Select the correct answer.
Lily is standing on her lawn and wants to take photographs of her house. Which camera angle should she avoid in her composition?

A. a side facing angle
B. an upwards facing angle
C. a diagonal facing angle
D. a straight facing angle​

Answers

Answer 1

Answer:

D. a straight facing angle​

Answer 2

Answer: D.

Explanation:


Related Questions

Which system board has a 64-bit bus?

Answers

Answer:  https://en.wikipedia.org/wiki/64-bit_computing

64-bit computing - Wikipediaen.wikipedia.org › wiki › 64-bit_computing

In computer architecture, 64-bit integers, memory addresses, or other data units are those that are 64 bits (8 octets) wide. Also, 64-bit central processing unit (CPU) and arithmetic logic unit (ALU) architectures are those that are based on processor registers, address buses, or data buses of that size. ... With no further qualification, a 64-bit computer architecture ...

‎History · ‎64-bit operating system... · ‎64-bit applications · ‎64-bit data models

Explanation:

Consider the two lists A and B. List A is an anagram of list B if the following two conditions are true: 1.list A and list B have the same number of elements 2.each element of list A occurs the same number of times in list A and list BFor example, [3, 2, 4, 1, 2] and [2, 2, 3, 1, 4] are anagram of each other, but [2, 3, 1, 2] and [1, 3, 1, 2] are not. Write a function named isAnagram that takes two lists of integers as parameters: lstA and lstB. The function isAnagram should return the bool value True if lstA is an anagram of lstB and False otherwise. The following is an example of correct output: >>> print(isAnagram([14, 10, 19], [10, 14, 19]))True

Answers

Answer:

cdacaddacdbbbbbacddebb

Explanation:

You have written a program to keep track of the money due to your company. The people in accounting have entered the information from the invoices they have sent out. However, the total from accounting does not agree with a total of a second listing of items that can be billed from the production department.

Using the drop-down menus, complete the sentences about the steps in the debugging process.

As a first step in diagnosing the problem, you will
✔ reproduce the error.
A good place to begin is by examining the
✔ error codes.
Next, you can
✔ troubleshoot
the problem.
This will help you
✔ identify the source of the problem.

Answers

Answer:

1. REPRODUCE THE ERROR

2. ERROR CODES

3. TROUBLESHOOT

4. IDENTIFY THE SOURCE OF THE PROBLEM

Explanation:

Debugging a program simply means a sequence of steps which one takes to correct an imperfect program, that is a program that does not run as intended.

A good way to start debugging is to run the code, by running the code, one will be able to determine if the program has a bug. If it has then it produces an error. This error is a good starting point as the error code gives a headway into where the bug may lie.

The error code gives a hint into the type of error causing a program to malfunction which could be a syntax error, logic, Runtime and so on. In some case probable lines where there error lies are spotted and included in the error code produced.

After evaluating the error code, then we troubleshoot the probable causes of the error. By troubleshooting all the possible causes, the source of the error will eventually be identified.

Answer:

As a first step in diagnosing the problem, you will

✔ reproduce the error.

A good place to begin is by examining the

✔ error codes.

Next, you can

✔ troubleshoot

the problem.

This will help you

✔ identify the source of the problem.

Explanation:

program a macro on excel with the values: c=0 is equivalent to A=0 but if b is different from C , A takes these values

Answers

The followng program is capable or configuring a macro in excel

Sub MacroExample()

   Dim A As Integer

   Dim B As Integer

   Dim C As Integer

   

   ' Set initial values

   C = 0

   A = 0

   

   ' Check if B is different from C

   If B <> C Then

       ' Assign values to A

       A = B

   End If

   

   ' Display the values of A and C in the immediate window

   Debug.Print "A = " & A

   Debug.Print "C = " & C

End Sub

How does this work  ?

In this macro, we declare three integer   variables: A, B, and C. We set the initial value of C to 0 and A to 0.Then, we check if B is different from C using the <> operator.

If B is indeed different from C, we assign the value of B to A. Finally, the values of A and C are displayed   in the immediate window using the Debug.Print statements.

Learn more about Excel:
https://brainly.com/question/24749457
#SPJ1

You are investigating a problem between two wireless bridges and you find that signal strength is lower than expected. Which of the following could cause the problem?

