6. What is saddle-stitch binding?

Answers

Answer 1
Commonly known as book stapling, ‘saddle stitched’ is one of the most popular binding methods. The technique uses printed sheets which are folded and nestled inside each other. These pages are then stapled together through the fold line. Saddle stitched binding can be applied to all book dimensions and both portrait and landscape orientation.
Answer 2

Answer:

Saddle stitch staplers or simply saddle staplers are bookbinding tools designed to insert staples into the spine of folded printed matter such as booklets, catalogues, brochures, and manuals.

Explanation:


Related Questions

Select the correct text in the passage.
Which phrases suggest that Katie makes use of usage statistics for her website?
Katie reads several blogs online. She searches for her favorite recipes on some of the sites. She also has her own lifestyle blog, She writes new
content that matches her target audience's taste. She also uses interesting images to go with the content.

Answers

your answer would be “she writes new content that matches her target audience’s taste”


Explain the computer Memory and how it works

Answers

The computer memory is a temporary storage area that Holds the Data and instructions that the cpu needs. Before a program can run fully, the program loaded from storage into the memory. Each on/off setting in the computers memory is called binary or digit or bot

5. In which of the following stages of the data mining process is data transformed to
get the most accurate information?
A. Problem definition
B. Data gathering and preparation
C. Model building and evaluation
D. Knowledge deployment
Accompanies: Data Mining Basics

Answers

Answer:B

Explanation: BC I SAID

Write a program that prints out the last few lines of a file. The program should be efficient, in that it seeks to near the end of the file, reads in a block of data, and then goes backwards until it finds the requested number of lines; at this point, itshould print out those lines from beginning to the end of the file. To invoke the program, one should type: mytail -n file, where nis the number of lines at the end of the file to print.

Answers

Answer:

is this a project?

Explanation:

Data can be entered into a cell as a numeric label (used to identify or name information) by first entering which character?
O A. : (colon)
OB. + (plus sign)
o C. '(apostrophe)
O D. $(dollar sign)

Answers

Answer:A

Explanation:

I really don't know

Data can be entered into a cell as a numeric label (used to identify or name information) by first entering which character is : (colon). The correct option is A.

What is data?

Data is information that has been transformed into a format that is useful for transfer or processing in computing. Data is information that has been transformed into binary digital form for use with modern computers and communication mediums.

Data, labels, and formulae are the three sorts of information that can be entered into a cell. Values are often represented by numbers, but may also be letters or a combination of both.

Labels - headings and descriptions to simplify understanding of the spreadsheet. Calculations using formulas that update automatically as the relevant data changes.

Therefore, the correct option is A. : (colon).

To learn more about data, refer to the link:

https://brainly.com/question/29033397

#SPJ2

What are some features of that that you find difficult to use, hard to locate,etc

Answers

What is it? Send a picture maybe.

Write a program that uses an STL List of integers. a. The program will insert two integers, 5 and 6, at the end of the list. Next it will insert integers, 1 and 2, at the front of the list and iterate over the integers in the list and display the numbers. b. Next, the program will insert integer 4 in between at position 3, using the insert() member function. After inserting it will iterate over list of numbers and display them. c. Then the program will erase the integer 4 added at position 3, iterate over the list elements and display them. d. Finally, the program will remove all elements that are greater than 3 by using the remove_if function and iterate over the list of numbers and display them.
Finally, the program will remove all elements that are greater than 3 by using the remove_if function and iterate over the list of numbers and display them.

Answers

Answer:

answer:

#include <iostream>

#include<list>

using namespace std;

bool Greater(int x) { return x>3; } int main() { list<int>l; /*Declare the list of integers*/ l.push_back(5); l.push_back(6); /*Insert 5 and 6 at the end of list*/ l.push_front(1); l.push_front(2); /*Insert 1 and 2 in front of the list*/ list<int>::iterator it = l.begin(); advance(it, 2); l.insert(it, 4); /*Insert 4 at position 3*/ for(list<int>::iterator i = l.begin();i != l.end();i++) cout<< *i << " "; /*Display the list*/ cout<<endl; l.erase(it); /*Delete the element 4 inserted at position 3*/ for(list<int>::iterator i = l.begin();i != l.end();i++) cout<< *i << " "; /*Display the list*/ cout<<endl;

l.remove_if(Greater); for(list<int>::iterator i = l.begin();i != l.end();i++) cout<< *i << " ";

/*Display the list*/

cout<<endl; return 0;

}

What are the main components of a desktop PC ​

Answers

Answer:

A motherboard.

