#include <bits/stdc++.h>
static int counter=0;
int check_locker(int num) {
//Pass the first student. All lockers are open.
std::vector<int> lockers(num,1);
//Second student. Close the even locker(s).
for(int i=1;i<=lockers.size();i++) {
if(i%2==0) {
lockers.at(i-1)=0;
} else {
;;
}
}
//Each n. student will check.
for(int j=3; j<=lockers.size();j++) {
for(int m=j; m<=lockers.size();m+=j) {
if(lockers.at(m-1)==1) lockers.at(m-1)=0;
else lockers.at(m-1) = 1;
}
}
//Count 1's
for(auto& c:lockers) {
if(c==1) counter++;
else ;;
}
/*For debug purposes, if you want to print the locker's status, activate!
for(auto& p:lockers) {
std::cout << p << " ";
}
*/
return counter;
}
int main(int argc, char* argv[]) {
//Get the amount of lockers from user.
std::cout << "How many lockers does the school have?: ";
int idx; std::cin>>idx;
//Waiting..
std::cout << "Evaluating..\n";
std::this_thread::sleep_for(std::chrono::milliseconds(1000));
//Send data into check_locker()
std::cout << "There is/are " << check_locker(idx) << " open locker(s)." << std::endl;
return 0;
}
7.At a project party outside the office premises, your colleague Mr.A has had a lot to drink and is making sexual gestures and comments, at one of your other female colleagues, Mr.B who is sitting next to you.
She looks visibly upset.What should you do?
a.Ignore and let Ms.B handle the situation at hand.
b.Become a supportive bystander and intervene to stop the inappropriate behaviour, with help
from a senior staff at the pub. Subsequently, report this matter to grb mail address
c.Only Ms.B can report such a complaint.Hence, there is no action required from your end.
d.Since the incident happened at the pub, there is no need to report it further to the organization.
Answer:
b.becomr a supportive bystander and intervene to stop the inappropriate behavior with help from a senior staff at the pub.
remember to give be Brainest.
like,star and comments.
You should become a supportive bystander and intervene to stop the inappropriate behavior, with help from senior staff at the pub. Subsequently, report this matter to grab the mail address. The correct option is b.
What is sexual harassment?Unwanted physical contact or touching. Inappropriate sexual approaches. It is forbidden to make unwanted sexual advances toward a candidate or employee.
Unwelcome sexual advances, requests for sexual favors, and other forms of verbal or physical harassment of a sexual character can all be considered harassment.
Therefore, the correct option is b. Become a supportive bystander and intervene to stop the inappropriate behavior, with help from senior staff at the pub. Subsequently, report this matter to grab mail address.
To learn more about sexual harassment, refer to the link:
https://brainly.com/question/13182824
#SPJ2
In cell A17, use the SUMIF function and structured references to display the total
membership in 2023 for groups with at least 40 members.
Since, in cell A17, use the SUMIF function and structured references to display the total membership in 2023 for groups with at least 40 members, to do so one need to use"
On cell G16, type the formula "=SUMIF(G2:G11, ">=40")".
What is the function "SUMIF" about?The SUMIF function is used to add numbers in a range that satisfy certain requirements. Assume, for instance, that you wish to sum only the integers larger than 5 in a column of numbers. The following formula can be used: =SUMIF(B2:B25,">5")
Therefore, In Microsoft Excel, formulas are used to produce results or assign values to cells. The equal sign must be the first symbol in the formula. The function "SUMIF" in the formula above is utilized to provide a sum of numerical values dependent on a condition.
Learn more about SUMIF function from
https://brainly.com/question/19595606
#SPJ1
See full question below
Switch to the Academic Groups worksheet. In cell A14, use the INDEX function to display the value in the first row and first column of the AcademicGroups table.
In cell A17, use the SUMIF function to display the total membership in 2023 for groups with at least 40 members.
Select the three main repetition structures in Java.
The three main repetition structures in Java are while loops, do-while loops and for loops.
What is java?
Java is a high-level, class-based, object-oriented programming language with a low number of implementation dependencies. It is a general-purpose programming language designed to allow programmers to write once and run anywhere (WORA), which means that compiled Java code can run on any platform that supports Java without the need for recompilation. Java applications are usually compiled to bytecode which can run on any Java virtual machine (JVM), regardless of computer architecture. Java's syntax is similar to that of C and C++, but it has very few low-level facilities than either of them. The Java runtime supports dynamic capabilities that traditional compiled languages do not have.
