TCS Agile vision 'Enterprise Agile by 2020' means

Answers

Answer 1

Answer:

TCS embarked on its journey toward Enterprise Agile 2020 by enhancing business agility to support growth and continuously changing requirements. TCS needed to migrate from legacy systems to an open, scalable, and resilient IT infrastructure with more compute capacity, lower cost of ownership, and no vendor lock-in.

Answer 2

TCS IT such as  Ultimatix is one that has brought about a value-driven, outcome-result due to delivery model.

What is the  TCS IT about?

TCS IT is based on people (culture), process and technology and it use them to create acceptability towards a new method of working and creating business value stream.  

TCS is one that has its journey in Enterprise Agile 2020 by helping business agility to have more growth and quick changing requirements.

In view of TCS' Enterprise Agile 2020 vision, the IT group made a strong and adaptable infrastructure to aid the firm's change movement.

Learn more about Agile  from

https://brainly.com/question/7246595


Related Questions

The role of ICT In government.

Answers

Answer:Communication between a government and its citizens can happen in real-time since messages are delivered instantaneously.

E-Government uses ICT for the development of more efficient and more economical government.

Explanation:

Different types of users in a managed network, what they do, their classification based on tasks

Answers

In a  managed network,, skilled can be miscellaneous types of consumers accompanying various roles and blames.

What is the network?

Administrators are being the reason for directing and upholding the network infrastructure. Their tasks involve network arrangement, freedom management, consumer approach control, listening network performance, and mechanically alter issues.

Administrators have high-ranking approach and control over the network. Network Engineers: Network engineers devote effort to something designing, achieving, and claiming the network foundation.

Learn more about   network from

https://brainly.com/question/1326000

#SPJ1

Five jobs arrive nearly simultaneously for processing and their estimated CPU cycles are, respectively: Job A = 12, Job B = 2, Job C = 15, Job D = 7, and Job E = 3 ms. Using SJN, and assuming the difference in arrival time is negligible, What is the average turnaround time for all five jobs?

Answers

Answer:

A scheduling mechanism called Shortest Job Next (SJN), often referred to as Shortest Job First (SJF), chooses the work with the shortest CPU burst time to be completed next. We must first establish the turnaround time for each work in order to calculate the average turnaround time using SJN. Turnaround time is the sum of the waiting and execution periods from the time the task is delivered until it is finished.

Considering the CPU cycles used by each job:

Job A: 12 ms

Job B: 2 ms

Job C: 15 ms

Job D: 7 ms

Job E: 3 ms

The jobs are arranged using the SJN method in the following order: Job B (2 ms), Job E (3 ms), Job D (7 ms), Job A (12 ms), and Job C. (15 ms)

Now we can figure out how long it will take to complete each job:

Job B: 0 ms (waiting time) + 2 ms (execution time) = 2 ms

Job E: 2 ms (waiting time) + 3 ms (execution time) = 5 ms

Job D: 5 ms (waiting time) + 7 ms (execution time) = 12 ms

Job A: 12 ms (waiting time) + 12 ms (execution time) = 24 ms

Job C: 24 ms (waiting time) + 15 ms (execution time) = 39 ms

By summing all all turnaround times and dividing by the total number of tasks, we can determine the average turnaround time:

(2 ms plus 5 ms plus 12 ms plus 24 ms plus 39 ms) / 5 = 82 ms / 5 = 16.4 ms.

Thus, the SJN algorithm's average turnaround time for all five tasks is 16.4 ms.

QUESTION 9
Alex wants to center the title and his name on his cover page. Which of the following buttons should he press?

Answers

Alex if he wants to center the title and his name on his cover page, he has to press centered.

What are  cover page?

Cover pages is known to be the page that is made up of the title of sny article, books etc. It also include the name of your school, course name, etc.

Therefore, Alex if he wants to center the title and his name on his cover page, he has to press centered so as to be in the middle top of the document.

Learn more about cover page from

https://brainly.com/question/3602860

#SPJ1

Which of the following step numbers in Step 1 allowed S3 to publish to the SNS topic created?

Answers

Going  to the SNS dashboard in the AWS Console as well as Creating an SNS Topic.

What is meant by SNS topic

SNS (Simple Notification Service) is a messaging service provided by Amazon Web Services (AWS) that enables the sending of messages to a variety of recipients, such as email addresses, mobile devices, and other AWS services.

