Answer:
The answer is option A) This is an example of continuous reinforcement schedule 
Explanation:
A schedule of reinforcement is basically a rule stating which instances of behavior will be reinforced. In some cases, a behavior might be reinforced every time it occurs. Sometimes, a behavior might not be reinforced at all.
continuous reinforcement schedule occurs when reinforcement is delivered after every single target behavior. This is clearly illustrated with the bonus paid to the telemarketers for every fourth application the company receives.
 
        
             
        
        
        
Answer:
 C. Minimizes hiring, layoff, and unemployment costs
Explanation:
The employment-stability policy is a policy that aims to provide security and stability to employees of a company or industry. For workers, this is good because it creates greater security for planning the future of their lives. For businesses, it all depends. If workers keep output at a good level, firms will gain by reducing their spending on hiring research and layoffs. 
There is a discussion among economists about the effectiveness of this policy for the economy. Some find it beneficial and others find it can slow down the productivity of workers and the economy as a whole.
 
        
             
        
        
        
Answer:
0.368
Explanation:
Price of B(0,13) = 1 / (1 + interest rate)^years
Price of B(0,13) = 1 / (1 + 8%)^13
Price of B(0,13) = 1 / (1+0.08)^13
Price of B(0,13) = 1 / (1.08)^13
Price of B(0,13) = 1 / 2.7196237
Price of B(0,13) = 0.3676979247
Price of B(0,13) = 0.368
 
        
             
        
        
        
Answer:
a. True
Explanation:
DOT stands for the Dictionary of Occupational Titles. It is the publication which was produced by the Department of Labor of the United States of America for the working people that helped the employers, the government officials, and the other workforce development professionals in order to define over  different types of work from
 different types of work from  to the late
 to the late  s.
s.
But now, due to the advancement in technologies and change in the nature of job of many works the previous publication was replaced by the new Occupational Information Network which suits with todays technology and development in the working conditions. It is shortly known as the O*NET. 
Hence the answer is TRUE.
 
        
             
        
        
        
John is responsible for security of his company's new e-commerce server. he wants to ensure that online transactions are secure. He should use transport layer security.
     A widely used security technology called Transport Layer Security, or TLS, enables privacy and data security for communications over the Internet. Encrypting communication between web applications and servers, such as when web browsers load a website, is one of the main applications of Transport Layer Security. 
    The Transport Layer Security protocol achieves its goals primarily through the use of encryption, authentication, and integrity.
Data transfer is protected from third parties by encryption.
Authentication is the process of confirming the identity of the persons sharing information.
Integrity: demonstrates that the data hasn't been altered or falsified.
To learn more about Transport Layer Security click here:
brainly.com/question/15021716
#SPJ4