To learn more about java
https://brainly.com/question/25458754
#SPJ13
Which of the following Windows tools can be used to manage group information?
Active Directory Users and Computers is the Windows tools can be used to manage group information.
What is Active Directory used for?Administrators and users can easily locate and use the information that Active Directory holds about network objects. Active Directory organizes directory data logically and hierarchically on the basis of a structured data store.
To access Active Directory Users and Computers, choose Start > Administrative Tools.Locate and pick your domain name from the Active Directory Users and Computers tree.To navigate your Active Directory hierarchy, expand the tree.Therefore, You may manage user and computer accounts, groups, printers, organizational units (OUs), contacts, and other Active Directory objects with Active Directory Users and Computers. You can create, delete, alter, move, arrange, as well as set rights on these items with this tool.
Hence, option C is correct.
Learn more about Active Directory Users from
https://brainly.com/question/24215126
#SPJ1
See option below
Local Users and Groupso User Accounts
o Active Directory Users and Computers
o User and Group Management
Define network architecture?
short answer please
Network architecture refers to the approach network devices and services area unit structured to serve the property desires of shopper devices.
Network devices usually embrace switches and routers.Types of services embrace DHCP and DNS.Client devices comprise end-user devices, servers, and smart things.Networks additionally got to be dynamic, agile, and in lockstep with business desires. ancient, manually intensive strategies of managing pc networks area unit proving to be unsustainable. New approaches area unit necessary, ones that need transformational changes in however networks area unit architected.
This is what spec is all regarding. It’s however information flows expeditiously from one pc to a different. And for businesses with an internet element, it’s a vital idea that encompasses a vital impact on their operation
Learn more about Network Architecture at
https://brainly.com/question/13327017
You have found a file named FunAppx86.exe on your hard drive. Which system(s) would this executable file MOST likely run on?
Since you have found a file named FunAppx86.exe on your hard drive, the systems that this executable file MOST likely run on is Both 32-bit and 64-bit systems.
What does 32- and 64-Bit Mean?When it comes to computers, the processing capability differential between a 32-bit and a 64-bit is everything. 64-bit processors are newer, quicker, and more secure than 32-bit processors, which are older, slower, and less secure.
Therefore, A computer file that contains an encoded sequence of instructions that the system can directly execute when the user clicks the file icon," is the definition of an executable file.
Learn more about executable file from
https://brainly.com/question/28146265
#SPJ1
wireless network devices use ________ to communicate with each other.
wireless network devices use Radio Waves to communicate with each other.
What is Radio Waves?Radio waves are one type of electromagnetic radiation. A radio wave has a significantly longer wavelength than visible light. People frequently use radio waves for communication. In order to transmit and receive radio frequency energy, this radio tower employs both rectangular and circular antennas.
AM and FM radio broadcasting deliver sound to a large audience. Radar is a detection tool that collects data about objects using radio waves. Bluetooth and wireless communication connect devices by using radio waves.
Radio equipment requires electromagnetic waves to transmit and receive in order to function. The radio signal is an electronic current that moves very quickly.
Thus, it is a Radio Waves.
For more information about Radio Waves, click here:
https://brainly.com/question/21995826
#SPJ12
List and explain the different Print and Document Services components that are available while installing the Print and Document Services server role?
The different Print and Document Services components that are available while installing the Print and Document Services server role are:
Supports the loaded paper with a sheet of paper.Edge guides: Assist in loading the paper properly.Protects the printing mechanism with a printer cover.Receiving tray for the paper that was expelled.Sheet feeder: Automatically feeds a stack of papersWhat is print and Document Services role in the server?You may centralize network printer and print server duties using Print and Document Services. Additionally, you can use this role to obtain scanned documents from network scanners and send them to email addresses, a shared network resource, or a Windows SharePoint Services site.
Therefore, Modern print servers can be broadly categorized into two sorts based on how they connect to the network: wired and wireless ones. Both a serial port and a USB port can be used to connect to the printer simultaneously. Observe that a wireless print server connects to the
Learn more about Document Services components from
https://brainly.com/question/27960904
#SPJ1
bob is sending a message to alice. he wants to ensure that nobody tampers with the message while it is in transit. what goal of cryptography is bob attempting to achieve?
