Answer: C.
Explanation:
A reliable selection device is one that consistently measures the same thing or produces consistent results over multiple measurements or assessments. When a selection device is reliable, it means that if the same measurement is taken multiple times under similar conditions, it will yield consistent outcomes.
Option c) A reliable selection device indicates that the device measures the same thing consistently.
It produces consistent results over time, regardless of who is administering the test or when it is taken. This is important because it ensures that the results are accurate and can be trusted. While subjective and potent may also describe certain types of selection devices, they do not specifically indicate consistency and reliability in the way that the term "reliable" does.
Validity, on the other hand, refers to whether a selection device actually measures what it is intended to measure, which is related but not exactly the same as reliability. Overall, a reliable selection device is essential for making informed decisions about hiring, promotion, and other important personnel decisions.
To know more about device visit:
https://brainly.com/question/11599959
#SPJ11
Foo = _____myvar; which symbol goes before myvar if it is supposed to refer to the address of myvar?
The symbol that goes before myvar if it is supposed to refer to the address of myvar is & (ampersand). Therefore, the code for this expression will be Foo = &myvar.
In programming, an address refers to the memory location of a variable. The & symbol, called the address-of operator, is used to obtain the memory address of a variable in C and C++ programming languages.
In the given code expression "Foo = &myvar", the ampersand symbol '&' before the variable "myvar" will give us the address of "myvar". The address will then be stored in the variable "Foo". This is useful when we want to pass the memory address of a variable to a function or manipulate the value at that memory address directly.
You can learn more about ampersand symbol '&' at
https://brainly.com/question/29886140
#SPJ11
when evaluating a system, a systems analyst should do ____.
When evaluating a system, a systems analyst should do several things to ensure that the system is functioning properly.
First and foremost, the analyst should thoroughly review all system documentation, including design and development documents, to ensure that the system has been built according to specifications. They should also conduct extensive testing, including functional testing, performance testing, and user acceptance testing, to verify that the system is operating correctly. Additionally, the analyst should evaluate the system's scalability, security, and usability to ensure that it can handle future growth, is secure from external threats, and is user-friendly for the end-users. Finally, the analyst should provide feedback and recommendations to the development team based on their evaluation, including areas for improvement and suggestions for future enhancements. By conducting a comprehensive evaluation, a systems analyst can ensure that the system is effective, efficient, and meets the needs of the end-users.
To know more about system documentation visit:
https://brainly.com/question/31802881
#SPJ11
an independent developer needs help with monitoring service limits to ensure they don't exceed free-tier usage on their account. which services will help them monitor service limits?.
Developers can use the AWS Budgets tool to set custom cost and usage budgets for each service and receive alerts when they approach or exceed those limits.
Which services will help them monitor service limits?An independent developer can use AWS Trusted Advisor to monitor service limits and ensure they don't exceed the free-tier usage on their account. This tool provides a comprehensive list of recommendations for cost optimization, security, and performance, including monitoring service limits. Another option is to use AWS CloudWatch, which allows developers to set alarms and receive notifications when usage approaches the free-tier limits. This can help them proactively manage their account and avoid unexpected charges. Additionally, developers can use the AWS Budgets tool to set custom cost and usage budgets for each service and receive alerts when they approach or exceed those limits.
Learn more about AWS Budgets
brainly.com/question/30155541
#SPJ11
What type of variable stored on an IIS Server exists while a web browser is using the site, but is destroyed after a time of inactivity or the closing of the browser
The IIS server is responsible for hosting websites and serving web pages to users through their web browsers. One type of variable that can be stored on an IIS server is a session variable.
A session variable is a type of variable that is created and stored on the server when a user first accesses a website. This variable is unique to that user's session and can be used to store information that is needed throughout their interaction with the website. Session variables can be used to store things like login credentials, shopping cart contents, or other user-specific data.
However, session variables are typically destroyed after a certain period of inactivity or when the user closes their web browser. This helps to free up server resources and ensure that user data is not being stored indefinitely.
In conclusion, session variables are a type of variable that can be stored on an IIS server while a web browser is using the site, but are destroyed after a time of inactivity or the closing of the browser. These variables are unique to each user's session and can be used to store user-specific data needed throughout their interaction with the website.
To learn more about IIS server, visit:
https://brainly.com/question/15198460
#SPJ11
Which piece of evidence from the article MOST
appeals to the reader's sense of logic?
A
Many of you have seen teachers who read the
slides on the screen word-for-word, which is
dull and repetitive.
