A user's computer will not boot. A technician notices four indicator lights on the backside of the
computer. Two of the lights are green, and two are amber. Which of the following documentation
should the technician read to determine what the lights are indicating?
A. Network diagram
B. Computer manual
C. Asset management
D. Wiring scheme

Answers

Answer 1

Answer:

B.

Explanation:

Computer manual is the user guide that comes along with the computer set to inform the users about the functions, ways to assemble the parts, and so on.

The user manual consists of guide for the users specially for electronic products such as computers, refrigerators; softwares, and so on. These manuals are written by technical writers, programmers, etc.

In the given scenario the technician needs to refer to computer manual to know the meaning of the lights on the backside of the computer.

So, the correct answer is option B.


Related Questions

Which of the following is a true statement about milestones?
O A. Meeting milestones contribute to the meeting of a key deliverable.
O B. Milestones are the high level events or actions in a schedule.
O C. Milestones are a helpful but not essential part of a schedule.
O D. Most milestones concern the delivery of a product.

Answers

Answer:

B option

Explanation:

my stones are the high level events are actions in a schedule.

Computer security is concerned with protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.
a) true
b) false

Answers

The correct answer is True

Explanation:

Computer security is a branch of security that focuses on the security of computer systems. This includes preventing cyber attacks that could steal the information or damage the software (programming code), as well as, preventing physical attacks or damage, this includes stopping unauthorized personnel from accessing the computers or devices and limiting the damages that might occur in situations such as fires, floods, etc. Additionally, computer security is now an important factor in most companies and organizations as relevant information is saved in computers, also, many functions rely on the use of computer systems.

According to this, the statement about computer security is true because this comprises the protection of hardware, software, and information in cases such as natural disasters, intrusions, etc.

The best advice for setting a study session is

Answers

to take breaks and not do all the work at once.

Answer: A

Explanation:

A virus does not harm the ________ of a computer

Answers

Answer:

Hardware part

Explanation:

The hardware part of computer is not harmed by virus.

I hope this will be helpful for you

Answer: Hardware part

Mental state shift involves what?

Answers

Answer:

It involves a matter involving doubt, uncertainty, or difficulty that may be solved, problem ... getting into a frame of mind to be creative and solve problems.

Explanation:

Hope i am marked as brainliest answer

Which of the following are examples of interpreted languages? Each correct answer represents a complete solution. Choose two. This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Markup B Compiled C Query D Scripted

Answers

Answer:

The answer to this question can be defined as follows:

Explanation:

The given question has more than one question and some of the choices are missing so, their correct solution and the question with the choices can be defined as follows:

1)

Interpreted languages:

The interpreted language is a kind of programming language, in which most of the applications carrying out instruction freely and openly, without having compiled a program. so, the types of the programming language are " PHP, Perl, Ruby, and Python"

2)

The answer is "Post a glossary or FAQ page".

explanation:

This section is used to covers the data. It is used as the goal of the company or business to obtain answers to these questions. Those who may also use your FAQ page for a first contact point for clients who are searching for answers before contacting you directly.

please find the attachment.

A user calls the helpdesk and states that they are receiving an IP conflict error on their computer. The user is on a company network that uses DHCP. The technician verifies the PC is using DHCP to obtain TCP/IP settings. Which of the following commands should the helpdesk technician use to resolve this issue? (Select two.)
A. IPCONFIG /REGISTERDNS
B. IPCONFIG /FLUSHDNS
C. IPCONFIG /RELEASE
D. IPCONFIG /RENEW
E. IPCONFIG /ALL

Answers

Answer:

a

Explanation:

none

How does vibrancy affect a web page design? - Changes the emotion of the page - Decreases site traffic - Increases reading difficulty - Keeps color choices similar

Answers

Answer:

It changes the emotion of the page.

What is the role of bpo in growth of Indian economy ?

Answers

Answer:

BPO Role in India's Economic Growth

The role played by BPOs in boosting India's economy shows that the IT and ITeS sector have been contributing largely to the economic growth of India. The growth in the contribution of BPOs to Gross Domestic Product has shown a steady rise from 1.2% to 5.4%.

which is most harmful computer virus define​

Answers

Answer:

Spyware is the most harmful virus.

It enters into someones computer as a spy and steals the ones personal information, data and other codes.

