__________ makes the hardware usable, while __________ commands it to perform specific tasks. a.) The operating system, RAM b.) The CPU, RAM c.) The application software, the hard disk d.) The operating system, the application software

Answers

Answer 1

Answer:

a then c

Explanation:

Without an operating system you just have a pile of metal, and the program contains code, which is just a series of commands

Answer 2

Answer:

d.) The operating system, the application software


Related Questions

hãy giúp tôi giảiiii​

Answers

Answer:

fiikslid wugx uesbuluss wuz euzsbwzube

Write a program that asks the user to enter 5 test scores. The program will display a letter grade for each test score and an average grade for the test scores entered. Three functions are needed for this program.

Answers

Answer:

The program in C++ is as follows:

#include <iostream>

using namespace std;

double average(double s1, double s2, double s3, double s4, double s5){

   double avg = (s1 + s2 + s3 + s4 + s5)/5;

   return avg;}

char lGrade(double score){

   char grade;

   if(score>= 90 && score <= 100){ grade ='A'; }

   else if(score>= 80 && score <= 89){ grade ='B'; }

   else if(score>= 70 && score <= 79){ grade ='C'; }

   else if(score>= 60 && score <= 69){ grade ='D'; }

   else if(score < 60){ grade ='F'; }

   return grade;}

int main(){

   double s1,s2,s3,s4,s5;

   cin>>s1>>s2>>s3>>s4>>s5;

   double avg = average(s1,s2,s3,s4,s5);

   cout<<s1<<" "<<lGrade(s1)<<endl;

   cout<<s2<<" "<<lGrade(s2)<<endl;

   cout<<s3<<" "<<lGrade(s3)<<endl;

   cout<<s4<<" "<<lGrade(s4)<<endl;

   cout<<s5<<" "<<lGrade(s5)<<endl;

   cout<<avg<<" "<<lGrade(avg)<<endl;

   return 0;}

Explanation:

The three functions to include in the program are not stated; so, I used the following functions in the program

1. The main function

2. average function

3. Letter grade function

The average function begins here

double average(double s1, double s2, double s3, double s4, double s5){

This calculates the average

   double avg = (s1 + s2 + s3 + s4 + s5)/5;

This returns the calculated average

   return avg;}

The letter grade function begins here

char lGrade(double score){

This declares the grade

   char grade;

If score is between 90 and 100 (inclusive), grade is A

   if(score>= 90 && score <= 100){ grade ='A'; }

If score is between 00 and 89 (inclusive), grade is B

   else if(score>= 80 && score <= 89){ grade ='B'; }

If score is between 70 and 79 (inclusive), grade is C

   else if(score>= 70 && score <= 79){ grade ='C'; }

If score is between 60 and 69 (inclusive), grade is D

   else if(score>= 60 && score <= 69){ grade ='D'; }

If score is less than 60, grade is F

   else if(score < 60){ grade ='F'; }

This returns the calculated grade

   return grade;}

The main begins here

int main(){

This declares the 5 scores

   double s1,s2,s3,s4,s5;

This gets input for the 5 scores

   cin>>s1>>s2>>s3>>s4>>s5;

This calls the average function for average

   double avg = average(s1,s2,s3,s4,s5);

This calls the letter grade function for the 5 scores

   cout<<s1<<" "<<lGrade(s1)<<endl;

   cout<<s2<<" "<<lGrade(s2)<<endl;

   cout<<s3<<" "<<lGrade(s3)<<endl;

   cout<<s4<<" "<<lGrade(s4)<<endl;

   cout<<s5<<" "<<lGrade(s5)<<endl;

This calls the average function for the average

   cout<<avg<<" "<<lGrade(avg)<<endl;

Wilh the aid of the the diagram using an algorithm to calculate table 2 of multiplication​

Answers

Answer:

See attachment for algorithm (flowchart)

Explanation:

The interpretation of the question is to design a flowchart for times 2 multiplication table (see attachment for the flowchart)

The explanation:

1. Start ---> Start the algorithm

2. num = 1 ---> Initializes num to 1

3. while num [tex]\le[/tex] 12 ---> The following loop is repeated while num is less than 12

 3.1 print 2 * num ----> Print the current times 2 element

 3.2 num++ ---> Increment num by 1

4. Stop ---> End the algorithm

Prime numbers can be generated by an algorithm known as the Sieve of Eratosthenes. The algorithm for this procedure is presented here. Write a program called primes.js that implements this algorithm. Have the program find and display all the prime numbers up to n = 150

