Help need answer ASAP Column A contains numbers from rows 1 to 20. You can use the formula ___________ to find the value of the largest number divided by the total number of values.

Answers

Answer 1

Answer:

=MAX(A1:A20)/COUNT(A1:A20)

Explanation:


Related Questions

When an application uses a udp socket, what transport services are provided to the application by udp?

Answers

When an application uses a UDP socket, UDP provides the application with connectionless communication, best-effort delivery, and minimal overhead.

UDP (User Datagram Protocol) provides connectionless communication, which means that there is no handshaking or establishment of a dedicated connection between the sender and receiver. It allows the application to send individual datagrams without the need for maintaining a session.

UDP offers best-effort delivery, where it does not guarantee reliable and ordered delivery of packets. Packets may be lost, duplicated, or arrive out of order. This makes UDP suitable for applications where real-time data transmission is more important than reliability, such as streaming media or real-time gaming.

UDP also provides minimal overhead compared to other protocols like TCP. It has a smaller header size and does not include features like flow control, error recovery, or congestion control.

UDP provides connectionless communication, best-effort delivery, and minimal overhead to applications using UDP sockets. These characteristics make UDP suitable for applications that prioritize real-time data transmission over reliability and require lower protocol overhead.

Learn more about UDP here:

brainly.com/question/33563646

#SPJ11

Prove that a tree with n, n>=2, vertices has at least two
leaves.

Answers

A tree with n, n>=2, vertices always has at least two leaves.

Can we prove that a tree with n vertices, where n is greater than or equal to 2, always has at least two leaves?

To prove that a tree with n vertices has at least two leaves, we can use induction.

In a tree, a leaf is defined as a vertex with degree 1, meaning it has only one adjacent vertex.

For the base case, when n = 2, the tree consists of two vertices connected by a single edge. In this case, both vertices are leaves.

Assuming the statement holds true for a tree with k vertices, we need to show that it also holds true for a tree with k+1 vertices.

When we add one more vertex to the tree, it must be connected to an existing vertex. This new vertex has degree 1 and becomes a leaf. Additionally, at least one of the existing leaves remains, resulting in the tree having at least two leaves.

By the principle of mathematical induction, we have proven that a tree with n vertices, where n is greater than or equal to 2, always has at least two leaves.

Trees and mathematical induction to gain a deeper understanding of their properties and applications in various fields.

Learn more about tree

brainly.com/question/29294762

#SPJ11

Me pueden decir todo lo que sepan sobre las redes informáticas porfa? De preferencia que sea algo largo

Answers

Answer:

Una red informática es una fusión de varios sistemas electrónicos técnicos, principalmente independientes que permite que los sistemas individuales se comuniquen entre sí. El objetivo aquí es el intercambio de recursos como impresoras de red, servidores, archivos y bases de datos.  

La estructura de red más conocida es Internet, y los protocolos a través de los cuales se transmite la información más conocidos son el TCP (Protocolo de control de transmisión) y el IP (Protocolo de Internet), pero varios otros protocolos también desempeñan funciones importantes en Internet. Internet en sí no es una red homogénea, sino que consta de un gran número de subredes, algunas de las cuales tienen diseños muy diferentes, que solo tienen en común las capas de protocolo superiores y que manejan la transmisión de datos de usuario en las capas de protocolo inferiores en muy diferentes caminos.

Error-correcting codes are used in order to compensate for errors in transmission of messages (and in recovery of stored data from unreliable hardware). You are on a mission to Mars and need to send regular updates to mission control. Most of the packets actually don't get through, but you are using an error-correcting code that can let mission control recover the original message you send so as long as at least 1024 packets are received (not erased). Suppose that each packet gets erased independently with probability 0.7. How many packets should you send such that you can recover the message with probability at least 99% Use the Central Limit Theorem to approximate the answer, using the continuity correction. Your answers should be correct to 4 decimal places.

Answers

The origin of the transaction either transmits a data packet at that point or indicates that it has no data to deliver.

The transaction's origin then either transmits a data packet or says it has no data to deliver. Transmission of handshake packets If the transmission was successful, the target device replies with a handshake packet. Message and stream transfers are both supported by USB.

Packet switching is the way through which the internet works, it comprises transmission of packets of data between devices over a common network. For instance, you might send an email to a buddy or the school web server might send you a web page through the internet.

