give 4 example for echinodermis cnidarians poriferas platyhilminthes nematodes and annerids

Answers

Answer 1

Answer:

Among the largest and most important invertebrate phyla are Porifera (sponges), Cnidaria (jellyfish, corals, and sea anemones), Platyhelminthes (flatworms), Nematoda (roundworms), Mollusca (snails, bivalves, squids, and octopuses), Annelida (segmented worms), Arthropoda (horseshoe crabs, spiders, crabs, centipedes, ..


Related Questions

What type of attack involves the attacker sending too much data to a service or application that typically results in the attacker gaining administrative access to the system

Answers

An program that receives excessive amounts of data from a hacker, forcing the data to be stored outside of the buffer area, is subject to a buffer overflow attack.

Which kind of attack includes the attacker adding a client-side script to the website?

Malicious scripts are injected into websites that are normally safe and reputable in Cross-Site Scripting (XSS) attacks. XSS attacks take place when an online application is used by an attacker to deliver malicious code, typically in the form of a browser side script, to a separate end user.

What are the four different attack types?

Cyberattacks can take many different forms, including phishing, SQL injection, malware, and password attacks.

To know more about buffer overflow attack visit :-

https://brainly.com/question/28232298

#SPJ4

Farouk uses his computer to break into Global Financial Center's computer.Farouk is a
A) hacker.
B) phisher.
C) worm.
D) virus.

Answers

Answer:

hacker

Explanation:

WILL GIVE BRAINLIEST!!!

assume numpy array is an integer array and has already been filled with values. fill in the blanks to write a for loop that computes and output the sum of all the elements inside numpy array. when you fill in the blanks, do not put extra empty spaces anywhere is=ndei the code i.e for line x = y+3, dont write as x= y +3

Answers

Answer:

import numpy as np

# import the numpy library

arr = np.array([...])

# create a numpy array with some elements

sum = 0

# initialize a variable to store the sum of elements

for element in arr:

   sum += element

   # iterate over each element in the array and add it to the sum variable

print(sum)

# output the final sum of all elements in the array

What type of processor memory is located on the processor chip (processor die)?
O Level 1 chace (L1 chace)
O Level 2 chace (L2 chace)
O Level 3 chace (L3 chace)
O Level 4 chace (L4 chace)

Answers

Level 1 cache (L1 cache) is the name of the type of processor memory that is present on the processor die (processor die).

Which kind of cache does the CPU die have?

Although L2 cache is substantially bigger than L1, it is also slower. On top-tier CPUs, they range from 4 to 8 MB (512KB per core). The L1 and L2 caches are private to each core, whereas the L3 cache is shared by all the cores on a die.

Which kind of memory does the processor use?

The major internal memory of the central processor unit is random access memory (RAM) (CPU). Your electrical device uses it to store temporary data.

To know more about processor memory visit:-

https://brainly.com/question/29772194

#SPJ4

I need help with creating a code for defining if a number i an Armtrong or not
on code h

Answers

A number is said to be Armstrong if the sum of its digits raised to the power of three equals the number itself. For instance, the number 371 is an Armstrong number as 3**3 + 7**3 + 1**3 = 371

I don't know how to receive my Armstrong number.

Armstrong numbers are numbers that are identical to themselves when the various digits of the number are added together to form a cube. Because 153 = 13+53+33, it is an Armstrong number. Expected Results: The Armstrong number is 153.

The inventor of the Armstrong number?

American electrical engineer and inventor Edwin Howard Armstrong (December 18, 1890 – February 1, 1954) created the superheterodyne receiver system and FM (frequency modulation) radio.

To know more about armtrong number visit:

https://brainly.com/question/29556551

#SPJ4

Can someone explain this question & answer to me?

var list = [11, 35, 6, 0];
var sum = 0;

for (var i = 0; i < list.length; i++) {
sum = sum + list[i];
}
sum = sum/list.length;
console.log(sum);

Answers

The code iterates through the list of numbers and adds them up.
The sum is then divided by the length of the list to get a percentage.
The code will iterate through the list of numbers and add them up.
The sum variable is then divided by the number of items in the list to determine the average value.

A recovery tool that creates restore points, which are snapshots of Windows, its configuration, and all installed programs.

Answers

restore the system A recovery application that takes screenshots of Windows, its setup, and all installed programs to generate restore points

A recovery tool is what?

