Within a design, what is the idea of consistency which can illustrate a theme of a design?

Answers

Answer 1

The idea of consistency which can illustrate a theme of a design is called; Rythm

In interface design of websites, we have to carefully note the interactions that happen between human cognition and also the screen you’re trying to design for by having consistency and standards.

The two primary reasons for having consistency and standards when doing interface design are;

1) Reduce Learning; Being consistent limits the number of ways actions and operations are represented on the interface which ensures that the users do not have to learn new representations for each task.

2) Eliminate Confusion; Confusion arises when people are unable to add up piece of information together which sometimes, obstructs them from achieving a worthwhile target.

Thus, we have to make sure that the users do not have to spend time thinking about different words and actions and if they really mean the same thing within the context of your product.

Now, this idea of consistency explained above when illustrating themes is called Rythm.

Read more about Rythm at; https://brainly.com/question/13291061


Related Questions

IN C++ PLEASE!!! Read integers from input and store each integer into a vector until -1 is read. Do not store -1 into the vector. Then, output all values in the vector that are greater than zero in reverse order, each on a new line.

Ex: If the input is -19 34 -54 65 -1, the output is:

65
34

#include
#include
using namespace std;

int main() {

/* Your solution goes here */

return 0;
}

Answers

#include
#include
using namespace std;

int main(){

int input[] = {-19, 34, -54, 65, -1};
std::vector voutput:
std::vector vinput (input, input + sizeof(input) / sizeof(int) );

for (std::vector::iterator it = vinput.begin(); it != vinput.end(); ++it)
if(*it > 0) voutput.insert(voutput.begin(), *it);
for(std::vector::iterator it = voutput.begin(); it < voutput.end(); ++it)
std::cout << *it << ‘\n’ ;

return 0;
}

The program is an illustration of vectors; vectors are data structures that are used to hold multiple values in one variable name

The main program

The program written in C++, where comments are used to explain each action is as follows:

#include <iostream>

#include <vector>

using namespace std;

int main(){

   //This declares the vector

   vector<int> nums;

   //This declares an integer variable

   int num;

   //Thie gets the first input

   cin>>num;

   //This loops is repeated until the user enters -1

   while(num != -1){

       nums.push_back(num);

       cin>>num; }  

   //This iterates through the vector

   for (auto i = nums.begin(); i != nums.end(); ++i){

       //This checks if the current element is above 1

       if(*i > 0){

           //If yes, the element is printed

           cout << *i <<endl;

       }      

   }

       return 0;

}

Read more about C++ programs at:

https://brainly.com/question/24027643

Which are characteristics of a video with a higher
bit rate? Choose all that apply.
fewer frames per second
more frames per second
lower quality
higher quality
larger file size
smaller file size

Answers

Answer:

D and E.

Explanation:

which of these stamtemnst correctly descride how to adjust a imange on a slide

Answers

Answer:

To resize an image, just click and drag its edges.

Explanation:

?i really don't understand. I hope I'm correct..

Samantha is looking for a lens that is lightweight and small, making it easy to transport. She doesn’t care about the lens being interchangeable nor does she need to zoom as she prefers to move physically closer to her subjects. She wants a simple lens that has the ability to produce a natural perspective. What kind of lens is likely best for Samantha?

Select one:
a. micro
b. zoom
c. telephoto
d. prime

Answers

Answer:

The correct option is;

d. Prime

Explanation:

A prime lens is a unifocal, or fixed-focal-length lens and it is referred to as the opposite of a zoom lens

The maximum aperture of ranges from f2.8 to f1.2, which are fast and have a creamy rendering of light that are out of focus, and also provide crispy image details, by making the most use of the light available and provide distinct combination of foreground and background images in pictures that give a crisp and visually pleasing appearance.

in the nmapfe program, where do you set the spoofed ip you will use as the from field on the ping packets you send?

Answers

We specified faked ip in The Options Lab of the nmapfe software, which you will use as the from field on your ping packets.

To scan from a fake IPS, what Nmap command should be used?

Nmap offers a -D option. It is known as a decoy scan. When you designate one or more hosts as decoys, the -D option makes it appear to the remote host that they are also scanning the target network. As a result, even if their IDS may detect five to ten port scans from distinct IP addresses, they won't know which IP was actually scanning their ports and which was only a ruse.

What in Nmap is spoof?