B.
In comparison, 38 percent of the impact comes
from what you say and 7 percent from the text
on each slide.
C
Green, for instance, is commonly associated
with the stoplight and the dollar bill, so you can
use the color to signify action or wealth.
D
Kawasaki, for example, thinks that an ideal
PowerPoint presentation should last no longer
than 20 minutes.
Answer:
A - Many of you have seen teachers who read the
slides on the screen word-for-word, which is
dull and repetitive.
what are the constraints of mine shaft head gear
Answer:
Mine headgear constructions support wheel mechanisms for suspending winding cables that transport workers and ore up and down deep level shafts. These strange anthropomorphic structures have become the iconic symbol for mining.
Mine shaft head gear is a stationary equipment used as lift to transport miners underground and back up on earth surface.
Mine shaft head gear are also used to lift the mined ore to the surface.In essence, these lifting equipment have a wheel mechanisms for suspending winding cables which play a role of transporting for both the workers and mined ore.In conclusion, the major constraint is that the Incompetence or fault to the gear could lead to free fail and cause injury or death to the workers.
Learn more about Mine shaft head gear here
brainly.com/question/24553709
5. why does the medium access control protocol require computers to wait a random
The medium access control protocol require computers to wait a random to prevent collision in shared network.
Reason for the randomnessTo ensure network access and prevent collisions in shared network settings like Ethernet, the Medium Access Control (MAC) protocol uses the random back-off mechanism.
When several computing machines or gadgets endeavor to transfer data at once, it can result in collisions that cause network inefficiencies and compromise the integrity of the transmitted information.
To alleviate this problem, the MAC protocol employs a method of contention in which each device checks for network activity before sending any data. If the network is congested, the device needs to pause for a random duration before making another attempt to transmit.
The utilization of the random back-off mechanism efficiently disperses the retransmission attempts among the devices, thus decreasing the probability of collisions and allowing every device an equitable opportunity to access the network medium.
Learn more about MAC protocol at: https://brainly.com/question/32188060
#SPJ4
một số được gọi là thác đổ nếu phần tử biểu diễn thập phân của nó nhiều hơn một chữ số đồng thời theo chiều từ trái qua phải chữ số đứng trước lớn hơn chữ số đứng sau
dữ liệu vào tệp THACDO.INP gồm nhiều dòng,mỗi dòng chứa số nguyên N
kết quả ra tệp THACDO.OUT gồm nhiều dòng thông báo,mỗi dòng ghi "CO" nếu N là thác đổ và ngược lại thông báo "KHONG" nếu N không phải
Using complete sentences post a detailed response to the following.
Why do you think coding languages generally include the ability to create comments? What would those comments be used for? Include both how they can help a single developer and how they would help multiple developers working together on a single project.
Answer:
java or python
Explanation:
all of the fields added to the form are from the customer table. because these controls are connected to a field in the database, they are called _____ controls.
The controls connected to fields in the database and added to the form are called "customer controls."
The term "customer controls" refers to the controls on a form that are directly connected to fields in the customer table of a database. These controls serve as a means of collecting and displaying information from the customer table within the form interface.
By linking these controls to specific fields in the database, any changes made through the form will be reflected in the corresponding customer records. This enables seamless data integration and ensures that the information entered or retrieved through the form is directly associated with the customer data in the database.
Examples of customer controls may include input fields for customer name, address, contact information, or dropdown menus for selecting customer categories or preferences. Overall, customer controls facilitate efficient data management and enhance the user experience by providing a direct connection between the form and the customer table in the database.
Learn more about database here:
https://brainly.com/question/6447559
#SPJ11
A ___ error means the web page you are trying to view isn't available, perhaps because the page has been deleted from the server.
601
404
500
Answer:
A 404
Explanation:
I've seen it many times.
Answer:
404
Explanation:
one way to show multiple, independent alternative paths within an activity diagram is with a
Answer:
Explanation:
wonkni ollok dot
4. Write technical term for the following statements
A) The computers designed to handle specific single tasks.
B) The networked computers dedicated to the users for professional wrok.
C) The computers that uses microprocessor as their CPU.
D) A computer that users analog and digital device.
E) The computer that processes discontinuous data.
F) The portable computer which can be used keeping in laps.
G) The general purpose computers used keeping on desk.
Answer:
a) Special-purpose computer
b)
c)microcomputers
d) hybrid computer
e) digital computer
f) laptop computers
g) desktop computers.
