If C2=20 and D2=10 what is the result of the function = mathcal I F(C2=D2,^ prime prime Ful "Open")?
Open
Unknown
Full
10​

Answers

Answer 1

Excel IF functions are used to test conditions.

The result of the IF function is (a) Open

The function is given as: = IF(C2 = D2, "Full","Open")

Where: C2 = 20 and D2= 10

The syntax of an Excel IF conditional statement is: = IF (Condition, value_if_true, value_if_false)

The condition is: IF C2 = D2

The values of C2 and D2 are: 20 and 10, respectively.

This means that, 20 does not equal 10.

So, the value_if_false will be the result of the condition.

In other words, the result of the IF function is (a) Open

Read more about Excel functions at:

https://brainly.com/question/10307135


Related Questions

Give three examples of the following types of data?
Give three examples for each category in the software domain ?

CCDI :)??

Give three examples of the following types of data?Give three examples for each category in the software
Give three examples of the following types of data?Give three examples for each category in the software

Answers

An example of transactional data are:

Sales ordersPurchase ordersShipping documents

Its software domain are: Personal  meeting, a telephone call, and a Video call

An example of  financial data are: assets, liabilities, and equity. The software are: CORE Banking, Retail Banking, and Private banking

An example of intellectual property data are: books, music, inventions. The software domain are Patents, trademarks, and copyrights

What types of software are used in the financial industry?

Through sales and marketing tools, data-driven contact management, and workflow automation, customer relationship management (CRM) software assists financial services organizations in fostering new relationships and maximizing the value of existing customers.

You can see how your consumers are utilizing your website to complete a transaction by using transaction management software. It may demonstrate both how each website element functions on its own and as a part of the overall technological infrastructure.

Note that Information that is gathered from transactions is referred to as transactional data. It keeps track of the date and location of the transaction, the time it took place, the price ranges of the goods purchased, the mode of payment used, any discounts applied, and other quantities and characteristics related to the transaction.

Learn more about transactional data  from

https://brainly.com/question/28081430
#SPJ1

A customer has reported that when using a cable to connect an older laptop to a 100Mbps switch that the link light does not illuminate. When testing the same cable with a newer 1Gbps switch, it works fine. Which of the following is the MOST likely cause of the problem?

Answers

The cable is pinned as a crossover. Crossover cables move the wire from pin 1 at one end to pin 3 at the other connector, as the name implies.

What is Crossover cables ?An Ethernet cable used to directly connect computing devices is known as a crossover cable. The RJ45 crossover cable uses two separate wiring standards instead of just one, using the T568A wiring standard on one end and the T568B wiring standard on the other.The transmit signals at one end of the crossover wire are connected to the receive signals at the other end by purposefully crossed cabling. The transmit signals at one end of the crossover wire are connected to the receive signals at the other end by purposefully crossed cabling.A patch cable can be used in place of a crossover cable or vice versa, and the receive and transmit signals are automatically adjusted within the device to give a functional connection, thanks to the auto MDI-X functionality that is supported by many network devices today.

To learn more about Crossover cables refer :

https://brainly.com/question/14325773

#SPJ4

data and information are secure if the pyramid of security cia (confidentiality, integrity, availability) are satisfied. discuss what each term means and provide an example to support your discussion.

Answers

The notion of the CIA triad, usually referred to as secrecy, integrity, and availability, was developed to guide internal information security procedures.

What is CIA confidentiality integrity availability?The CIA triad, also known as confidentiality, integrity, and availability, is a concept created to direct information security policies inside a company.To avoid confusion with the Central Intelligence Agency, the approach is sometimes frequently referred to as the AIC triad (availability, integrity, and confidentiality).Simply said, confidentiality means restricting access to your data, integrity means making sure it is accurate, and availability means making sure those who require it can access it.You may build solid information security rules on top of this trinity.Before granting access to sensitive data, two-factor authentication (a debit card with a PIN code) ensures confidentiality.By preserving all transfer and withdrawal records made via the ATM in the user's bank, the ATM and bank software ensure data integrity.