Software tools for backup and recovery are made to provide storage backup to tape, disk, or optical media as well as data recovery when necessary. Products geared specifically toward helping the recovery process, such as virtual tape libraries, are also included in this area.

What is the mechanism of the recovery tool?

When the master file table reference is deleted, the space on the disk where the data is stored is marked as free and accessible for new data to be overwritten. If no data is erased, data recovery is still a possibility. This is essentially how data recovery software works.

To know more about recovery tool visit:

https://brainly.com/question/29315685

#SPJ4

no actual traffic passes through a passive sensor; it only monitors copies of the traffic. true or false

Answers

No actual traffic passes through a passive sensor; it only monitors copies of the traffic is the true statement.

What is a passive sensor?

Passive sensors are remote sensing devices that gauge naturally occurring energy. Energy can only be detected by passive sensors when the energy is present naturally. This can only happen when the sun is shining on the Earth, and this applies to all reflected energy.

A passive sensor merely "listens" to what is going on. Examples comprise: a sensor that can determine whether a light is shining on it. an infrared sensor that measures an object's temperature.

Thus, it is the true statement.

For more information about passive sensor, click here:

https://brainly.com/question/29738927

#SPJ1

You assign each anchor its own anchor name, using the ____attribute.
a. Name
b. anchor
c. link
d. identify

Answers

Answer: The correct answer is "a. Name". In HTML, you can use the "name" attribute to assign a unique name to an anchor element, which can then be used to create a hyperlink to that specific location on the page.

Explanation: For example:

<a name="top">Top of the Page</a>

This anchor element can then be linked to using the following syntax:

<a href="#top">Go to the top of the page</a>

The "name" attribute is used in combination with the "href" attribute to create a hyperlink. The "href" attribute specifies the target of the link, and the "name" attribute specifies the name of the anchor to which the link should point.

You have configured a cloud-based VDI solution in which client devices run a cloud-based Windows desktop. Which term best describes the connecting user device that may be generally used

Answers

A thin client is an end user device that, although having little processing and storage power, may connect to a powerful remote server via a network to execute operating systems and applications.

What is the name of the firewall service provided by the cloud?

Cloud firewalls are also referred to as FWaaS, or firewall-as-a-service. Similar to other "as-a-service" categories like software-as-a-service (SaaS) or infrastructure-as-a-service, FWaaS functions in the cloud, is accessed over the Internet, and is updated and maintained by a third-party provider (IaaS).

What are the three fundamental types of cloud computing platforms?

The other three main kinds of cloud computing services are platforms-as-a-service (PaaS), infrastructure-as-a-service (IaaS), and software-as-a-service (SaaS). The decision to use a particular cloud type or cloud service is personal.

To know more about VDI visit :-

https://brainly.com/question/13650925

#SPJ4

Which of the following kinds of file utilities shrink the size of a file(s)?
A. conversion. B. file compression. C. matrix. D. unit

Answers

The Correct answer is Option (B), A file compression utility is a utility that shrinks the size of a files.

What is Compression utility?

A software package that compressed and decodes different file types is known as a compression software or compression utility. Tools of compressing and uncompressing files are generally included with operating systems. For instance, the most recent versions of Microsoft Windows come with a tool for producing and extracting compressed files.

What makes a compression tool helpful?

Black and white pictures can be compressed up to 10 times, and color image files can be compressed up to 100 times). They will upload faster as a result, making them considerably simpler to email and transfer.

To know more about Compression utility visit :

https://brainly.com/question/30022738

#SPJ4

1. A Molex connector supplies +3.3V, +5V, and -12V voltages.
Select one:
True
False

Answers

The claim that a Molex connector provides +3.3V, +5V, and -12V voltages is untrue.

What voltage is supplied by a Molex connector?

All of the additional connections, known as Molex connectors, that protrude from the power supply are for drives and deliver +12V (yellow) and +5V (red) power in addition to two ground wires (black). When you want to upgrade your system to a Pentium 4 (P4) system, you use this Motherboard P4 12V 4-Pin to Molex 4-Pin Power Adapter Cable.

The function of a Molex connector

The company that creates computer connections and other related goods goes by the name of Molex. It links your computer power supply to disks and other components inside the computer and is also referred to as a Molex power connection (shown).

To know more about Molex connector visit:-

https://brainly.com/question/20372891

#SPJ4

What are the five elements that are needed to create a connected world or a network?

