Select all the correct text in the passage. What is an example of an "IS-A" relationship? a column IS-A database a keyboard IS-A peripheral device a door IS-A window a teacher IS-A student a boy IS-A person a ball IS-A cube​

Answers

Answer 1

Answer:

a column IS-A database

a keyboard IS-A peripheral device

a boy IS-A person

Explanation:


Related Questions

Which of these tasks can be accomplished when the drop-down menu of the Bullets icon is clicked?

Answers

Answer:

The answer is:

(1)Select the bullet, that is used in the list

(2)Defining the new bullet, which is used in the list

Explanation:

In the question, the choices were missing. so, we define the correct choice only.

In choices 1 and choice 2, both use the bullets, but in choice 1, it is used in the list, in which it is used to define the list options, and in the choice 2, it defined the new bullets in the list.  

A box can fit a maximum of 5 items. Given three groups of items, num_itemsA, num_itemsB, and num_itemsC, assign num_full_boxes with the number of full boxes that the items will take up. The program will convert num_full_boxes to an integer and print the value. Sample inputs: 1 2 4 Number of full boxes: 1 num_full_boxes=0.0 num_itemsA=int(input()) num_itemsB=int(input()) num_itemsC=int(input()) "'Your solution goes here'" print(f'Number of full boxes: {int(num_full_boxes)}')

Answers

Answer:

Explanation:

num_itemsA = int(input())

num_itemsB = int(input())

num_itemsC = int(input())

total_items = num_itemsA + num_itemsB + num_itemsC

num_full_boxes = total_items // 5

print(f'Number of full boxes: {int(num_full_boxes)}')

In this code, the input values for num_itemsA, num_itemsB, and num_itemsC are read from the user using the input() function and converted to integers using the int() function. The total number of items is computed by adding the three input values. The integer division operator // is used to determine how many full boxes can be filled with the total number of items. Finally, the result is printed using an f-string, which allows us to format the output string to include the computed value of num_full_boxes as an integer.

your cio asks you to create a device that is intentionally insecure to catch and log potential attacks. she is referring to a

Answers

One security management solution called SIEM combines security event monitoring and management information management.

Who are potential attackers?

In order of increasing severity, we list a number of hazards that any alert sharing network must deal with. Attacks of many kinds could be launched simultaneously by the attacker. casually perusing A person who hurts someone violently: She really should have known her assailant, according to the authorities.

How do you recognize potential potential risks?

The following factors can be used to evaluate and classify threats: the threat's propensity to materialize; the consequences should it; Risk can be calculated to use the principles of probability and consequences: more greater an threat's probability or impact, the greater the risk.

To know more about potential attackers visit :  

https://brainly.com/question/30028361

#SPJ4

Rita used information from a blog that someone else wrote. What should she do?

Select all answers that apply.

Rita should use the information and hope that no one recognizes where it came from.


Rita should ask the original author for approval to use the information.


Rita should ask her teacher for approval to use the information.


Rita should give the author credit for their intellectual property by citing the source.

Answers

Answer:

rita should either ask the original author for permission to use her blog, but the best answer woyuld be that she should site her sources.

Explanation:

- Triangle ABC has vertices A(1,2), B(7,0), and


C(3,-2). Prove triangle ABC is an isosceles triangle.



Please help! Thanks

Answers

Triangle ABC can be proven to be an isosceles triangle by showing that two of its sides have equal lengths.

To prove that triangle ABC is isosceles, we need to demonstrate that at least two of its sides have equal lengths. Let's calculate the lengths of the sides AB, BC, and AC using the distance formula.

The length of side AB can be found using the coordinates of points A(1,2) and B(7,0):

AB = √((7-1)² + (0-2)²) = √(36 + 4) = √40 = 2√10

The length of side BC can be calculated using the coordinates of points B(7,0) and C(3,-2):

BC = √((3-7)² + (-2-0)²) = √((-4)² + (-2)²) = √(16 + 4) = √20 = 2√5

The length of side AC can be determined using the coordinates of points A(1,2) and C(3,-2):

AC = √((3-1)² + (-2-2)²) = √((2)² + (-4)²) = √(4 + 16) = √20 = 2√5

Comparing the lengths of the sides, we see that AB = AC = 2√10 = 2√5. Therefore, two sides of triangle ABC have equal lengths, indicating that it is an isosceles triangle.

learn more about  isosceles triangle here:

https://brainly.com/question/29774496

#SPJ11

Which computing component is similar to the human brain

Answers

THE CPU ,THERE IS WERE ALL THE INFORMATION IS.