To learn more about confidentiality integrity availability refer

https://brainly.com/question/17269063

#SPJ4

Please give correct answer ASAP,I'll upvote Which of the following assets and vulnerabilities should be dealt with first? a. An asset with a value of 60 and 2 vulnerabilities; Vulnerability 1 has a likelihood of 0.3 and vulnerability 2 has a likelihood of 0.6. The asset has a security control that mitigates 50% of the risk associated with vulnerability 1 but no controls for vulnerability 2. b. An asset with a value of 80 and 1 vulnerability with a likelihood of 1.0; A security control mitigates the risk by 25%. c. An asset with a value of 40 and 3 vulnerabilities; Vulnerability 1 has a likelihood of 0.8 of occurring, vulnerability 2 a likelihood of 0.4 and vulnerability 3 has a likelihood of 0.9. There is a control that mitigates the risk associated with vulnerability 3 by 50% d. An asset with a value of 90 and no vulnerabilities.

Answers

Option b should be dealt with first.

b. An asset with a value of 80 and 1 vulnerability with a likelihood of 1.0; A security control mitigates the risk by 25%

How to explain this

The asset has a value of 80 and a vulnerability with a likelihood of 1.0, meaning it's almost certain to be exploited. Even though there is a security control that mitigates the risk by 25%, 75% of the risk still remains, which is substantial given the high value of the asset.

Options a and c have assets with lower values and vulnerabilities with lower likelihoods, and option d has an asset with a higher value but no vulnerabilities. Addressing the asset in option b first will reduce the overall risk in the most effective way.

Read more about assets here:

https://brainly.com/question/27972503

#SPJ1

Latonya wants to include a website link in her newsletter so readers can click the link and go straight to the website. What kind of formatting does she need to use

Answers

Based on the information given the kind of formatting she need to use is hyperlink.

Hyperlink is link that enables users or readers to go directly to another website or another webpage.

Hyperlink can be included in a website in form of  text or in form of a bookmark which help to lead  user to another page once the user click on the link.

This link can be included in a webpage or newsletter to serve as a reference for user and they are often  underlined or may include "click here".

Inconclusion  the kind of formatting she need to use is hyperlink.

Learn more about hyperlink here:https://brainly.com/question/3027709

"What type of malware replicates itself from PC to PC throughout the network?" and the options are:
Worm
Trojan
Spyware
Scareware/Ransomware

Answers

The malware that replicates itself from PC to PC throughout the network is called worm.

A worm is a type of malware that replicates itself from computer to computer through networks.

When a worm infects a computer, it searches for vulnerabilities in other computers connected to the same network and then tries to spread to them as well.

Worms can cause significant damage to networks and computers, including stealing sensitive information and causing system crashes or slowdowns.

Therefore, it is essential to have proper security measures in place to prevent worm infections, such as keeping antivirus software up-to-date and regularly patching vulnerabilities.

Know more about malware  here:

https://brainly.com/question/399317

#SPJ11

True or False: While a field extends throughout space, it lessens with distance until it is undetectable. Question 21 options: True False.

Answers

Answer:

true

Explanation:

Which button is not present in the font group Home tab?
-B
-U
-I
-D

Answers

Answer:

-i

Explanation:

is the answer of that question

Answer:

D

Explanation:

This is because B which is bold, U which is underline and I which is italic are present in the font group home tab but D isn`t

When you perform a search, a general search engine searches the entire Internet.
A. True
B. False

Answers

Answer:

a

Explanation:

general search is a

advanced search is b

I need Help. so i start up my desktop hp computer and log in as normal but when i log in i come to a black screen with the taskbar flashing. i tried dism and sfc but neither worked. i tried to reset my pc but it says an error occured please help.

Answers

Answer:

Step 1:

Try to boot into Safe Mode with Networking and perform the Clean Boot.

Press and hold the shift key while clicking on Restart at the login Screen (Bottom right corner).

1. Select Troubleshootand click on Advanced Options.2. Select Startup Settingsand click on Restart.

3. After restarting, choose Enable Safe modewith networking.

If the issue does not persists in Safe Mode, then perform a Clean Boot to check if any third party application is causing the issue, as Clean Boot helps in eliminating software conflicts.

Step 2:

Put the computer in Clean Boot and check if it helps.

By setting your system in Clean Boot state helps in identifying if any third party applications or startup items are causing the issue.

Explanation:

what is application software?

Answers

Answer:

In information technology, an application ( app ), application program or application software is a computer program designed to help people perform an activity. Depending on the activity for which it was designed, an application can manipulate text, numbers, audio, graphics, and a combination of these elements.

