The editor serves as both a creative and technical role. True False

Answers

Answer 1

Answer:

True

Explanation:


Related Questions

any computer and technology experts?


1. what is a file
2. what is a folder
3. what is a subfolder
4. how files are organized in folders and subfolders
5. what is a file extension
6. types of file extensions
7.the importance of file extensions

Answers

Answer:

file is the common storage unit in a computer, and all programs and data are "written" into a file and "read" from a file. A folder holds one or more files, and a folder can be empty until it is filled. A folder can also contain other folders, and there can be many levels of folders within folders.

a subfolder is an organizational folder on a computer that is located within another folder

Explanation:

sorry i dont know all

NG STOCK MARKET FRAUD
Assignment Directions
1. For this assignment, you will explore securities or stock market fraud. Title your assignment "Stock Fraud" and ther
list the case you analyzed.
2. Visit the SEC Web site. Select and read through one of the actions against Enron.
Submission Requirements
1. Write a summary of the facts of the case, your understanding of all security law violations, and any settlement or
payment made to the stock-holders or others. Explore her online sources to get additional information.
2. The paper must be between one and two pages in length, double spaced, and with one-inch margins. Be sure to
include a reference page.
e.owschools.com/owsoo/studentAssignment/index?eh-390541091 #section Tab you like to do next?

Answers

Stock market fraud refers to the fraudulent practice of manipulating stock prices and the market. The Nigerian Stock Market Fraud, also known as the N14 billion stock fraud, is one of the most notorious cases of stock market fraud that happened in Nigeria.

It occurred between 2001 and 2002 and involved some of Nigeria’s most influential figures, including stockbrokers, top executives of blue-chip companies, and bankers.The Nigerian Stock Market Fraud is one of the largest stock market scandals in the world. It was the result of a lack of regulation and oversight in the Nigerian stock market, which allowed fraudulent practices to thrive.

The Securities and Exchange Commission (SEC) is the regulatory body responsible for regulating the Nigerian Stock Exchange. However, the SEC was ineffective in preventing the fraud from occurring, and many of its officials were implicated in the scandal.The N14 billion stock fraud involved the manipulation of stock prices, insider trading, and market rigging.

The fraudsters would inflate the price of stocks artificially, then sell the stocks to unsuspecting investors at inflated prices. They would then use the proceeds from the sale of the stocks to buy more stocks, further inflating the prices.

The fraudsters also engaged in insider trading, where they would use insider information to make trades in the stock market. This gave them an unfair advantage over other investors and allowed them to make huge profits from their trades.

In conclusion, the Nigerian Stock Market Fraud was a result of a lack of regulation and oversight in the Nigerian stock market. The SEC was ineffective in preventing the fraud from occurring, and many of its officials were implicated in the scandal. The fraudsters engaged in the manipulation of stock prices, insider trading, and market rigging.

For more such questions on Stock market, click on:

https://brainly.com/question/690070

#SPJ8

Control structures are used while performing everyday tasks.
If you had to make a choice between studies and games during a holiday, you would use the
your name and address on ten assignment books, you would use the
control structure.
ghts reserved.
Reset
O
>
Next
control structure. If you had to fill

Answers

Control structures are merely a means of defining the direction of control in programs.

Thus, Any algorithm or program that makes use of self-contained modules known as logic or control structures will be easier to understand and comprehend. On the basis of particular criteria or conditions, it essentially examines and selects the direction in which a program flows.

As the name implies, sequential logic follows a serial or sequential flow, and the flow is determined by the set of instructions that are delivered to the computer. The modules are performed in the obvious order unless further instructions are specified and control structures.

Sequences can be explicitly stated by using numbered steps. implicitly adheres to the writing of modules as well. The majority of processes, including some complicated issues, will typically adhere to this fundamental flow pattern and program.

Thus, Control structures are merely a means of defining the direction of control in programs.

Learn more about Control structure, refer to the link:

https://brainly.com/question/27960688

#SPJ1

Discuss what is dominance relationship​

Answers

Answer:

dominance is a relationship between two alleles of a particular allele of a gene and their associated phenotypes.

