A file is copied from the hard drive (storage) to ______ when you open it. When you close a file, it's removed from ______ and saved to the hard drive. Select your answer, then click Done.

Answers

Answer 1

When you open a file, it is copied from the hard drive (storage) to the memory (RAM). When you close a file, it is removed from memory and saved to the hard drive.  The correct answer is B.

This process is referred to as loading and unloading.  When you open a file, the operating system copies it from the hard drive to the RAM (Random Access Memory). The processor of your computer reads and executes the data from RAM since it is faster than the hard drive. When you're done with the file and close it, the data is deleted from RAM, freeing up space for new data. The file is then saved back to the hard drive from where it came, ensuring that it is safe and ready for future use.

Thus, the correct answer is B.

"

Complete question

content loaded

A file is copied from the hard drive (storage) to ______ when you open it. When you close a file, it's removed from ______ and saved to the hard drive.

A: Operating system; memory

B: Memory (RAM); memory

C: memory; disk drive

"

You can learn more about RAM (Random Access Memory) at

https://brainly.com/question/29660845

#SPJ11


Related Questions

If C2=20 and D2=10 what is the result of the function = mathcal I F(C2=D2,^ prime prime Ful "Open")?
Open
Unknown
Full
10​

Answers

Excel IF functions are used to test conditions.

The result of the IF function is (a) Open

The function is given as: = IF(C2 = D2, "Full","Open")

Where: C2 = 20 and D2= 10

The syntax of an Excel IF conditional statement is: = IF (Condition, value_if_true, value_if_false)

The condition is: IF C2 = D2

The values of C2 and D2 are: 20 and 10, respectively.

This means that, 20 does not equal 10.

So, the value_if_false will be the result of the condition.

In other words, the result of the IF function is (a) Open

Read more about Excel functions at:

https://brainly.com/question/10307135

How does a wireless network key work with an encrypted wireless network?

Answers

A wireless network key work with an encrypted wireless network, providing security and access control.

When a device attempts to connect to an encrypted network, it needs to provide the correct network key to gain access. This key ensures that only authorized users can connect to the network and helps protect the transmitted data from being intercepted or tampered with by unauthorized parties. The wireless network key works in conjunction with encryption algorithms, such as Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), or WPA2.

These algorithms use the network key to generate unique encryption keys for each data packet transmitted over the network. This process, known as key management, ensures that even if an attacker manages to intercept the data packets, they won't be able to decrypt the information without the correct network key. When a device connects to an encrypted network, a process called authentication occurs. The device provides the network key to the access point, which then verifies its validity.


In summary, a wireless network key is an essential component of an encrypted wireless network, providing both access control and data security. It ensures that only authorized users can connect to the network and that the transmitted data remains protected from unauthorized parties. The network key works in conjunction with encryption algorithms to encrypt and decrypt data packets, maintaining a secure communication channel between connected devices.

know more about wireless networks here:

https://brainly.com/question/31472325

#SPJ11

Can someone help me write an algorithm and a flow chart pls for question 3

Can someone help me write an algorithm and a flow chart pls for question 3

Answers

for i in range(20, 51, 2):

      print(i)

Can someone help me write an algorithm and a flow chart pls for question 3

identify one key takeaway you have from looking at the latest identity theft trends.

Answers

As an AI language model, I don't have access to the latest identity theft trends.

However, in general, one key takeaway from identity theft trends is that it is an ongoing and evolving threat that affects individuals and organizations of all sizes and in all industries. It is essential to take proactive steps to protect personal and sensitive information, such as using strong and unique passwords, enabling two-factor authentication, monitoring financial statements and credit reports regularly, and being cautious about sharing personal information online or with unfamiliar individuals or organizations. It is also important to stay up-to-date on the latest trends and best practices for preventing identity theft and responding to it if it does occur.

To learn more about AI language
https://brainly.com/question/25523571
#SPJ11

Checks or safety procedures are put in place to protect the integrity of the system is referred to as?

Answers

answer:

system controls

you lose your job and, as a result, you buy fewer itunes music downloads. this shows that you consider itunes music downloads to be

Answers

When the consumer's income improves, or in this case, drops, the demand for an inferior good type decreases. Your income declines if you lose your work.

What happens to a subpar product as customer spending rises?

In economics, when income rises or the economy grows, the demand for subpar products declines. Customers will be more likely to spend money on more expensive alternatives when this occurs.