HELP ME PLS DUE TONIGHT WILL GIVE BRAINLIEST

HELP ME PLS DUE TONIGHT WILL GIVE BRAINLIEST

Answers

Hello, detailed code is available below. I will also add the source file in the attachment. Wish you success!

   

HELP ME PLS DUE TONIGHT WILL GIVE BRAINLIEST

Project: Design and Development Research Project
a team at work

A team (Imagery supplied by RicardoImagen/iStock via Getty)
Your Task
Your teacher may ask you to work in groups. Check with your teacher to see if this is required.
Choose a topic from the unit.
Identify a problem or issue to research.
Write a question (or questions) to be answered by your research.
Find at least four sources; these can be a journal article, a website from a reputable organization, an encyclopedia, a newspaper, or a documentary. When in doubt, ask your teacher.
Unacceptable sources include Wikipedia, an individual’s blog, and social media, except as examples not counted as sources.
Create a document using Word (or a similar word-processing application) as described below.
Your Word Document Requirements
Part 1: Name
Your name
Names of your partner(s) (Include the names of people in your group if this is a group project.)
Part 2: Title
Part 3: Questions to Answer
Part 4: Introduction
A paragraph that introduces your topic and the question(s) to be answered
Part 5: Exposition
An explanation of how you answered the question(s); give credit to your sources, whether using direct quotes or not
Part 6: Conclusion
A paragraph summarizing your analysis
Part 7: Bibliography
Part 8: Partner Participation (only included for those working in groups)
Describe the role and responsibilities of each member of the group.
What to Submit
You will submit the Word document described above. You can use this rubric to evaluate your project before you submit it.

Answers

The correct steps which are used to make a research are as follows:

Choose a topicFind out what problem needs to be fixed about the topicWrite your research questionsMake use of reputable sourcesWrite out your conclusions

What is a Research?

This refers to the systematic study of a particular thing or phenomena to find out why it occurs and why it occurs the way it does and the frequency of occurrence.

With this in mind, we can see that making a research requires meticulous steps and some sources for research should not be considered because they are not reputable and this can include; individual blogs, social media, etc.

Read more about research here:
https://brainly.com/question/968894

Answer:

sorry i know this is late, but hopefully it will help someone else!

have a lovely day <3

Are robots that fix other robots engineers or doctors.

Answers

The robots are Engineers

Mail checks for received email when you click the ____ button on the Apps bar.

Answers

When you receive an email in your inbox, it's important to check it to determine its relevance, urgency, and importance.

What are Email Checks?

Email checks may include reading the email thoroughly to understand its contents, checking any attachments or links included in the email, responding to the email if necessary, marking it as read or unread, archiving or deleting the email, and taking any necessary actions based on the content of the email.

The process of email checks can help you manage your inbox effectively and stay on top of important communications.

Read more about mails here:

https://brainly.com/question/30551604

#SPJ1

A python program that asks the user for four numbers and prints out the first and last number. It must have an array used in it.

Answers

Answer:

numbers = []

for i in range(4):

 z = int(input("enter a number: "))

 numbers.append(z)

print("First is {} and last is {}".format(numbers[0], numbers[-1]))

Explanation:

Now I understand your other question as well! ;-)

A customer reached out via Twitter Direct Message to your company, looking for support with a complex issue. A co-worker was already helping that user but is away on vacation. Which Hootsuite feature would be best to respond with?

Answers

The Hootsuite platform provides tools that enable a person to manage his social media activities in one spot. The Hootsuite feature that would be best to respond with given the above scenario is;

Hootsuite inbox

Using the Hootsuite inbox, a user can access the private and public conversations between a former user and a client.

You can see the post that prompted the customer to speak with the organization's representative.

After reading through the conversations, you can reply the client and take any step that is required of you.

Learn more here:

https://brainly.com/question/15321261

a flow chart is the _______ representation of the sequence of steps required of steps required to solve a particular problem​. I know answer I want how is it the answer

Answers

Answer:

A flowchart is simply a graphical representation of steps. It shows steps in sequential order and is widely used in presenting the flow of algorithms, workflow or processes. Typically, a flowchart shows the steps as boxes of various kinds, and their order by connecting them with arrows.

Select the data type for each example below.
Possible answers
-Int
-float
-string

Select the data type for each example below. Possible answers-Int-float -string

Answers

Answer:

2.5 = float

'2.5' = str

3 = int

Explanation:

The data type: "float" is used for positive or negative decimals.

