Which step is first in changing the proofing language of an entire document?

A: Click the Language button on the Status bar.
B: Select the whole document by pressing Ctrl+A.
C: Under the Review tab on the ribbon in the Language group, click the Language button and select Set Proofing Language.
D: Run a Spelling and Grammar check on your document before changing the language.

Answers

Answer 1

Answer:

b) Select the whole document by pressing Ctrl+a.

Explanation:

The correct answer is b. If you do not select the whole document or parts of the document you wish to change the proofing language for, it will only be applied to the word your cursor is positioned in.

ig:ixv.mona :)

Answer 2

Answer:

B) Select the whole document by pressing Ctrl+A.


Related Questions

Which of the following industries does not use technology?

Medicine

Marketing and advertising

Law enforcement

Arts and entertainment

None of the above

Answers

Answer:

None of the above

Explanation:

Medicine uses technology to research

Advertiseres use platforms like Instagram to share the product they are promoting

Law enforcement uses tech to pull up databases of people's records

Arts and entertainment use them to create (in some cases), share, and sell their art.

Hope this helps!

Answer:

E

Explanation: got it right on edge 2020

which type of memory helps in reading as well as writing data and modify data

Answers

Answer:

RAM (Random access memory)helps in reading aswell as writing data

Write a program named palindromefinder.py which takes two files as arguments. The first file is the input file which contains one word per line and the second file is the output file. The output file is created by finding and outputting all the palindromes in the input file. A palindrome is a sequence of characters which reads the same backwards and forwards. For example, the word 'racecar' is a palindrome because if you read it from left to right or right to left the word is the same. Let us further limit our definition of a palindrome to a sequence of characters greater than length 1. A sample input file is provided named words_shuffled. The file contains 235,885 words. You may want to create smaller sample input files before attempting to tackle the 235,885 word sample file. Your program should not take longer than 5 seconds to calculate the output
In Python 3,
MY CODE: palindromefinder.py
import sys
def is_Palindrome(s):
if len(s) > 1 and s == s[::-1]:
return true
else:
return false
def main():
if len(sys.argv) < 2:
print('Not enough arguments. Please provide a file')
exit(1)
file_name = sys.argv[1]
list_of_palindrome = []
with open(file_name, 'r') as file_handle:
for line in file_handle:
lowercase_string = string.lower()
if is_Palindrome(lowercase_string):
list_of_palindrome.append(string)
else:
print(list_of_palindrome)
If you can adjust my code to get program running that would be ideal, but if you need to start from scratch that is fine.

Answers

Open your python-3 console and import the following .py file

#necessary to import file

import sys

#define function

def palindrome(s):

   return len(s) > 1 and s == s[::-1]

def main():

   if len(sys.argv) < 3:

       print('Problem reading the file')

       exit(1)

   file_input = sys.argv[1]

   file_output = sys.argv[2]

   try:

       with open(file_input, 'r') as file open(file_output, 'w') as w:

           for raw in file:

               raw = raw.strip()

               #call function

               if palindrome(raw.lower()):

                   w.write(raw + "\n")

   except IOError:

       print("error with ", file_input)

if __name__ == '__main__':

   main()

PLEASE HURRY!!!

Look at the image below!

Answers

Answer:A and E

Explanation:

The last three are strings while the other choices are integers.

Putting ' ' or " " around something makes it a string and the input is asking the user to input a string.

Which holds all of the essential memory that tells your computer how to be
a computer (on the motherboard)? *
O Primary memory
Secondary memory

Answers

The answer is: B
Hope that helps have a nice day purr:)

What information is required for a complete citation of a website source?
A: the title, volume number, and page numbers
B: the responsible person or organization and the website URL
C: the responsible person or organization, date accessed, and URL
D: the responsible person or organization and the date accessed

Answers

Answer:

C: the responsible person or organization, date accessed, and URL

Explanation:

What is the difference between Information Technology and Communication Technology?​

Answers

Answer:

Explanation:

information tech is technology that teaches you information, and communication tech is tech that lets you talk to family and friends and meet new people.

Answer:

The main difference between information technology and communication technology is that Information technology is a subject that is use of computers to store, retrieve, transmit and manipulate data, or information, often in the context of business or other enterpise whereas a Communication technology is the use of computers to communicate with family and friends.

Nowadays computer games are mostly available on external
hard disk.
Is it true or false?

