add 896 (base 10) & 357 (base 10) using BCD approach

Answers

Answer 1

The sum of 896 (base 10) and 357 (base 10) using the BCD approach is 1253 (base 10).

Binary-coded decimal (BCD) is a method of representing decimal numbers using a four-bit binary code for each decimal digit. In the BCD approach, we add the corresponding BCD digits from right to left, just like in normal addition. If the sum of a BCD digit pair is greater than 9 (which is the maximum value for a BCD digit), we carry over to the next higher BCD digit.

Adding the ones (least significant) digit

The BCD representation of 6 is 0110, and the BCD representation of 7 is 0111. Adding these BCD digits gives us 1101, which is the BCD representation of 13. Since 13 is greater than 9, we carry over the 1 to the next higher BCD digit.

Adding the tens digit

The BCD representation of 9 is 1001, and the BCD representation of 5 is 0101. Adding these BCD digits, along with the carry-over from the previous step, gives us 1111, which is the BCD representation of 15. Again, since 15 is greater than 9, we carry over the 1 to the next higher BCD digit.

Adding the hundreds (most significant) digit

The BCD representation of 8 is 1000, and the BCD representation of 3 is 0011. Adding these BCD digits, along with the carry-over from the previous step, gives us 1011, which is the BCD representation of 11. Since 11 is not greater than 9, there is no carry-over in this step.

Combining the BCD digits from the three steps, we get 1101 for the ones digit, 1111 for the tens digit, and 1011 for the hundreds digit. Converting these BCD digits back to decimal form gives us 1253, which is the final result.

Learn more about sum

brainly.com/question/31538098

#SPJ11


Related Questions

You are working as a project manager. One of the web developers regularly creates dynamic pages with a half dozen parameters. Another developer regularly complains that this will harm the project’s search rankings. How would you handle this dispute?

Answers

From the planning stage up to the deployment of such initiatives live online, web project managers oversee their creation.They oversee teams that build websites, work with stakeholders to determine the scope of web-based projects, and produce project status report.

What techniques are used to raise search rankings?

If you follow these suggestions, your website will become more search engine optimized and will rank better in search engine results (SEO).Publish Knowledgeable, Useful Content.Update Your Content Frequently.facts about facts.possess a link-worthy website.Use alt tags.Workplace Conflict Resolution Techniques.Talk about it with the other person.Pay more attention to events and behavior than to individuals.Take note of everything.Determine the points of agreement and disagreement.Prioritize the problem areas first.Make a plan to resolve each issue.Put your plan into action and profit from your victory.Project managers are in charge of overseeing the planning, execution, monitoring, control, and closure of projects.They are accountable for the project's overall scope, team and resources, budget, and success or failure at the end of the process.Due to the agility of the Agile methodology, projects are broken into cycles or sprints.This enables development leads to design challenging launches by dividing various project life cycle stages while taking on a significant quantity of additional labor.We can use CSS to change the page's background color each time a user clicks a button.Using JavaScript, we can ask the user for their name, and the website will then dynamically display it.A dynamic list page: This page functions as a menu from which users can access the product pages and presents a list of all your products.It appears as "Collection Name" in your website's Pages section.

        To learn more about search rankings. refer

        https://brainly.com/question/14024902  

         #SPJ1

The ________ networks operate close to the legitimate free hotspots and typically provide stronger signals

Answers

Answer:

Rogue Hotspot

Explanation:

Where is a Pivot Table inserted?
a. Next to the last column of data in your worksheet
b. Below the last row of data in your worksheet
c. It depends on whether you select to insert the Pivot Table in the current worksheet or a new worksheet
d. Above the first row of data in your worksheet

Answers

The Create PivotTable dialog box will prompt you to create a Pivot Table on an Existing Worksheet if you insert one on a data-filled worksheet. One of the options in the Create PivotTable dialog box is this one.

Utilized in spreadsheet applications like Excel, OpenOffice.org Calc, and Ggle Sheets is a data summarization tool called a pivot table. Sorting, counting, and totaling data in a table are its primary uses. In order to create a report, you can summarize the data in a variety of ways using a pivot table.

The dialog box for "Create PivotTable":

In Excel, a new pivot table can be created using the dialog box labeled "Create PivotTable."

Learn more about PivotTable at

brainly.com/question/18410166

#SPJ4

Unique ID's do not
change in the
database if a
record is deleted.

