Some critics say that flash mobs: O A. exploit people's talents. O O B. should not be inclusive. C. cost too much money. D. invade public space. ​

Answers

Answer 1

Answer: D. invade public space.

Explanation:

Flash mob refers to the group of people who gather in a public place, and then perform for a brief time and then leave after they perform. The performance is typically meant for satire, entertainment, satire, or can be a form of artistic expression. An example of flash mob is people gathering to sing a song, choreography or people involved in a pillow fight.

Some critics of flash mobs believes that flash mobs invade public space and can sometimes be out of control when there are a large number of people who are participating.


Related Questions

You cannot install a driver on a 64-bit version of Windows when which of the following is true?
O The Devices and Printers folder
O It removes a system's name and SID.
O The driver lacks a digital certificate.
O You should roll back the driver.

Answers

A driver cannot be installed on a 64-bit version of Windows if it is missing a digital certificate.

On Windows 10 64-bit, how do I install drivers?

Click Device Manager after entering "device management" into the taskbar's search box. Select a category, then right-click (or press and hold) the item you want to alter to see the names of the devices.

How can I install 32-bit drivers on Windows 10's 64-bit platform?

On 64-bit OSs, 32-bit drivers cannot be installed. In order to print to it, your only practical choice would be to use a virtual machine or a vintage PC running 32-bit XP. If it really only has an INF file, it suggests that the device is actually using a generic "printer" driver.

To know more about Device Manager visit:-

https://brainly.com/question/11599959

#SPJ4

The Windows ________ utility returns your computer to the state it was in when it came from the factory.

Answers

Answer:

Windows system Restore.

what do you mean by radix of a number system​

Answers

Answer:

The description on the given topic is summarized in the below explanation segment.

Explanation:

One concept is known as the radix, always seemed to denote the sequence of numbers or digits included throughout a spot numbering scheme before actually "moving over" towards the next number.There would be a variety of different components or figures throughout a place number system scheme, plus the point zero.

Your customer is having problems printing from an application. You attempt to send a test page to the printer. Which of the following statements best describes why a test page should be used to troubleshoot the issue

Answers

It confirms connection and highlights any potential application issues. You make an effort to print a test page.

What does fundamental problem-solving entail?

A methodical approach to problem-solving is troubleshooting. The objectives of troubleshooting include identifying the root of an issue and offering suggestions for fixing it. A clear explanation of the issue serves as the initial step in the troubleshooting procedure.

Troubleshoot or Troubleshot, which is it?

The past tenses of the verbs troubleshoot and troubleshooted are both valid. Troubleshot may be used more frequently because shooted is not the past tense of shoot. Example: Despite my efforts to fix the program, it simply isn't functioning properly.

To know more about troubleshoot visit:

https://brainly.com/question/30048504

#SPJ4

Select the correct answer from each job down menu

Ben is writing an assignment on feasibility study. Help him complete the following sentences

The _____ feasibility Study an evolution of the effectiveness of the product to meet clients requirements. This study requires a board visualization of how the product will operate once it is ______ and ready to use.

Options for the first box are: operational, social, and technical

Options for the second box: researched, installed, and proposed

Answers

Answer:

The Operational feasibility Study an evolution of the effectiveness of the product to meet clients requirements. This study requires a board visualization of how the product will operate once it is installed and ready to use.

Explanation:

A feasibility study is an inquest on the possibility of launching a project. It determines whether a project should be continued or discontinued. The operational feasibility study determines the usability of the project by clients after it is completed.

If the project will not meet the client's requirement, then the project has failed the operational feasibility study and should be discontinued. We also have the technical and economical feasibility studies.

state three advantages of using a printer​

Answers

Answer:

Advantage: Convenience. One of the key advantages of printing out material is that it is convenient.