Explanation:

1. Write a try-catch block. In try block, do the following thing: if the balance is less than 100, throw an InsufficientFund exception; else print out the message saying that there are enough money in the account. In catch block, simply print out the message saying that there is not enough money in the account.
2. Write a template function template
T max(T& variable1, T& variable2)
That returns the larger value of variable1 and variable 2.
Assume that class T has overloaded the operator >.

Answers

Answer:

(Assuming C++):

#1

try{

 if (balance < 100)

 {

   throw "InsufficientFund";

 }

 else

 {

   printf("Sufficient funds in account.\n");

 }

}

catch{

 printf("Insufficient funds in account.\n");

}

---------------------------------------------------------------------------------------

#2

template <typename T>

T max (T& variable1, T& variable2)

{

 return variable1 >= variable2 ? variable1 : variable2;

}

Explanation:

For this, the answer assumes the use of the C++ language since not specified in the problem.

For #1, the use of the try-catch statement is simply to check the value of the funds within an account.  The question ask to check if the balance is under 100, to throw an "InsufficientFund" exception to be caught by the catch loop.  Otherwise, print there is enough funds.  If the exception is caught, the catch loop should simply print insufficient funds to the console.  The above code accomplishes each of these things by assuming a variable called "balance" holds the value of the account and has already been declared.  Additionally, the code uses the printf function to display the messages to the screen (Assuming stdio.h header has been included).

For #2, a template function called max was created to determine if variable1 or variable 2 had a greater value, and return the greatest variable.  The code uses the ternary operator to test the expression greater than or equal to and returns variable1 if greater or equal, otherwise, it returns variable2.

Side note, I haven't coded in C++ in years so some syntax may be wrong, but either way this is the concept of the two questions asked (I think I'm syntactically correct though).

Cheers.

You should not define a class field that is dependent upon the values of other class fields: Group of answer choices In order to avoid having stale data. Because it is redundant. Because it should be defined in another class. In order to keep it current.

Answers

Answer:

The answer is "In order to avoid having stale data".

Explanation:

In this question, only the above-given choice is correct because follows the class-object concept, and the wrong choices can be defined as follows:

In this question, the second and third choices are wrong because its class field data value is not redundant, it should not define in another class.The third choice is also wrong because it can't define the class field to keep it current.  

Brainly won't let me see any answers. I've been trying to check my answers for 45 minutes now. I am unable to see ANY answers at all. Please help. I really need to finish all my work by tonight. *URGENT*

Answers

Answer:

I'm having the same problem. I think it has something to do with the Honor Code

Explanation:

Andy designed a web page for a product-oriented industry using CSS properties. He used several HTML tags to create the web page. He also used tables to ensure that the data is easily managed.
​Andy wants the borders to be distinctly visible for each cell in the product details table. Which of the following properties must Andy add to his code to accomplish his goal?
A. ​border-spacing: length;
B. ​border-collapse: separate;
C. ​border-collapse: collapse;
D. ​border-spacing: initial;

Answers

Answer:

CSS documentation

Explanation:

Use this CSS reference to browse an alphabetical index of all the standard CSS properties, pseudo-classes, pseudo-elements, data types, and at-rules. You can also browse a list of all the CSS selectors organized by type and a list of key CSS concepts. Also included is a brief DOM-CSS / CSSOM reference.

Locatiopn: https://devdocs.io/css/

The properties that Andy must add to his code to accomplish his goal is (B), border-collapse: separate.

What is border-collapse?

The border-collapse property in CSS determines how the borders of table cells are collapsed. The default value of border-collapse is collapse, which means that the borders of adjacent cells are merged together. To make the borders of the cells in Andy's table distinctly visible, he needs to set the border-collapse property to separate.

The other possible answers are incorrect. The border-spacing property determines the amount of space between the borders of adjacent cells. The border-spacing: initial value sets the border spacing to the default value, which is 0 pixels.

Find out more on CSS properties here: https://brainly.com/question/14918146

#SPJ2

_____ should be scanned for viruses

Answers

Answer:

Computers/laptops should be scanned for viruses.

Your question has been heard loud and clear.

People's blood , the plasma in the people's blood should be scanned for viruses.

Thank you owo

The GaVS resource where students can locate information regarding Canvas, student email, registration and O365 is called the: Student Success Site Media Center dashboard Guidance Center

Answers

I Inferred you are referring to the Georgia Virtual School resource program.

