Discuss the advantages and disadvantages of using digital publishing over traditional forms of offset publishing.​

Answers

Answer 1

Answer:

advantages are that people don't appreciate us more on digital networks.

Explanation:

for example if we use digital networks for studying msn aged people love studying them with books or megazines in their hands.


Related Questions

how can u spot fake news through camerawork, audio, and lighting? pls answer asap

Answers

Answer:

Fake news usually would involve heavy editing of the audio and visuals so that what people can see or hear will fit the lies being sold.

Explanation:

With respect to Videos, fake news would usually have very subtle and intelligent cuts and joints such that when pieced together, a speech for instance would contain only the words which fit the fake news. Also. the context would usually be omitted and you'd seldom find a whole unedited video supporting fake news.

With regards to the audio, authentic sources, in most cases, usually, start a recorded audio with their signature jingle. Fake news won't.

Pictures that have been doctored to suit fake news are usually characterized by their low quality, grainy and blurry feel.

It is important to point out, however, that with advances in technology, fake news' are begining to lose most of the qualities listed above.

Cheers

Which function will display 6 as the output in the following formula?
C1*(C2+B1)
where C1 is 6, C2 is 2, and B1 is 4
_________

Answers

Answer:

36

Explanation:

hi add creeper_king101 i need views on snap

Answer: i just did the pretest and the answer was 36 no cap

Explanation:


Answer the following questions:

Question 4
............ in the data link layer separates a message from one source to a destination, or from other messages to other destinations, by adding a sender address and a destination address.

Group of answer choices
Transforming
Framing
Separating
Messaging


Question 5
Functions of data link control includes
Group of answer choices
framing
flow and error control
addressing
All of above


Question 6
In which of the following modes of the CLI could you configure the duplex setting for interface Fast Ethernet 0/5?
Group of answer choices
User mode
Enable mode
Global configuration mode
VLAN mode
Interface configuration mode


Question 7
It is how the receiver detects the start and end of a frame.
Group of answer choices
Error control
Flow control
Framing
None of the above


Question 8
Which of the following describes a way to disable IEEE standard autonegotiation on a 0/00 port on a Cisco switch?
Group of answer choices
Configure the negotiate disable interface subcommand
Configure the no negotiate interface subcommand
Configure the speed 00 interface subcommand
Configure the duplex half interface subcommand
Configure the duplex full interface subcommand
Configure the speed 00 and duplex full interface subcommands


Question 9
______ substitutes eight consecutive zeros with 000VB0VB.
Group of answer choices
B4B8
HDB3
B8ZS
none of the above


Question 0
In _________ transmission, we send bits one after another without start or stop bits or gaps. It is the responsibility of the receiver to group the bits.
Group of answer choices
synchronous
asynchronous
isochronous
none of the above


Question
In _______ transmission, bits are transmitted over a single wire, one at a time.
Group of answer choices
asynchronous serial
synchronous serial
parallel
(a) and (b)


Question 2
Digital data refers to information that is
Group of answer choices
Continuous
Discrete
Bits
Bytes


Question 3
Two common scrambling techniques are ________.
Group of answer choices
NRZ and RZ
AMI and NRZ
B8ZS and HDB3
Manchester and differential Manchester


Question 4
________ is the process of converting digital data to a digital signal.
Group of answer choices
Block coding
Line coding
Scrambling
None of the above


Question 5
A switch receives a frame with a destination MAC address that is currently not in the MAC table. What action does the switch perform?
Group of answer choices
It drops the frame. .
It floods the frame out of all active ports, except the origination port.
It sends out an ARP request looking for the MAC address.
It returns the frame to the sender


Question 6
The _______ layer changes bits into electromagnetic signals.
Group of answer choices
Physical
Data link
Transport
None of the above


Question 7
Serial transmission occurs in
Group of answer choices
way
2 ways
3 ways
4 ways


Question 8
What type of switch memory is used to store the configuration used by the switch when it is up and working?
Group of answer choices
RAM
ROM
Flash
NVRAM


