A searching directory is a list of websites that has been categorized online. Like search results, which visit websites and gather data for indexing using web crawlers.
Explain what a search engine is.Share. A search tool is a piece of software that enables users to use keywords or phrases to get the information they're looking for online. Also with thousands of websites available, search engines were able to deliver results swiftly by continuously monitoring the Internet and indexing each page they come across.
What makes search engines crucial?The vast amount of material that is accessible on the internet is effectively filtered by search engines. Users are relieved of the burden of having to wade through numerous pointless web pages in quest of content that is genuinely useful or interesting.
To know more about search engines visit:
https://brainly.com/question/11132516
#SPJ4
a data analyst is creating a dashboard using tableau. in order to layer objects over other items, which layout should they choose? 1 point layered tiled itemized floating
Since the data analyst is creating a dashboard using tableau. in order to layer objects over other items, the layout that they choose is option D: floating layout.
What does the idea of floating mean?When the weight force on an object is countered by the water's upward push, the thing floats. Water exerts an upward force proportional to the volume of the submerged object; water depth or volume have no bearing on this upward force.
Therefore, one can say that the float attribute was created to enable web designers to make straightforward layouts with an image floating inside a text column and text wrapping to the left or right of it.
Learn more about data analyst from
https://brainly.com/question/28132995
#SPJ1
daniel has been tasked with setting up an option for users who work from home to gain access to the desktops within the office. what would allow the users to access the office desktops from their local network so that they may continue their work from home environment?
The users can access the office desktops from their local network so that they may continue their work from home environment with remote desktop.
What is remote desktop?
Remote desktop is a program or a feature in windows that give user to connect the computer using the other computer. The user can access the connected computer in any location. The connection usually use internet.
The computer that has been connected can be navigate normally such as open a program, or create, delete, or edit a file, and anything like normally user access the computer directly.
So, with remote desktop the user in their home can access their office desktop to continue their work.
Learn more about remote desktop here:
brainly.com/question/29514990
#SPJ4
javascript can be used for a. validation of data entered by a user b. any or all of the above c. computations based on user input d. changing the look and feel of a web page
Javascript can be used for b. any or all of the above .
What is JavaScript used for?Making interactive web pages is possible with JavaScript, a text-based computer language used both on the client-side and server-side. JavaScript adds interactive aspects to online sites that keep users interested, whereas HTML and CSS are languages that provide web pages structure and design.Given that JavaScript is the most widely used programming language in the world, it should come as no surprise that it is one of the most in-demand talents in the current web development market. Seventy-two percent of businesses are eager to employ JavaScript specialists, according to the Devskiller IT Skills and Hiring Report 2020.Despite being more sophisticated than HTML, JavaScript allows you to write useful code far faster than it would take you to master the proper HTML markup for web pages. However, compared to HTML, learning everything that JavaScript is capable of will take far more time.Learn more about JavaScript refer to :
https://brainly.com/question/29846946
#SPJ4
what is the worst-case complexity to remove a node from the non-visited nodes data structure and insert it into the visited one?
It is to be noted that node removal can cause a lot of instability. For example, removing a node from a non-visited set of data can trigger a collapse of the data structure making the data corrupt.
What is a node?Database nodes are storage nodes that connect to databases and conduct different operations on them, such as update, insert, delete, and select. Each database type needs a unique set of setup parameters.
It is critical to understand that nodes serve as a safeguard against faults that may occur on the primary database node, and you will have a standby node ready to take over the primary role from the malfunctioning node at any moment.
Learn more about data structures;
https://brainly.com/question/29487957?
#SPJ1
on what page in the wgu student portal can you find a list of the courses you must complete for your degree program?
Your Degree Plan is a tab on the home page. It lists out all of the courses you are required to complete to earn your degree on a standard path.
Define portal?A portal is a popular website that offers a variety of products, services, and vendor links. By choosing the content sources and compiling them into an easy-to-use interface that can be customized, it serves as a value-added middleman before being presented to the end user.A portal is a phrase, typically synonymous with gateway, for a World Wide Web site that serves as, or is intended to serve as, a significant entry point for users when they connect to the Internet or that people frequently use as an anchor site. The two types of portals are general and specialized.A portal is any frequently visited website that acts as a point of access to the Internet and typically has several connections to a range of sources of data, information, resources, and services.To learn more about portal refer to:
https://brainly.com/question/26923369
#SPJ4
true or false. priority queue can be implemented using an array, a linked list, a heap data structure, or a binary search tree.