Answer:

Guidance Center

Explanation:

Interestingly, the Georgia Virtual School (GaVS) enables students access to Virtual education.

Their resource platform allows students to find information regarding Canvas, student email, registration and Office 365 etc by simply going Guidance Center.

While investigating a 4-year-old PC that is taking an unusually long time to boot, a technician discovers that the BIOS is rediscovering the hardware system at every boot. What should the technician do to resolve the problem

Answers

Answer:

learn and train it to make it boot faster

Explanation:

Well we know that the PC is old and it takes a long time to boot also the BIOS is rediscovering the hardware system at every boot so he should make it reboot and learn and train it to make it boot faster

Hector is trying to use Windows Defender to run an antivirus scan. Windows Defender refuses to run. When he opens the Action Center, Hector realizes that Windows Defender has been disabled and another antivirus software is running. Hector does not recognize the other antivirus software.
What type attack has infected Hector's computer?

Answers

Answer:

Rogue antivirus

Explanation:

A Rogue antivirus is a security software in which it misguides the users to pay for it so that the malware or virus could be removed from the computer but actually this is a malware which is installed in the computer system so that they could able to do fraud with the users

In the given situation, since Hector is trying for run Windows defender but it is disabled and on the other side the other antivirus software that infected the computer

Therefore this situation represents the rogue antivirus

Case-Based Critical Thinking Questions Case 1-2 Ted is asked to create a page containing his family photos for a family reunion website. He has about 20 pictures to post, with a caption that he wants to display before each one. Each picture is a group photo of a particular family. Which tag will Ted need to use to display the pictures

Answers

Answer:

Image tag or <img> tag

Explanation:

HTML refers to Hypertext Markup language. In this, we can be designed our documents by applying the font, color, image i.e to presented in the web browser. It is used for creating the webpages

Since in the question, Ted has approx 20 pictures for the post having caption and wants to display the picture so he needs to use the image tag or <img> for displaying the pictures. This tag is used for linking the images for the web pages you have created

i know this not school related but my grandmothers RCA RCT6272W23 tablet is saying type password to decrypt storage and i dont know what to do someone please help

Answers

Answer:

Type the password

Explanation:

It's probably trying to open some kind of compressed file to access data.

List any four routes of transmission of computer virus.
please give me answer​

Answers

Opening attachments or links from unknown or spoofed emails. note: shown above are two examples of how viruses can often appear as legitimate messages, but are designed to trick the computer user. ...

Downloading software from malicious sites. ...

Online Ads. ...

Social media. ...

Unpatched software.

follow me

The routes of the transmission of computer virus include:

Downloading infected files.Shared devices.Corrupt email attachments.Infected drives.

A computer virus refers to a malicious piece of computer code that is designed in order to damage a device or steal data.

The routes of infection for a computer virus include attached files, external storage media, downloading infected files, sharing infected devices, etc.

Read related link on:

https://brainly.com/question/19584310

Which is an aspect of structural-level design? A. scaling B. player-adjusted time C. difficulty level D. radiosity

Answers

Answer:

D. radiosity

Explanation:

This is because in computers the definition of radiosity is an application of the elemental method of solving the equation for other particular scenes with surfaces that gradually reflects light diffusely.

Answer:

its d

Explanation:

im right

etwork behavior analysis system __________ sensors are typically intended for network perimeter use, so they are deployed in close proximity to the perimeter firewalls, often between the firewall and the Internet border router to limit incoming attacks that could overwhelm the firewall.

Answers

Answer:

"Inline" is the correct answer.

Explanation:

Network behavior analysis (NBA)  or Analysis of network activity seems to be the technique to observe traffic trends that aren't groups or sets throughout the cable network's everyday traffic. Simplest terms, this is the organization's effort to define network anomalies outside pure congested traffic expect a seamless.

So that the above is the correct answer.

Which statement about tensile stress is true? A. Forces that act perpendicular to the surface and pull an object apart exert a tensile stress on the object. B. Forces that act perpendicular to the surface and squeeze an object exert a tensile stress on the object. C. Forces that act parallel to the surface exert a tensile stress on the object. D. Forces that decrease the length of the material exert a tensile stress on the object.