A. Wrong SSID

B. Incorrect 802.11 standard

C. Incorrect encryption key

D. Wrong antenna type

Answers

The most likely problem that led to the signal strength is lower than expected is a D. Wrong antenna type

What is a Computer Network?

This refers to the inter-connectivity between wireless bridges to connect a computer system to the world wide web.

Hence, we can see that based on the fact that there is troubleshooting going on about two wireless bridges where the signal strength is lower than expected, the most likely problem that led to the signal strength is lower than expected is a D. Wrong antenna type

Read more about computer networks here:

https://brainly.com/question/1167985

#SPJ1

The probability of event A occurring is 10/10. The probability of event B occurring is 0/10. What is the entropy of this system? Please show work.

Answers

The events A and B are the outcomes of the probabilities in the system

The entropy of the system is 0

How to determine the entropy?

The probabilities are given as:

P(A) = 10/10

P(B) = 0/10

The entropy is calculated using:

\(H(x) = -\sum \limits^{n}_{i = 1} p_i * \log_2(p_i)\)

So, we have

\(H(x) = -10/10 * \log_2(10/10) - 0/10 * \log_2(0/10)\)

Evaluate the products

\(H(x) = -\log_2(10/10) - 0\)

Evaluate the sum

\(H(x) = -\log_2(10/10)\)

Evaluate the quotient

\(H(x) =- \log_2(1)\)

Express 1 as 2^0

\(H(x) =- \log_2(2^0)\)

Apply the power rule of logarithm

\(H(x) =- 0\log_2(2)\)

Evaluate the product

H(x) =0

Hence, the entropy of the system is 0

Read more about probability at:

https://brainly.com/question/25870256

My iphone11 stuck on Loading Spinning, i found some ios system recovery software like joyoshare ultfix on the Internet that can be repaired, but I have not used this kind of product. I am not sure whether it is easy to use or safe. I hope someone can tell me something about it or other solutions.Thanks.
https://www.joyoshare.com/ultfix/

Answers

Answer:

Press and quickly release the volume up button.

Press and quickly release the volume down button .

Press and hold the side button until the Apple logo and circle disappears (be patient this may take a bit).

Your friend Alicia says to you, “It took me so long to just write my resume. I can’t imagine tailoring it each time I apply for a job. I don’t think I’m going to do that.” How would you respond to Alicia? Explain.

Answers

Since my friend said  “It took me so long to just write my resume. I can’t imagine tailoring it each time I apply for a job. I will respond to Alicia that it is very easy that it does not have to be hard and there are a lot of resume template that are online that can help her to create a task free resume.

What is a resume builder?

A resume builder is seen as a form of online app or kind of software that helps to provides a lot of people with interactive forms as well as templates for creating a resume quickly and very easily.

There is the use of Zety Resume Maker as an example that helps to offers tips as well as suggestions to help you make each resume section fast.

Note that the Resume Builder often helps to formats your documents in an automatic way  every time you make any change.

Learn more about resume template from

https://brainly.com/question/14218463
#SPJ1

Which of the following two commands can be used to add custom log file entries to the journald database? (Choose two.)
A. mklog
B. systemd-cat
C. logger
D. systemd-make
E. logentry

Answers

The two commands can be used to add custom log file entries to the journald database include the following;

B. systemd-cat

C. logger

What is a Linux command?

In Computer technology, a Linux command can be defined as a software program that is designed and developed to run on the command line, in order to enable an administrator (end user) of a Linux computer network perform both basic and advanced tasks by only entering a line of text.

In Database management systems (DBMS), the systemd-cat is a Linux command that is typically used by software engineers or database engineers for connecting the standard output and input of a database process to the journal.

In conclusion, we can logically deduce that both systemd-cat and logger are used for adding a custom log file entry to the journald database.

Read more on command here: https://brainly.com/question/13073309

#SPJ1

Multimedia Presentation: Mastery Test
Select the correct answer.
Helen wants to use actual voice testimonials of happy employees from her company in her presentation. What is the best way for her to use these
testimonials in the presentation?
OA. She can provide a link in her presentation where the audience can listen to the testimonials.
She can ask the employees to write down their thoughts for the presentation.
She can record the testimonials directly in her presentation.
D. She can read out the testimonials from a transcript.
B.
O C.
Reset
>
Next

Answers

The best way for Helen to use actual voice testimonials of happy employees from her company in her presentation is A) She can provide a link in her presentation where the audience can listen to the testimonials.