True, priority queue can be implemented using an array, a linked list, a heap data structure, or a binary search tree.
What is the best way to set up a priority line?Binary trees, heaps, linked lists, and arrays are examples of typical data structures that may be used to build priority queues. The list is set up such that the item with the highest priority is always at the top. According to priority, the items are listed in descending order.
Is a priority queue a tree?A heap data structure, a linked list, an array, or a binary search tree can all be used to build a priority queue.
It is a full tree. Because of this characteristic, Binary Heaps are appropriate for array storage. A binary heap can be either a minimum or maximum heap. A Min Binary Heap requires that the root key be the least important among all other keys.
To know more about priority queue visit
brainly.com/question/15002672
#SPJ4
blunk is a service that allows users to send updates through posts that contain only a few words. these updates are sent to the users who have signed up to receive them. blunk can be regarded as a(n) .
The help of the service Blunk, users may share updates via posts just with a few words. Users who have subscribed to receive these updates are informed about them. Blunk is equal to a microblog.
What does the term "user" mean?A users is anyone who employs or makes use of a certain object, such as a smoker or a website user. You are a Vocabulary.com user if you are reading this. Congrats! A user is one who employs or makes use of something, which is what it means to utilize something.
What does a relationship user look like?It indicates that one individual is consuming overly whilst the other is giving everything. — Dr. Meghan Marcum The relationship's power dynamics are thrown off by it. Both partners would be in charge of giving their partner assistance, trust, and emotional safety in a healthy relationship.
To know more about User visit :
https://brainly.com/question/13122952
#SPJ4
tls provides security at the layer. a. network b. transport c. application d. none of the above
TLS offers security at the transport layer.
What is TLS?A cryptographic technique called Transport Layer Security (TLS) is intended to guarantee communications security over a computer network. Although the protocol is widely used in voice over IP, email, and instant messaging, its use to secure HTTPS is still the most commonly known.
Through the use of cryptography, such as the usage of certificates, the TLS protocol primarily attempts to offer security, including privacy (confidentiality), integrity, and authenticity between two or more communicating computer programs.
The TLS record and the TLS handshake protocols make up its own two layers, which it executes in the presentation layer.
A communications protocol that offers security to datagram-based applications is the closely related Datagram Transport Layer Security (DTLS).
Hence, TLS offers security at the transport layer.
To learn more about Transport Layer Security refer to:
https://brainly.com/question/29556400
#SPJ4
Which command can an administrator issue on a Cisco router to send debug messages to the vty lines?answer choices- terminal monitor- logging console- logging buffered- logging synchronous
These messages must be sent to the terminal lines using the terminal monitor command.
What do you meant by terminal monitor ?On the VTYSH session, the terminal monitor is utilized to dynamically display a selection of logs. Only the live or active logs are seen when the switch's terminal monitor capability is activated. On the SSH session or console session, these logs are visible.
Description. For the current terminal session (i.e., VTY or asynchronous line), this command permits the display of debugging messages and system error messages.
The command no logging console can be used to turn off console logging; it does not apply to the console itself. How do I access Ubuntu Monitor from the terminal? Simply enter any name for System Monitor followed by the command gnome-system-monitor, apply. As soon as you click disabled, select any keyboard shortcut, such as Alt + E. Pressing Alt + E will quickly launch System Monitor.
To learn more about terminal monitor refer to:
https://brainly.com/question/29650773
#SPJ4
the address resolution protocol (arp) transmits a broadcast message and requests a reply with information on the ip address of a computer. arp most likely offers a
ARP(address resolution protocol) is a mechanism for mapping a dynamic IP address to a permanent physical machine address in a local area network (LAN).
