Think of a game you enjoyed playing recently. Using the language of visual elements and principles of design, critique the game. Evaluate how well its visuals communicated their intended message and goal, how pleasing the image was, etc. Your answer should cover at least three distinct design principles.

Answers

Answer 1

Answer:

Goat Simulator is a wacky physics-based game that embraces a deliberately absurd premise. The game is designed to look like a low-budget goat simulator, complete with hilarious glitches and exaggerated physics. The game's visuals are very deliberate, and they communicate the game's silly and whimsical nature well.

One of the design principles that Goat Simulator executes well is contrast. The game features a colorful and exaggerated world filled with surreal objects and environments. The contrast between the normal world and the absurdity of the goat's interactions with it is what makes the game so entertaining. The game's use of bold and contrasting colors also adds to its playful and whimsical tone.

Another design principle that Goat Simulator uses effectively is repetition. The game is built around a series of silly, repetitive actions that the goat can perform, such as headbutting objects and licking people. These actions are all tied together by the goat's physics-based movements, which add to the game's overall absurdity.

Finally, the game uses the principle of balance in its level design. Each level is designed to balance the challenges of navigating the environment with the sheer fun of exploring and interacting with objects. This balance helps keep the player engaged in the game and prevents it from becoming too frustrating.

Overall, Goat Simulator uses visual elements and design principles effectively to communicate its playful and absurd premise. The game's use of contrast, repetition, and balance all contribute to its overall success as an entertaining and enjoyable game.


Related Questions

real world situations that are too expensive or dangerous to test can be represented using computer _________

Answers

Answer:

Real world situations that are too expensive or dangerous to test can be represented using computer simulations.

Explanation:

A simulation is a computer-based model of a real-world system or process, which allows users to study and analyze the behavior of the system without having to conduct physical experiments. Simulations can be used in a wide variety of fields, including engineering, science, business, and medicine, to study complex systems, predict outcomes, and explore different scenarios and scenarios. For example, a simulation could be used to model the flow of traffic through a city, the spread of a disease, or the performance of a financial investment. By using simulations, researchers and analysts can gain valuable insights and make more informed decisions without the need for costly or risky experiments.

The small number of laboratory tests that have the best chance of solving the problem under study are found via millions of computer experiments.

What, expensive or dangerous using computer?

A simulation is a computer-based representation of a real-world system or process that enables users to research and examine the system's behaviour without having to carry out actual physical tests.

In a wide range of disciplines, including engineering, science, business, and medical, simulations can be used to investigate complicated systems, forecast results, and explore various scenarios.

A simulation might be used, for instance, to simulate the movement of traffic in a metropolis, the development of a disease, or the success of an investment.

Without the need for expensive or risky trials, researchers, and analysts can use simulations to gather insightful information and make more educated judgments.

Therefore, A biological system can be studied using computational models of today on various levels.

Learn more about computer here:

https://brainly.com/question/21080395

#SPJ2

Of the following scenarios, which one is best suited to a non-linear presentation?
A) An annual budget review considering of 10 graphs and tables
B) A brainstorming session on new titles for a future publication series
C) A session detailing new book titles for the upcoming year
D) The breakdown of a publication calendar for a printing press

Answers

Answer: B. A brainstorm session on new titles for publication series.

Explanation: I think this is the answer if it is not and it is wrong I am very sorry.

It’s (B) I did on a test

What are the requirements of a data dictionary ?

Answers

While these are the core elements of a data dictionary, it's not uncommon to document additional information about each element, which may include the source of the information, the table or concept in which the attribute is contained, the physical database field name, the field length, and any default values.

Answer:

nullability, optionality, size, indexes, data type

Explanation:

You have been asked to advise a group of several universities who want to combine research efforts and store data in the cloud. Which type of cloud solution might be best for them

Answers

Community cloud is best for a group of several universities who want to combine research efforts and store data in the cloud.