Please mark me as brainlist :)When was the PC modem invented?
Answer:
1977
Explanation:
Answer:
1977
Explanation:
Which of the following is true regarding computer science careers?
A. There are a limited number of jobs in this field.
B. There are not different job types in this field.
C. The number will increase over the next several years.
D. You must be a programmer to work in this field.
(WILL MARK BRANLIEST IF CORRECT)
Answer: There are several different job types in this field.
Explanation: did the test and got it right
Answer:
A or C!
Explanation:
Im pretty sure its one of those answers. I think its C though! If I'm wrong, please tell me! I just did the test and I forgot if I got it right or not. It wont let me go back in-
- A FLVS student with a 99.91 percent in computer science (Totally not bragging!)
An IC temperature sensor with a gain of 10 [mV/°C] is used to measure the temperature of an object up to 100 [°C].The sensor output is sampled by an 8-bit ADC with a 10 [V] reference. Design the signal-conditioning circuit to interface the sensor signal to the ADC, and determine the temperature resolution.
The ADC is 8-bit, it can only represent 256 discrete levels, which corresponds to a step size of 10 [V] / 256 = 0.039 [V] per level.
Therefore, we need to round the required shift to the nearest multiple of the ADC step size, which is 0.039 [V].
To design the signal-conditioning circuit for interfacing the IC temperature sensor to the 8-bit ADC, we need to consider the sensor output range, the ADC reference voltage, and the desired resolution.
Given information:
IC temperature sensor gain: 10 [mV/°C]
Temperature range: up to 100 [°C]
ADC reference voltage: 10 [V]
To interface the sensor signal to the ADC, we need to scale and shift the sensor output voltage to match the ADC input voltage range. Here's the step-by-step process:
Scaling the sensor output voltage:
Since the sensor gain is 10 [mV/°C], the maximum output voltage from the sensor for 100 [°C] will be:
Maximum Sensor Output Voltage = 100 [°C] * 10 [mV/°C] = 1000 [mV] = 1 [V]
Shifting the sensor output voltage:
The ADC reference voltage is 10 [V], and the ADC has 8-bit resolution, which means it can represent 2^8 = 256 discrete levels.
We need to scale the sensor output voltage to fit within the ADC reference voltage range (0 V to 10 V).
By subtracting the minimum sensor output voltage from the maximum sensor output voltage, we can find the required shift:
Required Shift = ADC Reference Voltage / Number of ADC Levels = 10 [V] / 256 = 0.039 [V]
However, since the ADC is 8-bit, it can only represent 256 discrete levels, which corresponds to a step size of 10 [V] / 256 = 0.039 [V] per level.
Therefore, we need to round the required shift to the nearest multiple of the ADC step size, which is 0.039 [V].
Final signal-conditioning circuit design:
To interface the sensor signal to the ADC, we can use an operational amplifier (op-amp) in a non-inverting amplifier configuration. The op-amp can amplify and shift the sensor output voltage to match the ADC input voltage range.
Let's assume we use an op-amp with a gain of 10. We can calculate the feedback resistor value (Rf) using the following formula:
Gain = 1 + (Rf / R1)
Since we want a gain of 10, we can choose R1 = 1 kΩ and solve for Rf:
10 = 1 + (Rf / 1000)
Rf = 9 kΩ
The op-amp circuit would look like this:
lua
Copy code
+-----------+
Sensor Output --| Inverting |---- ADC Input
| Amplifier |
+-----------+
|
R1 = 1 kΩ |
|
---
|
---
|
GND
Temperature resolution:
The ADC has 8-bit resolution, which means it can represent 256 discrete levels. Each level corresponds to a voltage step of 0.039 [V] (as calculated earlier).
The temperature resolution can be determined by dividing the temperature range by the number of ADC levels:
Temperature Resolution = Temperature Range / Number of ADC Levels = 100 [°C] / 256 = 0.391 [°C]
Therefore, the temperature resolution achieved with this setup is approximately 0.391 [°C] per step.
Please note that this is a simplified design and additional considerations, such as noise, linearity, and power supply requirements, should be taken into account in a practical implementation. It is always recommended to consult datasheets and application notes for the specific components used in the circuit and to simulate the circuit using software tools to verify its performance.
learn more about bit here
https://brainly.com/question/30273662
#SPJ11
write a program to print the smallest number among three numbers
Answer:
min(a_list)
sort(a_list); a_list[0]
if this is cheating use conditionals, PYTHON
What TCP port is utilized by an SSH server listening for connections?a. 20b. 21c. 22d. 23
The TCP port utilized by an SSH (Secure Shell) server listening for connections is port 22. So option c is the correct answer.
