a scanner breaks its input unit tokens delimited by commas, which are the default delimiter. T/F

Answers

Answer 1

A scanner does not use commas as the default delimiter. Thus, the answer is False.

The default delimiter used by a scanner is a whitespace character, which includes spaces, tabs, and line breaks.

This means that a scanner will break its input into tokens based on these whitespace characters, rather than commas.

However, it is possible to change the default delimiter used by a scanner to a comma or any other character by using the useDelimiter() method.

For example, the following code will set the delimiter to a comma:

Scanner scanner = new Scanner(System.in);
scanner.useDelimiter(",");

With this code, the scanner will break its input into tokens based on commas, rather than whitespace characters.

Learn more about programming language here:

https://brainly.com/question/17074940

#SPJ11


Related Questions

Make Your Own Flowchart

Answers

Answer:

https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcS5V59B3u23rfG-bXj8jNoV7rXfV62cyPnkcg&usqp=CAU

an example of a flow chart

Explanation:

You can use the ____ to change the order of the wat windows are stacked.

A). taskbar
B). Open bar
C). toolbar
D). Menu bar

Answers

Answer:

A

Explanation:

In terms of technolagy, soft wear is defined as

Answers

Answer:

the programs and other operating information used by a computer.

Explanation:

somthing like windows or linux.

You change the color, highlight, font, and size for a portion of text, and you later want to apply that same style to another section of the text. what is the easiest way to do that?

Answers

Choose the text that needs to be changed. Select a color by clicking the arrow next to Font Color in the Font group of the Home tab. To quickly format text, you can also use the formatting options on the Mini toolbar. When you choose text, the Mini toolbar appears automatically.

How you will change the font size and highlight a text?

Size-changing the chosen text

Select the text you want to alter or the text-containing cells. Press Ctrl + A to pick every word in a Word document.

Click the font size in the Font Size box on the Home tab. Within the following restrictions, you can type in whatever size you choose as well.

To learn more about font size refer to:

https://brainly.com/question/282066

#SPJ4

designing physical files requires ________ of where and when data are used in various ways.

Answers

Designing physical files requires an understanding of where and when data are used in various ways.

#SPJ11

20
Select the correct answer.
Part of social health means that you make positive contributions to your community,
ОА.
True
OB
False
Reset
Next

Answers

Answer:

true

Explanation:

because my 8 ball said so

Answer:

True

Explanation:

How is the bandwidth of a network measured?

Answers

Answer:

Bandwidth is measured as the amount of data that can be transferred from one point to another within a network in a specific amount of time.

Explanation:

Gaming applications allow users to play solo games as well as play with friends and/or other players

True or false

Answers

Answer:

True

Explanation:

i'm gamer

Answer:

It's true:))

Explanation:

I took the test:))

Why would someone get a patent for their invention?

1. to sell their idea


2. to make their idea public domain


3. to be able to name the invention after themselves


4. to keep others from reproducing their idea

Answers

Answer:

4.To keep other from reproducing their idea .

Explanation:

It is regard as an exclusive right own on a invention .The inventor must disclosed the technical information about  the product to the public before a patent is granted .

It is the legal  authorization given to an inventor for sharing his intellectual property to the public this also restrict others from making ,using or selling the invention for a limited .

there are 3 type of patents ,Utility patents design patents and plant patent.

______ in an excel workbook is a collection of cells organized in rows and columns where you create and analyze data.

Answers

In an Excel workbook, a worksheet is a collection of cells organized in rows and columns where you can create and analyze data. A worksheet is also known as a spreadsheet.

Here's a step-by-step explanation of a worksheet in an Excel workbook:

1. Cells: A worksheet consists of cells, which are individual units where you can input data. Each cell is identified by a unique combination of a column letter and a row number. For example, cell A1 refers to the cell in the first column and first row.

2. Rows: Rows in a worksheet run horizontally and are numbered from 1 to the maximum number of rows supported by Excel. Rows provide a way to organize data vertically. You can insert, delete, and format rows as needed.

3. Columns: Columns in a worksheet run vertically and are identified by letters (A, B, C, and so on). Columns provide a way to organize data horizontally. You can insert, delete, and format columns as needed.

4. Cell References: Cells can be referenced using their unique combination of column letters and row numbers. For example, B3 refers to the cell in the second column and third row. Cell references are used in formulas and functions to perform calculations and analysis on data.

5. Data Entry: You can enter various types of data into the cells of a worksheet. This can include text, numbers, dates, and formulas. For example, you can enter sales figures, student grades, or inventory data into the cells.