Answers

Categories, providers, access technologies, protocols, and convergence.

What are the five networking components that make up a connected world?

Hardware, software, wireless or wired transmission media, network topology, & communications protocols are some of the elements of a network architecture.

What makes IPTV unique?

Personalization, minimal bandwidth usage, and device support are all features of IPTV.Users can access an accessible and dependable network infrastructure through LANs, WANs, and MANs.

To know more about networking visit:

https://brainly.com/question/15002514

#SPJ4

Refer to Exhibit: Which access controls list allows only TCP traffic with a destination port range of 22-443, excluding port 80

Answers

Access Control List (ACL) 1 allows only TCP traffic with a destination port range of 22-443, excluding port 80

Which access control list disallows all other communication other than TCP traffic with a destination port range of 80 through 243?The access controls list that allows only TCP traffic with a destination port range of 22-443, excluding port 80, is an access control list (ACL) that uses network layer filtering.This type of ACL is configured to filter traffic based on its source or destination IP address, port numbers, or protocol. In this case, the ACL will be configured to explicitly deny any TCP traffic with a destination port of 80, while allowing only TCP traffic with a destination port range of 22-443.This ACL will be applied to the router or firewall and can be configured using access control entries (ACEs).Each ACE will specify the source and destination IP address, port numbers, and protocol.The ACEs will also specify whether to allow or deny the traffic.This type of ACL will provide a high level of security by limiting the type of traffic that can pass through the network.

To learn more about Access Control List (ACL) 1 refer to:

https://brainly.com/question/29830414

#SPJ4

A user is experiencing issues synchronizing a smartphone. The user is able to connect to individual services, but each requires a different password. Which of the following needs to be configured to allow the user to access web services securely with a unique password?
A. SIM
B. SMB
C. SSL
D. SSO

Answers

SSO must be configured to allow users to securely access web services using a unique password.

What is SSO?SSO is a technology that combines multiple application login screens into a single one. SSO allows a user to access all of their SaaS applications by entering their login credentials (username, password, etc.) once on a single page.Single sign-on is an authentication scheme that allows a user to log in to multiple related but independent software systems using a single ID. True single sign-on enables users to log in once and access services without having to re-enter authentication credentials.Single sign-on (SSO) is becoming an increasingly useful tool for businesses all over the world. It enables all of their employees, partners, and customers to gain access to the applications and services they require using a single set of credentials.

To learn more about SSO refer to :

https://brainly.com/question/13741908

#SPJ4

The Cisco PIX line of products is best described as which of the following? Select one: a. PC with firewall installed b. software firewall c. firewall appliance

Answers

Keeping monitoring of and filtering incoming and outgoing network traffic in line with previously established security standards for an organization is the function of a firewall.

Keeping monitoring of and filtering incoming and outgoing network traffic in line with previously established security standards for an organization is the function of a firewall, a network security technology. A firewall is essentially the wall separating a private internal network from the public Internet at its most fundamental level. Firewalls are tools for network security that prevent unauthorized access to a network. It could be a hardware or software component that filters the incoming and outgoing traffic within a private network in accordance with a set of criteria in order to identify and halt cyber-attacks. Both professional and personal settings use firewalls.

Learn more about Firewall here:

https://brainly.com/question/30006064

#SPJ4

A firewall's job is to maintain monitoring and filtering of incoming and outgoing network traffic in accordance with previously defined security criteria for an organisation.

A firewall is a network security system that maintains monitoring and filtering of incoming and outgoing network traffic in accordance with previously defined security criteria for an organisation. At its most basic level, a firewall is essentially the wall separating a private internal network from the open Internet.

Network security mechanisms called firewalls guard against illegal access to a network. In order to recognize and stop cyberattacks, a hardware or software component that filters the incoming and outgoing traffic within a private network in accordance with a set of criteria may be used. both expertly and personal settings use firewalls.

To know more about firewalls, refer:

brainly.com/question/30006064

#SPJ4

The tool that provides useful information about a data set by breaking it down into categories is the

Answers

The histogram is a tool that, by categorizing a data set, offers meaningful information about it.

Which of the following details the number of observations that fall under certain headings?

A graphic method for illustrating the relationship between two numerical variables is the scatterplot. The graphical equivalent of a frequency table's numerical representation, the histogram, shows how many observations fit into each group.

