Which of the following is a true statement about milestones?
O A. Meeting milestones contribute to the meeting of a key deliverable.
O B. Milestones are the high level events or actions in a schedule.
O C. Milestones are a helpful but not essential part of a schedule.
O D. Most milestones concern the delivery of a product.

Answers

Answer 1

Answer:

B option

Explanation:

my stones are the high level events are actions in a schedule.


Related Questions

You’ve just completed a survey of the wireless signals traversing the airspace in your employer’s vicinity, and you’ve found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. What kind of threat do you need to report to your boss?
A. Rogue access point
B. War driving
C. Bluesnarfing
D. Hidden node

Answers

Answer:

A. Rogue access point

Explanation:

A rogue access point is a point that is wireless and installed on a network that is safe and secure without taking any permission from a local administrative network (LAN). It could be done by an employee or a person who is a malicious attacker

Therefore according to the given situation, since there is an unauthorized AP i.e too strong which is mid of 100-acre campus so it would be a threat of Rogue access point and the same is to be communicated to the boss

Write a pseudocode algorithm which inputs numeric scores and outputs how many of them are over 100. The end of the data is signalled by a user input of -1.

Answers

Answer:

calculateCountGreaterThan100()

{

declare variable count with zero

while True

 {

 input numeric values from user

 if user inputted value > 100

  increment the count

 if user inputted value == -1

  break the loop

 }

print the value of count

}

Explanation:

First of all, let us have a look at the meaning of a pseudocode:

A pseudocode is nothing but a informative way of expressing our code in simple plain English.

It is not written in programming language so it does not have any syntax rules.

Here, we are asked to write pseudocode algorithm for inputting numeric scores and output the number how many of them are greater than 100. The end of numbers is signalled by a user input of -1.

The answer is:

calculateCountGreaterThan100()

{

declare variable count with zero

while True

 {

 input numeric values from user

 if user inputted value > 100

  increment the count

 if user inputted value == -1

  break the loop

 }

print the value of count

}

Here, we have declared a variable with initial count as 0.

Then, in a loop we are taking input from user in which user is giving integer input.

If the value is greater then zero, the count is incremented.

If the value is -1, we come out of the loop and then print the count value.

Pseudocode algorithm are algorithms that are implemented using pseudocodes, and it does not obey the syntax of a programming language.

The Pseudocode algorithm

The pseudocode algorithm is as follows:

count = 0

input num

while num != -1:

    if num > 100:

         count++

print(count)

The flow

The flow of the above pseudocode algorithm is as follows

First, variable count is initialized to 0Next, we take input for numNext, a loop is repeated until the input is -1During each loop, the inputs over 100 are countedLastly, the count of inputs greater than 100 is printed

Read more about pseudocode algorithm at:

https://brainly.com/question/11623795

Write a function, sublist, that takes in a list of numbers as the parameter. In the function, use a while loop to return a sublist of the input list. The sublist should contain the same values of the original list up until it reaches the number 5 (it should not contain the number 5).

Answers

Answer:

Following are the code to this question:

def sublist(l):#defining a method list sublist that accepts a list

   val=[]#defining an empty list

   x=0#defining x variable that store value 0

   while(x<len(l)):#defining loop that check x is lessthen list length  

       if(l[x]==5):#defining if block that checks list value equal to 5

           break#using break keyword  

       val.append(l[x])#add value in val list

       x+= 1#increment the value of x variable by 1

   return val#return val

l=[3,4,7,8,5,3,2]#defining list l

print(sublist(l))#using print method to call sublist method

Output:

[3, 4, 7, 8]

Explanation:

In the above python code, a method "sublist" is declared that accepts a list, inside the method an empty list "val" and an integer variable x is defined that stores "0"  value. In the method, a while loop is declared that checks list length and define if block to checklist element value equal to "5". which the condition is true it will return before values. In the last step, a list "l" is declared that holds value and used the print method to call sublist to prints its return value.

What is a path and how do you know that it is filled and selected

Answers

Explanation:

A path represents a selected editing area of an image, this feature is typically available when using Adobe Photoshop software.

For example, a photographer may select the entire face area of his subject as his path (work path). To know when it is filled the photographer observes to see when the colour changes or other changes are applied to the background layer of the selected path.