Answers

Answer:

The correct option is;

A. Forces that act perpendicular to the surface and pull an object apart exert a tensile stress on the object

Explanation:

A material under tensile stress has axial forces tending to stretch the material and cause elongation. It is the force per unit area externally applied that results in stretching

The definition of tensile stress is the magnitude or amount of applied force on an elastic material divided by the cross-sectional area of the material perpendicular to the direction of the applied force

Therefore, the tensile stress comprises of forces that act perpendicular to a given surface pulling the sections apart.

Are bpos safe for organisations ? State your views on it

Answers

Answer:

No

Explanation:

Business process outsourcing is the act of contracting aspects of a business that are considered secondary to third-party vendors. These aspects of the business could range from Information Technology to accounting or quality assurance. Business process outsourcing has its advantages and disadvantages.

While it ensures flexibility and cost savings in the business, I believe that;

1. Releasing sensitive information about a business to people who are not within the confines of a business, could result in a breach in data handling. Sensitive information can no longer be entirely controlled by the business owners once in the hand of outsourced contractors. Information might get into the hand of hackers who can compromise business activities.

2. Given that some BPO's might require sourcing workers from countries abroad, and also considering the fact that different countries have different criteria as to what constitutes data handling breaches, it might sometimes be hard to enforce safety standards.

3. Quality control might also not be easy to achieve, and could be worsened by language and communication barriers.

4. If the organizations do not track their expenses religiously, they might end up spending more on outsourcing than they would have with employees. This might because they underestimated the pricing.

To handle these safety issues, the business owners might have to develop some very stringent methods of regulating Business Process Outsourcing.

What are the types of computers?

Answers

Answer:There are 5 types of computers.

Explanation:(1)Super computer: are the fastest and expensive computer.super computer can do trillion calculations in every second.

(2)Mainframe: are similar to the super computers all use raw power focus on few tasks.

(3)Server computer: is a central computer that contain of collection data and program.

(4)Personal computer: is also known as a microcomputer.personal computer is all around can  be used as productivity tool.

(5)Work station: are expensive computers and more complex and are intended one user at a time.

Answer:

the four types of computers are;

personal computerMainframe computersuper computersMini computers

Sniffer turns the NIC of a system to the promiscuous mode so that it listens to all the data transmitted on its segment. It can constantly read all information entering the computer through the NIC by decoding the information encapsulated in the data packet. Passive sniffing is one of the types of sniffing. Passive sniffing refers to:

Answers

Answer:

The right answer will be "Sniffing through a hub".

Explanation:

Packet sniffer seems to be a device that listens for transmitted data on what seems like a channel. Sniffing enables the detection of data by individual people as it has been transferred throughout a cable. Appropriate nodes are using this methodology to make a diagnosis of connection issues, or even just harmful programs to obtain confidential information, like authentication and encryption.

What process is used to convert numbers between the binary system and the decimal system? (A.)Enter the number in a calculator, divide by 2, and multiply by 10.,(B)Convert each binary number to a letter, then use the letter’s place in the alphabet as the decimal representation ( e.g., A = 1, B = 2),(C.)Add up the digits in the binary number and place the sum behind a decimal point,(D.)Look up the number on a binary-to-decimal conversion table.

Answers

Answer:

(D.)Look up the number on a binary-to-decimal conversion table.

Explanation:

Though there are other ways of converting binary-to-decimal but from the given list of options, the best option that describes this conversion is option D.

Analyzing each of the options;

Option A

A binary number can't be converted to decimal by merely dividing it by 2 and multiplying the result by 10;

Take for instance; 11 in binary;

Divide by 2

11/2 = 5.5

Multiply result by 10

5.5 * 10 = 55

This final outcome is incorrect; as 11 in binary = 3 in decimal

Option B

This is also incorrect because as there is no room for alphabets in binary representation of numbers

Option C

This will also give an incorrect result;

Take for instance 11

Add up the digits

1 + 1 = 2

Place a decimal point behind;

This gives 2. or 2.0

This final outcome is incorrect; as 11 in binary = 3 in decimal

Option D

Looking up the number on a conversion table gives the accurate result

There are different types of conversion process. The process used to convert numbers between the binary system and the decimal system is to Look up the number on a binary-to-decimal conversion table.

Binary to decimal conversion is often done to show a number that is listed out in binary number system to its equivalent usually in decimal number system.

For easy conversion, one can Divide the binary number by 2 and write out the remainder. Thereafter you can divide by 2  again and write remainder and this process continue till the last remainder becomes 1 .

After that write all the remainders in the (0 , 1)  order. With this, the decimal is converted into binary.