Advantage: Secure Delivery. Paper records can be anonymously delivered

Advantage: Ease of Reading

I hope It helps

Account_Info Account_Info_ID auto number Account_Info_Name varchar2(100) Account_Removal Account_Removal_ID auto number Account_Info_ID number Account_Removal_Name varchar2(100) Account_Info contains all records in the system Account_Removal contains all removed records in the system Please write a SQL statement to retrieve only records that are not in the Account_Removal table

Answers

The SQL statement to retrieve only records that are not in the Account_Removal table is:

SELECT * FROM Account_Info WHERE Account_Info_ID NOT IN (SELECT Account_Info_ID FROM Account_Removal);

How to write a SQL statement?A SQL statement is a type of query used to interact with databases and retrieve data. The statement is written in Structured Query Language (SQL) and is often used by developers, data analysts, and other professionals who need to access and manipulate data. To write a SQL statement, the first step is to determine the type of query required. For example, SELECT statements are used to retrieve data, INSERT statements are used to add new data, and UPDATE statements are used to modify existing data. Once the query type is identified, the statement is written using the appropriate keywords, such as SELECT, FROM, WHERE, ORDER BY, and other keywords. Furthermore, the statement should include the specific columns and tables that the query should target, as well as any parameters that should be used to filter the results.After the statement is written, it should be tested before it is executed. This is to ensure that the statement is working correctly and that the data being retrieved is accurate and up-to-date. Once the statement is tested and confirmed to be working correctly, it can be executed to retrieve the desired results.

To learn more about sql statement refer to:

https://brainly.com/question/19538735

#SPJ4

Ben has to type a long letter to his friend. What is the correct keying technique that Ben should use

Answers

Using rapid, snappy strokes is the proper keystroke technique. The body should be sufficiently upright in front of the keyboard for proper keyboarding posture.

Why is accurate keying so crucial?

Your general health will benefit from touch typing as well. It stops you from hunching over your keyboard in order to find the proper keys. Instead, you maintain eye contact with the screen in front of you. Correct typing encourages excellent posture and helps to avoid back or neck pain.

What is an example of a keystroke?

The pressing of a single key on a keyboard, whether real or virtual, or on any other input device is referred to as a keystroke. In other words, a single key push is regarded as a keystroke.

To know more about proper keystroke technique visit :-

https://brainly.com/question/29808656

#SPJ4

A professor went to a website for rating professors and looked up the quality rating and also the​ "easiness" of the six​ full-time professors in one department. The ratings are 1​ (lowest quality) to 5​ (highest quality) and 1​ (hardest) to 5​ (easiest). The numbers given are averages for each professor. Assume the trend is​ linear, find the​ correlation, and comment on what it means

Answers

The result of the statistical software for this issue is r = 0.862. As a result, there is a 0.86232315 link between quality and ease.

Is a website reliable?

Look at the website's URL. If the URL starts with "https" rather than "http," the site is secured with a TLS/SSL certificates (the s in https stands for secure). All of your data is protected by TLS certificates when it is transmitted from computer browser to the webpage servers.

What drives our use of websites?

A web page is frequently used to give viewers information, including images or videos to better explain crucial subjects. A website can be utilised to market goods and services to visitors. A site, like our website Computer Hope, is made up of several web pages.

To know more about Website visit :

https://brainly.com/question/19459381

#SPJ4

is it true or false graphics created in a computer are computer graphics​

Answers

Answer:

True because it just makes sense

Explanation:

Answer: true

Explanation: its computer graphics

Which step of the Department of Defense Risk Management Process consists of the activities to develop, implement, implement and document

Answers

The program's activities to create, put into practice, and record the procedures it will take to mitigate certain risks make up the risk management process planning process.

What are the steps in the risk management procedure for the Department of Defense?

The five key steps of the risk management process are planning, identification, analysis, mitigating risk, and monitoring.

Which of the following phrases describes the procedure of monitoring and evaluating risk as you get more knowledge about risk in projects?

The process of locating and evaluating potential problems that can adversely affect important corporate endeavors or projects is known as risk analysis. This process is used to help businesses avoid or reduce particular risks.

To know more about program's  visit:-

https://brainly.com/question/11023419

#SPJ4

You are creating a document that you know will be placed in a binder, which layout option could you change to make sure that the words do not lost when you punch holes on the sides of your document? (K12 for Microsoft word)

Answers

Answer:

answer is a indent

Explanation: I took the k-12 test and got it right!

The layout option that you can change is indent. The correct option is A.

What is layout option?

The Layout Choices dialogue offers a number of options that let you modify how the notation is shown on the pages of each layout.

You can alter both the notation, such as note spacing or staff labels, as well as the layout's physical characteristics, such as page size, staff size, and margins.

The space between the left-hand margin and the start of the text on a page or screen is referred to as indentation.

If you are preparing a document that will be bound, using the indent layout option will prevent the words from being lost when the page's sides are punched out.