A very effective technique is idle scanning, in which Nmap uses an idle host with a known IP ID sequence number to fake the origin IP.

To know more about Options Lab visit:-

https://brainly.com/question/30409557

#SPJ4

Which of the following would be considered unethical for a programmer to do?

Answers

Answer: Something would be considered unethical for a programmer to do is, Use someone else's code without the original developer's permission.

Explanation: Please give me Brainliest.

1. Symbols commonly seen on pictorial and line diagram.
2. What is the device used to protect against over-current and short circuit
conditions that may result in potential fire hazards and explosion?
3. A mark or character used as a conventional representation of an object,
function, or process.
4. It is performed at the end of the wire that allows connecting to the
device.
5. What kind of diagram uses slash to indicate the number of conductors
in a line?

Answers

Answer:

4. It is performed at the end of the wire that allows connecting to the

device.

Explanation:

hope this helps

use the gui tool to view network card and connection information (particularly ip address). b) use the nmcli command to view network card and connection information. c) use ifconfig and ip command to view ip address. d) use ifconfig command to disable your network connection. use the ping command to test the connection. take a screenshot of the terminal to show/explain the connection is lost (

Answers

To test the Connection, use the `ping` command (e.g., `ping 8.8.8.8`). Since the connection is disabled, the terminal should show "Network is unreachable" or no response.

To perform the tasks you've mentioned, follow these steps:
a) Open the GUI tool (e.g., Network Manager or Control Panel) and navigate to the network settings. Look for your network card/connection information, including the IP address.
b) Open a terminal and enter `nmcli device show` to view network card and connection details using the nmcli command.
c) To view the IP address, use the commands `ifconfig` or `ip addr show`.
d) To disable the network connection, run `sudo ifconfig [interface] down`, replacing [interface] with your network card name (e.g., eth0 or wlan0). To test the connection, use the `ping` command (e.g., `ping 8.8.8.8`). Since the connection is disabled, the terminal should show "Network is unreachable" or no response.

To Learn More About Connection

https://brainly.com/question/20837448

#SPJ11

in conducting a computer abuse investigation you become aware that the suspect of the investigation is using abc company as his internet service provider (isp). you contact isp and request that they provide you assistance with your investigation. what assistance can the isp provide?

Answers

ISPs can provide assistance in a computer abuse investigation by disclosing user information, providing connection logs, email records, internet usage data, network logs, and complying with legal processes.

What assistance can the ISP provide?

When we contact an internet service provider for help in a case of computer abuse investigation, they can help us through;

1. User Information: Using ISP, it can help to expose the information of the subscriber that is connected to the suspect's account. This can help track the suspect.

2. Connection Logs: This can help to keep records of internet connections which includes the IP addresses, timestamps and the duration of the sessions.

3. Email and Communication Records: It can also help to provide the content of the suspect email record and the timestamps between each message.

4. Internet Usage Data: It also help to track down the internet usage of the suspect such as browsing details, bandwidth usage etc.

5. Network Logs and Monitoring: In some cases, ISPs may have network monitoring systems in place that can capture traffic data, including packet captures, to help investigate network-related abuses or attacks. They can provide relevant logs or assist in analyzing network traffic.

6. Compliance with Legal Processes: ISPs must comply with lawful requests for assistance in investigations.

Learn more on ISP here;

https://brainly.com/question/19561587

#SPJ4

Which act passed by the US government in 1998 criminalizes the production and distribution of technology that intends to evade anti-piracy laws?

Answers

The Computer Fraud and Abuse Act I believe. Sorry if I’m wrong and I hope that it helps :)

Answer:

Digital Millennium Copyright Act (DMCA)

Explanation:

i got it right on plato

Please help me C++ coding


1. Make an inventory program for products. The program should first ask the user to prompt

USERNAME and PASSWORD. If both are correct proceed to the program if not use Try-throw-

catch and ask the user to enter the USERNAME and PASSWORD up to 3times only.