Using actual voice testimonials adds authenticity and credibility to Helen's presentation.

By providing a link, she allows the audience to directly hear the employees' voices and genuine expressions of satisfaction.

This approach has several advantages:

1)Audio Engagement: Listening to the testimonials in the employees' own voices creates a more engaging experience for the audience.

The tone, emotions, and enthusiasm conveyed through voice can have a powerful impact, making the testimonials more relatable and persuasive.

2)Employee Representation: By including actual voice testimonials, Helen gives her colleagues an opportunity to have their voices heard and to share their positive experiences.

This approach emphasizes the importance of employee perspectives and allows them to become active participants in the presentation.

3)Convenience and Accessibility: Providing a link allows the audience to access the testimonials at their own convenience.

They can listen to the testimonials during or after the presentation, depending on their preferences.

It also allows for easy sharing and revisiting of the testimonials.

4)Time Management: Including voice testimonials via a link enables Helen to efficiently manage the timing of her presentation.

She can allocate the appropriate time for other aspects of her talk while still giving the audience access to the full testimonials, without the need to rush or omit important information.

For more questions on presentation

https://brainly.com/question/24653274

#SPJ8

Rank the order of venders keeping Amazon’s goals in mind

Rank the order of venders keeping Amazons goals in mind

Answers

Rankings are determined for several reasons. The vendors that best satisfy Amazon's objectives are listed in Rank order as follows:

Vendor E - FirstVendor R - SecondVendor  K -Third Vendor F - Fourth

What is the vendor ranking about?

When evaluating vendors, companies typically have a set of parameters or criteria that they use to determine which vendor is the best fit for their needs. These parameters can include things like cost, quantity, shipping time, and cost to the company.

In this scenario, Vendor E is ranking first because it is meeting the majority of the company's parameters. The low cost issues, low quantity, high shipped on time, and low cost to Amazon all indicate that Vendor E is providing a high level of service and is a cost-effective choice for the company.

On the other hand, Vendor K is ranking lower because it is not meeting some of the company's parameters as well as Vendor E. Vendor K has low cost issues, moderate quantity shipped, high quantity shipped and high cost to Amazon, indicating that it may not be as cost-effective or reliable as Vendor E.

In all, Vendor E is ranking first because it is meeting the majority of the company's parameters, indicating that it is a good fit for the company's needs and it is a cost-effective choice.

Learn more about Amazon from

https://brainly.com/question/26188227

#SPJ1

Write a program that calculates the average rainfall for three months. The program should ask the user to enter the name of a data file that that contains rainfall data for three months. The file consists of three lines, each with the name of a month, followed by one or more spaces, followed by the rainfall for that month. The program opens the file, reads its contents and then displays a message like:

Answers

Answer:

Explanation:

The following Python program reads the file called text.txt and loops through each line, removing whitespace and seperating the month and rainfall. Then it prints each Month with its corresponding rainfall amount. Finally it calculates the average rainfall and outputs that.

file = open('text.txt', 'r')

total_rainfall = 0

for line in file:

   line = line.replace('\n', '')

   info = line.split(' ')

   info = [i for i in info if i != '']

   print(info[0] + " will have a total of " + info[1] + " inches of rainfall.")

   total_rainfall += int(info[1])

average = total_rainfall / 3

print("Average Rainfall will be " + str(average) + " inches")

Write a program that calculates the average rainfall for three months. The program should ask the user

a student received a poor grade on her last two language art tests. what are the steps she should take for solving this problem
PLEASE HURRYYYY!

Answers

Answer:

Study and do practice tests

You should include the words "Under Construction" on your site while you are working on it True O False W This is not the answer​

Answers

Answer:

true

Explanation:

so that the idiots dont die if they walk through the site

Upload your completed Lesson 8 Simulation here. 8.Organizing Content in Tables

Answers

Tables are an effective way to organize and present information in a structured and easy-to-read format.

How to explain the table

Here are some tips on how to effectively organize content in tables:

Determine the purpose of the table: Before creating a table, identify the purpose and the message you want to convey. Determine what kind of information you want to include in the table and how it can be best presented.

Use clear and concise headings: Use headings that are brief and clearly describe the content in each column or row. Headings help the reader to quickly identify the content and understand the structure of the table.