In SNS, a topic is a logical access point that acts as a communication channel between a sender (publisher) and multiple recipients (subscribers). Publishers can send messages to a topic, and subscribers can receive these messages from the topic.

Read more on SNS topic here:https://brainly.com/question/13069426

#SPJ1

Draw a digital circuit consisting of a 2-input AND gate and three inverters, where an inverter is connected to each of the AND gate’s inputs and its output. For each of the four possible combinations of inputs applied to the two primary inputs of this circuit, determine the value produced at the primary output. Is there a simpler circuit that gives the same input/output behavior?

Answers

Answer:

no me se la respuesta por q esta en ingles

Explanation:

ksksksks

Billie downloads an email attachment from a co-worker. The attachment contains a virus. Within minutes of downloading the file, Billie's computer shuts down and will not turn back on. The company uses an intranet network. How did a virus most likely get into the original file sent to Billie? Explain your answer.

Answers

Answers:

You suspect that you have accidentally downloaded a virus.Turn off his computer and reboot from a clean system disk.She has no reason to expect a file from this person.Lisa has received a file attachment from a co-worker, James.The attachment contains a virus.

The virus most likely get into the original file sent to Billie through a corrupt file that was sent and it automatically pitch itself to the file.

How do viruses get into files?

A  lot of Computer Viruses are known to often spread to other disk drives or computers  mostly wen an infected files are gotten through downloads that are gotten from websites, email attachments, etc.

Note that the issue is that virus most likely get into the original file sent to Billie through a corrupt file that was sent and it automatically pitch itself to the file.

Learn more about email attachment from

https://brainly.com/question/17506968

#SPJ2

Your team has been assigned responsibility to identify an appropriate MSSP provider for a small, rural hospital. What criteria will you use to select an appropriate provider? Do research online to identify three MSSP providers. Use the criteria you established to rate each of the three, and choose the one that would be best for the hospital.

Answers

The Criteria for Choosing the Right MSSP for for a small, rural hospital are:

Customized solution. UX – User experience. Responsiveness. Cost-effective.

What are the three MSSP providers?

They are:

1) Cipher.

2) SecurityHQ.

3) SecureWorks.

The option that is chosen among the three is Cipher. It is known to be chosen because they provide the services listed above which is needed by the hospital as well as:

Cybersecurity MonitoringIncident Management and Cyber Defense Security Asset Management, etc.

Therefore, based on the above. The Criteria for Choosing the Right MSSP for for a small, rural hospital are:

Customized solution. UX – User experience. Responsiveness. Cost-effective.

Learn more about Cipher from

https://brainly.com/question/14754515
#SPJ1

Three friends decide to rent an apartment and split the cost evenly. They each paid $640 towards the total move in cost of first and last month's rent and a security deposit. If rent is $650 per month, how much was the security deposit?
a.
$10
b.
$207
c.
$620
d.
$1,270



Please select the best answer from the choices provided

Answers

Answer:

c. $620

Explanation:

To find the cost of the security deposit, we need to subtract the amount paid towards the first and last month's rent from the total move-in cost.

Each friend paid $640 towards the total move-in cost, which includes the first and last month's rent and the security deposit. Since they split the cost evenly, the total move-in cost is 3 times $640, which is $1920.

The monthly rent is $650 per month, so the first and last month's rent combined is 2 times $650, which is $1300.

To find the security deposit, we subtract the first and last month's rent from the total move-in cost:

Security deposit = Total move-in cost - First and last month's rent

Security deposit = $1920 - $1300

Security deposit = $620

Therefore, the security deposit was $620.

Option c. $620 is the correct answer.

disadvantages and advantages of relocatable and single user contiguous allocation scheme

Answers

Answer:

Relocatable Allocation Scheme:

Advantages:

1. It allows for flexible storage allocation, making it easy to adjust the size of files and folders.

2. It facilitates dynamic linking, which allows multiple processes to share the same code and reduces memory usage.

3. It makes it easier to load and remove programs, as the system can simply adjust the pointers to the relocated memory addresses.