SSH is a network protocol used for secure remote access to systems. By default, SSH servers listen for incoming connections on port 22. This port is specifically assigned to SSH communication and serves as the standard port for establishing secure shell connections.
Using port 22 allows clients to connect to the SSH server securely and initiate encrypted communication for activities such as remote shell access, file transfers, and tunneling.
It is important to ensure that port 22 is properly configured and accessible to establish SSH connections successfully. So the correct answer is option c. 22.
To learn more about SSH(Secure Shell): https://brainly.com/question/32322768
#SPJ11
Technician A states that in a brake-by-wire system, the computer detects a
panic stop if the driver quickly releases the accelerator. Technician B states
that brake-by-wire systems are not efficient in detecting panic stops. Who is
correct?
O a. Technician A
O b. Technician B
O c. Both Technician A and Technician B
O d. Neither Technician A nor Technician B
The brake-by-wire system can detect panic stops if the driver abruptly releases the accelerator, so Technician A is only partly accurate. Technician B is mistaken because panic stops can be accurately detected by brake-by-wire devices.
How well do brake-by-wire devices work at spotting panic stops?That period of time and distance can be cut down in a brake-by-wire device. The driver's abrupt release of the accelerator can be detected by the computer, which could be a sign of a panic halt.
What does an anti-lock braking device (MCQ) do?In order to keep tractive contact with the road surface and give the driver more control over the car, ABS works by preventing the wheels from locking up when braking.
To know more about panic stops visit:
https://brainly.com/question/28779956
#SPJ9
Jenny is working on a laptop computer and has noticed that the computer is not running very fast. She looks and realizes that the laptop supports 8 GB of RAM and that the computer is only running 4 GB of RAM. Jenny would like to add 4 more GB of RAM. She opens the computer and finds that there is an open slot for RAM. She checks the other module and determines that the module has 204 pins. What module should Jenny order? a. SO-DIMM DDR b. SO-DIMM DDR 2 c. SO-DIMM DDR 3 d. SO-DIMM DDR 4
A friend has asked you to help him find out if his computer is capable of overclocking. How can you direct him? Select all that apply.
a. Show him how to find System Summary data in the System Information utility in Windows and then do online research.
b. Show him how to access BIOS/UEFI setup and browse through the screens.
c. Explain to your friend that overclocking is not a recommended best practice.
d. Show him how to open the computer case, read the brand and model of his motherboard, and then do online research.
Answer:
1. She Should Order C. SO-DIMM DDR 3
2. a. Show him how to find System Summary data in the System Information utility in Windows and then do online research.
Explanation:
Jenny should order a SO-DIMM DDR3 module.
To determine overclocking capability, access BIOS/UEFI setup and research or check system information.
What is the explantion of the above?For Jenny's situation -
Jenny should order a SO-DIMM DDR3 module since she mentioned that the laptop supports 8 GB of RAM and the computer is currently running 4 GB of RAM. DDR3 is the most likely type that would be compatible with a laptop supporting 8 GB of RAM.
For the friend's situation -
To help the friend determine if his computer is capable of overclocking, the following options can be suggested -
a. Show him how to find System Summary data in the System Information utility in Windows and then do online research.
b. Show him how to access BIOS/UEFI setup and browse through the screens.
c. Explain to your friend that overclocking is not a recommended best practice.
Option d is not necessary for determining overclocking capability, as the brand and model of the motherboard alone may not provide sufficient information.
Learn more about BIOS at:
https://brainly.com/question/1604274
#SPJ6
if a web page visitor clears the analytics cookie from their browser, what will occur?
Answer:
If a web page visitor clears the Analytics cookie from their browser, Analytics will not be able to associate user behavior data with past data collected. ... It will set a new browser cookie the next time a browser loads a tracked page.
A file that data is written to is known as a(n)a. input file.b. output file.c. sequential access file.d. binary file.
A file that data is written to is known as a B. output file.
An output file is a computer file that is created or generated by a program or process, and it contains the output or results of that program or process. This file is created to store information that is generated during a program's execution. Output files can be created in different formats such as text, binary, or other specific formats depending on the requirements of the program.
