Write an application that determines whether the first two files are located in the same folder as the third one. The program should prompt the user to provide 3 filepaths. If the files are in the same folder display All files are in the same folder, otherwise display Files are not in the same folder.

Answers

Answer 1

Answer:

The program in Python is as follows:

fname1 = input("Filepath 1: ").lower()

fname2 = input("Filepath 2: ").lower()

fname3 = input("Filepath 3: ").lower()

f1dir = ""; f2dir = ""; f3dir = ""

fnamesplit = fname1.split("/")

for i in range(len(fnamesplit)-1):

   f1dir+=fnamesplit[i]+"/"

fnamesplit = fname2.split("/")

for i in range(len(fnamesplit)-1):

   f2dir+=fnamesplit[i]+"/"

fnamesplit = fname3.split("/")

for i in range(len(fnamesplit)-1):

   f3dir+=fnamesplit[i]+"/"

if f1dir == f2dir == f3dir:

   print("Files are in the same folder")

else:

   print("Files are in the different folder")

Explanation:

The next three lines get the file path of the three files

fname1 = input("Filepath 1: ").lower()

fname2 = input("Filepath 2: ").lower()

fname3 = input("Filepath 3: ").lower()

This initializes the directory of the three files to an empty string

f1dir = ""; f2dir = ""; f3dir = ""

This splits file name 1 by "/"

fnamesplit = fname1.split("/")

This iteration gets the directory of file 1 (leaving out the file name)

for i in range(len(fnamesplit)-1):

   f1dir+=fnamesplit[i]+"/"

This splits file name 2 by "/"

fnamesplit = fname2.split("/")

This iteration gets the directory of file 2 (leaving out the file name)

for i in range(len(fnamesplit)-1):

   f2dir+=fnamesplit[i]+"/"

This splits file name 3 by "/"

fnamesplit = fname3.split("/")

This iteration gets the directory of file 3 (leaving out the file name)

for i in range(len(fnamesplit)-1):

   f3dir+=fnamesplit[i]+"/"

This checks if the file directories hold the same value

This is executed, if yes

if f1dir == f2dir == f3dir:

   print("Files are in the same folder")

This is executed, if otherwise

else:

   print("Files are in the different folder")


Related Questions

Write a program that uses an "if" statement to determine if the number is greater than one. If the number is greater than 1, the program calculates the square and cube of the number and displays the output to the user.

Answers

Answer:

if(i>1)

{

Console.WriteLine(i*i);

Console.WriteLine(i*i*i);

}

Explanation:

This is written in C#, and it's probably not as clean as it could be. I'm not sure what language you wanted it in, so I just picked the one I'm most familiar with.

HELP ME OUT PLEASE!!!!

Newspapers are forms of digital media.

True False​

Answers

False, they’re not digital

In Coral Code Language - A half-life is the amount of time it takes for a substance or entity to fall to half its original value. Caffeine has a half-life of about 6 hours in humans. Given the caffeine amount (in mg) as input, output the caffeine level after 6, 12, and 18 hours.

Ex: If the input is 100, the output is:

After 6 hours: 50.0 mg
After 12 hours: 25.0 mg
After 18 hours: 12.5 mg
Note: A cup of coffee has about 100 mg. A soda has about 40 mg. An "energy" drink (a misnomer) has between 100 mg and 200 mg.