Community cloud

Community cloud allows for the flexibility and scalability normally found in a public cloud, but it also limits the number of users to a smaller, trusted group.

When multiple organizations with similar objectives want to combine efforts in a cloud, the best choice is generally a community cloud.

Community cloud is best for a group of several universities who want to combine research efforts and store data in the cloud.

Find out more on community cloud at: https://brainly.com/question/25620318

How many of the colonists of Jamestown died before they made it to shore, due to the difficult voyage?

half
almost all
one third
nonE

Answers

Almost all of the colonist of Jamestown died before they made it to shore, due to the difficult voyage.

Please Helppp!!!! What type of lighting works best in the morning and at dusk?

__________ gets its light from the sun or moon and is best for photographs that photographers take in the morning or at dusk.

(I already tried natural because it was in the lesson and it said it was wrong)

Answers

Answer:

solar light

Explanation:

This is because at this time, the sun is in the right place to illuminate the scene from the right angles, without overpowering the photograph. Light is one of the most important factors to take into account when taking a photograph.

In this section, answer the questions under the following assumption. A computer has 32-bit instructions and 12-bit addresses. Suppose there are 250 2-address instructions. How many 1-address instructions can be formulated? Explain your answer.
There are 250 2-address instructions. There are only a total of 256 2-address instructions allowed if we have 32-bit instructions (two addresses take up 24 bits, leaving only 8 bits for the opcode). Looking at the 8 bit opcode, assume bit patterns 00000000 (0) through 11111001 (249) are used for the 250 two-address instructions. Then there are 6 bit patterns left for one address instructions. However, each one of these can use the remaining 12 bits gained from having only one operand, so we have 6 * 212
1. What is the beginning range value for the 250, 2 address instructions. Write all 32 bits and write x instead of a 0 or 1 in the operand bit positions. Do not write any spaces.
2. What is the ending range value for the 250, 2 address instructions. Write all 32 bits and write x instead of a 0 or 1 in the operand bit positions. Do not write any spaces
3. What is the beginning range value for the 1 address instructions. Write all 32 bits and write x instead of a 0 or 1 in the operand bit positions. Do not write any spaces.
4. What is the ending range value for the 1 address instructions. Write all 32 bits and write x instead of a 0 or 1 in the operand bit positions. Do not write any spaces.

Answers

1. Beginning range value for the 250, 2 address instructions: 00000000xxxxxxxxxxxxxxxxxxxxxxxx
2. Ending range value for the 250, 2 address instructions: 11111001xxxxxxxxxxxxxxxxxxxxxxxx
3. Beginning range value for the 1 address instructions: 11111010xxxxxxxxxxxxxxxxxxxxxxxx
4. Ending range value for the 1 address instructions: 11111111xxxxxxxxxxxxxxxxxxxxxxxx

As explained earlier, the 250, 2-address instructions use opcode bit patterns from 00000000 to 11111001. The next available opcode bit pattern is 11111010, which can be used for the first 1-address instruction. As there are 6 remaining opcode bit patterns, the range for the 1-address instructions starts from 11111010 and ends at 11111111.

Since the 1-address instructions only have one operand, the remaining 12 bits can be used to represent the address.

To know more about Opcode, click here:

https://brainly.com/question/30408151

#SPJ11

In modern terms, a(n) _______________ is an electronic device that can perform calculations.

Answers

In modern terms, a calculator is an electronic device that can perform calculations.

This device is widely used in many fields such as science, engineering, mathematics, and finance. A calculator is a tool used to help solve equations, perform math operations, and check the work of other calculations. It is an essential device for many professionals, students, and anyone else who needs to perform math quickly and accurately. In addition, a calculator can store numbers, allowing you to recall previous calculations and perform more advanced functions. For example, you can use a calculator to perform logarithmic, trigonometric, and statistical functions. In essence, a calculator is a highly useful tool that can save time and improve accuracy when working with numbers

In modern terms, a calculator is an electronic device that can perform calculations. It is widely used in many fields such as science, engineering, mathematics, and finance. The calculator can store numbers and perform more advanced functions such as logarithmic, trigonometric, and statistical functions. A calculator is an essential device for many professionals, students, and anyone else who needs to perform math quickly and accurately.

