14) Which of these is used to tag parts of a text that will be on a web page?

A) SEO.

B) HTTP.

C) HTML.

D) JavaScript.

Answers

Answer 1

Answer: C

thats all ill just fill this up a bit y'know


Related Questions

which of the variables have the value 50 after executing the code segment?

Answers

Nothing is printed. The following code segment will set the Boolean variable inRange to true if the integer number num is greater than the lowest value and less than the maximum value.

What variables are necessary for the code segment to run?

One of the most important programming concepts is the ability to combine multiple lines of code into a single unit that can be used in our program. Initially, this was intended to be a sub-program. There are other references to "macro," "sub-routine," "procedure," and "module."

What does code execution entail?

In computer and software engineering, the process by which a computer or virtual machine reads and responds to a computer program's instructions is referred to as execution. The instructions of a program are each descriptions.

To know more about executing the code segment visit:-

https://brainly.com/question/26438966

#SPJ4

the list below tracks customers renting videos. we sometimes need to change a customer's address. if we change the address for the customer in row 2 (customer smith, david), but forget to change his address in row 6 also we now have a mistake in our list. what is this term for this type of mistake?

Answers

Update anomaly is this term for this type of mistake when we change the address for the customer in row 2 (customer smith, david), but forget to change his address in row 6 also we now have a mistake in our list.

What is excel?

Microsoft Excel is a spreadsheet program developed by Microsoft that is available for Windows, macOS, Android, and iOS. It includes calculation or computation capabilities, graphing tools, pivot tables, and Visual Basic for Applications, a macro programming language. Excel is part of the Microsoft Office software suite. Microsoft Excel is a spreadsheet program that is part of the company's Office product line for business applications. Users can format, organize, and calculate data in a spreadsheet using Microsoft Excel. Excel is an extremely powerful tool for extracting meaning from massive amounts of data. However, it is also very useful for simple calculations and tracking almost any type of information. The grid of cells is the key to unlocking all of that potential. Numbers, text, and formulas can all be stored in cells.

Here,

When we change the address for the customer in row 2 (customer smith, david), but forget to change his address in row 6, we have an update anomaly and a mistake in our list.

To know more about excel,

https://brainly.com/question/30324226

#SPJ4

11. While doing research online, how can you check to see if a source is current?
A. Look for a date when it was posted or updated.
B. Find out if it's trending on social media.
C. Check whether it has a bibliography or works cited page.D. See if the author's name is listed.

Answers

Answer:

C. Check whether it has a bibliography or works cited page.D. See if the author's name is listed.

Explanation:

on what planet did viking 1 & 2 land? what robotic feature did they have?

Answers

Mars, Each pair of orbiters and lander flew together into Mars orbit; After that, the robotic landers broke off and fell to the planet's surface.

What did Viking 1 and Viking 2 find?

The chemical activity that these tests found in the Martian soil was unexpected and baffling, but they did not show that the soil near the landing sites had any living microorganisms. Scientists say that Mars sterilizes itself.

Which robotic object did Viking 1 and Viking 2 land?

More than two weeks before Viking 2 entered orbit, the Viking 1 lander made its first contact with the Martian surface on July 20, 1976. On September 3, Viking 2 successfully soft-landed. Power Orbiters: Specifications of the Viking program: Lander: 620 watts (solar array) 70 watts, Regime-Areocentric, from two RTG units.

To know more about robotic  visit :-

https://brainly.com/question/29379022

#SPJ4

what is the sequence of bed configurations at low froude numbers? 2. what is the sequence of bed configurations at high froude numbers?

Answers

At low Froude numbers, the sequence of bed configurations is typically: (1) a smooth, unbroken bed; (2) ripple formation; (3) dune formation; and (4) plane bed.At high Froude numbers, the sequence of bed configurations is typically: (1) a rough, broken bed; (2) plane bed; (3) dune formation; and (4) ripple formation.