Answers

Answer:

Explanation:

The following code is written in Javascript and is a function called primes that takes in a single parameter as an int variable named n. An array is created and looped through checking which one is prime. If So it, changes the value to true, otherwise it changes it to false. Then it creates another array that loops through the boolArray and grabs the actual numberical value of all the prime numbers. A test case for n=150 is created and the output can be seen in the image below highlighted in red.

function primes(n) {

   //Boolean Array to check which numbers from 1 to n are prime

   const boolArr = new Array(n + 1);

   boolArr.fill(true);

   boolArr[0] = boolArr[1] = false;

   for (let i = 2; i <= Math.sqrt(n); i++) {

      for (let j = 2; i * j <= n; j++) {

          boolArr[i * j] = false;

      }

   }

   //New Array for Only the Prime Numbers

   const primeNums = new Array();

  for (let x = 0; x <= boolArr.length; x++) {

       if (boolArr[x] === true) {

           primeNums.push(x);

       }

  }

  return primeNums;

}

alert(primes(150));

When you are making multiples of a brownie recipe, you cannot - without great difficulty - use a fraction of an egg. The calculate_eggs function uses the ceil function in the math module to always round up and provide the total number of eggs you need on hand to make your recipe.
1. On Line 2, import just the ceil function from the math module
2. On Line 6, call the ceil function to calculate 0.6*servings
When you run the code, it should match the output under Desired Output
# Import ceil function only from the math module
import math.ceil
# Define Function
def calculate_eggs(servings):
total_eggs = (0.6*servings)
return total_eggs
# Call Function
print(calculate_eggs(14))
Desired Output = You need 9 eggs

Answers

The answer is one ☝️ question for the poll of a vote

a. Daily Life Magazine wants an analysis of the demographic characteristics of its readers. The marketing department has collected reader survey records containing the age, gender, marital status, and annual income of readers. Design an application that allows a user to enter reader data and, when data entry is complete, produces a count of readers by age groups as follows: younger than 20, 20-29, 30-39, 40-49, and 50 and older. b. Modify the Daily Life Magazine program so that it produces a count of readers by gender within age group-that is, under-20 females, under-20 males, and so on. c. Modify the Daily Life Magazine program so that it produces a count of readers by income groups as follows: under $30,000, $30,000-$49,999, $50,000-$69,999, and $70,000 and up.

Answers

Answer:

uh

Explanation:

According the SDLC phases, which among these activities see a substantial amount of automation initiatives?

A code generation
B release build
C application enhancement
D test case generation
E incident management

Answers

Answer:

d. test case generation

Explanation:

Testing should be automated, so that bugs and other errors can be identified without a human error and lack of concentration.

The System Development Life Cycle (SDLC) phase that has seen a substantial amount of automation is the A. code generation.

The main phases of the SDLC include the planning, analysis, design, development, testing, implementation, and maintenance phases.

Using automation for the code generation will help eliminate human errors and increase efficiency.

The code generation phase still requires some human input to ensure that user requirements are completely met.

Thus, while automation will be useful with all the SDLC phases, substantial amount of automation initiatives have been seen with the code generation phase.

Learn more about SDLC phases at https://brainly.com/question/15074944

explain the reason why vector graphics are highly recommended for logo​

Answers

Answer:

Currently, raster (bitmap files) and vector graphics are used in web design. But if you want to make a great logo and fully enjoy the use of it you should pick vector graphics for it in the first place. And this is why most designers opt for it.

Explanation:

Easier to re-editNo image distortionIt is perfect for detailed imagesVector drawings are scalableVector graphics look better in print

Joanne is working on a project and goes to access one of the web applications that her organization provides to retrieve some data. Upon searching for the data that she needs, she receives a pop-up message that top-secret clearance is required and she only has secret clearance. Which of the following access control methods does her organization use?

a. DAC
b. RBAC
c. MAC
d. TSAC

Answers

Answer:

The answer is "Option c".

Explanation:

This required user access policy is a tool used for a central authority that assigns access privileges depending on regulations.

It is a security method that limits the capacity of foreign firms to give or refuse access to a file program's resource objects.

It is a system that imposed access control on the premise of object labels and subject clearance. Such topics and items, like confidential, secret, and top-secret, have clearances and designations, appropriately.