To know more about device visit:

https://brainly.com/question/33583932

#SPJ11

which of the following gestures would you use if you want to activate a mode that enables you to move an item with one finger to a new location on your new tablet?

Answers

On your new tablet, you can toggle on a mode that lets you move an object to a new spot only with one finger by swiping your finger across the screen.

What are gestures ?

A gesture is a visible body activity that conveys specific messages in place of or in addition to words. It is a type of nonverbal or non-vocal communication. Gestures might include the movements of the hands, face, or other body parts. Physical non-verbal communication like proxemics, purely expressive displays, or displays of shared attention are different from motions in that they convey specific messages. People can express a wide range of emotions and ideas through motions, from hostility and scorn to admiration and affection.

To know more about gestures
https://brainly.com/question/12115354
#SPJ4

Which wireless technology will John use to provide wide-range cellular service that focuses on indoor coverage, low cost, long battery life, high connection density, and has a low-power wide-area network

Answers

Wireless technology is the method used to communicate and transfer data without wires and cables. John will use Narrowband IoT to provide cellular services.

What is Narrowband IoT?

Narrowband Internet of things is a Low power WAN technology developed for cellular services, and devices are used to balance power consumption and spectrum efficiency in providing coverage.

Narrowband IoT gives increased coverage, has long battery life and is not expensive as other networking systems, and has low power wide region networking.

Therefore, John should use Narrowband IoT.

Learn more about wireless technology here:

https://brainly.com/question/14618006

#SPJ1

Why are my group messages coming in separately android?

Answers

Answer:

your account might be logged in that device

A data type consisting of numbers, letters and symbols is a _____.

Answers

Answer:

That's the answer

Hope it helps

#brainliest

#heart

#star

#Carryonlearning

A data type consisting of numbers, letters and symbols is a _____.

What do computers use to represent on and off? 0 and 1 1 and 2 RGB Megabyte

Answers

We use 0 to represent "off" and 1 to represent "on". Each one of the switches is a bit. A computer is called a "64-bit" computer if its registers are 64-bits long (loosely speaking). Eight switches in a row is a byte.

The statement or block of statements following the while clause is known as the ____________ of the loop.
a. assembly
b. body
c. definition
d. sequence structure

Answers

The statement or block of statements following the while clause is known as the body of the loop.
Your answer: b. body

In computer programming, a "block of statements" following the while clause refers to a set of one or more instructions or statements that are executed repeatedly while a certain condition is true. The while clause is a type of control structure used in programming languages to implement loops.

In this syntax, the condition is a boolean expression that is evaluated at the beginning of each iteration of the loop. If the condition is true, the block of statements within the braces {} is executed. After the block of statements is executed, the condition is evaluated again. If it is still true, the block of statements is executed again, and this process repeats until the condition becomes false.

The block of statements following the while clause can include any valid instructions or statements in the programming language. These statements can be simple, such as assigning a value to a variable, or complex, such as calling a function or executing a series of conditional statements.

To learn more about Statement Here:

https://brainly.com/question/18591190

#SPJ11

Which option best describes a Wi-Fi router?
A. A device that converts data from an electrical signal into a digital
format
B. A device that connects devices on a network without physical
cables
C. A computer that provides client devices with access to resources
and data
D. A device that physically connects multiple devices on the same
local network

Answers

Option B. A device that connects devices on a network without physical cables best describes a Wi-Fi router.

What is Wi-Fi router?

A Wi-Fi router is a device that creates a wireless local area network (WLAN) by connecting to an internet source, such as a modem or Ethernet cable, and then wirelessly broadcasts a signal, allowing other devices to connect to the internet through it.