He wants to make certain that the communication through message is not tampered with while in transit. The integrity of cryptography is bob attempting to achieve.
What do you mean by message?
A message is a distinct unit of communication intended for consumption by some recipient or set of recipients by the source. A message can be conveyed via courier, telegraphy, carrier pigeon, or electronic bus, among other methods. A broadcast's content can be a message. A conversation is formed through an interactive exchange of messages. A press release is an example of a communication, which can range from a brief report or statement issued by a government body to commercial publicity material.
To learn more about message
https://brainly.com/question/25660340
#SPJ13
if you have two folders open on your desktop and you want to move a file from one folder to the other, simply ___ the file.
if you have two folders open on your desktop and you want to move a file from one folder to the other, simply Drag and Drop the file.
What are the different ways to move or copy a file or folder?By dragging and dropping with the mouse, using the copy and paste commands, or by utilizing keyboard shortcuts, a file or folder can be transferred or relocated to a new location.
Note that in Drag & drop, Just like you would with a file on your desktop, you can move a file or folder from one folder to another by dragging it from its present location and dropping it into the destination folder.
Learn more about copying files from
https://brainly.com/question/17019048
#SPJ1
Stem assessment 4: divisible by
Explanation:
4 IS DIVISIBLE BY 2,4,1
IF MY ANSWER IS USEFUL MARK ME AS BRILLINT
Variance for accumulator. Validate that the following code, which adds the
methods var() and stddev() to Accumulator, computes both the mean and variance
of the numbers presented as arguments to addDataValue():
public class Accumulator
{
private double m;
private double s;
private int N;
public void addDataValue(double x)
{
N++;
s = s + 1.0 * (N-1) / N * (x - m) * (x - m);
m = m + (x - m) / N;
}
public double mean(
Using the knowledge of computational language in JAVA it is possible to write a code that Validate that the following code, which adds the methods var() and stddev() to Accumulator, computes both the mean and variance of the numbers presented as arguments to addDataValue()
Writting the code:import java.util.*;
public class Accumulator {
private static double m;
private static double v;
private static double st;
private static double s[]=new double[5];
private static int N;
private static int count =0;
public static void main(String[] args) {
// TODO Auto-generated method stub
Random r = new Random();
System.out.println("hello world");
for(int i=0;i<5;i++) {
double randomvalue = r.nextDouble();
addDataValue(randomvalue);
}
for(int i=0;i<s.length;i++) {
System.out.println("dataValue:"+s[i]);
}
mean();
System.out.println("mean:"+m);
var();
System.out.println("variance:"+v);
stddev();
System.out.println("standard deviation:"+st);
}
public static void addDataValue(double value) { // addes data values to array
s[count]=value;
count++;
}
public static double mean() { // returns mean
double sum=0.0;
for(int i=0;i<s.length;i++) {
sum+=s[i];
}
m = sum/s.length;
return m;
}
public static double var() { //returns variance
double mm = mean();
double t = 0;
for(int i=0;i<s.length;i++) {
t+= (s[i]-mm)*(s[i]-mm);
}
v= t/(s.length-1);
return v;
}
public static double stddev() { // returnsn the stardard deviation
st= Math.sqrt(var());
return st;
}
}
See more about JAVA at brainly.com/question/12975450
#SPJ1
Driving is expensive. Write a program (in Python) with a car's miles/gallon and gas dollars/gallon (both floats) as input, and output the gas cost for 20 miles, 75 miles, and 500 miles.
Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
print('{:.2f} {:.2f} {:.2f}'.format(your_value1, your_value2, your_value3))
x=float(input("How many miles can your vehicle travel on 1 gallon of gasoline?: "))
y=float(input("How much does 1 gallon of gasoline cost?: "))
print('20 miles: {:.2f}$\n75 miles: {:.2f}$\n500 miles: {:.2f}$'.format((20/x)*y, (75/x)*y, (500/x)*y))
2_What is the shape of the potato peleer?Why does it have this shape and dimensions
Answer: call 023 2344 0092
Explanation:
he is my teacher
9. Which of the following actions would NOT help identify your personal
ethics?
a. Describe yourself.
b. Conduct a genetic study of your extended family.
c. Identify the influences of your work environment.
d. Prepare a list of values that are most important to you.