Answers

To calculate the caffeine level after 6, 12, and 18 hours using the half-life of 6 hours, you can use the formula:

Caffeine level = Initial caffeine amount * (0.5 ^ (time elapsed / half-life))

Here's the Coral Code to calculate the caffeine level:

function calculateCaffeineLevel(initialCaffeineAmount) {

 const halfLife = 6; // Half-life of caffeine in hours

 const levelAfter6Hours = initialCaffeineAmount * Math.pow(0.5, 6 / halfLife);

 const levelAfter12Hours = initialCaffeineAmount * Math.pow(0.5, 12 / halfLife);

 const levelAfter18Hours = initialCaffeineAmount * Math.pow(0.5, 18/ halfLife);

 return {

   'After 6 hours': levelAfter6Hours.toFixed(1),

   'After 12 hours': levelAfter12Hours.toFixed(1),

   'After 18 hours': levelAfter18Hours.toFixed(1)

 };

}

// Example usage:

const initialCaffeineAmount = 100;

const caffeineLevels = calculateCaffeineLevel(initialCaffeineAmount);

console.log('After 6 hours:', caffeineLevels['After 6 hours'], 'mg');

console.log('After 12 hours:', caffeineLevels['After 12 hours'], 'mg');

console.log('After 18 hours:', caffeineLevels['After 18 hours'], 'mg');

When you run this code with an initial caffeine amount of 100 mg, it will output the caffeine levels after 6, 12, and 18 hours:

After 6 hours: 50.0 mg

After 12 hours: 25.0 mg

After 18 hours: 12.5 mg

You can replace the initialCaffeineAmount variable with any other value to calculate the caffeine levels for different initial amounts.

for similar questions on Coral Code Language.

https://brainly.com/question/31161819

#SPJ8

A diagram of a ten-node network that uses ten routers

Answers

The diagram of the of a ten-node network that uses ten routers is given in the image attached.

What is a node in a network?

A network node is known to be be seen as the kind of connection point that is seen amidst some network devices such as routers, printers, etc.

Note that they are known to often receive and send data from one network or endpoint to another.

Therefore, The diagram of the of a ten-node network that uses ten routers is given in the image attached.

Learn more about routers from

https://brainly.com/question/24812743

#SPJ1

A diagram of a ten-node network that uses ten routers
A diagram of a ten-node network that uses ten routers

In this assignment, you will need to design a complete Black-Box testing plan for the following program. A computer science student has to travel from home to ODU every day for class. After showing up to class late too many times due to traffic, the student made a program to tell him when he should leave the house. The time given depends on the class time and the day of the week.

He came up with a few rules to make sure he gets to class on time.
The normal drive time for this student is 30 minutes without traffic. He then gives himself 5 minutes to walk across campus to class from the parking lot.
However, if he leaves home during the worst morning rush hour, from 6 AM - 7 AM on a weekday, he needs to add 20 minutes to his commute to account for traffic. If he leaves home during the regular morning rush hour, from 7 AM - 8 AM on a weekday, he needs to add 10 minutes to his commute to account for traffic.
Mondays have the worst morning traffic, and he should instead add 30 minutes for 6 AM-7AM and 20 minutes for 7 AM – 8 AM.
On Saturdays and Sundays the student needs to take a different route due to road construction. This adds 6 minutes of travel time.
If he leaves during the afternoon rush hour on a weekday, traffic from 4-6PM should add 15 minutes of travel time. Traffic in the afternoon is worst on Thursdays, and should instead add 20 minutes of travel time.
If the class is between 9:30 AM and 11 AM he needs to arrive 10 minutes earlier for walking time because the closest parking lots are all full.
The program will read data from the screen in the following format:

Day_of_the_week hours:minutes AM/PM
e.g.
Tuesday 12:45 AM
Sunday 01:52 PM
If the input is not in the correct format the program will prompt the user again for the input. The program is not case sensitive. The hours and minutes can be a single digit or two digits, but the minutes must be 2 digits.

Answers

Answer: sorry i need points to ask a question hope u understand...

Explanation:

create a function that draws a certain number of spaces, followed by a certain number of stars, followed by a newline.

Answers

Answer:

Explanation:

The following code is written in Python and creates a function called create_sentence which takes in 2 parameters which are the number of spaces and the number of stars. Then it uses these values to create the sentence and return it.

def create_sentence(spaces, stars):

   sentence = ""

   for x in range(spaces):

       sentence += " "

   for x in range(stars):

       sentence += "★"

   sentence += "\n"

   return sentence

Select the correct navigational path to create the function syntax to use the IF function.