False Or True

Answers

It depends on the specific database and how it handles record deletion. In some databases.

The roles of the unique ID

When a record is deleted, its unique ID may be reused for a new record that is added later. This is known as ID recycling.

However, other databases may maintain the unique ID even after the record has been deleted, so that it is never reused. This is known as ID preservation.

Therefore, the statement "Unique IDs do not change in the database if a record is deleted" is false or true depending on the specific database and its implementation.

Read more about unique ID at: https://brainly.com/question/12001524

#SPJ1

Implement a C# WinForms application that tracks student names, university id, major, phone numbers, and e-mail addresses. The application should support the following features: 1. Allows the user to add new student (i.e., first name, last name, id, major, phone, e-mail address). 2. Allows the user to remove existing student. 3. The application should maintain all student entries in a flat file on the hard-disk. 4. The application should retrieve all student entries from a flat file after application restarts. 5. The application should retrieve and display all student details based on the "lastname, first name". You may use Serialization to read/write the flat file to/from the hard-disk.

Answers

This is a simple C# Windows Form Application that uses a flat file to store the student information.

It can add, delete, and retrieve student information from the flat file and can retrieve and display all the student information based on the "last name, first name. "When the program starts, it loads the student list from the flat file. When the application is closed, it saves the student list to the flat file.

To retrieve and save data from the flat file, we'll use serialization, which is a technique for converting objects into a stream of bytes, which can then be stored on the disk. The stream of bytes can then be deserialized back into an object to retrieve the original data.

To know more about  Windows  visit:-

https://brainly.com/question/33349385

#SPJ11

What happened to the badge system Brainly introduced the other day?

i went in my profile to see if there was more badges to earn (by this time i had earned the first three that were availible) and the tab for badges was gone, anyone know whats up?

Answers

Answer:

I don't know what happened to that system. I logged on today and saw it had disappeared too. I guess the badge system wasn't effective since many people earned them very quickly.

Explanation:

Can you please answer this question

The first person to answer this question will receive 100 points and I will mark your answer as the brainliest​

Can you please answer this question The first person to answer this question will receive 100 points

Answers

Answer:

B Careful site planning

Explanation:

Answer:

B careful site setting

Explanation:

Which three of the following will be printed?

c = 7

while (c > 0):
print(c)
c = c - 3
Group of answer choices

0

1

3

4

5

6

7

Answers

In the above code snippet, The following numbers will be printed:

7

4

1

What is the explanation for the above?

The initial value of c is 7, which is greater than 0, so the loop starts. The print(c) statement inside the loop prints the current value of c, which is initially 7. Then, the statement c = c - 3 subtracts 3 from the current value of c, so c becomes 4.

On the second iteration of the loop, the condition c > 0 is still true, so the loop continues. The print(c) statement inside the loop prints the current value of c, which is now 4. Then, the statement c = c - 3 subtracts 3 from the current value of c, so c becomes 1.

On the third iteration of the loop, the condition c > 0 is still true, so the loop continues. The print(c) statement inside the loop prints the current value of c, which is now 1. Then, the statement c = c - 3 subtracts 3 from the current value of c, so c becomes -2.

On the fourth iteration of the loop, the condition c > 0 is false, because c is now -2, so the loop ends. Therefore, only 7, 4, and 1 will be printed.

Learn more about code at:

https://brainly.com/question/30772469

#SPJ1

Sally has a machine that runs Windows 10. She needs to download updates for her Windows 10 system using WSUS (Windows Server Updates Services). She wants the cookie use by WSUS to expire instantly and update the computers group membership. Which of the following command-line tools will she use to accomplish this?

Answers

To accomplish the task of updating computers group membership and make the cookie use by WSUS expire instantly, Sally can use the `wuauclt` command-line tool.

WSUS (Windows Server Update Services) is a free Microsoft update management tool that helps administrators manage patches and updates for Windows Server operating systems and other Microsoft software. WSUS provides enterprises with the latest Microsoft updates to their software via a server running WSUS services. WSUS allows organizations to target software updates and hotfixes to specific machines or groups of machines on the network.

Command-line tools are a set of utilities that allows the users to perform various tasks using commands in the command-line environment instead of through a graphical user interface (GUI). These tools can be used to perform complex tasks that are otherwise difficult or time-consuming to complete using the GUI. Examples of command-line tools include the Command Prompt, PowerShell, and Windows Management Instrumentation (WMI).