Answers

Answer:

false

Explanation:

because a lot of times they are downloads without the disk

It is false that nowadays computer games are mostly available on external hard disk.

What is hard disk?

A hard disk drive (HDD) is a type of computer storage device that uses magnetic storage to store and retrieve digital information.

Hard disks are usually located inside the computer and are used to store the operating system, applications, and user data such as documents, pictures, and videos.

Computer games can be stored on a variety of devices, including internal hard drives, external hard drives, solid state drives, and even cloud storage.

While external hard drives may be a popular option for some users, computer games can be installed and played from a variety of storage devices depending on user preferences and hardware capabilities.

Thus, the given statement is false.

For more details regarding hard disk, visit:

https://brainly.com/question/9480984

#SPJ2

If a function does not return a value, which of the follow is correct?Group of answer choicesThe return type is a Swift optional type.The return type must be set to nil.The return type is omitted from the function declaration.

Answers

Answer:

In swift programming language it is ok when a function does not return any value you are not necessarily required to set return type because it is optional so the correct answer is  "The return type is omitted from the function declaration".

Explanation:

If programing language is swift so we can omit return type from function declaration otherwise if language is C++ we can set return type "Void".

sa kumbensiyon naihalal si andres bonofacio bilang​

Answers

Answer:

the contemporary Supremo (supreme leader) of the Katipunan

Carlie was asked to review a software project for her company to determine specific deadlines. Which part of project management must she consider?

Analysis
Resources
Scope
Time

Answers

Answer:

Resources

Explanation:

Answer:

scope

Explanation:

Cleary specifying the theme to be used for a site
before building it provides which main advantage:
site navigation
site consistency
O
a clear message
O O O
improved readability

Answers

Answer: site consistency

Answer:

B) Site Consistency

Explanation:

14. Convert 11110111 from binary to denary
(1 Point)

Answers

converting 11110111 from binary to denary = 247

Answer:

247

Explanation:

Read the following code:

x = 1
while(x < 26)
print(x)
x = x + 1

There is an error in the while loop. What should be fixed? (5 points)

Select one:
a. Add a colon to the end of the statement
b. Begin the statement with the keyword count
c. Change the parentheses around the test condition to quotation marks
d. Use quotation marks around the relational operator

Answers

For a while loop to function properly, it needs a colon after it.

Answer choice A is correct.

Which of the following is another word for a copyeditor?


microeditor

macroeditor

assignment editor

assistant editor

Answers

Answer: speaking of microeditor

Explanation: thats not the only thing i know of thats micro :0

Which of the following is another word for a copyeditor?


The answer: microeditor
Hope it helps:)

2. Which of the following fonts is most legible for a block of text? What font size and color would you choose if you were writing a block of text in a formal business document? (1 point)

Answers

Answer:

Color: Black

Font: Times New Roman

Size: 12

Explanation:

Answer:

Times new roman

front 12

color:black

Explanation:

Times new roman

front 12

color:black

what specific Philippine law discusses copyright? elaborate?​

Answers

Answer: Republic Act No. 8293 "Intellectual Property Code of the Philippines".

Explanation:

The Republic Act No. 8293 is the Intellectual Property Code of the Philippines. It is the Philippine law that discusses copyright. This law protects copyrights, intellectual property, trademarks, and patents.

Examples of copyright that are protected under the law are photographic works, drawings, audiovisual works, and cinematographic works.

The IP address and the port are both numbers. Which statement is true?
A computer has many IP addresses and many ports.
A computer has one IP address and many ports.
A computer has one IP address and one port,
Acomputer has many IP addresses and one port.

Answers

Answer:

A computer has one IP address and many ports.

Explanation:

Answer:

A computer has one IP address and many ports.