Which of the subsequent are regarded as numerical summary measures?

The most often used numerical measurements for quantitative data are the mean, median, mode, percentiles, range, variance, and standard deviation. The sum of all the data values for a variable is added, and the result is divided by the total number of data values, yielding the mean, also known as the average.

To know more about histogram visit:-

https://brainly.com/question/13288612

#SPJ4

Computer file have name that conit of which two part?
bae file name and file name prefix
long file name and hort file name
bae file name and file creation date
bae file name and file name extenion

Answers

Windows file names consist of the file name, a period, and the file extension (suffix). A three- or four-letter shorthand known as the "extension" designates the type of file.

What is a file name the two parts of a filename?Windows file names consist of two parts: the file name and a three- or four-character extension that indicates the file type. These two sections are separated by a period. within costs. For instance, in the file name expenses.xlsx, the file extension is.xlsx.The file's extension informs your computer which programme created or can open the file and which icon to use. For instance, the docx extension instructs your computer to display a Word symbol when you examine the file in File Explorer and that Microsoft Word may open it.The majority of file name extensions work with many programmes that you have installed. The only thing that will change when you change a file's extension is the file name; nothing else will be altered.

To learn more about extension refer :

https://brainly.com/question/28578338

#SPJ4

You're using a Linux distribution that uses RPM for package management. Which command would you use to check to see if the httpd package, the Apache HTTP Server package, is installed

Answers

The command line command yum list installed httpd will check to see if the Apache HTTP Server package is installed on a Linux distribution that uses RPM for package management.

In Linux, what do yum and RPM mean?

For Linux distributions based on Red Hat, two package management systems were developed: RPM and YUM. A collection of tools called a package management system is used to automate the installation, updating, and removal of packages. The fundamental functional differences between the two package managers outweigh their similarities.

What do Linux's APT and yum stand for?

Popular package management programs designed for Debian-based and Red Hat-based Linux distributions, respectively, include APT and YUM. The two package managers are among of the most widely used and simple to use tools for package management.

To know more about HTTP visit :-

https://brainly.com/question/13155990

#SPJ4

Ann uses an iPhone. She frequently works from her client's offices. When she does, Ann does not want her iPhone to automatically connect to any wireless networks that are broadcasting. Which feature would you enable on the iPhone for Ann so that wireless network connections must be authorized first?

Answers

Wi-Fi develops into a wireless communication method, similar to Bluetooth. It helps you communicate with one or more devices at once at standard Wi-Fi speeds for everything from file transfers to web browsing.

How does the iPhone select the best Wi-Fi network to join?

MacOS Ventura, iOS, and iPadOS begin automatically joining networks with the most favoured network, then move on to private networks, then public networks. Known networks receive ratings based on your behaviour. A network's rating rises if you manually switch to it.

How can I configure my iPhone to utilise Wi-Fi rather than data?

Toggle Cellular Data on or Off for any app (like Maps) or service (like Wi-Fi Assist) that can use cellular data by going to Settings > Cellular.

To know more about Wi-Fi visit:-

https://brainly.com/question/13267388

#SPJ4

Projects that spend much time ________ are sometimes said to be in analysis O paralysis.
O Systems development
O Requirements analysis
O Documenting requirements
O Assess project feasibility

Answers

projects that require a lot of time Requirements documentation is allegedly paralysed by analytical paralysis.

What does SDLC analysis paralysis mean?

When the goal is to complete the analysis phase perfectly and completely, analysis paralysis arises. This AntiPattern is characterised by turnover, model updating, and the creation of intricate models that are not very helpful to processes farther down the line.

What is an example of analytical paralysis?

Analysis paralysis is the term for this kind of excessive pondering. When you have analysis paralysis, you could spend a lot of time weighing your options to ensure that you're selecting the best one. This occurs even whether choosing a microwave or a coffee shop croissant, which are both pretty minor selections.

To know more about  analytical paralysis visit:

https://brainly.com/question/30077507

#SPJ4

is a special folder with pointers to disk folders that can be in many locations, but will all appear to be in the same library.

Answers

A library is a special folder that contains references to disk folders that can all look to be in the same library but actually can be found in different locations.

Which recovery tool creates restore points which are snapshots of Windows?

A feature of Microsoft® Windows® called System Restore is intended to safeguard and fix software. System Restore creates Restore Points by taking a "snapshot" of a few system files and the Windows registry.

