which of the data roles is responsible for extracting, integrating, and organizing data into data repositories?

Answers

Answer 1
The data engineer is responsible for collecting data through data pipelines, cleaning and transforming the data, and aggregating the data into a database or data source. They must also deliver the data back to the stakeholders. A successful data engineer must determine which tools and programs are best for their data environment.

Related Questions

In an interview, you are asked to explain how gamification contributes to enterprise security. How should you reply? a. Recreational gaming helps secure an enterprise network by keeping the attacker engaged in harmless activities. b. Instructional gaming in an enterprise keeps suspicious employees entertained, preventing them from attacking. c. Instructional gaming can train employees on the details of different security risks while keeping them engaged. d. Recreational gaming can train employees on how to contain a physical threat at an enterprise.

Answers

Gamification contributes to enterprise security because C. Instructional games can train employees in the details of different security risks while keeping them engaged.

Why Gamification can Improve the Security Awareness?

Gamification has been used by organizations to improve customer loyalty. For example, different levels of play can be reached by using the application to earn points, purchase certain products, or participate in the company's gamified programs. But elements of gamification can still be found in today's workplace. Gamification is used to improve HR functions (employee recruitment, onboarding, etc.) and to motivate customer service representatives or call center or similar department employees to increase productivity and engagement I can do it. Gamification not only increases employee motivation and engagement, but it also optimizes workflows and processes, attracts new talent, and can be used for educational purposes.

Learn more about gamification for security awareness https://brainly.com/question/29655904

#SPJ4

mason, a new network engineer in your organization, has set up the configuration of the switch ports to other network devices. on inspection, you, the network administrator, realize that the configuration has been made using access mode instead of trunk mode. what kind of a configuration error are you facing in this situation?

Answers

A kind of configuration error that you are facing in this situation include the following: B. incorrect port mode.

What is a switch?

In Computer networking, a switch can be defined as a network device which is designed and developed for the programmatic redirection of request traffic of a client from one server.

What is port mirroring?

In Computer networking, port mirroring can be defined as a network monitoring method (technique) which is designed and developed to ensure that all traffic that are sent to any port on a switch, is also sent to a network device that is connected to the mirrored port.

In this context, we can infer and logically deduce that an incorrect port mode caused the configuration error.

Read more on switches here: brainly.com/question/14850209

#SPJ1

Complete Question:

Mason, a new network engineer in your organization, has set up the configuration of the switch ports to other network devices. On inspection, you, the network administrator, realize that the configuration has been made using access mode instead of trunk mode. What kind of a configuration error are you facing in this situation?

Incorrect VLAN assignment

Incorrect port mode

VLAN isolation

Double tagging

Is there a way to force a mobile device into debug mode











xXBailyXx

Answers

Answer:

Enabling USB Debugging on an Android Device

On the device, go to Settings > About <device>.

Tap the Build number seven times to make Settings > Developer options available.

Then enable the USB Debugging option.

Explanation:

Thank Chu

Answer:

Explanation:

If your mobile device is an iphone, then there is no debug mode except jailbreak.

If it is Android, then it depends on its version. All you have to do for some is to connect USB to a computer, a menu will show on your phone and ask if you want to allow USB debug mode. Other versions you need to enable USB debug in System Settings.

If everything else fails, then follow the other helper's advice.

Select the correct answer from each drop-down menu.
Regular computer maintenance minimizes the chances of
It also helps prevent

Select the correct answer from each drop-down menu.Regular computer maintenance minimizes the chances

Answers

Regular computer maintenance minimizes the chances of computer hardware and software failures, system crashes, and data loss.

What is computer maintenance?

It helps prevent various issues that can lead to poor performance, security vulnerabilities, and software conflicts.

For example, regular maintenance can help prevent the accumulation of dust and debris in the computer's cooling system, which can cause overheating and damage to the hardware components.

Therefore, Regular maintenance can include tasks such as cleaning the computer hardware, updating software and drivers, performing virus scans and system backups, optimizing system settings, and monitoring system performance. By performing these tasks on a regular basis, computer users can help ensure that their systems remain stable, secure, and reliable over time.

Read more about computer maintenance here:

https://brainly.com/question/25243683

#SPJ1

Can you write a story about any princess?
Mark brainiest. Please

Answers

Okay well here's a short one. The main problem in Cinderella is that she wants to go to the ball but her stepsisters prevent her from going because they wanna marry the prince-

Cinderella is a beautiful kind daughter sees the world upside down when her mother dies and so her father in pain marries another woman who is wicked and the name is "Lady Termaine" she has two cruel daughters who get so jealous so easily. The daughters are named Drizella & Anastasia.