Answer:

A set of programs that are used to solve particular problems of the user through computer is called application software.

what is OS and functions of OS ?​

Answers

Answer:

OS is an interface between a computer user and computer hardware. The function of OS is controls the backing store and peripherals such as scanners and printers.

Explanation:

An operating system is a software which performs all the basic tasks like file management, memory management, process management, handling input and output, and controlling peripheral devices such as disk drives and printers.

im doing begginer Python please explain the steps
Write code including a for loop to input 6 numbers of type float one by one and then
print out the position of the largest number. For example, if the numbers are 1.0, 2.5,
2.9, 3.1, 2.8, 1.7, then the number 4 is printed out because the largest number, 3.1,
is in the 4th position. You may assume in the code that exactly 6 numbers are to be
input.

Answers

Here's the step-by-step explanation of the code:

First, we initialize a variable max_number to store the largest number. We also initialize a variable max_position to store the position of the largest number.

We use a for loop to iterate 6 times since we want to input 6 numbers. In each iteration, we prompt the user to enter a number using the input() function.

Inside the loop, we convert the user input to a float using the float() function and store it in a variable number.

We then check if number is greater than the current max_number. If it is, we update max_number to the value of number and update max_position to the current iteration index plus 1 (since the index starts from 0 but we want the position to start from 1).

After the loop finishes, we print out the value of max_position using the print() function.

Here's the code:

python

Copy code

max_number = float('-inf')  # Initialize the largest number as negative infinity

max_position = 0  # Initialize the position of the largest number

for i in range(6):

   number = float(input("Enter a number: "))

   

   if number > max_number:

       max_number = number

       max_position = i + 1

print("The position of the largest number is:", max_position)

When you run the code, it will prompt you to enter 6 numbers one by one. After entering the numbers, it will print out the position of the largest number among the entered numbers.

Learn more about code here:

 https://brainly.com/question/31228987

#SPJ11

Which of these was used as a model service during the development of Twitter?

A)TXTMob

B)Tumblr

C)four square

D)Reddit

Answers

Answer:

tumblr or reddid cuz yeah

I think the answer to this is B.

given the following lines of code, what will be the output, i.e., the value of *(ptr 3)? int intarray[8] ={121, -21, 5, 103, 71, 11, 101, 99}; int *ptr = &intarray[3];

Answers

Based on the given code, the output or the value of *(ptr + 3) will be 11.

Explanation of the first two lines of code followed by a step-by-step explanation of how the output *(ptr + 3) is calculated:

int intarray[8] = {121, -21, 5, 103, 71, 11, 101, 99}; initializes an array named intarray with 8 integer elements: 121, -21, 5, 103, 71, 11, 101, and 99.

int *ptr = &intarray[3]; creates a pointer named ptr that points to the address of the fourth element in the array (intarray[3], which has a value of 103).

Now, let's move on to the explanation of how the output *(ptr + 3) is calculated:

*(ptr + 3) means "the value of the element 3 positions after the element pointed to by ptr."

Since ptr points to intarray[3], *(ptr + 3) will point to intarray[6] which has a value of 11.

To be more specific, ptr + 3 calculates the memory address of the fourth element after the element pointed to by ptr, which is intarray[6]. And by dereferencing the pointer with *(ptr + 3), we get the value stored in intarray[6], which is 11.

So the output or the value of *(ptr + 3) will be 11.

Know more about the pointer click here:

https://brainly.com/question/19570024

#SPJ11

the formula to convert fahrenheit temperature to celsius

Answers

32f=0c
(32f-32)x 5/9=0c

change control should be used to oversee and manage changes over which aspect of an organization? answer it hardware and software personnel and policies every aspect physical environment

Answers

Change control is a process that should be used to oversee and manage changes across every aspect of an organization, including hardware and software, personnel and policies, and even the physical environment.

It is important to understand that change is a constant in today's business world and it affects every aspect of an organization. Therefore, change control is a crucial process that ensures that any changes made in the organization are properly planned, tested, approved, and implemented in a way that minimizes risk and maximizes benefits. When it comes to hardware and software, change control is used to ensure that any changes made to the organization's IT infrastructure are properly managed and documented. This includes everything from upgrading software applications to replacing hardware components. Personnel changes, such as hiring new employees or restructuring existing teams, should also be managed through the change control process to ensure that the organization's overall goals and objectives are being met.