Document folders, also known as filing folders, are office supplies that come in a variety of designs, dimensions, and materials. The manila file folder is the most well-known type. These folders are made of strong, tear-resistant fabrics, making them ideal for carrying lots of papers and documents at once.

System Restore is a useful tool that creates what is known as a "restore point," which is a kind of snapshot of the software, registry, and driver settings on your PC at a certain moment in time. Then, if required, you can take your PC back to that point in time.

To learn more about System restore refer to :

https://brainly.com/question/27960518

#SPJ4

Before sending a large file over the Internet, you might want to use one of these programs. A. Disk defragmenter
B. Uninstaller
C. Disk cleanup program
D. File compression program

Answers

The answer is (D), Before sending a large file over the Internet we want to use File compression program

Describe the Internet.

The Internet, sometimes known as "the Net" or just "the Internet," is a global system of computer networks. It is a network of networks that allows users at any one computer to gather intelligence from any other computer with permission.

What kind of internet is the quickest?

The quickest internet available is fiber. It transmits massive amounts of data using light signals and bundles of fiber-optic strands that are enclosed in a reflective casing. The majority of fiber internet services offer speeds of 1,000 Mbps, but some providers can increase such speeds to 2,000 Mbps or perhaps even 6,000 Mbps.

To know more about internet visit :

https://brainly.com/question/12316027

#SPJ4

You must analyze data on a digital camera's internal memory. You plan to connect your forensic computer to the camera using a USB cable. What should you do to ensure that you do not modify data on the camera

Answers

A read-only device known as a forensic disk controller or a hardware write-blocker enables users to access the data on a questionable device without running the risk of changing or destroying the data.

What initial care should be taken with a mobile device to protect data?

The easiest approach to handle a mobile device and protect data is to keep it powered on while enclosing it in a Faraday cage.

What program is used to image a disk for forensic purposes?

The Autopsy and the Sleuth Kit are probably the two most well-known forensics toolkits. The Sleuth Kit is a command-line tool that does forensic examination of hard drive and smartphone forensic photos.

To know more about forensic disk visit:-

https://brainly.com/question/9692470

#SPJ4

Which of the following pairs of components constitutes the human side of information systems? A) software and procedures. B) software and people

Answers

The human component of information systems is made up of pairs of components called People and Procedures.

Which of the five parts that make up an information system is the most straightforward to alter?

In terms of organizational disruption and ease of change, describe how the five components of an information system are organised. Data, software, hardware, processes, and people. The easiest things to alter are on the computer side, whereas the most difficult are on the human side. Of the following.

which is a part of an information system?

Hardware, software, databases, networks, and people make up the core components of an information system. To execute input, process, output, feedback, and control, these five elements must work together.

To know more about information systems visit :-

https://brainly.com/question/14688347

#SPJ1

Which of the following correctly initializes an array arr to contain four elements each with value 0 ? int[] arr = (, 0, 0, 0); 11 int[] arr = new int[4]; III int[] arr = new int[4]: for (int i = 0; i < arr.length; i++) arr[i] = 0 (A) I only (B) III only (C) I and III only (D) II and Ill only (E) I, II, and III 2 Consider the following code segment. int total 3; inte) values - {8. 6. 4, -2); total + values[totall: total + values[total]; System.out.println(total); What is printed as a result of executing the code segment? (A) 0 (B) 1 (C) 3 (D) 7 (E) 16 3 Consider the following code segment. int[] arr=(-6,2,-5,3,8,10,-12,9); for (int k=0: k arr.length; k++) if (arr[k] > O&G arr[k]2= 0) System.out.print (arx[k] + " "); What will be printed as a result of executing the code segment? (A) 2389 (B) -6 2 8 10-12 (C) 28 10-12 (D) 2810 (E) 23 8 10 9

Answers

The following correctly initializes an array to contain four elements each each with value 0 is I, II and III. 2) Output is 7 and 3) code segment will be printed as a result will be 2, 8, 10, optionD is correct.

The array can be initialized as

1-  An array can also be initialized during declaration. ( as in I )

2- In Initializing an array without assigning values, the default value of each element is zero. ( as in II )

3- An array can be initialized by setting each value of an element to zero by looping the length of the array. ( as in III)

I. It creates an array of 4 elements. The default value of int in java is Zero.

II. It also creates an array of 4 elements and manually initialized all the values to 0.

III. It creates an array of 4 elements. and uses a loop to manually initialized all the values to 0.

2) Output is 7 i.e Option(D).

total =total+values[total]; => total = 3+values[3];

=> total=3+(-2) => total=3-2 =>total=1.

total =total+values[total] =>total =1+values[1]

=>total= 1+6 =>total =7.