Keep the table simple and easy to read: Avoid using too many colors, borders, and font styles. Keep the table clean and simple, with clear lines and easy-to-read fonts.

Use consistent formatting: Ensure that the table formatting is consistent throughout the document. Use the same font size, style, and color for all the tables.

Group similar items together: Organize the table by grouping similar items together. This makes it easier for the reader to compare and analyze the information.

Use appropriate units of measure: Use appropriate units of measure for the data presented in the table. For example, use dollars for financial data, and use percentages for statistical data.

Use appropriate table type: Choose the appropriate table type to present the data. There are various types of tables such as comparison tables, frequency tables, and contingency tables, among others. Choose the type that best suits your data.

Consider accessibility: Ensure that the table is accessible to everyone, including those with visual impairments. Use alt text to describe the content of the table, and ensure that the table is navigable with a screen reader.

By following these tips, you can create effective and easy-to-read tables that convey the message you want to share with your readers.

Learn more about tables on;

https://brainly.com/question/28768000

#SPJ1

Advantages of ASCII over EBDCDIC​

Answers

Efficiency. Moreover, the same character in ASCII requires 7 bits, but EBCDIC required 8 bits. Therefore, ASCII is more efficient than EBCDIC.

What is the result if you add two decimal numbers (45+216), expressed in binary using 8-bit unsigned precision?

Answers

Answer:

261

Explanation:

Adding up two decimal numbers ( 45 + 216 ) expressed in binary using 8-bit unsigned precision

first we express the decimal numbers in 8-bit unsigned precision :

45 = 32 + 8 + 4 + 1 = 2^5 + 2^3 + 2^2 + 2^0 = 00101101

216 = 2^7 + 2^6 + 2^4 + 2^3 = 11011000

Adding the numbers together =  00101101

                                                   + 11011000

                                                 = 100000101 = 261 ( an overflow occurred )

note : The maximum value that can be expressed with 8-bit unsigned precision is  = 2^8 - 1 = 256

Explain what Sguil can do for IT personnel trying to guard their systems. What is the benefit to having Sguil running?
What is the purpose of the rkhunter application? Explain the different options available for what it can scan and how this would be useful to IT personnel.

Answers

Designed "by analyzers, for analysts," Sguil is indeed a cross-platform program that combines alert, session, and includes comprehensive data streams into a single graphical user interface.

What makes sguil so crucial?

Sguil has tools that the analyst can use to verify shady behaviour. It is crucial to confirm any suspicious behavior because this enables the administration to take the necessary precautions to reduce the hazard.

What data is accessible with Sguil?

The core feature of Sguil is an easy-to-use GUI that gives users access to session data, real-time events, and raw packet grabs. Information security monitoring and event-driven analysis are made easier by Sguil.

To know more about sguil visit:

https://brainly.com/question/27856378

#SPJ1

In c++, make the output exactly as shown in the example.

In c++, make the output exactly as shown in the example.

Answers

Answer:

Here's a C++ program that takes a positive integer as input, and outputs a string of 1's and 0's representing the integer in reverse binary:

#include <iostream>

#include <string>

std::string reverse_binary(int x) {

   std::string result = "";

   while (x > 0) {

       result += std::to_string(x % 2);

       x /= 2;

   }

   return result;

}

int main() {

   int x;

   std::cin >> x;

   std::cout << reverse_binary(x) << std::endl;

   return 0;

}

The reverse_binary function takes an integer x as input, and returns a string of 1's and 0's representing x in reverse binary. The function uses a while loop to repeatedly divide x by 2 and append the remainder (either 0 or 1) to the result string. Once x is zero, the function returns the result string.

In the main function, we simply read in an integer from std::cin, call reverse_binary to get the reverse binary representation as a string, and then output the string to std::cout.

For example, if the user inputs 6, the output will be "011".

Hope this helps!

Write a program that prompts a user to enter the number of elements to store in an array. Then prompt the user to enter all the numbers stored in the array.
The program should then cycle through the array to see if any numbers are divisible by 5. If any number is divisible by 5 print out which ones are and identify them in the output.

