T/F the mac group does not replace the primary functions of eocs or other dispatch organizations.

Answers

Answer 1

Answer: true

Explanation: hope it helps

Answer 2

It is true that MAC group does not replace the primary functions of EOCS or other dispatch organizations.

What is MAC?

Each device connected to the network is given a 12-digit hexadecimal number known as a MAC address, or media access control address.

Representatives from many agencies and organizations, including emergency management, law enforcement, fire, public health, and transportation, are generally included in MAC groups in emergency management.

The MAC group facilitates coordination and communication between many agencies and groups; nevertheless, it is not in charge of overseeing the whole response to a crisis.

Instead, to make sure that the reaction to an incident is as efficient and well-coordinated as possible, the MAC group collaborates with regional EOCs and other dispatch groups.

Thus, the given statement is true.

For more details regarding MAC, visit:

https://brainly.com/question/30464521

#SPJ2


Related Questions

The Crow’s foot symbol with two vertical parallel lines indicates _____ cardinality.a. (0,N)b. (1,N)c. (1,1)d. (0,1)

Answers

The Crow’s foot symbol with two vertical parallel lines indicates option  c. (1,1) cardinality.

What is Symbols in crow's foot notation?

Crow's foot diagrams is one that stands for entities as boxes, and its association as lines that exist between the boxes.

Note that different shapes at the ends of these lines stands for the relative cardinality of the relationship and thus The Crow’s foot symbol with two vertical parallel lines indicates option  c. (1,1) cardinality.

Learn more about notation from

https://brainly.com/question/1750038

#SPJ1

consider the er diagram in figure 3.24. assume that a course may or may not use a textbook, but that a text by definition is a book that is used in some course. a course may not use more than five books. instructors teach from two to four courses. supply (min, max) constraints on this diagram. state clearly any additional assumptions you make. if we add the relationship adopts, to indicate the textbook(s) that an instructor uses for a course, should it be a binary relationship between instructor and text, or a ternary relationship among all three entity types? what (min, max) constraints would you put on the relationship? why?

Answers

The (min, max) constraints depicted in Figure B will be present in the final ER Diagram.

What is entity relationship model give an example?

Real-world objects are represented by an ER model. In the real world, an entity is a thing or object that stands out from the surrounding environment. An organization's employees, for instance, are distinct entities.

Taking into account the additional following assumptions: - Only one instructor teaches each course. - Only one course makes use of each textbook. - The use of a textbook by an instructor is not required for all courses. If there is a text: - ___ It is utilized in a specific course, so the instructor who teaches that course adopts it. When a text is used in a course taught by an instructor, it is considered adopted.

The constraints (min., max.) depicted in Figure B will be present in the final ER Diagram.

To learn more about ER visit :

https://brainly.com/question/30873853

#SPJ1

you are deploying two new applications to users in the company as follows:all computers should have microsoft word users in the accounting department should have microsoft access other users in the company, you want to allow them to install microsoft access if desired by using the add/remove programs applet in the control department has its own organizational unit.

Answers

To deploy two new applications in the company, Microsoft Word should be installed on all computers, while users in the accounting department should also have Microsoft Access. Other users can install Microsoft Access if desired using the add/remove programs applet in the control panel. The accounting department has its own organizational unit.

In order to ensure that all users in the company have access to Microsoft Word, the application should be installed on all computers. Microsoft Word is a widely used word processing software and it is beneficial for all users to have it installed. Additionally, the users in the accounting department have specific needs that require Microsoft Access, a database management system. Therefore, it should be installed on the computers used by the accounting department to fulfill their job responsibilities efficiently.

For the remaining users in the company who do not belong to the accounting department, it is desirable to give them the flexibility to install Microsoft Access if they have a need for it. This can be achieved by allowing them to use the add/remove programs applet in the control panel. By accessing this applet, users can choose to install or uninstall Microsoft Access as per their requirements.

Considering the organizational structure of the company, it is mentioned that the accounting department has its own organizational unit. This indicates that there might be separate policies, permissions, and settings specific to the accounting department. These can be managed through the organizational unit, allowing for streamlined deployment and management of applications within the department.

learn more about Microsoft Word here:

https://brainly.com/question/30160880

#SPJ11

por que se dice que las TIC´S son las integracion de las TI y las TC?

Answers

La respuesta correcta para esta pregunta abierta es la siguiente.