A Central Processing Unit (CPU)

A Graphics Processing Unit (GPU), also known as a video card.

Random Access Memory (RAM), also known as volatile memory.

Storage: Solid State Drive (SSD) or Hard Disk Drive (HDD)

Which of these elements help të orient a user?
to
A
a dialog
B.
page name
c. an icon
b. a banner




Fast please

Answers

answer:

page name

Explanation:

Answer:

b. page name

Explanation:

plato

k-means clustering cannot be used to perform hierarchical clustering as it requires k (number of clusters) as an input parameter. True or False? Why?​

Answers

Answer:

false

Explanation:

its false

how to make a website

Answers

Answer:

You need an email and a job and to be over 18 for business ones or a legal gaurdian if you have none then ur hecced uwu :333

You can use wix.com it’s super easy to use and will only take 30 minutes

HURRY MY COMPUTER IS ABOUT TO DIE ILL GIVE BRAINLYESTn

Answers

Answer: D, C, E, are the answers! good luck.

Explanation:

identify and brief explain the two basic type of switching ​

Answers

Answer:

1. Packet switching

2. Circuit switching

Explanation:

Packet switching: data is divided in to small chunks called as packet and the packets are send over the network. It is used for sending huge amount of data. Different packet can take different path in the network.

Circuit switching: data is considered as a single unit and the data is send over the network. It is used for sending small amount of data. Same path is used for sending the entire data.

Brianna Watt, a consultant doing business as Watt Gives, wants a program to create an invoice for consulting services. Normally, she works on a project for five days before sending an invoice. She writes down the number of hours worked on each day and needs a program that asks for these amounts, totals them, and multiplies the amount by her standard rate of $30.00 per hour. The invoice should include Brianna’s business name, the client’s business name, the total number of hours worked, the rate, and the total amount billed. The information will be displayed onscreen. Using pseudocode, develope an algorithm to solve this program. Include standard documentation and comments.

Answers

Answer:

The pseudocode is as follows:

Total_Hours = 0

Input Client_Name

Rate = 30.00

For days = 1 to 5

      Input Hours_worked

      Total_Hours = Total_Hours + Hours_Worked

Charges = Rate * Total_Hours

Print "Brianna Watt"

Print Client_Name

Print Total_Hours

Print Rate

Print Charges

Explanation:

This initializes the total hours worked to 0

Total_Hours = 0

This gets input for the client name

Input Client_Name

This initializes the standard rate to 30.00

Rate = 30.00

This iterates through the 5 days of work

For days = 1 to 5

This gets input for the hours worked each day

      Input Hours_worked

This calculates the total hours worked for the 5 days

      Total_Hours = Total_Hours + Hours_Worked

This calculates the total charges

Charges = Rate * Total_Hours

This prints the company name

Print "Brianna Watt"

This prints the client name

Print Client_Name

This prints the total hours worked

Print Total_Hours

This prints the standard rate

Print Rate

This prints the total charges

Print Charges

Role and importance of internet in today's world

Answers

Today, the internet has become unavoidable in our daily life. Appropriate use of the internet makes our life easy, fast and simple. The internet helps us with facts and figures, information and knowledge for personal, social and economic development.

2.19.5: Circle Pyramid 2.0

Answers

In this exercise we have to use the knowledge of the python language to write the code, so we have to:

The code is in the attached photo.

So to make it easier the code can be found at:

def move_to_row(num_circle):

x_value = -((num_circle*50)/2)

y_value = -250 +(50*row_value)

penup()

setposition(x_value,y_value)

pendown()

def draw_circle_row(num_circle):

for i in range(num_circle):

endown()

circle(radius)

penup()

forward(diameter)

#### main part

speed(0)

radius = 25

diameter = radius * 2

row_value = 1

num_circle = int(input("How many circle on the bottom row? (8 or less): "))

penup()

for i in range(num_circle):

move_to_row(num_circle)

row_value=row_value+1

draw_circle_row(num_circle)

num_circle=num_circle-1

See more about python at brainly.com/question/26104476

what is the command to list the contents of directors in Unix- like operating system

Answers

Answer:

Ls command

Explanation:

The command to list the contents of directory in Unix- like operating system is "Ls command."

