity on mobile devices. An MDM solution offers device security, location tracking, app management, and compliance enforcement, among other features. This system allows for the management of access and usage of mobile devices by employees, ensuring that they are used safely and responsibly.

What is device-level control?

It is a system of controlling network devices that enables administrators to set up security policies for groups or individuals. It ensures that each device on the network is properly configured and that all data transfers are encrypted for optimal security. Device-level controls include access control lists, user authentication, encryption protocols, and more.

To know more about MDM:

https://brainly.com/question/31116893

#SPJ11

Seeing her Daughter graduate from college is most likely a short term goal for a person of which of these ages ? A) 24 years old , b) 4 year old , c) 54 years old , d) 14 years old

Answers

c because you can’t graduate at 4 or 14 and if your kid is graduating when you’re 24 then that means you have birth at 7 years old which isn’t possible.

Answer:

54

Explanation:

at 4 years old you're a child. At 14 you're worried about a partner or grades. 24 is around the age you have a baby.

Post Test: Software Development Life Cycle and Initial Phases 6 Select the correct answer. Which activity is performed during high-level design in the V-model? A. gathering user requirements B. understanding system design C. understanding component interaction D. evaluate individual components E. design acceptance test cases

Answers

During the high-level design phase in the V-model of the software development life cycle, the activity that is performed is understanding component interaction. So, the correct option is C.

The high-level design focuses on translating the system requirements into an architectural design that outlines the overall structure of the software system. It involves identifying the major components or modules of the system and understanding how they interact with each other to achieve the desired functionality.

Understanding component interaction is crucial during high-level design as it involves determining the interfaces and dependencies between the different components. This includes defining the communication protocols, data flows, and interactions between the components. The goal is to ensure that the components work together seamlessly and efficiently to meet the system requirements.

Option A, gathering user requirements, is typically performed during the requirements gathering phase, which is before the high-level design phase. It involves understanding and documenting the needs and expectations of the system's users.Option B, understanding system design, usually takes place in the detailed design phase, where the specific design of the system is defined, including the internal workings of the components.Option D, evaluating individual components, is more aligned with the testing phase, where the components are assessed individually to ensure their functionality and compliance with the design.Option E, designing acceptance test cases, typically occurs during the testing phase when the acceptance criteria are established and test cases are created to verify that the system meets the specified requirements.

In conclusion, during the high-level design phase in the V-model, the activity of understanding component interaction takes place to ensure that the major components of the system work together effectively to achieve the desired functionality.

For more questions on V-model

https://brainly.com/question/16298186

#SPJ11

HELP ASAP 90 Points
Now it is your turn to practice recording a macro. You have recently started working in an office, and you are required to create multiple letters a day. Your company does not have a standard letterhead and you realize you can easily create a macro with your company letterhead. This will prevent you from having to type this information again and again.

Assignment Guidelines
Record a macro named “letterhead” and create a button on the quick access toolbar.
Develop a letterhead for a company of your choice. Include the company name, address, and phone number.
Format the letterhead in an appealing format.
After you have recorded the macro, open a new document.
Run the macro using the options in the macro grouping on the view tab.
Save your document as “letterhead macro” and submit it to your instructor for grading.

Answers

Answer:

Macros automate common tasks. A macro can be created for virtually any task that you perform in Word. The amount of steps is irrelevant. You can even create a macro that automatically places certain text in a document with as many attributes as you’d like!

Macros are created with a recording device similar to a common tape recorder. Once you start recording your macro, a toolbar pops up with standard stop and pause buttons. The following is an example of how to create a macro for your customized letterhead paper.

Creating The Letterhead Macro

Open a blank document. You want to assign your macro to all documents.

From the View Tab, choose Macros and Record Macro. The Record Macro dialog box is displayed as shown below.

Type a name for your macro, such as Letterhead. (Spaces are not allowed; use an underscore to indicate spacing).

Explanation:

A linear representation of a hierarchical file directory is known as what?

Answers

It is known as a directory path

Answer:

C.) a directory path

Explanation:

because I got it right.

HEEEEEEEEEEEEEEEEELLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLPPPPPPPPPPPPPPPPPPPPPPPPPPP

Answers

Answer:

what is it that u need help with

Explanation:

What’s wrong, you okay? You acting a bit sus

Which tag do you use to create a Heading in HTML?
*
A) body
B) p
C) h
D) li

Answers

Answer:

C) h

Explanation:

In HTML, headings are created using the "h" tags. The h tags range from h1 to h6, with h1 being the highest level heading and h6 being the lowest level heading.

For example, to create a heading level 1 you would use the <h1> tag like this:

<h1>This is a Heading Level 1</h1>

The other tags A) body, B) p and D) li are used for different purposes in HTML. The <body> tag defines the document's body, <p> for a paragraph and <li> for a list item.

print 3 numbers before asking a user to input an integer

print 3 numbers before asking a user to input an integer

Answers

Answer:

you can use an array to do this

Explanation:

(I've written this in java - I think it should work out):

Scanner input = new Scanner(System.in);

System.out.println("Enter an integer: ");

int userInt = input.nextInt();

int[] array = new int[userInt - 1];

for(int i = userInt-1; i < userInt; i--)

     System.out.println(array[i]);

A run is a sequence of adjacent repeated values. Write a
program that generates a sequence of 50 random die tosses in
an array and prints the die values, making the runs by including
them in parentheses, like this:

1 2 (5 5) 3 1 2 4 3 (2 2 2 2) 3 6 (5 5) 6 3 1

Add a method alternatingSum() that returns the sum of the
alternating elements in the array and subtracts the others. For
example, if your array contains:

1 4 9 16 9 7 4 9 11
Then the method should compute:

1-4+9-16+9-7+4-9+11 = -2


I am having trouble with this code can someone please help me?

Answers

Answer: yeet

Explanation:

liker up

The required program illustrates an array, outputs the die values with runs in parenthesis, and computes the alternating sum of the array's elements.

What is the array?

An array is a type of data structure that holds a collection of elements. These elements are typically all of the same data type, such as an integer or a string.

Here is a program that generates a sequence of 50 random die tosses in an array, prints the die values with runs in parentheses, and computes the alternating sum of the elements in the array:

import java.util.Random;

public class Main {

   public static void main(String[] args) {

       // Create a random number generator

       Random rand = new Random();

       // Create an array to store the die tosses

       int[] tosses = new int[50];

       // Generate the random die tosses

       for (int i = 0; i < tosses.length; i++) {

           tosses[i] = rand.nextInt(6) + 1;

       }

       // Print the die tosses with runs in parentheses

       System.out.print(tosses[0]);

       for (int i = 1; i < tosses.length; i++) {

           if (tosses[i] == tosses[i - 1]) {

               System.out.print(" (" + tosses[i]);

               while (i < tosses.length - 1 && tosses[i] == tosses[i + 1]) {

                   System.out.print(" " + tosses[i]);

                   i++;

               }

               System.out.print(") ");

           } else {

               System.out.print(" " + tosses[i]);

           }

       }

       System.out.println();

       // Compute and print the alternating sum of the array elements

       System.out.println("Alternating sum: " + alternatingSum(tosses));

   }

   public static int alternatingSum(int[] array) {

       int sum = 0;

       for (int i = 0; i < array.length; i++) {

           if (i % 2 == 0) {

               sum += array[i];

           } else {

               sum -= array[i];

           }

       }

       return sum;

   }

}

The alternatingSum() method computes the alternating sum of the elements in the array by adding the elements at even indices and subtracting the elements at odd indices.

To learn more about the arrays click here:

brainly.com/question/22364342

#SPJ2

Mobile device information might be stored on the internal memory or the SIM card. True or False

Answers

The Given statement "mobile device information might be stored on the internal memory or the SIM card" is true. because  internal memory and SIM card can store various types of mobile device information.

These two components can store different types of information:

1. Internal memory: This is where the device's operating system, applications, and user data (such as photos, videos, and documents) are stored.