Explanation:

Implement the following logic in C++, Use appropriate data types. Data types are represented as either numeric (num) or string.
start
string name
string address
num item //use int
num quantity
num price //use double as data type
num SIZE = 6
num VALID_ITEM [SIZE] = 106, 108, 307, 405, 457, 688 //use int as data type
num VALID_ITEM_PRICE [SIZE] = 0.59, 0.99, 4.50, 15.99, 17.50, 39.00 //use double as data type
num i
bool foundIt = false
string MSG_YES = "Item available"
string MSG_NO = "Item not found" get name, address, item, quantity
i = 0
while i < SIZE
if item == VALID_ITEM [i] then
foundIt = true
price = VALID_ITEM_PRICE [i]
endif
i = i + 1
endwhile
if foundIt == true then
print MSG_YES
print quantity, " at " , price, " each"
print "Total ", quantity * price
else
print MSG_NO
endif
stop

Answers

Answer:

Follows are the modified code in c++ language:

#include<iostream>//header file

#include<string>//header file

using namespace std;

int main()//main method

{

string name,address, MSG_YES, MSG_NO;//defining string variable

int item,quantity,size=6, i=0;//defining integer variable

double price;//defining double variable  

int VALID_ITEM[]={106,108,307,405,457,688};//defining integer array and assign value

double VALID_ITEM_PRICE[]={0.59,0.99,4.50,15.99,17.50,39.00};//defining double array and assign value

bool foundIt=false;//defining bool variable  

MSG_YES="Item available";//use string variable to assign value

MSG_NO = "Item not found"; //use string variable to assign value

cout<<"Input name: ";//print message

cin>>name;//input value in string variable

cout<<"Input Address: ";//print message

cin>>address;//input value in string variable

cout<<"Input Item: "<<endl;//print message

cin>>item;//input value in string variable

cout<<"Input Quantity: "<<endl;//print message

cin>>quantity;//input value in string variable

while(i <size)//defining while that checks i less then size  

{

if (item ==VALID_ITEM[i]) //use if block to match item in double array

{

foundIt = true;//change bool variable value

price = VALID_ITEM_PRICE[i];//hold item price value in price variable  

}

i++;//increment the value of i

}

if (foundIt == true)//use if to check bool variable value equal to true

{

cout<<MSG_YES<<endl;//print value

cout<<"Quantity "<<quantity<<" at "<<"Price "<<price<<"each"<<endl;//print value

cout<<"Total"<<quantity*price;//calculate the total value

}

else//else block

cout<<MSG_NO;//print message  

}

Output:

please find the attached file.

Explanation:

In the above given C++ language modified code, four-string variable " name, address, MSG_YES, and MSG_NO", four integer variable "item, quantity, size, and i", and "integer and double" array is defined, that holds values.

In the string and integer variable "name, address, and item, quantity", we input value from the user-end and use the while loop, which uses the if block to check the "item and quantity" value from the user end and print its respective value.

Your game design company has recently asked all employees to use a specific personal information management application (PIM) to increase workplace efficiency. The PIM is collaborative, so contacts, calendar entries, and notes are shared across the team. Several team members are resistant to the idea, saying it interrupts their workflow, and they prefer their own way of handing contacts, notes, etc. Others don’t want their own notes to be seen by their coworkers.

Answers

Answer:For example, an office worker might manage physical documents in a filing cabinet by placing them in folders organized alphabetically by project name, or might manage digital documents in folders in a hierarchical file system.

Explanation:

WILL MARK AS BRAINLIEST
Describe the environmental issues in India and list ways that technology has been used to address these issues.

Answers

India has been having to engineer better technology to better prepare people in india for the brutal monsoon seasons in india

How to get passed administrattor on macbook air to get games and stuff.

Answers

Answer:

You need to use the name and password of the main owner of the computer/the account you made when you first got it. Then, you should be able to download apps and use it if you have your apple ID set up.

Explanation:

HELP!!
Why is email etiquette important? (1 point)

Email is rarely used to communicate via technology.

With more and more written communication through technology, it is important to sound competent and qualified and for your meaning to be clear.

Not many classes are taken online.

Even though companies and employers use a lot of email communication, they don't really care if you are clear with your communication

Answers

Answer:

B

Explanation:

Write the SQL queries that accomplish the following tasks in the HAFH Realty Company Property Management Database:

Answers

The complete question is:

Write the SQL queries that accomplish the following tasks in the HAFH Realty Company Property Management Database:

a. Display the SMemberID and SMemberName for all staff members.

b. Display the CCID, CCName, and CCIndustry for all corporate clients.

c. Display the BuildingID, BNoOfFloors, and the manager’s MFName and MLName for all buildings.

d. Display the MFName, MLName, MSalary, MBDate, and number of buildings that the manager manages for all managers with a salary less than $55,000.

e. Display the BuildingID and AptNo, for all apartments leased by the corporate client WindyCT.

f. Display the InsID and InsName for all inspectors whose next inspection is scheduled after 1-JAN-2014. Do not display the same information more than once.

g. Display the SMemberID and SMemberName of staff members cleaning apartments rented by corporate clients whose corporate location is Chicago. Do not display the same information more than once.

h. Display the CCName of the client and the CCName of the client who referred it, for every client referred by a client in the music industry.

i. Display the BuildingID, AptNo, and ANoOfBedrooms for all apartments that are not leased.