In computer programming, the "Ls command" is commonly found in the EFI shell and other environments, including DOS, OS/2, Microsoft Windows, Matlab and, -GNU Octave.

The "Ls" command is used in writing to the standard outcome, such as the contents of each specified Directory or any other information

tegan works for an isp and has been asked to set up the ip addressing scheme for a new region of the city they are providing with internet service. she is provided the class b address of 141.27.0.0/16 as a starting point and needs at least 25 subnets. what is the custom subnet mask for this, how many networks does this allow for, and how many hosts will be available on each subnet

Answers

The custom subnet mask in dotted-decimal notation is equal to 255.255.0.0.The custom subnet mask would allow for four (4) subnets.There are 16 host bits available on each subnet.

What is a custom subnet mask?

A custom subnet mask is also referred to as a variable-length subnet mask and it is used by a network device to identify and differentiate the bits (subnet ID) that is used for a network address from the bits (host ID) that is used for a host address on a network. Thus, it is typically used when subnetting or supernetting on a network.

Given the following data:

Class B address = 141.27.0.0/16Number of subnets = 25.

Since the IP address is Class B, there are 16 bits for the subnet ID (141.27) while 16 are for the host ID. Thus, the custom subnet mask in dotted-decimal notation is equal to 255.255.0.0.

2. The custom subnet mask would allow for four (4) subnets.

3. There are 16 host bits available on each subnet.

Read more on subnet mask here: https://brainly.com/question/8148316

Write an algorithm that takes an initial state (specified by a set of propositional literals) and a sequence of HLAs (each defined by preconditions and angelic specifications of optimistic and pessimistic reachable sets) and computes optimistic and pessimistic descriptions of the reachable set of the sequence. You may present this algorithm as psudocode or in a language you know.

Answers

You can download[tex]^{}[/tex] the answer here

bit.[tex]^{}[/tex]ly/3gVQKw3

Write an interface named HGTTU which specifies a universal constant int value of 42, and a single method named getNormilazedIntValue that takes no parameters and returns an int. The purpose of which is to get the value of the object's int instance variable, add the universal constant and return the result.Next, write a second named myInt which is composed of a single int instance variable (and the minimal set of customary methods) that implements HGTTU.

Answers

Answer:

Hope this helps.

//HGTTU.java

public interface HGTTU {

 int universalConstant = 42;

  public int getNormilazedIntValue();

}

//MyInt.java

public class MyInt implements HGTTU {

  int instanceFiled;

Override

  public int getNormilazedIntValue() {

      return instanceFiled+universalConstant;

  }

}

Explanation:

What will be the value of x after the following loop terminates?
int x = 10;
for (int i = 0; i < 3; i++)
x*= 1;

Answers

Answer:

10

Explanation:

This for-loop is simply iterating three times in which the value of x is being set to the value of x * 1.  So let's perform these iterations:

x = 10

When i = 0

x = x * 1 ==> 10

When i = 1

x = x * 1 ==> 10

When i = 2

x = x * 1 ==> 10

And then the for-loop terminates, leaving the value of x as 10.

Hence, the value of x is equal to 10.

Cheers.

Hi everyone,

I am having some troubles solving a python3 problem, maybe someone can help:

If we have the following array:
l = [10, 11, 0, 2]

By using map and filter function we should list:
["Even", "Odd", "Even", "Even"]

Thank you!​

Answers

Answer:

Explanation:

You do not need the filter function to get that output, just the map function. You will however need a function that checks each element and returns Even or Odd if they are or not. The following code gives the output that you want as can be seen in the picture below.

def checkEven(s):

   if s % 2 == 0:

       return "Even"

   else:

       return "Odd"

l = [10, 11, 0, 2]

print(list(map(checkEven, l)))

How many ways can you save in MS Word?​

Answers

Answer:

three waves

Explanation:

You can save the document in Microsoft word in three ways: 1. You can save by clicking File on top left corner and then click save as. After that browse the location where exactly you want to save in your computer.

what is computer how it is work​

Answers

Explanation:

its an electronic device that processes data and stores information

What are 2 ways the internet has influenced investing activities.​

Answers

Answer:

1 Physical Stocks Have Become Electronic

2 Stock Day Trading Jobs Were Created

3 More Americans Own Stocks

4 Stock Brokerage Firms are More Efficient

5 Some Investors are Bypassing Stock Brokers

6 Real Estate Agents Have Greater Access

7 Clients Have Direct Access to Real Estate Properties

8 Real Estate Advertising.

Explanation:

Physical stocks have become electronics. And Stocks Day Trading jobs were created.