The concept of dominance has recently attracted much interest in the context of skyline computation. Given an N dimensional data set s a point p is said to dominate q, I'd p is better than q in atheist one dimension and equal to or better than it remaining dimensions.

6. What are the arguments, pros and cons, for Python's use of indentation to specify compound statements in control statements

Answers

Answer:

\(beinggreat78~here~to~help.\)

In some cases, one con is that it can be hard to keep track of your identation when coding long lines or blocks. The pro is that you may need to learn, which is not a bad thing. Learning is good.

a student received a poor grade on her last two language art tests. what are the steps she should take for solving this problem
PLEASE HURRYYYY!

Answers

Answer:

Study and do practice tests

Virtualization:

a. can boost server utilization rates to 70% or higher.
b. has enabled microprocessor manufacturers to reduce the size of transistors to the width of an atom.
c. uses the principles of quantum physics to represent data.
d. allows smartphones to run full-fledged operating systems.
e. allows one operating system to manage several physical machines.

Answers

The answer: A

If you would like to understand more on this, I have found an excellent quizlet.
Search this up: Using IS for Bus. Problems chp.5 practice quiz

What's the full meaning of COBOL,FORTRAN,PL1,dBASE,ALGOL,RRG,APL,LISP,PROLOG,PASCAL in high level programming​

Answers

Answer:

this doesn't scare me

Explanation:

COBOL(Common Business-Oriented Language) is a high-level programming language for business applications. It was the first popular language designed to be operating system-agnostic and is still in use in many financial and business applications today

FORTRON(FORmula TRANslation) general-purpose, compiled imperative programming language that is especially suited to numeric computation and scientific computing.

(Programming Language One) procedural, imperative computer programming language developed and published by IBM

dBASE( arbitrary name) was one of the first database management systems for microcomputers

... look mister I got tons of anime to watch

5.3.8 higher/lower 2.0

Answers

The code that configures Higher /Lower (Guessing Game) is

secret_number = 3.3312

while True:

guess = float(input("Enter a guess: "))

if round(guess, 2) == round(secret_number, 2):

print "Correct!"

break

elif (guess > secret_number):

print "Too high!"

else:

print "Too low!"

How does the above code work?

The Python code implements a guessing game where users enter their guesses.

It compares the guesses to a secret number and provides feedback if the guess is too high or too low. The game continues until the correct guess is made, displaying "Correct!" as the output.

Learn more about code at:

https://brainly.com/question/26134656

#SPJ1

Mai has recently created her own e-mail account. Her father gave her permission to e-mail her friends and family but warned her that it is dangerous to open e-mails from people she does not know. Mai did not understand why her father would give her this warning. Why did Mai’s father say it is dangerous to open e-mails from unknown senders? Check all that apply. The sender could be a hacker. The e-mail could be inappropriate. The e-mails usually contain jokes. The e-mail may belong to someone else The message may contain a virus.

Answers

Answer:

I think the last 1 or the 2nd one

Explanation:sorry if im wrong TwT

Answer:A,B,E

Explanation:

Because I just took the quiz

foot pad, starting mark, handle, and hook are all pieces of what tool?

A. Conduit locknut
B. PVC cutter
C. Bender
D. Fish tape

Answers

Answer:

Explanation:

b

The answer is "ENGINE ROOM TOOLS".

Engine Room Tools, 1949, is indeed a training book, focusing here on the proper use of tools onboard vessels. It is remarkable since it contains equipment unique to the marine industry.

This machinery has a history that marine experts should thoroughly research.This history will teach you a lot about machinery's previous experiences, including severe accidents, difficulties, and refurbishing operations.

Therefore, Each engine room has a footpad, the starting line, a handle, and a hook.

Learn more:

brainly.com/question/1101514

foot pad, starting mark, handle, and hook are all pieces of what tool?A. Conduit locknutB. PVC cutterC.