Also a schema of the HAFH database is attached.

Answer:

Using SQL's SELECT, FROM, WHERE syntax, find below the queries for each question.

a.

SELECT SMemberID , SMemberName  

FROM staffmember

b.

SELECT CCID, CCName, CCIndustry

FROM corpclient

c.

SELECT b.BuildingID, b.BNoOfFloors, m.MFName, m.MLName

FROM building b, manager m

WHERE b.ManagerID = m.ManagerID

d.  

SELECT m.MFName, m.MLName, m.MSalary, m.MBDate, count(*) as buildings

FROM building b, manager m

WHERE m.MSalary<55000

AND b.ManagerID = m.ManagerID

GROUP BY m.ManagerID

e.

SELECT b.BuildingID, a.AptNo

FROM building b, apartment a, corpclient c

WHERE c.CCName = "WindyCT"

AND c.CCID = a.CCID

AND a.BuildingID = b.BuildingID

f.

SELECT DISTINCT i.InsID, i.InsName  

FROM inspector i, inspecting x

WHERE i.InsID = x.InsID

AND x.DateNext > "2014-01-01"

g.

SELECT DISTINCT s.SMemberID, s.SMemberName  

FROM staffmember s, cleaning c, apartment a, corpclient cc

WHERE s.SmemberID = c.SmemberID

AND c.AptNo = a.AptNo

AND a.CCID = cc.CCID

AND cc.CCLocation = "Chicago"

h.

SELECT cc1.CCName, cc2.CCName  

FROM corpclient cc1, corpclient cc2

WHERE cc1.CCIDReferencedBy = cc2.CCID  

AND cc2.CCIndustry = "Music"

i.

SELECT a.BuildingID, a.AptNo, a.ANoOfBedrooms

FROM apartment a

WHERE a.CCID NOT IN (SELECT c.CCID FROM corpclient c)

Implement a class Balloon that models a spherical balloon that is being filled with air. The constructor constructs an empty balloon. Supply these methods:

void addAir(double amount) adds the given amount of air.
double getVolume() gets the current volume.
double getSurfaceArea() gets the current surface area.
double getRadius() gets the current radius.

Supply a BalloonTester class that constructs a balloon, adds 100cm^3 of air, tests the three accessor methods, adds another 100cm3 of air, and tests the accessor methods again.

Answers

Answer:

Here is the Balloon class:

public class Balloon {  //class name

private double volume;  //private member variable of type double of class Balloon to store the volume

 

public Balloon()  {  //constructor of Balloon

 volume = 0;  }  //constructs an empty balloon by setting value of volume to 0 initially

 

void addAir(double amount)  {  //method addAir that takes double type variable amount as parameter and adds given amount of air

 volume = volume + amount;  }  //adds amount to volume

 

double getVolume()  {  //accessor method to get volume

 return volume;  }  //returns the current volume

 

double getSurfaceArea()  {  //accessor method to get current surface area

 return volume * 3 / this.getRadius();  }  //computes and returns the surface area

 

double getRadius()  {  //accessor method to get the current radius

 return Math.pow(volume / ((4 * Math.PI) / 3), 1.0/3);   }  } //formula to compute the radius

Explanation:

Here is the BalloonTester class

public class BalloonTester {  //class name

  public static void main(String[] args)    { //start of main method

      Balloon balloon = new Balloon();  //creates an object of Balloon class

      balloon.addAir(100);  //calls addAir method using object balloon and passes value of 100 to it

      System.out.println("Volume "+balloon.getVolume());  //displays the value of volume by getting value of volume by calling getVolume method using the balloon object

      System.out.println("Surface area "+balloon.getSurfaceArea());  //displays the surface area by calling getSurfaceArea method using the balloon object

             System.out.println("Radius "+balloon.getRadius());   //displays the value of radius by calling getRadius method using the balloon object

     balloon.addAir(100);  //adds another 100 cm3 of air using addAir method

       System.out.println("Volume "+balloon.getVolume());  //displays the value of volume by getting value of volume by calling getVolume method using the balloon object