Conduct a genetic study of your extended family would not help identify your personal ethics.
What is personal ethics?
Personal ethics refers to a person's morals and code of behaviour. These principles are instilled in a person by their parents, relatives, and friends from the time they are born. If there is no personal ethics, human existence is inadequate and superficial. It is the ethical standard by which a person makes decisions and acts in both personal and professional situations. These ethics affect many aspects of a person's life and help to develop a person's work ethic, personal and professional objectives, and values. Individuals use ethics to determine what is right and wrong and to influence how others act in difficult situations.
The primary ethical concerns that IRBs and investigators must grapple with when designing and reviewing studies involving the use of genetic information are privacy, confidentiality, informed consent, and return of results.
So, B is correct answer.
To learn more about Personal ethics
https://brainly.com/question/1031443
#SPJ9
6.How can an Infocion raise a complaint of sexual harassment?
a.By writing to GRB
b.Inform/consult your manager and report to the company.
c.By sending an email to your HR Business PArtner
d.Any of the above
Answer:
d. any of the above
Explanation:
remember to give me a Brainest
like ,star,comment.
1. PP 2.1 Create a revised version of the Lincoln program from Chapter 1 to print the quotation
inside a box made up of character ^.
2. PP 2.2 Write a program that reads four integers and prints the sum of their squares.
3. PP 2.3 Write a program that reads three floating point numbers and prints the cube of their
average.
4. PP 2.7 Write a program that prompts for and reads integer values for typing speed and number
of characters in the document, then prints the time required to type them as a floating point
result.
The revised version of the Lincoln program from Chapter 1 to print the quotation us illustrate below.
What is a program?A computer program is a set of instructions written in a programming language that a computer can execute. Software contains computer programs as well as documentation and other intangible components.
The program will be:
public class Print {
public static void main(String[] args)
{
char ch='"';
System.out.println("A quote by Abraham Lincoln:\n"+ch+"Whatever you are, be a good one."+ch);
//by using char for storing double quote
System.out.println("A quote by Abraham Lincoln:\n"+'"'+"Whatever you are, be a good one."+'"');
//in single quote
System.out.println("A quote by Abraham Lincoln:\n\"Whatever you are, be a good one.\"");
//using \"
}//end of main
}//end of Print class
/******OUTPUT*******
A quote by Abraham Lincoln:
"Whatever you are, be a good one."
A quote by Abraham Lincoln:
"Whatever you are, be a good one."
A quote by Abraham Lincoln:
"Whatever you are, be a good one."
*/
Learn more about programs on:
https://brainly.com/question/26568485
#SPJ1
How many possible values can we have with the 8 bits in a byte?
Answer:
1 byte e.g 8 bits
Explanation:
A bit is the smallest representation of data
How can you add a new printer to a print server within the Print Management tool using the default search option?
To add a new printer to a print server within the Print Management tool using the default search option one can automatically find and install printers discovered on the server's local network, right-click ServerName (local) in the Print Management tree, then select Automatically Add Network Printers, and also then click Start.
What is software for print management?By providing capabilities to more effectively monitor, regulate, as well as maintain their entire printer fleet from a single user interface, print management software enables enterprises to centralize administration and reduce the cost of printing.
Therefore, The Print Management Console snap-in, which is useful for controlling numerous printers or print servers and transferring printers to and from other Windows print servers, is included in the Print Server role, which is used to establish a Windows Print Server.
Learn more about Print Management from
https://brainly.com/question/27960904
#SPJ1
Imagine that you are planning to create a website or game. Explain in 3-5 sentences what you would want to build and name five procedures and eight objects that you would want to implement into your website or game in order to make the coding more simplified. (please help, this was due yesterday)
The five procedures that you would want to implement into your website or game in order to make the coding more simplified are as follows:
Set the URL and domain name as simple as possible.Always set the email address that matches your domain name.Always update and customize your website as per the user.Design your website in such a way that it seems attractive and effective.For security and privacy purposes, always enable the password for the user. What are the eight objects that you want for the same action?The eight objects that you want for the same action are high-quality content, a responsive designer, sensible navigation objects, website security, customer testimonials, a good and clear descriptive profile, website visuals and notifications, etc.
If you are going to build a website, make it unique in all possible senses like user-centered, attractive, no description of nonsense information, be precise, and accurate.
