Our ways of communicating in society will change mostly due to: O A. our desire to be isolated. O B. a population decline. O O C. changes in technology O D. alterations in our brains.​

Answers

Answer 1

Answer:C

Explanation:


Related Questions

PLEASE HURRY

In binary, an individual 0 or 1 is called a bit O True O False​

Answers

the answer is true !

Answer:

true

Explanation:

true

5 evaluation criteria

Answers

Answer:

relevance, efficiency, effectiveness, impact and sustainability. 

what is a computer?write any four features of computer​

Answers

Answer:

A computer is defined as an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.

Four features of a computer would be CPU, GPU, Memory, and Motherboard.

Explanation:

Computer is an electronic machine which accepts raw data from the user , process the data according to the predefined set of instructions, gives and stores the result or instructions....

Or

A computer is an electronic device that can perform several task according to the given instructions...

The four features of computer are :

Speed

Accuracy

Versatility

Diligence

Storage etc....

\(...\)

The term _________ refers to the logical structuring of the records as determined by the way in which they are accessed.

Answers

The term "indexing" refers to the logical structuring of records as determined by the way in which they are accessed.

Indexing involves the creation of a data structure that maps the values of one or more columns in a database table to their physical locations on disk. This allows for faster search and retrieval of specific records within the database. An index can be created on one or more columns in a table, and the index structure itself can be stored on disk, in memory, or both. Indexes can be created on different types of data, such as integers, strings, dates, and more. They can also be created using different algorithms and data structures, depending on the specific requirements of the database and the queries that will be executed against it.

To know more about indexing visit :-

https://brainly.com/question/13025085

#SPJ11

You can not give an exact size for a height for column width true or false

Answers

Answer:

~false~

Explanation:

type of power supply/battery backup device that can prevent some forms of data loss

Answers

An uninterruptible power supply (UPS) that provides a backup power source in case of a power outage or surge.

UPS stands for Uninterruptible Power Supply. It is an electrical device that provides backup power to connected equipment during power outages or fluctuations in the main power supply. The primary purpose of a UPS is to prevent data loss, equipment damage, and system downtime that can occur due to power disruptions.

A UPS typically consists of a battery or set of batteries, a charger, and an inverter. When the main power supply is available, the UPS continuously charges its internal battery, ensuring it remains ready to provide backup power when needed. In the event of a power outage or a drop in voltage or frequency beyond a certain threshold, the UPS automatically switches to battery power and supplies electricity to the connected equipment through its inverter.

UPS systems offer various benefits, including:

1. Power Backup: The primary function of a UPS is to provide a temporary power source during outages, ensuring that critical equipment remains operational. This is particularly important for sensitive electronics, such as computers, servers, networking equipment, and other devices that can be adversely affected by sudden power loss.

2. Voltage Regulation: UPS units often incorporate voltage regulation capabilities. They can stabilize voltage levels by compensating for voltage fluctuations or surges in the main power supply, providing a consistent and clean power output to connected devices.

3. Surge Protection: UPS systems commonly include surge protection features, safeguarding connected equipment from voltage spikes or power surges that can damage or degrade electronic components.

4. Graceful Shutdown: Many UPS models include software or built-in functionality that allows connected devices to receive a signal when a power outage occurs. This feature enables connected equipment to initiate a controlled shutdown, protecting data and preventing abrupt system shutdowns that can lead to data loss or system instability.

5. Equipment Longevity: By providing stable power and protection against power disturbances, a UPS can help extend the lifespan of connected devices. It minimizes the risk of equipment damage caused by sudden power loss or voltage irregularities.

UPS systems come in various sizes and configurations, ranging from small units designed for home or personal use to large-scale systems used in data centers or industrial applications. The selection of a UPS depends on factors such as the power requirements of connected devices, the runtime needed during outages, and the specific features or functionalities required for the intended application. Overall, a UPS is a crucial component for maintaining reliable power supply, protecting equipment, and minimizing downtime in situations where uninterrupted power is essential. This can prevent sudden shutdowns of devices such as computers or servers, which can result in data loss. Another option is a surge protector, which can protect devices from power spikes and surges that can also cause data loss. It is important to choose a power supply/battery backup device that is appropriate for the specific device and its power requirements to ensure proper protection against data loss.