When is a good a lesser good?

When consumer incomes increase, demand for an inferior good declines. An inferior good is one that is less in demand when wages rise or fall, even though it is not worse in quality.

To know more about consumer's visit:-

https://brainly.com/question/14286560

#SPJ1

What is an example of an Internet access problem?

The browser is slow or won’t function.
The keyboard keys do not work properly.
The pointer for the mouse wanders around.
The computer crashes or runs very slowly.

Answers

Answer:

The browser is slow or won't function

Explanation:

The browser is linked to the internet

The browser is slow or won’t function

Arman takes a picture with his smartphone which he subsequently posts online. Beatrice finds the picture online and posts a copy of it on her website with an attached Creative Commons license. Which of the following best describes who owns the photo?

Beatrice owns the photo because only holders of a Creative Commons license can own works online.

Arman owns the photo because he was the original creator and did not license the work.

Arman owns the photo because it was granted a Creative Commons license by another person online.

Both own the photo because creating a copy makes it her intellectual property.

Answers

Answer:

Arman owns the photo because he was the original creator and did not license the work.

Explanation:

A customer bought a goods for Rs.9,000 after getting 10% discount. Calculate the marked price of the goods.Write in Qbasic.​

Answers

Answer:

Rs. 10,000

Explanation:

10% discount means,

customer bought the things at 100% - 10% = 90%

so if 90% --> 9000

1% --> 100

total price = marked price which is 100%

100% ---> 100*100 = Rs. 10,000

Approximately how many songs could the first ipod hold?

Answers

The first iPod was released in 2001, and it had a storage capacity of 5GB. This might not seem like much today, but at the time, it was a significant amount of storage for a portable music player.

To put it into perspective, 5GB is enough to hold approximately 1,000 songs, assuming that each song is about 5MB in size. Of course, this is just an estimate, as the size of songs can vary depending on factors like the length, bit rate, and compression.It's worth noting that the first iPod wasn't the first portable music player on the market. However, it was the first one to use a hard drive instead of flash memory, which allowed it to store a lot more music. Prior to the iPod, most portable music players had a capacity of around 64MB or 128MB, which meant that they could only hold a handful of songs.Over the years, the storage capacity of iPods has increased significantly, with the latest models able to hold up to 256GB of music. However, the first iPod remains an important milestone in the history of portable music players, as it paved the way for the digital music revolution that we take for granted today.

For more such question on significantly

https://brainly.com/question/24630099

#SPJ11

How do I make someone "Brainiest".
First person to reply will get "Brainiest"

Answers

Answer:

Usually when someone answers a question there would be an option to mark the brainliest. However, you only get one every like 24 hrs so if you already gave someone brainliest you can't give it to someone else for a while

Explanation:

Answer:

Brainiest

Explanation:

Using first-class continuations, we can implement a lightweight unit of cooperative-multitasking known as a fiber. We will do this by implementing the following functions: spawn: Creates a new fiber. Similar to the Unix fork system call, when spawn is called it will return twice with different values. In our implementation, it will return first with the value #t (true) and then again with the value #f (false). yield: Performs a context switch to the next fiber, if there is one. I.e., returns back into the context of another fiber and resumes executing it. terminate: Terminates the calling fiber. For these functions to work, you will need to maintain a global queue of fibers (using a list), which is updated as necessary.

Answers

First-class continuations can implement lightweight multitasking known as a fiber. Functions such as spawn, yield, and terminate are used to create and manage fibers.

First-class continuations are a powerful feature in programming languages that can be used to implement cooperative multitasking. A fiber is a lightweight unit of multitasking that can be created using functions such as spawn, yield, and terminate. When the spawn is called, it creates a new fiber and returns twice with different values. Yield performs a context switch to the next fiber in the global queue of fibers, while terminate terminates the calling fiber. To manage the global queue of fibers, a list can be used to update it as necessary.

Using fibers can greatly improve the performance and efficiency of programs by allowing multiple tasks to run concurrently without the overhead of heavy threads or processes. However, care must be taken to properly manage the queue and prevent deadlocks or race conditions.

To know more about the programming languages visit:

https://brainly.com/question/16936315

#SPJ11

If you have a collection of related attributes that can be considered a subtheme for one of the entities and you remove it, what form is the database now in?

