while waiting in line at bestbuy, raj sees signs reminding him to visit the company's website for online specials and to sign up for the rewards app. other signs remind him that bestbuy will match competitors' prices on any item they sell. these store signs represent which 4e framework

Answers

Answer 1

The 4E framework for social media marketing includes the objectives to educate, empower, amuse, and engage.

What is meant by 4E framework?

Fundamental to applied behavioral science are frameworks for behavior change. These concise summaries of cutting-edge decision-making insights, created by behavioral scientists for policymakers and business executives, are crucial for applying research in both the public and private sectors.

The 4E framework is a modified version of categories originally used to represent different levels of training technique intensity (Farkas & Anthony, 2007; Farkas, Jette, Tennestadt, Haley & Quinn, 2003). Exposure, experience, competence, and embedding are different categories for the tactics.

Educate, empower, amuse, and engage are all part of the 4E framework for social media marketing, as was already established. Each makes an effort to use a different strategy to persuade customers to buy your good or service.

Therefore, the correct answer is option E) Educate.

The complete question is:

While waiting in line to make a purchase at Best Buy, Joanie sees signs reminding her to visit its website for online specials and to sign up right now on her smartphone for the Best Buy Loyalty Rewards Program. Other signs remind her that Best Buy will match competitors' prices on any item it sells. This is an example of which 4E framework?

A) Excite

B) Energize

C) Engage

D) Experience

E) Educate

To learn more about 4E framework refer to:

https://brainly.com/question/5007387

#SPJ4


Related Questions

When you have completed your document review in Print Preview, you have the option to save your document as a new file type. What file type can be created using Print?

A. .com
B. .jpeg
C. .exe
D. .pdf

Answers

The file type is D) .pdf

What best describes the difference between plagiarism and fair use?
a Plagiarism is copying material without crediting the source, while fair use is a limited, nonprofit use.
b Plagiarism is copying material for profit, while fair use is a limited, non-profit use.
c Plagiarism is any copying of material without credit to the source, while fair use is unlimited nonprofit use.
d Plagiarism allows for unlimited, nonprofit use, while fair use is copying material for profit.

Answers

Answer:

What best describes the difference between plagiarism and fair use?

Explanation:

b Plagiarism is copying material for profit, while fair use is a limited, non-profit use.

Answer:

Its A    Not B!!!!!

Plagiarism is copying material without crediting the source, while fair use is a limited, nonprofit use.

Explanation:

why does it seems difficult and weird playing on a huge tv instead of a 32 inch monitor for a gaming console

Answers

It is seems difficult and weird to play gaming console on TV because TVs often have higher input lag, lower pixel densities, and stretched or distorted graphics that can make it harder to see details in the game.

The larger screen size can make it harder to focus on specific areas of the game, as the eyes have to scan across a larger area to take in all of the information on the screen. This can be particularly challenging for fast-paced games where quick reactions are required.

Additionally, the resolution of the TV may not be as high as that of a dedicated gaming monitor, which can result in a loss of detail and clarity in the game graphics. Finally, input lag can also be a factor when playing on a TV, which can cause delays in the button presses and make the game feel less responsive overall.

All of these factors can contribute to a less enjoyable gaming experience on a large TV compared to a smaller, dedicated gaming monitor.

Learn more about gaming console https://brainly.com/question/29357259

#SPJ11

In cell B12, enter a formula to calculate the amount budgeted for mileage to/from Airport. The amount is based on the Mileage Rate to/from Airport and the Roundtrip Mikes to Airport locates in the Standard Inputs section.

In cell B12, enter a formula to calculate the amount budgeted for mileage to/from Airport. The amount

Answers

Answer:

Format the Title and Complete the Input Areas

Your first tasks are to format the title and complete the input area. The input area contains two sections: Standard Inputs that are identical for all travelers and Traveler Inputs that the traveler enters based on his or her trip.

Open e01c1Travel and save it as e01c1Travel_LastFirst.

Merge and center the title over the range A1:E1 and set the row height for the first row to 40.

Apply the Input cell style to the ranges B3:B6, E3:E4, and E6:E7, and then apply the Calculation cell styleto cell E5. Part of the borders are removed when you apply these styles.

Select the ranges A3:B6 and D3:E7. Apply Thick Outside Borders.

Enter 6/1/2018 in cell E3 for the departure date, 6/5/2018 in cell E4 for the return date, 149 in cell E6 for the hotel rate per night, and 18% in cell E7 for the hotel tax rate.