Write a program that defines an array of integers and a pointer to an integer. Make the pointer point to the beginning of the array. Then, fill the array with values using the pointer (Note: Do NOT use the array name.). Enhance the program by prompting the user for the values, again using the pointer, not the array name. Use pointer subscript notation to reference the values in the array.

Answers

Answer:

#include<iostream>

using namespace std;

int main()

{

  int a[20],n;

  int *p;

  cout<<"\n enter how many values do you want to enter:";

  cin>>n;

  for(int i=0;i<n;i++)

  {

      cout<<"\n Enter the "<<i+1 <<"th value :";

      cin>>*(p+i);

      //reading the values into the array using pointer

  }

  cout<<"\n The values in the array using pointer is:\n";

  for(int i=0;i<n;i++)

  {

      cout<<"\n (p+"<<i<<"): "<<*(p+i);

      //here we can use both *(p+i) or p[i] both are pointer subscript notations

  }

}

Output:

If i took my SIM card out of my phone and put it in a router then connect the router and my phone with Ethernet cable would the ping change?

Answers

Answer:

The ping will change.

Explanation:

Assuming you mean ping from device with SIM card to another host (no mater what host), the ping will change. Ping changes even on the same device because network speed and performance of all the nodes on the route changes continuously. However, if two of your devices (phone & router) are configured differently (use different routing under the hood), then it will also affect the ping.

what is operating system?

Answers

Answer:

operating system (os)is translator between the operator (user)and the computer

Operating system (OS) is the low-level software that supports a computer's basic functions, such as scheduling tasks and controlling peripherals.

You work as the IT Administrator for a small corporate network you need to configure configure the laptop computer in the Lobby to use the corporate proxy server. The proxy server is used to control access to the internet. In this lab, your task is to configure the proxy server settings as follows: Port: 9000

Answers

Answer:

okay if I am it administration I will port 10000

To configure the computer in the lobby to use the corporate proxy server, you will need to follow these steps:

Settings > Networks&Internet > Proxy > Manual Proxy Setup > Address & proxy > save

What is Proxy Server?

A proxy server is a device or router that acts as a connection point between users and the internet.

Proxy Server settings would be the same for both Wifi and Ethernet connections, explaining about the configuration in Windows Operating System.

Open the internet browser on the laptop and go to the settings or preferences page. The exact location of the proxy settings will vary depending on the browser you are using.

In the settings or preferences page, look for the "Proxy" or "Network" section.

In the proxy settings, select the option to use a proxy server.

Enter the address of the corporate proxy server in the "Server" or "Address" field.

Enter the port number "9000" in the "Port" field.

Save the changes and close the settings or preferences page.

Test the proxy server configuration by attempting to access a website. If the configuration is correct, the laptop should be able to access the internet through the proxy server.

Settings > Networks&Internet > Proxy > Manual Proxy Setup > Address & proxy > save

To learn more about the Proxy Server settings click here:

https://brainly.com/question/14403686

#SPJ12

a which is the smallest chunk of information of computer can work with​

Answers

Answer:

I still mad for that spam

Explanation:

Answer:

The bits are the smallest chunk of info that is used by computers.

Explanation:

Bit: A short abbreviation for binary digit which is the smallest unit of data.

You're welcome.

I hope I helped you.

Mark is flying to Atlanta. The flight is completely full with 200 passengers. Mark notices he dropped his ticket while grabbing a snack before his flight. The ticket agent needs to verify he had a ticket to board the plane. What type of list would be beneficial in this situation?

Answers

Answer:

The list that would be helpful in this situation would be a list of people in the airport

Hope This Helps!!!

1) Declare an ArrayList named numberList that stores objects of Integer type. Write a loop to assign first 11 elements values: 1, 2, 4, 8, 16, 32, 64, 128, 256, 512, 1024. Do not use Math.pow method. Assign first element value 1. Determine each next element from the previous one in the number List. Print number List by using for-each loop.

Answers

Answer:

Explanation:

The following is written in Java and uses a for loop to add 10 elements to the ArrayList since the first element is manually added as 1. Then it calculates each element by multiplying the previous element (saved in count) by 2. The program works perfectly and without bugs. A test output can be seen in the attached image below.

import java.util.ArrayList;

class Brainly {

   public static void main(String[] args) {

       ArrayList<Integer> numberList = new ArrayList<>();

       numberList.add(0, 1);

       int count = 1;

       for (int i = 1; i < 11; i++) {

           numberList.add(i, (count * 2));

           count = count * 2;

       }

       for (Integer i : numberList) {

           System.out.println(i);

       }

   }

}

Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integers that follow. Then, get the last value from the input, which indicates a threshold. Output all integers less than or equal to that last threshold value. Assume that the list will always contain fewer than 20 integers.