What is the main aim of the ARP Address Resolution Protocol? Generally in a local area network, LAN , the Address Resolution Protocol (ARP) is a technique used for translating a dynamic IP address to a permanent physical machine address (LAN).Another term for the actual machine address is A media access control (MAC) address .Protocol for (ARP) Address Resolution Protocol (ARP) is a layer 2 protocol which maps MAC addresses to IP addresses.
To know more about Address Resolution Protocol (ARP) visit to
https://brainly.com/question/13068535
#SPJ4
what is a function? a function is a subprogram designed to perform a particular task. a function is used to signal an event in your code.
The Correct answer is a) A function is a subprogram designed to perform a particular task
What is function ?A big programme can be broken down into the fundamental components known as function in C. The group of code blocks denoted by are present in the function. The C programme can be reused and made modular by calling a function numerous times. In other terms, we may say that a programme is made up of a group of functions. In some programming languages, the function is also known as a process or a subroutine.Function announcement In order to inform the compiler of the function name, function parameters, and return type, a function must be declared globally in a c programme.Using a function Throughout the programme, functions can be invoked from anywhere. Function declaration and function calling cannot have different parameter lists. We have to pass exactly as many functions as it does.To learn more about function refer to:
https://brainly.com/question/20476366
#SPJ4
A problem with virtual networks is that data transmitting through them cannot be encrypted and therefore is not secure.
a. True
b. False
The given statement is False, "virtual networks don't have the drawback of making data transmission across them insecure because it is unable to encrypt it."
What is Virtual Networking?
Multiple PCs, virtual machines (VMs), virtual servers, or other devices can communicate with one another over various office and data center locations thanks to virtual networking. Virtual networking expands these capabilities by using software administration to connect computers and servers over the Internet, as opposed to physical networking, which connects computers using cabling and other hardware. It makes use of virtualized variations of conventional network tools like switches and network adapters to provide easier network configuration changes and more effective routing.
With the help of virtual networking, devices can operate in numerous locations with the same capabilities as a regular physical network. This enables data centers to spread across various physical locations and gives network administrators new, more effective options, such as the ability to quickly modify the network as needs change without having to replace or purchase additional hardware, greater flexibility in provisioning the network to specific needs and applications, and the capability to move workloads across the network infrastructure without compromising service, security, and availability.
To learn more about virtual network visit:
https://brainly.com/question/29492966
#SPJ4
Beginners Comp Sci (LANGUAGE: Java)
Please Help!
Java is an object-oriented, well-structured language that is accessible to beginners. Since many procedures run automatically, you can become proficient in it rather quickly.
Java is it taught in CS?The programming languages that students learn will form the cornerstone of every computer science education. A typical computer science program will cover at least one programming language, such Java or C++, used in
I'm 40; can I learn Java?
No, you are not too old to program, so let's get that out of the way. There has never been an age restriction on learning to code. But far too frequently, older folks limit. Their ability to achieve because of insecurity and uncertainty.
To know more about Java visit:-
https://brainly.com/question/12975450
#SPJ1
what is the main disadvantage of a poll? a. power b. can not set priorities c. no way to mask it d. no hardware support e. too complicated g
A poll's primary drawback is its power. This method's main drawback is how slowly it works.
What is poll ?
The drawback of polling is that if there are too many devices to check, it may take longer to service an I/O device than it does to poll all of the devices. By asking a series of questions and extending generalisations into ratios or confidence intervals, opinion polls are often created to represent the opinions of a population. Pollster is a term used to describe someone who conducts polls. Maximum effectiveness and bandwidth use are the results. Polling is the process through which one programme continuously checks other programmes or devices.
To learn more about Pollster from given link
brainly.com/question/2729655
#SPJ4
you are the network administrator for contoso. your company's network contains an active directory domain containing a user named user1. all computers in the domain run windows 10. you enable windows powershell remoting on the computers. you need to ensure that user1 can access and schedule logging of performance counters. the solution must use the principle of least privilege. to which group should you add user1?
Right-click contoso.com in the Directory Users and Devices window. An Directory domain with the name contoso.com is present on your network.
What is the purpose of PowerShell?PowerShell is frequently used as a scripting to automate system management. In CI/CD setups, it is frequently used to create, test, and publish solutions as well. Built atop the. NET Common Language Framework is PowerShell (CLR).