Disadvantages:

1. It requires more complex memory management algorithms, which can slow down the system.

2. Segmentation of memory can occur, leading to fragmented memory over time.

3. It may not be the best choice for small systems, as it requires more overhead.

Single User Contiguous Allocation Scheme:

Advantages:

1. It is simple to implement and requires little overhead, making it ideal for small systems.

2. There is no fragmentation of memory, as each file is stored in a contiguous block of memory.

3. It allows for faster access to files, since they are stored in a contiguous block of memory.

Disadvantages:

1. It can lead to wasted storage space, as files may not fill their allocated blocks entirely.

2. It can be inflexible, as resizing files or directories may require extensive rearrangement of memory.

3. It can be vulnerable to external fragmentation, where space is wasted due to the way files are allocated over time.

Esquema de reglas css

Answers

The CSS rules schema is a set of guidelines and syntax used to write CSS code for styling HTML documents, including selectors, declarations, and values. It helps ensure consistency and readability in code.

Why is  CSS rules schema important?

CSS rules schema is important because it provides a systematic and structured approach to designing and formatting web pages. It helps developers maintain consistency in their styling, which is important for usability and user experience.

A consistent and well-organized CSS rules schema can also make it easier to maintain and update a website, as changes can be made quickly and efficiently. Note as well that, it can improve the accessibility and search engine optimization (SEO) of a website by ensuring that the HTML is properly formatted and organized.

Learn more about CSS Rules Schema:
https://brainly.com/question/17584518
#SPJ1

how do you fill different data into different cells at a time in Excel

Answers

The way that you fill different data into different cells at a time in Excel are:

Click on one or a lot of cells that you want to make use of as the basis that is needed for filling additional cells. For a set such as 1, 2, 3, 4, 5..., make sure to type 1 and 2 into the 1st two cells. Then pull the fill handle .If required, select Auto Fill Options. and select the option you want.

How do you make a group of cells auto-fill?

The first thing to do is to place the mouse pointer over the cell's bottom right corner and hold it there until a black + symbol appears. Drag the + symbol over the cells you wish to fill in while clicking and holding down the left mouse button. Additionally, the AutoFill tool rightly fills up the series for you.

Note that  Excel data entering  can be automated and this can be done by: On the Data tab, select "Data Validation," then click "Data Validation." In the Allow box, select "List." Enter your list items in the Source box, separating them with commas. To add the list, click "OK." If you wish to copy the list along the column, use the Fill Handle.

Learn more about Excel from

https://brainly.com/question/25879801
#SPJ1

What does the icon look like to add a new worksheet to the current workbook?
O a paintbrush
O a triangle with an exclamation point inside
O a lightbulb
O a circle with a plus sign inside

Answers

Answer:

A circle with a plus sign inside

Explanation:

I took the test

is iPhone better than android

Answers

Answer:

It's up to personal preference.

Explanation:

iPhone/Apple gives more compliments to security than Android.

Android has more friendly user GUI and dev tools.

iPhones tend to be more complicated and over time get slower as more apple products are released but it is a bit more organized in my opinion and the camera quality is pretty good.

On the other hand Androids are very easy to set up and navigate. Just the camera quality of some androids isn’t the greatest. Over all it’s just on personal preference, they have a lot of the same qualities.

Monero is cryptocurrency that focuses on transparency of ownership. True or false

Answers

Answer:

TRUE

Explanation:

50 POINTS please helpppppp What does SET used to secure emails? S/MIME stand for secure/multipurpose Internet extensions it is a standard for public key encryption. this standard uses a digital _______ to secure emails

Answers

Answer:

signature!

Explanation:

hope this helped

Answer:

Answer Is Signature

Explanation:

Perform the following for each 8 bit binary addition:

add the two binary numbers

interpret all there 8 bit binary numbers as a signed number (2’s complement)

interpret all three 8 bit binary numbers as unsigned numbers



Binary Number

Signed Decimal Value

Unsigned Decimal Value

Number 1

01111001




Number 2

00011110



Sum







Binary Number

Signed Decimal Value

Unsigned Decimal Value


Number 1

00011011



Number 2

00010100



Sum








Binary Number

Signed Decimal Value

Unsigned Decimal Value

Number 1

11110110




Number 2

10000011



Sum

Answers

Answer:

Where are options?

Explanation:

The following do-while loop is suppose to ask for the price for a gallon of gas. The price must a positive number. The price can be an integer value or a double value. for example the price can be 3 or 3.0 or 3.5.

To create a robust program, we must do the data validation and as long as the user is entering a negative value or a String, the program must keep asking the user to enter a valid input.

in this program you need to use some of the scanner methods listed here, make sure to use the proper ones: hasNextInt(), hasNextDouble(), hasNextLine(), hasNext(), nextInt(), nextDouble(), nextLine()

Must flush the buffer at the proper locations in the code

Answers

Answer:

import java.util.Scanner;

public class qs {

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       double price;

       do {

           System.out.print("Enter the price for a gallon of gas: ");

           while (!input.hasNextDouble()) {

               System.out.println("That's not a number!");

               input.next(); // this is important!