Answers

Answer:

Ex: If the input is:

5 50 60 140 200 75 100

the output is:

50 60 75

The 5 indicates that there are five integers in the list, namely 50, 60, 140, 200, and 75. The 100 indicates that the program should output all integers less than or equal to 100, so the program outputs 50, 60, and 75.

For coding simplicity, follow every output value by a space, including the last one.

Such functionality is common on sites like Amazon, where a user can filter results.

#include <iostream>

#include <vector>

using namespace std;

int main() {

/* Type your code here. */

return 0;

}

In PyCharm, write a program that prompts the user for their name and age. Your program should then tell the user the year they were born. Here is a sample execution of the program with the user input in bold:What is your name? AmandaHow old are you? 15Hello Amanda! You were born in 2005.

Answers

Answer:

def main():

   name = input("What is your name? ")

   if not name == "" or "":

       age = int(input("What is your age? "))

       print("Hello " + name + "! You were born in " + str(2021 - age))

main()

Explanation:

Self explanatory

Suppose you have some List of S List of Strings called List and a String prefix. Write a method that removes all the Strings from list that begin with prefix. public void removePrefixStrings(List-String- list, String prefix) 7. What is the time complexity of this algorithm?

Answers

Answer:

public void removePrefixStrings(List<String> list , String prefix) {

if(list==null || list.size()==0)

return;

for(int i=0; i<list.size();) {

if(list.get(i).startsWith(prefix))

list.remove(i);

else

++i;  

}  

}  

Time Complexity: If the prefix is the same as String length, Then finding all prefix match will take n *n = n2

Then removal is also n  

So the total time complexity is O(n3)

Question: Name the person who originally introduced the idea of patterns as a solution design concept.

Answers

Answer:

architect Christopher Alexander is the person who originally introduced the idea of patterns as a solution design concept.

The person who originally introduced the idea of patterns as a solution design concept named as Christopher Alexander who was an architect.

What is architecture?

Architecture is referred to as an innovative technique or artwork based on buildings or physical structures that aims at creating cultural values for upcoming generations to understand the importance of history.

The external layout can be made to best support human existence and health by using a collection of hereditary solutions known as the "pattern language." It creates a set of helpful relationships by combining geometry and social behavior patterns.

Christopher Alexander, a British-American engineer and design theorist of Austrian heritage, is renowned for his several works on the design and construction process introduced the idea of patterns as a solution design concept.

Learn more about pattern language architecture, here:

https://brainly.com/question/4114326

#SPJ6

Select the correct answer.
Which of these statements is true of dynamic design diagrams?
A.
They demonstrate objects.
B.
They demonstrate relationships.
C.
They demonstrate the behavior of system aspects.
D.
They include structure diagrams.

Answers

Answer:

They demonstrate the behavior of system aspects.

The statement true regarding the dynamic design diagram is that it demonstrates the behavior change in the system. Thus, option C is correct.

What is a dynamic design diagrams?

A dynamic design diagram is given as the model that has been expressing the development of the operations, actions, and the behavior of the system over time.

The dynamic design diagram is thereby the demonstration of the behavior of system aspects. Thus, option C is correct.

Learn more about dynamic design, here:

https://brainly.com/question/14956129

#SPJ2

1. You purchase a new desktop computer that does not have wireless capability, and then you decide thar you want to use a wireless connection to the internet. Give two solutions to upgrade your system to wireless.
2. You are replacing a processor on an older motherboard and see that the board has the LGA1155 socket. You have three processors on hand: Intel Core i3-2100, Intel Core i5-8400, and Intel Core i5-6500. Which of these three processors will most likely fit the board? Why?a. 4.b. 5.c. 6.d. 7.

Answers

Answer:   1.)  You can use a USB WiFi adapter, install a dedicated PCIe WiFi card, or upgrade to a new motherboard with built-in WiFi. (That's three solutions but just want to give you flexibility with your problem.)

Answer:    2.)  None of the processors would fit because they all have different series sockets. (The i5 processors have LGA1151 sockets and the i3 has an LGA1156 socket.)