Click the Formula tab on the ribbon and look in the
gallery.

Select the range of cells.

Then, begin the formula with the
, click
, and click OK.

Add the arguments into the boxes for Logical Test, Value_if_True, and Value_if_False.

Answers

Answer:

wewewewewewe

Explanation:

wewe\(\neq \neq \neq \neq \neq \neq \neq \\\)

Answer:

1. Logical

2.=

3.IF

Explanation:

JUST TOOK TEST GOOD LUCK!!!

reference of generation of computers?​

Answers

Answer:

First Generation: Vacuum Tubes. Second Generation: Transistors. Third Generation: Integrated Circuits. Fourth Generation: Microprocessors. Fifth Generation: Artificial Intelligence

Which is an example of an effective study skill?

Answers

Answer:

organisational skills, time management, prioritising, learning how to analyse, problem solving, and the self-discipline that is required to remain motivated.

Explanation:

I really need help the correct answers ASAP!!! with CSC 104 Network Fundamentals

The Questions:

17. What is a Variable Length Subnet Mask (VLSM), and how is it created?

18. What are some of the different reasons to use VLANs?

Answers

Answer:

17. A Variable Length Subnet Mask (VLSM) is a technique used to allocate IP addresses to subnets of different sizes. It allows for more efficient use of IP address space by creating subnets with different sizes, rather than using a fixed subnet mask. VLSM is created by dividing the network into smaller subnets with different subnet masks, depending on the number of hosts required in each subnet.

18. There are several reasons to use VLANs, including:

Security: VLANs can be used to isolate traffic and prevent unauthorized access to sensitive data.

Performance: VLANs can be used to segment traffic and reduce network congestion, improving performance

Management: VLANs can simplify network management by grouping devices with similar functions or requirements

Flexibility: VLANs can be used to easily move devices between physical locations without changing their IP addresses

Explanation:

1) You have a class called Sheep that wants to keep track of how many Sheep have ever been created. Where is a good place to put that variable? 2) When an h file mentions another class, what is that called? (When a cpp file needs to use a class, they include it. This is an h file just mentioning a class, like it has a pointer of that type. You are promising the compiler that the class is in another file.) 3) What is a good guideline for deciding you must write a copy constructor, an assignment operator, and a destructor? 4) void Rock::Func( const Rock & X){} What is that argument type called and what does it do? 5) We saw overloading the = sign. How do you declare a class wanting to override the parenthesis operator?

Answers

Answer:

The counter variable for the sheep count should be declared and initialized before the constructor in the class. The extern keyword should be used to declare the class in the receiving C source file. A constructor is defined when there is a need to instantiate an object with an argument and an assignment operator is used to initialize a variable. The const keyword is used to specify a variable whose value should not change during the course of the program execution.

Explanation:

The C programming language is an object-oriented programming language and has variable specifiers to define variable scopes in a program.

(a) How many locations of memory can you address with 12-bit memory address? (b) How many bits are required to address a 2-Mega-location memory, i.e, what should the length of the memory address be in order to access a 2M memory? (c) Assume intArray is an integer array with 20 elements stored in memory and its starting memory address is in $s2. What is the memory address for element intArray [10]? (d) Assume charArray is a character array with 20 elements stored in memory and its starting memory address is in $t5. What is the memory address for element charArray[5]?