6. Formulas and Functions: Excel provides a powerful set of formulas and functions that allow you to perform calculations and analysis on the data in a worksheet. Formulas are mathematical expressions that use cell references, operators, and functions to calculate results. Functions are pre-defined formulas that perform specific operations, such as summing a range of cells or finding the average.

7. Data Analysis: With the data entered into a worksheet, you can use Excel's built-in tools and features to analyze the data. This can include sorting and filtering data, creating charts and graphs, performing statistical analysis, and creating pivot tables to summarize and analyze large amounts of data.

By utilizing the cells, rows, and columns in a worksheet, along with formulas and functions, you can create and analyze data in an Excel workbook. This provides a powerful tool for organizing and manipulating data, making it easier to draw insights and make informed decisions based on the data.

To know more about Excel workbook visit:

https://brainly.com/question/30415670

#SPJ11

Write a Java program that uses random number generation to create sentences. Use four arrays of strings called article, noun, verb and preposition. Create a sentence by selecting a word at random from each array in the following order: article, noun, verb, preposition, article and noun.
The article array should contain the articles "the", "a","one", "some" and "any". The noun array should contain the nouns "boy", "girl"," bird","fish","cat","dog", "town" and "car". The verb array should contain the verbs "drove", "jumped", "ran", "walked" and "skipped". The preposition array should contain the prepositions "to", "from", "over", "under" and "on".
As each word is picked, concatenate it to the previous words in the sentence. The words should be separated by spaces. Each sentence should start with a capital letter and end with a period. The program should generate 20 sentences to form a short story. The story should begin with a line reading "Once upon a time..." and end with a line reading "THE END".

Answers

The Java program uses random number generation to create sentences. The program uses four arrays of strings called article, noun, verb, and preposition. Each sentence is created by selecting a word at random from each array in the following order: article, noun, verb, preposition, article, and noun.

Explanation of the Java program using random number generation to create sentencesThe aim of the Java program is to use random number generation to create sentences. There are four arrays of strings called article, noun, verb, and preposition used to create sentences. A sentence is created by selecting a word at random from each array in the following order: article, noun, verb, preposition, article, and noun.

The program is required to generate 20 sentences to form a short story. The story should start with a line reading "Once upon a time..." and end with a line reading "THE END".The article array contains the articles "the", "a", "one", "some", and "any". The noun array contains the nouns "boy", "girl", "bird", "fish", "cat", "dog", "town", and "car". The verb array contains the verbs "drove", "jumped", "ran", "walked", and "skipped". The preposition array contains the prepositions "to", "from", "over", "under", and "on".Concatenate each word to the previous words in the sentence. The words should be separated by spaces. Each sentence should start with a capital letter and end with a period. Below is a Java program that uses random number generation to create sentences. The program uses four arrays of strings called article, noun, verb, and preposition.Example Code:public class RandomSentenceGenerator

{

public static void main(String[] args)

{String[] articles = {"the", "a", "one", "some", "any"};

String[] nouns = {"boy", "girl", "bird", "fish", "cat", "dog", "town", "car"};

String[] verbs = {"drove", "jumped", "ran", "walked", "skipped"};

String[] prepositions = {"to", "from", "over", "under", "on"};

String sentence;for(int i=0; i<20; i++)

{

sentence = "Once upon a time... ";

sentence += articles[(int)(Math.random()*articles.length)] + " ";

sentence += nouns[(int)(Math.random()*nouns.length)] + " ";

sentence += verbs[(int)(Math.random()*verbs.length)] + " ";

sentence += prepositions[(int)(Math.random()*prepositions.length)] + " ";

sentence += articles[(int)(Math.random()*articles.length)] + " ";

sentence += nouns[(int)(Math.random()*nouns.length)] + ". ";

System.out.println(sentence);

}

System.out.println("THE END");

}}

The program starts by creating four arrays of strings: articles, nouns, verbs, and prepositions. Then, the program generates 20 sentences by selecting a word at random from each array in the following order: article, noun, verb, preposition, article, and noun. The program concatenates each word to the previous words in the sentence. The words are separated by spaces. Each sentence starts with a capital letter and ends with a period.ConclusionIn conclusion,  The program generates 20 sentences to form a short story, which starts with a line reading "Once upon a time..." and ends with a line reading "THE END".

To know more about Java program visit:

brainly.com/question/2266606

#SPJ11

Which type of testing is used to test how well the system will perform with a workload?