Explanation: 1.)  Usb WiFi adapter, dedicated PCIe WiFi card, OR a new motherboard with built-in WiFi

                     2.)  None of the processors work

Which support function under Tech Mahindra is governing data privacy and protection related requirements

Answers

Answer:

Privacy Policy

Explanation:

PRIVACY POLICY is the support function under Tech Mahindra that is governing data privacy and protection-related requirements.

Given that support functions are functions which assist and in a way contribute to the company goal.

Other support functions are human resources, training and development, salaries, IT, auditing, marketing, legal, accounting/credit control, and communications.

The above statement is based on the fact that the Privacy Policy clarifies all the data protection rights, such as the right to object to some of the production processes that TechM may carry out.

Explain how you would find a book on a given subject in the library.

Answers

Answer:

In case I am looking for a specific book in a library, the way in which I would try to find it would be through consulting the library guide, or through inspection of the different books of the specific sector with which the book I'm looking for is listed, or by asking the library staff to help me with my search.

The development of the modern computer system has been evolutionary. Discuss this phenomenon and further discuss how current trends in computing would impact future computer systems development

Answers

Answer:

The modern computer system has been evolutionary. Modern computers have allowed for us to complete hard tasks rather easily. With modern computers, we are able to calculate advanced equations with the click of a button. Trends in computing like RTX can rapidly improve performance, rendering, and tons of other graphical heavy actions. In September of 2018, we got the first RTX card, now in 2021, RTX has become exponentially better than what it was in 2018. With the modern computers comes quantum computers. Quantum computing is estimated to be 100 million times faster than any modern computer. IBM, the company to make the first computer stated that we are in the decade of quantum computing. And who knows? Maybe quantum computing will come sooner rather than later.

Explanation:

You probably should modify this a little so you don't get in trouble. I researched each topic I put into this for about an hour so I hope this is what you need. If it isn't, please don't hesitate to tell me what I didn't add or what went wrong.

Have a good day :)

When an external device becomes ready to be serviced by the processor the device sends a(n)_________ signal to the processor.

Answers

when an external device becomes ready to be serviced by the processor the device sends a(n) interrupt signal to the processor

What type of address do computers use to find something on a network?

Answers

An Internet Protocol address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two main functions host or network interface identification and location addressing which can help you a lot.

If there are 18 people in your class and you want to divide the class into programming teams of 3
members, you can compute the number of different teams that can be arranged using this formula
(n!/r!(n−r)!).

Answers

Using a combination method to determine how many ways can 18 people be divided into programming teams of 3 members, the number of programming teams can be arranged in 816 ways.

What is Combination?

In mathematical model, a combination is a mathematical approach for calculating the number of potential arrangements in a set of things without taking the order arrangement of the items is into consideration.

It can be expressed by using the formula;

[tex]\mathbf{ _nC_r = \dfrac{n !}{ r!(n-r)! } }[/tex]

where:

[tex] \mathbf{ _nC_r = number \: of \: combinations \: \} }[/tex]n = total number of set objects = 18r = number of choosing objects = 3

[tex] \mathbf{ _nC_r = \dfrac{18!}{ 3!(18-3)! } }[/tex]

[tex]\mathbf{ _nC_r = \dfrac{18!}{ 3!(15)! } }[/tex]

[tex] \mathbf{ _nC_r = \dfrac{18 \times \: 17 \times \: 16 \times 15!}{ 3!(15)! } }[/tex]

[tex]\mathbf{ _nC_r = \dfrac{18 \times \: 17 \times \: 16 }{ 3 \times \: 2 \times 1} }[/tex]

= 816 ways

Learn more about combinations here:

https://brainly.com/question/11732255

Gimme Shelter Roofers maintains a file of past customers, including a customer number, name, address, date of job, and price of job. It also maintains a file of estimates given for jobs not yet performed; this file contains a customer number, name, address, proposed date of job, and proposed price. Each file is in customer number order.

Required:
Design the logic that merges the two files to produce one combined file of all customers whether past or proposed with no duplicates; when a customer who has been given an estimate is also a past customer, use the proposed data.

Answers

Answer:

Hre the complete implementation of python code that reads two files and merges them together.

def merge_file(past_file_path,proposed_file_path, merged_file_path):

   past_file_contents=load_file(past_file_path)

   proposed_file_contents=load_file(proposed_file_path)

   proposed_customer_name = []

   for row in proposed_file_contents:

       proposed_customer_name.append(row[1])

   with open(merged_file_path,'w') as outputf:

       outputf.write("Customer Number, Customer Name, Address\r\n")

       for row in proposed_file_contents:

           line = str(row[0]) +", " + str(row[1]) + ", " + str(row[2]) +"\r\n"

           outputf.write(line)

       for row in past_file_contents:

           if row[1] in proposed_customer_name:

               continue

           else:

               line = str(row[0]) + ", " + str(row[1]) + ", " + str(row[2]) + "\r\n"

               outputf.write(line)

       print("Files merged successfully!")