Answers

Answer:

Here's an example of a program that does what you've described:

# Get the number of elements in the array

n = int(input("Enter the number of elements to store in the array: "))

# Initialize the array

arr = []

# Get the elements of the array from the user

print("Enter the elements of the array:")

for i in range(n):

   arr.append(int(input()))

# Print out which numbers are divisible by 5

print("The following numbers are divisible by 5:")

for i, x in enumerate(arr):

   if x % 5 == 0:

       print(f"{i}: {x}")

This program will first prompt the user to enter the number of elements in the array. It then initializes an empty array and prompts the user to enter each element of the array. Finally, it loops through the array and prints out the index and value of any element that is divisible by 5.

Explanation:

click a data type button or click a data type at the data type drop-down list and the ___ field name is automatically selected.

Answers

Click a data type button or click a data type at the data type drop-down list and the Field Name field name is automatically selected.

When you select a data type button or choose a data type from the data type drop-down list, the system automatically selects the "Field Name" field. This field is where you can enter a name for the data field you're creating. The data type you choose determines what type of data can be entered into the field, such as text, numbers, or dates. By automatically selecting the "Field Name" field, the system makes it easier for you to quickly create a new data field without having to navigate to the field name manually.

The process of choosing a data type and naming the field is an important step in creating a database or a spreadsheet. By selecting a data type, you define the type of information that can be stored in the field, such as text, numbers, dates, or yes/no values. The data type you choose also determines how the information in the field will be formatted and processed by the software.

Learn more about data type here:

https://brainly.com/question/29417603

#SPJ4

what is the first computer?​

Answers

Answer:

The first computer was called the "Atanasoff-Berry Computer" (ABC), which was developed by John Atanasoff and Clifford Berry in the late 1930s and early 1940s. The ABC was an electronic computer that used binary digits (bits) to perform calculations, and it was designed to solve systems of linear equations. While the ABC was not a general-purpose computer, it represented a major milestone in the development of electronic computing and laid the groundwork for later computer designs.

7- Halt Button It stops the Logo from carrying out the last command that was given.​

Answers

The "Halt" button in Logo stops the command that is running. This program can stop a command, but it cannot start it again or pause it for a short time.

Can we use halt button to stop logo from carrying out a command temporarily?

When you press the "Halt" button, the program stops and doesn't start again from where it stopped.

But, if you want to stop a command in Logo for a little while, there are other ways you can try. Logo has tools called "if" and "repeat" that help you to decide when to run a piece of code over and over again. If you add certain rules or numbers to your code, it can stop or skip certain actions depending on certain situations.

Learn more about command  from

https://brainly.com/question/25808182

#SPJ1

Can we use halt button to stop logo from carrying out a command temporarily? give reasons

A corporate or government network that uses Internet tools, such as Web browsers, and
Internet protocols best defines

Answers

Answer: Intranet

Explanation:

The options include:

A. extranet.

B) social network.

C) intranet.

D) e-market.

A corporate or government network that uses Internet tools, such as Web browsers, and Internet protocols is referred to as intranet.

Social networks are social media sites that are used by people which allows them to stay connected with one another.

E-market is a form of marketing whereby goods and services are promoted or advertised through the use of the internet.

Therefore, the answer to he above question is intranet.

What is the difference between internal hardware and software?

Internal hardware is the physical parts of a computer that you see on the outside; software is the physical parts of a computer that you see on the inside.
Internal hardware is the physical parts of a computer that you see inside the computer; software is the physical parts of a computer that you see on the outside.
Internal hardware is the programs and applications that make the computer work; software is the physical parts that help the computer work.
Internal hardware is physical parts that help the computer work; software is the programs and applications that make the computer work.

Answers

Answer:

software are the tangible parts of a computer which you can see and touch and hardware are the intangible parts of a computer like the programs and files

Limiting a field's entry to a certain number of characters is an example of

phishing
code injection
data validation

Answers

Answer:

data validation

Explanation:

Validation type How it works

Length check         Checks the data isn't too short or too long

In java Please

3.28 LAB: Name format
Many documents use a specific format for a person's name. Write a program whose input is:

firstName middleName lastName

and whose output is:

lastName, firstInitial.middleInitial.

Ex: If the input is:

Pat Silly Doe
the output is:

Doe, P.S.
If the input has the form:

firstName lastName

the output is:

lastName, firstInitial.

Ex: If the input is:

Julia Clark
the output is:

Clark, J.