      System.out.println("Surface area "+balloon.getSurfaceArea());  //displays the surface area by calling getSurfaceArea method using the balloon object

             System.out.println("Radius "+balloon.getRadius());    }  }  //displays the value of radius by calling getRadius method using the balloon object

//The screenshot of the output is attached.

write a program that reads in a number n and prints out n rows each containing n star charactersg

Answers

In python:

rows = int(input("How many rows would you like? "))

i = 0

while i < rows:

   print("*" * rows)

   i += 1

I hope this helps!

Low level security is designed to detect and impede _____ some unauthorized external activity Some None Most All

Answers

Answer:

Low-level security is designed to detect and impede some unauthorized external activity.

Examples of low-level security systems include:

Basic physical obstacles to defense  Locks for increased-security  Simple lighting coverage  Standard alarm Systems

Explanation

Protection devices that prevent and track any unwanted external actions are called Low-Level security measures.

Other obstacles to the installation of the security system, such as reinforced doors, fences, high-security locks, and window bars and grates, are often installed after simple physical protection barriers and locks have been created.

Also, a simple lighting system that could not be more complex than the standard security lighting systems over windows and doors and a regular security warning system that will be an unattended unit that offers monitoring capability and sound warnings at the location of unwanted entry.

Storage facilities, convenience shops, and small business premises are some of the locations that incorporate low-level security devices.

Cheers

Write some code that assigns True to the variable is_a_member if the value assigned to member_id can be found in the current_members list. Otherwise, assign False to is_a_member. In your code, use only the variables current_members, member_id, and is_a_member.

Answers

Answer:

current_members = [28, 0, 7, 100]

member_id = 7

if member_id in current_members:

   is_a_member = True

else:

   is_a_member = False

print(is_a_member)

Explanation:

Although it is not required I initialized the current_members list and member_id so that you may check your code.

After initializing those, check if member_id is in the current_members or not using "if else" structure and "in" ("in" allows us to check if a variable is in a list or not). If member_id is in current_members, set the is_a_member as True. Otherwise, set the is_a_member as False.

Print the is_a_member to see the result

In the example above, since 7 is in the list, the is_a_member will be True

Before inserting a preformatted table of contents, what must you do first?
apply heading styles to text
update the table of contents
navigate to the Review tab and the Table of Contents grouping
navigate to the Insert Table of Contents dialog box

Answers

Answer: apply heading styles to text.

Explanation:

in programming and flowcharting, what components should you always remember in solving any given problem?

Answers

Answer:

you should remember taking inputs in variables

Other Questions
What is 0.233 as a fraction in simplest form. Match each description to the correct step. Metaphase 11 Nuclear membranes form around each set of chromosomes. Prophase 11 Chromosomes line up in the middle of the cell Telophase 11 DNA condenses to form chromosomes. Anaphase 11 Each chromosome separates and moves to opposite ends of the cell. Plz Hurry Steve and Brian are both avid bicyclists. Each week, Steve rides for a total of 2x hours at an average speed of x miles per hour.sBrian rides 6 more hours a week than Steve, but at an average speed that is 4 miles per hour less than Steve's average speed.Which of the following functions will give the total distance that Brian rides each week, in miles? Do you think the Cavite Mutiny could have been avoided if reports were more truthful and factual? Defend your answer _____ had to do with putting the Southern states back into the Union. A. amenestyB. reconstruction C. vagrancyD.civil rightsE. tribunal What is the underlined part of this sentence? A bat swooped down close to Marvins head.A.its predicateB.its objectC.its subjectD.its preposition Harappan civilizationBuilt great citiesDeclined because ofdroughtsA. Gave women equal rightsB. Had the world's largest armyC. Was isolated from the rest of the worldD. Traded with other civilizations Listen to the audio and then answer the following question. Feel free to listen to thenecessary before answering the questionWhat can we conclude from the boy's comments? 0:00 / 0:060 1O The students are not very smart.O The students are ready for the test.O The students need to study more.The teacher is very happy. Direction: Arrange the following numbers in decreasing order. Write your answer on the blank provided below each number.1. 89 000, 100 000, 55 000, 67 000-2. 12 345, 23 456, 34 567, 45 678-3. 98 765, 87 654, 76 543, 65 432- On December 31, 2019, Main Inc. borrowed $3,000,000 at 12% payable annually to finance the construction of a new building. In 2020, the company made the following expenditures related to this building: March 1, $360,000; June 1, $600,000; July 1, $1,500,000; December 1, $1,500,000. The building was completed in February 2021. Additional information is provided as follows. 1. Other debt outstanding 10.year, 13% bond, December 31, 2013, interest payable annually $4,000,000 6-year, 10% note, dated December 31, 2017, interest payable annually $1,600,000 2. March 1, 2020, expenditure included land costs of $150,000 3. Interest revenue earned in 2020 $49,000 Instructions:Determine the amount of interest to be capitalized in 2020 in relation to the construction of the building.The amount of interest$SHOW LIST OF ACCOUNTSPrepare the journal entry to record the capitalization of interest and the recognition of interest expense, if any, at December 31, 2020. (Credit account titles are automatically indented when amount is entered. Do not indent manually. If no entry is required, select "No Entry" for the account titles and enter 0 for the amounts.)Date Account Titles and Explanation Debit CreditDecember 31, 2020 Select the correct answer.There is a proper range of temperature for safe refrigeration of poultry. Approximately what temperature should your refrigerator be?A. 10 FB. 20 FC. 39 FD. 52 F his capital the to the former Byzantine city and renamed it 16Mehmed's first concerns were restoring the city's defenses and repopulation. He ordered therepair of the gates and walls, the construction of a fortress within the city, and the building of a palace.To repopulate the city, he encouraged traders to return to their homes, promising money andprotection. Mehmed also demanded that Muslims, Christians, and Jews from across the empire resettlein Constantinople. He allowed his subjects religious freedom as long as they 17him.Additionally, Mehmed created a central government, with loyal officials. Like the Byzantineemperor Justinian, Mehmed also arranged criminal law and the law for his subjects into a single code. Inthe twenty-five years after the fall of Constantinople, Mehmed undertook a number of militarycampaigns in the Balkans, modern-day Romania, Hungary, Anatolia, the island of Rhodes, the CrimeanPeninsula, and southern Italy. On a final expedition into Italy in 18 Mehmed became ill anddied, but his legacy continued. The film on the following page covers the rise of the Ottoman Empirefrom its beginnings in the 19th century through the Conquest of Constantinople to itsmajor defeat by European Catholic states in the 20th century. Carbon dioxide is formed when two oxygen atoms chemically combine with a carbon atom which term best describes carbon dioxide? A Mixture B atoms C elements D compound (PYTHON) Ask the user if they want to multiply two numbers entered from the keyboard. If they type "YES" ask for two numbers and multiply them. What happens if they type Yes, yes, yes, try a few combinations. Im trying to self tech myself Italian, is anyone able to be my language buddy and help me? Part BAfter the first hour, Samuel and Allie agree they will continue to climb up the rockface for another 1 hour. Allie continues to climb at the same rate. What rate mustSamuel climb in the last { hour to reach the same height as Allie?Samuel needs to climb at a rate ofmeters per hour in the last hour to reachthe same height as Allie. DNA Polymerase makes a copying error in a gene and an additional basegets put into that gene. Which of the following is the most reasonableresult? *1. The codons on the mRNA transcript contain an extra base which causes the aminoacid chain to not make the desired protein.2. This causes RNA polymerase to transcribe the gene backwards.3. The causes RNA polymerase to not recognize the gene and therefore no transcriptiontakes place.4. The RNA polymerase recognizes extra bases and won't transcribe them. Brainliest will be given!!!Suppose Republicans and Democrats in the Senate had agreed to a compromise bill that included some of what both parties wanted but that this bill now differed from the spending bill passed by the House. What would have to happen for the compromise bill to become law?A. President Trump would need to sign the bill he preferred; the original House bill, or the compromise Senate bill.B. Nothing; Senate bills take precedence over House bills, so the Senate bill would go to the President.C. The Senate bill would have to go back to the House, and the House would have to vote again to accept the Senates changes.D. The Supreme Court would need to intervene to determine which changes are constitutional and which are not. I am really stuck on this can anyone help? An economic system that permits the conduct of business with minimal government intervention A. free enterprise B. Continuum C. incentive D. safety net E. collective F. socialism G. transition H. private property