Learn more about binary from

https://brainly.com/question/4467709

When an "is a" relationship exists between objects, it means that the specialized object has Group of answer choices Some of the characteristics of the general object, but not all Some of the characteristics of the general class, but not all, plus additional characteristics None of the characteristics of the general object All the characteristics of the general object, plus additional characteristics

Answers

Answer:

All the characteristics of the general object, plus additional characteristics

Explanation:

In case when an is a relationship exists between objects. Here is a relationship refers to a relationship in which there is a reference of one class to another class.

So this represent that the specialized object contains all the attributes of a general object along with it it also involved the extra attributes

Hence, the last option is correct

Paavo was reviewing a request by an executive for a new subnotebook computer. The executive said that he wanted USB OTG support and asked Paavo’s opinion regarding its security. What would Paavo tell him about USB OTG security

Answers

Answer:

Connecting a mobile device as a peripheral to an infected computer could allow malware to be sent to that device.

Explanation:

Since in the question it is mentioned that Paavo reviewed a request by an executive for subnotebook computer i.e new. but he needs to USB OTG support so it is a  USB i.e on the go that links the devices from one device to another

Therefore by links the mobile device to the computer i.e infected that allows malware we called virus so that we are able to send it to that device. By this,  he wants to tell about the USB OTG security

Other Questions
Write a single scene that uses rich descriptions to build suspense. Use vivid imagery that conveys elements of the supernatural in order to present a single, suspenseful moment to your readers. How many even 3 digit positive integers can be written using the numbers 3,4,5,6,and 7? Spacefood Products will pay a dividend of $ 2.40 per share this year. It is expected that this dividend will grow by 6% per year each year in the future. What will be the current value of a single share of Spacefood's stock if the firm's equity cost of capital is 13%? The following passage is Article 6 of the Declaration of the Rights of Man, approved by the National Assembly of France, August 26, 1789. Use the passage to answer the following question: Liberty consists in the freedom to do everything which injures no one else; hence the exercise of the natural rights of each man has no limits except those which assure to the other members of the society the enjoyment of the same rights. These limits can only be determined by law. How would English Enlightenment philosopher John Locke feel about the article? (5 points) He would disapprove of it because it calls for limited individual freedom. He would disapprove of it because it implies that humans are naturally bad. He would approve of it because it appeals to the idea of natural law. He would approve of it because it proves the theory of the social contract. Need Assistance*Please Show Work* 5. Read the outline.What type of problem-and-solution organization does this outline use?1. The overall problem: Company must decide if installing permanentcatwalks is more cost effective than using temporary scaffolding,II. Three options available:A. Continue to rent temporary scaffolding and have it installed by contractorsB. Purchase scaffolding and have it installed by company employeesC. Have permanent catwalks designed and installedIII. Conclusion: Permanent catwalks are best ideaproblem/solution/solution/recommendationproblem/cause/solution Which methods can be used to run a query? Check all that applyOn the Create tab, in the Queries group, click Run.In query Design view, on the Design tab, click RunSwitch to Datasheet view before any other commandsClose the Show Table dialog box in the Datasheet viewOn the Create tab, in the Queries group, click Create Query Net capital outflow and net exports An open economy interacts with the rest of the world through its involvement in world markets for goods and services and world financial markets. Although it can often result in an imbalance in these markets, the following identity must remain true: In other words, If a transaction directly affects the left side of this equation, then It must also affect the right side. The following problem will help you understand why this Identity must hold. Suppose you are a fashion designer Living In the United States, and a trendy boutique in Bangkok just purchased your entire inventory for THB 80,000. Determine the effects of this transaction on exports, imports, and net exports in the U.S. economy, and enter your results in the following table. If the direction of change is 'No change,'' enter ''0'' in the Magnitude of Change column. Hint: The magnitude of change should always be positive, regardless of the direction of change. Because of the identity equation that relates)_________ to net exports, the in U.S. net exports Is matched by _________in U.S. net capital outflow. Which of the following Is an example of how the United States might be affected in this scenario?a. You store the Thai baht in your safety deposit box at home. b. You purchase THB 48,000 worth of stock in a Thai corporation and THB 32,000 worth of Thai bonds. c. You exchange the THB 80,000 for dollars at your local bank, which then uses the foreign currency to purchase stock in a Thai corporation. What is the value of 13 squared? The energy transfer diagram represents the energy of a person diving into a pool. A wide arrow labeled gravitational potential energy 8000 J with a small arrow turning away from it labeled thermal energy ? J. The rest of the arrow goes forward labeled kinetic energy 7000 J. How much thermal energy is generated? 