Wuauclt is a command-line tool that is used to interact with the Windows Update Agent (WUA) in Windows operating systems. It is used to check for updates, install updates, and configure the WUA settings. Sally can use the `wuauclt` command-line tool to update the computer's group membership and make the cookie use by WSUS expire instantly. In other words, she can use this tool to trigger the detection of available updates by WSUS servers and to retrieve the updates and install them. Hence, the correct answer is: `wuauclt`.

"

Complete question

Sally has a machine that runs Windows 10. She needs to download updates for her Windows 10 system using WSUS (Windows Server Updates Services). She wants the cookie use by WSUS to expire instantly and update the computers group membership. Which of the following command-line tools will she use to accomplish this?

A: Wuauclt

B: SCCM

C: SCOM

"

You can learn more about WSUS (Windows Server Update Services) at

https://brainly.com/question/15078674

#SPJ11

differenticate between half and full deplex modes of transmission in three points

Answers

Answer:

In simplex mode, the signal is sent in one direction. In half duplex mode, the signal is sent in both directions, but one at a time.  In full duplex mode, the signal is sent in both directions at the same time.In simplex mode, only one device can transmit the signal. In half duplex mode, both devices can transmit the signal, but one at a time.  In full duplex mode, both devices can transmit the signal at the same time.Full duplex performs better than half duplex, and half duplex in turn performs better than simplex.

Hope it helps!

ILL GIVE BRAINLIEST HELLP.
in windows 8, the _____ manager is the app that allows you to manage your hardware drivers on your computer .
a. device
b. drivers
c.system
d.utilities

Answers

Answer:

Device Manager

Explanation:

The Device Manager is used to check for hardware that have been installed on your system such as RAM, CPU, GPU etc. However, it has the option to update drivers for any hardware that you such desire.

how do i scan or check for computer virus?​

Answers

Answer:

what type of computer

Explanation:

how to solve Pascal triangle and execute its algorithm​

Answers

Answer:

Each cell of the pascal triangle can be calculated using the combinations formula:

\({n \choose k} = \frac{n!}{k!(n-k)!}\)

See picture to see the values of n and k.

how to solve Pascal triangle and execute its algorithm

in exercise 16.2, which tool was used to enable universal group membership caching?

Answers

In Exercise 16.2, the tool used to enable universal group membership caching was "Active Directory Sites and Services".

This tool is used to manage the replication of directory data among domain controllers in an Active Directory forest. To enable universal group membership caching, you would navigate to the properties of a site in Active Directory Sites and Services, and then select the "NTDS Site Settings" tab. From there, you can check the box to enable universal group membership caching, which allows domain controllers to cache universal group membership information to speed up authentication and reduce the number of queries made to global catalog servers.

Learn more about Active Directory Sites here:

https://brainly.com/question/31766282

#SPJ11

A professional photographer working for a top newspaper would like control over the quality and editing
process of digital photos. Which file format should be used on the digital camera to ensure the
photographer has this flexibility?
A. AI
B. JPEG
C. RAW
D. SVG

Answers

Answer:

RAW

Explanation:

raw usually gives you the best quality possible and its easy to go through the editing process with flexibility compared to the other options.

Answer: raw

Explanation: got a 100%

why does elephant has thicker legs? Explain in terms of breaking stress?​

Answers

Answer:

Since volume is proportional to area, volume is inversely proportional to pressure.

An elephant has a greater weight towards Earth's surface, so it has a larger legs of larger volume which exerts less pressure on Earth's surface in order to prevent it from immersing in soil, or soft land

Please help This is a homework in ICT class

Please help This is a homework in ICT class

Answers

When was the Ethics Resource Center (ERC) established? In the 1970s In the 1980s In the 1990s In the 2000s

help i need the answer asap!!!!!!1

Answers

Answer:

1922

Explanation:

i looked it up When was the Ethics Resource Center (ERC) established?

all major operating systems offer ________ utilities to save a copy of your device’s data. group of answer choices search diagnostic backup storage management

Answers

All major operating systems offer backup utilities to save a copy of your device’s data. The backup utility creates a copy of the data on your computer's hard drive and saves it to another storage location, such as an external hard drive or cloud storage.