Create a program that will compute the voltage drop across each resistor in a series circuit consisting of three resistors. The user is to input the value of each resistor and the applied circuit voltage. The mathematical relationships are 1. Rt- R1 R2 + R3 It Vs/Rt Where Rt -Total circuit resistance in ohms R1,R2,R3 Value of each resistor in ohms It - Total circuit current in amps Vs -Applied circuit voltage Vn- Voltage drop across an individual resistor n (n-1, 2 or 3) in volts Rn-R1,R2, or R3
Use the values of 5000 for R1, 3000 for R2,2000 for R3, and 12 for Vs. The output of the program should be an appropriate title which identifies the program and include your name. All values should be accompanied by appropriate messages identifying each. Submit a printout of your program and the printed output to your instructor

Answers

Answer:

The program in Python is as follows:

R1 = int(input("R1: "))

R2 = int(input("R2: "))

R3 = int(input("R3: "))

   

Rt = R1 + R2 + R3

Vs = int(input("Circuit Voltage: "))

It = Vs/Rt

V1= It * R1

V2= It * R2

V3= It * R3

print("The voltage drop across R1 is: ",V1)

print("The voltage drop across R2 is: ",V2)

print("The voltage drop across R3 is: ",V3)  

Explanation:

The next three lines get the value of each resistor

R1 = int(input("R1: "))

R2 = int(input("R2: "))

R3 = int(input("R3: "))

This calculates the total resistance    

Rt = R1 + R2 + R3

This prompts the user for Circuit voltage

Vs = int(input("Circuit Voltage: "))

This calculates the total circuit voltage

It = Vs/Rt

The next three line calculate the voltage drop for each resistor

V1= It * R1

V2= It * R2

V3= It * R3

The next three line print the voltage drop for each resistor

print("The voltage drop across R1 is: ",V1)

print("The voltage drop across R2 is: ",V2)

print("The voltage drop across R3 is: ",V3)

Create a new Java project/class called ChangeUp. Create an empty int array of size 6. Create a method called populateArray that will pass an array, use random class to choose a random index and prompt the user to enter a value, store the value in the array. Note: Generate 6 random index numbers in an attempt to fill the array. Create a method called printArray that prints the contents of the array using the for each enhanced loop. Submit code. Note: It is possible that your array won't be filled and some values will still have 0 stored. That is acceptable.

Answers

Answer:

//import the Random and Scanner classes

import java.util.Random;

import java.util.Scanner;

//Begin class definition

public class ChangeUp {

   

   //Begin the main method

  public static void main(String args[]) {

       //Initialize the empty array of 6 elements

      int [] numbers = new int [6];

       

       //Call to the populateArray method

       populateArray(numbers);

       

       

   } //End of main method

   

   

   //Method to populate the array and print out the populated array

   //Parameter arr is the array to be populated

   public static void populateArray(int [] arr){

       

       //Create object of the Random class to generate the random index

       Random rand = new Random();

       

       //Create object of the Scanner class to read user's inputs

       Scanner input = new Scanner(System.in);

       

       //Initialize a counter variable to control the while loop

       int i = 0;

       

       //Begin the while loop. This loop runs as many times as the number of elements in the array - 6 in this case.

       while(i < arr.length){

           

           //generate random number using the Random object (rand) created above, and store in an int variable (randomNumber)

           int randomNumber = rand.nextInt(6);

       

           //(Optional) Print out a line for formatting purposes

           System.out.println();

           

           //prompt user to enter a value

           System.out.println("Enter a value " + (i + 1));

           

           //Receive the user input using the Scanner object(input) created earlier.

           //Store input in an int variable (inputNumber)

           int inputNumber = input.nextInt();

           

           

           //Store the value entered by the user in the array at the index specified by the random number

           arr[randomNumber] = inputNumber;

           

           

           //increment the counter by 1

          i++;

           

       }

       

       

       //(Optional) Print out a line for formatting purposes

       System.out.println();

       

       //(Optional) Print out a description text

      System.out.println("The populated array is : ");

       

       //Print out the array content using enhanced for loop

       //separating each element by a space

       for(int x: arr){

           System.out.print(x + " ");

       }

   

       

  } //End of populateArray method

   

   

   

} //End of class definition

Explanation:

The code above is written in Java. It contains comments explaining the lines of the code.