To learn more about data packet transmission refer to:

brainly.com/question/14219758

#SPJ1

If you need to modify a features in a part created using the Mirror tool, you can make the change in the original feature and the feature on the other side of the mirror plane will be modified automatically.
Select Answer

False

True

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is TRUE.

Because when you are designing something and drawing anything and it is symmetric in shape and half of the part is created, then if you use mirror features, then the other half part will get created automatically.

If you need to modify the features in the original part of the drawing or design then the other side of the mirror plane will be modified automatically.

Because whatever you will make changes in the original part of the design, then the other part that is created by using mirror features will get modified automatically.  

What peripheral port type was originally developed by Apple and is currently regarded as the optimal interface for digital video transfer

Answers

Answer:

IEEE 1394

Explanation: Common port used for video preipherals and other video transfer

which of the following is an example of the types of information that a computer stores? (choose all that apply.) a. virtual memory b. log files c. working memory d. documents

Answers

Virtual memory is an example of the types of information that a computer stores.

Thus, With the help of the storage allocation method known as virtual memory, secondary memory can be used as like it were a component of the main memory.

Program-generated addresses are automatically translated into the matching machine addresses, allowing programs to distinguish between addresses used by the memory system to identify physical storage sites and addresses used by programs to refer to memory.

The capacity of virtual storage is constrained by the computer system's addressing mechanism and the quantity of available secondary memory, not by the precise number of main storage locations.

Thus, Virtual memory is an example of the types of information that a computer stores.

Learn more about Virtual memory, refer to the link:

https://brainly.com/question/30756270

#SPJ4

if someone has become very attached to their mobile device and feels anxious if the cannot connect to the internet, what are they experiencing

Answers

Answer:

Anxiety

Explanation:

trust I have it

what is the best reason to use an unsorted vector of key-value pairs over an open addressing hash table

Answers

A hash table or hash map is a type of data structure that links keys and values.

A hash table is a collection of lists of elements in Java. Buckets are the names given to these lists.

It connects the keys and values. Java's "Hash Table" class is in charge of creating hash tables. This class implements the map interface and derives from the dictionary class.

Here are a few of Java's Hash table's distinguishing characteristics:

It is an array whose individual elements are lists or buckets.

It has distinguishing qualities.

There is no such thing as a null key or null value in the hash table.

similar to a hash map but synced

Java Hash Table Class

This class is a part of Java's java.util package. Consequently, we must add one of the following statements to our application in order to incorporate the capabilities of the Hash Table class.

bring in java.util. *;

OR

bring up the Java.util.HashTable;

A general class declaration for the java.util package is provided below.

Hash Table type:

In this situation, K => type of mapped values V => the hash table's key types

The Hash Table class works properly thanks to the constructors that are used to build the class objects and the multiple operations or methods that are provided in the class.

Know more about hash table here:

https://brainly.com/question/4478090

#SPJ4

Click this link to view O*NET’s Tasks section for Computer Programmers. Note that common tasks are listed toward the top, and less common tasks are listed toward the bottom. According to O*NET, what common tasks are performed by Computer Programmers? Check all that apply.

Negotiating costs and payments with customers

Conducting trial runs of programs and software applications

Writing, updating, and maintaining programs or software packages

interviewing and hiring programming workers

Marketing and selling software packages

Correcting errors by making changes and rechecking a program

Answers

The options that applies are:

Conducting trial runs of programs and software applicationsWriting, updating, and maintaining programs or software packagesCorrecting errors by making changes and rechecking a program

What is ONET?

O*NET is known to be an OnLine app or web that gives a good descriptions of how the world work and it is often used by job seekers, workforce development and others.

Therefore, based on the above statement about ONET, The options that applies are:

Conducting trial runs of programs and software applicationsWriting, updating, and maintaining programs or software packagesCorrecting errors by making changes and rechecking a program

Learn more about ONET from

https://brainly.com/question/5605847

#SPJ1

Answer:

conducting trial runs of programs and software applications

writing, updating, and maintaining programs or software packages

correcting errors by making changes and rechecking a program

good luck.

a smartphone was lost at the airport. there is no way to recover the device. which of the following ensures data confidentiality on the device? a. tpmgps b. screen c. lockremote d. wipe

Answers

To ensure data confidentiality on a lost smartphone, the most appropriate option would be: d. wipe

What is data confidentiality

To wipe a smartphone entails initiating a factory reset or remote wipe of the device. All data will be eliminated and the device will be reset to its initial factory configuration through this procedure.