A pesar de que no se anexan opciones o incisos para responder, podemos comentar lo siguiente.

Se dice que las TIC´S son las integración de las TI y las TC porque ambas actividades se han integrado o fusionado en una solo concepto al momento de juntar las herramientas tecnológicas para almacenar, procesar y mandar información a través de los recursos tecnológicos utilizando los canales o recursos de los medios masivas de comunicación como lo son las redes satelitales o las comunicaciones vía microondas.

Al fusionarse las TI (Tecnologías de la Información) con las TC (Tecnologías de Comunicación), se maximiza la capacidad de enviar una mayor cantidad de información al momento a diferentes lugares del planeta.

You have been hired to develop the website for a popular speaker. He has asked that you include the PowerPoint slides from his last major presentation on his website. However, you know that most users won’t download PowerPoint slides. What method would you suggest for including the slides on the website?

Answers

The method would you suggest for including the slides on the website are:

First one need to Download WOWSlider and then register for it.Then one can make your slider. You need to have some images ready to add to the slideshow that you want to make.Then Export your slider.You also need to add the slider to your own webpage.

What are the different ways of creating slides?

PowerPoint are known to be one that gives about different ways to create a presentation.

One can use Blank presentation, one can also used  other Design Template and also From AutoContent Wizard.

Note that in the case above, The method would you suggest for including the slides on the website are:

First one need to Download WOWSlider and then register for it.Then one can make your slider. You need to have some images ready to add to the slideshow that you want to make.Then Export your slider.You also need to add the slider to your own webpage.

Learn more about slides from

https://brainly.com/question/24653274

#SPJ1

T/F hackers might infiltrate computer systems to enlist hardware for subsequent illegal acts.

Answers

True, hackers might infiltrate computer systems to enlist hardware for subsequent illegal acts.

It is true that hackers may infiltrate computer systems with the intention of enlisting hardware for future illegal activities. This practice, known as "botnet recruitment" or "zombie army creation," involves compromising multiple computers or devices to create a network of controlled machines, commonly referred to as a botnet. These botnets can be used for a variety of malicious purposes, including launching distributed denial-of-service (DDoS) attacks, sending spam emails, distributing malware, or even mining cryptocurrencies without the owner's consent.

By infiltrating computer systems, hackers gain unauthorized access to these devices, often exploiting vulnerabilities in software or tricking users into downloading malicious software. Once a computer or device is compromised, it becomes part of the hacker's botnet, allowing them to control and utilize the hardware resources for their illegal activities. This method provides hackers with a large number of compromised systems, increasing their computing power and making it harder to trace back to a single source.

To prevent such infiltration, it is crucial to implement strong security measures, including regularly updating software, using robust antivirus programs, employing firewalls, and practicing safe browsing habits. Additionally, raising awareness about potential threats and educating users about cybersecurity best practices can help mitigate the risk of hackers infiltrating computer systems for illicit purposes.

Learn more about computer systems here:
https://brainly.com/question/17206337

#SPJ11

Heather is running a training program to teach a few contractors how to use excel. All of the contractors are spread out around the country. Which of the following would be the best approach to conduct the training?
one-on-one phone calls
text messages
emails
one-on-one face-to-face meetings
webinars

Answers

Webinars offer a convenient, interactive, and cost-effective approach to training contractors located across the country. They provide a platform for real-time interaction, screen sharing, and collaborative learning.

To conduct the training program for the contractors spread out around the country, the best approach would be webinars. Webinars allow for interactive and real-time training sessions, providing an efficient and cost-effective way to reach a geographically dispersed audience. Here's a step-by-step explanation:

1. Webinars enable Heather to deliver the training program to all contractors simultaneously, regardless of their locations. This eliminates the need for travel and accommodation expenses.

2. Through webinars, Heather can share her screen and demonstrate Excel techniques, allowing contractors to see the practical application of the concepts being taught.

3. Contractors can actively participate in the training by asking questions, which Heather can answer in real-time. This fosters engagement and ensures that contractors understand the material.

4. Webinars often include features like chat boxes, where contractors can interact with each other, discuss challenges, and share insights. This creates a collaborative learning environment.

5. Recorded webinars can be made available for contractors to review later, allowing them to revisit specific topics or catch up if they missed the live session.

To know more about effective visit:

https://brainly.com/question/29429170

#SPJ11

What is the force that resists the motion of an object through a fluid?