An Administrator wants to make a list of all prospects who complete the Contact Us form but only wants them to be added the first time they complete the form. If a prospect is ever removed from the list, they shouldn't be able to get added back to it. What is the best way to create this type of list

Answers

Answer:

The answer to this question can be defined as follows:

Explanation:

The easiest way to build such a list is by using an algorithm rule, where the prospects who complete the form are then matched with the rule and added to the list because the developer would also like to list of the all applicants, who fill out all the contact us Application, but still only prefer to also have them added when they fill-up the form first. When an outlook is ever omitted from the list, it should not be included.

Importance of taking correct body measurement....

Answers

Taking correct body measurements is of key importance especially to models and future models. So that they remember about the leftover weight in their body from thanksgiving , now when they take correct body measurements , they are aware and will counter such things to be better.

Hector is trying to use Windows Defender to run an antivirus scan. Windows Defender refuses to run. When he opens the Action Center, Hector realizes that Windows Defender has been disabled and another antivirus software is running. Hector does not recognize the other antivirus software.
What type attack has infected Hector's computer?

Answers

Answer:

Rogue antivirus

Explanation:

A Rogue antivirus is a security software in which it misguides the users to pay for it so that the malware or virus could be removed from the computer but actually this is a malware which is installed in the computer system so that they could able to do fraud with the users

In the given situation, since Hector is trying for run Windows defender but it is disabled and on the other side the other antivirus software that infected the computer

Therefore this situation represents the rogue antivirus

Do you know best way to know WiFi password which you are connected to?​

Answers

Answer:

Download a wifi password saver on playstore or appstore

Explanation:

Answer:

Ask the person who set up the wifi router.

Look behind the wifi box and there should be a small sticker that says the password.

Call the wifi provider and say you forgot your wifi password

Reset your password using your account.

Administrator access initiative brings together people from industry, disability organizations, government, and research labs from around the world to develop guidelines and resources to help make the Web accessible to people with disabilities including auditory, cognitive, neurological, physical, speech, and visual disabilities.
a) true
b) false

Answers

Answer:

False.

Explanation:

Web Accessibility Initiative (WAI) brings together people from industry, disability organizations, government, and research labs from around the world to develop guidelines and resources to help make the Web accessible to people with disabilities including auditory, cognitive, neurological, physical, speech, and visual disabilities.

It is one of the features of the World Wide Web Consortium (W3C) develiped in 1997 and is aimed at developing standards and support materials to assist in understanding and implementing accessibility for users with disabilities.

Using a material on the internet for your assignment without acknowledging the source is known as A. Plagiarism B. Piracy C. Ethical D. Copyright

Answers

Answer:

A. Plagiarism

Explanation:

Plagiarism is simply the act of representing an author's thoughts , ideas , expression , writings as one's own.

Explain motherboard in detail

Answers

Answer:

A motherboard is the main printed circuit board in general-purpose computers and other expandable systems. It holds and allows communication between many of the crucial electronic components of a system, such as the central processing unit and memory, and provides connectors for other peripherals. Unlike a backplane, a motherboard usually contains significant sub-systems, such as the central processor, the chipset's input/output and memory controllers, interface connectors, and other components integrated for general use. It also makes arithmetical operations

Explanation:

Have a nice day ;]

Answer:

motherboard is the main printed circuit board (PCB) in a computer. The motherboard is a computer’s central communications backbone connectivity point, through which all components and external peripherals connect. The large PCB of a motherboard may include 6-14 layers of fiberglass, copper connecting traces and copper planes for power and signal isolation.

The motherboard contains the connectors for attaching additional boards, such as the CPU, BIOS, memory, mass storage interfaces, serial and parallel ports, expansion slots and all the controllers that are required to control standard peripheral devices such as the display screen, keyboard, and hard drive.

Chapter 21 discusses four aspects of the speaking situation you should take into account when planning the graphics you'll use in an oral presentation including the length of the presentation, the size and layout of the room, and the available equipment. What is the last aspect?

Answers

Answer:

The answer is "audience aptitude and experience "

Explanation:

The presentation is the ability to provide a variety of audiences with successful and stimulating interactions. The main objective of an oral presentation is to talk formally to a live audience about a particular subject. You have to write an oral speech that engages the audience and fulfills your goals.

In this type of presentation, the Listener-centric concept is effective as the productivity of a speaker is enhanced by creating and presenting the speech throughout the proper manner.