Learn more about electricity:https://brainly.com/question/776932

#SPJ11

1)write a python program to check wheter the given number is even or odd
2) write a python program to add any 5 subjects makrs, find sum and average (average=sum/5)
3)write a python program to print numbers from 1 to 100 using loops

Answers

Answer:

n = 16

if n%2:

 print('{} is odd'.format(n))

else:

 print('{} is even'.format(n))

m1 = 5

m2 = 4

m3 = 6

m4 = 8

m5 = 9

sum = m1+m2+m3+m4+m5

average = sum/5

print("The sum is {}, the average is {}". format(sum, average))

for i in range(1, 101): print(i, end=",")

Explanation:

Above program does all three tasks.

Answer:

1) num1 = int(input("Enter the number to be checked: "))

if num1%2==0:

   print("Your number is an even number!")

else:

   print("Your number is not even!")

2) maths = int(input("Enter your maths mark: "))

english = int(input("Enter your english mark: "))

social = int(input("Enter your social mark: "))

science = int(input("Enter your science mark: "))

computer = int(input("Enter your computer mark: "))

Sum =  maths + english + social + science + computer

average = Sum / 5

print("Sum of your marks are:",Sum)

print("average of your marks are:",average)

3) num = 0

while num <= 99:

   num+=1

   print(num)

Explanation:

Welcome.

For the network shown below, use two-pass method to determine the critical path, the project duration and each activity's slack time. (All durations shown are in weeks). (1 point)

Answers

The critical path for the network is A-C-E-G-I-K, with a project duration of 18 weeks. The slack time for each activity is as follows: Activity B has a slack time of 0 weeks, Activity D has a slack time of 1 week, Activity F has a slack time of 2 weeks, Activity H has a slack time of 0 weeks, and Activity J has a slack time of 3 weeks.

To determine the critical path, project duration, and slack time for each activity, we use the two-pass method.

First, we calculate the earliest start (ES) and earliest finish (EF) times for each activity. The ES for the first activity is 0, and the EF is the duration of that activity. For subsequent activities, the ES is the maximum EF of all preceding activities, and the EF is ES + duration.

Using this method, we find the following values:

Activity A: ES = 0, EF = 4

Activity B: ES = 4, EF = 4

Activity C: ES = 4, EF = 9

Activity D: ES = 9, EF = 10

Activity E: ES = 10, EF = 15

Activity F: ES = 15, EF = 17

Activity G: ES = 17, EF = 21

Activity H: ES = 4, EF = 4

Activity I: ES = 21, EF = 23

Activity J: ES = 23, EF = 26

Activity K: ES = 26, EF = 30

Next, we calculate the latest start (LS) and latest finish (LF) times for each activity. The LF for the last activity is the project duration, and the LS is LF - duration. For preceding activities, the LF is the minimum LS of all succeeding activities, and the LS is LF - duration.

Using this method, we find the following values:

Activity K: LS = 30, LF = 30

Activity J: LS = 26, LF = 30

Activity I: LS = 21, LF = 26

Activity H: LS = 4, LF = 4

Activity G: LS = 17, LF = 21

Activity F: LS = 15, LF = 17

Activity E: LS = 10, LF = 15

Activity D: LS = 9, LF = 10

Activity C: LS = 4, LF = 9

Activity B: LS = 4, LF = 4

Activity A: LS = 0, LF = 4

Finally, we calculate the slack time (ST) for each activity by subtracting EF from LS. The critical path consists of activities with zero slack time.

Using this calculation, we find the following slack times:

Activity A: ST = 0

Activity B: ST = 0

Activity C: ST = 0

Activity D: ST = 1

Activity E: ST = 0

Activity F: ST = 2

Activity G: ST = 0

Activity H: ST = 0

Activity I: ST = 0

Activity J: ST = 3

Activity K: ST = 0

The critical path for the network is A-C-E-G-I-K, with a project duration of 18 weeks. Activities B, H, and K have zero slack time, meaning any delay in these activities will cause a delay in the overall project. Activities D, F, and J have some slack time available, indicating that they can be delayed without impacting the project's duration.

To know more about network follow the link:

https://brainly.com/question/1326000

#SPJ11

an engineer learns a new security threat mitigation technique. the technique maps an ip address to a non-existent host, and is useful in stopping denial of service attacks. traffic heading to these ips can be captured for analysis or discarded. considering the available techniques, which might the engineer try to use? (select all that apply.)