           }

           price = input.nextDouble();

       } while (price < 0);

       System.out.println("The price is " + price);

   }

}

Mice can be connected to a computer using the _________ or ________ port.​

Answers

Bluetooth or USB port

Question 1(Multiple Choice Worth 5 points)
(01.01 MC)
Which broad category is known for protecting sensitive information in both digital and hard-copy forms?
O Cybersecurity
O Information protection
O Information assurance
Internet Crime Complaint Center

Answers

Answer:

Information assurance

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Information assurance is a broad category that is typically used by cybersecurity or network experts to protect sensitive user information such as passwords, keys, emails, etc., in both digital and hard-copy forms

What are the reasons you need a dedicated software development team?

Answers

Answer:

Having a dedicated software development team is essential for any modern organization. A specialized software development team can provide your company with the expertise needed to create quality and secure products or services that meet all of your requirements. Additionally, they can help you develop and maintain feature-rich applications that are tailored specifically to fit your business needs as well as stay ahead of market changes by allowing teams of developers to rapidly iterate on ideas and concepts quickly in order to deliver innovative solutions faster than ever before! Finally, having an experienced development team means creating customizations easily without needing external support, which makes for fewer problems over time.

Answer:

To successfully hire a dedicated development team, you must pick a business that can provide a wide collection of skill sets, such as designers, developers, and quality assurance professionals, all of whom can cooperate to create end-to-end service. All of these needs may be met as long as you clearly communicate about the scope and goals.

Explanation:

Let's explore the benefits of the dedicated development team at Nuvento

The advantages of hiring a dedicated development team at Nuvento is;

Cost-effective

Costs for office space, training and onboarding, and other legal charges are all part of the traditional manner of hiring a team of developers. Because dedicated development teams are hired remotely, these costs are reduced without affecting work quality.

Hiring a dedicated development team has the advantage of not needing you to spend time interviewing and hand-picking applicants to put together a team for your project. We will put up a group of experts that are well-suited for the assignment once the scope and criteria are given.

As a result, the pay scale can be adjusted based on the work requirements. It's an excellent way to simplify your spending and may save your firm a significant amount of cash over time.

Access to global talent

Access to a global talent pool opens up a world of possibilities by introducing a completely new dimension to your organisation. With their knowledge and skills, these individuals can improve the capabilities of your technology stack—often at a very low cost.

Hiring software development from India provides you a significant edge. Indian specialists are capable of providing high-tech solutions at reasonable costs. Furthermore, they may collaborate with your in-house IT staff to develop solutions.

Complete control

You have direct control of the selection, recruitment, and administration of your development team, which includes everyone from coders and designers to project managers and business analysts. Rather than simply deciding on a team schedule, you will need to create workflows, communicate, manage tasks, track progress, evaluate performance, and so forth.

In terms of control over the development process, hiring a team of developers is comparable to having an in-house team working from a remote office. However, if you want, a dedicated hiring model allows you to delegate micromanagement to your dedicated project manager.

Focused and dedicated approach

A development staff that is dedicated to your cause becomes an integral part of your company. Your preferred methods and management practises guide dedicated teams.

Our development staff is dedicated to your project and is driven to achieve your goals without distraction. With such a high degree of interaction, the team is able to better understand your company's demands and be more effective and productive.

Increase in productivity

In the rapidly changing software sector, productivity and speed of work are critical. These factors may be adjusted to provide your company a competitive advantage. Dedicated developers are used to dealing with outsourced companies, therefore there is no need for them to adjust.

Dedicated developer teams have a lot of expertise working together in an efficient, productive, and dynamic manner.

Flexibility

A dedicated web development team offers a significant amount of flexibility. They can dedicate their entire time to one project while you work on others.

Flexibility is important not only for startups but also for bigger enterprises. The additional level of control and team management provided to a corporation is a great asset. It also means that if you need changes made while the job is being done, you may call the team and they will meet your needs.

To know more about the benefits of hiring a dedicated development team visit this page;

https://nuvento.com/dedicated-software-development-teams/

Liam has created a résumé that he has posted on a job search website. What two things did he did correctly for this résumé? He used different bullets styles to make his résumé attractive. He used Ariel font size 12 for his résumé. He posted his religious event volunteer work in the Work Experience section. He proofread his résumé before submitting. He included only his current work experience.