Policies are another aspect of an organization that should be managed through change control. Any changes to policies, procedures, or guidelines should be properly planned, reviewed, and approved before implementation. This helps to ensure that the organization is compliant with regulatory requirements and that employees are aware of any changes to the policies that may affect their work. Finally, the physical environment of an organization can also be subject to changes that need to be managed through change control. This includes everything from office relocations to changes in the layout of workspaces. Change control helps to ensure that any changes to the physical environment are properly planned, communicated, and executed to minimize disruption to employees and customers.

In summary, change control should be used to oversee and manage changes across every aspect of an organization. This includes hardware and software, personnel and policies, and even the physical environment. By properly managing change, organizations can minimize risk, maximize benefits, and ensure that they are meeting their overall goals and objectives.

Learn more about software here: https://brainly.com/question/985406

#SPJ11

Jack is shooting a scene with a horse running in an open field. Which angle or shooting technique should he use to show the horse in motion?

NO LINKS!!!!

A. Zoom shot
B. Crane shot
C. Tracking shot
D. Panning shot

Answers

Answer:

I would say a panning shot because when you "pan" the camera you're following the object that's moving.

hope this helps! ♥

Procedural abstraction allows the programmer to change the internals of the procedure without needing to notify users of the change as long as it does the same thing as before. Why would a programmer want to make changes to a procedure if it already works as intended

Answers

Answer:

All of the options are true

Explanation:

The cost of repairing a new desk's leg--broken accidentally by an employee moving the desk into place--is expensed immediately.

Answers

The cost of repairing a new desk's broken leg, caused by an employee moving the desk into place, is expensed immediately. This ensures that expenses are matched with the period in which they occur, following the accounting principle of matching.

The cost of repairing a new desk's leg, which was broken accidentally by an employee while moving the desk into place, is expensed immediately. This means that the cost of the repair will be recognized as an expense on the company's financial statements in the period in which it occurred.

Expensing the repair immediately is in line with the matching principle in accounting, which states that expenses should be recognized in the same period as the related revenues. Since the broken leg was a result of moving the desk into place, it can be considered a cost directly related to the acquisition of the desk and therefore should be expensed immediately.

To provide a clearer explanation, let's consider an example: Suppose a company purchased a new desk for $1,000. While an employee was moving the desk, one of its legs broke. The cost of repairing the leg is $200. In this case, the company would recognize a $200 expense in the period the leg broke, reducing the overall value of the desk to $800.

To know more about expenses visit:

brainly.com/question/29850561

#SPJ11

to reverse the last change you made in a presentation file you click the undo button on the quick access toolbar true or false?

Answers

Is true because you are trying to take something you don’t want

Falling If the user doesn't do anything, the player sprite should fall. Do This • Find the code comment // FALLING . • Use the counter pattern with the player sprite's velocityy to make the flyer fall. Test your code to make sure that it works. The sprite should fall faster as it goes down the . screen. Toolbox ♡ Workspace World Sprites 1 77 GAME SETUP Drawing Control 2 // create player, target, and obstacles Math Variables 3 var rock = createSprite(109 100) var sprite = createSpritex, 4 rock.scale = 0.5; sprite.setAnimation (label) 5 var player createSprite(200, 100) 1: player.setAnimation "fly_bot"); sprite.x 6​

Answers

sdcyecreat nobody cares because nobody asked nobody likes you I’m just kidding I love you so much have a great day

Gary is sending a message to Patricia. He wants to ensure that nobody tampers with the message whille it is in transit. What goal of cryptography is Gary attempting to achieve? A. Confidentiality B. Integrity C. Authentication D. Non-repudiation

Answers

The goal of cryptography that Gary is attempting to achieve is integrity.

So, the correct answer is B.

Integrity ensures that the message remains unaltered and authentic during transit. Gary wants to make sure that nobody tampers with the message while it is being transmitted.

Cryptography helps in achieving this by using various techniques such as digital signatures, message authentication codes, and hash functions. These techniques ensure that the message remains intact and any attempt to modify it is detected.

Cryptography also provides other goals such as confidentiality, authentication, and non-repudiation, but in this scenario, the primary goal is to maintain the integrity of the message.

Hence, the answer of the question is B.

Learn more about cryptography at https://brainly.com/question/31732516

#SPJ11

This OS integrated the processing power of Windows NT with the easy-to-use GUI of Windows 98.