Answers

A black hole in network architecture discards traffic without informing the source and before it reaches its final destination.

Using traffic routed to an IP address that an administrator mistakenly assigned to an invalid host as an example The two terms "sinkhole" and "black hole" are frequently used interchangeably. However, with sink holing, an admin typically still has some control over how to examine and forward the traffic that was collected. A software program known as a "packet sniffer" can be used to capture all network packets that are sent over a specific collision domain by using a network adapter card in promiscuous mode, which transmits all packets received on the physical network cable to an application for processing.

Learn more about network here-

https://brainly.com/question/15088389

#SPJ4

8.5 Edhesive Code Practice
Use the following initializer list to create an array (this is also in your programming environment):

twainQuotes = ["I have never let my schooling interfere with my education.",
"Get your facts first, and then you can distort them as much as you please.",
"If you tell the truth, you don't have to remember anything.",
"The secret of getting ahead is getting started.",
"Age is an issue of mind over matter. If you don't mind, it doesn't matter. "]
Print this array, then use functions to sort the quotes. Then, print the quotes again.

Next, insert the quote "Courage is resistance to fear, mastery of fear, not absence of fear." at the correct spot alphabetically, and print the quotes again.

Hint: Your code should print the array after each modification listed in the instructions

Answers

Answer:

Check explanation

Explanation:

#Print original quote

twainQuotes = ["I have never let my schooling interfere with my education.",

"Get your facts first, and then you can distort them as much as you please.",

"If you tell the truth, you don't have to remember anything.",

"The secret of getting ahead is getting started.",

"Age is an issue of mind over matter. If you don't mind, it doesn't matter. "]

print(twainQuotes)

#Sort and print

twainQuotes.sort()

print(twainQuotes)

#Insertion of quote, sort, then print

twainQuotes.extend(["Courage is resistance to fear, mastery of fear, not absence of fear."])

twainQuotes.sort()

print(twainQuotes)

mark as brainliest pls hehe

you are setting up analytics and are asked to set up a data stream as part of the process. which of these describes a data stream?
a. A data stream lives within an account and is the container for the data you collect from your apps and sites
b. A data stream lives within Explore and, once defined, can be added to any exploration
c. A data stream lives within a property and is a source of data from your app or website
d. A data stream lives within Reports and lets you segment and compare your data

Answers

c. A data stream lives within a property and is a source of data from your app or website.

In the context of analytics, a data stream is a continuous flow of data that is sent from a website or application to an analytics platform. The data stream is created within a property in the analytics platform, and it serves as the source of data for the reports and analyses that the platform generates. In other words, the data stream is where the data from the app or website is collected and organized before it can be analyzed. Option c is the correct answer as it accurately describes the purpose and location of a data stream in the analytics setup process.

Learn more about  data stream here:

https://brainly.com/question/31343818

#SPJ11

how do you use \t using python in coding

Answers

Answer:

Follows are the Python code in which we use "\t":

print('how \t do\t  you \t use \t using \t python \t in \t coding.')#print message

Output:

how   do   you   use   using   python   in   coding.

Explanation:

In the above Python code, a print method is declared, in which it uses the given question as a message and in this, it uses "\t" that provides tab space in the given value. This programming language is general purpose. Therefore, it can be used as a desktop and web applications. It can also be used for the development of complex applications in science and numbers.

short answer 2: what would happen to consumption, saving, and work if the government borrowed a bunch of money to pay a lump sum transfer of $1000 today and only paid the interest payments on the debt it took out from then on out (didn't change any other behavior).

Answers

If the government borrowed a large amount of money to pay a lump sum transfer of $1000 today and only made interest payments on the debt going forward, it would likely have several effects on consumption, saving, and work.


Initially, the lump sum transfer of $1000 could increase consumption as individuals receiving the transfer may choose to spend the money on goods and services. However, over time, if the government only pays interest on the debt, it may lead to a decrease in consumption. This is because the government will have to allocate a significant portion of its budget towards paying off the interest, which may result in reduced spending on public services and programs. As a result, individuals may have less access to resources and may need to cut back on their own consumption.