# reads the file and returns the content as 2D lists

def load_file(path):

   file_contents = []

   with open(path, 'r') as pastf:

       for line in pastf:

           cells = line.split(",")

           row = []

           for cell in cells:

               if(cell.lower().strip()=="customer number"):

                   break

               else:

                   row.append(cell.strip())

           if  len(row)>0:

               file_contents.append(row)

   return file_contents

past_file_path="F:\\Past Customer.txt"

proposed_file_path="F:\\Proposed Customer.txt"

merged_file_path="F:\\Merged File.txt"

merge_file(past_file_path,proposed_file_path,merged_file_path)

In this progress report, you will be focusing on allowing one of the four transactions listed below to be completed by the user on one of his accounts: checking or savings. You will include defensive programming and error checking to ensure your program functions like an ATM machine would. The account details for your customer are as follows:CustomerUsernamePasswordSavings AccountChecking AccountRobert Brownrbrownblue123$2500.00$35.00For this progress report, update the Progress Report 2 Raptor program that allows the account owner to complete one of the 5 functions of the ATM:1 – Deposit (adding money to the account)2 – Withdrawal (removing money from the account)3 – Balance Inquiry (check current balance)4 – Transfer Balance (transfer balance from one account to another)5 – Log Out (exits/ends the program)After a transaction is completed, the program will update the running balance and give the customer a detailed description of the transaction. A customer cannot overdraft on their account; if they try to withdraw more money than there is, a warning will be given to the customer. Also note that the ATM does not distribute or collect coins – all monetary values are in whole dollars (e.g. an integer is an acceptable variable type). Any incorrect transaction types will display an appropriate message and count as a transaction.

Answers

Answer:

Please find the complete solution in the attached file.

Explanation:

In this question, the system for both the Savings account should also be chosen, the same should be done and for checking account. Will all stay same in. 

Other Questions
A block is being dragged along a horizontal surface by a constant horizontal force of size 45 N. It covers 8 m in the first 2 s and 8.5 m in the next 1 s. Find the mass of the block.Answer: 15kgCan anyone please explain this sum with proper working? Karangan tentang rasuah Hewlett-Packard founders David Packard and William Hewlett strived to create a close-knit organizational culture that gave a lot of responsibility to employees and fostered innovation within the company. Individual responsibility and the importance of innovation are Group of answer choices diverse perspectives. focused values. enacted values. espoused values. analytics. She ate the soup in spanish Explain this to me I don't understand Work out 8^1/3 divide by 5^-2 Consider the P/E ratios of the following companies: Company A: 7.4 Company B: 11.3 Company C: 14.8 Company D: 9.1 Among these four companies, Company C has the __________. highest relative value highest dollar price lowest relative value lowest net income A __________ search engine focuses on a specific subject.answer : Specialized If the complex cholesterol- HRP would not be commercially available, use the knowledge you learnt and internet to determine an alternative way for detecting cholesterol. ( PLEASE ANSWER IT FAST) Label the Organelles of a CellIdentify the organelles in the cell to the right. A university professor asked his class of 42 students when they had studied for his class the previous weekend. There responses were. please answer part a, b and c How does the topic of belonging affect you? Check allthat apply.I always feel like I belong.I belong to many different groups.Sometimes I don't feel like I belong.I have a hard time fitting in.Belonging is very important to meI am lonely when I don't feel like I belong.I don't want to be like everyone else. Which two civilizations had the most advanced trade networks? answer this question Given the functions below, find f(x) - g(x) f(x) = 3x^2 + 2x + 1 g(x) = x^2 - 6x + 3 Why did many Puerto Ricans dislike the Foraker Act? Be-32 When onboard and facing the front of a boat, where is the stern? La pieza de abajo est muy arriba coherencia ejemplo Determine whether ABC are functions:A. (2,5) (3,7) (-1,4) (0, 6)B.(-3, 1) (4, 2) (5,-2) (-3,-1)C. (3,4) (-4, 6) (-1,0) (0,1)A.B.C. How does king rebut his critics claim?