The data type: "str" is used for a sequence of letters, numbers, or symbols. Since the decimal used apostrophes, this means it's a character literal.

The data type: "int" is used for any positive or negative whole number.

round 172.32 to the nearest whole week​

Answers

Answer:

172?

Explanation:

you can use the _______ feature to replace short abbreviations with long strings of text that you don't want to type over and over again. grammar spelling proofing autocorrect

Answers

you can use the autocorrect feature to replace short abbreviations with long strings of text that you don't want to type over and over again.

In computer programming, a string is often a group of characters that can be either a literal constant or a type of variable. The latter has two length options and an elemental flexibility option (after creation). A string is generally implemented as an array data structure of bytes (or words), which stores a series of elements—typically characters—using some character encoding. A string is frequently viewed as a data type. Another sequence (or list) data type and structure may sometimes be referred to as "strings," such as more generalized arrays.

Depending on the programming language and particular data type used, a variable declared as a string may result in memory being statically allocated for a predetermined maximum length.

Learn more about  strings here:

https://brainly.com/question/29524557

#SPJ4

Adjust the code you wrote for the last problem to allow for sponsored Olympic events. Add an amount of prize money for Olympians who won an event as a sponsored athlete.

The

Get_Winnings(m, s)
function should take two parameters — a string for the number of gold medals and an integer for the sponsored dollar amount. It will return either an integer for the money won or a string Invalid, if the amount is invalid. Olympians can win more than one medal per day.

Here's my answer for question 1 please adjust it thanks!

def Get_Winnings(m):

if m == "1": return 75000

elif m == "2":

return 150000

elif m == "3":

return 225000

elif m == "4":

return 300000

elif m == "5":

return 375000

else:

return "Invalid"

MAIN

medals = input("Enter Gold Medals Won: ")

num = Get_Winnings(medals)

print("Your prize money is: " + str(num))

Answers

Answer:def Get_Winnings(m):

if m == "1": return 75000

elif m == "2":

return 150000

elif m == "3":

return 225000

elif m == "4":

return 300000

elif m == "5":

return 375000

else:

return "Invalid"

MAIN

medals = input("Enter Gold Medals Won: ")

num = Get_Winnings(medals)

print("Your prize money is: " + str(num))

exp: looking through this this anwser seemes without flaws and i dont follow

if you can provide what you are not understanding ican an help

Select all correct guidelines that should be followed regarding layout.
0
Use the font size of 44 to 66 points for the title.
Use no more than four colors.
Use no more than four fonts on each slide.
Use graphics only when they add value.
Use a high degree of contrast between the text and the background.
Limit the amount of information you put on each slide.
Use a font that is easy to read.
Use at least 48-point size font for all presentation text.

Answers

The correct guidelines that should be followed regarding layout are:

The GuidelinesUse a font size of 44 to 66 points for the title.Use no more than four colors.Use no more than four fonts on each slide.Use graphics only when they add value.Use a high degree of contrast between the text and the background.Limit the amount of information you put on each slide.Use a font that is easy to read.

It is crucial to follow specific principles when it comes to design guidelines. Some tips to improve your presentation are: selecting a font size between 44 and 66 points for the title, using a maximum of four colors and fonts, including graphics only if necessary, guaranteeing there is enough contrast between text and background, keeping your slides simple and brief, and using legible typesets. These instructions aid in developing presentations that are both visually captivating and efficient.

Read more about layout guidelines here:

https://brainly.com/question/27619362
#SPJ1

Is MOOC's potentially harmful to copyright? Why or why not ?

Answers

Answer:

Fair-use exceptions to traditional copyright protection face challenges as well, given a MOOC's potential for global reach. Nonetheless, fair use and MOOCs are not mutually exclusive ideas. MOOCs remain an experiment...

Python String Functions: Create a new Python Program called StringPractice. Prompt the user to input their name, then complete the following:
Length
• Print: “The length of your name is: [insert length here]”
Equals
• Test to see if the user typed in your name. If so, print an appropriate message

Really appreciate the help.

Answers

#Swap this value by your name. Mine is Hamza :)

my_name = "Hamza"

#Get input from user.

inp = input("What's your name?: ")

#Print the length of his/her name.

print("The length of your name is",len(inp),"characters.")

#Check if the input matches with my name?