Integration testing

performance testing

unit testing

acceptance testing

Answers

Answer:

Performance Testing

Explanation:

The Correct option is - Performance Testing

Reason -

INTEGRATION TESTING is a level of software testing where individual units / components are combined and tested as a group. The purpose of this level of testing is to expose faults in the interaction between integrated units.

PERFORMANCE TESTING  is a testing measure that evaluates the speed, responsiveness and stability of a computer, network, software program or device under a workload.

UNIT TESTING is a type of software testing where individual units or components of a software are tested. The purpose is to validate that each unit of the software code performs as expected.

Acceptance testing, a testing technique performed to determine whether or not the software system has met the requirement specifications.

How can you make sure to save all annotations from a slide show?
When you exit the slide show, select Keep the Annotations.
O Before beginning the slide show, select Save All Annotations.
During the slide show, right-click and select Save Annotations.
O All annotations are automatically saved as a copy of the presentation.

Answers

Answer:

when you exit the slide show, select keep annotations

Explanation:

To save all annotations from a slide show, make sure that When you exit the slide show, select Keep the Annotations.

What is annotation?

This is known to be a kind of a note that is said to be added through comment or explanation.

It is often used by writers. Note that the right thing to do is to To save all annotations from a slide show, make sure that When you exit the slide show, select Keep the Annotations.

Learn more about Annotations from

https://brainly.com/question/16177292

Mike is explaining various malware types to new technical support personnel so that they can recognized them. What type of malware is a key logger?

Answers

Mike is explaining various malware types to new technical support personnel so that they can recognize them. The type of malware that is a key logger is known as "Spyware."

A keylogger can record everything you type into your keyboard and send that information to a cybercriminal, who can then use that information to steal your login credentials and other sensitive information.

Types of malware : Adware, Spyware, Virus, Ransomware, Worm, Trojan horses, Rootkits, Botnets, Backdoors.

Adware: Adware is a type of malware that floods your computer with unwanted pop-up ads or banners. Some adware can also track your browsing habits and collect your personal information.Spyware: Spyware is a type of malware that can record the keystrokes you enter on your computer or mobile device. Spyware can also track your browsing habits and collect your personal information.Virus: A virus is a type of malware that can replicate itself and spread to other computers. Viruses can cause damage to your computer's software or hardware.Ransomware: Ransomware is a type of malware that can encrypt your computer's files and demand payment in exchange for the decryption key.Worm: A worm is a type of malware that can spread to other computers through your network or the internet. Worms can cause damage to your computer's software or hardware.Trojan horses: A Trojan horse is a type of malware that disguises itself as a legitimate program. Once installed, a Trojan horse can give a cybercriminal access to your computer.Rootkits: Rootkits are a type of malware that can hide themselves from antivirus software and other security programs.Botnets: Botnets are networks of infected computers that can be controlled by a cybercriminal.Backdoors: Backdoors are vulnerabilities in your computer's security that can allow a cybercriminal to gain unauthorized access.

To learn more about malware: https://brainly.com/question/399317

#SPJ11

what are the base case(s) for the searchhelper that halt the while-loop of the non-recursive search codc?

Answers

The base case(s) for the searchhelper that halt the while-loop of the non-recursive search code are the condition(s) that determine when the search has been successfully completed. In other words.

the base case(s) are the condition(s) that signal that the search has found the desired result or that there are no more elements left to search through. In a non-recursive search code, the while-loop continues to iterate until a specific condition is met. This condition is known as the base case(s). Once the base case(s) is satisfied, the while-loop is halted and the search is considered complete.

the while-loop is halted and the search is considered unsuccessful.To summarize, the base case(s) for the searchhelper that halt the while-loop of the non-recursive search code are the condition(s) that indicate the desired result has been found or that the search has been completed. These conditions determine when the while-loop should stop iterating.

To know more about base case visit:

brainly.com/question/33945847

#SPJ11

Two perpendicular sides of a triangle are 6 m and 3.9 m long respectively. What is the length of the third side of the triangle? You can answer this in terms of m's, cm's, km's, in's, ft, etc. but you must enter the units. If you don't remember the Pythagorean theorem, check "Show Hint" and then "Submit Answer" One side of a rectangle is 5ft long and the other is 4ft long. The area of the rectangle is (Remember to square the units.)

Answers

The area of the rectangle is 20 square feet of having Two perpendicular sides of a triangle are 6 m and 3.9 m long respectively.

