Answer: Applications for desktop or laptop computers are sometimes called desktop applications, while those for mobile devices are called mobile apps. When you open an application, it runs inside the operating system until you close it
Explanation:
Answer:
- Divide the resources into three parts using the corresponding process 1, process 1, and process 2 formats to maximize the use of the resources.
- Get the expected revenue by calculating the product of the total perfume in ounce and the price of an ounce of perfume.
- Increase the advertisement hours of the product.
- subtract the advert fee from the generated revenue to get the actual revenue.
- subtract the cost of production from the actual revenue to get the actual profit.
Explanation:
The get maximum profit, all the resources must be exhausted in production. The labor is divided into a ratio of 1:1:2 ( which is 5000, 5000, 1000), while the chemical units are in the ratio of 2:2:3 (10000,10000,15000). This would produce in each individual processes; 15000, 15000 and 25000 oz, which is a total of 55000 oz of perfume.
The expected revenue is $275000. If 1000oz from the 55000oz of perfume is sold without advertisement, model Jenny's awareness of the perfume increases the demand by 200oz per hour, therefore, 24hours would field 4800oz demanded, which would only take 270 hours to distribute all remaining perfumes.
The cost of production would be $130000 for labor and chemical resources plus the advert cost of $27000 ( 270 hours by 100) which is a total cost of $157000. The actual profit is $118000 ( $275000 - $157000).
Answer:
Critical thinking
Explanation:
Shannon needs to be a Critical thinker to be effective in this position. Critical thinking has to do with giving deep and good thoughts while doing analysis, or assessment in other to come up with good judgements about a subject or topic.
Since she is going to be studying water and elements in it, she would be doing a lot of analysis and assessments and In other to do good in her field she must learn to think critically before arriving at her conclusions.
The seriousness of the risks to your computer security is not to be a severe one. This is because Computer security risks are due to the handwork of malware such as, bad software, that can infect a computer, and make the hacker to destroy your files, steal your data, or even have access to your system without one's knowledge or authorization.
<h3>What are the risk results for information and computer security?</h3>
The term “information security risk” is known to be those damage that occurs due to an attacks against IT systems. IT risk is made up of a wide range of potential events, such as data breaches, regulatory enforcement actions, financial costs, and a lot more.
Some Examples of malware are viruses, worms, ransomware, spyware, and a lot others.
Hence, The seriousness of the risks to your computer security is not to be a severe one. This is because Computer security risks are due to the handwork of malware such as, bad software, that can infect a computer, and make the hacker to destroy your files, steal your data, or even have access to your system without one's knowledge or authorization.
Learn more about computer security from
brainly.com/question/12010892
#SPJ1
Answer:
I think the answer is
Ram- Cache Memory-Hard disk
Explanation:
I hope this helps you