#Using lower() method due to the case insensitive. Much important!!

if(inp.lower()==my_name.lower()):

   print("My name is",my_name,"too! Nice to meet you then.")

linnea has requested to be placed on the penetration testing team that scans for vulnerabilities to exploit them. which team does she want to be placed on?

Answers

Linnea has requested to be placed on the penetration testing team that scans for vulnerabilities to exploit them. RED team does she want to be placed on.

What is meant by vulnerability?

The incapacity to fend off dangers or react after a catastrophe has struck is vulnerability. Those who live on plains, for example, are more susceptible to flooding than those who reside higher up. An IT system vulnerability is a flaw that can be used by an attacker to launch a successful assault.

These can be brought about by bugs, features, or user error, and attackers will try to take advantage of any of them, frequently combining one or more, to accomplish their objective. Vulnerability, however, does not equal weakness. The basis of all emotions and feelings is vulnerability. We forgo feeling our feelings if we keep ourselves from being open to vulnerability.

Learn more about the Vulnerabilities here: https://brainly.com/question/29239283

#SPJ1

NOTE: The given question is incomplete on the portal. Here is the complete question.

QUESTION: Linnea has requested to be placed on the penetration testing team that scans for vulnerabilities to exploit them. Which team does she want to be placed on?

a. Red Team

b. White Team

c. Purple Team

d. Blue Team

ᗯᕼᗩ丅 ᗩᖇᗴ 丅ᕼᗴ ᑕᗝᗰᑭᗝᑎᗴᑎ丅ᔕ ᗝᖴ ᗩ ᖇᗴᔕᗴᗩᖇᑕᕼ ᑭᒪᗩᑎ? ᑕᕼᗴᑕᛕ ᗩᒪᒪ 丅ᕼᗩ丅 ᗩᑭᑭᒪƳ.
Ǥᗝᗩᒪᔕ ᖴᗝᖇ 丅ᕼᗴ ᖇᗴᔕᗴᗩᖇᑕᕼ ᑭᖇᗝᒎᗴᑕ丅
ᖇᗴᔕᗴᗩᖇᑕᕼ 丅ᗝᑭᎥᑕ
ᑕᒪᗩᔕᔕ ᔕᑕᕼᗴᗪᑌᒪᗴ
ᑭᗝᔕᔕᎥᗷᒪᗴ ᔕᗝᑌᖇᑕᗴᔕ
ᗩᖇ丅ᗯᗝᖇᛕ Ꭵᗪᗴᗩᔕ
ᖇᗴᔕᗴᗩᖇᑕᕼ ᗰᗴ丅ᕼᗝᗪ

Answers

Hey there!

The answers to your question are as follows:

A.) Goals for the research project

B.) Research topic

D.) Possible sources

F.) Research method

A ~ the goals are important because you want to know why you are doing it. the goals can be good for remembering who your audience is.

B ~ Research topic is important because you want to know what your researching

D ~ Possible sources are important, too, because you want to know how you are going to get your information

F.) a research method is also important because it can help you stay organized

Hope this helps! Good luck! Have a great day!

which hardware component interprets and carries out

Answers

Answer:

The processor, are also called a CPU(central processing unit) is an electronic component. That interpretes and carried out the basic instruction that operates a computer

Explanation:

Next → Creating Documents Using Word Processing Software: Mastery Test
1
Type the correct answer in the box. Spell all words correctly.
Under which key category do the Page Up and Page Down keys fall?
Page Up and Page Down keys fall under the
Reset
keys category.
Next

Answers

Any of these approaches can be used to open a Word document that already exists. Although a doc file will open when double-clicked in Windows Explorer.

What exactly is word processing software?

The process of creating, editing, saving, and printing documents on a computer is referred to as word processing. Specialized software, also referred to as a word processor, is required in order to execute word processing. Microsoft Word is one example of a word processor, while many people also use other word processing programs.

Does Excel have a word-processing component?

MS Excel is a spreadsheet application used to create tables, and charts, and perform intricate computations. Microsoft Word is a word processing tool used for producing papers, reports, and other written work.

to know more about Word Processing here:

brainly.com/question/29762855

#SPJ1

DO any of yall know where American football came from and when? Because I've researched but I can't find an answer

Answers

The sport of American football itself was relatively new in 1892. Its roots stemmed from two sports, soccer and rugby, which had enjoyed long-time popularity in many nations of the world. On November 6, 1869, Rutgers and Princeton played what was billed as the first college football game.