To find the length of the third side of the triangle, we can use the Pythagorean theorem, which states that in a right triangle, the square of the length of the hypotenuse (the side opposite the right angle) is equal to the sum of the squares of the lengths of the other two sides.

Let's denote the perpendicular sides of the triangle as side A and side B. According to the problem, side A is 6 m long and side B is 3.9 m long.

Using the Pythagorean theorem, we have:

C^2 = A^2 + B^2

C^2 = (6 m)^2 + (3.9 m)^2

C^2 = 36 m^2 + 15.21 m^2

C^2 = 51.21 m^2

Taking the square root of both sides, we get:

C = √(51.21 m^2)

C ≈ 7.16 m

Therefore, the length of the third side of the triangle is approximately 7.16 m.

For the rectangle, one side is 5 ft long and the other side is 4 ft long. The area of a rectangle is given by the formula:

Area = Length × Width

Area = 5 ft × 4 ft

Area = 20 ft^2

To know more about Pythagorean theorem

https://brainly.com/question/29769496

#SPJ11

What is output? c = 1 sum = 0 while (c < 10): c = c + 3 sum = sum + c print (sum)

Answers

Answer:

21

Explanation:

The values of c that make it into the loop are 1, 4, 7.

The values that are added to sum are 3 higher, i.e., 4,7 and 10.

The sum of those is 21.

p.s. why did you not run the program yourself?

One definition of culture suggests that culture is everything you think, everything you do and
everything you possess. The drawing of a cultural system mirrors that definition. In the
drawing, everything you think is represented by:
Technology
Social
Institutions
Ideology
The rectangle

Answers

The drawing that usually represent culture is ideology. The correct option is D.

What is ideology?

An ideology is a set of beliefs or philosophies attributed to a person or group of people, particularly those held for reasons other than epistemic ones, in which "practical elements are as prominent as theoretical ones."

Ideology is a type of social or political philosophy in which practical as well as theoretical elements are prominent. It is an idea system that seeks to both explain and change the world.

Culture can be defined as all of a population's ways of life, including arts, beliefs, and institutions that are passed down from generation to generation.

It has been defined as "an entire society's way of life." As being such, it includes etiquette, dress, language, religion, rituals, and art.

Thus, the correct option is D.

For more details regarding ideology, visit:

https://brainly.com/question/24353091

#SPJ1

How is 69.50% is a C when 69% is a D?

Answers

Answer:

below

Explanation:

69.5% is probably the minimum amount needed to get a C while anything below that to a certain extent is a D. For example, a 59.5% - 69.49% might be a D.

Anyway, 69% is lower than 69%, so it make sense why it would be a D

an administrator issues the ipv6 route 2001:db8:acad:1::/32 gigabitethernet0/0 2001:db8:acad:6::1 100 command on a router. what administrative distance is assigned to this route?

Answers

The administrative distance assigned to the route "ipv6 route 2001:db8:acad:1::/32 gigabitethernet0/0 2001:db8:acad:6::1 100" is 100.

In networking, administrative distance is a metric used to determine the reliability or trustworthiness of a particular route. It is a numerical value assigned to different routing protocols or static routes. When multiple routing protocols or routes are available for a destination, the router selects the route with the lowest administrative distance as the preferred path. In this case, the "ipv6 route" command specifies the route for the IPv6 network "2001:db8:acad:1::/32" through the "gigabitethernet0/0" interface with a next hop address of "2001:db8:acad:6::1". The administrative distance assigned to this route is 100, indicating that it has a relatively low priority compared to other routes with lower administrative distances.

Learn more about routing protocols here:

https://brainly.com/question/31678369

#SPJ11

someone please help in this question​

someone please help in this question

Answers

Answer:

i think A

Explanation:

The ____ is ultimately responsible for managing all internet domain names, network addresses, and protocol parameters and behaviors.

Answers

The ICANN is ultimately responsible for managing all internet domain names, network addresses, and protocol parameters and behaviors.

The Internet Corporation for Assigned Names and Numbers (ICANN) is an American organization whose function is to govern and manage internet bodies. It was set up in the year 1998 and since then has been working efficiently for providing better internet operational structures.

The ICANN provides a domain name system for ensuring that according to its setup policies names and address is given to internet bodies. Hence, all the domain names on the internet are made and organized by the ICANN.

These domains function according to the protocols and parameters defined by the ICANN. The primary focus of ICANN is to provide the internet with a stable operational parameter.