Answers

Answer:

Follows are the solution to this question:

Explanation:

In point a:

Let,

The address of 1-bit  memory  to add in 2 location:

\(\to \frac{0}{1} =2^1 \ (\frac{m}{m} \ location)\)

The address of 2-bit  memory to add in 4 location:

\(\to \frac{\frac{00}{01}}{\frac{10}{11}} =2^2 \ (\frac{m}{m} \ location)\)

similarly,

Complete 'n'-bit memory address' location number is = \(2^n.\)Here, 12-bit memory address, i.e. n = 12, hence the numeral. of the addressable locations of the memory:

\(= 2^n \\\\ = 2^{12} \\\\ = 4096\)

In point b:

\(\to Let \ Mega= 10^6\)

              \(=10^3\times 10^3\\\\= 2^{10} \times 2^{10}\)

So,

\(\to 2 \ Mega =2 \times 2^{20}\)

                 \(= 2^1 \times 2^{20}\\\\= 2^{21}\)

The memory position for '\(2^n\)' could be 'n' m bits'  

It can use \(2^{21}\) bits to address the memory location of 21.  

That is to say, the 2-mega-location memory needs '21' bits.  

Memory Length = 21 bit Address

In point c:

\(i^{th}\) element array addresses are given by:

\(\to address [i] = B+w \times (i-LB)\)

\(_{where}, \\\\B = \text {Base address}\\w= \text{size of the element}\\L B = \text{lower array bound}\)

\(\to B=\$ 52\\\to w= 4 byte\\ \to L B= 0\\\to address = 10\)

\(\to address [10] = \$ 52 + 4 \times (10-0)\\\)

                       \(= \$ 52 + 40 \ bytes\\\)

1 term is 4 bytes in 'MIPS,' that is:

\(= \$ 52 + 10 \ words\\\\ = \$ 512\)

In point d:

\(\to base \ address = \$ t 5\)

When MIPS is 1 word which equals to 32 bit :

In Unicode, its value is = 2 byte

In ASCII code its value is = 1 byte

both sizes are  < 4 byte

Calculating address:

\(\to address [5] = \$ t5 + 4 \times (5-0)\\\)

                     \(= \$ t5 + 4 \times 5\\ \\ = \$ t5 + 20 \\\\= \$ t5 + 20 \ bytes \\\\= \$ t5 + 5 \ words \\\\= \$ t 10 \ words \\\\\)

Enterprise projects developing Mobile applications are more concerned with security than small scale app development because

Answers

Answer:

Security is a major concern for organisations.

Explanation:

Developing mobile application for companies is usually centered on security because of the fear of beach of sensitive company information.

For example, a company may need to decide what measures to put in place that can prevent or reduce data breaches. They may either give employees customize devices with already installed mobile applications or provide unique login details to employees to access the Enterprise mobile application on their own phone.

what is the difference between information literacy and technology​

Answers

Explanation:

information literacy;the ability to articulate ones information need.

Technology is the application of practical purposes especially in industry.

Write some keywords about touchscreen

Answers

\({\huge{\underline{\bold{\mathbb{\blue{ANSWER}}}}}}\)

______________________________________

\({\hookrightarrow{Keywords}}\)

touchscreentouch inputmulti-touchgesturesstylusresistivecapacitivehaptic feedbacktouch latencytouch accuracytouch sensitivitytouch screen technologytouch screen interfacetouch screen displaytouch screen monitortouch screen laptoptouch screen phone

package Unit3_Mod2;


public class Array3DExample3 {

public static void main (String[] argv)
{
int[][][] A = {
{
{1,2,3,4},
{5,6,7,8},
{9,10,11,12}
},
{
{13,14,15,16},
{17,18,19,20},
{21,22,23,24}
},
};

System.out.println ("Array A");
print (A);
int[][][] B = copy (A);
System.out.println ("Array B");
print (B);
}

// INSERT YOUR CODE HERE

static void print (int[][][] A)
{
for (int i=0; i for (int j=0; j for (int k=0; k System.out.print (" " + A[i][j][k]);
}
System.out.println ();
}
System.out.println ();
}
}

}
Add a copy method to make a copy of the 3d array model

Answers

The output of the first statement in the main method is 23.