It's important to note that these sequences are not always strictly followed and may vary depending on the specific conditions of the flow and the characteristics of the bed material. Additionally, other factors such as sediment size, sediment transport rate and channel geometry can also affect the sequence of bed configurations.

Learn more about bed configurations: https://brainly.com/question/13410673

#SPJ4

Which scenario best illustrates the implementation of data governance?


- investing in real state in emerging areas based on forecast data

- drafting a press release based on data extracted from the news of the day

- redesigning existing company products based on feedback data from online customer reviews

- using the right permissions to collect and store data, and process it according to organisational guidelines

Answers

Redesigning current corporate products based on feedback information from online consumer reviews is the best example of how data governance is put into practice.

What data governance requirements are met by data platforms for businesses?

Along with better data quality, lower data management expenses, and enhanced access to necessary data for data scientists, other analysts, and business users, data governance benefits also include improved analytics and tighter regulatory compliance.

Database governance: What is it?

Setting internal guidelines—data policies—for the collection, archival, processing, and disposal of data is referred to as data governance. The kind of data that are governed and who has access to them are determined by this law.

To know more about data governance visit:-

https://brainly.com/question/29694819

#SPJ4

the ls command is used to select one: a. none of these b. show you the contents of a directory c. open a file d. create a file

Answers

The correct answer is c. open a file . the ls command is used to select one.

To list files, use the ls command. All files in the current directory are listed by "ls" on its own, except hidden files. Long format file list. Use the ls -l command to display the directory's contents as a table with the following columns: content permissions. links to the material in number. To view a directory's contents, use the ls command. The ls command outputs whatever additional information you want with the flags together with the contents of each specified Directory or the name of each specified File.

To learn more about command click the link below:

brainly.com/question/28591010

#SPJ4

you have been tasked with implementing a server infrastructure that allows clients to use virtual machine and session-based desktops to access and run applications on servers. what role should you install for this purpose?

Answers

The role you should install for this purpose would be Remote Desktop Services (RDS).

What is install?

Install is the process of making a computer program or application available for use by downloading it from the Internet or other sources and then putting it on a device. It is also the process of setting up a computer program for use. The process involves copying the necessary files to the device, configuring the settings, and making sure that the program is ready to use. Installing a program often requires the user to accept the terms of a license agreement before the program can be used. Additionally, some programs require additional configuration or setup steps to be performed after installation.

RDS allows clients to access and run applications on servers using virtual machines and session-based desktops. It also provides secure access to these applications and data while providing a rich user experience.

To learn more about install
https://brainly.com/question/28561733
#SPJ4

which data format type will increase the cell width instead of overlapping into empty cells?

Answers

When using the Numbers data format type, the cells won't overlap into empty ones; instead, the width will be increased.

How can I alter the size of a cell without altering the column as a whole?

merge a number of cells. One choice is to merge multiple cells if you want to enlarge a cell without changing the size of the entire row or column. When you merge cells, you make a single cell that spans several rows or columns out of two or more cells.

Which of the following is used in Excel to display data graphically?

To make it simpler to understand huge amounts of data and the relationships between various series of data, charts are used to display series of numerical data in a graphical style.

To know more about data format type  visit:-

https://brainly.com/question/30019805

#SPJ4

Which remote file access protocol is an extension of SSH?
TFTP
FTPS
SFTP
HTTPS

Answers

Answer:

SFTP

Explanation:

Can’t explain, hope this helps though :)

universal containers (uc) has product options in a bundle that must be displayed in the quote line editor to the user. however, uc does not want these product options to display on the quote document that is generated and presented to the customer. how should the admin set up the bundle to meet these requirements?

Answers

On any product that is a Product Option for the bundles, select the Component checkbox is the right choice.

What do universal containers consist of?