To learn more about Website development, refer to the link:
https://brainly.com/question/28349078
#SPJ1
How to write a c program asking the user for 20 numbers in descending or ascending order, which then prompts the user to enter a number to search the array by using a binary search and print whether the number is found or not.
Please use a function for a bubble sort, a read, a print and a binaty search.
#include <bits/stdc++.h>
#define ERR -1
std::vector<int> s;
int inp;
int eval(std::vector<int> v, int fl, int fr, int idx) {
if (fr>=fl) {
int idy = fl+(fr-fl)/2;
if (v.at(idy)==idx) return idy;
if (v.at(idy)>idx) return eval(v,fl,idy-1,idx);
return eval(v,idy+1,fr,idx);
}
return ERR;
}
std::string print_result(int input) {
int result = eval(s,0,s.size()-1,input);
return result!=ERR ? "The element found at " + std::to_string(result) + ". index!\n" : "The element not found!\n";
}
void read() {
std::cout << "Enter 20 numbers whether ascending or descending order.\n";
for(int i=0;i<20;i++) {
std::cout << "\n>>";
int fill; std::cin>>fill;
s.push_back(fill);
}
std::cout << "Which element do you want to find?: ";
std::cin>>inp;
}
int main(int argc, char* argv[]) {
read();
std::cout << print_result(inp);
return 0;
}
Which menu option allows you to change the display to close-up, single, or multiple pages?
Question 3 options:
Insert
Edit
View
File
The menu option that allows you to change the display to close-up, single, or multiple pages is view. The correct option is C.
What is menu option?A menu is a set of options presented to a computer application user to assist them in finding information or performing a function.
Menus are common in graphical user interfaces (GUIs) provided by operating systems such as Windows and MacOS. They're also used in speech recognition and on websites and web pages on the internet.
The View menu, located at the top of the screen, contains the following commands: Sheets: Upon selection, a cascade menu appears, displaying a list of all sheets used in the document, sorted from left to right.
View is the menu option that allows you to switch between close-up, single, and multiple page displays.
Thus, the correct option is C.
For more details regarding menu option, visit:
https://brainly.com/question/3507017
#SPJ1
Jordan is a 3D modeler using three circle made from edges—one large, one medium, and one small circle—and lines them up in front of one another from largest to smallest. Then Jordan fills the space between the edges of the circles with faces, making a telescope-looking cylinder. What type of modeling is Jordan using?
Question 7 options:
Digital Sculpting
Polygonal Edge Modeling
NURBS Modeling
Procedural Modeling
Since Jordan is a 3D modeler using three circle made from edges—one large, one medium, and one small circle—and lines them up in front of one another from largest to smallest. The type of modeling is Jordan using is option B: Polygonal Edge Modeling.
What is a polygon 3D modeling?
Polygonal modeling is a technique used in 3D computer graphics to represent or approximate an object's surface using polygon meshes. For real-time computer graphics, polygonal modeling is the preferred technique since it is ideally suited to scanline rendering.
A 3D model's fundamental geometric elements are polygons. The polygon's vertices and edges are all straight. The created plane is known as a face and is typically a "triangular polygon," a geometric object with three sides. There are additionally "quads" and "n-gones" with four sides and several vertices.
Note that We build a polygon around each hole to identify an area of influence for that hole using the polygon method, an established and time-tested technique based on a straightforward geometric algorithm.
Learn more about Edge Modeling from
https://brainly.com/question/2141160
#SPJ1
5.Usage of sexual slurs, repeatedly pressurizing someone for a date, sharing provocative jokes and display of obscene pictures at workplace is considered as which form of sexual harassment
a. Hostile Work Environmaent
b. B.Quid pro quo
c. Both
Answer:
c. Both
Explanation:
Chris is unfamiliar with the word processing program he is using. He wants to find
the drop-down text-driven options for the document view because he does not yet
recognize the icons at the top of the window. Where can Chris find these drop down
options?
Since Chris wants to find the drop-down text-driven options for the document view because he does not yet recognize the icons at the top of the window. The place that Chris can find these drop down options is option D: Menu bar.
What does a computer menu bar do?The area of a browser or application window known as the menu bar, which is normally found at the upper left corner, contains drop-down menus that let users interact with the application or content in a variety of ways.