Therefore, This means that devices can connect to the network without the need for physical cables, making it a convenient way to connect multiple devices in a location such as a home or office. The router acts as a central hub for the devices on the network, managing and directing traffic and providing a secure way to connect to the internet.

Learn more about Wi-Fi router from

https://brainly.com/question/21495279

#SPJ1

HELP ME!!! I WILL GIVE BRAINLY THINGY!!!

What does the code if (num2==50){ do?

Answers

Answer:

What subject is this?

Explanation:

is this math ?????????????????????

data encryption is the process of converting plain text into

Answers

Data encryption is the process of converting plain text into ciphertext, which is an unreadable format. Encryption is the best way to protect the confidentiality and security of sensitive data and communication, whether it is in storage or transit.

Encryption technology plays a critical role in safeguarding data privacy and security in various industries, including healthcare, finance, e-commerce, and government. For example, medical records, financial transactions, and personal information need to be protected from prying eyes and cyberattacks.

There are several types of encryption algorithms, such as symmetric key encryption, asymmetric key encryption, and hashing algorithms. Symmetric encryption uses the same key for encryption and decryption, whereas asymmetric encryption uses two different keys, a public key, and a private key, for encryption and decryption. Hashing algorithms are used to generate a unique digital fingerprint, or hash, of data to verify its integrity and authenticity.

Know more about the Data encryption

https://brainly.com/question/28283722

#SPJ11

I need help with this as soon as possible pls.

Complete the pseudocode for the following grading scale, following the style of the existing pseudocode.

Numerical Grade

Letter Grade

100 - 90

A

89 - 80

B

79 - 70

C

69 - 60

D

<= 59.4

F



/*IF grade >= 90

/* PRINT “A”

/*ELSEIF grade >=80 AND grade <= 89

/* PRINT “B”

/*

/* PRINT “C”

/*ELSEIF grade >=60 AND grade <= 69

/* PRINT “D”

/*ELSE

/* PRINT “F”

(It is not/*ELSEIF grade>=70 AND <=79)

Answers

Answer:

/*ELSEIF grade >=70 AND grade <= 79

Explanation:

You have to have the variable grade in both parts of the ELSEIF statement >=70 and <=79

The hint says t is not/*ELSEIF grade>=70 AND <=79 since this statement has the variable grade only at the >= part not the <= part

Write a program, which will take 20, inputs from the user and find how many
odd and even numbers are there.

Pseudocode & Python

Answers

Answer:

user_input = [int(input()) for i in range(20)]

even = []

odd = []

for i in user_input:

if i%2:

even.append(i)

else:

odd.append(i)

print("odd : ", len(odd), "even : ", len(even))

Explanation:

The above code is written in python :

Using a list comprehension we obtain a list of 20 values from the user and store in the variable user_input.

Two empty list are defined, even and odd which is created to store even and odd values.

A for loop is used to evaluate through the numbers in user_input. Even values leave no remainder when Divided by 2 and are appended to the even list while those those leave a raunder are automatically odd values. The elements each list are counted using the len function and are displayed using the print statement.

For each of these arguments determine whether the argument is correct or incorrect and explain why.
(a) All students in this class understand logic. Xavier is a student in this class. Therefore, Xavier understands logic.
(b) Every computer science major takes discrete mathematics. Natasha is taking discrete mathematics. Therefore, Natasha is a computer science major.
(c) All parrots like fruit. My pet bird is not a parrot. Therefore, my pet bird does not like fruit.
(d) Everyone who eats granola everyday is healthy. Linda is not healthy. Therefore, Linda does not eat granola every day.

Answers

(a) Correct. The argument follows a valid logical pattern called Modus Ponens, where the truth of the premises guarantees the truth of the conclusion.