You will watch the short film Figueroa (2019) written, produced, and directed by Victor Hugo Duran. Then answer the following questions:

1. What kind of choices does Duran make in how he covers the scenes? Do you notice a pattern in the kinds of shots he uses?

2. Why do you think he uses the 2.4:1 aspect ratio? What does it do for his story?

3. Why do you think he holds the final shot for so long? How do you think the ending would be different if the shot was only half as long (before the credits come on).

Answers

The kind of choices that Duran makes in how he covers the scenes is

What is a Movie Synopsis?

This refers to the brief summary of a screenplay's core content that shows its plot points, conflict, resolution and protagonist's development, etc.

The reason why I think he uses the 2.4:1 aspect ratio is that he wants to cover the action from a wider angle to capture all the actions and activities of the characters.

The reason why I think he holds the final shot for so long is to show the empty room after the two boys had run off.

The ending would have been different if it was half as long because some other story element could have been displayed.


Read more about movie synopsis here:

https://brainly.com/question/1661803

#SPJ1

which two statements regarding the use of subqueries are true? (choose two.) a. a subquery used with the in operator must return multiple rows. b. a subquery can be used in a create view statement, regardless of the number of rows it returns. c. a subquery can be used in the values clause of an insert statement if it returns more than one row. d. a subquery can be used in the set clause of an update statement, regardless of the number of rows it returns. e. a subquery used in an into clause of a select statement must return only one column but can return multiple rows. f. a subquery cannot be used in the group by clause of a select statement.

Answers

There are two statements regarding the use of subqueries that are true a. a subquery used with the IN operator must return multiple rows and c. a subquery can be used in the values clause of an insert statement if it returns more than one row.

A subquery is a query that is nested within another query. It can be used in the SELECT, INSERT, UPDATE, and DELETE statements to help in retrieving or modifying data. Subqueries are mainly used to retrieve data from tables by comparing them with the data present in another table. They are also used to update, delete or insert into tables using another table's data.

There are six types of subqueries: Single-row subquery, Multiple-row subquery, Multiple-column subquery, Correlated subquery, Nested subquery, Co-related subquery. Example of subqueries: SELECT ProductName, UnitPriceFROM ProductsWHERE UnitPrice > (SELECT AVG(UnitPrice) FROM Products)ORDER BY ProductName; This query selects the ProductName and UnitPrice from the Products table for products whose UnitPrice is greater than the average UnitPrice. Therefore options A and C are correct.

Know more about Subquery here :

https://brainly.com/question/29522983

#SPJ11

True or False. A Windows Server running the iSCSI Target feature requires that the Microsoft iSCSI Initiator Service to be in Running status.

Answers

A Windows Server running the iSCSI Target feature requires that the Microsoft iSCSI Initiator Service to be in Running status: True.

In Cloud computing, a storage area network (SAN) refers to a high-speed computer network that is specially designed and developed to avail end users the ability to have an access to a consolidated, block-level data storage.

Hence, a storage area network (SAN) is typically designed to connect network servers to a data storage.

iSCSI is an acronym for Internet Small Computer System Interface and it is an internet protocol (IP) standard that is used essentially on a storage area network (SAN), for connecting data storage facilities over a transmission control protocol and internet protocol (TCP/IP).

On Windows Server, after an iSCSI Target feature has been installed, you should proceed to create a new iSCSI virtual disk and then configure the access server on your computer system.

By the default, the Microsoft iSCSI Initiator Service is stopped on Windows computer.

In order to use it, you must start the service and make sure its status reads "Running" before any configuration can be done.

Read more: https://brainly.com/question/24228095

Why would you use the 'Five Why's
Method' for root cause analysis
procedure for analysing and
evaluating system failures? in automotive mechinics

Answers

The 'Five Whys' method is used for root cause analysis in automotive mechanics to systematically identify the underlying causes of system failures.

The 'Five Whys' method is a simple yet powerful technique used to investigate and understand the root causes of a problem or failure. In the context of automotive mechanics, it can be applied to analyze and evaluate system failures, such as mechanical breakdowns or malfunctions in vehicles.

The method involves asking "why" repeatedly, typically five times, to drill down into the underlying causes of a problem. Each "why" question seeks to identify a deeper reason until the root cause is identified. By asking multiple "why" questions, it helps uncover the chain of events and factors that led to the failure.