A. Third normal
B. Second normal
C. Fourth normal
D. First normal

Answers

Answer:

If you have a collection of related attributes that can be considered a subtheme for one of the entities and you remove it, the form of the database is now in Second Normal Form (2NF).

Explanation:

In the Second Normal Form, the table is in 1st Normal Form and all non-key attributes are fully dependent on the primary key. It means that the table does not contain any partial dependency, which is when a non-key attribute is dependent on only a part of the primary key and not the entire key.

A database that is in 2NF has been stripped of all attributes that do not depend on the primary key, which is the subtheme that you have removed.

A database in third normal form (3NF) has no transitive dependency.

A database in fourth normal form (4NF) has no multi-valued dependency.

A database in first normal form (1NF) has no repeating groups.

Which of the following describes an action that serves a goal of equity

Answers

Answer:

Please complete your sentence for me to answer.

During Which model states that communication can occur simultaneously?

Answers

Answer:

i dont see any models...please include a picture

what options can you give someone who wats massive video files for there website

what options can you give someone who wats massive video files for there website

Answers

There are several options for hosting and delivering large video files on a website, including:

Self-hostingVideo hosting platformsContent Delivery Networks (CDNs)Cloud storage services

What is the services about?

There are a lot of types  for hosting and delivering large video files on a website, and they are:

Self-hosting: This involves hosting the video files on your own web server or a dedicated hosting service. This gives you full control over the video playback and delivery, but can also be more expensive and require more technical expertise.

Video hosting platforms: These are third-party platforms specifically designed for hosting and delivering video content. These platforms handle the video delivery and playback, but may have limitations on file size and customizations.

Content Delivery Networks (CDNs): These are networks of servers that are distributed around the world, allowing for faster and more reliable delivery of large video files.

Lastly, Cloud storage services: These are services like Amazon S3, Go ogle Cloud Storage and Microsoft Azure which allows you to store and deliver video files from the cloud.

Learn more about website from

https://brainly.com/question/28431103
#SPJ1

Unlike the harmonic numbers, the sum 1/12 + 1/22 + ... + 1/n? does converge to a constant as n grows to infinity. (Indeed, the constant is n/6, so this formula can be used to estimate the value of .) Which of the following for loops computes this sum? Assume that n is an int variable initialized to 1000000 and sum is a double variable initialized to 0.0.

Answers

Explanation:

None of the following for loops correctly computes the given sum:

for (int i = 1; i < n; i++) {

sum += 1/(i*i);

}

for (int i = 1; i <= n; i++) {

sum += 1/(i*i);

}

for (int i = 1; i <= n; i++) {

sum += 1.0/(i*i);

}

The correct for loop to compute the given sum is:

for (int i = 1; i <= n; i++) {

sum += 1.0/(i*i);

}

This loop correctly iterates from i=1 to i=n and uses the double data type to ensure that the division operation results in a decimal approximation.

As the United States has economy became more specialized in information
technology, what has occurred?

Answers

Answer:

Explanation:

The specialization of the United States economy in information technology has led to significant advancements and economic growth.

The United States has witnessed a transformation in its economy as it increasingly focuses on information technology. This shift has resulted in various outcomes. Firstly, there has been a surge in technological innovation, with the development of cutting-edge software, hardware, and digital services. This has fostered the growth of tech-centric industries, creating new job opportunities and driving economic expansion. Additionally, the increased adoption of information technology has improved efficiency and productivity across sectors, leading to enhanced competitiveness in the global market. Furthermore, the specialization in information technology has fueled the rise of tech hubs and innovation clusters, such as Silicon Valley, attracting talent and investment from around the world. Overall, the economy's reliance on information technology has propelled the nation's progress in the digital age, bolstering its global leadership in this field.

Learn more about United States economy here:

https://brainly.com/question/30281176

#SPJ11

PLS HELP BEING TIMED!!!!
Why do prospective lenders only accept FICO credit reports that are one or two days old, at most?
O Good credit scores can plummet quickly
O Credit scores change on a daily basis.
O Bad credit scores can improve quickly.
O Credit reports expire after two days and are no longer valid.

PLS HELP BEING TIMED!!!!Why do prospective lenders only accept FICO credit reports that are one or two

Answers

Answer:

O Credit scores change on a daily basis.

Explanation:

what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?

Answers

Answer:

Image result for what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?