Enter a formula in cell E5 to calculate the number of days between the return date and the departure date.

Insert Formulas

The Detailed Expenses section contains the amount budgeted for the trip, the actual expenses reported by the traveler, percentage of the budget spent on each item, and the amount the actual expense went over or under budget. You will insert formulas for this section. Some budgeted amounts are calculated based on the inputs. Other budgeted amounts, such as airfare, are estimates.

Enter the amount budgeted for Mileage to/from Airport in cell B12. The amount is based on the mileage rate and roundtrip to the airport from the Standard Inputs section.

Enter the amount budgeted for Airport Parking in cell B13. This amount is based on the airport parking daily rate and the number of total days traveling (the number of nights + 1) to include both the departure and return dates. For example, if a person departs on June 1 and returns on June 5, the total number of nights at a hotel is 4, but the total number of days the vehicle is parked at the airport is 5.

Enter the amount budgeted for Hotel Accommodations in cell B16. This amount is based on the number of nights, the hotel rate, and the hotel tax rate.

Enter the amount budgeted for Meals in cell B17. This amount is based on the daily meal allowance and the total travel days (# of hotel nights + 1).

Enter the % of Budget in cell D12. This percentage indicates the percentage of actual expenses to budgeted expenses. Copy the formula to the range D13:D18.

Enter the difference between the actual and budgeted expenses in cell E12. Copy the formula to the range E13:E18. If the actual expenses exceeded the budgeted expenses, the result should be positive. If the actual expenses were less than the budgeted expense, the result should be negative, indicating under budget.

Add Rows, Indent Labels, and Move Data

The Detailed Expenses section includes a heading Travel to/from Destination. You want to include two more headings to organize the expenses. Then you will indent the items within each category. Furthermore, you want the monetary columns together, so you will insert cells and move the Over or Under column to the right of the Actual column.

Insert a new row 15. Type Destination Expenses in cell A15. Bold the label.

Insert a new row 19. Type Other in cell A19. Bold the label.

Indent twice the labels in the ranges A12:A14, A16:A18, and A20.

Select the range D10:D21 and insert cells to shift the selected cells to the right.

Cut the range F10:F21 and paste it in the range D10:D21 to move the Over or Under data in the new cells you inserted.

Format the Detailed Expenses Section

You are ready to format the values to improve readability. You will apply Accounting Number Format to the monetary values on the first and total rows, Comma Style to the monetary values in the middle rows, and Percent Style for the percentages.

Apply Accounting Number Format to the ranges B12:D12 and B21:D21.

Apply Comma Style to the range B13:D20.

Apply Percent Style with one decimal place to the range E12:E20.

Underline the range: B20:D20. Do not use the border feature.

Apply the cell style Bad to cell D21 because the traveler went over budget.

Select the range A10:E21 and apply Thick Outside Borders.

Select the range A10:E10, apply Blue-Gray, Text 2, Lighter 80% fill color, apply Center alignment, and apply Wrap Text.

Manage the Workbook

You will apply page setup options, insert a footer, and, then duplicate the Expenses statement worksheet.

Spell-check the workbook and make appropriate corrections.

Set a 1.5" top margin and select the margin setting to center the data horizontally on the page.

Insert a footer with your name on the left side, the sheet name code in the center, and the file name code on the right side.

Copy the Expenses worksheet, move the new worksheet to the end, and rename it Formulas.

Display the cell formulas on the Formulas worksheet, change to landscape orientation, and adjust column widths. Use the Page Setup dialog box or the Page Layout tab to print gridlines and row and column headings.

server side: the client has asked you to create a web-based application. this implies a server-style configuration for hosting the website and allowing it to scale up to thousands of players. what does this mean for your ability to host the software application on each operating platform listed above?

Answers

If the client has requested a server-side configuration for their web-based application, it means that the software will be hosted on a remote server rather than on the individual computers of each player.

Creating a server-side application means that it will be platform-independent. Since the majority of processing takes place on the server, the clients will only require a compatible web browser to access the application. Therefore, your ability to host the software application on various operating platforms, such as Windows, macOS, Linux, or mobile operating systems, will not be a significant challenge.

Learn more about operating here : brainly.com/question/29949119

#SPJ11

write a line of java code that will declare a boolean variable named value that is initialized to the value false.

Answers

Answer:

boolean value = false;

When opening and closing a security container, complete the _____.
a. SF 701
b. SF 700
c. SF 702
d. SF 703

Answers

Option c is correct. SF 702 is the answer to this question. SF 702 is used to open and close security containers. Track security containers.