What type of software has been developed to enable users to make use of the vast amount of data being collected and organized today?.

Answers

Answer:

The type of software that has been developed to enable users to make use of the vast amount of data being collected and organized today is  Analytics software.

What is Software?

A set of instructions, data, or programs used to run computers and carry out specified activities is referred to as software. It is the inverse of hardware, which describes a computer's physical components. Software is a catch-all phrase for apps, scripts, and programs that execute on a device.

Analytics software is a sort of software that has been developed to allow users to make use of the large quantity of data that is being gathered and structured nowadays.

It is used to compute the performance of digital content and to convert business information into reports. Therefore

Explanation:

why should one avoid noise in the computer room​

Answers

Do not make noise in the computer room. Again
why should one avoid noise in the computer room

the national software reference library provides what type of resource for digital forensics examiners?

Answers

The National Software Reference Library (NSRL) is a project managed by the National Institute of Standards and Technology (NIST) and is designed to collect software from various sources and create a reference database of information about it. This reference database can be used by digital forensics examiners as a tool to compare the software on a computer or storage device being analyzed against a known set of reference software.

In essence, the NSRL provides a database of known software, their versions, and their digital signatures or hashes, which can be used to determine whether a given file on a device being analyzed is part of a known software package or not. This can help digital forensics examiners in identifying potentially suspicious or malicious software on a device, as well as in filtering out benign files that are part of legitimate software.

Learn more about digital forensics here:

https://brainly.com/question/29349145

#SPJ11

a user is experiencing problems logging in to a linux server. he can connect to the internet over the local area network. other users in the same area aren't experiencing any problems. you attempt logging in as this user from your workstation with his username and password and don't experience any problems. however, you cannot log in with either his username or yours from his workstation. what is the likely cause of the situation explained in the given scenario?

Answers

The likely cause of the situation explained in the given scenario is that there is an issue with the user's workstation.The scenario indicates that a user is experiencing problems logging in to a Linux server.

However, the user can connect to the internet over the local area network. Other users in the same area aren't experiencing any problems. The issue could, therefore, be with the user's workstation. When you attempt to log in as the user from your workstation with his username and password, you don't experience any problems.However, you cannot log in with either his username or yours from his workstation. This means that the issue is not with the user's credentials but with the workstation.

Learn more about user's workstation: https://brainly.com/question/14366812

#SPJ11

.To what extent can a pie chart be rotated?
Up to 360 degrees
Up to 180 degrees
Up to 45 degrees
Up to 90 degrees

Answers

The rotation is usually done by dragging the chart with a mouse or touchpad, and it can be rotated in any direction up to 360 degrees, allowing the viewer to see the chart from all angles.

A pie chart is a circular chart that is divided into sectors to represent numerical proportions. Each sector's size is proportional to the quantity it represents. The chart's main purpose is to display the relative sizes of different categories in a dataset. The chart's slices or sectors are typically arranged in a clockwise direction, with the first slice starting at 12 o'clock. The chart can be rotated to show different perspectives or highlight specific slices of data.
However, it's essential to note that rotating a pie chart can sometimes make it difficult to read or understand the data it represents. For instance, if the chart is rotated too much, it might become challenging to compare the size of different sectors accurately. As a result, it's essential to use discretion when rotating pie charts to ensure that the data remains clear and understandable

Learn more about pie chart here:-brainly.com/question/1109099

#SPJ11

Create a class called Drive. It should have instance fields miles and gas which are both integers. Another instance field, carType, is a String. The constructor should receive a String which initializes carType. The other two instance fields are both automatically initialized to 1 in the constructor. Create a method called getGas that returns an integer that is the gas data member. The getGas method has no parameters. Write in java. First correct answer will be marked brainliest, i need answer very soon

Answers

public class JavaApplication87 {

   

   public static void main(String[] args) {

       Drive dr = new Drive("Insert type of car");

       System.out.println(dr.carType);

   }

   

}

class Drive{

   int miles;

   int gas;

   String carType;

   public Drive(String ct){

       carType = ct;

       miles = 1;

       gas = 1;

       

   }

   int getGas(){

       return gas;

   }

   

}

I'm pretty sure this is what you're looking for. Best of luck.