(b) Incorrect. The argument commits the fallacy of affirming the consequent, which is a logical error. The truth of the premises does not necessarily lead to the truth of the conclusion. (c) Correct. The argument follows a valid logical pattern called Modus Tollens, where the denial of the consequent guarantees the denial of the premise. (d) Incorrect. The argument commits the fallacy of denying the antecedent, which is a logical error. The truth of the premises does not necessarily lead to the truth of the conclusion.

(a) The argument is correct because it follows the logical pattern of Modus Ponens. The first premise states that all students in the class understand logic. The second premise states that Xavier is a student in the class. From these premises, we can validly conclude that Xavier understands logic. This argument is logically valid and sound.

(b) The argument is incorrect because it commits the fallacy of affirming the consequent. The first premise states that every computer science major takes discrete mathematics. The second premise states that Natasha is taking discrete mathematics. However, we cannot logically conclude that Natasha is a computer science major based solely on these premises. It is possible for computer science majors to take discrete mathematics or for Natasha to have other reasons for taking the course.

(c) The argument is correct because it follows the logical pattern of Modus Tollens. The first premise states that all parrots are like fruit. The second premise states that my pet bird is not a parrot. From these premises, we can logically conclude that my pet bird does not like fruit. This argument is logically valid and sound.

(d) The argument is incorrect because it commits the fallacy of denying the antecedent. The first premise states that everyone who eats granola every day is healthy. The second premise states that Linda is not healthy. However, we cannot logically conclude that Linda does not eat granola every day based solely on these premises. It is possible for Linda to have other factors affecting her health or for the premise itself to be flawed.

In logic, it is important to evaluate the structure of arguments to determine their validity. Logical fallacies, such as affirming the consequent or denying the antecedent, can lead to invalid conclusions even if the premises seem plausible.

Learn more about computer science here:- brainly.com/question/30225532

#SPJ11

write the importance of software In computer ​

Answers

Answer:

Microsoft word, Excel, Access, Power point, Microsoft windows...........

Explanation:

How do you choose the best point of view for your own narratives?

Answers

Answer:

If you want to write the entire story in individual, quirky language, choose first person. If you want your POV character to indulge in lengthy ruminations, choose first person. If you want your reader to feel high identification with your POV character, choose first person or close third.

Explanation:

you've just installed a new device on your windows system. after installation, you can't use the device. you check device manager and find an icon with a yellow exclamation mark. what is the best first step for resolving the device issue?

Answers

From the manufacturer's website, download the most recent driver. Getting the most recent driver for the device would be the first thing to try.

What does yellow exclamation mark on Device Manager indicate?Under Other devices, if a device has a yellow circle with an exclamation point, it means that other hardware is in conflict with it. It could also mean that the device's drivers weren't properly installed. When you double-click and open the problematic device, an error code is displayed.Go to Start. To open the console, perform a search for Device Manager and select the top result. The device with the yellow exclamation point can be selected by right-clicking it and choosing Update driver.The extracted folder containing the driver update should be chosen.Select Include subfolders from the menu.Then press the Next button.Select Close from the menu.

To learn more about : Device Manager

Ref : https://brainly.com/question/28249704

#SPJ4

Examine the performance of the mixer system providing detailed operation, establish the key facts and important issues in the system and make a valid conclusion about recommendations for system improvement.

Answers

The mixer system's performance needs examination to identify key facts, important issues, and recommendations for improvement.