Saving: The borrowing by the government to pay the lump sum transfer may lead to a decrease in national saving. This is because the government will have to borrow money from the private sector, which reduces the amount of money available for individuals and businesses to save. Additionally, if the government focuses on paying off the interest on the debt rather than reducing the principal amount, it may result in a higher overall debt burden. This could potentially lead to higher taxes in the future, which may further discourage saving as individuals have less disposable income.

To know more about payments visit:

https://brainly.com/question/34046161

#SPJ11


The physical equipment
The programs used to run the network
Part of the network that allows communication with other networks
Routes data where it is meant to go

Answers

Answer: hardware, software, gateway, router

Explanation:

Got it right on e2020

How many times will it tack when you fill 1 - liter of jar with water from the pond and uses 100 - milliliter cup to scoop water out of the pond and pour it into the jar

Answers

Answer:

10 times

Explanation:

Volume of a jar = 1 liter

Use 1 liter = 1000 milliliters to convert unit of volume of a jar to milliliter.

Therefore,

Volume of a jar = 1000 milliliters

Volume of cup = 100 milliliter

A 100 - milliliter cup is used to scoop water out of the pond and pour it into the 1 - liter of jar.

Number of times = \(\frac{1000}{100}=10\) times



What is a project?

Answers

Simply put, a project is a series of tasks that need to be completed in order to reach a specific outcome. A project can also be defined as a set of inputs and outputs required to achieve a particular goal. Projects can range from simple to complex and can be managed by one person or a hundred.

hris has received an email that was entirely written using capitalization. He needs to paste this text into another document but also ensure that the capitalization is removed.

What should Chris do?

Answers

He should un caps lock it

What are the two most important jobs of the Data Link layer?

Answers

The two most important jobs of the Data Link layer are 1) framing and 2) error detection and control. Framing involves organizing data into frames for transmission, while error detection and control ensures the reliability of data transmission by detecting and correcting errors.

Framing: The Data Link layer is responsible for breaking up the stream of bits received from the Physical layer into manageable data frames that can be transmitted across the network. The frames typically include a header and a trailer that contain control information, such as the source and destination addresses, error detection codes, and flow control information.

Media Access Control (MAC): The Data Link layer is also responsible for controlling the access to the shared network medium and ensuring that only one device is transmitting at a time. The MAC sublayer of the Data Link layer uses a variety of techniques, such as Carrier Sense Multiple Access with Collision Detection (CSMA/CD) or Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), to coordinate the transmission of data frames among the devices connected to the network.

Learn more about transmission here

https://brainly.com/question/15884673

#SPJ11

if you go up to the bell and it says there is a message and there was no message what should i do?

Answers

No worry! It happens to me too, it’s nothing to worry about :)

I just tested how resistant my skin is with a multimeter and I stuck the probe tips pretty hard into my left and right hand. The multimeter measured about .7 Megaohms for me with dry skin and 1.3 Megaohms for my brother. Is this high? Please explain, if you think I'm joking leave your contact info and I'll prove it.

Answers

Since the multimeter measured about 7 Megaohms for you with dry skin and 1.3 Megaohms for your brother. it can be said that it is high.

What does a multimeter measure?

A digital multimeter is known to be a kind of a test tool that is often used to measure a lot of  or two electrical values that are seen or known to be principally voltage (volts), current (amps) and that of resistance (ohms).

Note that t he conductivity of the skin is said to be one that variable from person to person, hence, Since the multimeter measured about 7 Megaohms for you with dry skin and 1.3 Megaohms for your brother. it can be said that it is high.

Learn more about Megaohms from

https://brainly.com/question/10426373

#SPJ1

a tdm pcm system will accommodate four 200-kbps, synchronous digital inputs and one analog input with a bandwidth of 300khz which will be encoded into 4-bit pcm words. what is the total multiplexed data rate?

Answers

It can be answered through a diagram as attached:

You can learn more through link below:

https://brainly.com/question/14922995#SPJ4

a tdm pcm system will accommodate four 200-kbps, synchronous digital inputs and one analog input with

Why are tables a good way for displaying data

Answers

Answer:

Tables are used to organize data that is too detailed or complicated to be described adequately in the text, allowing the reader to quickly see the results.

Explanation:

please make my answer as brainelist

How do businesses benefit from digital networks?
A.Internet access for employees
B.Ability to connect multiple laptops
C.Protection from viruses
D.Software users are familiar with

Answers

The way in which businesses benefit from digital networks is: B. Ability to connect multiple laptops.