The security container can be opened and closed at any time. However, if possible, security containers should only be opened for privacy and security reasons. Security containers should use all possible safeguards such as guard protection, password protection, fingerprint protection, etc. Standard Form (SF 702) – Security Container Inspection Sheet. A standard form (SF 702 Security Container Sheet) tracks who opens, closes, and inspects security containers containing sensitive information.

SF 702 or "Security Container Check Sheet" is used to record the opening and closing of the data carrier. An area check is carried out in the SF 701 after the daily check is finished. The

SF 702 must be stored and disposed of according to a component records management program. SF 702 will be stored in the NDC until the next conformance inspection by a higher level control center.

Know more about information here:

https://brainly.com/question/29244533

#SPJ4

viruses increases the size of dash file ​

Answers

Answer:

copies are normally made by attaching the virus code to already existing programs on your system. This increases the file size

Explanation:

copies are normally made by attaching the virus code to already existing programs on your system. This increases the file size so yes

virtual conections with science and technology. Explain , what are being revealed and what are being concealed​

Answers

Some people believe that there is a spiritual connection between science and technology. They believe that science is a way of understanding the natural world, and that technology is a way of using that knowledge to improve the human condition. Others believe that science and technology are two separate disciplines, and that there is no spiritual connection between them.

What is technology?
Technology is the use of knowledge in a specific, repeatable manner to achieve useful aims. The outcome of such an effort may also be referred to as technology. Technology is widely used in daily life, as well as in the fields of science, industry, communication, and transportation. Society has changed as a result of numerous technological advances. The earliest known technology is indeed the stone tool, which was employed in the prehistoric past. This was followed by the use of fire, which helped fuel the Ice Age development of language and the expansion of the human brain. The Bronze Age wheel's development paved the way for longer journeys and the development of more sophisticated devices.

To learn more about technology
https://brainly.com/question/25110079
#SPJ13

define types of hacker ? with three to four line of each types?​

Answers

1.) benevolent hackers are hackers that use their skills to assist people in getting back stolen information, and usually put bad people in their place
2.) malevolent hackers use their skills to cause harm to others by either stealing information or leaking it, hacking into social media accounts or by infiltrating computers and implanting malware of some kind, but this isn’t normally done by hacking, you can do it just by sending an email with a sneaky link or virus in it.
Those are the two main types but there are also hackers who work for the government as cyber security protection or even to hack into targets of the government.

If you want to stop a loop before it goes through all of its iterations, the break statement may be used. Group of answer choices True False

Answers

Answer:

Answer is true

Explanation:

Which of the following would most likely prevent your becoming a victim of cyberstalking while using social networking?Question 5 options:A)Posting photos of friends.B)Monitoring your privacy settings and adjusting as necessary.C)Minimizing interaction with others on the social network.D)Reading the privacy policy of the social networking site.

Answers

B) Monitoring your privacy settings and adjusting as necessary. monitoring and adjusting privacy settings is the most effective way to prevent becoming a victim of cyberstalking.

By controlling who can view your profile, posts, and personal information, you limit the visibility of your online presence. This reduces the chances of potential stalkers accessing your information and tracking your activities. Additionally, regularly reviewing and updating your privacy settings ensures that you stay informed about any changes made by the social networking platform and can adapt accordingly to maintain a secure online environment. By being proactive in managing your privacy settings, you significantly decrease the risk of cyberstalking incidents.

Learn more about networking here:

https://brainly.com/question/31228211

#SPJ11

which of the following is NOT a step to successful collaboration?

which of the following is NOT a step to successful collaboration?

Answers

Answer: C is correct

Explanation: you should be hearing everyone out, not trying to convince people that you are right.

You are replacing the system board on an HP PC, and the old system board is still functional. What HP System Board Configuration Tool option should you use to program the new system?

Answers

Answer:

Capturing the current configuration to the USB Drive.

Explanation:

The BIOS in the computer system providing the configuration to the computer system. We can apply the Configuration in the computer by Acquiring the current USB Drive setup to the computer system .

With the help of current configuration to the USB Drive we can used the system Board Configuration to the program of the new system.The current configuration providing the latest configuration to the Hp system .This process will takes some times to giving the current configuration to the HP system .

A(n) ____ is a security measure that defines who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it.

Answers

Access control is a security measure that defines who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it.

Access control refers to the procedures and methodologies used to regulate who can access a certain system or network, as well as what they can do with the data they retrieve. These mechanisms are used to guarantee the security of an organization's resources by limiting access to only authorized personnel.