1000 J 2000 J 7000 J 15,000 J when vector contains distance and direction it also known as In ABC,c=9, mB=65, and a=105. Find b. Read the two versions of the beginning of Yasmins narrative. Version 1: I took a long, lingering look at the tremendous beauty that surrounded me. Nature abounded as far as the eye could see, and the only sounds to be heard were the peaceful murmurs of that which existed in the wilderness. As I sat there, my tent and sleeping bag the only signs of civilization for miles, my heart swelled with relief that I had decided to take this weekend camping trip. I could feel every muscle in my body gradually relaxing with every sight, every sound, every smell within this untouched slice of tranquility. It was hard to believe that anything could disrupt the serenity of this place . . . but I could not have been more wrong. Version 2: Exhausted, I took one last look around me. I had been camping for only two short days, but I could not wait to get home and recount the adventures of my short stay in peace and tranquility. Hoisting my backpack onto my back, I grabbed my canteen and began the long trek back to my car. The question was not which story I should tell, but rather which one I should tell first. What best describes the contrast between the narrative structures of Version 1 and Version 2? Version 1 uses chronological order, building up to the action. Version 2 starts with the conclusion to make readers curious about the beginning. Version 1 provides background information prior to relaying events. Version 2 begins with an exciting conflict. Version 1 begins with an exciting conflict. Version 2 starts with the conclusion to make readers curious about the beginning. Version 1 answers the readers questions. Version 2 uses chronological order, building up to the action The coordinates of A, B, and C in the diagram are A (p, 4), B (6, 1 ), and C (9, q). Which equation correctly relates p and q? Hint: Since AB is perpendicular to BC, the slope of AB the slope o BC = -1. A. -q p = 7 B. q p = 7 C. p q = 7 D. p + q = 7 Paul is a year older than his wife and they have two children who are also one year apart. Paul notices that on his birthday in 2011, the product of his age and his wife's age plus the sum of his children's ages is 2011. What would have been the result if he had done this calculation thirteen years before? Read this excerpt from "A Student's Guide to GlobalClimate Change."This excerpt usestext structure.Climate change might allow some infectious diseases tospread. As winter temperatures increase, ticks andmosquitoes that carry diseases can survive longerthroughout the year and expand their ranges, puttingmore people at risk. One big concern is malaria, adeadly disease spread by mosquitoes in many hot,humid parts of the world.What can people do about it?People should take common-sense steps to avoid tickand mosquito bites, and communities can take actionsto control mosquitoes, such as removing sources ofstanding water. It's also important for doctors to knowthe symptoms of diseases that could be spreading tonew areas so they can diagnose and treat their patients.By Dylan opened a savings account with $1,250. How much simple interest will he earn if he leaves the money in the account for three years at an interest rate of 0.03? Use the formula i = prt. $112.50 $1,125.00 $37.50 $75.00 I NEED IT NOWWwhat task does a sensor perform in a closed loop feedback system a: measures the variable that represents the system state B: compares the variable to a reference variable C: defines the reference variable D: feeds d at a back into the system so that it can reach the desired state A security held in a well-diversified portfolio that has a beta of zero in a one-factor model will have an expected return of: Analyzing Contingent and Other Liabilities:The following independent situations represent various types of liabilities. Analyze each situation and indicate which of the following is the proper accounting treatment for the company: (a) record a liability on the balance sheet, (b) disclose the liability in a nancial statement footnote, or (c) neither record nor disclose any liability. 1. A stockholder has filed a lawsuit against______. ______attorney's have reviewed the facts of the case. Their review revealed similar lawsuits have never resulted in a cash award and it is highly unlikely that this lawsuit will either.2. _____signed a 60-day, 10% note when it purchased items from another company.3. The EPA notifies______that a state where it has a plant is filing a lawsuit for groundwater pollution against_____and another company that has a plant adjacent to______plant. Test results have not identified the exact source of the polution. ______manufacturing process often produces by-products that can pollute groundwater.4. _______manufactured and sold products to a retailer that later sold the products to consumers. ______will replace the product if it is found to be defective within 90 days of the sale to the consumer. Historically, 1.2% of the products are returned for replacement.