2. SIM card: This is a small card that connects your device to a mobile network. It primarily stores information related to your mobile service, such as your phone number, contacts, and text messages.

Both, internal memory and SIM card can store various types of mobile device information. The internal memory is a digital flash memory with low energy requirements, on which a non-volatile backup of data is possible.

Non-volatile means that the data is retained when there is no power, i.e. the mobile phone is switched off. The modules contain a memory block and a microcontroller. They are mobile, which means they have no moving parts and therefore cannot be damaged by vibrations.

Although flash memory is slower than other types of memory, it has proven its worth for mass storage and mobile devices such as MP3 players, cell phones, and smartphones. This is mainly due to its economy and compact design.

The lifespan of flash memory is limited and specified in erase cycles. Depending on the memory architecture, up to two million write and delete cycles are possible before the memory module has to be replaced and a new smartphone has to be purchased.

To know more about Mobile device information : https://brainly.com/question/30395362

#SPJ11

Which of the following does not reflect the second step of effective communication?
a.
Ken bows to a Japanese businessman when he greets him.
b.
Joy lowers her voice when she asks about her friend’s condition.
c.
KC interrupts his teacher’s lecture to ask a question.
d.
Eric conducts himself in a professional manner during his interview.

Answers

Answer:

c

Explanation:

Effective communication is the process of communication. The correct option is C.

What is Effective Communication?

Effective communication is the process of communication, where the idea, thought, or concept shared by the speaker is properly received and understood by the listener.

The condition which does not reflect the second step of effective communication is that KC interrupts his teacher’s lecture to ask a question. Hence, the correct option is C.

Learn more about Effective Communication:

https://brainly.com/question/1423564

#SPJ2

Which of the following selectors will target this paragraph?

Paragraph 1


a) p
b) #firstP
c) p#firstP
d) all of the above

Answers

aaaaaaaaaaaaaaaaaaaaa

address on the internet ​

Answers

A device on the internet or a local network can be identified by its IP address, which is a special address.The rules defining the format of data delivered over the internet or a local network are known as "Internet Protocol," or IP.

Which two kinds of Internet addresses are there?

picture of an address found online Internet Protocol (IP) addresses are used to connect your network with the Internet.IP addresses come in two varieties: static and dynamic.In order to help you choose between static and dynamic IP addresses, this article compares their main characteristics. Using one of the several IP lookup programs that are readily available online is the quickest approach to start learning someone's IP address.There are tools available to enter an IP address and search for its free public registry results on websites A network address and a host (or local) address are the components of an internet address.With this two-part address, a sender can identify both the network and a particular host on the network.Each network that connects to another Internet network receives a distinct, official network address. While IP addresses do identify your whereabouts, they do not provide as much detail as a home address.Additionally, IP addresses will never disclose your name, phone number, or any other specific personal details. "Internet protocol" is referred to as IP.For any device connected to your network, your router IP serves as an identification number.For the router to recognize it and send data packets to it, a device (such as a computer or smartphone) needs to have an IP address.Your internet is what it is because of the data packets.

       To learn more about IP address refer

        https://brainly.com/question/21864346

        #SPJ1

What does anyone who chooses to use speech recognition software need to do?

A) Create a Guest Account.
B) Create an on-screen keyboard.
C) Set up visual alternatives for sounds.
D) Train the computer to understand his or her voice

Answers

D I believe. I’m not %100 percent sure.

Answer:

Train the computer to understand his or her voice.

Explanation:

Thats what u need to do

Which of the following devices can be connected to a network? Check all of the boxes that apply.
printers
smartphones
typewriters
laptops
pencils
tablet computers

Answers

Answer:

1, 2, 4, 6

Explanation:

you can have several desktop apps on the desktop but only one open at a time.

Answers

Yes, this is generally true for most operating systems.