Answers

Answer:

#include <iostream>

#include <string>

const std::string USERNAME = "admin";

const std::string PASSWORD = "password";

int main()

{

 int attempts = 0;

 bool success = false;

 while (attempts < 3 && !success)

 {

   std::string username, password;

   std::cout << "Enter username: ";

   std::cin >> username;

   std::cout << "Enter password: ";

   std::cin >> password;

   try

   {

     if (username != USERNAME || password != PASSWORD)

     {

       throw std::invalid_argument("Invalid username or password");

     }

     success = true;

   }

   catch (const std::invalid_argument& e)

   {

     std::cout << "Error: " << e.what() << std::endl;

     attempts++;

   }

 }

 if (success)

 {

   // Proceed to the program

   std::cout << "Access granted" << std::endl;

 }

 else

 {

   std::cout << "Access denied" << std::endl;

 }

 return 0;

}

This question has two parts : 1. List two conditions required for price discrimination to take place. No need to explain, just list two conditions separtely. 2. How do income effect influence work hours when wage increases? Be specific and write your answer in one line or maximum two lines.

Answers

Keep in mind that rapid prototyping is a process that uses the original design to create a model of a part or a product. 3D printing is the common name for rapid prototyping.

Accounting's Business Entity Assumption is a business entity assumption. It is a term used to allude to proclaiming the detachment of each and every monetary record of the business from any of the monetary records of its proprietors or that of different organizations.

At the end of the day, we accept that the business has its own character which is unique in relation to that of the proprietor or different organizations.

Learn more about Accounting Principle on:

brainly.com/question/17095465

#SPJ4

What is the difference, if any, between a project manager and a producer on a digital media production team?


A. A project manager oversees the entire project, while the producer just oversees the creative element.

B. A project manager is in charge of the people involved in the project, while the producer secures the funds.

C. A project manager secures the funds for the project, while the producer is in charge of the people involved.

D. A project manager just oversees the creative element, while a producer oversees the entire project.

Answers

Answer:

A. A project manager oversees the entire project, while the producer just oversees the creative element.

Explanation:

i guess

What is the best way to improve the following code fragment? if ((counter % 10) == 0) { System.out.println("Counter is divisible by ten: " + counter); counter++; } else { System.out.println("Counter is not divisible by ten: " + counter); counter++; } Move the duplicated code outside of the if statement Shorten variable names Move the brackets to save several lines of code Add semicolons after the if condition and the else reserved word

Answers

Answer:

Move the duplicated code outside of the if statement

Which layer in the Internet Protocol Suite model verifies that data arrives without being lost or damaged?
A. Link
B. Internet
C. Application
D. Transport

Answers

it is D I believe

Explanation:

What should students hope to get out of classroom discussions? Check all that apply.

Answers

Answer:

well you didnt put the selection but i would guess answers help a good conversation

Explanation:

Answer: classroom discussions are good, they help the students and this is kind of a discussion

Explanation:

Determine a solution that can combine with a cloud access security broker (CASB) to provide a wholly cloud-hosted platform for client access?

Answers

Next-generation secure web gateway is a solution that can combine with a cloud access security broker (CASB) to provide a wholly cloud-hosted platform for client access.

What is a CASB's role?

Between cloud service users and cloud service providers, cloud access security brokers (CASBs) are just on or cloud-based system security enforcement points that integrate and inject enterprise policies as the platform resources are accessed.

What does the term "CASB" in cyber security mean?

A cloud access security broker (CASB) is software that resides between a cloud service customer and a cloud service provider on-premises or in the cloud. When data stored in the cloud is accessible, it serves as a tool for executing an organization's security standards through hazard identification and legal compliance.

To learn more about CASB visit:

https://brainly.com/question/28156933

#SPJ4

PLEASE HELP THANK YOU
1. In programming, what is a string?
-Built-in module containing pre-written code for numeric and non-numeric data types -Cable connecting numeric and non-numeric data to the computer hardware
-Function used to print numeric and non-numeric data exactly as they are written
-Non-numeric data, consisting of a sequence of letters, numbers, spaces, and symbols

2. A runtime error means there is a problem with the computer's hardware, making it impossible to execute a program.
-True
-False

3. Which of the following is an example of a logic error in programming?
-Not using quotation marks and parentheses to print a string literal
-Printing an inaccurate statement, like print ("Dogs have wings.")
-Trying to perform an impossible task, like 5 / 0 -Using camelcase when a variable name contains two or more words

4. Which of the following is the proper way to assign a string literal value to a variable in Python?
-variableName = value -variableName = "value" -variable Name = value -variable Name = "value"

5. Read the following code used to calculate the total cost of a meal with a 20% tip:

mealCost = input ("What is the meal total?")
tip = mealCost *mealcost 0.20 totalcost = meal + tip

There is an error in the code. Which additional function needs to be used with the input() function?
-float()
-int ()
-print ()
-str()

Answers

Answer:

1) A string is "non-numeric data".  In other words, it is text.