Thus, the correct option is A.

For more details regarding layout, visit:

https://brainly.com/question/29742034

#SPJ2

Based on the output from your switches, answer the following questions: Which switch is the root bridge

Answers

The output from a switch is the process of forwarding a packet from one port to another port on the same switch or to another network device. The switch uses the MAC address of the destination device to determine the correct port to forward the packet to.

To choose the root bridge on a switch, the switch uses a protocol called the Spanning Tree Protocol (STP). The STP algorithm selects one switch in the network to be the root bridge, which is the central point for the network topology. The root bridge is responsible for sending out bridge protocol data units (BPDUs) and determining the best path for data to travel through the network.

To choose the root bridge, the switch uses a process called the election process, in which the switch with the lowest bridge ID (BID) is chosen as the root bridge. The BID is a combination of the switch's MAC address and a configurable priority value. The switch with the lowest BID is chosen as the root bridge and the other switches in the network will adjust their paths to forward traffic through the root bridge.

You can choose the root bridge in the switch by configuring the switch's priority value. A lower priority value will increase the chances of the switch being elected as the root bridge.

The answer has to be general since the question is incomplete.

Learn more about root bridge here: brainly.com/question/29417452

#SPJ4

An Information Technology department is looking for a new inventory management system. Which of the following would be the most accurate choice: A) Schematic
B) Spreadsheet
C) Network Diagram
D) Radio Frequency Identification (RFID) database system

Answers

The D: "Radio Frequency Identification (RFID) database system" is an Information Technology department looking for a new inventory management system.

Radio Frequency Identification (RFID) technology has been designed to keep track of individual elements in inventory, even if these items are not visible or are moving around quite a bit, Radio Frequency Identification (RFID) database system is a perfect tool for practicing airtight inventory control. After all, this technology can sense when an element leaves a warehouse or store, provided the RFID tag remains in place.

Thus, Radio Frequency Identification (RFID) database system offers an optimal inventory control.

You can learn more about Radio Frequency Identification (RFID) at

https://brainly.com/question/1933883

#SPJ

Which of the following must be enabled to allow a video game console or VoIP handset to configure your firewall automatically by opening the IP addresses and ports needed for the device to function ?
A. UpnP
B. Power Spike
C. Power Surge
D. Disk Management

Answers

UpnP option (A) must be enabled to allow a video game console or VoIP handset to configure your firewall automatically by opening the IP addresses and ports needed for the device to function .

How do firewalls work?

In a private network, firewalls act as gated barriers or gateways to regulate the flow of authorized and unauthorized web traffic. The phrase refers to actual structures that serve as barriers to contain fires until rescue services can put them out.

Can a firewall be breached by hackers?

A firewall might be safe, but if it's guarding a vulnerable program or operating system, a hacker will quickly get over it. There are countless instances of software flaws that hackers can reap the benefits of to penetrate the firewall.

To know more about Firewall visit :

https://brainly.com/question/28411552

#SPJ4

Need help

What are the two types of requirements needed for analysis?

A. Operational and system

B. Software and system

C. Technical and system

D. Operational and technical

Answers

I think the answer is D

What is 90x8-78x0
help me pls

Answers

Answer:

720 - 0 = 720

Therefore, your answer is 720

Answer:

720

Hope it helps:)

When this operator is used with string operands it concatenates them, or joins them together.
Select one:
a. &
b. *
c. %
d. +
e. None of these

Answers

+ concatenates or joins string operands together when used with string operands.

Does C++ attempt to convert the operands to the same type when using an operator?

A preprocessor directive must contain the iosetwidth header file when a program uses the setw manipulator. It is difficult to display the number 34.789 with two decimal places in a field of 9 spaces in C++.

when there are two different data types as operands for an operator?

Before completing the operation, C++ always converts both of the operands of an operator that has two operands of a different data type to a double. 3.5 will be displayed as a result of the next two C++ statements.

To know more about string operands visit :-

https://brainly.com/question/29602356

#SPJ4

both pc1 and server 1 have a default gateway. what is the purpose of a default gateway?

Answers

A default gateway's primary function is to route packets to another subnet.

Which one most accurately sums up a default gateway's function?

When a device is unable to determine the destination, it will use the default gateway to pass information. A router that links your host to distant network segments is a default gateway, to put it simply.