Access control mechanisms come in a variety of forms, including discretionary access control (DAC), mandatory access control (MAC), and role-based access control (RBAC). Access control refers to the procedures and methodologies used to regulate who can access a certain system or network, as well as what they can do with the data they retrieve.

To know more about computer visit :

https://brainly.com/question/32297638

#SPJ11

Where does most of the work in creating a presentation take place?

Formatting toolbar
Normal (Slide) view
Slide Sorter
Task pane

Answers

Answer: Normal (Slide) view

Answer:

Normal Slide View

Explanation:

How does computer science play a role in art?

Answers

Answer:

Many artists now learn to code; computer scientists develop algorithms with aesthetics as the goal. Projects such as Deep Dream, a program that uses neural networks to produce new visuals, let anyone use AI approaches to generate, ostensibly, art.

the organization method used to manage multiple data points within a dataset is called____

Answers

The organization method used to manage multiple data points within a dataset is called data structure.

A data structure is a way of organizing and storing data in a computer's memory or storage system. It provides a systematic way to manage and manipulate data efficiently. Data structures define how data is stored, accessed, and operated upon.

There are various types of data structures, each with its own characteristics and usage. Some common data structures include arrays, linked lists, stacks, queues, trees, and graphs. Each data structure has its own advantages and disadvantages, making it suitable for different scenarios and operations.

Data structures play a crucial role in computer science and programming. They enable efficient storage and retrieval of data, improve program performance, and provide algorithms for various operations. By choosing the right data structure, programmers can optimize their code and enhance the overall efficiency of their programs.

Managing multiple data points within a dataset requires an appropriate data structure that suits the specific requirements of the data and the desired operations. For example, if the dataset needs to be accessed in a sequential manner, an array or linked list may be suitable. If the dataset requires fast insertion and deletion operations, a binary search tree or a hash table may be more appropriate.

In summary, the organization method used to manage multiple data points within a dataset is referred to as a data structure. It provides a systematic way to store, access, and manipulate data efficiently, enhancing the performance and functionality of computer programs.



To learn more about data click here: brainly.com/question/33453559

#SPJ11

what is copyrights used for​

Answers

if something belongs to someone it makes it so someone else cannot steal it and claim it to be their own

If someone takes someone else’s ideas or music, production etc. and take as if they were the ones that made that or came up with that specific idea.

Who can use empathetic listening?
counselors
psychiatrists
anyone
teachers
College Readiness

Answers

anyone can use empathetic listening :)

Which one of these is an example of unnecessary debt?
A. You buy a perfectly good used car instead of an expensive new car
B. You buy your groceries on Friday instead of coupon Monday.
C. You charge clothes you don't really need on a high-interest store card.
D. You save up all year to take a great surfing vacation.

Answers

c. you charge clothes you don’t really need on a high-interest store card

hope this helps :)

An example of unnecessary debt is when you change your clothes and don't really need on a high-interest score. Thus option C is correct.

What is unnecessary debt?

An unnecessary debt can be caused by a variety of issues such as expensive life events, having children, or moving to a new house. It may also be due to poor money management. The debt is due to those things that are not needed and hence are unnecessary.

Find out more information about unnecessary debt.

brainly.com/question/3566270

A hacker wants to gain illegal Elizabeth owns a Mac and is not careful about what websites she visits, what links she clicks on, or what she downloads. She says that it is impossible for Macs to get viruses because the operating system is sandboxed. Is she correct? A. Yes, it is impossible for a Mac to become infected with any malware. B. No, a Mac can get a virus and be affected just as bad as a PC. C. No, a Mac can get a virus but it is not susceptible to any other type of malware. D. No, a Mac can still get viruses, but the viruses cannot get to the heart of the machine. Reset Next to Elizabeth owns a Mac and is not careful about what websites she visits, what links she clicks on, or what she downloads. She says that it is impossible for Macs to get viruses because the operating system is sandboxed. Is she correct? A. Yes, it is impossible for a Mac to become infected with any malware. B. No, a Mac can get a virus and be affected just as bad as a PC. C. No, a Mac can get a virus but it is not susceptible to any other type of malware. D. No, a Mac can still get viruses, but the viruses cannot get to the heart of the machine. Reset Next passwords for a popular online website. Where should they direct their attack? A. a bank B. a server C. a removable USB drive D. a laptop

Answers

Since  Elizabeth says that it is impossible for Macs to get viruses because the operating system is sandboxed. The response is D. No, a Mac can still get viruses, but the viruses cannot get to the heart of the machine.