Write a split check function that returns the amount that each diner must pay to cover the cost of the meal The function has 4 parameters:
1. bill: The amount of the bill,
2. people. The number of diners to split the bill between
3. tax_percentage: The extra tax percentage to add to the bill.
4. tip_percentage: The extra tip percentage to add to the bill.
The tax or tip percentages are optional and may not be given when caling split_check. Use default parameter values of 0.15 (15%) for tip percentage, and 0.09 (9%) for tax_percentage
Sample output with inputs: 252
Cost per diner: 15.5
Sample output with inputs: 100 2 0.075 0.20
Cost per diner: 63.75
1 # FIXME: write the split.check function: HINT: Calculate the amount of tip and tax,
2 # add to the bill total, then divide by the number of diners
3.
4. Your solution goes here
5.
6. bill - float(input)
7. people intinout)
8.
9. Cost per diner at the default tax and tip percentages
10. print('Cost per diner: split_check(bill, people))
11.
12. bill - float(input)
13. people int(input)
14. newtax_percentage - float(input)
15. nen_tip percentage float(input)
16.
17. Oust per dinero different tox and tip percentage
18. print('Cost per diner: split checkbull people, new tax percentage, new tip percentage)

Answers

Answer:

def split_check(bill, people, tax_percentage = 0.09, tip_percentage = 0.15):

   tip = bill * tip_percentage

   tax = bill * tax_percentage

   total = bill + tip + tax

   

   return total / people

bill = float(input())

people = int(input())

print("Cost per diner: " + str(split_check(bill, people)))

bill = float(input())

people = int(input())

new_tax_percentage = float(input())

new_tip_percentage = float(input())

print("Cost per diner: " + str(split_check(bill, people, new_tax_percentage, new_tip_percentage)))

Explanation:

Create a function called split_check that takes four parameters, bill, people, tax_percentage and tip_percentage (last two parameters are optional)

Inside the function, calculate the tip and tax using the percentages. Calculate the total by adding bill, tip and tax. Then, return the result of total divided by the number of people, corresponds to the cost per person.

For the first call of the function, get the bill and people from the user and use the default parameters for the tip_percentage and tax_percentage. Print the result.

For the second call of the function, get the bill, people, new_tip_percentage and new_tax_percentage from the user. Print the result.

def split_check(bill, people, tax_percentage = 0.09, tip_percentage = 0.15):

  tip = bill * tip_percentage

  tax = bill * tax_percentage

  total = bill + tip + tax

 

  return total / people

bill = float(input())

people = int(input())

print("Cost per diner: " + str(split_check(bill, people)))

bill = float(input())

people = int(input())

new_tax_percentage = float(input())

new_tip_percentage = float(input())

print("Cost per diner: " + str(split_check(bill, people, new_tax_percentage, new_tip_percentage)))

Create a function called split_check that takes four parameters, bill, people, tax_percentage and tip_percentage (last two parameters are optional)

Inside the function, calculate the tip and tax using the percentages. Calculate the total by adding bill, tip and tax. Then, return the result of total divided by the number of people, corresponds to the cost per person.

For the first call of the function, get the bill and people from the user and use the default parameters for the tip_percentage and tax_percentage. Print the result.

For the second call of the function, get the bill, people, new_tip_percentage and new_tax_percentage from the user. Print the result.

Learn more about function on:

https://brainly.com/question/30721594

#SPJ6

And office now has a total of 35 employees 11 were added last year the year prior there was a 500% increase in staff how many staff members were in the office before the increase

Answers

There were 5 staff members in the office before the increase.

To find the number of staff members in the office before the increase, we can work backward from the given information.

Let's start with the current total of 35 employees. It is stated that 11 employees were added last year.

Therefore, if we subtract 11 from the current total, we can determine the number of employees before the addition: 35 - 11 = 24.

Moving on to the information about the year prior, it states that there was a 500% increase in staff.

To calculate this, we need to find the original number of employees and then determine what 500% of that number is.

Let's assume the original number of employees before the increase was x.

If we had a 500% increase, it means the number of employees multiplied by 5. So, we can write the equation:

5 * x = 24

Dividing both sides of the equation by 5, we find:

x = 24 / 5 = 4.8

However, the number of employees cannot be a fraction or a decimal, so we round it to the nearest whole number.