Question 9
In what modes can you type the command show mac address-table and expect to get a response with MAC table entries? (Select Two)
Group of answer choices
User mode
Enable mode
Global configuration mode
Interface configuration mode


Question 20
Which of the following are true when comparing TCP/IP to the OSI Reference Model? (Select Two)
Group of answer choices
The TCP/IP model has seven layers while the OSI model has only four layers.
The TCP/IP model has four or five layers while the OSI model has seven layers.
The TCP/IP Application layer maps to the Application, Session, and Presentation layers of the OSI Reference Model.
he TCP/IP Application layer is virtually identical to the OSI Application layer.



Answers

Answer:

nasaan po yung tanongkkkkk

Write a program that prompts the user to enter two points (x1, y1) and (x2, y2) and displays their distance between them. The formula for computing the distance is: Square root of ((x2 - x1) squared + (y2 - y1) squared) Note that you can use pow(a, 0.5) to compute square root of a.

Answers

Answer:

x1 = input("enter x value of first number: ")

y1 = input("enter y value of first number: ")

x2 = input("enter x value of second number: ")

y2 = input("enter y value of second number: ")

ans = (float(x2)-float(x1))**2 + (float(y2)-float(y1))**2

ans = pow(ans, 0.5)

print(ans)

Can someone help me please

Answers

Answer:

She made a profit of 450$

Explanation:

4.16 LAB: Count characters Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in the string. The output should include the input character and use the plural form, n's, if the number of times the characters appears is not exactly 1. Ex: If the input is: n Monday the output is: 1 n Ex: If the input is: z Today is Monday the output is: 0 z's Ex: If the input is: n It's a sunny day the output is: 2 n's Case matters. Ex: If the input is: n Nobody the output is: 0 n's

Answers

Answer:

In Python:

sttr = input("String: ")

ch = input("Character: ")

count = sttr.count(ch)

print(str(count)+" "+ch, end = '')

if count>1 or count==0:

   print("'s")

Explanation:

This prompts the user for string

sttr = input("String: ")

This prompts the user for character

ch = input("Character: ")

This counts the number of occurrence

count = sttr.count(ch)

This prints the number of occurrence of the character

print(str(count)+" "+ch, end = '')

This checks if the number of occurrence is 0 or greater than 1.

if count>1 or count==0:

If yes, it prints 's

   print("'s")

why use a chart legend?

Answers

Answer:

A legend or key helps the user build the necessary associations to make sense of the chart.

Explanation:

Legends summarize the distinguishing visual properties such as colors or texture used in the visualization.

4.5 code practice computer science

Answers

Answer:

uhhhhh whats the question?

Explanation:

In this section of your final project, you will write a basic script to create and back up files. You will create this script with the vi editor. The script will combine multiple commands and simplify a repeatable task. Your script should be named Firstname Lastname.BASH. Your script and your Linux directory structure should demonstrate that you have correctly written the script to do the following: Create files: In this section, you will demonstrate your ability to utilize various Linux commands to create text files. Create these files in the NEW directory. Ensure that the commands in your log file show that the following three text files were created using three different methods. Create the following files
XI A. A text file listing the quantity of operating system free space, titledFree_Space Content.txt B. A text file listing the directory contents of the OLD folder, titled OLD_Content.txt C. A text file showing the current month, day, and time (Title this fileTime File.tx.)
XI Modify and Move files: Utilize Linux commands to copy files to a different directory and renamethem A. Copy the following selected files from the OLD directory to the BACKUP directory. Ensure that you change the filename suffix fro XXX OLD to XXX BACKUP i. Free_Space_Content OLD.txt ii Directory Content OLD.txt i Time File OLD.txt Move all files from the NEW directory to the BACKUP directory (no renaming necessary). Clean up the Linux directory structure by deleting the items in the NEW directory B.