If you have a 3D printer please show me a vid of you making something because I'm interested in getting one. Ty! Also can someone show me how to put more points in a question that I ask on Brainly?

Answers

Explanation:

Too add more points on your brainly question(phone), type your question

Then, see on your top left, you can see the points. It will show 10,which means you have to lose 10 points which is the minimum points for one question. If you are generous to give more points, click on it the you can scroll till the maximum point which is 100..but each points you give will divide 2.

For example, you just loose 10 points for your question but I only got 5 points

Hope you understand this

I'm not sure with laptop

HAVE A GOOD DAY!

A company has a network printer that is utilzed by several departments. Although the printer shows online and other departments can access the printer, the accounting group is unable to print to this network printer. Which of the following would the technician use to resolve the problem?
a. The printer needs a maintenance kit repalced.
b. The TCP/IP print spooler service need to be restarted.
c. The security settings for the print spooler need to be modified to include the department.
d. Replace the network cable on the printer

Answers

Answer: c. The security settings for the print spooler need to be modified to include the department.

Explanation:

The print spooler makes Windows computer enable to interact with the printer, and to commands the printer for print jobs .

If all the other departments can access the printer,  but not the accounting group, then the technician should check the security settings for the print spooler and modify it accordingly to include the accounting group  .

Hence, the correct answer is c. The security settings for the print spooler need to be modified to include the department.

Gregor installed a third stick of known-good RAM into his Core i7 system, bringing the total amount of RAM up to 3 GB. Within a few days, though, he started having random lockups and reboots, especially when doing memory intensive tasks such as gaming. What is most likely the problem

Answers

Answer:

The speed or quality was different.

Explanation:

The new ram that he installed most likely had a different rate, or was a different quality than the old ram.

Which of the following statements are true? Select one or more: a. A socket is a kind of opening. b. A socket represents one endpoint of a network connection. c. A program uses a socket to communicate with another program over the network. d. Data written by a program to the socket at one end of the connection is transmitted to the socket on the other end of the connection, where it can be read by the program at that end.

Answers

Answer:

a. A socket is a kind of opening.

b. A socket represents one endpoint of a network connection.

c. A program uses a socket to communicate with another program over the network.

d. Data written by a program to the socket at one end of the connection is transmitted to the socket on the other end of the connection, where it can be read by the program at that end.

Explanation:

A socket is an endpoint in the network node of a computer network that serves the role of sending and receiving data written by a program across the network. The application programming interface specifies the attributes of a socket, through the socket descriptor. The socket address serves the purpose of making the socket identifiable by other hosts.

The socket address consists of the transport protocol, IP address, and port number. Just like a port serves as the endpoint in hardware, so does the socket also function as an endpoint in a network connection.

Asia pacific and Japanese sales team from cloud kicks have requested separate report folders for each region.The VP of sales needs one place to find the reports and still wants to retain visibility of the reports in each folder. What should a consultant recommended to meet this requirement.

Answers

Answer:

B) Create all new regional folders and move the reports to the respective region folder with viewer access.

Explanation:

Below are the options

A) Create grouped folders, keeping the top region folder sharing settings and limiting the sharing settings for the grouped folders for each region.

B) Create all new regional folders and move the reports to the respective region folder with viewer access.

C) Create all new regional folders and move the reports to the respective region folder with subscribe access.

D) Create subfolders, keeping the top region folder sharing settings and limiting the sharing settings for the subfolders for each region

In order to required reports at one place and also wants to retain the visibility for each folder the consultant should suggest that all new regional folders should be created and afterwards it would be moved to their relevant region folders by involving the viewer access feature so that the VP should access it anytime

Hence, the correct option is B.

Based on the information given, the correct option will be B. Create all new regional folders and move the reports to the respective region folder with viewer access.

From the information given, it was stated that the VP of sales needs one place to find the reports and still wants to retain visibility of the reports in each folder.

Therefore, it's important to create all new regional folders and move the reports to the respective region folder with viewer access.

Learn more about folders on:

https://brainly.com/question/20262915

To see the non-printing characters in Writer press ________ + ________keys, together.