The system's current operation should be analyzed in detail to understand its strengths and weaknesses, as well as any potential bottlenecks or inefficiencies. It is crucial to establish a comprehensive understanding of the system's functioning and identify areas where enhancements can be made to optimize its performance. The key facts about the mixer system should include its design, components, input/output specifications, and operational parameters. The system's performance metrics, such as mixing efficiency, throughput, and reliability, should be assessed to evaluate its effectiveness. Additionally, any operational challenges, such as maintenance requirements, energy consumption, or limitations in scalability, should be identified. Important issues that may arise in the mixer system could involve inadequate mixing results, low production capacity, frequent breakdowns, or excessive energy usage. These issues could impact productivity, product quality, and overall system performance. It is crucial to determine the root causes of these problems and devise effective solutions to address them. Based on the examination of the mixer system, recommendations for improvement can be formulated. These recommendations may include upgrading or replacing certain components to enhance performance, implementing automation or control systems to optimize operations, improving maintenance protocols to minimize downtime, or exploring energy-efficient alternatives. The specific recommendations should be tailored to address the identified key facts and issues, aiming to enhance the system's efficiency, reliability, and overall performance.

Learn more about system's functioning here:

https://brainly.com/question/8325417

#SPJ11

You want to connect an external hard drive for backups. Which is the fastest connection used by current external hard drives

Answers

Answer:

thunderbold proly

Explanation:

Python String Functions: Create a new Python Program called StringPractice. Prompt the user to input their name, then complete the following:
Length
• Print: “The length of your name is: [insert length here]”
Equals
• Test to see if the user typed in your name. If so, print an appropriate message

Really appreciate the help.

Answers

#Swap this value by your name. Mine is Hamza :)

my_name = "Hamza"

#Get input from user.

inp = input("What's your name?: ")

#Print the length of his/her name.

print("The length of your name is",len(inp),"characters.")

#Check if the input matches with my name?

#Using lower() method due to the case insensitive. Much important!!

if(inp.lower()==my_name.lower()):

   print("My name is",my_name,"too! Nice to meet you then.")

A broadcast network is one in which a transmission from any one attached station is received by all other attached stations over a shared medium. Examples are a bus-technology local area network, such as Ethernet, and a wireless radio network. Discuss the need or lack of need for a network layer (OSI layer 3) in a broadcast network.

Answers

Answer:

In a broadcast network such as radio network for example a walkie talkie, the broadcasted transmission is received equally by all receivers indiscriminately which may lead to dissemination of classified information to an unauthorized receiver, therefore, the network layer is required is needed to ensure proper routing of the information

Similarly, when the all the broadcasters in one location are each trying to send messages to different receivers at another given location, there would be potential for network congestion and it would be difficult to send information through the network

When there is need for priority service the presence of a network layer is needed in the network

However, when the above functions performed by the network layer is not required, then, the network layer can be excluded, such as the communication between layers 4 - 7 of the OSI model

Explanation:

C Visible Display Unit D Visual Display Unit By increasing font size, which of the following is affected? A Colour B Picture C Sound Text Computer Studies/402/1/2019​

Answers

A Visual Display Unit's font size setting only affects the text that appears on the screen; it has no impact on the computer system's output of color, sound, or pictures.

What sort of visual display unit is that?

The right response is CRT Monitor. It is sometimes known as or used interchangeably with "monitor," a computer output device. When a user submits text, images, or graphics using any input device, the VDU or monitor displays it.

What primary visual functions are there?

Visual acuity, contrast sensitivity, color, depth perception, and motion are some of these visual function results. Keep in mind that measuring visual fields using formal perimetry testing is also very significant for evaluating visual function.

To know more about font size visit:

https://brainly.com/question/1176902

#SPJ9

Select the correct answer. What does the number 5 denote in the formula for Gross Words per Minute? A. number of characters in a word B. number of errors in a sentence C. number of special characters in a sentence D. number of entries in a sentence E. number of keyboard shortcuts used while typing
PLS ANSWER ASAP

Answers

Answer:

aaa

Explanation:

The correct answer is A. The number 5  represents the number of characters in a word.

What are Gross Words per Minute?

Gross Words per Minute (GWPM) is a measure of typing speed that represents the total number of words typed in a given time period, typically measured in minutes.

here,
In the formula for Gross Words per Minute (GWPM), the number 5 typically denotes the number of characters in a word. The formula for GWPM is:

GWPM = (total number of characters typed / 5) / (time taken to type in minutes)

The total number of characters typed is divided by 5 (number of characters in a word) to get the number of words typed since the average word in English is around 5 characters long. This gives the gross words typed per minute, which is a measure of typing speed.