What ought to be the default gateway?

Typically, the IP address of your router will serve as your default gateway. Yes, your WiFi router has an own, distinctive IP address. It's important to know where to look for this identification code so that information can reach your network.

To know more about default gateway's visit :-

https://brainly.com/question/29213945

#SPJ4

__________ is a design principle that addresses the agreement or visual connection among design elements in a drawing.

Answers

Harmony the effectiveness with which a composition's visual components interact with one another. One of the most fundamental and crucial design elements is alignment. Through the creation of a visual link between them, it aids in unifying the elements on a page.

Which of the following best describes the visual route that the eye takes?

The eye of the viewer travels around the work of art, usually focusing on certain areas. Within the artwork, this visual components might be focused on the lines, borders, shapes, and colours.

What visual aspect describes the space surrounding, above, or beneath an object or objects?

The area between and around objects is known as space. Negative space is the term for the area surrounding objects; negative space

To know more about visual components visit:-

https://brainly.com/question/19584494

#SPJ4

Single-Select Questions with Reading Passage #1 Grocery Grabbr The following passage will be used to answer questions #1 - #5 Markus is finding that it takes too long to track down all of the groceries he needs to buy from a given store. Grocery Grabbr to the rescue! The app allows Markus to input his shopping list and search for his local grocery store in Grocery Grabbr's database. If his grocery store is there, Markus is all set to go! The database stores grocery items, cost, and item location information for each grocery store. When Markus walks into the store, a notification pops up on his smartphone letting him know that Grocery Grabbr is ready to get to work. Each of Markus' grocery items is displayed one at a time, along with the aisle number and shelf location. After Markus grabs his items off the shelf, he hits a button on the app to navigate to the next item. The list of items is arranged so that Markus follows the most efficient path through the grocery store. When Markus finishes shopping, the total amount of money his groceries cost is displayed, which allows him to double check the total cost with the cashier. Grocery Grabbr pays grocery stores a small amount of money for each user who successfully uses the app and checks out of the store with over one hundred dollars worth of groceries.
Question: Which of the following data must be obtained from the user's smartphone in order for Grocery Grabbr to suggest the order for picking up groceries?
A. the grocery list the user input
B. the location of the grocery store
C. the user's photo album on their smartphone
D. the user's current location

Answers

Answer:

A. the grocery list the user input

D. the user's current location

Explanation:

In the passage provided the only actual user inputs that is needed is the grocery list and then the user must choose from a list of available grocery stores. They do not need to enter the location of the grocery store. Therefore, the only actual pieces of data that the app would need are the grocery list that the user inputs and the user's current location in order to provide the list of available nearby grocery stores for picking up the groceries. This is done through the GPS on the smartphone.

A customer recently moved a high-end graphics card from a known-working computer to a different computer. The computer works without issue when viewing email and web pages or when using certain applications. However, when a game with high-end graphics requirements is opened, the program will run for a few minutes before the computer shuts down. Which of the following is MOST likely causing the problem?
A. Video RAM
B. Power supply wattage
C. CPU frequency
D. Monitor resolution

Answers

The most likely cause of the problem is the power supply wattage.

What type of graphics card was installed in the new computer? The type of graphics card installed in the new computer depends on the specific model of the computer and its intended use. For example, a gaming computer may require a more powerful graphics card than a basic office computer. If the new computer is used mainly for gaming or video editing, it may require a dedicated graphics card such as an NVIDIA GeForce or AMD Radeon. For basic office work, a basic integrated graphics card is sufficient. When selecting a graphics card, it is important to consider the types of games or programs that will be used with the computer. Some games or programs may require a more powerful graphics card to run smoothly. Additionally, if the computer is used for video editing, an additional graphics card such as a Quadro or FirePro may be required. When shopping for a new computer, it is important to research the specific graphics card that will be required for the intended use of the computer. This will help to ensure that the computer is equipped with the necessary hardware to run the desired programs or games. Additionally, it is important to consider the power supply of the computer when selecting a graphics card.Some graphics cards require more power than the standard power supply can provide, so a higher wattage power supply may be necessary.