Answers

Answer:

Ctrl + *

Explanation:

Non-printing characters are the characters that are not displayed at the time of printing of an document or a spreadsheet. This is used for designing a content

The few are examples like non-breaking space, the pilcrow etc

The shortcut to show or hide the non-printing characters is Ctrl + * i.e Contorl + Star

So press these two keys we can see the non-printing characters

Answer:

Ctrl+F10, is the keys to see the non printing characters in Open Office Writer

Explanation:

You are a technician working for a large company and you notice a user has left a Post-it note attached to her monitor of a new password that she was just given. What should the technician do

Answers

Explanation:

When you notice that  a user has left a Post-it note attached to her monitor of a new password that she was just given, you should immediately inform this to your senior authority. As this is potent sign of virus or malware threat to the system.

Eliza needs to share contact information with another user, but she wants to include only certain information in the

contact. What is the easiest way for her to achieve this?


A. Use the Edit Business Card dialog box to control the information included.

B. Export only select fields from the contact.

C. Save the contact as a VCF file.

D. Share your contacts foler with other user.

Answers

Answer:

A. Use the Edit Business Card dialog box to control the information included.

Explanation:

b was incorrect but A is correct on edge 2020 I did the unit test review

Using the Edit Business Card dialog box to control the information included is the easiest way for her to achieve this. Thus option A is correct.

What is information?

Knowledge acquired by study, discussion, research, or education is referred to as information. Data is, in essence, the outcome of the data analysis and interpretation process. Info is the interpretation of those elements of knowledge, whereas data is the particular measurements, figures, or diagrams.

She can do this most easily while using the Edit Business Card Combobox to modify the material included. When you get a new email, a meeting submission, or a task plea, a notification called a pc alert flashes up on your computer. Desktop Alerts are on by default.

Depending on the product on the content you get in your Outlook, a Desktop Alert may or may not display certain information. Therefore, option A is the correct option.

Learn more about information, Here:

https://brainly.com/question/13629038

#SPJ5

You work in the Accounting department and have been using a network drive to post Excel workbook files to your file server as you complete them. When you attempt to save a workbook file to the drive, you see the error message: "You do not have access to the folder 'J:\'. See your administrator for access to this folder." What should you do first

Answers

Answer:

The answer is: Saving the workbook to another available drive or a flash drive to protect data, then contact with the system administrator to get access to the J folder.

Explanation:

CO! Oher...9
pressure
14.
large
The barometric height in a town is 65cmHg. Given that the standard atmospheric pressure
is 76cmHg and density of mercury is 13600kg/m", determine the altitude of the town. (Density of
(3mks)
air is 1.25kg/mº).​

Answers

Answer:

Altitude of the town(h1) = 1,196.8 m

Explanation:

Given:

Height of barometer(h) = 65 cm Hg = 0.65

Standard atmospheric pressure  = 76 cm Hg = 0.76

Density of mercury(Pm) = 13,600 kg/m³

Density of  air (Pa) = 1.25 kg/m³

Find:

Altitude of the town(h1)

Computation:

Pressure due column = Δp mercury column

(Pa)(h1) = (Pm)(h)

(1.25)(h1) = (13,600)(0.76-0.65)

(1.25)(h1) = 1,496

Altitude of the town(h1) = 1,196.8 m

Case-Based Critical Thinking
Ryan is creating a website for an automobile company. He wants to include media files on the web page and make the page appealing to the viewers. 43. Ryan wants a particular embedded media clip to automatically restart when it has finished playing. Which of the following HTML audio and video element attributes must Ryan include in his code to accomplish this?
a. ​src.
b. ​loop.
c. ​controls.
s. ​preload.

Answers

Answer:

B. Loop

Explanation:

The use of loop which is a boolean attribute in HTML is an instruction that specifies a replay of the video once it has ended. It is inputted in this format;

<video controls loop>

<source src="dance.mp4" type=video/mp4">

</video>

To add a video to the HTML web page, the <iframe> element is used. the source would also indicate the video URL. The specification of the dimensions, that is the height and width of the video are also written. The code is now closed with the </iframe> element.

what should i do after learning python? how can I make apps or gaming apps? IF YOUR ANSWER WILL BE GOOD I WILL MARK AS BRAINLIEST

Answers

Answer:

Here are some of the things that you can do after learning Python:

Learn a Web Development Framework

Learn Machine Learning

Start Teaching Python to Beginners (and earn some bucks)

These are the top three ways to proceed

Explanation:

Learn a web development framework

A user calls the helpdesk and states that they are receiving an IP conflict error on their computer. The user is on a company network that uses DHCP. The technician verifies the PC is using DHCP to obtain TCP/IP settings. Which of the following commands should the helpdesk technician use to resolve this issue? (Select two.)
A. IPCONFIG /REGISTERDNS
B. IPCONFIG /FLUSHDNS
C. IPCONFIG /RELEASE
D. IPCONFIG /RENEW
E. IPCONFIG /ALL

Answers

Answer:

a

Explanation:

none

A user's computer will not boot. A technician notices four indicator lights on the backside of the
computer. Two of the lights are green, and two are amber. Which of the following documentation
should the technician read to determine what the lights are indicating?
A. Network diagram
B. Computer manual
C. Asset management
D. Wiring scheme

Answers

Answer:

B.

Explanation:

Computer manual is the user guide that comes along with the computer set to inform the users about the functions, ways to assemble the parts, and so on.

The user manual consists of guide for the users specially for electronic products such as computers, refrigerators; softwares, and so on. These manuals are written by technical writers, programmers, etc.

In the given scenario the technician needs to refer to computer manual to know the meaning of the lights on the backside of the computer.

So, the correct answer is option B.

The preferred means of creating multithreaded Java applications is by implementing the ________ interface. An object of a class that implements this interface represents a task to perform.

Answers

Answer:

Runnable.

Explanation:

Java is an all round programming language which is typically object-oriented and class-based. It was designed by James Gosling, developed by Sun microsystems and released officially on the 23rd of May, 1995. Java programming language is designed to have only a few implementation dependencies as possible because it was intended to be written once, and run on any platform.

Java makes concurrency to be available to software developers through the application programming interface (API) and the language. Also, it supports multiple threads of execution, by making each thread have its respective program counter and method-call stack, which then allow concurrent executions with other threads.

The preferred means of creating multithreaded Java applications is by implementing the runnable interface. An object of a class that implements this interface represents a task to perform. The code is public void run ().

Write the steps to create labels in OpenOffice writer

Answers

1. Start up Open Office.Org.

2. Click on File >> New >> Labels.

3. In the label dialog box, click on the brand box. This will allow you to choose the type of paper that you use.

4. Select the type of document that you want. The usual standard is Avery, but feel free to explore and discover what you like.

5. Select if you want a single label, a document, and any other options. Some of the things you might want to do are:

- Create a variety of labels for folders or drawers

- Create a sheet of address labels

-  Create decorative labels

6. Click New Document. Here, you see a sheet of blank labels.

7. Create the type of format/placement that you want for your labels. Once you are happy with it, copy it to the rest of the labels.

8. Fill your labels with necessary information.

9. Print them out.

One technique to find the "things" that need to be included in the new system begins by starting with a user and the use cases and then try to identify the necessary informational "things." This technique is called the _______.​ a. ​ check list technique b. ​ domain analysis technique c. ​ noun technique d. ​ brainstorming technique

Answers

Answer:

Coding is a skill where you take instructions (the steps in a task) and translate it into a languaage.

Explanation:

Coding is a skill where you take instructions (the steps in a task) and translate it into a language the computer understands since computers do not communicate like humans. They communicate in a language called BINARY and

Paavo was reviewing a request by an executive for a new subnotebook computer. The executive said that he wanted USB OTG support and asked Paavo’s opinion regarding its security. What would Paavo tell him about USB OTG security

Answers

Answer:

Connecting a mobile device as a peripheral to an infected computer could allow malware to be sent to that device.

Explanation:

Since in the question it is mentioned that Paavo reviewed a request by an executive for subnotebook computer i.e new. but he needs to USB OTG support so it is a  USB i.e on the go that links the devices from one device to another

Therefore by links the mobile device to the computer i.e infected that allows malware we called virus so that we are able to send it to that device. By this,  he wants to tell about the USB OTG security