Yes, this is generally true for most operating systems. While you can have multiple desktop apps installed on your computer, you can only have one app open and running at a time. This is because running multiple apps simultaneously can slow down your computer and cause performance issues.
However, some modern operating systems allow you to split your screen and have multiple apps open side by side, which can help increase productivity and multitasking. For example, Windows 10 allows you to snap up to four different windows on your screen at once.
Overall, it's important to manage your desktop apps wisely and only keep the ones that you use frequently. This can help free up space on your computer and improve overall performance. And remember, while having multiple desktop apps can be helpful, it's best to focus on one task at a time for maximum efficiency.

To know more about operating systems visit: https://brainly.com/question/6689423

#SPJ11

state the difference between token and identifier
(computer)​

Answers

In a Java program, all characters are grouped into symbols called tokens. ... The first category of token is an Identifier. Identifiers are used by programmers to name things in Java: things such as variables, methods, fields, classes, interfaces, exceptions, packages,

Any Suggestions on what to do here? I already restarted my PC twice, cleared my browsing data, and rebooted the wifi network....

Any Suggestions on what to do here? I already restarted my PC twice, cleared my browsing data, and rebooted

Answers

Answer:

if u r at school, then it might be blocked.

if not, get a vpn proxy.

What type(s) of media can be pre-recorded (read only), recordable (write once), or re-recordable (read and write multiple times)? (2 points) Enter your answer​

Answers

Answer:

An optical disc.

Explanation:

An optical disc is a small and flat digital-optical disc that is usually circular and used to store computer data by using a laser beam.

The optical disc is able to store digital data because it is made up of a polycarbonate (a tough-brittle plastic) with one (1) or more metal layers.

Additionally, the data stored in an optical disc cannot be scrambled by a magnet because it isn't made of a magnet or doesn't have a magnetic field. There are different types of optical disc and these are; CD-ROM, CD-R, CD-RW, DVD-RAM, DVD-ROM, DVD+/-RW, BD-RE, DVD+/-R, BD-R, BD-ROM.

Where; CD is an acronym for compact disc.

DVD is an acronym for digital video disc.

BD is an acronym for Blu-ray disc.

R represents read only.

RW represents read and write.

RE represents read, write and erasable.

Hence, an optical disc is a type of media that can be pre-recorded (read only), recordable (write once), or re-recordable (read and write multiple times).

What is the something in the computer can be in the form of a tables, reports and graphs etc.​

Answers

Microsoft is the correct answer right

The four main parts of a computer system are the Input, output, processor, and:
O A core.
OB. hardware.
OC. software.
OD. storage.

Answers

Answer:D) Storage

Explanation:

what are different features of ms access​

Answers

1. Tables: Access allows users to create tables to store and organize data. Tables have rows and columns, and provide a structured structure for storing data.

2. Forms: Access provides a form builder that simplifies data entry and improves the user interface. Forms allow users to enter data into tables in a simple and structured way.

3. Reports: Access enables users to create professional-looking reports based on data stored in tables. Reports can include charts, graphs, summaries, and other visual elements to present data in a meaningful way.

4. Queries: Access provides a query building tool that allows users to extract specific information from tables. Queries help retrieve data, perform calculations, and create new tables or views based on specified criteria.

5. Relationships: Access methods allow users to establish relationships between tables. This ensures data consistency and allows data recovery and maintenance across multiple tables.

6. Macros and Visual Basic for Applications (VBA): Access supports automation through macros and VBA. Macros provide a way to automate common tasks, while allowing for advanced flexibility and programming capabilities in VBA Access.

7. Security: Access provides security features to protect databases and control user access. Users can set permissions, passwords and encryption to ensure data privacy and integrity.

8. Integration with other Microsoft Office applications: Access seamlessly integrates with other Microsoft Office applications such as Excel, Word, and Outlook to share, import, and export data

These are just some of the features that make Microsoft Access a powerful tool for database management and data analysis.

Internal combustion engines use hot expanding gasses to produce the engine's power. Technician A says that some engines use spark to ignite the gasses. Technician B says some engines use compression to ignite the gasses. Who is correct?

Answers

Answer:

Explanation:

Both are right.