Windows Millennium Edition

Windows 2000

Windows for Workgroups

Windows 3.11

Answers

It’s the first one 3.11.132

graham drove 39 2/3 miles in 1 1/3 hours. What is the unit rate for miles per hour? Use a pencile and paper. Describe a situation in which the unit rate would be easier to work with than the given rate.​

Answers

Answer:

29.75 mph

Explanation:

(39 2/3) / (1 1/3) = 29.75

The unit rate is useful if you want to do calculations for arbitrary times or distances.

which of the following specifications replaces wep with a stronger security standard that features changing encryption keys? group of answer choices O vpn O utm O aup O wpa2 O tlsAnswer: WPA2

Answers

The specifications that replaces wep with a stronger security standard that features changing encryption keys is option C: WPA2.

What is WPA2 (Wi-Fi Protected Access 2)?

The encrypted security technology known as WPA2 (Wi-Fi Protected Access 2) guards internet traffic on wireless networks. The Wi-Fi Protected Access security protocol's second iteration, WPA2, fixes earlier issues and provides stronger encryption.

Note that the purpose of security standards is to increase the security of information technology.  Hence, one can say that a security standard is "a published specification that establishes a common language, contains a technical specification or other precise criteria and is designed to be used consistently, as a rule, a guideline, or a definition."

Learn more about security standard fromhttps://brainly.com/question/14559510
#SPJ1

On

June

​15,

2023​,

Wonderful

Furniture discarded equipment that had a cost of

$10,000​,

a residual value of​ $0, and was fully depreciated. Journalize the disposal of the equipment. ​(Record debits​ first, then credits. Select the explanation on the last line of the journal entry​ table.)

Date

Accounts and Explanation

Debit

Credit

Jun. 15

Answers

The accumulated Depreciation account is debited with $10,000. The Equipment account is credited with $10,000.

Journal entry for the disposal of equipment with a cost of $10,000, residual value of $0, and fully depreciated:

Date               Accounts and Explanation      Debit   Credit

Jun. 15         Accumulated Depreciation         $10,000

                    Equipment                                    $10,000

In this journal entry, the Accumulated Depreciation account is debited with $10,000, representing the accumulated depreciation on the equipment. The Equipment account is credited with $10,000 to remove the equipment from the company's books.

When equipment is fully depreciated and discarded with no residual value, it means that the company has used up the entire cost of the equipment through depreciation and no longer considers it as an asset. Therefore, the disposal of the equipment requires recording the removal of its accumulated depreciation and eliminating its cost from the books.

By debiting the Accumulated Depreciation account, the company recognizes that the equipment's total accumulated depreciation is no longer applicable. This reduces the accumulated depreciation balance on the balance sheet. On the other hand, the Equipment account is credited to remove the equipment's cost from the balance sheet entirely. This ensures that the financial statements reflect the disposal of the fully depreciated equipment accurately.

It's important to note that the specific accounts and amounts used in the journal entry may vary depending on the company's accounting policies and practices. Additionally, consulting with an accounting professional or referring to the company's specific financial reporting guidelines is recommended for accurate recording of such transactions using newer technology.

Learn more about technology here:

brainly.com/question/9171028

#SPJ11

Whose work is responsible for the invention of the air bag? Scientist, Engineers or both?

Answers

The scientist and the engineers were both responsible for the invention of the airbag.

Peter Florhancicn was a scientist and he invented the airbag because of the Dutch people who drowned when they drove into the canals

Also, John Hetrick who was an engineer filed for the patent of airbags when he saw that deers were running across the road. He believed that it could cause an accidentthat led to the invention.

In conclusion, both the engineers and the scientists were responsible.

Read related link on:

https://brainly.com/question/24686827

1.What is the term referring to an amount of money that is owed?

Answers

Answer:

debt

Explanation:

ur welcome brody

Answer:

Debt?

Explanation:

Which NIST security publications was recently revised in 2017, over 20 years after the being created? SP 800-18 OSP 800-14 SP 800-184 SP 800-12 When using the U.S. military classification scheme, which classification indicates that disclosure of contained information could cause minor or moderate damage to national security? Need-to-know Top secret data For official use only Confidential data

Answers

The NIST security publication that was revised in 2017, over 20 years after being created, is SP 800-12.

The NIST security publication that was recently revised in 2017, over 20 years after being created, is SP 800-12. This publication provides guidelines for computer security, including risk management and security planning.