Wiping the device ensures that all its stored data is completely erased, thus minimizing the possibility of any unapproved person gaining access to private or confidential data. Consequently, the most efficient way to maintain the confidentiality of data on a misplaced smartphone is to execute a remote wipe.

Learn more about data confidentiality  from

https://brainly.com/question/29892475

#SPJ4

Practice working with tables using this document. Use your experience to complete each question. There are cells in the table made at the end of Step 1. The new table made in Step 12 is with a blank row on the . In Step 19, the word is in the cell of the table. A 2x2 table is created in .

Answers

The answers to the questions are:

four2X3bottom bottom leftStep 17

What is a Excel spreadsheet?

Microsoft Excel is known to be  a popular and common example of a spreadsheet that is said to be created  by Microsoft for Windows, macOS, Android and others.

Note that  It features is made up of calculation or any form of computation capabilities, graphing tools, and others.

Hence, The answers to the questions are:

four2X3bottom bottom leftStep 17

Learn more about excel sheet from

https://brainly.com/question/9799650

#SPJ1

See full question below

Use your experience to complete each question.

There are cells in the table made at the end of Step 1.

The new table made in Step 12 is with a blank row on the .

In Step 19, the word is in the cell of the table.

A 2x2 table is created in.


T or F: MNEs can require that expatriates use their home leave
allowance to come home, so that they have an opportunity to network
and reconnect with colleagues in the home office/HQ.

Answers

True.

MNEs have the discretion to require expatriates to utilize their home leave allowance for networking and reconnecting with colleagues in the home office or headquarters. This allows for continued engagement and integration of expatriates within the organization, fostering collaboration and knowledge sharing.

MNEs (Multinational Enterprises) have the authority to establish policies and requirements for their expatriates, including the use of home leave allowance. Home leave is typically granted to allow expatriates to return to their home country for personal reasons, such as visiting family and friends. However, MNEs can also require expatriates to use their home leave allowance to come back to the home office or headquarters for networking and reconnecting with colleagues. This practice enables expatriates to maintain connections with the organization, stay updated on developments, and foster collaboration and knowledge exchange between the home office and the expatriate's current location.

MNEs have the discretion to require expatriates to utilize their home leave allowance for networking and reconnecting with colleagues in the home office or headquarters. This allows for continued engagement and integration of expatriates within the organization, fostering collaboration and knowledge sharing.

To know more about MNEs visit

https://brainly.com/question/31540324

#SPJ11

Most bugs inside a programming language virtual machine are not fatal. True or False?

Answers

It is True. Most bugs in a programming language virtual machine are not fatal, although they may cause unexpected behavior or crashes.

How common are programming language virtual machine bugs?

True. Most bugs inside a programming language virtual machine are not fatal. In general, bugs in a virtual machine (VM) may lead to unexpected behavior, incorrect results, or crashes, but they are often not fatal in the sense that they do not cause permanent damage to the system or render it completely unusable.

When a bug is encountered in a virtual machine, it is typically handled by error handling mechanisms built into the VM or the programming language runtime. These mechanisms can include exception handling, error reporting, and recovery strategies. In many cases, the VM or the runtime can gracefully recover from the bug and continue executing the program, although the program's behavior may be affected.

However, it is important to note that some bugs in a virtual machine can have serious consequences, especially if they result in security vulnerabilities or if they cause data corruption. Developers and maintainers of virtual machines strive to identify and fix such critical bugs promptly to ensure the stability and security of the VM environment.

Learn more about  virtual machine

brainly.com/question/32151802

#SPJ11

Briefly explain the purpose of the design process

Answers

Answer:

When you want to create something or if you want to solve a problem or if you have been assigned a task but the steps towards the results are not clear yet. The purpose of a design-process is to shape and guide your work and thoughts to improve the outcome.

Explanation:

When you program in Scratch, what are two things you can do with a sprite?
A. Drag it to the scripts area
B. Add it to another variable
C. Change the costume on it
D. Make it move
SUBM

Answers

Explanation:

You can change the costume and drag it to the script area

You can change the costume and drag it to the script area.

What is Script area?

Visual programming is used in Scratch to make your own games, tales, and animations. A script is a group of instructions used to program in Scratch. It is a group of interconnected blocks stacked on top of one another.

As users choose to engage with sprites, the blocks of instructions are thoughtfully arranged to carry out a certain purpose. It's a good idea to include script comments that explain what is happening.