3)Option(D) i.e 2 8 10.

In If condition it is checking whether the element in the array is Positive and also it is divided by 2 with 0 reminder.

So from array positive numbers are 2,3,8,10,9. from these positive numbers Number dived by 2 or Multiples of is 2,8,10.

So output is 2,8,10.

To learn more about code segment

https://brainly.com/question/20063766

#SPJ4

As with an IP address the components of a domain name are separated by
A. Commas
B. Periods
C. Colons
D. Semicolons

Answers

The elements of a domain name are separated by periods, much like in an IP address.

What distinguishes the parts of a domain name?

Domain names typically consist of two or three components, each of which is separated by a dot. When read from right to left, the identifiers in domain names are arranged from most general to most specific. The portion of a domain name to the right of the final dot is known as the top-level domain (TLD).

What is a domain name's IP address?

The Internet Protocol, or IP address, is not the same as a domain name. The IP address is a legitimate set of numerical instructions. It communicates precise address information in a way that is understandable to computers but unintelligible to humans. The domain name and IP address are linked.

To know more about IP address visit:-

https://brainly.com/question/30001728

#SPJ4

microsoft’s risk management model includes _____, which specifies the risk type.

Answers

Microsoft’s risk management model includes probability , which specifies the risk type.

What is Microsoft's rating for risk?

You can overcome the difficulties of developing a successful security program with the use of the Microsoft Security Risk Assessment (MSRA).

                        The purpose of the MSRA, a two-week project, is to assess how well the defense-in-depth concept is being used in your security plan.

What models of risk management are there?

Model risk management is a term used to describe a group of strategies aimed at ensuring that a financial model is operating as intended while reducing the likelihood of model risk. These actions seek to identify, minimize, and project the potential effects of a model's limits on the operations of a corporation.

Learn more about Microsoft’s risk management model

brainly.com/question/8816652

#SPJ4

Python ch5
Write the code to call the function named send_signal. There are no parameters for this function.send_signal()
Write a definition of the function printDottedLine, which has no parameters and doesn't return anything. The function prints to standard output a single line consisting of 5 periods (".").
def printDottedLine():
print(".....")
Write the code to call a function whose name is send_number. There is one argument for this function, which is an int. Send 5 as an argument to the function.send_number(5)
Write the code to call a function named send_variable and that expects a single int parameter.

Answers

The code to call the function name send_signal() is given below.

In Python, how can you call any function without any arguments?

In these circumstances, we can call the function using default arguments without providing the values again for parameter values.Python allows us to accomplish this by using the = sign and the default value.

send_signal().

def printDottedLine():

print(".....")

def printDottedLine():

print(".....")

send_number(5)

send_variable(x);

To know more about Python visit:

https://brainly.com/question/13437928

#SPJ4

A Windows 10 PC on the network is only able to connect to other resources, both public and private, by using IP addresses. What setting needs to be checked via the NIC (Network Interface Card) properties

Answers

The setting that needs to be checked via the NIC (Network Interface Card) properties on a Windows 10 PC in order to connect to other resources using IP addresses is the network adapter's IP configuration.

Specifically, the IP address, subnet mask, and default gateway should be checked to ensure they are correctly configured and match the settings of the network to which the PC is connected. NIC stands for "Network Interface Card." It is a hardware component that connects a computer to a network. It typically includes a connector for a cable, as well as the electronics necessary to transmit data over the network. NICs can be built into a computer's motherboard, or they can be added as a separate expansion card. They may also be built into other devices, such as routers and servers, to provide network connectivity.