What is a digital network?

A digital network can be defined as a social network that is designed and developed through the use of digital technologies that incorporates both digital transmission and digital switching.

This ultimately implies that, a digital network can support the digital transmission and digital switching of all the following aspects and components of a network:

VoiceVideoDataNetwork services.

In conclusion, digital networks avail employees working in a business firm an ability to connect multiple laptops all at the same time (simultaneously).

Read more on a  digital media and networks here: https://brainly.com/question/26174462

#SPJ1

What does the term Gestalt mean? A. image B. graph C. big D. part E. whole

Answers

Answer:

Part E

Explanation:

an organized whole that is perceived as more than the sum of its parts.

Answer:

E. whole

Explanation:

i got it right

Melanie needs to ensure that readers are able to locate specific sections within a document easily. What should she include in
the document?
concordance
index
table of contents
bibliography

Answers

Answer:

according to me,she should include an index

Answer:

index

Explanation:

What is the author's purpose for writing this article? A to persuade readers to consider a career in aerospace engineering and at NASA B to caution readers about the difficulties that aerospace engineers encounter C to highlight the experiences of Tiera Fletcher growing up and as an aerospace engineer D to promote Tiera Fletcher's book and her nonprofit organization, Rocket With The Fletchers

Answers

Answer:

C to highlight the experiences of Tiera Fletcher growing up and as an aerospace engineer

Explanation:

Dream Jobs: Rocket Designer, a Newsela article by Rebecca Wilkins was written with the intent of informing the readers of how Tiera Fletcher developed a love for mathematics at an early age and further developed a desire to be a Space Engineer which she succeeded at. She highlighted the different steps she took before she realized her goal. Some of these steps included working as an intern in several space establishments and performing research.

Today, she is very successful in her career and hopes  that young ones can pursue a career in any STEM careers of their choice.

Answer:

c on newsella

Explanation:

Can anyone give me Nitro type gold please? My NT account is trapkaybee061307

Answers

Answer:

no

Explanation:

Answer:

nah man I'm only fourteen and I don't have money

Explanation:

you can add me on Ro.blox

here is my username

untoten_115

What is a global positioning system (GPS)?

Answers

Anywhere on or near the Earth, a global positioning system (GPS) can be used to provide location and time information.

GPS global positioning: What is it?

A constellation of satellites transmitting navigational signals and a network of ground stations and satellite control stations used for monitoring and control make up the Global Positioning System (GPS), a space-based radio navigation system.

What exactly is the Global Positioning System?

The 24 orbiting satellites that make up the Global Positioning System (GPS), a satellite-based navigation system that completes two orbits of the Earth every 24 hours. These satellites send three pieces of data: the satellite's identification number, its location in space, and the time the data was delivered.

To know more about GPS visit:-

https://brainly.com/question/28275639

#SPJ4

Which technique is used with network address translation (nat) where a source port chosen by a client is the same port used by a router?

Answers

The technique that is used with network address translation (nat) where a source port chosen by a client is the same port used by a router is port preservation.

What is port preservation?

It should be noted that port preservation simply means using the port number chosen by the client initially.

In this case, the technique that is used with network address translation (nat) where a source port chosen by a client is the same port used by a router is port preservation.

Learn more about port on:

brainly.com/question/4804932

#SPJ12

Make the correct match.
1. Supports multiple coding of raw data
AVI
2. Standard audio format supported by Windows PCs
RA
3. Standard audio format used by Sun, Unix, and Java
WAV
4. Most popular format when downloading music
MP3
5. Real audio
AU
6. Standard audio file for Macs
AIFF

Answers

Answer:

1. AVI

2. WAV

3. AU

4. MP3

5. RA

6. AIFF

Explanation:

A file type can be defined as the standard used to store digital data such as pictures, texts, videos, and audios. They all have unique file extension which determines the type of software program (application) to be used for opening a particular file and accessing its data e.g pictures (jpeg, png), texts (txt, docx, rtf), videos (mp4, 3gp, avi), audios (mp3, acc).

Sometimes, computer users make the mistake of opening files with the wrong software application or program, this often leads to an error due to the incompatibility of the software application with the particular file.

For audio file types, these are some of the commonly used file extensions;

1. AVI: Supports multiple coding of raw data. AVI is an acronym for audio video interleave and it was developed by Microsoft Inc.