Universal Containers is a rapidly expanding international supplier of container products. They come up with various scenarios by getting users to think about things from a business perspective. They also provide guidelines for which industries or scenarios we will face and how to solve the problem. From small mail containers to custom equipment packaging and large cargo shipping containers, the company makes all kinds of containers. In addition, Universal Containers creates and maintains its own proprietary software to ease container design.

A strong, moulded glass bottle with a diameter of one ounce and a height of 31/4 inches by 11/8 inches is known as a universal container or screw-capped bottle. 28 milliliters) capacity, a wide mouth, and a flat base. After being sterilized with a loose cap, it is fastened.

To learn more about universal containers visit :

https://brainly.com/question/28156747

#SPJ4

under the broad category of fee-for-service (ffs), what are the three main types of fee-for-service methodologies that were discussed in class?

Answers

Health insurance payers frequently review the billing, coding, and documentation of healthcare providers through post-payment audits in order to stop fraud and abuse within the health payment system and spot overpayments.

Managed care programmes, in contrast to traditional insurance plans, only cover treatment received from a chosen group of community providers. An in-process quality assurance review, a gateway review, a project management audit, and a post-implementation audit are some of the several types of project audits. Internal audits, IRS audits, and external audits are the three primary categories of audits. Certified Public Accounting (CPA) firms frequently carry out external audits, which provide an auditor's opinion that is included in the audit report.

To learn more about insurance click the link below:

brainly.com/question/27822778

#SPJ4

which tab in the browser's dev tools allows us to directly manipulate the dom without having to write code?

Answers

The "Elements" tab features an interactive, real-time DOM (short for document object model). The data structure that houses all of your HTML is called the DOM.

Which developer tool tab gives us access to the webpage's HTML and CSS?

The Inspector is a CSS editor and DOM navigator. The inspector, which resembles the following screenshot, is typically the first thing to open when the developer tools are launched. This tool displays the runtime HTML of your page along with the CSS that has been applied to each element on the page.

What developer tool enables you to enter code directly into a web browser?

A collection of web development tools included right in the Chrome browser is called Chrome DevTools.

To know more about data visit:-

brainly.com/question/11941925

#SPJ4

you want a dns server to handle queries for a domain with a standard primary zone hosted on another dns server, and you don't want the server to be authoritative for that zone. how should you configure the server? (choose all that apply.)

Answers

Answer:

To configure a DNS server to handle queries for a domain with a standard primary zone hosted on another DNS server and not be authoritative for that zone, you can:

Create a secondary zone for that domain on the DNS server.

Configure the secondary zone to use the primary DNS server as its master server.

Configure the secondary zone to use a different DNS server as its master server.

Define and give an example of a desirable outcome for using a computer.

Answers

Answer:

A desirable outcome for using a computer is the successful completion of a task or process through the use of computer technology.

For example, a desirable outcome for using a computer in a business setting could be an increase in productivity and efficiency. This could be achieved by using software such as project management tools or automation tools to streamline tasks and processes, resulting in faster completion of projects and more time for other important tasks.

Another example could be in education, where a desirable outcome for using a computer could be an improvement in students' learning and understanding of a subject.

which feature of oop illustrated the code reusability? group of answer choices polymorphism inheritance encapsulation

Answers

Code reuse is indicated via inheritance. Abstraction and encapsulation are used to disguise or combine data into a single piece.

As a key component of Object-Oriented Programming (OOP), code reuse is made possible by inheritance, polymorphism, and information hiding. By using inheritance, an object can be expanded and its child object's code from the parent object can be reused or overloaded. Encapsulation is an OOPS mechanism that unifies multiple data members and member functions into a single unit by implementing the member functions on those multiple data members. This method gives the user the opportunity to reuse it. While the OOP paradigm uses dynamic binding, encapsulation, and abstraction for various purposes.

Learn more about functions here-

https://brainly.com/question/28939774

#SPJ4

Client-based e-mail accounts require a special program called an e-mail client to be installed on your computer. True or False?

Answers

Client-based e-mail accounts require a special program called an e-mail client to be installed on your computer. False.