Output files are different from input files, which are used to provide data or information to a program. Output files are written to by the program, while input files are read from by the program. Output files are also different from sequential access files and binary files. Sequential access files are files where data is written or read in a sequential manner, while binary files are files where data is written or read in a binary format.
In summary, an output file is a file that is created by a program to store the results of its execution. It is used to record data that is generated by the program and is written in order to store that data for future use. Therefore, option B is Correct.
Know more about Output file here :
https://brainly.com/question/30760659
#SPJ11
PLS HURRY!!
Look at the image below
Answer:
1. A function can use variables as parameters.
2. A function can have more than one parameter.
3. The definition of a function must come before where the function is used.
Explanation:
The definition of a function can come before or after it is used - I am pretty sure it cannot be placed after the function is being used. It should always come before it is used, so this statement is false.
A function can use variables as parameters - this is true, variables are just labels to hold data.
A function can have more than one parameter - this is true.
A function must have a return value - functions do not always have to return values. It could simply print, so this statement is false.
The definition of a function must come before where the function is used - As said earlier, the definition of functions must come before it is used/called. This statement is true.
Hope this helps :)
What is the default file system used by Windows 7?A. FAT32B. CDFSC. NTFSD. FAT
The default file system used by Windows 7 is NTFS (New Technology File System).
Option C. NTFS is correct.
The default file system used by Windows 7 is NTFS (New Technology File System).
NTFS was introduced by Microsoft in 1993 as an improvement over the older FAT (File Allocation Table) file system. NTFS is a more advanced and robust file system that supports larger files and provides better security and data reliability.
NTFS offers several advantages over FAT, such as support for larger file sizes, improved performance, better security, and more efficient use of disk space.
With NTFS, you can store files larger than 4GB, which is the maximum file size supported by FAT32. This is especially useful for users who work with large media files, such as videos, images, and audio files.
Another advantage of NTFS is its support for advanced security features such as file and folder permissions, encryption, and auditing.
This allows users to set permissions on individual files and folders, control who can access them, and track changes made to them.
NTFS also supports journaling, which means that file system changes are logged to a journal file before they are written to disk.
This helps prevent data loss in case of a power failure or system crash.
In summary, NTFS is the default file system used by Windows 7, and it offers several advantages over the older FAT file system.
NTFS provides better performance, larger file size support, enhanced security, and more efficient use of disk space, making it the preferred choice for modern Windows operating systems.
For similar question on Windows 7.
https://brainly.com/question/30438692
#SPJ11
What tag works as a dictionary between text & computer bytes?
Answer:
Here is some python code
Explanation
HCA must install a new $1.4 million computer to track patient records in its multiple service areas. It plans to use the computer for only three years, at which time a brand new system will be acquired that will handle both billing and patient records. The company can obtain a 10 percent bank loan to buy the computer or it can lease the computer for three years. Assume that the following facts apply to the decision:
- The computer falls into the three-year class for tax depreciation, so the MACRS allowances are 0.33,0.45,0.15, and 0.07 in Years 1 through 4.
- The company's marginal tax rate is 34 percent.
- Tentative lease terms call for payments of $475,000 at the end of each year.
- The best estimate for the value of the computer after three years of wear and tear is $300,000.
What is the NAL of the lease? Format is $xx,x×x.x×x or ($x×,x×x,x×x)
What is the IRR of the lease? Format is x.xx% or (x.xx)%
Should the organization buy or lease the equipment? Format is Buy or Lease
The HCA must install a new $1.4 million computer to track patient records in its multiple service areas. It plans to use the computer for only three years, at which time a brand new system will be acquired that will handle both billing and patient records.
It can obtain a 10% bank loan to buy the computer or it can lease the computer for three years.The initial outlay in case of leasing the computer would be the present value of the payment stream; the final payment is paid at the end of Year 3, so it is discounted three years. Since the lease payment comes at the end of the year, an annuity due factor will be applied.
Using Excel to calculate the present value of lease payment at 10% rate, we get the present value of lease payments to be $1,129,192.98.Using MACRS allowances and marginal tax rate, we can calculate the tax savings associated with buying the computer instead of leasing. With the purchase of the computer,
the MACRS tax savings in Years 1-3 will be $477,320. Using the after-tax salvage value, the company’s net outlay is $782,802.Using these values, we can calculate the Net Advantage to Leasing (NAL)
We see that the NAL is -$277,171.88, indicating that it would be cheaper to purchase the computer instead of leasing it.IRRIRR = 14.12%.