2. WAV: Standard audio format supported by Windows PCs. It is an acronym for Waveform Audio File Format developed by Microsoft inc. and IBM.

3. AU: Standard audio format used by Sun, Unix, and Java.

4. MP3: Most popular format when downloading music.

5. RA: Real audio.

6. AIFF: Standard audio file for Macs

Other Questions
Please helpPut this equation into slope-intercept form.4x + 7y = 14[?]y = - x + [ ] What does don Quixote do to make the innkeeper angry The patient has a heart rate of 72 bpm with a regular rhythm. where does the nurse determine the impulse arises from? Find two ratios that are equivalent to 45/12 Find which are the errors and solve correctly the problem: Hey please help What is the relationship between money and power The 3 main characters in Cooking Time Humanist Abraham Maslow suggests that when people reach self-actualization, they _____.(a) develop to their fullest potential.(b) avoid negative consequences of behavior.(c) seek maximum reward for all their behaviors.(d) learn from their mistakes and move on. Suppose we want to determine how long it takes on average for a typical adult to build four different styles of tables,which are referred to as A, B, C, and D. To create four treatment groups, the researcher begins by writing the nameof each member of the population on a slip of paper. Next, the researcher puts all slips of paper into a hat andshuffles them well. Finally, the researcher draws slips of paper from the hat to determine the participants in theexperiment. Identify the component missing from the researcher's process.The researcher did not assign individuals to treatment groups.* The researcher did not create the correct number of treatment groupsThe researcher did not select the experimental units randomly.* The researcher did not allow each experimental unit the chance of being chosenIntroFinal Based on these sets of side lengths, which triangles are right triangles? What is the area of a circle with a diameter of 18.2 cm?Use 3.14 for and round your final answer to the nearest hundredth.The area is ___ square cm. whose guidelines should you follow for the destruction of storage media suchas thumb drives, zip drives, and computers? "The skull was first noticed...nearest to the entrance of the cavern...The other bones [were further in] lying in the same [area]. Of this, I was assured...by two laborers who were employed to clear out the [small cave]...At first, no idea was entertained of the bones being human...It was not till several weeks after their discovery that they were recognized as such by me...But, as the importance of the discovery was not at the time [known], the laborers were very careless in the collecting, and secured chiefly only the larger bones."On Some Fossil Remains of Man by Thomas H. HuxleyPublic DomainBased on the text, which of the following conclusions about uncovering fossils can be drawn? it is a speedy process for archaeologists to identify the type of bones found at a site.It is normal for archaeologists to work alone when digging up fossils.It is important for workers to use care when beginning an archeological dig.It is not difficult for archaeologists to identify bones as human.what is it .-. The table shows the number of bacteria in a culture. How many bacteria are expected to be in the culture after 7 days? A.7,368 B.56,575 C.76,808D.2,912 17. Which of the following keyboard shortcut is used to copy the selected text?a. Ctrl+cb. Ctrl+Vc. Ctrl+Xd. Ctrl+Z Grocery stores often offer free samples of food and drinks to customers. The stores do this in order to get their customers interested in the products they sell. However, there are several reasons why giving away free samples is a problem. For instance, free samples are usually offered during the weekends. Stores are crowded enough during these days, but the sample booths make the stores extra crowded. Having free samples available at stores can also create a bad shopping experience for children and their parents. A child may throw a fit if he or she is not allowed to eat a sample. _______, people who give away free samples can be pushy and rude. Such behavior can be annoying to customers who are in a hurry. Many people just want to shop and get home as quickly as possible.Which transition best fits in the blank? A. Meanwhile B. On the contrary C. Moreover D. By the way (MC)John wants to use a camera lens that will reproduce an image that is like what the human eye would see, without distortion or minimizing thescene that he is shooting. Which camera lens would be the best choice for this?O 300 mmO 30 mmO 50 mmO 120 mm Two garden plots were planted with corn. The soil was similar in each, and equal amounts of water were applied to each plot. One plot was fertilized, and the other was not. The experimenters measured the yield as bushels of corn from each plot. The corn in the plot that did not receive the fertilizer was the ________________1. control group2. controlled variable3. replicate group4. dependent variable5. experimental group What positions Jobs is the president responsible for appointing? using y=-6x what is the value of x if y=42