Cuales son los dos tipos de mantenimiento que existen?

Answers

Answer:  

dpendiendo del trabajo a realizar, se pueden distinguir tres tipos de mantenimiento: preventivo, correctivo y predictivo.

Preventivo. Tareas de mantenimiento que tienen como objetivo la reducción riesgos. ...

Correctivo. ...

Predictivo. ...

Mantenimiento interno. ...

Mantenimiento externo

La clasificación más extendida se refiere a la naturaleza de las tareas, y así, el mantenimiento puede distinguirse en correctivo, preventivo, conductivo, predictivo, cero horas, y modificativo

Tareas de mantenimiento programado: lo componen el conjunto de tareas de mantenimiento que tienen por misión mantener un nivel de servicio determinado en los equipos, programando las revisiones e intervenciones de sus puntos vulnerables en el momento más oportuno

Explanation:espero haberte ayudado coronita plis soy nueva  en esto

You need to install a 32-bit application on a 64-bit version of windows 11. In which default directory will the application be installed?.

Answers

Microsoft Windows' system root folder is C:/Windows by default. However, there are a number of ways to fix this.

A hard drive's active partition could be identified by a letter other than C:, or it could be running Windows NT, in which case the system root folder is by default C:/WINNT. The subdirectory C :Windows contains the majority of the system files for a Windows operating system, particularly in the subfolders /System32 and /SysWOW64. Additionally, system files can be found in user directories (like App Data) and application folders (for example, Program Data or Program Files) The C: drive letter is used to identify the hard disk on computers running Windows or MS-DOS. The primary drive letter for hard drives is the reason behind this.

Learn more about windows here-

https://brainly.com/question/13502522

#SPJ4

which keyboard shortcut copies information to the clipboard?

Answers

Answer:

Ctrl+C for PC or Command+C for Mac

In the decision-making process, after you have chosen the right solution, what is the next step?

Answers

Answer:

Implementing the right solution.

Explanation:

There is little point in taking decisions if it stays in the paper. If the best of the possible alternatives have been identified, it must be properly implemented to accomplish the aim it was chosen for. When a decision has been made, it should be implemented, i.e. enacted, into practice. Because of poor execution, a successful decision may become ineffective. A participatory approach can be an efficient way of enforcing such decisions successfully.

1. What is being decided when information is evaluated?

2. List and describe the two steps you can use to break down into its arguments

3. Why does confusing and uncertain need to be clarified?

4. What are some causes for confusion and uncertainty in an argument?

(Can someone help me out plz)

Answers

Answer:

1. Once you found information that matches the topic and requirements of your research, you should analyze or evaluate these information sources. Evaluating information encourages you to think critically about the reliability, validly, accurately, authority, timeliness, point of view or bias of information sources.

2. The first step of evaluating an argument is making an inference connection. The second step is asserting premise acceptability. 2 questions to ask is (1) Is this argument valid and (2) Is this argument sound or unsound.

After the unforeseen failure of her Bigfoot picture sharing service, bgfootr, which got hacked when she failed to stay on top of her security updates Janelle has a great new idea for a new service to report Loch Ness monster sightings. What service would help her keep from having to play system administrator

Answers

Answer:

C) Platform as a Service

Explanation:

The service which helps her by having to play administrative is a platform.

The platform as a service refers to the platform in which the it allowed to create, run, manage the applications over the cloud computing. Also it could be done without having difficulties with respect to maintaining the infrastructure as it is done online so no physical appearance needed

By focusing into it, she centralize her mind in creating the service

Hence, the correct option is C.

how might b2b and b2c companies approach meeting customer needs differently

Answers

Businesses that cater to both B2B (business-to-business) and B2C (business-to-consumer) consumers frequently take a different approach to satisfying their demands because these customers have distinct needs.

What distinguishes B2B customers from B2C clients?

What distinguishes B2B e-commerce from B2C e-commerce? Business to business is known as B2B, whereas business to consumer is known as B2C. B2B ecommerce makes use of online channels to market to other businesses. B2C e-commerce focuses on individual customers.

How do the purchasing processes for B2B and B2C differ?

B2B: When purchasing a good or service involves business-related goals, the transaction requires a careful study, more thought, and continued support from the seller. Several business divisions are impacted by the choice. B2C: Typically, the sale is less logical

To know more about consumers  visit:-

https://brainly.com/question/28671114

#SPJ1

Why might one choose to use a mnemonic device in order to remember information? Mnemonic devices are used as a strategy for improving memory. Mnemonic devices make it easier to remember information that is difficult, long, or complex.