Thus, before the increase, there were 5 employees in the office.

For more questions on staff members

https://brainly.com/question/30298095

#SPJ8

Make sure your animal_list.py program prints the following things, in this order:
The list of animals 1.0
The number of animals in the list 1.0
The number of dogs in the list 1.0
The list reversed 1.0
The list sorted alphabetically 1.0
The list of animals with “bear” added to the end 1.0
The list of animals with “lion” added at the beginning 1.0
The list of animals after “elephant” is removed 1.0
The bear being removed, and the list of animals with "bear" removed 1.0
The lion being removed, and the list of animals with "lion" removed

Need the code promise brainliest plus 100 points

Answers

Answer:#Animal List animals = ["monkey","dog","cat","elephant","armadillo"]print("These are the animals in the:\n",animals)print("The number of animals in the list:\n", len(animals))print("The number of dogs in the list:\n",animals.count("dog"))animals.reverse()print("The list reversed:\n",animals)animals.sort()print("Here's the list sorted alphabetically:\n",animals)animals.append("bear")print("The new list of animals:\n",animals)

Explanation:

Select the qualification that is best demonstrated in each example.
Ginny carefully reviews the code in a program to make sure there are no errors.
Walker identifies why a program isn't working correctly and fixes it.
Donnell reviews code to help out a coworker who is in a hurry.
Hisako teaches herself a new programming technique.

Select the qualification that is best demonstrated in each example.Ginny carefully reviews the code in

Answers

Answer:

1. attention to detail

2.problem solving skills

3. teamwork

4. the ability to learn quickly

Explanation:

Answer:

2, 3, 2, 2

Explanation:

answer above was correct:)

Explain the working operation of Wi-Fi and hotspots in provision of broadband services

Answers

╭── ⋅ ⋅ ── ✩ ── ⋅ ⋅ ──╮

Hello, This is My explanation!

-----------------------------------------------------

A WiFi hotspot is a location that has been provided to give users the opportunity to use their devices away from their homes. These hotspots became popular over a decades ago at eating establishments such as cafes and are now found anywhere people wish to use them. (malls, airports,hotels,stores,restaurants,etc).

-----------------------------------------------------

Hope this Helped!

╰── ⋅ ⋅ ── ✩ ── ⋅ ⋅ ──╯

in the evolution of the internet which event occurred most recently ?

Answers

Answer:

The real answer is: Web 2.0 replaced the World Wide Web.

Explanation:

a p e x

The World Wide Web was succeeded by Web 2.0, which is often referred to as the internet and was the most recent development.

What is Web 2.0?

Websites that emphasize user-generated content, usability, participatory culture, and interoperability for end users are known as “Web 2.0” sites.

On the internet, the greater user interaction and cooperation, more ubiquitous network connectivity, and improved communication channels are characteristics of web 2.0.

Darcy DiNucci initially used the phrase in 1999, while Tim O'Reilly and Dale Dougherty popularized it in late 2004 at the inaugural Web 2.0 Conference. A Web 2.0 website enables on the internet users to communicate and work together as co-creators of user-generated content in a virtual community through social media discussion.

Therefore, it is Web 2.0.

To learn more about the internet, refer to:

https://brainly.com/question/13308791

#SPJ6

What Was the first video game ever made? WORTH 98 POINTS

Answers

Answer:

Hello! :))

Your Answer is Pong.

Explanation:

It was  October 1958, Physicist William Higinbotham created the first video game. It was a  tennis game, similar to the classic 1970s video game Pong, and it was quite a success I must say. :D

I believe it is pong

xamine the following output:

Reply from 64.78.193.84: bytes=32 time=86ms TTL=115
Reply from 64.78.193.84: bytes=32 time=43ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=47ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=73ms TTL=115
Reply from 64.78.193.84: bytes=32 time=46ms TTL=115

Which of the following utilities produced this output?

Answers

The output provided appears to be from the "ping" utility.

How is this so?

Ping is a network diagnostic   tool used to test the connectivity between two network devices,typically using the Internet Control Message Protocol (ICMP).