Answers

Answer:

Friction (drag)

Explanation:

The force resisting motion through a fluid is a type of friction, that is called drag.

Use the drop-down menus to complete the sentences about inline replies in Outlook
Inline reply options are found at the top of the
The Reading Pane will display your reply with the original
Use the pop-out function to open the reply in a new
Highlighting and
on a message will also activate an inline reply.

Answers

Answer:

3 reading pane

2 message

1 window

3 right clicking

Explanation:

The complete sentence about inline replies in Outlook:

Inline reply options are found at the top of the (reading pane)The Reading Pane will display your reply with the original (message)Use the pop-out function to open the reply in a new (window)Highlighting and (right-clicking) on a message will also activate an inline reply.What are inline replies?

Instead of starting a new email from scratch, inline replying is the practice of responding to a message within the main body of the email.

The majority of us currently use inline replies occasionally; in fact, we would argue that they should be utilized much more frequently.

Therefore, the correct option is:

reading panemessagewindowHighlighting and (right-clicking) on a message will also activate an inline reply.

To learn more about inline replies, visit here:

https://brainly.com/question/28482037

#SPJ5

fill in the blank. question 1____should be the first step when troubleshooting 1 point telling the user to run a virus check gathering information to identify the problem by asking the user questions asking the user to restart the computer asking the user to clear the web browser cache

Answers

Ask questions and gather information to identify the problem

What exactly is information technology?

The use of computers, storage, networking, and other physical devices, infrastructure, and processes to create, process, store, secure, and exchange all forms of electronic data is referred to as information technology (IT). IT is typically used in the context of business operations, as opposed to personal or entertainment technology. IT for business includes both computer technology and telecommunications.The term information technology was coined by the Harvard Business Review to distinguish between purpose-built machines designed to perform a limited set of functions and general-purpose computing machines that could be programmed to perform a variety of tasks. Computing capability increased as the IT industry evolved beginning in the mid-20th century, while device cost and energy consumption decreased, a cycle that continues today.

To know more about Information technology,click on the link :

https://brainly.com/question/29244533

#SPJ1

PYTHON HELP!
Write a loop that continually asks the user what pets the user has until the user enters stop, in which case the loop ends. It should acknowledge the user in the following format. For the first pet, it should say You have one cat. Total # of Pets: 1 if they enter cat, and so on.

Sample Run
What pet do you have? lemur
What pet do you have? parrot
What pet do you have? cat
What pet do you have? stop
Sample Output
What pet do you have? lemur
You have one lemur. Total # of Pets: 1
What pet do you have? parrot
You have one parrot. Total # of Pets: 2
What pet do you have? cat
You have one cat. Total # of Pets: 3
What pet do you have? stop

Answers

Answer:

If you want a loop that continually asks the user what type of pet they have until they input 'stop'...

You could use this loop:

while True:

response = input('What type of pet do you have? ')

if response == 'stop':

break

else:

print(f'You have one {response}. Total # of Pets: 1')

When should else be used in programming?
Group of answer choices

if something should be repeated several times

in a non-conditional statement

to describe what should happen when the condition of an if statement isn’t met

to begin an infinite loop

Answers

Explanation:

The else statement is usually used when computations are still required when a condition is not met in an if and else-if statement, so the correct option is the fourth one: "to describe what should happen when the condition of an if statement isn't met".

Hope this helps :)

Answer:

he is correct

Explanation:

Which Call of Duty game is the best?
A. Black Ops 1-4
B. Modern Warfare 1-4
C. Infinite Warfare
D. Advanced Warfare
E. Ghosts
F. WWII

Answers

Answer:

i like ghost and modern 3

Explanation:

Which of the these is tool for creating mobile apps? A:C# B:Apple Pie C:Appy Pie D:C++​

Answers

Answer:

Appypie

Explanation:

Have a good day

The tool used for creating mobile apps is C#. The correct option is A.

What is C#?

C# is a multi-paradigm, broad sense programming language. C# programming areas of study encompassing static typing, strong typing, lexically scoped, imperative, declarative, functional, generic, object-oriented, and component-oriented programming.

C++ is an intermediate-level language that extends C with object-oriented features, whereas C# is a high-level language.

C++ compiles programs to Machine Codes, whereas C# compiles programs to Common Language Runtime, abbreviated as CLR.

C# is a popular programming language for Windows desktop apps, enterprise solutions, and even game development, as the Unity game engine is built on it.