To learn more about ICANN, click here:

https://brainly.com/question/14161903

#SPJ4

A grade 8 girl types her age as 18 years old as to gain access to a certain website. Is this statement ethical or unethical? Give atleast 2 reasons for both options.

Answers

Answer:

The answer is ethical.

Explanation:

Because first off she is lying about her age and second apparently she is too young to get in the website.

binary into decimal
100101

Answers

Answer:

100101= 37....

Explanation:

Hope it helps you.....

binary into decimal100101

Answer:

37

I believe it will help you maybe, hope it helps you

you need to store key-value pairs of users and their high scores for a gaming application. which is the fastest and cheapest storage option for this type of data?

Answers

Amazon S3 - RDS MySQL - DynamoDB - Amazon RedShift is the quickest and least expensive storage solution for gaming application data.

Key-value pair-based items are stored in what form of storage?

A key-value database stores data as key-value pairs, where a key serves as a unique identifier. Anything, from simple items to complex composite ones, can be used as a key or value.

What types of data are supported by S3?

Almost every type of data can be stored in any format. For more information, please see the Amazon Web Services Licensing Agreement. You are permitted to store an infinite number of items and pieces of data.

To know more about application visit:-

https://brainly.com/question/28650148

#SPJ1

you are designing a wireless network for a client. your client needs the network to support a data rate of at least 150 mbps. in addition, the client already has a wireless telephone system installed that operates at 2.4 ghz. which 802.11 standard works best in this situation? answer 802.11a 802.11g 802.11b 802.11n

Answers

The 802.11a standard would work best in this situation.

The 802.11a standard operates at 5 GHz, which means it will not interfere with the client's existing wireless telephone system that operates at 2.4 GHz. Additionally, 802.11a supports data rates up to 54 Mbps, which is well above the required data rate of at least 150 Mbps specified by the client.

802.11g and 802.11n also support data rates of at least 150 Mbps, but they operate in the 2.4 GHz frequency band, which could cause interference with the client's existing wireless telephone system. 802.11b operates in the same 2.4 GHz frequency band as 802.11g and 802.11n, but only supports data rates up to 11 Mbps, which is much lower than the required data rate of at least 150 Mbps.

The best 802.11 standard for your client's situation, which requires a data rate of at least 150 Mbps and has an existing wireless telephone system operating at 2.4 GHz, is 802.11n.

Step-by-step explanation:
1. Evaluate the data rate requirements: Your client needs a minimum of 150 Mbps.
2. Consider the existing wireless telephone system operating at 2.4 GHz.
3. Compare the available standards:
  a. 802.11a: Operates at 5 GHz and supports up to 54 Mbps.
  b. 802.11b: Operates at 2.4 GHz and supports up to 11 Mbps.
  c. 802.11g: Operates at 2.4 GHz and supports up to 54 Mbps.
  d. 802.11n: Operates at both 2.4 GHz and 5 GHz and supports up to 600 Mbps.
4. Choose the standard that meets both the data rate requirement and avoids interference with the existing 2.4 GHz system: 802.11n (as it can operate at 5 GHz and supports up to 600 Mbps).

You can learn more about the wireless telephone at: brainly.com/question/28206597

#SPJ11

Omar wants to use the new hard drive as his primary boot device, what is the next step you should perform?

Answers

Since Omar want the new hard drive to be used as a primary boot device, the next step to be performed is installing Windows on the new hard drive.

What is a hard-disk drive?

A hard-disk drive can be defined as an electro-mechanical, non-volatile data storage device that is made up of magnetic disks (platters) that rotates at high speed.

In Computer technology, all hard-disk drives are commonly installed on computers and other digital service for the storage of files and to enable the booting of a computer through its operating system (OS).

In this context, we can infer and logically deduce that if Omar want the new hard drive to be used as a primary boot device, the next step to be performed is installing Windows on the new hard drive.

Read more on hard-disk here: https://brainly.com/question/26382243

#SPJ1

1.
Which of the following is NOT caused by alcohol?

Answers

Answer:

What are the choices

Answer:

Explanation:reduced concentratjon

inhibited comprehension

decreased coordination

increased heart rate

Write a program that asks the user to enter the name of an input file. If the file does not exist, the program should prompt the user to enter the file name again. If the user types QUIT in any uppercase/lowercase combinations, then the program should exit without any further output.

Answers

Answer:

I can help you with that inbox me

which of the following is considered an application input control? a. reporting distribution log b. exception report c. reasonableness check d. run control total e. hash total

Answers

Reasonableness check is the following is considered an application input control.