Therefore, while menu bars list all of a program's top-level commands, toolbars only display the most commonly used commands. Immediacy. A menu command could require additional input, but clicking a toolbar command has an immediate impact.
Learn more about Menu bar from
https://brainly.com/question/20380901
#SPJ1
See full question below
Chris is unfamiliar with the word processing program he is using. He wants to find the drop-down text-driven options for the document view because he does not yet recognize the icons at the top of the window. Where can Chris find these drop down options?
answer choices
Options bar
Scroll bar
Toolbar
Menu bar
PLEASE HELP
Find five secure websites. For each site, include the following:
the name of the site
a link to the site
a screenshot of the security icon for each specific site
a description of how you knew the site was secure
Use your own words and complete sentences when explaining how you knew the site was secure.
The name of the secure websites are given as follows:
Each of the above websites had the security icon on the top left corner of the address bar just before the above domain names.
What is Website Security?The protection of personal and corporate public-facing websites from cyberattacks is referred to as website security.
It also refers to any program or activity done to avoid website exploitation in any way or to ensure that website data is not accessible to cybercriminals.
Businesses that do not have a proactive security policy risk virus spread, as well as attacks on other websites, networks, and IT infrastructures.
Web-based threats, also known as online threats, are a type of cybersecurity risk that can create an unwanted occurrence or action over the internet. End-user weaknesses, web service programmers, or web services themselves enable online threats.
Learn more about website security:
https://brainly.com/question/28269688
#SPJ1
Cloud providers have virtually unlimited resources, which allows for
Cloud providers have virtually unlimited resources, which allows for scalability.
What is resource?
All materials available in our environment that are technologically accessible, economically possible, and culturally sustainable that assist us to satisfy our needs and desires are referred to as resources. They can also be characterised as actual or potential based on their level of development and use, as biotic or abiotic based on their origin, and as ubiquitous or localised based on their distribution. With the passage of time and the advancement of technology, an object becomes a resource.
Cloud scalability in cloud computing refers to the ability to scale up or scale down IT resources in response to changing demand. Scalability is a distinctive property of the cloud and a significant driver of its growing attractiveness among organisations.
To learn more about resource
https://brainly.com/question/24514288
#SPJ9
Conditionals often run on {} instructions.
A
if / else
B
if / then
C
unless / until
D
up to / at least
Answer: A
Explanation: This is a if/else Statement
In any programming language, the code has to make decisions and carry out actions depending on different inputs.
Consider the following code: x = 17 y = 3 print(x % y)
It is to be noted tha the output of the phyton code described above is "2". See the explanation below.
What is a python Code?Python is a general-purpose, high-level programming language. Its design concept prioritizes code readability by employing heavy indentation. Python is garbage-collected and dynamically typed. It is compatible with a variety of programming paradigms, including structured, object-oriented, and functional programming.
The Python program is described as follows:
In the preceding code, two variables are defined: x and y, which have values of 17 and 5, respectively.
Variable x in this code modules variable y, which is (x%y). Modules (%) in Python or any other programming language will provide a remainder of "2."
We utilize a print function to output the computed value's value.
Python is a computer programming language commonly used to create websites and software, automate tasks, and perform data analysis. Python is an all-purpose language, which means that it can be used to create a variety of programs and is not specific to any particular problem.
Learn more about Phyton:
https://brainly.com/question/26497128
#SPJ1
Full Question:
Consider the following code: x = 17 y = 5 print (x % y)
What is the output?
why do companies use online collaborative productivity software?
Answer:
to allow easy access to colleagues for assistance
To allow easy access to colleagues for assistance is the way companies use online collaborative productivity software.
What is online collaborative?Working together online while utilizing online tools is known as online collaboration. Employees can communicate digitally from many locations and devices by using shared online workspaces and virtual work environments, as opposed to physically gathering in an office.
Teams can communicate online thanks to software called online collaboration tools. Some examples are Trello, Asana, and Slack. These tools are created to make it simpler for remote teams to coordinate their efforts and communicate.
The following are some advantages of working together online: saving the business money and valuable resources. Increasing productivity so you can focus on the most important activities. improving communication within and between teams as well as with external parties.
Thus, To allow easy access to colleagues for assistance.
For more information about online collaborative, click here:
https://brainly.com/question/28289861
#SPJ12