C# or F# can be used to create native apps for Android, iOS, and Windows (Visual Basic is not supported at this time).

Thus, the correct option is A.

For more details regarding programming language, visit:

https://brainly.com/question/14379391

#SPJ5

size = input("Enter your shoe size: ") size = int(size) if size > 12: print(str(size) + " is too high.") elif size < 6: print(str(size) + " is too low.") else: print(str(size) + " is in stock.") What is the output from running the above code if the user enters ten?

Answers

Answer:

It will print that the shoe size is in stock when the user prints 10, too high when the user enters 12, and anything less than 6 would be too low. It's a python program describing how basic input data is interpreted.

*need answer in the next 1 or 2 days*

Unscramble the terms and then put the numbered letters into the right order.

The words all have to do with digital footprint sorta, the only one I did was settings. It’s really late but I appreciate anyone willing to help.

1. REENSTSCOH

2. PISLYNSIEIBROT

3. MICPAT

4. INTIYTED

5. LIFSEE

6. LARTI

7. TINUARTPEO



*need answer in the next 1 or 2 days*Unscramble the terms and then put the numbered letters into the

Answers

Answer:

1. SCREENSHOT

2. RESPONSIBILITY

3. IMPACT

4. IDENTITY

5. SELFIE

6. TRIAL or TRAIL

7. REPUTATION

Explanation:

I think the secret word is FOOTPRINT

Please Help. Which of the following statements about wide area networks are true? Select 3 options.


A. typically uses Eethernet and wireless routers to connect devices

B. connects devices in a large geographic area

C. is usually managed by a single business

D. may be controlled by multiple entities

E. connections usually occur through a public network

Answers

Answer:

B, D, E

Explanation:

The public Internet is largest WAN in the world.

A LAN (Local Area Network) typically uses Ethernet and Wireless Routers to connect devices.

A single business would not usually manage a WAN because this would create a monopoly, which is why competition is intentionally created between Internet Service Providers (ISPs), though sometimes a single business could manage a WAN via MPLS, etc.

Answer:

- connects devices in a large geographic area

- may be controlled by multiple entities

- connections usually occur through a public network

Explanation:

A wide area network (WAN) connects devices across a broader area like a city. It can provide connections across multiple countries. A wide area network may be managed and controlled by multiple entities. LANs connect to WANs to create a network of networks. The internet is considered the largest WAN.

(Confirmed on EDGE)

I hope this helped!

Good luck <3

do u see abs??????????

do u see abs??????????

Answers

Answer

of course, y u askin tho, im pretty sure every person who doesnt have a sight disability can see her abs as well

Explanation:

why is plastic durable?

Answers

Plastic is not always really durable, but the chemicals and what makes plastic helps with the durability. As a pliable polymer, plastics are made from long chains of synthetic or semi-synthetic molecules. All its carbon-to-carbon bonds hold these molecules together. The bonds is what makes plastics so durable.

Plastic is very stretchy and can take a but for it to actually rip and expose whatever it is protecting

what is the difference between an array and a list

Answers

The difference between an array and a list is that an array is a fixed-size data structure that stores a collection of elements of the same type, while a list is a dynamic data structure that can store a collection of elements of any type.

Arrays are a type of data structure that can hold a fixed number of elements of the same type. The elements in an array are stored in contiguous memory locations and are accessed using an index. The index is an integer value that represents the position of the element in the array.

On the other hand, a list is a dynamic data structure that can hold a collection of elements of any type. The elements in a list are not stored in contiguous memory locations and can be added or removed from the list at any time.

A list is typically implemented as a linked list, where each element in the list contains a reference to the next element. Another difference between an array and a list is that arrays are more efficient when it comes to accessing elements, while lists are more efficient when it comes to inserting or deleting elements.

This is because accessing an element in an array takes constant time, while inserting or deleting an element in an array takes linear time. Conversely, inserting or deleting an element in a list takes constant time, while accessing an element in a list takes linear time.

Learn more about programming at

https://brainly.com/question/33212667

#SPJ11

Choose the option that best matches the description given. The older term, social service, referred to advancing human welfare. The new term, meaning to provide for the needs of various people and groups, is ____.
A. social assistance
B.social welfare
C.social media
For everyone that doesn't wanna watch the ads, The answer is A, social assistance.