What email service does not necessitate the installation of an email client on your computer?

It's not necessary to install an email client on your computer to use web-based email platforms. After your computer's browser establishes a connection with an email service provider, the email provider's computer runs a special program called a web mail client, at which point you can start sending emails. The webmail is what it is called.

Which client-based email application is an example?

A application on your computer called an email client allows you to send and receive emails. or email messages. Examples of this type include Windows Live Mail and Outlook.

To know more about e-mail accounts visit:-

https://brainly.com/question/13086477

#SPJ4

if you hold a top secret clearance, you are required to report to the security office when you have a foreign roommate over 30 calendar days, a co-habitant, and when you get married.

Answers

If you hold a top secret clearance, you are required to report to the security office when you have a foreign roommate over 30 calendar days, a co-habitant, and when you get married. ------ True

What happens when you live with a cohabitant, have a foreign roommate for more than 30 days, and get married?

An email to the FSO must be sent at least 10 business days before a clearance holder plans to travel abroad. Although corporate leadership may require additional notice prior to the planned travel date, it is generally recommended to notify leadership at least two weeks in advance.The Office of Security/Information Security Division is in charge of managing the Foreign Travel Briefing Program of the Department of Commerce (DOC). This program identifies foreign travel requirements and briefing and debriefing responsibilities.

According to SEAD 3, your agency can technically deny it, Bigley stated. That shouldn't be a problem for most people with security clearances. A trip to Cancun or Barcelona would not pose a threat to your organization's national security.

Learn more about Security clearance :

brainly.com/question/29763900

#SPJ4

you are troubleshooting a computer system and want to review some of the motherboard configuration settings. where is most of this data stored?

Answers

The CMOS chip contains the BIOS settings (which is kept powered up via the battery on the motherboard). Because of this, whenever you remove and then replace the battery, the BIOS is reset.

Initially, the PC motherboard's ROM chip served as the location for the BIOS firmware. The BIOS data is saved on flash memory in more recent computers so that it may be changed without removing the chip from the motherboard. These settings were saved in nonvolatile RAM by the BIOS the last time the computer booted properly. The CMOS is where the BIOS saves the date, time, and system configuration information it needs to start the computer. The BIOS is the programme that initiates this process. The computer is under the supervision of a little software called the BIOS from the moment it turns on until the operating system takes over.

To learn more about motherboard click the link below:

brainly.com/question/29834097

#SPJ4

true or false? in a browser or uniform resource locator (url) hijacking attack, users are directed to websites other than what they requested, usually to fake pages that attackers have created.

Answers

i think it would be true

Which line will change the font family to cursive? ОА. Font-family: "cursive"; ОВ. Font: "cursive"; O C. Cursive: font-family: OD D. Font-family is "cursive";​

Answers

From highest priority to lowest, a list of fonts is specified by the font-family attribute. The first font on the list is not where the font selection ends.

How can I convert my CSS font to cursive?

There are other categories available if you navigate to the "fonts" area at the top of the homepage. I think the one you want is "cursive."

What type of typeface is cursive?

Script typefaces, cursive fonts are officially known as, have been around for many hundred years. Here, we're discussing a time before word processors and typewriters. Rather, physical cursive handwriting from the 18th century served as the model for script typefaces.

To know more about  font family cursive visit:-

https://brainly.com/question/17824852

#SPJ4

an enterprise-level database model is more detailed than a project-level database model. question 26 options: true false

Answers

The given statement "a database, a database management system, and the application programs that use the data make up a database environment" is TRUE.

What is a database?

A database in computing is a structured collection of data that is electronically accessible and stored.

Large databases are housed on computer clusters or cloud storage, whilst small databases can be stored on a file system.

Data modeling, effective data representation and storage, query languages, security and privacy of sensitive data, and distributed computing challenges, such as providing concurrent access and fault tolerance, are all part of the design of databases.