To learn more about graphics card refer to:

https://brainly.com/question/30097997

#SPJ4

which of the following is a characteristic of a college savings plan

Answers

Answer:

where are the options for the question

A user calls the help desk stating a laptop is performing slowly and the hard drive activity lights are blinking continuously. A technician checks for enough hard drive space, disables antivirus and indexing services, and runs a full-system diagnostics check, which returns no failure. Which of the following should the technician do NEXT?
A. Install a new hard drive
B. Check for hard-drive firmware updates
C. Replace the hard drive with a solid state drive
D. Configure the laptop in high-performance mode
E. Change the boot order in the system BIOS

Answers

Check for hard-drive firmware updates. Without requiring any hardware upgrades, a firmware update will provide your device new, sophisticated working instructions.

What is firmware ?Firmware is a particular type of computer software that in computers controls the hardware at the lowest level. Firmware can serve as the entire operating system for simpler devices, handling all control, monitoring, and data manipulation tasks. Computers, home and personal appliances, embedded systems, and computer peripherals are common examples of gadgets that contain firmware. Non-volatile memory systems like flash memory, ROM, EPROM, and EEPROM store firmware. Firmware updates necessitate the actual replacement of ROM integrated circuits or the reprogramming of EPROM or flash memory using a unique technique. Some firmware memory devices have pre-installed software that cannot be removed after purchase. Firmware updates are frequently performed to address bugs or add features.

To learn more about Firmware refer :

https://brainly.com/question/18000907

#SPJ4

the security team was eventually able to write a better rule to match the sql injection technique that the attacker had used.

Answers

Input validation and parametrized queries with prepared statements are the only effective defences against SQL Injection attacks. Not just web form inputs like login forms must be sanitised by the developer.

What is SQL Injection attacks ?In computer science, SQL injection is a method of attacking data-driven systems by injecting malicious SQL statements into entry fields for execution. Although SQL injection is primarily recognised as a website attack vector, it may be used to target any kind of SQL database.Attackers can become administrators of the database server, spoof identities, alter already-existing data, cause repudiation problems like cancelling transactions or changing balances, allow full disclosure of all data on the system, destroy data or otherwise make it unavailable, and cause repudiation issues.In fields like login boxes, search boxes, or "sign up" fields, hackers input SQL commands. The goal is to access a system using intricate code sequences and divulge the data stored inside.

To learn more about SQL Injection refer :

https://brainly.com/question/15685996

#SPJ4

all of the following are principles essential to a secure information system except A. Integrity B. Accountability C. Availability D. Confidentiality

Answers

The following are principles essential to a secure information system except for accountability.

Which is an essential principle of a secure information system?

An essential principle of a secure information system is the concept of defense in depth. This is a multi-layered approach to security, which involves the use of multiple layers of security controls. These security controls can include technical measures, such as firewalls, encryption, and authentication protocols; physical measures, such as locked doors and access cards; and administrative measures, such as policies and procedures.

By using multiple layers of security controls, it becomes much more difficult for an attacker to penetrate the system.

Furthermore, the presence of multiple layers of security also makes it easier to detect and respond to any attempts at unauthorized access.

The defense-in-depth approach is essential for protecting sensitive data and ensuring the integrity of information systems.

To learn more about information systems refer to:

brainly.com/question/24944623

#SPJ4

Users are mentioning that a file share on a Windows server is no longer accessible. You check the server and see the share is still in place. You decide to check to see if any related ports are currently blocked on the server. What command can you use to investigate the ports

Answers

You can examine the ports using the other address command.

Which of the following presents a security risk following the installation of a new app on a mobile device?

storage of data. The data that you save on the device and whether other apps can access it is the most frequent security worry for Android applications.

What management tool may be used to investigate often unresponsive applications?

What management tool may be used to investigate often unresponsive applications? A log of issue events connected to system stability can be viewed using the Windows Reliability Monitor.

To know more about address command visit :-

https://brainly.com/question/29990582

#SPJ4

Pls answer as fast as you can I will give brainliest

What aspect of the initial database planning process would the formula
(0 + Pt × 3 + p)/5 be used in?

A. Time estimation
B. Budgeting
C. Workforce forecasting
D. Entity prediction

Answers

I believe it would be “A” it would make the most sense...

You need a fast, secure, and reliable multihomed network perimeter solution that is designed to prevent specific types of network traffic from entering your corporate network. Which solution should you deploy

Answers

Using a ( VPN) virtual private network is the best approach to grant users access to private resources via the internet since encryption of all data assures a secure connection between the client and server.