Answers

Answer:

bjdjdindbdubduf kndjnxjxjfujdjbdjbd bzjbd djbdibdu jdjdidnidndi xubdubdufjksk. xud ufbsjjdi djneibdudbdujfjfbjbdj fu. fjfjjdubdjjdbjd jdbdinkdkdnd. djjdibnfjdkndindundi jdudjbdubd djbdu bdudjdjjd djidndud dudbid anís us dj

Answer:

####Bash Script Start###################################

#######Please check the permissions on the folders inorder to make sure the script works

#!/bin/bash

if [ ! -d NEW ]; then

mkdir -p NEW;

fi

df > "NEW/Free_Space_Content.txt"

touch "NEW/OLD_Content.txt" | ls -l OLD > "NEW/OLD_Content.txt"

> "NEW/Time_File.txt" | date +"%B %c" > "NEW/Time_File.txt"

cp "OLD"/*.txt "BACKUP"

rename OLD BACKUP "BACKUP"/*.txt

mv "NEW"/*.txt "BACKUP"

#############Bash Script End##################################

########Script_Assessment.txt#####################

Commands which were used to create files:

touch filename

command > filename

> filename

Directory and its contents:

NEW: Contained the newly created file

OLD: Contained sample files with OLD suffix

BACKUP: Contains all the files moved from NEW and OLD directories

Free_Space_Content.txt contains the disk info such as used and free space

OLD_Content.txt contains the directory contents info of OLD directory

Time_File.txt : Contais the current month, day and time info

Explanation:

Directions Interview your parent or any member of your family. Identity
v. Performance Tasks
sources of your family income. Classify the types of your family
income if it is Money Income, Real Oncome or Psychic income​

Answers

Answer:

Total family income is first classified by it's four major source, earings of a male head , earings of a wife or female head , earings of a family members , and property or transfer income.


Answer the following questions:

Question 4
............ in the data link layer separates a message from one source to a destination, or from other messages to other destinations, by adding a sender address and a destination address.

Group of answer choices
Transforming
Framing
Separating
Messaging


Question 5
Functions of data link control includes
Group of answer choices
framing
flow and error control
addressing
All of above


Question 6
In which of the following modes of the CLI could you configure the duplex setting for interface Fast Ethernet 0/5?
Group of answer choices
User mode
Enable mode
Global configuration mode
VLAN mode
Interface configuration mode


Question 7
It is how the receiver detects the start and end of a frame.
Group of answer choices
Error control
Flow control
Framing
None of the above


Question 8
Which of the following describes a way to disable IEEE standard autonegotiation on a 0/00 port on a Cisco switch?
Group of answer choices
Configure the negotiate disable interface subcommand
Configure the no negotiate interface subcommand
Configure the speed 00 interface subcommand
Configure the duplex half interface subcommand
Configure the duplex full interface subcommand
Configure the speed 00 and duplex full interface subcommands


Question 9
______ substitutes eight consecutive zeros with 000VB0VB.
Group of answer choices
B4B8
HDB3
B8ZS
none of the above


Question 0
In _________ transmission, we send bits one after another without start or stop bits or gaps. It is the responsibility of the receiver to group the bits.
Group of answer choices
synchronous
asynchronous
isochronous
none of the above


Question
In _______ transmission, bits are transmitted over a single wire, one at a time.
Group of answer choices
asynchronous serial
synchronous serial
parallel
(a) and (b)


Question 2
Digital data refers to information that is
Group of answer choices
Continuous
Discrete
Bits
Bytes


Question 3
Two common scrambling techniques are ________.
Group of answer choices
NRZ and RZ
AMI and NRZ
B8ZS and HDB3
Manchester and differential Manchester


Question 4
________ is the process of converting digital data to a digital signal.
Group of answer choices
Block coding
Line coding
Scrambling
None of the above


Question 5
A switch receives a frame with a destination MAC address that is currently not in the MAC table. What action does the switch perform?
Group of answer choices
It drops the frame. .
It floods the frame out of all active ports, except the origination port.
It sends out an ARP request looking for the MAC address.
It returns the frame to the sender