To know more about computer visit:
https://brainly.com/question/32297640
#SPJ11
When is the possibility of solar weather affecting terrestrial weather the highest?(1 point)
during solar minimum
during solar minimum
during the solar cycle
during the solar cycle
during solar maximum
during solar maximum
during Total Solar Irradiance
during Total Solar Irradiance
The possibility of solar weather affecting terrestrial weather the highest is option c: during solar maximum.
Does solar weather have an effect on terrestrial weather?There are different forms of weather on Earth, this is one that ranges from the surface of the planet out unto the outer space.
Note that Space weather as well as terrestrial weather are known to be influenced by the little alterations that the Sun undergoes during its solar cycle.
Hence, The possibility of solar weather affecting terrestrial weather the highest is option c: during solar maximum.
Learn more about solar weather from
https://brainly.com/question/15279276
#SPJ1
1. 8 LAB - Create index and explain (Sakila)
Refer to the table of the Sakila database. This lab loads with 100 rows from Sakila. Consequently, generates too many characters to display in the zyLab environment. However, statements with less output, such as , execute successfully. FilmfilmSELECT * FROM film;SELECT title FROM film;
This lab illustrates the use of indexes and EXPLAIN to optimize query performance. Refer to EXPLAIN documentation for information about EXPLAIN result columns.
Write and run seven SQL statements:
Explain the query. SELECT * FROM film WHERE title = 'ALONE TRIP';
In the EXPLAIN result, column key is null, indicating no index is available for the query. Column rows is 100, indicating all rows are read. The query executes a table scan and is slow.
Create an index on the column. Idx_titletitle
Explain the query of step 1 again.
In the EXPLAIN result, column key has value idx_title, indicating the query uses the index on title. Column rows is 1, indicating only one table row is read. The query is fast.
Explain the query. SELECT * FROM film WHERE title > 'ALONE TRIP';
In the EXPLAIN result, column key is null, indicating the query does not use the idx_title index. Column rows is 100, indicating all rows are read. Since the query has > in the WHERE clause rather than =, the query executes a table scan and is slow.
Explain the query SELECT rating, count(*) FROM film GROUP BY rating;
In the EXPLAIN result, column key is null, indicating no index is available for the query. Column rows is 100, indicating all rows are read. The query executes a table scan and is slow.
Create an index on the column. Idx_ratingrating
Explain the query of step 5 again.
In the EXPLAIN result, column key has value idx_rating, indicating the query reads rating values from the index. The query uses an index scan, which is faster than a table scan (step 5).
For submit-mode testing, all seven statements must appear in Main. Sql in the correct order.
NOTE: In submit-mode tests that generate multiple result tables, the results are merged. Although the tests run correctly, the results appear in one table
Below is the given SQL statements a person can use: For one to Explain the query: the sql will be:
SELECT * FROM film WHERE title = 'ALONE TRIP';
What is the index about?For one to make an index on the area of the title column, the sql will be
CREATE INDEX Idx_title ON film (title);
For one to be able to explain the query that is in the step 1, one need to use the sql of
EXPLAIN SELECT * FROM film WHERE title = 'ALONE TRIP';
In regards to the submit-mode testing, note that all seven statements needs to show in the Main.sql and also in the correct order. That is in submit-mode tests that brings about the multiple result tables, the results are said to be merged into a single table.
Learn more about index from
https://brainly.com/question/4692093
#SPJ4
Imagine that a time machine has transported you back to an earlier civilization or historical era. Poking through your backpack, you discover some rope, a pocket knife, a roll of duct tape, and three modern technological devices. Where are you? What is the time period? What tech devices are in your backpack? Write a diary or journal entry about how you survive for 24 hours with the help of the items you have on hand. Describe in detail and write a story about what you did those 24 hours.
Answer:
Day 1:Today I time traveled. it was pretty crazy, hope nothing goes bad.
1 hour in: Went asking around to see who is the king around here is. Everyone seems to look at me weird, I don't know why.
2nd hour: while asking around this dude came up to me and asked for silver. I said I didn't have any so then he walked away. He was an older man with a scrawny figure. Most people I see are a little bigger.
3rd hour: I finally found out who the king was
but I cant remember his name right now so I'll pit it in a different entry.
here u can start out with this if u want me to finish it just ask.
I need some help with this project. The picture of the assignment is above
Answer:
sorry
Explanation:
you need to do this on your own Wahhabi
but if you sub to my you-tube channel at chris got ha,x i will help you out