In this way, you can easily restore your data in the event of a hardware failure, malware infection, or other unexpected event. A backup is a process of creating a copy of data to protect it from data loss or corruption. Data backup is critical because it protects valuable information in case of unexpected data loss. Data loss can happen due to different reasons such as hardware failure, malware infection, or accidental deletion. In addition, backup utilities are essential tools that allow you to protect your data, recover lost data, and restore your computer to a working state.The backup utility is built into all major operating systems, such as Microsoft Windows, macOS, and Linux. It can be accessed through the operating system's built-in backup software.

These backup tools offer various options and settings that allow you to customize the backup process according to your preferences.In Windows, the backup utility is called File History. It is designed to back up files and folders on your computer to an external hard drive or network location. The File History backup tool is easy to use and offers an automatic backup option that allows you to schedule regular backups of your data.In macOS, the backup utility is called Time Machine. It is designed to back up your entire Mac, including system files, apps, music, photos, and documents. Time Machine creates hourly backups for the past 24 hours, daily backups for the past month, and weekly backups for all previous months.

To know more about operating systems visit:

https://brainly.com/question/6689423

#SPJ11

Is it possible to make a connection from one publication to another?

Answers

Yes, it is possible to make a connection from one publication to another and this connection is called References.

What you should know about References

References are a list of sources that have been cited or referred to in a publication.

Usually, references are found at the end of a book, research paper, or other types of academic or scientific writing, and they provide readers with the necessary information to locate the sources cited in the text.

Some features of References are:

The author's name, The title of the work, The name of the publisherThe date of publication

References are important in academic and scientific writing because it is the act of giving credit to the original authors whose work has been used to support the arguments and ideas presented in the new publication. They also enable readers to verify the accuracy of the information presented and to locate further reading on the topic.

When a publication cites or references another publication, it is acknowledging the source of information or ideas that were used in the creation of the new publication. By so doing, readers can locate and explore related works, and it can also provide support for the arguments and ideas presented in the new publication.

Learn more about publication here:

https://brainly.com/question/30453169

#SPJ1

James entered into a public cloud computing arrangement without reviewing the standard contract carefully. What problem is he most likely to face as a result?
a) Unexpected cloud downtime
b) Insufficient storage capacity
c) Inadequate data security
d) Inflexible pricing structure

Answers

Unexpected cloud downtime  is the most likely to face as a result.

Thus, A disruption in cloud-based services is known as cloud downtime. The migration of more businesses to the cloud means that any disruption in cloud services might be expensive.

According to Gartner, the average cost of cloud downtime is $300,000 per hour. Major cloud service companies appear to routinely report disruptions. These interruptions can endure for a few hours or several days. Three outages affected AWS in a single month in 2021.

An outage of any length can have a negative impact on the bottom line for businesses that are still working to incorporate cloud technology into their business strategy.

Thus, Unexpected cloud downtime  is the most likely to face as a result.

Learn more about Downtime, refer to the link:

https://brainly.com/question/28334501

#SPJ4

Giving brainlist to whoever answer this!! what is a typographic style?

Answers

The Elements of Typographic Style is the authoritative book on typography and style by Canadian typographer, poet and translator Robert Bringhurst. Originally published in 1992 by Hartley & Marks Publishers, it was revised in 1996, 2001 (v2. 4), 2002 (v2. 5), 2004 (v3).

Answer: It's said to be a graphic style that was originated from Russia, The Netherlands, and Germany in the 1920s. Later on it was moderated by some designers in Switzerland during the 1950s. Typography is also known to be the art and technique of arranging type to be comprehensible and distinct. The term typography is also applied to the style, arrangement, and appearance of the letters, numbers, and symbols created by the process. I hope this helps you :3 God bless you and have a great rest of your day- or night wtv

Find:-

ASCII value of Uppercase "A"
ASCII value of lowercase "a"


thanks~​

Answers

The letter "A" has the ASCII value 65, the letter "a" is on 97 (97-65=32), and so on. The ASCII-256 table beginning with the "" at the top follows the same rules.

Who originally did The Letter?

The Box Tops, an American rock group, released the first version of Wayne Carson's song "The Letter" in 1967. It was the band's first and biggest record chart success, peaking at number one in both the US and Canada. Before Cocker took on "The Letter," many musicians had already covered it, including the Mindbenders and the Shadows. Its soulfulness was underlined by R&B performers like Robert Knight, the Tams, Lou Rawls, and Al Green. On her 1969 album Johnny One Time, Brenda Lee herself gave it a shot.