A database environment is made up of a database, a database management system, and the application applications that utilize the data.

A database management system is a piece of software that communicates with applications, end users, and the database itself to collect and process data.

The primary tools offered to manage the database are also included in the DBMS software.

Therefore, the given statement "a database, a database management system, and the application programs that use the data make up a database environment" is TRUE.

Know more about a database here:

https://brainly.com/question/518894

#SPJ4

Correct question:

A database, a database management system, and the application programs that use the data, make up a database environment.

Question 1 options:

True/False

if you want to be a competent online communicator, why must you consider the issue of permanence in electronically mediated communication?

Answers

To be a competent comunicator, you should consider the issue of permanence in electronically mediated communication because every action and statement you make is recorded.

Professionals who frequently talk to an audience in speeches or lectures to enlighten, persuade, or entertain them are known as communicators. Effective speakers employ both verbal and nonverbal cues to captivate their audiences, clearly convey their ideas, and sometimes even elicit interaction from their listeners.

Many jobs call for communicators who can educate their audience on crucial happenings or lessons, amuse them with jokes and stories, or convince them to buy particular ideas or items. Having good communication skills can be helpful in careers like:

Politician, educator, professor, news anchor, television host, marketer, and salesperson

Here you can learn more about communicators in the link brainly.com/question/22558440

#SPJ4

old cassette tape sound recordings often would have extra noise on the tape. a new digital computer file only contains the recorded sound. which statement is the best conclusion that can be drawn from this information?

Answers

The best conclusion that can be drawn from this information is that digital computer files produce a higher quality sound recording compared to cassette tapes due to the lack of extra noise on the recording.

How sound recording works in cassette tapes?

Sound recording on cassette tapes works by magnetically encoding the sound onto the tape. The tape is made of a magnetic material, and it passes over a recording head, which generates a magnetic field that aligns the magnetic particles on the tape.

The alignment of the particles represents the sound being recorded. When the tape is played back, the tape passes over a playback head, which generates an electrical current based on the alignment of the magnetic particles on the tape, which then is converted into sound by an amplifier and speakers.

To know more about sound recording, visit: https://brainly.com/question/14018969

#SPJ4

what-if analyses are performed using which type of application software? spreadsheet business analytics database word processing

Answers

Most often, spreadsheet software is used to carry out a "what-if" study.

The correct option is A.

What exactly is an MS Excel spreadsheet?

For use with Windows, macOS, Android, and iOS, Microsoft Excel seems to be a spreadsheet programme. It has calculating or computing capabilities, graphing tools, pivot tables, and a language for creating macros called Visual Basic for Applications (VBA). In the Microsoft Office software package, Excel is included.

A spreadsheet was invented by who?

The first electronic spreadsheet, , It has calculating or computing capabilities, graphing tools, pivot tables,   co-created, transformed the world for good. It is the  of applications like Microsoft Excel as well as Sheets that you presumably use every day.

To know more about spreadsheet visit:

https://brainly.com/question/8284022

#SPJ4

Complete question is:

Performing a "what-if" analysis is most commonly accomplished using ____________ software.

A. spreadsheet

B. database

C. presentation

D. PIM

client-based e-mail accounts require a special program called an e-mail client to be installed on your computer. True Or False

Answers

True. client-based e-mail accounts require a special program called an e-mail client to be installed on your computer.

Which email provider doesn't require you to set up an email client for your computer?

In order to use internet email services, you do not need to install any email app on your computer.You can send emails once the email company's computer launches a special program known as a web mail client when your computer's browser connects to the service provider.

What kind of email address is most frequently utilized in professional settings?

Even though POP email seems to be almost 40 yrs old, business owners still favor it greatly.The POP3 method is very useful and simple to use, however it proves difficult and remote access.