2) False, a runtime error means that there is a problem, but it will be with the software, not the hardware.

3) An impossible task such as dividing five by zero is a logical error.  Not using quotes on a string would be a syntax error, printing an inaccurate statement is not an error at all (as far as the program is concerned anyway), and using camelcase on a variable with multiple words is a common convention.

4) variableName = "value"

5) The code provided here is illegible, so I can't give a straight answer. It seems to be missing operators.

For questions 2-4, consider the following code:



if month == 7:

if day <= 15:

print("First half of the month")

else:

print("Second half of the month")

else:

print("Not in July")



What is the output if month = 7 and day = 14?
Group of answer choices

Nothing is output

Not in July

First half of the month

Second half of the month

Answers

Answer:

First half of the month

Explanation:

first if statement is true; nested if statement is true so the statement print("First half of the month") is executed

miriam is a network administrator. she would like to use a wireless authentication technology similar to that found in hotels where users are redirected to a webpage when they connect to the network. what technology should she deploy?

Answers

The technology she should deploy is a captive portal.

What do you mean by technology?

Technology is the application of knowledge to achieve practical goals in a predictable and repeatable manner. The term technology can also refer to the outcome of such an undertaking. Technology is widely used in medical, science, industry, communication, transportation, and everyday life. Physical objects such as utensils or machinery are examples of technologies, as are intangible instruments such as software. Many technological advances have resulted in societal shifts. The earliest known technology is the stone tool, which was employed in the prehistoric past, followed by fire use, which led to the development of the human brain and language throughout the Ice Age.

To learn more about technology

https://brainly.com/question/25110079

#SPJ4

calculate the crc, and the final message using: message = 91116, divisor (aka polynomial) = x3 x2 1

Answers

The CRC is 100 and the final message is 10110010111001100100.


The message is 91116, and the divisor is x3 x2 1. We need to first convert this divisor into its binary equivalent, which is 1011. The message also needs to be converted into binary form, which is 10110010111001100.

To calculate the CRC, we need to perform a division operation on the binary message using the binary divisor. This involves dividing the message by the divisor, and taking the remainder. The remainder is the CRC.

To perform the division, we start by aligning the leftmost bit of the divisor with the leftmost bit of the message. We then perform a bitwise XOR operation between the two bits, and write the result underneath the divisor.

We then shift the divisor one bit to the right, and repeat the process with the next bit of the message. We continue this process until we have processed all bits of the message.

After performing the division, we get a remainder of 100. This is the CRC. We then append the CRC to the end of the original message to form the final message, which is 10110010111001100100.

In summary, the CRC is a way to detect errors in a message by using a polynomial divisor to perform a division operation on the message. The remainder of this operation is the CRC, which is appended to the end of the original message to form the final message.

To learn more about CRC : https://brainly.com/question/31676091

#SPJ11

What differentiates files stored on the same track and sector of different platters of a hard disk?.

Answers

Files that are stored on the same track and sector of different platters of a hard-disk drive are differentiated by a cylinder.

What is a hard-disk drive?

A hard-disk drive can be defined as an electro-mechanical, non-volatile data storage device that is made up of magnetic disks (platters) that rotates at high speed. Also, hard-disk drive are commonly installed on computers and other digital service for the storage of files.

In Computer technology, the Files that are stored on the same track and sector of different platters of a hard-disk drive are typically differentiated from one another by a cylinder configured with tracks of equal diameters.

Read more on hard-disk here: https://brainly.com/question/26382243

Computers represent color by combining the sub-colors red, green, and blue (rgb). Each sub-color's value can range from 0 to 255. Thus (255, 0, 0) is bright red, (130, 0, 130) is a medium purple, (0, 0, 0) is black, (255, 255, 255) is white, and (40, 40, 40) is a dark gray. (130, 50, 130) is a faded purple, due to the (50, 50, 50) gray part. (In other words, equal amounts of red, green, blue yield gray).