The place that they should direct their attack is option B. a server.

What is Mac's server name?

Go to Apple menu > System Settings, select General from the sidebar, and then select About from the right-hand menu on your Mac. The name of your Mac's computer can be found at the top of the About settings page (you might need to scroll down).

Malware can infect a Mac computer. Macs are susceptible to malware and viruses. Even while Mac infections are less frequent than PC malware, Mac machines aren't completely shielded from online dangers by the security mechanisms built into macOS.

Note that Sandboxing is widely used to analyze untested or untrusted code and is intended to stop dangers from entering the network. In order to prevent infection or damage to the host computer or operating system, sandboxing keeps the code confined to a test environment.



Learn more about viruses  from

https://brainly.com/question/26128220
#SPJ1





According to the results of a testing process, Ron, an application tester, has made some changes to the application. Now, he wishes to check whether the changes made in the application have caused the previously existing functionality to fail or not. Which test should he perform

Answers

Answer:

Regression

the answer is a Regression test

hope this helps

scav

hidden input elements are visible in the url when you use the get method but are not visible in the source code of the web page.

Answers

It seems that there's a slight misunderstanding in the question, but I'm happy to help clarify. Hidden input elements are a type of HTML form element that are not displayed on the web page but can still store and submit data. The visibility of hidden input elements in the URL and source code depends on the form's submission method (GET or POST).

When using the GET method, the form data, including hidden input elements, are appended to the URL and visible in the browser's address bar. However, hidden input elements are still present in the source code of the web page, as they are part of the HTML code. You can view them by inspecting the page's source code (right-click on the page and select "View Page Source" or "Inspect Element").

To summarize:
1. Hidden input elements are part of the HTML form and are present in the source code of the web page.
2. When the form is submitted using the GET method, the hidden input values are visible in the URL.
3. To view hidden input elements in the source code, inspect the page using your browser's developer tools.

Learn more about HTML from : brainly.com/question/17959015

#SPJ11

class result { /* * complete the 'rearrangeword' function below. * * the function is expected to return a string. * the function accepts string word as parameter. */ public static string rearrangeword(string word) { // write your code here

Answers

Utilize the STL function reverse to flip the given string, str (). Reverse the word before each space as you iterate the reversed string using the STL function reverse ().

Add the letter "," or a space, to the end of the given string so that the final word is followed by a space, just like all the other words. Print each character that is followed by a space as you proceed through the string character by character. The string can be sorted by keeping track of each letter's count within it, after which a new string is created by inserting each letter according to its count.

Learn more about function here-

https://brainly.com/question/28939774

#SPJ4

What does split mean in coding?

Answers

Answer:

In programming, the split function is a string method that is used to divide a string into a list of substrings, based on a specified delimiter. The delimiter can be a single character, a string, or a regular expression.

For example, consider the following string:

"Hello, how are you today?"

We can use the split function to divide this string into a list of substrings based on the space character, like this:

sentence = "Hello, how are you today?"

words = sentence.split(" ")

print(words)

The output of this code will be:

['Hello,', 'how', 'are', 'you', 'today?']

Note that the delimiter is not included in the returned substrings.

Explanation:

Using the Internet comes with certain risks that you should be prepared for. True False​

Answers

True true and true u can get catfished or be talking to a 78 y/o man like me am I a person or a old piece of hag

Select the online reading comprehension tool that best fits the description. This tool lets users change text from one language to another. This tool helps users find definitions for difficult vocabulary. This tool allows users to listen to passages of text that they select. This tool helps users memorize vocabulary by giving them representations of words using pictures.​

Answers

Answer:

This tool lets users change text from one language to another.

translation tool

This tool helps users find definitions for difficult vocabulary.

online dictionary

This tool allows users to listen to passages of text that they select.

text-to-speech tool

This tool helps users memorize vocabulary by giving them representations of words using pictures.

flash cards

Explanation:

just did the assignment on edg 2020

Answer:

Select the online reading comprehension tool that best fits the description.

This tool lets users change text from one language to another.

✔ translation tool

This tool helps users find definitions for difficult vocabulary.

✔ online dictionary

This tool allows users to listen to passages of text that they select.

✔ text-to-speech tool

This tool helps users memorize vocabulary by giving them representations of words using pictures.