Answers

A mnemonic device is a memory trick that can improve your recall and retention of information. Greek antiquity served as the foundation for this teaching strategy. To move information from your short-term memory to your long-term memory, you might employ mnemonic devices as memory aides.

Any learning strategy that promotes information retention or retrieval in the human mind for greater comprehension is referred to as a mnemonic device, also known as a memory device. In mnemonics, information is encoded using certain methods that make it easy to remember and recall, such as retrieval cues, imagery, and complex encoding. Mnemonics enable new knowledge to be connected to something more relatable or significant, improving subject memory retention. Despite the fact that mnemonics can be applied to a range of information types and in visual or kinesthetic formats, they are most frequently utilized for lists and in aural formats, such as rhyme schemes, acronyms, initialisms, or catchy phrases.

Learn more about mnemonic from

brainly.com/question/22724173

#SPJ4

What are the powers of media and information?

Answers

It enables citizens to express ideas and emotions openly, and it can generate motivation and empowerment. Information and media consumers should constantly use caution.

The nature of a product, service, or message can be revealed to us by the media. In actuality, media influence has become so powerful in today's world that it is simple for them to have an affect on individuals in either a negative or positive way. Our society also relies on the media to provide information and entertainment. The public can be informed by the media, yet this information is usually misunderstood. The media has an impact on how we define our beliefs, choose our leaders, and set our conventions. The media has the power to motivate individuals. Social media's strength is its capacity to connect with and exchange information with anyone on Earth, or with many people at once.

Learn more about media from

brainly.com/question/29387291

#SPJ4

the ____ technology trend may change the way users access software and data.

Answers

The cloud computing technology trend may change the way users access software and data.

Data management software (DMS) integrates several data kinds into a single resource, like a database, or receives data and turns it into a single storage container. The more specific word data management software is frequently used interchangeably with the particular term data management tool since different data management tools may route incoming data to a database or group of databases. Database management software includes widely used applications like MS Access, Visual FoxPro, and SQL that help manage different kinds of data within their specific databases or data containers.

Cloud computing is the on-demand provision of computer system resources, particularly processing power and data storage, without direct active supervision by the user. Many times, large clouds divide their operations among a number of locations.

Learn more about Data management software

brainly.com/question/1913367

#SPJ4

which operating systems have both workstation and server editions?
-ios
-android
-ubuntu
-windows

Answers

Answer:

WINDOWS

Explanation:

The operating system that have both workstation and server editions is windows. The correct option is D.

What is an operating system?

The operating system (OS) controls all of the computer's software and hardware. It basically manages files, memory, as well as processes, handles input along with output, and controls peripheral devices such as disk drives and printers.

The most chief software that runs on a computer is the operating system. It is in charge of the computer's memory, processes, as well as all software and hardware.

Several computer programs typically run concurrently, all of which require access to the computer's processor (CPU), memory, and storage.

Operating systems now use networks to connect to one another as well as to servers for access to file systems and print servers. MS-DOS, Microsoft Windows, and UNIX are the three most popular operating systems.

Thus, the correct option is D.

For more details regarding operating system, visit:

https://brainly.com/question/6689423

#SPJ2

Consider the following class definition.
public class BoolTest
{
private int one;
public BoolTest(int newOne)
{
one = newOne;
}
public int getOne()
{
return one;
}
public boolean isGreater(BoolTest other)
{
/ missing code /
}
}
The isGreater method is intended to return true if the value of one for this BoolTest object is greater than the value of one for the BoolTest parameter other, and false otherwise. The following code segments have been proposed to replace / missing code /.
return one > other.one;
return one > other.getOne();
return getOne() > other.one;
Which of the following replacements for / missing code / can be used so that isGreater will work as intended?
A.
I only
B.
II only
C.
III only
D.
I and II only
E.
I, II and III

Answers

The replacements for / missing code / can be used so that is Greater will work as intended are I, II and III.

Which statement best sums up what the arrayMethod() function performs to the array nums?The array method call will now result in a run-time error because it tries to access a character at index 7 in a string whose final element is at index 6, even though it used to function without a problem.The fetch, decode, execute cycle is the order in which a CPU runs code. When a chunk of code is placed into RAM, the CPU reads its individual components one at a time, converts them into binary using the assembler, and then runs the code.The replacements for / missing code / can be used so that is Greater will work as intended are I, II and III.