Question 6
The _______ layer changes bits into electromagnetic signals.
Group of answer choices
Physical
Data link
Transport
None of the above


Question 7
Serial transmission occurs in
Group of answer choices
way
2 ways
3 ways
4 ways


Question 8
What type of switch memory is used to store the configuration used by the switch when it is up and working?
Group of answer choices
RAM
ROM
Flash
NVRAM


Question 9
In what modes can you type the command show mac address-table and expect to get a response with MAC table entries? (Select Two)
Group of answer choices
User mode
Enable mode
Global configuration mode
Interface configuration mode


Question 20
Which of the following are true when comparing TCP/IP to the OSI Reference Model? (Select Two)
Group of answer choices
The TCP/IP model has seven layers while the OSI model has only four layers.
The TCP/IP model has four or five layers while the OSI model has seven layers.
The TCP/IP Application layer maps to the Application, Session, and Presentation layers of the OSI Reference Model.
he TCP/IP Application layer is virtually identical to the OSI Application layer.



Answers

Explanation:

4) Seperating

5) All the above

6) Interface configuration mode

7) None of the above

8)Configure the negotiate disable interface subcommand

9) B8ZS

10) Synchronous

11) a and b

2) Discrete

3) B8ZS and HDB3

4) Line coding

5) It drops the frame

6) Data link

7) 2 ways

8) NVRAM

9) User mode-Enable mode

20) The TCP/IP Application layer maps to the Application, Session, and Presentation layers of the OSI Reference Model-

The TCP/IP model has four layers , while the OSI model has seven layers.

What Is an Antivirus?

Answers

Antivirus software, or anti-virus software, also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the name.

Answer:

Antivirus software is a type of program designed and developed to protect computers from malware like viruses, computer worms, spyware, botnets, rootkits, keyloggers and such. Antivirus programs function to scan, detect and remove viruses from your computer.

Explanation:

what is invention and inovation do more responsible think for making computer a succsessful product?explain​

Answers

Answer:

I can't explain but I think it is the GUI


is an electronics standard that allows different kinds of electronic instruments to
communicate with each other and with computers.

Answers

Explanation:

MIDI is an acronym that stands for Musical Instrument Digital Interface. It is a standard protocol that helps to connects musical instruments with computers and several hardware devices to communicate. It was invented in the 80's as a way to standardize digital music hardwares.

IF IT HELPED U MARK ME AS A BRAIN LIST

An if statement must always begin with the word “if.” True False python

Answers

Answer:

true

Explanation:

The given statement is true, that an if statement must always begin with the word “if.” in python.

What is the python?

A high-level, all-purpose programming language is Python. Code readability is prioritized in its design philosophy, which makes heavy use of indentation. Python uses garbage collection and has dynamic typing.

It supports a variety of paradigms for programming, including functional, object-oriented, and structured programming. An “if” statement must always be the first word in a sentence.

One of the most often used conditional statements in computer languages is the if statement in Python. It determines whether or not particular statements must be performed. It verifies a specified condition; if it is true, the set of code included within the “if” block will be run; if not, it will not.

Therefore, it is true.

Learn more about the python, refer to:

https://brainly.com/question/18502436

#SPJ2

Complete the statement using the correct term.
People employed in digital media sales may have an educational background in IT or in
.

Answers

Answer:

Your answer would be down bellow :D

Explanation:

People employed in digital media sales may have an educational background in IT

So your answer is it.

Answer:

Hiya Tank hows it been

Explanation:

From Sean, pizza,P, pizzaboy, and your friend

3.5 code practice question 1

Answers

Answer:

what is this a question or just saying something?

Explanation:

Answer:

uh what?

Explanation:

write a paragraph in python to print 5 using a for loop

Answers

Answer:

For f in range(10):

if f == 5 :

print(f)

Explanation:

The for loop initiates a range of value and f is used to evaluate each value in the range.