In this case, the output shows   the successful replies received from the IP address 64.78.193.84,along with the response time and time-to-live (TTL) value.

Ping is commonly used to troubleshoot   network connectivity issues and measureround-trip times to a specific destination.

Learn more about utilities  at:

https://brainly.com/question/30049978

#SPJ1

How SPARQL 1.1 has advantage over SPARQL 1.0??​

Answers

SPARQL 1.0 became an official W3C Recommendation on 15 January 2008. On 26 March 2013, the SPARQL Working Group has produced a new W3C Recommendation SPARQL 1.1 that introduces more features to 2008 version. SPARQL is emerging as the de facto RDF query language. Prior to SPARQL, there were some other popular RDF query languages, such as RQL, SeRQL, TRIPLE, RDQL, and so on. The comprehensive...

from the following list, select all the ways in which improvements in mis technologies and tools are likely to affect managers who telecommute.

Answers

They will be able to perform more duties on their mobile phones, and they will be subjected to additional work obligations in their spare time.

What exactly are MIS and tools?

Management information systems is the study of people, technology, organisations, and their interactions (MIS). MIS professionals help firms make the most of their investments in people, technology, and operational procedures. MIS is a people-oriented industry that focuses on providing services via the use of technology. If you're interested in technology and want to use it to improve people's lives, a degree in MIS could be for you.

Businesses employ information systems at various levels of operation to collect, process, and store data. Management gathers and disseminates this data into the necessary information.

To know more about MIS visit:

brainly.com/question/12977871

#SPJ4

Briefly explain the risks we face in augmented reality,iot and AI​

Answers

Augmented Reality (AR), Internet of Things (IoT), and Artificial Intelligence (AI) are all cutting-edge technologies that offer many benefits, but they also come with certain risks. Some of the main risks associated with these technologies include:

Augmented Reality: One of the main risks associated with AR is that it can distract users from their real-world surroundings, potentially leading to accidents or injuries. Additionally, AR can also be used to spread misinformation or to manipulate people's perceptions of the world.

Internet of Things: The IoT is vulnerable to cyber attacks, as the interconnected nature of these devices makes them an attractive target for hackers. A security breach of an IoT device can lead to the loss of sensitive information or to unauthorized control of the device.

Artificial Intelligence: AI systems can be trained on biased data, which can lead to biased decisions, particularly in sensitive areas such as criminal justice or hiring. Additionally, AI can be used to automate certain tasks, which can displace jobs, and its usage can be used for malicious intent like spreading misinformation, hacking and surveillance.

It's important to keep in mind that these are not exhaustive lists, and there are other risks associated with these technologies. It is crucial to be aware of these risks and to take the appropriate measures to mitigate them.

The graphical user interface (GUI) was pioneered in the mid-1970s by researchers at:

A) Apple Computer

B) Microsoft

C) Xerox

D) IBM

Answers

Answer:

its C actually

Explanation:

C) Xerox plus i had a quiz

Answer:

xerox

Explanation:

Drag the tiles to the correct boxes to complete the pairs.
Match the elements of a network to their descriptions.

Drag the tiles to the correct boxes to complete the pairs.Match the elements of a network to their descriptions.

Answers

Answer:

software

client devices

hardware

Explanation:

Plzzzzzzzzzzzzz give me brainiest

true or false. Two of the main differences between storage and memory is that storage is usually very expensive, but very fast to access.​

Answers

Answer:

False. in fact, the two main differences would have to be that memory is violate, meaning that data is lost when the power is turned off and also memory is faster to access than storage.

How technology works?

Answers

First of all, technology refers to the use of technical and scientific knowledge to create, monitor, and design machinery. Also, technology helps in making other goods.

When you link two tasks using the Link Tasks feature on the Task tab, Microsoft Project creates a _____ link.

Answers

A finish-to-start link is created by Microsoft Project when you link two tasks using the Link Tasks feature on the Task tab.

What is Microsoft Project?