Answers

Answer:

Follows are the code to this question:

#include <iostream>//defining a header file

using namespace std; //using namespace

int main() //defining main method

{

int red,green,blue,s; //defining integer variable

cout<<"Enter value: \n ";//print message

cin>>red>>green>>blue; //input value

if(red<green && red<blue)//defining if block that checks red value

s=red;//store red variable value to s variable

else if(green<blue)//defining else if block that checks green value less then blue

s=green;//store green variable value in s variable

else//defining else block

s=blue; //store blue variable value in s variable

//calculating red, green, blue value

red=red-s;//store red value

green=green-s;//store green value

blue=blue-s;//store blue value

cout<<red<<" "<<green<<" "<<blue;

}

Output:

Enter value:

130  

50

130

80 0 80

Explanation:

In the above code, inside the Main method, four integer variable "red, green, blue, and s" is defined, in which "red, green, and blue" is used for input the value from the user end.

In the next step, a conditional statement is used, that checks the red variable value, if the condition is true, it will store its value in the "s" variable, otherwise, it will go to else if block.In this block, the green variable checks its value less than then blue variable value, if the condition is true, it will store the green value in the "s" variable, otherwise, it will goto else block.In this block, it will store the blue variable value in the "s" variable, and subtract the value of "red, green, and blue" value from "s" and store its value, and at the last, it will print its value.    

Peter took a selfie in his room. He was a wearing a light blue shirt. But he failed to realize that that shirt would clash in color with the light blue walls in his room. He wants to edit this photo using editing software. Which tool can Peter use to darken the background in his photo?

Answers

Answer:

A wand tool is to do that in an editing software.

Answer: Peter should use the burn tool

Jack's manager asks him to distribute information and an attachment as quickly as possible to all their clients. In one to two sentences, describe what Jack should do.

AND NOT SO LONG PLS:D

Answers

He should forward it to everyone vía email

inputs and outputs that allow a user to interact
with a piece of software

Answers

I do not understand what you are asking

The core difference between phishing and spear-phishing is: a. spear-phishing has more specific targets than phishing b. phishing attacks via email, spear-phishing attacks via infected webpages c. phishing attacks via email, spear-phishing attacks via social media d. phishing is an outside attack; spear-phishing is an internal security check e. anti-virus software prevents phishing but not spear-phishing

Answers

Answer:

a. spear-phishing has more specific targets than phishing

Explanation:

The difference between phishing and spear-phishing basically lies in the target. Phishing is a form of malicious software sent to a large number of people, probably through their e-mails, with the hope that a small percentage will fall victim to the attack.

Spear-phishing, on the other hand, is targeted at just one person. The person and his itinerary are studied and a message is designed to apply to that person and elicit his interest. Clicking on the message or link exposes the person's device to attack and unauthorized information might be obtained or malware is installed.

write an expression that evaluates to true if and only if the value of x is equal to zero.

Answers

Only when the value of x is equal to zero does the expression x == 0 evaluate to true.

Value in ethics and social sciences refers to the degree of significance of something or action, with the intention of deciding which acts are preferable to take or how to live (normative ethics in ethics), or to define the relevance of various activities. Value systems are prospective and prescriptive beliefs that influence an individual's ethical behavior or serve as the foundation for their deliberate actions. Frequently, core values are solid and secondary values can be changed. The ethical values of the things an action increases, reduces or modifies may also have an impact on how valuable it is. An "ethic or philosophic good" is a thing that has "ethical value" (noun sense).

Learn more about Value here:

https://brainly.com/question/15004268

#SPJ4

i am making a project i have to advertise a product i picked a futureistic car
can any one halp me with a unknown name that is cool plss

Answers

Answer:

The Futuristic Car. That name is bussin

if an incident occurs involving removable media in a sensitive compartmented information facility

Answers

Inform your security point of contact if a removable media incident happens in a facility that houses sensitive information in compartments.

What details must to be omitted from a security incident report?

Until secure two-way communications (verbal or transmitted) can be established, avoid providing in-depth information (that might be considered sensitive or classified) about the people, processes, technology, file location, specific system information, or URL that may be related to the nature of the incident.

What exactly is sensitive compartmentalized data?

Sensitive Compartmented Information contains information that necessitates a formal need-to-know determination, commonly referred to as a special access permission. You must alert your security point of contact if a removable media incident takes place in a Sensitive Compartmented Information Facility (SCIF).