When using the U.S. military classification scheme, the classification that indicates that disclosure of contained information could cause minor or moderate damage to national security is Confidential data. This classification is used for information that requires protection but is not considered as sensitive as Top Secret or For Official Use Only (FOUO) data.

To know more about NIST visit:

https://brainly.com/question/31142150

#SPJ11

Other Questions
A 30-year bond has a 3% annual coupon (with semiannual payments). If interest rates on comparable 30 -year bonds fall by 50 basis points to 2.5%, what will happen to the price of this bond (for every $100 of face value)? Briefly explain why the price changes in this way. B) If the yield on a 5-year bond is 4%, and the yield on a oneyear is 3.2%, what is the average of the implied one-year forward rates over the next four years? If I expect one-year rates to average 3.7% over the next four years, and I'm looking to issue bonds over a 5 -year horizon, should I issue the 5-year or the one-year and then issue one-years again in each of the next four years? C) If the expectations hypothesis of the yield curve holds, and the one-year rate is 2%, and the one-year rate is expected to be 1.4% one year from now, what is the two-year yield today? D) If the 10 -year yield is 3.5%, and consists of a term premium of 0.4%, are ST rates expected to be above or below implied forward ST rates? The area of a circle is found by the equation A=r^2. If the area of a certain circle is 25 square inches, find it's radius r Using the Paul Revere Ride map, where did Revere's Ride begin and in which general direction did he travel? 1. If a cart with a mass of 5 kg is accelerated at a rate of 12 m/s/s, then what is theNUMERICAL value for the force? What is the solution to the system of equations graphed below? y = -2x - 3 y = 3x + 2 O A. (-1,1) B. (0,2) (Agricultural )engineers are also known as biological engineers. In the triangle shown, the measure of angle A is 65.B65Choose all of the statements that are sufficient to determine that A ABC is an isosceles triangle.m2B = 25B. MzB = 50OOOOC. m C = 65D.AC = 65 unitsE. AB = BC = 25 unitsSRESETCynthia D Moreno, ID#****80Growth: Math 6+ TX 2012Question #8 Which one is the dependent variable in distance, force, or work Today you are just notified that you won a prize that gives you a total of 5 annual cash awards of $1,000 each, with the first award being made one year from today. You decide to save each of them in the bank and after the last cash award keep all the money saved until a future date. The bank pays a nominal annual interest rate of 15%. How much your account with the bank be if you leave the money in the bank to be withdrawn all in 12 years from today? Round to the nearest $0.01 but do not use the $ sign. DO NOT USE commas to separate thousands. For example if you obtain $1.432.728 then enter 1433.73; if you obtain $432 then enter 432.00 2.75 rounded to two decimal places URGENT Which one is a better measure of the economic performance of a country? The number of hours a student spent studying each week for 9 weeks is shown. 5, 9.5, 3, 12, 6, 8, 4.5, 10, 6.5 What is the value of the range for this set of data? 36.5912 I need help on this Read the passage, then answer the question.The argument is, that different natures have different uses, and the natures of men and women are said to differ. . . . We do not consider that the difference may be purely nominal and accidental; for example, a bald man and a hairy man are opposed in a single point of view, but you cannot infer that because a bald man is a cobbler a hairy man ought not to be a cobbler. The Republic, PlatoWhat does Plato mean by "different natures have different uses?Men and women have different hair.Men and women have different roles.Men and women have different ideas.Men and women have different points of view. A British colonist with which skill would be most likely to find work in NewEngland?A. Fur trappingB. Horseback ridingC. Management of farm laborersD. Crop harvesting 4. What kind of sequence is the pattern 15, 17, 20, 24, 29, ...? *is it an arithmetic or geometric sequence? produces two goods, A and B. If they produce the goods jointly, the total cost is TC = 100 + 50QAQB - VQAQB If they produce the goods separately, the total cost of producing good A is TC = 75 + 3000QA + 1000QB + QA? + QB? If the firm produces at QA = 40 2 and QB = 100 then the firm should produce the goods because of ___ of scope.a. separately; diseconomies b. jointly; diseconomiesc. separately; economies d. jointly; economies Is flea treatment every 4 weeks?. help pls NO LINKS OR IF YOU DONT HAVE AN ANWSER DONT ANWSER PLS help, I don't know if its right or wrong