Answers

Answer:

Explanation:

import java.util.Scanner;

public class NameFormat {

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       

       System.out.print("Enter a name: ");

       String firstName = input.next();

       String middleName = input.next();

       String lastName = input.next();

       

       if (middleName.equals("")) {

           System.out.println(lastName + ", " + firstName.charAt(0) + ".");

       } else {

           System.out.println(lastName + ", " + firstName.charAt(0) + "." + middleName.charAt(0) + ".");

       }

   }

}

In this program, we use Scanner to read the input name consisting of the first name, middle name, and last name. Based on the presence or absence of the middle name, we format the output accordingly using if-else statements and string concatenation.

Make sure to save the program with the filename "NameFormat.java" and compile and run it using a Java compiler or IDE.

Imagine you have a friend who is new to computing. He is not necessarily interested in going into programming, but he would like to know the basics in terms of how computers work, how programs are written, and how computers communicate with each other. You are talking to him about the basics, but he keeps confusing operating systems, programming language, computer language, and markup language. How would you use very plain language to explain to him the differences between these things and how they interact with each other?

Answers

An operating system is responsible for the overall function of a computer system and it enables us to program a computer through thes use of a computer language.

What is programming?

Programming can be defined as a process through which software developer and computer programmers write a set of instructions (codes) that instructs a software on how to perform a specific task on a computer system.

What is an operating system?

An operating system can be defined as a system software that is pre-installed on a computing device, so as to manage computer hardware, random access memory (RAM), software, and all user processes.

Basically, an operating system is responsible for the overall function of a computer system and as such without it, a computer cannot be used for programming. Also, a computer language is typically used for programming while a markup language is a type of computer language that is mainly used for designing websites through the use of tags.

Read more on software here: https://brainly.com/question/26324021

I really need help with this question! Please help!

I really need help with this question! Please help!

Answers

Answer:

(C) Emma goes to sleep late and does not set an alarm.

Explanation:

Decomposing a problem is setting a back drop inference as to (WHY?) something happens . So Emma woke up late , the only reasonable (WHY?) in this question would be (C)

Multiple Choice
An administrative assistant types a document, saves, and prints. The assistant is using
O hardware
O hardware and software
O software