✔ flash cards

Explanation:

The letters below are jumbled. Figure out what the word is and write it on the blank line provide
1.ADTA
2.RNIRPTET
3.BYOMSL
4.MDAIGAR
5.NIGS​

Answers

1. DATA
2. PRINTER ? Not sure, because there’s another T in your question
3. SYMBOL
4. DIAGRAM
5. SIGN

Data, Printer, Symbol, Diagram, Sign

2. which network-performance optimization technique uses a contract to determine which data can get on to the network?

Answers

Traffic shaping is the network-performance optimization technique that uses a contract to determine which data can get onto the network.

What is network performance optimization?

The technology, instruments, and methods used in network optimization support maintaining, enhancing, or maximizing performance across all network domains. These components are used to track, maintain, and improve performance metrics so that users across the network receive the best possible service.

Why is it important to optimize your network?

The obstacles that prevent optimal data transmission speeds are removed by network optimization. This translates to reduced jitter and latency, quicker response times, and a more cohesive IT ecosystem, all of which lead to higher throughput.

What is traffic shaping?

A strategy for limiting the amount of bandwidth that some programs can use to ensure excellent performance for crucial applications is traffic shaping (also known as packet shaping).

Where is traffic shaping used?

To manage traffic entering a network, traffic shaping is frequently implemented at the network edges, but it can also be implemented by the source of the traffic (such as a computer or network card) or by a component of the network.

Learn more about traffic shaping: https://brainly.com/question/28147259

#SPJ4

Other Questions
15=1/2+3/2x+10I need help! I tried to look it up, but it didn't say anything! You can break it down if you want! I just need the solution of X (What X equals)!! Which of the following statements is true of the Americans with Disabilities Act? a. Impairments such as autism and bipolar disorder are not covered as disabilities b. The ADA does not protect current users of illegal drugs and substances G.Impairments such as cancer and HIV are not covered as disabilities d. The ADA does not protect recovering addicts alex is a single taxpayer with $80,000 in taxable income. his investment income consists of $500 of qualified dividends and short-term capital gains of 2,000 alex will owe $ in taxes on his investment income. Analyze the respective arguments of henry stimson and gar alperovitz regarding the american use of the atomic bomb. uncle bob tells his niece, nan, that if she stops smoking for one month, then he will give her $500. if nan refrains from smoking for a month and bob refuses to pay nan, a court would rule: objects that are flying around (like sand in a dust storm) can become electrically charged. how much charge these objects accumulate varies, but a reasonable scale is pc (10-12 coulombs). if a grain of sand has a net charge of 59pc, approximately how many electrons has it lost? Someone pls help me with these worksheets.(Please answer properly, if u don't know, just leave it) as you drive on an expressway, you may be lulled into ? a) a feeling of power; b) highway hypnosis; c) velocitation; d) a hallucinogenic state true or false. the f.i.n.d. decision-making model only applies to making decisions about babysitting? Investors engaged in _____, bought stocks and bonds on the chance that they might make a quick or a large profit, ignoring the risks. HELPPP MEEE PLZZ ok so If i have 70$ dollars the amout is just right so i can buy 4kg of fish and 3kg of prawn so i bought it and my change was $3.50 How much is 1kg of prawn? a ball is thrown vertically up ward with a velocity of 25m/s. a/how fast was it moving after 2sec? Xavier finds some nickels and quarters in his piggy bank. how many coins does he have if he has 4 nickels and 8 quarters? how many coins does he have if he has nickels and y quarters? total coins, 4 nickels and 8 quarters: total coins, x nickels and y quarters: Ms. Martin bought 96 ounces of decaf coffee beans and 72 ounces ofgreen coffee beans at the store. How many total pounds of coffee beansdid Ms. Martin buy?168 poundsB10. 5 poundsC 6 pounds D 4. 5 pounds Mrs lim wants to give some biscuits to her pupils. if each pupil receives 4 biscuits. she will have 39 biscuits left. if each pupil receives 7 biscuits, she will need 6 more biscuits. how many pupils are there? do all isotopes of an element have the same atomic number? Who was Queen Nzinga? Why and how did she resist the Portuguese? Determine the remaining sides and angles of the triangle ABC. a = 100 m. A = 38 42' C=22 46' What is the measure of angle B? B= What is the length of side b = ... m (Do not round until the final answer. Then round to the nearest meter as needed) What is the length of side c= ... m CE (Do not found until the final answer. Then found to the nearest meter as needed) How do you transform an equation?. 7th grade math, I will give brainliest to right answer!t/4 = 1what is the value of t?