The if statement block checks and detect if the number in the range, f is 5 ; once it detect that f equals to 5, it prints the digit 5 using the print statement.

Write a program which asks the user for their name and age. The program should then print a sentence.

What is your name?
Cory
What is your age?
48
Cory is 48 years old.

Answers

Answer:

name = input("What is your name? ")

age = int(input("What is your age? "))

print("%s is %d years old."% (name, age))

Explanation:

This is a solution in python.

Give a regular expression for binary numbers. They can be integers or binary fractions. A leading - sign is always allowed. Leading 0's are not allowed except when the integer part is 0. When the binary points is present, then neither the integer part nor the fractional part are allowed to be empty. If the integer part has more than 3 bits, then grouping with commas is required. Examples: Allowed: -0 1,111,010 -1,111.00 Not allowed: .11 1000 The 4-letter alphabet consists of 0, 1, dot, and comma.

Answers

Solution :

We have to provide an expression for the binary numbers. There can be binary fractions or integers. Whenever there is leading 0, it is not allowed unless the integer part is a 0.

Thus the expression is :

[tex]$(-+ \in )$[/tex] [tex]$[(1+10+11+100+101+110+111)(,000+,001+,010+,011+,111+,100+,101+,110)^*$[/tex] [tex]$(\in +.(0+1)^*(0+1))+(0.(0+1)^*(0+1))]$[/tex]

In this exercise we have to have knowledge about binary code to calculate with these numbers, so we have:

[tex](E+(0+1)*(0+1))[/tex]

What is a binary code?

A binary code represents text, computer processor instructions, or any other data using a two-symbol system. The two-symbol system used is often "0" and "1" from the binary number system.

Knowing this now we can perform the calculations like:

[tex](1+10+11+100+101+110+111)(000+001+010+011+111+100+101+110)\\(E+(0+1)*(0+1))[/tex]

See more about binary code at brainly.com/question/7960132

What sequence is used to create a brochure document from a template?
New, File, Brochures
File, New, Brochures
O Brochures, File, New
O Brochures, New, File

Answers

Answer:

I think its a or b

Explanation:

Sorry if I'm wrong

Answer:

The answer is B. File, New, Brochures

Explanation:

PLZ PLZ PLZ GIVE ME BRAINLIEST!!!!

it is important organic mineral that is found in the soil as ash​

Answers

Answer:

Calcium is the most abundant element in wood ash and gives ash properties similar to agricultural lime. Ash is also a good source of potassium, phosphorus, and magnesium.

Huh this is very confusing

3. Create tables CheckingAccount(CheckingAccountNumber, CustomerName, Balance, CustomerID), SavingsAccount(SavingsAccountNumber, CustomerName, Balance, InterestRate, CustomerID), Transactions(TransactionNumber, TransactionAmount, TransactionType, TransactionTime, TransactionDate, FromAccount, ToAccount, CustomerID). Use varchar(50) for any non-numerical value including AccountNumber and TransactionNumber, and float for any numerical value. CustomerID here means Username.

Answers

Answer:

Your answer is B

She forgot to record a transaction.

Explanation:

Edge 20 it’s right

What are the disadvantages of using folders ​

Answers

Answer:

√ folders can cause some inconvenience situation...

√ The decompress / compress action takes time.

√ When you double-click on a file inside a “folder”, what really happens is the file gets extracted to a temporary folder.

heres one:

when you delete a folder, he stuff inside gets deleted, and there isnt a way to get it back.

A restaurant buys a pizza oven that is 4.5 feet long, 5 feet wide and 6 feet tall. What is the volume of the pizza oven?