Answers

Answer : hardware and software
The assistant is using software to edit and view document , and hardware to print them.
Other Questions
Who spread Buddhism to Korea and Japan? E14.3 (LO 1) (Entries for Bond Transactions) Presented below are two independent situations. 1. On January 1, 2020, Simon Company issued $200,000 of 9%, 10-year bonds at par. Interest is payable quarterly on April 1, July 1, October 1, and January 1. 2. On June 1, 2020, Garfunkel Company issued $100,000 of 12%, 10-year bonds dated January 1 at par plus accrued interest. Interest is payable semiannually on July 1 and January 1. Instructions For each of these two independent situations, prepare journal entries to record the following. a. The issuance of the bonds. b. The payment of interest on July 1. c. The accrual of interest on December 31. (Kieso 14-38) Kieso, Donald E., Jerry Weygandt, Terry Warfield. Intermediate Accounting, 17th Edition. Wiley, 02/2019. VitalBook file. The citation provided is a guideline. Please check each citation for accuracy before use. The electric potential energy of the charges is proportional to: ________ Your best friend's grandparent always seems to have great advice whenever you are struggling in your relationship. This is because wise people are considered, in the Berlin Wisdom Paradigm, to be high in the ____________ of intelligence HELP HELP I NEED HELP ASAP PLEASE!!Find an integer a such that a < 77 < a + 1PLEASE RIGHT AND EXPLANATION TOOPLS PLS NO CAP The net electric flux through each face of a six-sided die (singular of dice) has a magnitude in units of 103 Nm2/C that is exactly equal to the number of spots N on the face (1 through 6). The flux is inward when N is odd and outward when N is even. What is the net charge inside the die according to the old man, the monkey's paw was just a bit of what you might call True or false. Muscle fibers are among the largest cells in the body and are actually fusions of hundreds of individual cells. hich audit data standards ledger identifies data needed for purchase orders, goods received, invoices, payments, and adjustments to accounts? Lee y escoge la mejor respuesta. Read and select the best answer.El Romance de la prdida de Alhama es el ________ o muestra de tristeza inmensa de un rey musulmn por la prdida de Granada. montaje arte encuadre llanto Write an expression that represents the perimeter.Simplify your perimeter expression as much as possible.a.XXab8x + 4y + 42x + y +24x + 2y + 6 2,106.1 miles in scientific notation 2. What is one effect of the North American Free Trade Agreement? The right to use a specific business' name and sell its products or services in a given territory is a(n) agreement. Which one is more important money or Love? C programming You are to write a program which will have the following Functions:.getAreaRectangle.getArea Triangle.getAreaCirclegetPerimeterRectangle.getPerimeter Triangle getPerimeterCircleYou will first need to ask the user if they want to find the Area or the Perimeter.Then you will ask of which shape (Rectangle, Triangle, Circle).Finally, based on the input of the user, you will call the Function, passing all necessary variables to the function. The function willreturn the answer and you will then display the correct answer on the screen.This is going to be a long program!! It will mainly test your ability to use Condition statements and Functions. You can use a switchfor the menu if you want. Hydrochloric acid secretion increases when ___________ binds to its receptor and induces an elevation of intracellular_____________ Do Now: Watch the video and write down who they are in the family. Use the words in the box below. hermana tio abuela hermano papa mamaComplete the sentences using the words in the box above. Morticia es la ______________________________Pericles es el ______________________________Homero es el ______________________________Lucas es el ________________________________La senora Gomez es la ________________________________Read and listen to La Familia Addams story. Then answer the questions on the right. Use the words in bold.La historia de la familia AddamsQuestions Ella es La senora Addams. Ella tiene 2 hijos. Ella es la mama de Lucas y Homero Addams. Lucas y Homero Addams son hermanos.Homero tiene un hijo que se llama Pericles y una hija que se llama Merlina. Lucas tiene 2 sobrinos. Ellos se llaman Merlina y Pericles. Por eso Lucas es el Famoso Tio Lucas. La senora Addams es la abuela de Merlina y Pericles.Ella se llama Debbie. Debbie es la esposa del tio Lucas. Debbie es la tia de Merlina y Pericles. Match Words in English and Spanish. Abuela brotherTio grandmotherSobrino uncleHermano auntTia nephewMama wifeEsposa motherComplete the sentences with the words in bold. La senora Addams es la _____________________ de Merlina y Pericles. Homero es el ________________ de Lucas. Merlina y Pericles son los __________________ del tio Lucas. La senora Addams es la _____________ de Homero y Lucas. Lucas es el ________________ de Merlina y Pericles. La senora Addams es la ______________ de Lucas y Homero. Debbie es la ________________ de Merlina y Pericles. Homero es el _______________ de Merlina y Pericles. Merlina es la _______________ de Homero. Debbie es la ________________ del Tio Lucas. Look at each celebrity picture and select the trait that best describes them.CelebrityWords used to describe himLebron James: 69Alto65 or moreBajo41 or lessKevin Heart: 55Alto65 or moreBajo41 or lessFat JoeGordo250 lbs or moreDelgado100 lbs or lessAngelina JolieGordo250 lbs or moreDelgado100 lbs or lessGollumBonitoAttractiveFeoUnattractiveLegolasBonitoAttractiveFeoUnattractivePapa NoelJoven20 years oldViejo85 years oldJustin BieberJoven20 years oldViejo85 years oldAlegreFeeling joyTristeFeeling sadnessAlegreFeeling joyTristeFeeling sadnessProfessionalFuerteStrength level: highDebil Strength level: lownon professionalFuerteStrength level: highDebil Strength level: lowListen to Debbie describe Tio Lucas and circle the words you hear. Tio LucasWords Debbie used to describe himAltoBajoGordoDelgadoBonitoFeoJovenViejoFuerteDebilListen to Tio Lucas describe Debbie and complete the sentences with the words you hear. Tip: Use the words in the chart above to help you. Remember O turns into an A when it comes to describing women, ex: ALTO (masculine) ALTA (Feminine)Tia DebbieWords Tio Lucas said to describe herDebbie es _________________________...Ella es ________________. Le gusta mucho el chocolate kit kat, m&m's, snickers. Ella es _________________ como mi abuela. Ella es __________________, muy __________________. Yo amo a Debbie.Your Turn: How would you describe your mom? Complete the description below. Use the words in the chart above to help you. MamaUse the words above to complete the sentences. Hola! Mi mama se llama ______________________.Mi mama es __________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ ((HELP ME PLEASE HELP ME PLEASE)) Help me with this pls A country exports goods and services valued at $300 million in a year. During that same year, the country imports goods and serves valued at $400 million. Which conclusion best describes the country's balance of trade?.