Other Questions
Consider the reaction below.NH4 + H20 - NH3 + H30"Which is an acid-conjugate base pair?O NHA and NH3O NH4" and H30*O H20 and NH3O H20 and H20" Which statement about tensile stress is true? A. Forces that act perpendicular to the surface and pull an object apart exert a tensile stress on the object. B. Forces that act perpendicular to the surface and squeeze an object exert a tensile stress on the object. C. Forces that act parallel to the surface exert a tensile stress on the object. D. Forces that decrease the length of the material exert a tensile stress on the object. (02.05 HC)A scientist observed a certain type of a particular bacteria growing in a substance that had a 1,000 times higher amount of the antibiotic that targets this bacteria. Using completesentences, justify the observation based on your knowledge of natural selection Which of the following themes would likely have been the focus of the Beatliterature produced in the late 1950s?A. The benefits of capitalism over other economic philosophiesB. The necessity of strong religious belief in a turbulent societyC. The power of communication technology to bring people togetherD. The struggle for individual identity in a mass consumerist society Vhat organization was the biggest opponent to enlightened ideas?PhilosophesPeasantryChurchWritersPLEASe HELP ASAP Please answer this fast now The Atlantic Company sells a product for $150 per unit. The variable cost is $60 per unit, and fixed costs are $270,000. What is the break-even point in sales units?_____________________________________ What is the break-even points in sales units if the company desires a target profit of $36,000? i. For any uniform probability distribution, the mean and standard deviation can be computed by knowing the maximum and minimum values of the random variable. a) trueb) falseii. In a uniform probability distribution, P(x) is constant between the distribution's minimum and maximum values.a) trueb) false iii. The uniform probability distribution's shape is a rectanglea) trueb) false Tony borrrows $20 000. He aggrees to repay this loan with 15 equal annual payments with the first payment to commence at the end of 5 years. The annual effective rate of interest on the loan is 4%. calculate the amount of annual payments If f(x) is the total cost, in dollars, of x candles, which of the following statements best describes the meaning of f(2)=6 What is the fusion between livestock and agriculture called? Which of the following equations have exactly one solution? Choose all answers that apply: (Choice A) -6x-6=-6x-103 (Choice B) -103x-6=-6x-103 (Choice C) -6x-6=103x-103 (Choice D) 103x-6=103x-103 I'll put the brainliest, if its the right ans. Make a decision about the given claim. Use only the rare event rule, and make subjective estimates to determine whether events are likely. For example, if the claim is that a coin favors heads and sample results consist of 11 heads in 20 flips, conclude that there is not sufficient evidence to support the claim that the coin favors heads (because it is easy to get 11 heads in 20 flips by chance with a fair coin).Claim: The mean pulse rate (in beats per minute) of students in a large math class is greater than 71. A simple random sample of the students has a mean pulse rate of 71.7. Choose the correct answer below. A. The sample is unusual if the claim is true. The sample is unusual if the claim is false. Therefore, there is not sufficient evidence to support the claim.B. The sample is unusual if the claim is true. The sample is unusual if the claim is false. Therefore, there is sufficient evidence to support the claim.C. The sample is not unusual if the claim is true. The sample is not unusual if the claim is false. Therefore, there is sufficient evidence to support the claim.D. The sample is not unusual if the claim is true. The sample is not unusual if the claim is false. Therefore, there is not sufficient evidence to support the claim. b. (state a differences between blood and inter cellular fluid what is the difference between a reason and a claim Tree diagram:Emily has a box with 4 different colored tiles: one red, one green, one blue and one yellow. If he draws one of the pieces without looking, what is the probability of drawing the green before the red? these cones are similar. find the volume of the smaller cone. round to the nearest tenth. How to do this? what is the answer?? O Brasil, mesmo possuindo diversos atrativos naturais e culturais, ainda atrai menos turistas anualmente do que as naes europeias. Dados do IBGE apontam que, em 2010, o Brasil atraiu pouco mais de 5 milhes de turistas, valor baixo quando comparado aos dados dos pases da Europa Ocidental. O que esses pases europeus possuem como diferenciais, alm da diversidade cultural e paisagstica, para atrair tantos turistas? Early settlers in the town of Dry Gulch drilled wells to pump as much water as they wanted from the single aquifer beneath the town. (An aquifer is an underground body of water.) As more people settled in Dry Gulch, the aquifer level fell and new wells had to be drilled deeper at higher cost. The residents of Dry Gulch will overuse water relative to the social optimum because:___________. a. each resident will fail to adequately consider the external cost of his or her own water use b. water is a scarce resource c. each resident will fail to adequately consider the external benefit of his or her own water use d. the marginal cost of water is increasing