Answers

Answer:

135 as 4.5 times 5 times 6 gives you the volume and it =135

Your goals as the IT architect and IT security specialist are to:  Develop solutions to the issues that the specified location of IDI is facing.  Develop plans to implement corporate-wide information access methods to ensure confidentiality, integrity, and availability.  Assess risks and vulnerabilities with operating IT facilities in the disparate locations where IDI now functions and develop mitigation plans and implementation methods.  Analyze the strengths and weaknesses in the current systems of IDI.  Address remote user and Web site user’s secure access requirements.  Develop a proposed budget for the project—consider hardware, software, upgrades/replacements, and consulting services.  Prepare detailed network and configuration diagrams outlining the proposed change to be able to present it to the management.  Develop and submit a comprehensive report addressing the learning objectives and your solutions to the issues within the scenario.  Prepare a 10- to 15-slide PowerPoint presentation that addresses important access control, infrastructure, and management aspects from each location.

Answers


Te chequen casa para ver en su mouse hombre de doble

1. Imagine that you sit down to your computer (after finishing all your homework) to play your favorite video game. However, when you try to login you find that you cannot login to the game server. What troubleshooting steps would you follow to solve this problem?​

Answers

Answer:

I would go to my email, (well make sure your account is connected) then check about who changed my password/username and what they changed it to.

write asswmbly prgram and do the following:
You have two numbers, the first one is 32 bits and the second is a 16 bits number. Find the result of division and store it in memory location called RESULT then store the reminder of division in memory location called MOD. (Use MACRO) ​

Answers

Answer:

I did this last year :/ i feel your pain.

Explanation:

Assume that the execution time for a program is directly proportional to instruction access time. The access to an instruction in the cache is 10 times faster than access to an instruction in the main memory. If an instruction is not found in the cache, i.e., cache miss, it is fetched from the main memory to the cache and then fetched from the cache to be executed. Assume that a requested instruction will cause cache miss has a probability of 0.08. Let the speedup factor is defined as the ratio of program execution time without the cache to program execution time with the cache.
a. Calculate the speedup factor to execute such a program.
b. using this assumption, assuming that the cache is 20 times faster than the main memory.

Answers

Answer:

a. 5.81

B. 7.93

Explanation:

A.

X is the time it takes to load instructions from cache

10X = time to execute program

0.08 = probability of cache instructions

1-0.08 = 0.92(92% instructions are going to be loaded from cache).

Tc = time to execute with cache

Tc = 0.92X+0.08x10X

= 0.92X+0.8X

= 1.72X

Speed factor = tm/tc

= 10X/1.72X

= 5.81

B.

If cache is 20 times faster

Tm = 20X

Tc = 0.92X + 0.08 x 20X

= 0.92X + 1.6X

= 2.52X

Speed factor = 20X/2.52X

= 7.93

What is an antivirus?