Learn more about Gross Words per Minute here:
https://brainly.com/question/12608672
#SPJ2

list at least 3 advantages and 3 disadvantages of cloud-based data storage

Answers

The advantages and disadvantages of  cloud-based data storage are;

Advantages -

ScalabilityAccessibilityCost Savings

Disadvantages -

Dependence on InternetSecurity RisksLimited Control.

How is this so?

Advantages

Scalability -  Easily scale storage capacity based on demand.

Accessibility - Access data from anywhere with an internet connection.

Cost Savings -  Eliminate the need for on-premises hardware and maintenance costs.

Disadvantages

Dependence on Internet - Reliance on stable internet connectivity for data access.

Security Risks - Concerns about data breaches and unauthorized access.

Limited Control -  Less control over the physical infrastructure and data storage environment.

Learn more about cloud storage:
https://brainly.com/question/18709099
#SPJ4

Other Questions
Intelligence tests were originally used to differentiate between students who were having academic difficulty and students who were not. 8. Software ____ are individual programs that can be purchased, installed, and run separately, but extract data from the common database. use the angle bisect theorem to solve for m Qualitative forecasting techniques should be applied in situations where time series data exists, but where conditions are expected to change.A. TrueB. False First and foremost, it is the responsibility of the __ to review the post- tension installation during placement If planned aggregate expenditures are $400 billion, consumption is $120 billion, investment is $60 billion, government spending is $70 billion, there is a Question 7 options: trade surplus of $150 billion. trade surplus of $250 billion. trade deficit of $650 billion. trade balance. if this is question can be answered as soon as possible that would be spending What are the 7 context clues?. What is the difference of 5 and 2/5? Show your work. solve 5/18=n/30 using multiplication in humans, mutations in the hpc1 gene on chromosome 1 (an autosome) increases a man's chance of getting prostate cancer. women do not have a prostate. the hpc1 gene is found: The formula, c=4m+5, calculates the cost of a cab ride where c is the total cost of the cab ride and m is the number of miles the cab travels. which equation correctly solves for the amount of miles a person could ride in a cab with a given amount of money? Two of the angles in a triangle measure 56 and 21. What must be the measure of the third angle? The motor makes a noise when it is turned on.Describe the differences between the properties of the sound waves produced by the motorand the water waves in the ripple tank. which factor would most likely affect the amount of money jack is paid for doing his job? responses the number of people jack has in his family the number of people jack has in his family the amount of education jack has the amount of education jack has the amount of money jack has in the bank the amount of money jack has in the bank the cost of jack's weekly groceries How are a tundra and a desert different? A tundra has a lot of precipitation and a desert has little. A tundra has few trees and plants and deserts have many. A tundra has soil that is often sandy and a desert has grass. A tundra is dry and cold and a desert is dry and hot. A pharmacist orders medications for a total of $6,439.65.a 6 44% discount is given if payment is made within 15 days, and a 2.5% discount is given if payment is made within 30 days. how much money can be saved by paying in 15 days instead of 30 days? it is recommended that gloves be changed as soon as they become wet... or after how many hours of use, regardless of their condition? group of answer choices one hour two hours three hours four hours Mike paid $6 for a fruit drink, $10 for a sandwich, $3 for chips, and $5 for dessert. Mike can only pay with 5 dollar bills will he need to cover the total amount? Why is it so important for marketing managers, when engaged in marketing planning, to successfully deal with both Marketing (Big M) and marketing (little m ) elements? What would be the likely negative outcome if a marketing plan paid a lot of attention to strategies and little attention to tactics? What would be the likely negative outcome of the reverse? Please provide a detailed response at least one page. Use outside research and the text to assist you in providing a comprehensive response.