To know more about special program visit:

https://brainly.com/question/29554741

#SPJ4

Help I don’t know why it’s not compiling

public class g
{
// instance variables - replace the example below with your own
function roll ()
{
return Math.floor (Math.random()*4+1);
}
int a;
function buttonPressed(){
roll();
a=roll();
answertq=(x*y);

}
{
if(parseInt(document.getElementById("inputVal").value)==answertq)
{
if (a==1)
{
window.alert("very good!");
}
else if (a==2)
{
window.alert ("excellent");
}
else if (a==3)
{
window.alert("correct, nice work.");
}
else if (a==4)
{
window.alert ("correct - keep up the good work");
}
}
}

Answers

Answer:

It is not entirely clear what your program is trying to achieve, but I embedded it inside some HTML to show you a working version.

class methods in javascript don't require the 'function' keyword.to access class variables, always use the 'this' instance reference.when using class methods as event handlers, bind them to 'this'. This is a weird javascript quirk you want to check out.

true or false? the recovery time objective (rto) expresses the maximum allowable time in which to recover the function after a major interruption.

Answers

The recovery point objectives (RPO) identify the actual time required to correctly resume operations in the event of an accident.

Recovery is the process of change that helps people to lead independent lives, realize their full potential, and enhance their physical and mental well-being. With the correct support, even people with severe and persistent substance use disorders can regain their health and social functioning. Recovery encompasses all aspects of one's life, including housing, employment, education, mental health services, complementary and naturalistic therapies, addictions therapy, spirituality, creativity, social media, community involvement, and familial support, as defined by the individual. Working on the real-time designation is the primary goal of the recovery time objective (RTO). It functions to identify data that was lost or re-entered while the network was down. RTO is used to specify the real working period prior to the start of a disturbance.

Learn more about Recovery here:

https://brainly.com/question/29749884

#SPJ4

in basic network scanning, icmp echo requests (type 8) are sent to host computers from the attacker. which type of packet confirms that the host computer is live?

Answers

ICMP Echo Reply (type 0) type of packet confirms that the host computer is live.

Which type of packet confirms that the host computer is live?

ICMP or internet control message protocol is an Internet layer protocol in the TCP/IP suite. It works together with routing devices like the router to send messages based on results sensed in the network. The RFC 1122 has stated that the ICMP server and end user application be configured or installed in user devices, for receiving and sending ICMP echo request packets and reply. The process is called pinging. For an attacker to implement ping of ping, he needs to confirm if the target user in live by sending an ICMP echo request packet type 8, to receive an ICMP echo reply type0.

Here,

The ICMP Echo Reply (type 0) packet confirms that the host computer is operational.

To know more about packet,

https://brainly.com/question/14689887

#SPJ4

Given a channel with an intended capacity of 20 Mbps, the bandwidth of the channel is 3 MHz. Assuming white thermal noise, what signal-to-noise ratio is required to achieve this capacity?

Answers

In order to reach this capability, signal-to-noise must be greater than 100.6.

What is the noisy channel's channel capacity?

The channel capacity of a certain channel is defined as the greatest information rate (expressed in units of information per unit time) that may be obtained with a negligibly low error probability.

Channel with  intended capacity of 20 Mbps,

Channel with 3 MHz bandwidth and a 20 Mbps 

signal-to-noise ratio  is to achieve this capacity​

C = b log₂ ( 1 + SNR)