In automotive mechanics, using the 'Five Whys' method can lead to a more comprehensive understanding of system failures. It allows technicians to go beyond surface-level symptoms and address the actual causes, which may involve issues related to design, manufacturing, maintenance, or operational procedures.

By addressing the root causes, corrective actions can be implemented to prevent similar failures in the future, improving the overall reliability and performance of automotive systems.

Overall, the 'Five Whys' method serves as a systematic approach for root cause analysis in automotive mechanics, enabling technicians to identify and address the underlying causes of system failures effectively.

Learn more about system here:

https://brainly.com/question/30173663

#SPJ11

Richard wants to share his handwritten class notes with Nick via email. In this scenario, which of the following can help Richard convert the notes into digital images so that he can share them via email? a. Bar coding device b. Digital printing software c. Document scanner d. Radio frequency identification tag

Answers

Answer: Document Scanner

Explanation: Cos then he can easily add the paper notes to his computer and email the client.

Other Questions
Checks to make sure that laws and regulations are followed for pollution and waste disposal: Organizes waste materials for processing into new products and substances: Operates machinery for treating water for human use: Uses design skills to solve and prevent environmental problems: Cleans up and disposes of toxic chemical and fuels: what is the answer? From the 6 male and 11 female sales representatives for an insurance company, a team of 3 men and 4 women will be selected to attend a national conference on insurance fraud.In how many ways can the team of 7 be selected? Which of the following does NOT describe why its important for scientists to use scientific methods?Using a standard method makes it easier for scientists to share their results.Without the scientific method, we cannot make observations.The steps help guarantee accurate results.The scientific method is a tool that can make finding answers to questions easier. complete this sentence: ideally, if a study concluded that eating ice cream caused violence, it would have to . Write your own math poem. The content of your poem should reflect what you know about the properties of integer exponents or scientific notation. Challenge yourself by playing with the poems formuse a fun rhythm, use a pattern of syllables, or make it rhyme! A number increased by 4 is the same as 19 minus 2 times the number. (10 points) plss help tkssss Explain how each of the following transactions generates two entries - a credit and a debit - in the American Balance of Payments Accounts, and describe how each entry would be classified.a. An American buys a share of German stock, paying by writing a check on an account with a Swiss Bank.b. An American buys a share of German stock, paying the seller with a check on an American Bank.c. The South Korean government carries out an official foreign exchange intervention in which it uses dollars held in an American Bank to buy Korean currencies from its citizens.d. A tourist from Detroit buys a meal at an expensive restaurant in Lyons, France, paying with a traveler's check.e. A U.S.-owned factory in Britain uses local earnings to buy additional machinery. what are fours conditions tha must exist for a market to be perfectly competitive Shen rounded a number to the nearest tenth and got 4.5. When he rounded it to thenearest whole number he got 4.Which of these could be the number he rounded?rounded to nearest tenth4.5rounded to nearestwhole number4 Find the minimum sample size. Provide your answer in the integer form. A nurse at a local hospital is interested in estimating the birth weight of infants. How large a sample must she select if she needs to be 97% confident that the population mean is within 2.9 ounces of the sample mean? The population standard deviation of the birth weights is known to be 6 ounces. About 70 percent of the Earth's surface is water-covered, and about 96.5 percent of all Earth's water is salt water. Identify the watery feature on Earth that is made of freshwater rather than salt water. A) bay B) glacier C) ocean D) sea The planetary vorticity of an air parcel moving from low toward high latitude in the Northern Hemisphere will: Select one: a. increase. b. decrease. c. remain constant. d. change from positive to negative. QUUESTION Today, everything at a store is on sale! The store offers a 20% discount.If the regular price of an item is `x` dollars, write an expression (not an equation so no equal sign) that can be used to find the discount price in dollars? dr. lopez, a psychologist explains that we are all by-products of many levels of our surrounding environment. which theory is dr. lopex most aligned with? behavioral psychoanalytic cognitive ecological systems Question 11 12 and 13 Will be brainliest 20 POINTS NO EXPLANATION NEEDED According to the lecture, the main components of the internet architecture are the ____, ____, and ____ layers, and each of them perform distinct functionalities necessary for online communications. besides the state government the only other government authority who can impose a sales tax is a city government true false PLEASE I NEED THIS ASAPPPP!Two Amazing Tales of Memory WRITE AN ESSAY ABOUT TWO AMAZING TALES OF MEMORY omg please help me!!! Will give brainly Please help me Which of the following literary terms is used to identify a main point of interest in a research report?exploration O positionO point of viewfocus