A sprite in Scratch is an actor, the main character of the program, or a graphic component that carries out all the tasks specified in the script.

Therefore, You can change the costume and drag it to the script area.

To learn more about Script area, refer to the link:

https://brainly.com/question/6975460

#SPJ7

What shoul i get, Airpods or a ps4 cooling fan ???

Answers

Answer: PS4

Explanation:

Answer:

airpods

Explanation:

Come up with a solution and value of a problem definition on ESG or ECO.
(Solution proposal should be IT solution or Mobile app for your specific problem, that problem will based on ECO or ESG)

Answers

One potential problem definition in the area of ESG (Environmental, Social, and Governance) could be the issue of waste management in cities.

Many cities struggle with effective waste management systems, which can lead to negative environmental and social impacts such as pollution, health risks, and resource depletion.A

A potential IT solution for this problem could be a waste management app that connects citizens with information about waste disposal methods and schedules, encourages recycling and waste reduction, and allows users to report waste-related issues to their local government.

This app could also incorporate gamification features to incentivize sustainable behavior and make waste management more engaging.

By addressing this problem, the value of the solution would include a cleaner and healthier environment, reduced resource depletion, and increased community engagement in sustainability efforts.

Learn more about Waste management at

https://brainly.com/question/14112714

#SPJ11

What members of a base class can be redefined in the derived classes? o public members o private members O final members o virtual members

Answers

In derived classes, the public members of a base class can be redefined.

What are the public members of a base class?

The public members of the base class are the members that can be accessed and modified directly from the derived class. The derived class can override these members' functionality by redefining them with the same name and signature but with different implementation logic.

The private members of a base class cannot be redefined in the derived class. Private members are only available within the base class. In C++, access to these members is denied in the derived class, so they cannot be overridden

A similar idea applies to final members, which cannot be overridden by definition.Virtual members of a base class can be overridden in the derived classes.

The virtual keyword is added before the member function's signature in the base class to specify that it is virtual. A virtual member function's definition can be changed in the derived class to provide different functionality while preserving the same signature.

Learn more about derived class at

https://brainly.com/question/31964070

#SPJ11

What is your favorite film and what makes it good?

Answers

Answer:

My Favorite film is The Old Guard

Explanation:

I like The Old Guard because it has action an etc.

Answer:

I Am Legend

Explanation:

I think its an amazing film by the way it was put together, will smith played an amazing role in the movie. The cinematography in the movie was perfect. The movie was made almost entirely of a mans imagination and thats what makes it so cool

What three blocks of addresses are defined by RFC 1918 for private network uno? (Choose three)
1. 10.0.0.0/8
2. 239.0.0.0/8
3. 169.254.0.0/16
4.100.64.0.0/14 05.
5. 172.16.0.0/12
6.192.168.0.0/16

Answers

The three blocks of addresses defined by RFC 1918 for private network uno are:
1. 10.0.0.0/8
2. 172.16.0.0/12
3. 192.168.0.0/16


What is RFC 1918?

RFC 1918 refers to a set of guidelines established by the Internet Engineering Task Force (IETF) that define a range of private IP address blocks to be used within a private network. These private IP address ranges are not globally routable, meaning that they are not meant to be used on the public internet. Instead, they are reserved for internal use within a private network to facilitate communication between devices without requiring public IP addresses. The three private IP address ranges defined by RFC 1918 are 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16.

Learn more about RFC 1918: https://brainly.com/question/12950573

#SPJ11

if the current date is march 1, 2023, which javascript statement(s) should you use to set an expiration date for a cookie that is one year in the future?

Answers

To set an expiration date for a cookie that is one year in the future from the current date of March 1, 2023 in JavaScript, you can use the following statement:

var d = new Date();

d.setTime(d.getTime() + (365 * 24 * 60 * 60 * 1000));

var expires = "expires="+ d.toUTCString();

document.cookie = "cookieName=cookieValue;" + expires + ";path=/";

In this statement, we first create a new Date object and set it to the current date and time using the new Date() constructor. Then we set the expiration date of the cookie to one year in the future by adding the number of milliseconds in a day (24 hours) multiplied by the number of days in a year (365) to the current time using the setTime() method.

Next, we convert the expiration date to a UTC string using the toUTCString() method, and store it in a variable called expires.

Finally, we set the cookie by using the document.cookie property and specifying the name and value of the cookie, as well as the expires attribute and the path attribute, which sets the scope of the cookie to the root directory of the website.