C = is Capacity = 20 Mbps = 20 x 10⁶ bps

b = is Bandwidth = 3 Mhz  = 3 x 10⁶ Hz

SNR = is signal-to-noise ratio

3 x 10⁶  log₂ ( 1 + SNR) = 20 x 10⁶

 log₂ ( 1 + SNR) = 20/3

1 + SNR=101.6  

SNR=100.6

Signal-to-noise ratio is required to achieve this capacity is SNR ≥ 100.6

To know more about signal-to-noise visit:-

https://brainly.com/question/17019065

#SPJ4

Other Questions
1.in parts i and ii of the lab, how did the electrons of each element help to produce the different colors of light? explain your answers using important terms from the lesson and information provided in the laboratory. Place the following terms in the correct order to match the processes outlined by the central dogma of biology.EDNA is read=tRNA brings amino acidstRNA brings amino acidsprotein is formedmRNA is createdribosomes read RNA Document 3: What happens to competition in a communist system? p.3 (15 pts) run the knapsack algorithm we discussed in the class to find the best solution that maximizes the profit of the knapsack described below. show all your work for full credit. the knapsack capacity This is marine science I dont understand how did the scottsboro boys bring attention to racial inequality in america, specifically in its criminal justice system? The needs of the urban landscape have changed since the 1950s. Respond to the prompts below using your knowledge of urban settlement patterns and demographicsA. Describe the shift in population in the United States since 1950.B. Explain how this shift relates to socioeconomic OR demographic trends.C. Explain the degree to which transportation lines have impacted settlement patterns in the United States since the 1950s.D. Compare urban and suburban enclaves.E. Describe how government policies have shaped the growth of either cities OR the suburbsF. Describe how smart growth policies have helped to combat unsustainable growth in urban landscapesG. Explain how the urban renewal movement is impacting the cultural landscape. Please helpThe question is on the picture Explain the supporting evidence the author provides in the argument against the requirement of seat belts for agricultural workers In question 5 above, you calculated what the schedule would look like if Janet had made one $285.05 payment in January 2022. You did it by hand, but the Bankrate calculator has a feature that allows you to adjust the entire schedule.Using the Bankrate.com loan calculator, enter in the original loan amount, loan term, and interest rate.Then, click on "Calculate" to get the monthly loan payment of $185.05.Click "Show Amortization Schedule" and scroll down to the table. Make sure that the "Start Date" of the payment in the table is 12/01/2020.Click on "ADD EXTRA PAYMENTS" under the blue Calculate button. Add an extra one-time payment of $100 in January 2022 and click the blue button "APPLY for EXTRA PAYMENTS."Now, scroll down to January 2022 in the amortization table. You should see that there is now a one-time payment of $285.05 for that month.How did the extra, one-time payment of $100 affect the total interest Janet pays on the loan?What was the impact on the number of months it will take Janet to pay off her loan?This new calculation has Janet curious -- if shed been making $285.05 payments for the entire duration of the loan*,what would be the impact on the total interest Janet would have paid?what would be the impact on the number of months to pay off the loan?Reset Janets loan back to $3500, 24% interest, but pretend she decided from the start that her pay-off goal was 4 years instead of 2.What is Janets new monthly payment?Look at the very first payment month. What do you notice about the principal and the interest?Explain how your answer in part c created the change in interest you noticed in part b.What would be the benefit of taking a longer time to pay back your loan (ex: 4 years instead of 2)? Please give earths layers Francesca had 32 cups of flour. She used 2/8 of the flour for a recipe. How much flour did Francesca use? Write an equation to model your work. Because a northern victory would end slavery, african americans supported the ______ during the civil war. Question # 3 Dropdown Complete the sentence. During the phase of a software development project, developers create a detailed plan that specifically defines how each of the needed features will be implemented. Which of the following describes a benefit of the fact that oll never wears out?Because oll never wears out, it can be used again and again.Because oll never wears out, farmers will never run out of it.Because oll never wears out, it never needs to be replaced.O Because oll never wears out, its cost remains low. an object's elevation is a perspective cue to . group of answer choices distance shape shadowing size write a character sketch for your protagonist in your module one short story. include literal, interpretive, and evaluative information. your character sketch should be 3-5 sentences and include at least three specific details from the text to support your character analysis. in the rules of the game (Please don't search up these questions, answer them by knowledge please)(You will get brainliest if it's helpful) Which ordered pairs are solutions to the equation X+2y=8? If the work required to speed a car up from 10km/h to 20km/h is 5.0 x 10^3 J, what would be the work required to increase the cars speed from 20km/h to 30km/h?