Answers

It can be inferred from the options about Liam's résumé that Liam did the following correctly:

He proofread his résumé before submitting it.He used Ariel font size 12 for his résumé

What is a résumé?

A résumé, sometimes known as a curriculum vitae in English outside of North America, is a document that a person creates and uses to demonstrate their history, abilities, and accomplishments. Résumés can be used for a number of purposes, although they are most commonly utilized to find a new job.

There are three types of resume styles that job seekers usually use: chronological resumes, functional resumes, and mixed resumes (otherwise known as hybrid résumé).

It should be noted that Volunteer Experience ought not to be mixed with paid work experience.

While it is advisable to use bullet points to make your résumé look orderly, using more than one can be distracting and make your resume look unprofessional. It is best practice to use only one type of bullet point.

Learn more about résumé:
https://brainly.com/question/18888301
#SPJ1

b) What is system software? Write its importance.​

Answers

Answer:

System software is software designed to provide a platform for other software. Examples of system software include operating systems like macOS, Linux, Android and Microsoft Windows, computational science software, game engines, search engines, industrial automation, and software as a service applications.

Explanation:

9. Computer 1 on network A, with IP address of 10.1.1.10, wants to send a packet to Computer 2, with IP address of
172.16.1.64. Which of the following has the correct IP datagram information for the fields: Version, minimum
Header Length, Source IP, and Destination IP?

Answers

Answer:

Based on the given information, the IP datagram information for the fields would be as follows:

Version: IPv4 (IP version 4)

Minimum Header Length: 20 bytes (Since there are no additional options)

Source IP: 10.1.1.10 (IP address of Computer 1 on network A)

Destination IP: 172.16.1.64 (IP address of Computer 2)

So the correct IP datagram information would be:

Version: IPv4

Minimum Header Length: 20 bytes

Source IP: 10.1.1.10

Destination IP: 172.16.1.64

below are the classification of guest Except one?


A.Corporate business travelers
B. domestic tourist
C.Guest speaker
D.Valet

Answers

Answer:

D. Valet

Explanation:

:)

:)

:)

:)

:)

:)

hp

My laptop volume has got really low all of a sudden. It wasn't the best to start with but now i can barely even hear it at 100%. Is there some sort of settings that can change this?

Answers

Answer:

make sure the speaker is clean and you volume setting is on normal there is alot of setting for deaf people so make sure that is correctly

What Are the Types of Web Sites? *​

Answers

Answer:

This is your answer ☺️☺️☺️

What Are the Types of Web Sites?*
most web sites are search engines

1
A problem that can be solved through
technological design has been identified. A
brief has been written. What is the next step
in the design process?
O Specification writing
O To conduct background research
O To identify barriers and constraints
The design of different potential solutions

Answers

The next step in the design process will be the design of different potential solutions. The correct option is D.

What is technological design?

Technological design is a distinct process with several distinguishing characteristics: it is purposeful, based on specific requirements, iterative, creative, and systematic.

A good technical design is one that requires the least amount of effort and money while meeting your business requirements, particularly in terms of development speed and turn-around time, maintenance cost, deployment complexity, scalability, or security requirements.

A problem has been identified that can be solved through technological design. A synopsis has been written. The design of various potential solutions will be the next step in the design process.

Thus, the correct option is D.

For more details regarding technological design, visit:

https://brainly.com/question/26663360

#SPJ1

What are to be considered before software installation? Why?​

Answers

Answer:

before software installation we should consider the following things:

1. Software must be virus free

2.Required components for software should be installed

3.Computer requirements must be little bit high required for that software

4.software musn't be corrupt

Each time we add another bit, what happens to the amount of numbers we can make?

Answers

Answer:

When we add another bit, the amount of numbers we can make multiplies by 2. So a two-bit number can make 4 numbers, but a three-bit number can make 8.

The amount of numbers that can be made is multiplied by two for each bit to be added.

The bit is the most basic unit for storing information. Bits can either be represented as either 0 or 1. Data is represented by using this multiple bits.

The amount of numbers that can be gotten from n bits is given as 2ⁿ.

Therefore we can conclude that for each bit added the amount of numbers is multiplied by two (2).