To set an expiration date for a cookie that is one year in the future from the current date of March 1, 2023, the following JavaScript statement should be used:

var expirationDate = new Date();

expirationDate.setFullYear(expirationDate.getFullYear() + 1);

document.cookie = "cookieName=value;expires=" + expirationDate.toUT

In JavaScript, cookies can be created and set with an expiration date using the document.cookie property. To set an expiration date for a cookie that is one year in the future from the current date, a new Date object is first created, representing the current date and time. The setFullYear() method is then used to add one to the current year, which sets the year of the expirationDate object to 2024.

To set the cookie with the cookieName and value specified, the document.cookie property is assigned a string that includes the expires attribute followed by the expiration date formatted as a UTC string using the toUTCString() method. This sets the expiration date of the cookie to March 1, 2024, which is exactly one year after the current date of March 1, 2023.

""

Complete question

if the current date is march 1, 2023, which javascript statement(s) should you use to set an expiration date for a cookie that is one year in the future?

a: var expirationDate = new Date();

expirationDate.setFullYear(expirationDate.getFullYear() + 1);

document.cookie = "cookieName=value;expires=" + expirationDate.toUT

b: var expirationDate = new Time();

expirationDate.setFullYear(expirationDate.getFullYear() + 1);

document.cookie = "cookieName=value;expires=" + expirationDate.toUT

""

You can learn more about JavaScript  at

https://brainly.com/question/29846946

#SPJ11

The CPU is often called the
of the computer.

Answers

Answer:

Explanation:

Tower?

Answer:

Its often called the brains of a computer.

Explanation:

The use of middleware to connect disparate systems has evolved into an approach for developing software and systems called _____.

Answers

The use of middleware to connect disparate systems has evolved into an approach for developing software and systems called service-oriented architecture. Thus, option C is correct.

What is middleware?

Middleware can be defined as the process or a system through which the person can easily connect through different programs or systems. This helps in connectivity.

In the service-oriented architecture, it provides the basic need is a process for developing software that produces enterprise applications by using software elements known as services. Every service offers a particular management function, and applications can converse with one another across technologies of languages.

Therefore, option C is the correct option.

Learn more about Middleware, here:

https://brainly.com/question/13440971

#SPJ1

The question is incomplete, the complete question is:

a. cloud computing

b. rapid application development

c. service-oriented architecture

d. Software as a Service

Synonyms. decorate. verb. to make something look more attractive by

Answers

We must evaluate the possibilities and lay the foundation before we can comprehend the reasoning behind the response.

First of all, we recognize that the definition states that this notion aids in making judgments. However, the synonyms make it clear that you can also give the objects under examination a value. Rating and rate are therefore synonyms since the meaning of the words suggests that a rate is given a value based on many attributes in order to give it a level of order as a result of its characteristics. Cosmetics are made from chemicals and are used to improve skin quality and physical attractiveness. Chemical items used to enhance appearance are called cosmetics. Cosmetics are a broad category that encompasses a wide range of products or chemicals. They are frequently categorized as products for beauty and health. Some natural ingredients are combined with artificial components that have been synthesized to create cosmetics. Deodorants, perfumes, lip gloss, and other cosmetics are some examples.

Learn more about Cosmetics here:

https://brainly.com/question/20699735

#SPJ4

a computer on a network that is not the server​

Answers

Answer:

A peer-to-peer network is one in which two or more PCs share files and access to devices such as printers without requiring a separate server computer or server software. ... A P2P network can be an ad hoc connection—a couple of computers connected via a Universal Serial Bus to transfer files.

did someone hang themselves on set of wizard of oz

Answers

Answer:

One of the most ubiquitous of film legends holds that a munchkin hanged himself on-camera during the filming of 'The Wizard of Oz.' A lovelorn actor portraying one of the munchkins hanged himself on the set during the filming of The Wizard of Oz.

Explanation:

Who invented the television and what year did color come out? Explain​

Answers

The television was not invented by a single person, but its development involved contributions from several inventors and engineers.

How is this so?

Philo Farnsworth is often credited as one of the key inventors of television, as he successfully demonstrated the first working electronic television system in 1927.

As for color television, it was first introduced commercially in the United States in 1953 by RCA.

The introduction of color television marked a significant milestone in broadcasting, enhancing the viewing experience for audiences worldwide.