In this question, the answer is 23 because In java (+) concatenation is used for joining two strings together. If we use statement ("i + j is " + (i + j)) like this then the output will change.but the output of the first statement in the main method is 23.because it print (i) value first that is 2.after that It will print (j) value that is 3.So, the output is 23.

package Unit3_Mod2;

public class Array3DExample3 {

public static void main (String[] argv)

{

int[][][] A = {

{

{1,2,3,4},

{5,6,7,8},

{9,10,11,12}

},

Learn more about output on:

brainly.com/question/14227929

#SPJ1

What is known as networking in the IT field? Check all that apply. Managing networks Building networks. Joining professional networks. Designing networks

Answers

Answer:

Managing networks, Building networks, Designing networks.

Explanation:

Networking is the process of transferring and sharing data between devices in a computer system through a standardized interface by handling data encapsulation and decapsulation, building rules and conditions on the network system, and designing the network based on criteria appropriate for the network system users.

When the InfoSec management team’s goals and objectives differ from those of the IT and general management communities, what items should be considered for the resolution, and who should be involved and provide an example of a situation where such a conflict might exist

Answers

phone holder 2 questions

Task 1: Alex has created the following code using Scratch and expected it to move backwards and forwards across the screen. However, when the green flag is clicked it only moves a little way and then stops. Draw the correct code in the second column.please help me with this topic I don't really know English​

Task 1: Alex has created the following code using Scratch and expected it to move backwards and forwards

Answers

Answer:

Add a forever loop in the code, at the top of the move 10 steps till the end of the code. Place it in between.

Explanation:

This will make the code repeat is self and make the sprite's movement a lot quicker.

Havc parts 2 what is a TXV

Answers

Answer:

It's a metering duives

Explanation:

Answer:

The Thermal Expansion Valve (TXV) is an important piece of equipment in the HVAC industry. The valve is used to control the amount of refrigerant released to the evaporator section. The TXV Expansion valves reside between the evaporator and condenser in the refrigeration cycle

Explanation:

just look it up :)

What input is needed for the defined output?

What input is needed for the defined output?

Answers

Answer:

The data that are needed to be included in the output is called as

Inputs are the signals or data received by the system and outputs are the signals or data sent from it. The term can also be used as part of an action; to "perform I/O" is to perform an input or output operation

a stop watch is used when an athlete runs why

Answers

Explanation:

A stopwatch is used when an athlete runs to measure the time it takes for them to complete a race or a specific distance. It allows for accurate timing and provides information on the athlete's performance. The stopwatch helps in evaluating the athlete's speed, progress, and overall improvement. It is a crucial tool for coaches, trainers, and athletes themselves to track their timing, set goals, and analyze their performance. Additionally, the recorded times can be compared to previous records or used for competitive purposes,such as determining winners in races or setting new records.

you can support by rating brainly it's very much appreciated ✅

If you have a really good picture of your friend, it is okay to post without asking because they allowed you to take it in the first place. O True O False​

Answers

false-you shouldn’t post anything with other peoples consent.
The correct answer is false.

In which year did Patricia Schwirian
develop her model?

Answers

1986

Patricia Schwirian- Proposed a model intended to stimulate and guide systematic research in nursing informatics in 1986.Model and framework that enables identifications of significant information needs, that can foster research (some are similar to Maslow's Heirarchy of needs)

nog
*
24. QUESTION 21:
Peacekeeper text is non-printing text that indicates where you can type.
(2.5 Points)
True
False

Answers

Answer: False

Explanation:

The statement that "Peacekeeper text is non-printing text that indicates where you can type" is false.

The non-printing text which shows where on exam type is referred to as the peaceholder text. It is usually an hint which can be used to fill in the actual text.

Which statement best explains how the main idea relates to taking notes?

The main idea is always included in effective notes.
The main idea is always easy to identify.
The main idea is rarely used as a title for notes.
The main idea is rarely identified by listening or reading

Answers

Answer:

The main idea is always included in effective notes.