What network security protocol enables the use of a single setup to encrypt all network traffic?

Contrary to application security protocols like HTTPS, which are only applicable to web servers and require a PKI certificate for each server, IPSec can be configured to secure some or all network traffic with a single setup.

Which of the following has the greatest chance of preventing buffer overflow attacks?

By making sure you are up to current with system and application fixes, buffer overflow threats can frequently be reduced.

To know more about VPN visit:-

https://brainly.com/question/29733551

#SPJ4

You work in an office that uses Linux servers and Windows servers. The network uses both the TCP/IP protocol. The Linux server is used as an FTP server. Today you have received several calls from people who are unable to contact the Linux server at its known IP address. You are sitting at the Linux server and want to check its IP address. Which command should you use

Answers

Answer:

The answer is "ifconfig".

Explanation:

The ifconfig. me is indeed a website that shows basic network packets, like IP address, hostname, user agent string. It provides a simple interface that may be queried with the assistance of the command prompt to obtain the required information. The whole function provides the essential information about a certain program's interface.

Other Questions
URGENT, NEED HELP!!Compare and contrast the short stories War by Jack London and A horseman in the sky by Ambrose Bierce. Assignment Details: -one page essay (about 250 words) -Short introduction that clearly states the topic and your main points.-Body text that describes the similarities and/or differences between the works and supports these points with examples from the texts.-Short conclusion that restates the topic and your main points. What information will be useful to know to answer the main question? How can you get it? How will you use that information A company supplying candy to school vending machines needs to know about candy preferences of middle school and high school age students. A random sample of 400 students was taken. The company wants to know if there is any relationship between the candy choices and the age of students. After performing a chi-square test of independence, the chi-square test statistic = 24.68. The appropriate critical value for df and desired alpha level = 11.34. Is there sufficient evidence to reject the null hypothesis? Explain. the scale on a map is 1:5000000two towns are 7cm apart on the map work out the actual distance between the towns What is the volume of cylinder b=11 h=6 Read the excerpt below from Theodore Roosevelt's book "The Naval War of 1812."During the early years of this century England's naval power stood at a height never reached before or since by that of any other nation. On every sea her navies rode, not only triumphant, but with none to dispute their sway. The island folk had long claimed the mastery of the ocean, and they had certainly succeeded in making their claim completely good during the time of bloody warfare that followed the breaking out of the French Revolution. Since the year 1792 each European nation, in turn, had learned to feel bitter dread of the weight of England's hand.Select the best denotative meaning for the phrase "weight of England's hand." A piece of material used to weigh articles A unit of measurement for taxes The amount that something weighs The threat from a superior power ...........life is so Is this water or oil What is the purpose of this presentation to persuade the audience to add a vacation to a proposed calendar to persuade the audience to sponsor a festival for school children? the following best describes how an anthropogenic activity can increase ocean acidification? How do you find the rate of change in a parabola? I need to know ASAP When a company decides to increase its level of internationalization, all of the following are acceptable ways of getting into the international marketplace except ___________. Which section of the Residential Contract of Sale states that if one party breaches the agreement and the non-breaching party hires an attorney to enforce their rights, the breaching party can be forced to pay all of the legal expenses of the non-breaching party Assume string1 is a character array. Which of the following operations does not produce a string?a. string1[] = ""; b. string1[] = "test": c. string1[] = {'t', 'e', 's', 't, '\0'; d. string1[] = {'t', 'e', 's', 't'); Which of the following is an example of a conductor?A A rubber doorstop.B A gold chain.C A wooden hammer.tingD A plastic fork. What is the equation to this graph above A bus rental company charges $60 for booking a bus and $120 for each hour the bus is rented. A tour group pays $780 to rent a bus. HELP WANTED TY!!Select the equation that represents the given situation and find the number of hours the tour group rented the bus. A. 60x + 120 = 780 ; 11 hours B. 60x + 120 = 780 ; 6 hours C. 120x + 60 = 780 ; 11 hours D. 120x + 60 = 780 ; 6 hours frederick douglass was a prominent abolitionist. which of these other people was also an abolitionist? if uu can see the ss help!! Each of the following area is an example of where government policy differs between nonprofit and for-profit corporations EXCEPT:A.tax paymentsB.government regulationsC.spending extra moneyD.rules for incorporationPlease select the best answer from the choices providedURGENT