To learn more about information visit:

brainly.com/question/13629038

#SPJ4

Other Questions
Q3. Consider the following two-stage game: Stage 1: Player 1 moves first to choose either L or R. Stage 2: Player 2 can observe the action of Player 1; they then move simultaneously to choose A or B. The game is given in extensive form as: Stage 2 A b Stage 1 B A (10,10) (0,9) (9,0) (7.7) B DAL Player 1 A 70 B (1,1) (0,2) (2,0) (8,8) Player 1 g Player 2 Monetary policy includes Group of answer choices using changes in the amount of money in circulation to alter credit markets, employment, and the rate of inflation. using changes in the size of the federal budget deficit to alter national economic variables. continually increasing the size of the national debt. regulating tax rates to ensure controlled growth and low inflation. linkage of the consumer price index and the gross national product. What is one change that Cardinal Richelieu made to French government after Louise XIII took power Absolute Value. Show work...pls. If the equation y=5(1.7)^x is plotted on a semi-log scale graph, then the linearized equation will be log(y)=mx+b, where m=_____?_____ and b=____?_____. On which interval are both the sine and cosine functions increasing? A (3pi/2, 2pi)B (pi/2, pi)C (0, pi)D (pi, 3pi/2) Repreent the following entence a an algebraic expreion, where "a number" i the letter x. You do not need to implify. The product of 9 and the difference of a number and 2 Kin made a Picture frame for a square picture with sides that are 5f-4 inches long. Framing the picture adds 2 inches to the length of each side. Use the distributive property to write two expressions for the perimeter of the frame picture. SHOW YOUR WORK Pls help Tysm! e ______ the value of Significance F, the greater the ___ of the model. multiple choice 2lower; fitgreater; capabilitylower; capabilitygreater; fit i need the help alot Read this paragraph from an informational text about earthquakes and tsunamis.Earthquakes can cause another type of natural disaster known as a tsunami. A tsunami is a series of enormous sea waves often caused by earthquakes that occur on the seafloor. The energy produced by an earthquake creates the force behind a tsunami. Tsunami waves can travel thousands of miles across the ocean.Which sentence tells what this paragraph is mostly about? A. Earthquakes can cause another type of natural disaster known as a tsunami. B. A tsunami is a series of enormous sea waves often caused by earthquakes that occur on the seafloor. C. The energy produced by an earthquake creates the force behind a tsunami. D. Tsunami waves can travel thousands of miles across the ocean. Royce Bernsteins group medical insurance coverage costs $5,480 a year. His employer pays 65% of the cost. What is the amount of the deduction each month from his paycheck medical insurance TRUE / FALSE. directors of privately held corporations' paramount responsibility is to protect the best interests of shareholders. Jim Wells, the owner of a farm supply store in Elmira, Ontario, was thinking of introducing a new product: shoes for cows with foot (hoof) infection (rot). Jim had been approached by several farmers asking for cow shoes. He studied the market and found nothing durable and effective at the $40$100 per shoe range. There are over 13 million dairy cows in North America, and approximately 2 percent of them develop foot infection annually (beef cows are slaughtered when this happens). Jim designed the shoe and approached Kaufman Footwear in Kitchener to make some prototypes. Next, he gave the prototypes to his farmer friends to test. After one year of design improvements, Jim was wondering whether to go ahead with marketing of the shoe. The cost of the mould to be used by the shoe factory was $10,000, and the mould was expected to last five years (use straight-line depreciation). The cost of Jims time promoting the shoe, including attending farm shows, was approximately $10,000 per year. The cost of shoe inventory and space in Jims store was estimated to be $1,000 per year. The shoe factory wanted $20 per shoe with a minimum order size of 100 shoes. Jim was thinking of pricing a shoe at $40.Questions1) How many shoes per year must Jim sell to break even?2) What is the annual cost at the BEP found in Question 1?3) If Jim could sell 2,000 shoes per year, should he go ahead with this venture? Why? What is the common ratio of the geometric sequence below?-96, 48, -24, 12, -6, ... what do yall think of my xbox user:grcfullrate it 1-10 Compare |-5| and |3| Needs to be done today plz help!! Expense AmountRent payment $953. 20/monthAuto payment $165. 87/monthTelephone $56. 98/monthAuto insurance $714. 36/six monthsOnce-a-week outing $35. 00/weekUsing the table, what are your total monthly fixed expenses?$ your answer goes here /month I need help solving this step by step. Work would be nice so I can look and understand it so I can try a different problem.