Answers

An antivirus is a software designed to detect and destroy computer viruses.
Other Questions
Which of the following correctly describes the functions of the rough endoplasmic reticulum (RER) and Golgi apparatus, respectively? Susan's cat weighs 3 pounds. Susan's dog weighs 3 1/4 times as much as her cat. How much does Susan's dog weigh? Find the common difference.-4. - 20. - . -2, - , - ....Plz help me ????????? Vocabulary - Mortgage-related concepts and terminology Are All Mortgage Loans Alike? In short, the answer is no! Mortgage loans vary with the preferences of the individual lender and the borrower In general, mortgage loans can be differentiated according to their terms of payment, their down payment requirements, and whether they are insured or guaranteed. Mortgage loans, or loans that use as collateral, are made by commercial banks, thrift institutions, and mortgage bankers. In addition to these traditional sources, mortgage brokers also solicit borrowers and originate a large volume of these loans. Brokers often place their loans with these traditional mortgage lenders as well as with Which of the following statements accurately describe the similarities and differences between mortgage bankers and mortgage brokers? Check all that apply. Although mortgage brokers often appear to work on behalf of their borrowing customers, they are ultimately paid by the mortgage lender Mortgage brokers lend their own money to borrowers, while mortgage bankers find borrowers for interested lenders as well as lenders for interested borrowers. Mortgage brokers earn their income from the interest on the mortgage loans, whille bankers earn their income in the form of commissions and loan-origination fees. To review the differences in the characteristics of different types of mortgage loans, match the types of mortgages and related programs listed on the left with their descriptions on the right. Read each description carefully and type the letter of the description in the Answer column next to the correct term. These are not necessarily complete definitions, but there is only one possible answer for each term. Description Answer on the loan for a Making Automobile and Housing Decisions These are not necessarily complete definitions, but there is only one possible answer for each term. Term Answer Description Fixed-rate mortgage A. This mortgage allows the borrower to pay only the accrued interest on the loan for a specified period of time; after this date, all payments require the payment of both interest and principal Interest-only mortgage B This mortgage is characterized by an interest rate and monthly payments that can be adjusted over the life of the loan based on movements in market interest rates. VA loan guarantee C This mortgage is characterized by a constant interest rate and constant monthly payments over the life of the loan. Biweekly mortgage D. This mortgage allows a borrower to convert from an adjustable-rate loan to a fixed-rater loan during a prespecified time period. Two-step ARM E. This mortgage uses 26, rather than 12, payments per year to reduce the total amount of interest paid over the life of the loan and accelerate the repayment of the mortgage loan's principal-compared to an otherwise identical fixed-rate mortgage. This adjustable rate mortgage allows for only one rate change: a lower rate remains F. Adjustable-rate constant for the first five to seven years of the loan's term and then increases to a mortgage higher constant rate that continues throughout the remaining life of the loan. This loan program, offered through a department of the federal government, provides G. Convertible ARM mortgage insurance to lenders offering mortgage loans with loan-to-value ratios greater than 80% . This loan quarantee is offered by a department of the federal government to lenders H. Graduated-payment ARM who make qualified loans to eligible veterans of the U.S. Armed Forces and their surviving spouses. This type of mortgage typically requires a down payment of 20% of the value of the I. FHA mortgage insurance mortgaged property. This mortgage allows borrowers to make smaller-but gradually and constantly J. Conventional mortgage increasing-payments for the first three to five years. At the end of this period, the payments then stabilize at the higher level and are repaid over the remaining life of the loan. related information for 30 employees at Gamma Technologies, Inc. These data include each selected employees gender (0 = male, 1 = female), age, number of years of relevant work experience prior to employment at Gamma, number of years of employment at Gamma, the number of years of post-secondary education, and annual salary. Create a scatter plot to show the relationship between prior experience and annual salary. What does the scatter plot reveal about the relationship? Which element on the periodic table fights dandruff, directs drivers, and makes copies of your homework? Kareem drew a diagram to compare flatworms and segmented worms. Which label belongs in the area marked X?A. Can reproduce sexuallyB. Are always parasitesC. Are all sessileD. Are covered in setae The 3 basic things needs of all living things Which of the following is a physical response to stress hormones?A. Improved digestionB. Decreased visionC. increased heart rateD. Lower blood pressure please help :( what is 612.00.06please help me Please help, marking brainliest for the best answer. Serious answers only please What is the center of the circle for this equation:x + y = 25 what professional advice is peter seeking? Peter wants to buy office space for his new business. However, hes not sure if the current market is suitable for Brian property. Hence he consulted his ______ agent for advice. Select all the correct answers.Which three statements are true as they relate to supply and demand?As supply rises, prices generally decrease.As demand decreases, costs generally increase.OOOOOAs supply decreases, prices increase.The average rate of change describes how much a quantity changes as price increases.As demand rises, the price of the product decreases. Helen rolls a dice and flips a coin.Calculate the probability that she will get a 4 and a tail. describe how the graph of g(x) is related to the graph of f(x) = 1/x. g(x) = -1/x +5 What causes the air above the land to become warmer than the air above the ocean? how did rome begin? 2or 3 sentences a company estimates 0.3% of their products will fail after the original warranty period but within 2 years of the purchase, with a replacement cost of $450. if they offer a 2 year extended warranty for $42, what is the companys expected value of each warranty sold? Choose the student who correctly used substitution to determine if 19 was a solution to the equation. Mara's work Juan's work Acacia's work Hector's work