Common applications of X. 509 certificates include SSL/TLS and HTTPS for authenticated and encrypted web browsing, signed and encrypted email via the S/MIME protocol, code signing, document signing, client authentication, and government-issued electronic ID.

Explanation:

Hi am feeling really happy just passed a test after a lot of tries :-)


Answer this with your opinion don't search it up


What the best game on earth according to arts in like computer graphics?

Answers

Answer:

1. real life 2. (my actual answer) horizon zero dawn 3. chess

Explanation:

hope you have a great day. congratulations

If you spend time on social media, you probably see many infographics. How can you determine whether the information contained in them is trustworthy? When you create infographics, what can you do to make it more likely that the viewer will trust you?

Answers

Answer:

Provide sources.

Explanation:

Providing sources for your infographic would be the best I can think of.

Either a direct quote, a source for a graph, etc.

What is the quickest way to change the format of a table?

Copy and paste the table into a new slide.
Use the Table option on the Insert tab of the ribbon.
Delete the table and recreate it using a preconfigured table type.
Use the Table Styles option on the Design tab of the Table Tools contextual tab.

Answers

Answer:

If you don't like the default table format, you can easily change it by selecting any of the inbuilt Table Styles on the Design tab. The Design tab is the starting point to work with Excel table styles. It appears under the Table Tools contextual tab, as soon as you click any cell within a table.

The format of the table can be changed with the selection of the design tab in the tool to format with the contextual tab.

How table tool design the table?

The design tab for the table helps in making the changes to the table with the change in the name, formatting, style and other characteristics of the table.

There has been the presence of the preconfigured table style in the Excel, and the quickest way to configure a table involves the development of the table with the contextual table tools in the design tab. Thus, option D is correct.

Learn more about table, here:

https://brainly.com/question/15858153

#SPJ2

The main directory on a storage device is referred to as the ________ directory.

Answers

The main directory on a storage device is referred to as the "root" directory.

A directory is a container for organizing files and other directories, storage refers to the digital space where data is saved, and a device is the physical hardware where that storage is located, such as a hard drive or SSD. The root directory is the top-level, or main, directory in the hierarchical structure of a storage device. The root directory, also known as the root folder or simply the root, is the top-level directory in a file system hierarchy. It is the starting point and parent directory for all other directories and files within a file system. The root directory is denoted by a forward slash ("/") in Unix-like systems (e.g., Linux, macOS) and by a drive letter followed by a backslash ("C:\", "D:\") in Windows systems.

Here are some key points about the root directory:

1. File System Hierarchy: The root directory forms the base of the file system hierarchy. All other directories and files are organized beneath it in a hierarchical structure. Subdirectories and files are organized within the root directory or in nested directories and subdirectories beneath it.

2. Operating System Dependencies: The structure and organization of the root directory can vary depending on the operating system. Different operating systems have their own conventions and standards for file system hierarchies. For example, in Unix-like systems, the root directory contains system directories like /bin, /etc, /home, /usr, while in Windows systems, it contains directories like C:\Windows, C:\Program Files, and C:\Users.

3. Access Control: The root directory typically has restricted access permissions to ensure the security and integrity of the system. Only privileged users, such as the system administrator or superuser, have full access to the root directory and its contents. Regular users may have limited or no access rights to modify or delete files within the root directory.

4. File System Navigation: File paths in a file system are specified relative to the root directory. The root directory itself is often represented by a single forward slash ("/") in Unix-like systems or by a drive letter followed by a backslash ("C:\", "D:\") in Windows systems. For example, "/home/user/file.txt" represents a file called "file.txt" located within the "user" directory, which is within the "home" directory, which, in turn, is located in the root directory.

5. Mount Points: In some operating systems, the root directory can serve as a mount point for different storage devices or file systems. This allows additional storage devices or partitions to be seamlessly integrated into the file system hierarchy, appearing as subdirectories within the root directory.

Understanding the concept of the root directory is essential for navigating and organizing files and directories within a file system. It serves as the foundation for file system structure and provides a reference point for locating and accessing files and directories in a hierarchical manner.

Learn more about directory:https://brainly.com/question/29773474

#SPJ11

Tina reported a safety hazard at her workplace to OSHA. Representatives from OSHA came to her work and inspected the issue, then gave her employer a citation. The day after Tina's employer received the citation, Tina was given new jobs which were menial and difficult. Which of Tina's rights under OSHA was violated in this situation?