To learn more about arrayMethod() refer to:

https://brainly.com/question/21685427

#SPJ4

A ___ is a level of security at which smtp messages can be sent or with which operations are being processed, expressed in terms of whether or not authentication and/or privacy are provided.

Answers

An SNMP security level is a level of security at which SNMP messages can be sent or with which operations are being processed, expressed in terms of whether or not authentication and/or privacy are provided.

In the field of computers, an Simple Network Management Protocol (SNMP) can be described as a special Internet Protocol that is used for organizing information about a particular IP network.

An SNMP message is operated through the Network Management System (NMS) to an SNMP agent service.

The SNMP messages are a special level of security through which the authenticity and privacy of operations for an IP network are assessed and processed.

AN SNMP message follows a specified message format following which the fields and order of an SNMP message are formatted. Such messages are widely used in network protocol.

To learn more about SNMP, click here:

https://brainly.com/question/20435216

#SPJ4

100BaseT network uses the TCP/IP protocol suite exclusively, and workstations on your network obtain addresses dynamically from a server. From your computer, you can contact all servers and workstations on your own network segment, but you are unable to gain access to network resources on other segments. Which factors should you investigate

Answers

Answer:

The two factors are:

The default gateway The routers

Explanation:

Default gateway:

The default gateway transmits individual information back and forth between the network. This is most consumers and commercial workplaces seem to be a router whereby channels communication from either the local area network to something like the cables or Cellular networks that transfer that one to the broadband service.

The routers:

A router would be the first safety boundary from even being intruded into a channel. Order to enable the highest possible level of device public safety eventually turns such as the proxy server into something.

Why are graphs and charts important to analyze data?

Answers

Answer:

Graphs and chart provide the GUI representation they provide the analysis in form of summary that is easy to understand and they provide good comparision.

Explanation:

Summary

Comparision

Quick to understand

Answer the following questions: a. What is the Internet? Who controls and supervises it?​

Answers

Answer:

   Answer the following questions: a. What is the Internet? Who controls and supervises it?​

Explanation:

what is the default margin size in a word document? a) one-inch. b) two-inch. c) three-inch. d) four-inch.

Answers

In most cases, when you open Microsoft Word, the margins will already be set to 1-inch. To be certain you have the margins set to 1-inch: Click on the Page Layout tab. Click on Margins to see a drop-down menu.

What is the default margin size in Word?

In Word, each page automatically has a one-inch margin. You can customise or pick predefined margin settings, set margins for facing pages, allow extra margin house to allow for record binding, and trade how margins are measured.

What is 2 inch margin in Word?

Using a Heading 1 fashion and enhancing the style to create the two-inch margin is the pleasant method for doing this. By adding 1 inch (or seventy two points) of extra area above the Heading 1, you combine the default one inch margin from the report with the one inch of extra area on the heading to create your two inches.

Learn moe about margin size in Word here;

https://brainly.com/question/28579662

#SPJ4

ideally, the backrest is tilted back slightly, so when you turn the wheel your shoulders are __ the seat

Answers

**Parallel** to the seat

Fill in the blank with the correct answer.

Question 1 options:

1) options


2) view


3) selection


4) history


5) navigate

1.
The ______ panel records user operations and can be used to reverse changes made to an image.

2.
The ______ panel is used to pan an image and zoom in and out

3.
The ______ bar displays options available for selected tool.

4.
The Actual Size and Fit Screen options are available in the ______ menu.

5.
The Lasso, Marquee, and Wand tools are examples of ______ selection tools.

Answers

Answer:

1. history

2. view

3. Selection

4. options

5. navigation

Explanation:

Hoped this helped. I am un-sure of a few.