Answer:

a

Explanation:

I did the quiz

What is social displacement? Question 22 options: the gained efficiency in being able to communicate through technology , the act of moving files from your computer to an external site , the risk of being "unfriended" by someone on social media , the reduced amount of time we spend communicating face to face

Answers

Answer: The Answer should be D

Explanation: It's the definition.

Question 6 of 10
The "drawers" where blocks in MakeCode Arcade are stored are found in
which area?
A. Workspace
B. Right side panel
C. Image editor
D. Toolbox

Answers

The "drawers" where blocks in MakeCode Arcade are stored are found in the C. Image editor area

When coding, where do you put your blocks on MakeCode?

Annotations placed at the start of an API element define blocks (export function, method, enum, etc.). On annotation lines that start with the comment form //%, attributes are defined.

The program that your arcade will execute is defined by blocks that snap into one another. Blocks can run on their own (buttons, shaking, etc.) or they can run only when snapped into an event. The on-start event is the first to run.

Therefore,  "code drawers" in the editor's center are where the blocks are kept.

Learn more about MakeCode Arcade from

https://brainly.com/question/28959978

#SPJ1

Answer: D. Toolbox

Explanation:

Question 6 of 10The "drawers" where blocks in MakeCode Arcade are stored are found inwhich area?A. WorkspaceB.

Write a C++ program that creates a word-search puzzle game where the user should find the hidden
words in a square array of letters. Your program should first read from the user their choice for the
game: a) easy, b) medium, c) hard, d) exit the game. If the user selects easy, then the 6x6 puzzle,
shown in Figure 1, will be generated and displayed to the user. If the user selects medium, then the
14 x 14 puzzle shown in Figure 2 should be generated and displayed and lastly, if the user selects
the hard choice, the program should generate a random puzzle, filling the square array of 20 x 20
using random characters/words.
Then your program should repeatedly read from the user, a word to be searched for in the puzzle,
the row and column number where the word starts from and which orientation to search for. The
words can be searched vertically (top to bottom), horizontally (left to right), diagonally (upper left
to lower right) and diagonally (upper right to lower left). The program should check if the column
and row number given by the user are inside the puzzle (array) boundaries, otherwise should display
an error message and ask the user to enter another position. For each word the user inputs, the
2
program should display whether the word was found or not. The program should stop reading
words when the user will press “X” and then the total number of found words will be displayed to
the user.
The program should repeatedly display the game menu until the user will select to exit the game

Answers

C++ program to create a word-search puzzle game. #include <iostream> #include <cstring> using namespace std; int main() { char input; cout << "Choose.

What is program technology?

Any technology (including, without limitation, any new and practical process, method of manufacture, or composition of matter) or proprietary material developed or first put into use (actively or constructively) by either Party in the course of the Research Program is referred to as "Program Technology."

A 33 board with 8 tiles (each tile has a number from 1 to 8) and a single empty space is provided. The goal is to use the vacant space to arrange the numbers on the tiles so that they match the final arrangement. Four neighboring (left, right, above, and below) tiles can be slid into the available area.

Therefore, C++ programs create a word-search puzzle game. #include <iostream> #include <cstring>

Learn more about the program here:

https://brainly.com/question/11023419

#SPJ1

write a statement that retrieves the image stored at index 0 from an imagelist control named slideshowimagelist and displays it in a picturebox control named slideshowpicturebox.

Answers

The statement that retrieves the image stored at index 0 from an image list control named slideshowimagelist and displays it in a picturebox control named slideshowpicturebox are:

{

slideshowPictureBox.Image = slideShowImageList.Images [0];

}

What is picturebox?

The PictureBox control is used to display photos on a Windows Form. The PictureBox control provides an image property that allows the user to set the image at runtime or design time. It acts as a container control, uses memory to hold the picture, and allows for image manipulation in the picture box. It also has an auto size property but no stretch feature.