Microsoft Project can be defined as a project management software product that is designed an developed by Microsoft Inc., so as to assist project managers in achieving the following project tasks:

Developing a schedule.Analyzing workloads.Assigning resources to tasks.Tracking project progress.Managing their project budget.

On Microsoft Project, a finish-to-start link is primarily created when you link two tasks using the Link Tasks feature on the Task tab.

Read more on project management here: https://brainly.com/question/6500846

During an investigation, a security manager receives notification from local authorities that company proprietary data was found on a former employees home computer. The former employee's corporate workstation has since been repurposed, and the data on the hard drive has been overwritten. Which of the following would BEST provide the security manager with enough details to
determine when the data was removed from the company network?
A. Properly configured hosts with security logging
B. Properly configured endpoint security tool with darting
C. Properly configured SIEM with retention policies
D. Properly configured USB blocker with encryption

Answers

The option that would best provide the security manager with enough details to determine when the data was removed from the company network is Properly configured SIEM (Security Information and Event Management) with retention policies.The correct answer is option C.

A properly configured SIEM collects and analyzes security event logs from various sources within the network, such as firewalls, intrusion detection systems, and servers. It provides a centralized view of security events and allows for the correlation of events across multiple systems.

By having retention policies in place, the SIEM would retain security event logs for a specific period of time. This would enable the security manager to review the logs and identify any suspicious activities or indicators of data exfiltration.

In the given scenario, the security manager can examine the SIEM logs to determine if there were any unusual or unauthorized activities associated with the former employee's account.

They can identify if the employee accessed the company network or transferred data during a specific timeframe. This information can help narrow down when the data was removed from the network.

It is important to note that properly configuring the SIEM and setting appropriate retention policies is crucial for effective incident response and investigation.

Without proper configuration and retention policies, the SIEM may not have the necessary data or the ability to correlate events accurately, limiting the security manager's ability to determine when the data was removed.

Therefore,The correct answer is option C.

For more such questions data,click on

https://brainly.com/question/29621691

#SPJ8

Write pseudocode for a new implementation o BFS that uses an adiacencv matrix instead of an aclacency nst.Find the time complexity of this new version and compare it to the version seen in class. Under what circumstances are they equally efficient?

Answers

Pseudocode for the new implementation of BFS using an adjacency matrix:

```

BFS(adjacency_matrix, start_node):

   Create a queue and enqueue the start_node

   Create a visited array and mark the start_node as visited

   While the queue is not empty:

       Dequeue a node from the queue

       Process the node

       For each adjacent node in the adjacency matrix:

           If the adjacent node is not visited:

               Mark the adjacent node as visited

               Enqueue the adjacent node

```

The time complexity of this new version of BFS using an adjacency matrix is O(V^2), where V is the number of vertices. This is because we need to iterate over each element in the adjacency matrix to check the connections between nodes. In the worst case, we may need to visit every entry in the matrix, resulting in a quadratic time complexity.

In comparison, the version of BFS seen in class using an adjacency list has a time complexity of O(V + E), where V is the number of vertices and E is the number of edges. This version is more efficient because it only visits the nodes and edges that are present in the graph, rather than iterating over all possible connections as in the adjacency matrix implementation.

The two versions are equally efficient when the graph is dense and the number of edges approaches the maximum possible value of V^2. In this scenario, the time complexity of both implementations becomes similar, as the number of iterations required in the adjacency matrix version is comparable to the number of edges in the adjacency list version. However, in most practical cases, where the graph is sparse (fewer edges compared to the total possible connections), the adjacency list version is more efficient.

For more such answers on Pseudocode

https://brainly.com/question/24953880

#SPJ8

Help picture for 25 points

 Help picture for 25 points

Answers

Divide one number by the other, then multiply the result by 100 to get the percentage of the two numbers.

Explain about the Percentage?

Holding down Shift while pressing the 5 key at the top of the keyboard will produce a percent symbol on a U.S. keyboard. You can also construct a percent by using the Alt code Alt +37.

To open the Format Cells dialogue box, click the icon next to Number in the Number group on the Home tab. Click Percentage in the Category list of the Format Cells dialogue box. Enter the number of decimal places you want to display in the Decimal places box.