A) Freedom from retaliation for exercising safety and health rights

B) Knowledge of hazardous workplace conditions

C) Obtaining training as provided in the OSHA standards

D) Access to hazard exposure and medical records

Answers

Answer:A freedom from retaliation for exercising safety and health rights

Explanation:

This dialogue reflects what aspect of communication?

a.

body language

b.

good listening

c.

working together

d.

leadership


Please select the best answer from the choices provided


A
B
C
D

Answers

Answer:

B.

Explanation:

What code should be in line 8, 11, and 12?

What code should be in line 8, 11, and 12?

Answers

This will be used for calculations in Lines 9-10. Lines 8a-d are where you'll record any earnings from a job you already paid Social Security tax on (like wages or salary). You can find this information on the Form W-2s your employer provided you. Lines 9-10 calculates how much Social Security tax you owe.

An organization's __________ determines if it is financially possible to support a penetration test.
A. budget
B. timeline
C. technical constraints
D. industry type

Answers

An organization's budget determines if it is financially possible to support a penetration test. The correct answer is:
A. budget

The budget of an organization determines if it is financially possible to support a penetration test. Penetration testing can be an expensive activity that requires a significant amount of time and resources to plan, execute, and report on. The organization must consider the costs associated with hiring a reputable penetration testing company, providing access to systems and networks, and addressing any security vulnerabilities that are identified during the testing.

Therefore, the organization must have a budget in place to support the penetration testing effort. This budget should include the costs associated with the actual testing, as well as any remediation efforts that may be necessary based on the results of the testing. Additionally, the budget should also account for any ongoing testing that may be necessary to ensure that the organization's security posture remains strong over time.

To know more about penetration test visit:

https://brainly.com/question/30365553

#SPJ11

What tag is used to contain information about a web page, such as the title and related pages?

Answers

Answer:

<head>

Explanation:

correct on edge 2021

The tag that has been used for the headings and titles and the information contained in a web page is <head>.

What is a tag?

A tag is given as the label that has been attached to someone or something in order to add identification to the particular thing. The tag in the HTML or any other language has been used for the conversion of the HTML document into web pages. The tags are braced in the < >.

The headings and the subheadings or titles stand for the analysis of the topic and the concern of the particular topic or subject. There was the presence of the tag such as head, meta, footer, and header.  

The title and the heading to a particular subject have been the representation of the topic that has been covered in the meta description part. Thereby, the title and important information are given in the <head> tag.

Learn more about the tag, here:

https://brainly.com/question/8441225

#SPJ5

which of the following statements are true for a zero-day attack? [choose all that apply.] a zero-day vulnerability can only be discovered when the software is deployed a zero-day attack is impossible to detect as it exploits the unknown vulnerabilities a zero-day vulnerability can only exist within the operating systems a zero-day vulnerability can be example of an unknown threat

Answers

A zero-day attack is impossible to detect as it exploits the unknown vulnerabilities. The correct option is B.

What is zero-day attack?

A zero-day vulnerability is one that affects computer software that was previously unknown to those who should be interested in mitigating it, such as the target product's vendor.

Hackers can use the vulnerability to adversely affect applications, data, new systems, or a network until it is fixed.

Since the seller or developer has only become aware of the flaw, they have "zero days" to remedy it, hence the term "zero-day."

Due to the unknown vulnerabilities that a zero-day assault exploits, it is hard to stop one.

Thus, the correct option is A.

For more details regarding zero-day attack, visit:

brainly.com/question/27715022

#SPJ1

Other Questions
With respect to creating visions, leaders often fail because they do not? a. have fancy enough visions. b. convert their visions into results. c. use visions for inspiration. d. bribe people for accomplishing a vision If the government begins to run a larger budget deficits, then assuming there is no Ricardo-Barro effect, the demand for loanable funds ________ and the real interest rate ________.A.decreases; risesB.increases; risesC.decreases; fallsD.increases; falls 1 which themes are illustrated in unoka's song to the kite (a bird that similar to a hawk2 from one day a neighbour to okoye rolled his goatskin and departed comment on what is revealed about the ibo traditional way of life in the passage 3 how does achebe introduce a feeling of foreboding at the end chapter and what is the purpose of this technique which of the following is not a sign of an ethical collapse within an organization, according to marianne jennings Given the equation negative 24 equals y over 8, solve for y. if it was possible for one company to gain ownership control all of the uranium processing plants in the us, then in a perpetual inventory system, when inventory is purchased, the account is debited, whereas in a periodic system, the account is debited. Notice that a couple of things are different from the previous charts. Firstly, the derived traits and species name have switched axis. Secondly, you will see that in this chart there are derived traits that have evolved independently in different organisms. Use the principle of maximum parsimony to make a draft of the cladogram. The theory of maximum parsimony states that the simplest explanation consistent with the data should be examined first. The most parsimonious trees require the fewest evolutionary events. Construct your own cladogram using the information from the chart as a guide.Derived Trait 1 2 4 6. 7 8. Lamprey Salmon 1 1 Tuna 1 1 1 1 Mackerel 1 1 Trout 1 1 1 1 Halibut 1 1 1 1 1 Mahi Mahi 1 1 1 1 1 1 1 Construct vour cladogram in the space below: Species 3. Use the equation to explain why the rule is a linear function Remembering that the Latin root nunci means to speak or carry a message and the prefix de means from or against, use the context clues provided in the passage to determine the meaning of denunciation. Write your definition of denunciation here. A line passes through points (5,3) and (-5,-2). Another line passes through points (-6,4) and (2,-4). Find the coordinates (ordered pairs) of the intersection of the two lines. Step 1: Find the slope of each lineStep 2: Find the y-intercept of each lineStep 3: Write each line in slope-intercept form (y = mx + b)Step 4: Solve for the system. Find the point of intersection for the systemPlease help I will mark brainliest!!! Assume a hypothetical economy that is open to capital inflows and outflows, so that net capital inflow equals imports (IM) minus exports (X). a. The economy has the following properties: X = $125 millionIM = $80 million Budget balance = -$200 million l = $350 million Calculate private savings in millions of dollars. Private savings = $ _______ million this landmark u.s. supreme court case held that evidence of officer credibility as a witness may be considered exculpatory evidence and should be given to the defense during discovery. find the volume v of the solid obtained by rotating the region bounded by the given curves about the specified line. calculatot urn contains 6 white, 5 red and 3 blue chips. A person selects 4 chips without replacement. Determine the following probabilities: (Show work. Final answer must be in decimal form.) a) P(Exactly 3 chips are white) Answer Answer b) P(The third chip is blue The first 2 were white) c) P(The fourth chip is blue Answer The first 2 were white) 6. Suppose we have a random variable X such that E[X]= 7 and E[X]=58. Answer a) Determine the variance of X. b) Determine E[2X2 - 20X +5] two agronomists analyzed the same data, testing the same null hypothesis about the proportion of tomato plants suffering from blight. one rejected the hypothesis but the other did not. assuming neither made a mistake in calculations, which of these possible explanations could account for this apparent discrepancy? i. one agronomist wrote a one-tailed alternative hypothesis, but the other used 2 tails. ii. they wrote identical hypotheses, but the one who rejected the null used a higher a - level. iii. they wrote identical hypotheses, but the one who rejected the null used a lower a - level. suppose jaylan decides to use $1,500 currently held as savings to make a financial investment. one method of making a financial investment is the purchase of stock or bonds from a private company. suppose warm breeze, a cloud computing firm, is selling stocks to raise money for a new lab. this practice is called ____ finance. buying a share of warm breeze stock would give jaylan ____ the firm. in the event that warm breeze runs into financial difficulty, _____ will be paid first. Hawkins Inc. had pre-tax accounting income of $ 3,400000 and a tax rate of 20% in 2025, its first year of operations. During 2025 the company had the following transactions:Received rent from Barrett Co. for 2018$64,000Municipal bond income$80,000Depreciation for tax purposes in excess of book depreciation$40,000Installment sales revenue to be collected in 2026 $108,000For 2025, what is the amount of income taxes payable for Hawkins Inc.? True or False? competitive advantage results from doing things faster, better, and cheaper from everyone else, but also from doing things the same as the competition for consistency. a college student takes the same number of credits each semester. before beginning college, the student had some credits earned while in high school. after 2 semesters, the student had 45 credits, and after 5 semesters, the student had 90 credits. if c(t) is the number of credits after t semesters, write the equation that correctly represents this situation.