Learn more about television at:

https://brainly.com/question/12079773

#SPJ1

Help PLEASE ILL MARK as brainlest

Help PLEASE ILL MARK as brainlest

Answers

Answer:

computer animation (3d)

In what situations might you need to use a function that calls another function?

Answers

Answer:

Explanation:

It is important to understand that each of the functions we write can be used and called from other functions we write. This is one of the most important ways that computer programmers take a large problem and break it down into a group of smaller problems.

Other Questions
Which is NOT a characteristic of all plantso multicellularO chloroplastsO cell wallsO produce seeds A portfolio manager has a $250m position in an equity portfolio which tracks the BEALE100index. The manager is concerned about the possibility of a short term fall in the index andconsequent decrease in the value of his portfolio. As a result investors may question hiscompetence and invest their money elsewhere. To address this issue the fund managerdecides to hedge using futures written on the BEALE100 index. The current value of the indexis 7,500 points with a continuously compounded dividend yield of 1.8%. The portfolio has abeta of 1.2 with respect to the index. The relevant futures contract has 6 months to maturityand has a contract multiple of $25 per full index point. The risk-free rate of interest is 2.5%.a. Calculate the futures position required to hedge the portfolio using a beta hedge.b. After 3 months the spot price of the index falls to 7,200 points and the futures position isclosed out. What will be the new quoted futures price and what will be the gain or loss onthe futures and spot positions and the return on the hedged portfolio?c. Discuss whether this is likely to be a perfect hedge. A piece of wall art is comprised of mirrors in the shapes of squares, rectangles, circles, and triangles. One of the triangles is in the shape of a right triangle and has one leg length of 3 inches and another leg length of 7 inches. What is the length of the hypotenuse of the specified mirror piece, round your answer to the nearest tenth? 3. What promise do the Eplers make to Mattie at the market?a. to ask everyone if they have seen her motherb. to deliver a chicken to the coffeehousec. to come see her at the marketplace the next dayd. to take Mattie to the country to look for her motherHELP SUMME WORK many individuals who are diagnosed with dissociative identity disorder report suffering from _____ during childhood. in a time trial, when a cyclist is racing along at 12 m/s how fast is a point at the top of the tire moving? One way everyone has been able to read and understand the UDHR is A. the World Bank reported the information to 2.47 billion people B. the government making sure that e rights are being followed C. putting the general message of the Articles D. by translating the document into over 300 languages WILL GIVE BRAINLIEST!Consider the following.a number added to the product of three and the numberTranslate into a variable expression. (Use x for your variable. Do not simplify.) What is the domain of this function? (-6.7, 12)(15,5.2)(1,9)(12,9) In a scale drawing, 6 inches equals 2 feet. What is the SCALE FACTOR? stack of slotted masses consists of three 20 g pieces, two 50 g pieces, one 100 g piece, two 2 g pieces, and one 5 g piece. What is the total uncertainty in the mass?slotted masses precision : .1 g for 1, 2, 5, and 10 g pieces .2 g for 20, 50, and 100 g pieces Plants and animals can cause physical weathering. Hi guys, I need help on this practice anyone willing to help; list of things to do1.Show your work2.Don't put somthing silly3.Be smart in your choice4. Answer correctly5.You have less than 15 or 10 minutesThank you! What is the primary differentiation between a microblog and a blog? O microblogs allow users to use only 140 characters of text in their posts. O microblogs can be multimedia in nature. O microblogs are personal in nature. O blogs are not opinionated in nature. O blogs are organized in reverse chronological order. give the total number of electron domains, the number of bonding and nonbonding domains, and the molecular geometry for clo2-. group of answer choices From the 1800's to now, Operations Management has progressed through the following stages, in this order: A. Multi-Domestic, International, Transnational, GlobalB. International, Multi-Domestic, Global, Transnational C. Quality focus, Cost focus, Craftsmen, CustomizationD. Craftsmen, Cost focus, Quality focus, Customizatio" 2. Express 6,785.45861 correct to three decimal places Determine which, if any, of the given values is a solution.8p 16 = 40p = 5; p = 7; p = 9p = ? Mr. Carver's redwood fence needs a new coat of stain. One gallon of redwood stain covers 400 square feet. The fence is eight feet high and 150 feet long. He will stain both sides of the fence.What is the total number of square feet of fence to be stained? How many gallons of stain is needed? please hurry!!An office manager orders one calculator or one calendar for each of the office's 80 employees. Each calculator costs $10, and each calendar costs $15. The entire order totaled $1,000. Write the system of equations that models this scenario.