Answers

Answer:

Social Assistance

Explanation:

Provision and disbursement of intervention in other to palliate the suffering and want of an individual, group or community can be described as rendering social assistance. Assistance which also means helping people fulfill their needs could be offered by the government, non-governmental organizations or individuals personnels. Rendering social assistance could be in the form of cash or gift offerings, provision of food for the hungry, shelter for the homeless, medical interventions for the sick and catering for other touch points of the needy.

Answer:

Social Assistance

Explanation:

Each tile describes one part of a coherent paragraph. Put the tiles in order to show a recommended way to organize a paragraph a concluding sentence a topic sentence that states the a sentence that refines the topic sentences that further illustrate main idea sentence the main idea​

Answers

Sure, here is an example paragraph using the given terms in order: The benefits of regular exercise go beyond physical health. Sentence that refines the topic: In fact, research has shown that exercise can also improve mental health and cognitive function.


Main idea sentence: Therefore, incorporating regular physical activity into our daily routine can lead to a happier and more productive life. Sentence that further illustrates main idea: For example, studies have found that exercise can reduce symptoms of depression and anxiety, as well as boost creativity and problem-solving abilities.
Concluding sentence: In summary, exercise not only helps us maintain a healthy body but also contributes to our overall well-being.

Start with a topic sentence that states the main idea. This sets the stage for the rest of the paragraph. Follow with a sentence that refines the topic, providing more specific information about the main idea. Add sentences that further illustrate the main idea, giving examples, evidence, or additional details. Finish with a concluding sentence, summarizing the key points made in the paragraph and tying everything together. By organizing your paragraph in this manner, you will ensure a coherent and well-structured flow of ideas.

To know more about research visit :

https://brainly.com/question/11685682

#SPJ11

a_______helps us to see the relationship between different parts of data

Answers

Answer:

Data label........

..

what is the name given to the concept in which layered security mechanisms are used to increase security of the system as a whole? if an attack causes one security mechanism to fail, other mechanisms may still provide the necessary security to protect the system.

Answers

The name given to the concept in which layered security mechanisms are used to increase the security of the system as a whole is "defense in depth." Defense in depth is an approach that involves implementing multiple layers of security controls, such as firewalls.

Intrusion detection systems, and access controls, to provide a comprehensive and robust defense against potential attacks. Defense in depth is based on the principle that no single security measure is foolproof and that a combination of security measures can provide better protection against attacks. By using multiple layers of security mechanisms, if one layer fails to prevent an attack, the other layers can still provide the necessary security to protect the system. The idea behind defense in depth is to create multiple barriers and hurdles for potential attackers, making it more difficult for them to breach the system.

Each layer of security is designed to detect, prevent, or mitigate different types of threats, increasing the overall security posture of the system. By implementing defense in depth, organizations can ensure that even if one security mechanism is compromised, there are still other layers of security in place to protect the system. This approach helps to reduce the risk of successful attacks and provides a more resilient and robust security architecture.

To know more about system visit:

https://brainly.com/question/32297640

#SPJ11

suppose a classification tree model you are using produces a split with two terminal nodes with the same label. why do you think this happened? what is the interpretation you give to the result? is there any method(s) you know of that can address the issue?

Answers

The methods that produces split with two terminal nodes with the same label by tree model are-

Calculate the variance of each child node for each split.As the weighted average variance of the child nodes, calculate the variance of each split.The split with the smallest variance should be chosen.Repeat steps 1-3 until all nodes are entirely homogenous.

What are nodes?Node is an electronic device. It is the Physical components that can send, receive or forward data.Computer is an electronics devices and also have ability to send, receive or forward data. so this is the reason that, we can say computer is a node in computer network.

Know more about nodes click here:

https://brainly.com/question/13992507

#SPJ4

With respect to iot security, what term is used to describe the digital and physical vulnerabilities of the iot hardware and software environment?
a. Traffic Congestion
b. Device Manipulation
c. Attack Surface
d. Environmental Monitoring

Answers

Answer: Answer Surface

Explanation:

Is it possible for the system unit to recognize new devices attached to it

Answers

Answer:

The system unit is the central component of a computer that houses the motherboard, CPU, memory, and other essential components. It is responsible for processing data and communicating with other devices attached to it. One of the most critical functions of the system unit is its ability to recognize new devices attached to it.