Engines are divided into:

1) Internal combustion engines

2) Diesels

Which of the following statements is true regarding the relationship of engineers and technology? O a. None of these statements is true O b. Engineers must adopt the technological pessimism view Oc. Engineers must adopt a critical attitude toward technology O d. Engineers must adopt the technological optimism view

Answers

Technology read-ahead, technology free-ahead Sequential access is the process of accessing a collection of items in a predetermined, ordered manner, such as data stored on magnetic tape, in a disk file, or in a memory array.

None of the aforementioned technologies can optimize sequential access. It is the opposite of random access, which makes it possible to access any part of a sequence at any time and from any location with the same ease and efficiency.

For instance, sequential access may be the only means of accessing the data when it is stored on a tape. It could likewise be the favored admittance procedure, for example, assuming everything necessary is the deliberate handling of a progression of information pieces.

To know more about sequential access:

brainly.com/question/12950694

#SPJ4

Other Questions
If triangle ABC is translated 3 units right and 2 units down, what are the coordinates of point C? a model rocket is launched straight upward at 58.8 m/s, how long does it take for the rocket to reach its peak height? What is the peak height of the rocket from the ground Annuities assume cash flows increase at a steady rate.TrueFalse What role does the Committee of the Whole play in the debate process in theHouse of Representatives? Which of the following is an inorganiccompound?a. ammonia (NH3)b. glucose (C6H12O6)c. butane (C4H10)d. vinegar (C2H4O2 Scenario: on monday morning, "tim" showed his coworker "julie" inappropriate pictures from his friends bachelor party and included details of sexual encounters. This is an example of what form of sexual harassment?. i need this last question Which best describes how the council differs from the senate? Carbonic acid can form water and carbon dioxide upon heating. How many grams of carbon dioxide is formed from 12.4 g of carbonic acid? (molar mass HCO3: 64 g/mol; CO: 44 g/mol) H2CO3 ---> H2O + CO2a. 3.60gb. 17.5g c. 42.7gd. 8.54g e. 12.4g Which statement correctly compares red bone marrow and yellow bone marrow?O Red bone marrow makes cartilage, and yellow bone marrow makes fat cells.O Red bone marrow makes blood cells, and yellow bone marrow makes cartilage.O Red bone marrow is found in the periosteum, and yellow bone marrow is found in spongy bone.O Red bone marrow is found in compact bone, and yellow bone marrow is found in the periosteum. In a period of rising prices, which of the following inventory methods generally results in the lowest amount of net income?. calculate ssurr for the following reaction at 25 c: 2 kclo4 (s) 2 kclo3(s) o2(g) hrxn = 70.2 kj insert your answer rounded to 3 significant figures. answer: enter value j/k Describe the three functions of money and provide a personal example for each Someone please help me ASAP A convicted felon escapes from a prison facility. Police suspect that someone in the neighboring town is hiding the woman. Even after holding pressconferences to plead for the public to turn her in, they are still no closer to finding the fugitive. One officer suggests that they conduct a house to housesearch for the fugitive because she is almost certainly hiding in one of them. The sergeant explains that searching every citizen's home without probablecause would be against the law. The officer retorts that the most important thing is to get the dangerous woman back in prison where she belongs, forthe protection of all the citizens. What model of criminal justice would you say the officer MOST likely believes in? A boat is headed north at a velocity of 8 km h-1. A strong wind is blowing whose pressure on the boats superstructure causes it to move sideways to the west at a velocity of 2 km h-1. There is also wave present that flows in a direction 30 south of east at a velocity of 5 km h-1. What is the velocity of the boat? Which statement is true for most autotrophic organisms?A. They carry on extracellular digestion of nutrients before they ingest them.B. They synthesize organic molecules from inorganic molecules.C. They obtain organic molecules from heterotrophic organisms.O OD. They require no external energy source. Which of the following is an important characteristic of empirical political science research questions, excepta. A focus on discrete factsb. A focus on addressing a political phenomenonc. Focus on narrow factual issuesd. Focused on reaching normative conclusions -(x+4)+x=2(-2x-4) what is the answer Someone help me ASAP please