Know more about letter visit:

https://brainly.com/question/17186969

#SPJ1

If you were to design a real robot that would be responsible for cleaning up trash, what 5 (or more) commands would you give it and what would each one do?

Answers

Los 5 comandos de mi robot limpiador serían: Classify, recycle, sweep, washing, and alarm.

A robot is a machine that is characterized by being controlled by a computer and programmed to move, manipulate objects and carry out work while interacting with its environment.

The 5 commands with which I would configure my robot to clean the garbage would be:

Classify: To classify the garbage, deposit the recyclable wastes and those that are not in different bags.Recycle: Take recyclable objects and process them inside to turn them into new objects such as recycled sheets of paper.Sweep: For the robot to sweep a surface and remove all kinds of dirt.Washing: This function would be to clean the dirt from a car, motorcycle, or bicycle with a jet of water under pressure.Alarm: This functions as a reminder of the days and hours in which the garbage truck passes to take the garbage to the right place.

Learn more in: https://brainly.com/question/1935813

Why is it a good practice to use functions in programming? Select the best answer.

A.It is faster to run the code using functions.

B.Functions allow us to reuse common code.

C.All of these are correct.

D.It is easier to debug the code using functions.

Answers

Answer:

C. All of these are correct answer from the options for the question that u have given...

The good practice to use functions in programming is all of these are correct. The correct option is C.

What are functions in programming?

The repetitious codes are removed by breaking a program down into functions, which not only reduces the size of the program but also improves its effectiveness. If there were repetitive codes, we would need to alter the program from several locations rather than just one.

As a result, organizing programs into functions aid in good administration and shortens programs by removing repeated code. A functional programming language is a particular kind of language that allows for the creation and application of pure mathematical functions, along with the use of conditional expressions and recursion to carry out various computations.

Therefore, the correct option is C. All of these are correct.

To learn more about functions in programming, refer to the link:

https://brainly.com/question/24297344

#SPJ6

What is the missing line of code? >>> >>> math.sqrt(16) 4.0 >>> math.ceil(5.20) 6

Answers

Answer:

A math.pow reference

Explanation:

Answer:

from math import ceil

Explanation:

yes

What is normally disabled by default on most Linux servers?
O TUI
O laas
O GUI
O Embedded Linux

Answers

The Option that is normally disabled by default on most Linux servers is GUI.

Is Linux an embedded OS?

Embedded Linux is known to be a kind of Linux operating system as well as a kernel that is set up to be place or installed and known to be used inside embedded devices as well as other appliances.

It is seen as a kind of compact type of Linux that gives features and services in line with the operating system.

Therefore, The one that is normally disabled by default on most Linux servers is GUI.

Learn more about GUI from

https://brainly.com/question/3692609

#SPJ1

Given the following code snippet: let myMath = new AntraMath(10); myMath.add(5); myMath.multiply(2); let res = myMath.done(); console.log(res); Write a constructor function called AntraMath() so that the value of res printed is 30. Does your approach create new add() and multiply() functions for every single object. If so, how can you solve this problem?

Answers

Yes, this approach creates new add() and multiply() functions for every single object. To solve this problem, we can use the prototype property to add methods to the constructor function. This way, all instances of the object will share the same methods instead of creating new ones.

What is constructor function?

A constructor function is a special type of function that is used to create an instance of an object. It is usually named after the object it is creating and typically starts with a capital letter to differentiate it from other functions. Constructor functions are used to create and initialize the properties of an object, allowing the object to be used and manipulated by other functions. Constructor functions are also useful for creating a large number of objects that share the same properties. By using a constructor function, multiple objects can be created quickly and easily.

//Constructor function for AntraMath

function AntraMath(num){

 this.num = num;

 //Instance methods for adding and multiplying

 this.add = function(num2){

   this.num += num2;

 }

 this.multiply = function(num2){

   this.num *= num2;

 }

 //Instance method for returning the current sum

 this.done = function(){

   return this.num;

 }

}

let myMath = new AntraMath(10);

myMath.add(5);

myMath.multiply(2);

let res = myMath.done();

console.log(res);

// Output: 30

//


To learn more about constructor function
https://brainly.com/question/13486785
#SPJ4

Which core function is sent by the agent after the snmp manager queries an agent with a get request or getnext request?

Answers

The core function that is sent by the agent after the SNMP manager queries an agent with a get request or get next request is the SNMP agent's "response".