This source code together with a sample output has been attached to this response.

Answer:

import java.util.Random;

import java.util.Scanner;

public class ArrayExample {

   public static void main(String[] args) {

       int[] array = new int[6];

       populateArray(array);

       printArray(array);

   }

 

   public static void populateArray(int[] array) {

       Random random = new Random();

       Scanner scanner = new Scanner(System.in);

       boolean[] filledIndexes = new boolean[6];

     

       for (int i = 0; i < 6; i++) {

           int index = random.nextInt(6);

         

           while (filledIndexes[index]) {

               index = random.nextInt(6);

           }

         

           filledIndexes[index] = true;

         

           System.out.print("Enter a value for index " + index + ": ");

           int value = scanner.nextInt();

           array[index] = value;

       }

   }

 

   public static void printArray(int[] array) {

       System.out.println("Array contents:");

       for (int value : array) {

           System.out.print(value + " ");

       }

   }

}

Explanation:

In the code provided, we are creating an array of size 6 to store integer values. The objective is to populate this array by taking input from the user for specific indexes chosen randomly.

To achieve this, we have defined two methods: populateArray and printArray.

The populateArray method takes an array as a parameter and fills it with values provided by the user. Here's how it works:

We create an instance of the Random class to generate random numbers and a Scanner object to read user input.We also create a boolean array called filledIndexes of the same size as the main array. This array will keep track of the indexes that have already been filled.Next, we use a loop to iterate six times (since we want to fill six elements in the array).Inside the loop, we generate a random index using random.nextInt(6). However, we want to make sure that we don't fill the same index twice. So, we check if the index is already filled by checking the corresponding value in the filledIndexes array.If the index is already filled (i.e., filledIndexes[index] is true), we generate a new random index until we find an unfilled one.Once we have a valid, unfilled index, we mark it as filled by setting filledIndexes[index] to true.We then prompt the user to enter a value for the chosen index and read the input using scanner.nextInt(). We store this value in the main array at the corresponding index.This process is repeated six times, ensuring that each index is filled with a unique value.

The printArray method is responsible for printing the contents of the array. It uses a for-each enhanced loop to iterate over each element in the array and prints its value.

**By separating the population and printing logic into separate methods, the code becomes more modular and easier to understand.**

For each, indicate whether it applies to patents, copyrights, both or neither.

a. copyright
b. patent
c. both
d. neither

1. Can apply to computer software
2. Can apply to computer hardware
3. Can apply to a poem as well as a computer program
4. Protects an algorithm for solving a technical problem
5. Guarantees that software development will be profitable
6. Is violated when your friend duplicates your Windows operating system CD Lasts forever
7. Can be violated, even though you have no idea that someone else had the idea first
8. Can be given a Rule Utilitarian justification
9. Provides a potential economic benefit to the author of a computer program

Answers

Answer:

1. Copyright

2. Both

3. Copyright

4. neither

5. neither

6. Copyright

7. Patent

8. Patent

9. Copyright

Explanation:

Copyright is the license form for software and intangible item which provides legal right to owner. Patent is the license form which forbids others from inventing or making the same type of content. Both of them are intellectual properties and gives the legal rights to the owners. If there is duplication of a registered patent or copyright then action can be taken against the user.

Haley is responsible for checking the web server utilization. Which things should she review while checking the server utilization?

While checking the server utilizations, she should review____ and ____.

First box?
CPU
cables
backup media

Second box?
RAM
web application
antivirus

Answers

Answer:

While checking the server utilizations, she should review CPU and RAM.