Find more about bit at: https://brainly.com/question/20802846

Other Questions
A stack of 200 file folders is 5.125 inches tall. A. Elena guesses that each file folder is 0.035 inches thick. Explain how you know that Elena's answer is not correct. which comparison does the ratio 20:21 represent? Discuss how the invention of the printing press sparked both positive and negative aspects of a "printing revolution." pllzzzzz important!!!!! Tutorial Exercise Phone calls arrive at the rate of 24 per hour at the reservation desk for Regional Airways. (a) Compute the probability of receiving four calls in a 5-minute interval of time. (b) Co What happens in the beginning of scarlet letter? Sasha wants to generate a balance sheet to see accounts receivable. Which QuickBooks report basis would be most useful? Receivable Cash Accrual A biochemist completely digests a glycerophospholipid with a mixture of phospholipases A and D. HPLC and mass spectrometry analysis reveals the presence of an amino acid of 105.09 Da, a saturated fatty acid of 256.43 Da, and an omega-3 monounsaturated fatty acid of 282.45 Da. Which amino acid does the glycerophospholipid contain? which ids method searches for intrusion or attack attempts by recognizing patterns or identifying entities listed in a database? 1) Which of the following is not a polynomial expression?(1) x4(3) 1-2x(2) 3(4) 6x +1 From the entire population of soybean farms, consider soybean yield, measured in metric tonnes per hectare of land, as a normally distributed random variable with mean 4.5, and a standard deviation of 2.5. From the population of soybean farms: a) What is the probability that a randomly selected hectare of land has a soybean yield of less of 3.5 metric tonnes per hectare? (3 marks) b) What is the probability that a randomly selected hectare of land has a soybean yield of between 5 and 6.5 metric tonnes per hectare? (3 marks) At the beginning of the year 2005, a person invests some amount in a bank. At the beginning of 2010, the accumulated interest was 10000 and at the beginning of 2015, the accumulated interest became 25000. The interest rate is compounded annually and the annual interest rate is fixed. What is the principal amount? Suppose that, at a particular time, the September futures price is $1300 and the December futures price is $1340. You are convinced that the spread between the September and December prices will soon widen, but you have no belief as to whether both prices will rise, or both prices will fall. You take a spread trade based on your belief. On a subsequent date, the September futures price is $1310 and the December futures price is $1320. You gain or loss will be: a) $10 b) $30 c) $20 d) $40 e) none of these answers Match the features to either the Old Left political view or the New Left political view to show how the left changed in the1960s. What is the most simplified expression for 4 c squared d + 3 d c minus 2 (d c squared + c d) + 6 c squared d squared?A. 2 c squared d + d c + 6 c squared d squaredB. 2 c squared d + 5 d c + 6 c squared d squaredC. 3 c squared d + 3 d c + 6 c squared d squared + c dD. 3 c squared d + 2 d c + 6 c squared d squared minus 2 cd Why is there no liquid metallic hydrogen zone in the interiors of uranus or neptune?. The Credit Card Processing unit of a bank receives 60 applications per hour. All applications first go through application processing that takes 6 minutes per application. There are 4 workers in the unit who process the applications. After the application is processed, all applications go through the credit check stage which takes 10 minutes per application. There are 6 workers at this stage. 20% of the applications fail the credit check and are rejected. Remaining 80% of applications that pass the credit check are sent for determining credit limit. There are 6 workers at the Determine credit limit stage, and it takes 15 minutes for a worker to process one application. After the credit limit is determined, all applications are sent to the issuing desk, who issue the credit card, and it takes 3 minutes per application.What is the capacity of the "Credit Check" stage in number of applications per hour? Which expression is equivalent to the expression below?2(6k+4)4(2+2k1)-------------------------------------------------------------------------a} 18+48kb} 14k1c} 4k4d} 4+4k _HCN+_CUSO4=_CUSO4+_CU(CN)2 Jasmine wants to use her savings of $1,128 to buy video games and movies. The total price of the movies she bought was $72. The video games cost $43 each. Choose the inequality that would be used to solve for the maximum number of video games Jasmine can buy with her savings. 43 + 72x 1,128 43 + 72x 1,128 43x + 72 1,128 43x + 72 1,128 WILL MARK BRAINLIEST ASAP PLEASE the number of calories ,c, burned while walking is directly proportional to the distance ,d , a person walks. Tom burned 180 calories walking a distance of 2 miles.which equation represents this relationshipA) c=180+dB) c=90dC) d=90+cD) d=180cplease help if you for sure know, this is part of a big test