In modern computers, this process is automated through plug-and-play technology. When a new device is connected to the system unit, it sends a signal to the operating system, which then searches for drivers and installs them automatically. This allows users to easily connect new devices such as printers, scanners, and external hard drives without having to manually install drivers.

However, there are instances where the system unit may not recognize a new device due to compatibility issues or driver conflicts. In such cases, users may need to manually install drivers or troubleshoot any issues that arise.

Overall, while it is possible for the system unit to recognize new devices attached to it through plug-and-play technology, there may be instances where manual intervention is required.

Explanation:

How to fix unknown usb device device descriptor request failed?

Answers

Answer:

what usb type is it? what is it used for? what type of pc is being used?

Explanation:

different types of visualizations assist the user to interpreting the same data different ways. if you were trying to determine which state has the shortest or longest collection time, which type of visualization best accomplishes this?

Answers

To determine which state has the shortest or longest collection time, a bar chart or a horizontal bar chart would be the best type of visualization to use.

You can plot the collection time for each state on the y-axis and the states on the x-axis. This allows you to quickly compare the collection times for each state and identify the state with the shortest or longest collection time. A bar chart or a horizontal bar chart is particularly useful for this type of comparison because it makes it easy to see the differences in collection times between states.

Bar graphs that are horizontal show the data vertically. It is a graph with horizontally oriented bars. The vertical axis displays the data categories, while the horizontal axis displays the data values.

Learn more about horizontal bar chart: https://brainly.com/question/24741444

#SPJ11

why is it necessary to use standard furniture in a computer lab​

Answers

to avoid poor posture which may lead to strain injury.
Other Questions
A line is an undefined term because it Rashads father stops by before work to tell him a story from when he was an officer. Describe his fathers story. Determine f 1(x) if f of x is equal to the quantity x plus 2 end quantity over the quantity x minus 3 end quantity where x 3. f inverse of x is equal to the quantity x minus 3 end quantity over the quantity x plus 2 end quantity bf inverse of x is equal to the quantity x minus 2 end quantity over the quantity x plus 3 end quantity cf inverse of x is equal to the quantity x minus 1 end quantity over the quantity 3 times x plus 2 end quantity df inverse of x is equal to the quantity 3 times x plus 2 end quantity over the quantity x minus 1 end quantity Consider two countries, Alpha and Beta. In the last 20 years,the average annual growth rate of the real per capita GDP was 2% inAlpha and 5% in Beta. In the current year, the real per capita Both 'Berry' by Langston Hughes and"Mom Luby and the social worker" by Kristen Hunter are stories which highlight similarities and differences in regards to the theme of discrimination. A) Discuss the nature of the discrimination in both stories. B) Examine how each of the main characters respond to the treatment. Complete the statements to find the measurements of a and b In "Sea Fever," what effect is created by poet John Masefield's use of verbals?1. a sense of adventure awaiting2. emotions of doom and gloom3. despair at a chance passed up4. a false feeling of freedom 3x subtracted from 15x + x power of 2 An energy bar contains 2. 1g of protein. 6% of the bar is protein. What is the total mass of the bar? Which expression is equivalent to v96 ? 9.7979589 71 4. In what ways did people use religion to justify slavery? What is the value of the expression The sound intensity a distance d1 = 18.0 m from a chain saw is 0.280 w/m2. what is the sound intensity a distance d2 = 27.0 m from the chain saw? (enter your answer in w/m2.) How do I Evaluate f(5). Suppose your parents inherited your grandparents house. They decided to move into the house and sell your current house. They did so because the house was free. Good decision?. What is the process that involve an exchange of genetic material between non sister chromatids during meiosis?. evaluate the function h(x) = |-2x|-9 for the given values of x a) h(4)=. b) h(-5)=. c) h(0) = Consider the following information about company C's performance and financial position in yearNet profit = $100Book valve of equity =$300Cost of equity = 8 percentCompany's C abnormal earnings in year t are Please helpWhich of the following best describes a group of similar cells working on a specific task?Choose 1 answer:(Choice A)AOrgan level(Choice B)BOrgan system level(Choice C)CCell level(Choice D)DTissue level Sarah set up a business as a sole trader running a nursery for small children too young to go to school. the business is successful and has opened a number of new nurseries. sarah took on a business partner in 2007. growth has continued and now the business has 10 nurseries in different towns and villages. sarah is planning to open another nursery and is looking for a suitable location. do you think its a good idea for sarah to continue to expand her business? justify your answer.