What is Reasonableness check?

Common sense is claimed to be neither. A reasonableness check (also known as a reasonableness test) on a data set, however, is actually just a common sense check.

Does the data have accepted values or do they fall within acceptable ranges? Even so, does it make sense? That is the genuine query. You need to comprehend your data collection and decide what is reasonable before you can run a reasonableness test. Keep in mind that it is a common sense check. Therefore, you must first comprehend what is normal and reasonable!

What is application input control?

The data inputs for an application are regulated by this application control. Users are prevented from entering invalid data into the system through input controls. These controls could stipulate the format in which data must be entered or require authorization for all inputs before they can be added to the information system.

When we talk about input controls for applications we must look at several items:

Input authorizationBatch controls and balancingError reporting and handlingBatch integrity in online or database systems

Data that has been appropriately authorized to be entered into the application system has been authorized for input. Be mindful of things like workstation identification, source documents, internet access limits, signatures on batch forms, and unique passwords.

Learn more about  application input control click here:

https://brainly.com/question/28384322

#SPJ4

Other Questions
Which scientific area has the most influence in shaping modern classification methods? physiology anatomy evolution behavior Whats 4/58 I need help pls I have no calculator. Pls pls pls tell me (Based on Mishkin, Ch 4, Q3) Suppose the yield to maturity on a normal $1,000 fixed-payment loan with $126 yearly payments for 25 years is equal to 12%. a Write down an expression of the cash flows of the loan that relates the principal, the fixed payments and the interest rate. (5%) b Suppose you take a $2000 loan that makes you pay $252 per year for 25 years. However, payments are scheduled to start in two years (you get the loan today, and then start paying by the end of year 2 and completely amortize the loan by the end of year 27). Write down an expression relating the principal, the fixed payments and the yield to maturity of this loan. (5%) c Show that the yield to maturity of the loan in part b) is less than the yield to maturity in a). Hint: You should compare the expressions in a) and b) (10%) Determine the equation of the circle graphed below.10810-10-8-62-2-4-6-8-10 It is possible to increase the frequency of breathing while simultaneously developing hypercapnia? Explain how this is possible. the 19th century indian photographer lala deen dayal documented much of india, he was much acclaimed, at one point, a prince gave him the noble title of , a. Lights enters an unknown material from air at 47 degrees and is refracted to 28.1 degrees. Find the index of refraction of the new materialb. (Image is for b) This image shows two mirrors with a 120 degree angle between them. The incident angle to the first mirror is 65 degrees. What is the angle of reflection off of the second mirror? True False x-sqrt6 is a factor of x^4-36 The length of a rectangle is measured as 370 mm correct to 2 significant figures. a) What is the upper bound for the length? The width of this rectangle is measured as 19.4 mm correct to 1 decimal place. b) What is the lower bound for the area of the rectangle? I will give brainliest, if correct If y varies directly as andy 20 when x = 6, what is the value of y whenx = 24? a. 36 b.80 C 30 d. 4I need help fast a particular flower can be purple, blue, red, or white. plants from two different pure-breeding strains of white-flowered plants are crossed and the f 1 are then crossed to produce an f 2 generation. what might a 9:7 phenotypic ratio in the f 2 indicate about the genes that control flower color in these plants? in the expression, whycan the variable not be equal to 0? Usesubstitution to justify your argumentarithmeticallyI will mark you brainliest Two ways I can decrease the force attraction between two charged objects? Karen developed a phobia of all types of dogs during her childhood subsequent to being chased by a pit bull for about a half mile. In seeking treatment, Karen solicits the help of a behavioral therapist. Most likely, the therapist's approach will involve identifying Karen's maladaptive beliefs and thought patterns about dogs helping Karen to become conscious of her emconscious, unresolved conflicts regarding dogs a technique such as graduated exposure or flooding. helping Karen to achieve congruence between her real and ideal self-concepts. What is a concern of the survey method of research?1.the target population will not be able to be identified2.the number of people in the survey may be too large3.the researcher is dependent on the person answering the survey to be honest4.all answers are correct People with paranoid personality disorder are ______ to seek treatment for themselves and are more often ______. Make a line plot of the measurements in the table. Then find the fair share.Table:Amount of Sports drink (gallons)1 over 41 over 21 over 31 over 21 over 41 over 31 over 31 over 2 why would it matter to germany if the us had forgotten about the lusitania I need help plz help me with a science question, what did the fossils found in Antarctica reveal about past climate?