Learn more about NIC, here https://brainly.com/question/30087617

#SPJ4

Other Questions
which event from the love song of j Alfred prufrock best shows this theme Researchers radio-tagged gray whales to understand the timing of their migration and details of their journey. What types of data were researchers able to collect about the gray whale migrations Plsssss help me in the photo Doctors often strike your knee gently with a rubber hammer and see if your leg gives a little kick as part of a routine physical. This patellar reflex test is literally looking for a knee jrk response, one that you are not thinking about at all! What do you think the doctor is testing herewhat part of the body would this test examine? What would an abnormal result look like, and why is it important to detect abnormal results? How might a patients response change as they enter old age, as opposed to when we are tested as children? Find the length of AB. A student is graduating from college in 12 months but will need a loan in the amount of $10,958 for the last two semester. The student may receive either an unsubsidized Stafford Loan or a PLUS Loan. The terms of each loan are:Unsubsidized Stafford Loan: annual interest rate of 3.85%, compounded monthly, and a grace period of six months from time of graduationPLUS loan: annual interest rate of 4.15%, compounded monthly, with a balance of $11,421.51 at the time of repaymentWhich loan will have a higher balance, and by how much at the time of repayment? When a shipper considers the trustworthiness of possible carriers, this would be what kind of criterion?a. Performance criterionb. Relational criterionc. Stability and growth criteriond. Irrelevant criterione. None of the above Six toilet rolls cost $1.99. Nine toilet rolls cost $2.69. Is cost directly proportional to number of toilet rolls? Explain your reason! Five student government officers want to go to the state convention. It will cost them $115 for registration, $365 for transportation and food, and $55 per person for the hotel. There is $485 budgeted for the convention in the student government savings account. They can earn the rest of the money they need by having a car wash. If they charge $6 per car, how many cars must they wash in order to have enough money to pay for the trip? Why must cells have an upper and lower limit to their size? What is the life cycle of an idea, from the original idea through, in some cases, its actual implementation Which of the following functions describes the graph of g(x)? (5 points) Rational function with one piece decreasing from the left asymptotic to the line y equals 2 and going through a hole at the point negative 2 comma eight-fifths and going down through the point 2 comma 0 asymptotic to the line x equals 3 and another piece decreasing from the left asymptotic to the line x equals 3 and going through the point 5 comma 3 going up to the right asymptotic to the line y equals 2 g of x is equal to the quantity 2 x squared minus 8 end quantity over the quantity x squared minus x minus 6 end quantity g of x is equal to the quantity 2 x squared minus 8 end quantity over the quantity x squared plus x minus 6 end quantity g of x is equal to the quantity 2 x squared minus 8 end quantity over the quantity x squared plus 5 x plus 6 end quantity g of x is equal to the quantity 2 x squared minus 8 end quantity over the quantity x squared minus 5 x plus 6 end quantity A curriculum developed by an outside group for use by others is called a(n) _________.a. peer reviewed programb. canned programc. independent programd. culturally competent program What are some factors that increase the chance of a genetic mutation happening in your cells? expert that helps you learn core concepts.See AnswerWhen new customers are brought on board at PlastiPharm, they meet not only with the sales team, which is responsible for explaining the features of the products the company sells, but also with the engineering design team, which is responsible for making suggestions for materials and production methods. Additionally, customers do an initial on-site audit (walk through) of the facility where they get to know the people and facility well. Which of the following statements best describes how PlastiPharm and the customer benefit from getting to know each other well?The customer benefits from PlastiPharms expertise on best products for their needs, and PlastiPharm benefits by influencing customer expectations and tailoring its inventory strategies.PlastiPharm benefits from knowing its customers because it can then categorize them and more easily manage their products; the customer benefits from better management.Both organizations benefit from knowing who to call in case problems arise or questions about future endeavors need to be asked. Although Chick Corea worked with musicians from Miles Davis to Herbie Mann, he is best knownfor his Return to Forever and Elektrik Band.TrueFalse Eliza remembers her grandfather telling the story of how he met her grandmother 50 years ago. elizas grandpa has these memories stored in his __________ memory. a. short-term b. long-term c. implicit d. echoic please select the best answer from the choices provided a b c d Rahquez and Francesca both leave the coffee shop at the same time, but in opposite directions. IfFrancesca travels 5 mph faster than Rahquez and after 3 hours they are 105 miles apart, how fast is eachtraveling? Exaggerated body movements, shoulder shifting, or a change of place will help an ASL storyteller? O create a sense of calm in the audienceO develop the time and setting of the storyO make the audience laugh more oftenshow when a new character is introduced Two small objects carry the same amount of charge, and the magnitude of the electric force exerted by one object on the other is 0.10 N when they are held 30 mm apart. If the force magnitude increases when the objects are released and free to move, are the objects of the same charge or opposite charge?