To learn more about picturebox
https://brainly.com/question/27064099

#SPJ4

Other Questions
Which of the following types of risk would organizations being impacted by an upstream organization's vulnerabilities be classified as? Group of answer choices Legacy risk Multiparty risk External risk Multi-network riskWhich of the following types of risk would organizations being impacted by an upstream organization's vulnerabilities be classified as?Group of answer choicesLegacy riskMultiparty riskExternal riskMulti-network risk Samir measured a boarding school and made a scale drawing. He used the scale 10 millimeters = 2 meters. What is the scale factor of the drawing? QuestionUse a net of the square pyramid, if necessary, to find the surface area of the pyramid.3and3 How has the King harmed the citizens?ABby allowing them too much freedom and gettingrid of lawsDby starting a war with other countriesC by taking away their landby severely limiting and altering many of theirrights producers provide factors of production to the product market. do not participate in the factor market. purchase factors of production from the factor market. provide dollars to the product market. The per-unit standards for direct labor are 1. 5 direct labor hours at $15 per hour. If in producing 2500 units, the actual direct labor cost was $48825 for 3150 direct labor hours worked, the total direct labor variance is $4275 unfavorable an asset has a depreciable base of $16.5 million and a service life of 10 years. what would the accumulated depreciation be at the end of year five under the sum-of-the-years'-digits method? Which ordered pair is the solution to the system of equations?y=3r-102x+3y=3O (3,-1)O (2,4)O (4, -2) (0, 1) "_______ is/are found in abundance in South Africa, Botswana, Angola, the Democratic Republic of the Congo, and Sierra Leone." Eric Deggans' experiences with people withdifferent backgrounds emphasize...how small things could lead tomiscommunication.how easy code-switching is to learn.why people should have friends whoshare their background.the importance of learning otherlanguages. read and analyze the given quotation below. in 1-3 sentences, share your insights about it. the quotation: the biggest communication problem is we do not listen to understand. we listen to reply. PLSSS HELP ANSWER, THE QUESTION IS IN THE SCREENSHOT The cost per guest of catering an event of no more than 150 people is modeled by the function () = 45 + 15. The number of guests is modeled by the function () = 150 , where x represents the number of guests fewer than 150 that attend. Evaluate ( )() and interpret what it means in the context of the problem. Show all work ultimate frisbee is meant to be a fair and fun game, that should be able to be self-officiated. when calling a foul or other infraction, if the opposing team does not agree, what is the procedure to settle the disagreement? Choose the form that best matches the diagram.A A A Atheme and variationsstrophic formternary formbinary form In Aberfan, 144 people died, 116 of those being children. Her advisors stronglyencouraged her to visit the town, worried that the Commonwealth would perceiveher as uncaring. In reality, why did Queen Elizabeth decide to not immediately visitthe town?She was ill and unable to visit.She detested getting dirty.She could not emotionally handle the tragedy of so many young lives lost.She was worried her presence would be a distraction to the rescue efforts thatwere occurring at the time. what was the difference in the first and second battles at the alamo between the texans and the mexican army? Determine the relationship between the quantities on the given graph.Wages Earned ($)OA. The hourly rate depends on the wages earned.B.The time worked depends on the wages earned.C.The wages earned depends on the time worked.The time worked depends on the hourly rate.O D.Total WagesTime Worked (hours) a system of performance measures, including nonfinancial measures, used to assess company and division manager performance is: multiple choice hurdle rate. return on investment. balanced scorecard. residual income. investment turnover. Using the CelsiusToKelvin function as a guide, create a new function, changing the name to KelvinToCelsius, and modifying the function accordingly.#include using namespace std;double CelsiusToKelvin(double valueCelsius) {double valueKelvin = 0.0;valueKelvin = valueCelsius + 273.15;return valueKelvin;}/* Your solution goes here */int main() {double valueC = 0.0;double valueK = 0.0;valueC = 10.0;cout