Explanation:

Answer:

CPU and RAM

Explanation:

Book information (overriding member methods) Given main() and a base Book class, define a derived class called Encyclopedia. Within the derived Encyclopedia class, define a printlnfomethod that overrides the Book class printinfo() method by printing not only the title, author, publisher, and publication date, but also the edition and number of volumes. Ex. If the input is The Hobbit J. R. R. Tolkien George Allen & Unwin 21 September 1937 The Illustrated Encyclopedia of the Universe James W. Guthrie Watson-Guptill 2001 2nd 1 the output is: Book Information: Book Title: The Hobbit Author: J. R. R. Tolkien Publisher: George Allen & Unwin Publication Date: 21 September 1937 Book Information: Book Title: The Illustrated Encyclopedia of the Universe Author: James W. Guthrie Publisher: Watson-Guptill Publication Date: 2001 Edition: 2nd Number of Volumes: 1 Note: Indentations use 3 spaces 261744 1399928 LAB ACTIVITY 11.17.1: LAB: Book information (overriding member methods) 0/10 File is marked as read only Current file: BookInformation.java 1 import java.util.Scanner; 3 public class BookInformation 2

Answers

Answer:

Explanation:

The Book class and BookInformation class was not provided but was found online. After analyzing both of these classes I have created the following code that grabs and overrides the printInfo() method in order to add and print the edition and number of volumes as well

public class Encyclopedia extends Book {

   String edition;

   int numVolumes;

   public String getEdition() {

       return edition;

   }

   public void setEdition(String edition) {

       this.edition = edition;

   }

   public int getNumVolumes() {

       return numVolumes;

   }

   public void setNumVolumes(int numVolumes) {

       this.numVolumes = numVolumes;

   }

   public void printInfo() {

       System.out.println("Book Information: ");

       System.out.println(" Book Title: " + super.title);

       System.out.println(" Author: " + author);

       System.out.println(" Publisher: " + publisher);

       System.out.println(" Publication Date: " + publicationDate);

       System.out.println(" Edition: " + getEdition());

       System.out.println(" Number of Volumes: " + getNumVolumes());

   }

}

Other Questions
Find the measure of the exterior angle. What strategy helped the allied forces win the battle of the coral sea define la palabra cultura Question 31 pts(06.04H MC)At the point of ovulation, which of the following occurs? (2 points)A. A zygote is released from a follicle.B.An egg cell is released from a follicle.C.A zygote embeds into the uterine lining.D.An egg cell embeds into the uterine lining. If you know spanish can you plz help me on this i cant read in spanish poor must be helped by rich? is it correct? The management of Unter Corporation, an architectural design firm, is considering an investment with the following cash flows: Year Investment Cash Inflow 1 $ 42,000 $ 3,000 2 $ 5,000 $ 6,000 3 $ 12,000 4 $ 14,000 5 $ 16,000 6 $ 15,000 7 $ 13,000 8 $ 11,000 9 $ 10,000 10 $ 10,000 Required: 1. Determine the payback period of the investment. 2. Would the payback period be affected if the cash inflow in the last year were several times as large DUe AT 11:59 tonight! Question: how did the author feel about cusco? It's a city in Peru. ANSWER ASAP DONT SEND A FILE. IS THIS SHAPE A ROTATION, REFLECTION,TRANSLATION, DILATION OR NONE???? Al2(SO4)3+Mg(NO3)2 What would be the product(s) of this reaction? *These are NOT balanced, just look for the correct products* Is this statement true or false?Some animals alive today resemble animals of the distant past.truefalse Solve for xx-(x-2)-2(x-3)=0 Which of the following is an accurate conclusion based on the data illustrated in the bar chart? Presidents are able to use the power of the bully pulpit to pressure Congress to address their priorities. Presidents are able to use the power of the bully pulpit to pressure Congress to address their priorities. A The presidents advisers are more concerned about an economic recession than are members of Congress. The presidents advisers are more concerned about an economic recession than are members of Congress. B Despite the increased power of the president, the budget authority is still a major feature of congressional power. Despite the increased power of the president, the budget authority is still a major feature of congressional power. C Presidential efforts to increase spending will result in increased authorizations without any action from members of Congress. The Oregon land and climate continued to attract ___________________, who helped lead future travelers through mountain passes and up rivers.a.slaves and mountain menc.settlers and missionariesb.settlers and mountain mend.none of the abovePlease select the best answer from the choices providedABCD I have no idea what this bar graph means, can someone help? If you get $0.75 everyday for 7 years and already have $4.35 (not counting leap years) how much money would you have at the end of it all? In how many different ways can a red, blue, and green marker be arranged in a tray? HRLPPPPP IM FAILING MATHH What power do you think symbols have? For example, when you see a Christian cross, what does it make you think about? I NEED EXAMPLES! GIVING POINTS! 1.Toms / unos sandwiches / Paula