After an SNMP manager sends a GetRequest or GetNextRequest to an SNMP agent, the SNMP agent responds with the GetResponse message. The GetResponse message contains the requested information or the next set of information, depending on the type of request.

The core function sent by the agent in the GetResponse message is the Response-PDU (Protocol Data Unit), which includes the requested data values. The Response-PDU is a part of the SNMP message format and is used to convey the SNMP agent's response to the manager's request.

Learn more about SNMP here:

brainly.com/question/27961167

#SPJ11

When you have completed your document review in Print Preview, you have the option to save your document as a new file type. What file type can be created using Print?

A. .com
B. .jpeg
C. .exe
D. .pdf

Answers

The file type is D) .pdf
Other Questions
Please select the word from the list that best fits the definitionHelp Grandma with gardeninga.term calendarsb. weekly schedulec. daily organizer A promissory note will pay $50,000 at maturity 13 years from now. If you pay $20,000 for the note now, what rate compounded continuously would you earn? The investment would earn about % compounded continuously. (Round to three decimal places as needed.) species that serve as early warnings of environmental damage are called kiran had a bad cold consequently she won't be able to play in the game tonight. b. kiran had a bad cold, consequently, she won't be able to play in the game tonight. c. kiran had a bad cold; consequently, she won't be able to play in the game tonight. d. kiran had a bad cold consequently, she won't be able to play in the game tonight. an insect-pollinated plant would be likely to have Which of the following is not an air pollutant? 1. carbon dioxide2. carbon monoxide3. particulate matter4. sulfur dioxide why might non-scientist read science journalism Rolled oats is packaged in a right circular cylindrical container that has a radius of 6 centimeters and a height of 12 centimeters.What is the surface area of this container in terms of pi? At its natural resting length, a muscle is close to its optimal length for producing force. As the muscle contracts, the maximum force it can deliver decreases. When a muscle is at approximately 80%% of its natural length, it cannot contract much more and the force it can produce drops drastically. For a muscle stretched beyond its natural length, the same is true. At about 120%% of its natural length, the force that a muscle can exert again drops drastically. This muscle length to force relationship can be demonstrated by doing a chin-up. As you hang from the bar, your biceps muscles are stretched and can produce only a relatively small force. As you get close to the bar, your biceps muscles contract substantially, and you again experience difficulty. The easiest part of the chin-up occurs somewhere in between, when your muscles are close to their natural length.Required:Draw the velocity versus time graphs best representsthe first part of your motion (from being at rest to beingapproximately halfway to the bar) You respond to a 30-month-old patient who has passed out. is the patient's blood pressure important to your treatment? why? What does the y-intercept represent in the context of the problem?the total cost at 8 visitsTotal cost at 12 visitsthe number of visits at $0 total costthe total cost at 0 visitsPLEASE HELP!!!! A binomial experiment with probability of success p=0.84 and n=7 trials is conducted. What is the probability that the experiment results in 6 or more successes?Do not round your intermediate computations, and round your answer to three decimal places. Question in the photo What does Eunice say people are curious about? The famous Oreo cookie has added to its brand. The Oreo company now sells piecrusts, ice cream cones, and cookie dough. Now Oreo can compete more broadly in the industry because of its _______. *WILL MARK BRAINLIEST* 15 POINTSThe scale factor of the two shapes is 0.5 (or 1/2). True or false?A: TRUEB: FALSE If chicken costs $0.10 per ounce and grain costs $0.01 per ounce, how many ounces of each should the company use in each bag of dog food in order to keep cost as low as possible?Set up this linear programming problem. Let x be the number of ounces of chicken and let y be the number of ounces of grain.The objective function isA. Maximize C = 5x + 15yB. Maximize C = 0.1x + 0.01yC. Minimize C = 5x + 15yD. Minimize C = 0.1x + 0.01yE. Minimize C = 5x + 2y Regarding the end of the cold war, what was the most significant event of 1991? the military reversed in afghanistangorbachev took powerthe collapse of the ussrthe fall of the berlin wall madison is using key lighting in the photo shoot that she is currently working on, but she is finding that key is not quite enough to illuminate the shadows. what can madison use to brighten the scene and reveal more details in the shadows?(1 point) GUITAR CLASS, HELP ASAP, WILL GIVE BRAINLIEST, Five horizontal, parallel, equidistant lines with black oval with stem in 3rd space. What is the name of the note shown above? A B C G