The percent sign is found on the numeral 5 key, which is placed above the R and T on a US keyboard layout. Press the 5 key while holding down the Shift key to insert%.

To learn more about Percentage refer to:

https://brainly.com/question/24877689

#SPJ1

Other Questions
b. what is the dollar-weighted rate of return? (hint: carefully prepare a chart of cash flows for the four dates corresponding to the turns of the year for january 1, 2019, to january 1, 2022. if your calculator cannot calculate irr, you will have to use trial and error or a spreadsheet program.) (round your answer to 4 decimal places. negative amount should be indicated by a minus sign.) With regard to laboratory tests and diagnostic tests performed in the hospital after birth, nurses should be aware that: 4. Using words to exchange information through writing or speaking is considered which type of (1 point)communication?Ononverbal communicationO digital communicationO interpersonal communicationOverbal communication Distinguish between the concepts of the maturity-risk premiumand the liquidity-risk premium. 9. Given a scale factor of 3, find the coordinates for the dilation of a triangle with vertices at(1 point)(1 4). (4.5), and (2.0).A 3.7). (7.8). (5.3)B 3.4) (12,5), (6,0)C 3.12). (12.15) (6.0)D (112) (4.15) (2.0) What has to hold for 8 for the strategies described in 430.1 for a SPE to exist. D EXERCISE 429.1 (Grim trigger strategies in a general Prisoner's Dilemma) Find the EXERCISE 430.1 (Strategies in an infinitely repeated Prisoner's Dilemma) Represent condition on the discount factor & under which the strategy pair in which each each of the following strategies for an infinitely repeated Prisoner's Dilemma in a player uses the grim trigger strategy is a Nash equilibrium of the infinitely re- automaton like we did in class. peated game of the Prisoner's Dilemma in Figure 431.1.C DC x,x 0,yD y,0 1,1a. Choose C in period 1, and after any history in which the other player chose C in every period except, possibly, the previous period; choose D after any other history. (That is, punishment is grim, but its initiation is delayed by one period.) b.. Choose C in period 1 and after any history in which the other player chose D in at most one period; choose D after any other history. (That is, punishment is grim, but a single lapse is forgiven.) C. (Pavlov, or win-stay, lose-shift) Choose C in period 1 and after any history in which the outcome in the last period is either (C,C) or (D,D); choose D after any other history. (That is, choose the same action again if the outcome was relatively good for you, and switch actions if it was not.) g a microwave oven operates at 1,000 w. if all this energy is turned into 2 ghz microwaves, how many photons are created in 1 minute? show your work / explain your reasoning to receive credit. 10x^5+5x^215 5x^2(2x^3+x3) 10(x^5+5x^215) 5(2x^5+5x^215) 5(2x^5+x^23) Last question (show work please) 5 divided by (-1/2) How old is Tom from Tom and Huck? 1. for each of the following, choose the sentence with the correct punctuation semicolons and colons quiz What happens to nonmetals when they form ionic bonds? In her book, what does Maya associate with being beautiful?black skinher grandmotherblond hair and blue eyesAll of the choices are correct. I want you to think and discuss at least one expectation about the future gain that you have from your current education Given that expectation, what current commitment (of resources or something) are you making? Finally, what risks do you have in achieving your future expectation? "Be it therefore enacted and declared by this present grand assembly, that all children borne in this country shalbe held bond or free only according to thecondition of the mother. " A 0.24 kg blob of clay is thrown at a wall with an initial velocity of 16 m/s. If the clay comes to a stop in 91 ms, what is the average force experienced by the clay?A) 42 NB) 26 NC) 35 ND) 51 N read through each of the following pieces of information about buyers debt obligations and determine which one will qualify for an fha loan based on the qualifying ratios. Discussion PaperEach inductee is required toproduce a Discussion Paper for use in one of the inductionsessions. The title of your Discussion Paper is Explain howleadership and management Given the following data find the diameter that represents the 38th percentile US war bonds helped the war effort byO raising money for people on the home front.O loaning money to the government.O paying taxes to the government.O helping banks stay in business.