Other Questions
A cube is 5 feet on each side. What is its volume? 125 ft 3 150 ft 3 25 ft 3 50 ft 3 Fortas uses the word divorced in the third sentence. What two things does he see as divorced from one another The personal computer market is very competitive and is influenced by many internal and external factors. Some of the uncontrollable factors that influence the personal computer market include: political, economical, social and technological factors that can have an impact on the organizations strategy.a. Trueb. False Please place the following statements in the correct order to reflect the sequence of events that occur upon secondary exposure to allergens in type I hypersensitivities.1. Degranulation and release of chemical mediators from mast cell.2. Allergen attaches to IgE on mast cells.3. Systemic distribution of mediators via bloodstream.4. Symptoms appear in various organs.5. Allergen is encountered after previous sensitization event.5. Allergen is encountered after previous sensitization event. According to Euclid's second postulate, how far can the line segment be extended in either direction? A) forever B) not at all C) until it intersects the x-axis D) until it intersects the y-axis Two hamsters work together and move a pile of sunflower seeds in 7 1 2 minutes. How long would it take each hamster to move the same pile alone if one of the hamsters needs 8 more minutes to do the job than the other? How much time does it take for a bird flying at a speed of 45m/s to travel a distanceof 1, 800 meters? A highway department is considering building a temporary bridge to cut travel time duringthe three years it will take to build a permanent bridge. The temporary bridge can be put up ina few weeks at a cost of $740,000. At the end of three years, it would be removed and thesteel would be sold for scrap. The real net cost of this removal would be $81,000. Based onestimated time savings and wage rates, fuel savings, and reductions in risks of accidents,department analysts predict that the benefits in real dollars would be $275,000 during the firstyear, $295,000 during the second year, and $315,000 during the third year. Departmentalregulations require use of a real discount rate of 4 percent.a. Calculate the present value of net benefits assuming that the benefits arerealized at the end of each of the three years.b. Calculate the present value of net benefits assuming that the benefits arerealized at the beginning of each of the three years.c. Calculate the present value of net benefits assuming that the benefits arerealized in the middle of each of the three years.d. Calculate the present value of net benefits assuming that half of each yearsbenefits are realized at the beginning of the year and the other half at the end of theyear.Does the temporary bridge pass the net benefits test? 2+2=4\whats yall qc (question cove) help ill mark brainliest 2783 in one decimal place An velometer if the maximum error is to be limited to C % of the true velocity. The damping constant of the velometer is to be 40 n-s/m and the suspended mass is to be 0.1 lb. Find the natural frequency and the spring stiffness. QuestionWrite in scientific notation.215 107Responses2.15 1092.15 1092.15 1052.15 1052.15 1072.15 1072.15 1014 Assignment: Keep the answers short and precise (3-4 sentences). You might not find all the answers in lecture or book. Googling the unknown terms will be very useful. 1. (True/False. Explain) Longer the duration of the loan, higher the interest rate, 2. (True/False. Explain) higher the risk of the loan, lower the interest rate. 3. (True/False. Explain) $1 today is worth more than $1 tomorrow. 4. What is Initial Public Offering (IPO)? Can you buy one from another investor? 5. What is crowdfunding? 6. Differentiate public and private goods with example. 7. What is free rider problem? What kind of goods are exposed to it? 8. Explain rational ignorance. 9. What kind of resources are subject to common pool problem? 10. Define externalities. Provide some examples of negative and positive externalities. The transactions of Spade Compary appear beiow. a. Kacy Spade, owner, invested $11,500 cash in the company in exchange for common stock. b. The company purchased office supplies for 5334cash. c. The company purchased $6,360 of office equipment on credit. d. The company received $1,357 cash as fees for services provided to a customet. e. The company paid $6,360 cash to settle the payable for the oflice equipment purchased in transaction c f. The company billed a customer $2,438 as fees for services provided. g. The company paid $535 cash for the monthly rent. h. The company collected $1,024 cash as partial payment for the account recelvable created in transaction f. 1. The company paid a $900 cash dividend to the owner (sole shareholder). Required: 1. Prepare general journal entries to record the transactions above for Spade Company by using the following accounts: Cash; Accounts Receivabie; Office Supplies; Office Equipment; Accounts Payable, Common Stock, Dividends; Fees Earned; and Rent Expense. For each account, identify whether it is included in a post-closing trial balance. In order to show his audience that he was a supporter of civil rights, President Carter mentioned:Martin Luther King, Jr.Rosa Parks.Andrew Young.All of the choices are correct. complete the following table for the simple discount notes. use the ordinary interest method.Amount dueat maturityDiscount rateTimeBank discountProceeds$20,000formula7.mml180 days$$ Qu tiempo verbales conoces segn el tema de la biografa y la autobiografa? 2. find the highest two-digit number and lowest three-digit number from the list [105, 25, 652, 40, 843, 118, 99, 679]. (2 points) Evaluate the integral [(5x3+7x+13) sin( 2 x) dx Answer: You have not attempted this yet