What makes PowerShell so well-liked?It's a distinctive feature that gives IT specialists the ability to remotely automate and carry out unique operations on any Windows PC connected to the corporate network. The best part is that by simply typing a piece of control code, PowerShell gives IT administrators complete control and visibility of each of those network capacity.
To know more about powershell visit:
https://brainly.com/question/29835395
#SPJ4
your laser printer keeps printing vertical black lines on its output pages. what is the most likely cause of the problem?
A used-up toner cartridge or a worn-out drum unit are the typical culprits for streaking. Drum units are consumables that only require replacement after 3 or 4 toners have been used. A separate toner and drum unit is not utilized by all printers.
What is a laser printer's drawback?
Unlike inkjet printers, which can print on a variety of papers, laser printers cannot. You can't put anything that is heat-sensitive through them. Simple graphics may be printed on home laser printers, but clean pictures are difficult. Choose an inkjet printer if you wish to print images.
Why would you use a laser printer?
Popular computer printers like laser printers use non-impact photocopier technology, which avoids damaging the paper with keys. A laser beam uses electrical charges to "draw" a document on a drum covered in selenium when a document is supplied to the printer.
To know more about Laser printer visit;
https://brainly.com/question/14783882
#SPJ4
which form of access control enforces security based on user identities and allows individual users to define access controls over owned resources?
A particular kind of access control system called DAC grants access rights in accordance with rules that users specify. DAC operates around the tenet that subjects control who has access to their objects. Utilizing capability tables and access control lists (ACLs) are advantages of the DAC approach.
Which access control paradigm allows normal user identities complete control over the things they generated or were allowed access to, like data?
Subjects are granted complete authority over the objects they have generated or been given access to through discretionary access control (DAC), including the ability to share the objects with other subjects. The data is under the control of the subjects.
What in access control is AAA?
Authentication, authorization, and accounting is referred to as AAA. A framework called AAA allows for the intelligent management of access to computer resources, the enforcement of rules, the auditing of consumption, and the provision of data required for service billing.
To know more about DAC visit;
https://brainly.com/question/11646832
#SPJ4
discuss whether or not the following devices/processes are open-loop or closed-loop. if they are closed-loop, please explain the sensing mechanism. (a). traffic light; (b). washing machine; (c). toaster; (d). aircraft autopilot; (e). temperature regulation in human body.
A sensor is used at traffic lights to identify the presence of automobiles. Either a closed loop or an open loop can exist.
How do open and closed loops differ?
An open-loop control system, commonly referred to as a non-feedback system, solely bases its actions on the input; the control action is unaffected by the output. A closed-loop control system, commonly referred to by the term review system, examines the power capacity and modifies it to produce the desired condition.
What distinguishes an open loop from a closed loop?
The open network and a closed loop system are fundamentally different from one another in that the former can self-correct while the latter cannot. As a result, components are quite often known as non-feedback controls, whereas closed-loop systems are frequently referred to as feedback-controlled systems.
To know more about open and closed loops visit:
https://brainly.com/question/23250715
#SPJ4
wendy is the security administrator for a membership association that is planning to launch an online store. as part of this launch, she will become responsible for ensuring that the website and associated systems are compliant with all relevant standards. what regulatory regime specifically covers credit card information?
Protecting card data from hackers and criminals is the main goal of the PCI DSS.
Why do we need PCI DSS?The Visa, MasterCard, Discover Financial Services, JCB International, and American Express companies came together to create the Payment Card Industry Data Security Standard (PCI DSS) in 2004.
Level 1 merchants are those who handle more than 6 million card transactions annually. Merchants at Level 2 handle 1 to 6 million transactions annually. Merchants at Level 3 handle 20,000–1,000,000 transactions annually. Merchants in Level 4: Those that carry out under 20,000 transactions annually
To safeguard card data from hackers and criminals, the PCI DSS was created. Following this standard will help you safeguard your customers and staff from costly data breaches while maintaining the security of your data.
Therefore, the answer is PCI DSS.
To learn more about PCI DSS refer to:
https://brainly.com/question/28463625
#SPJ4
joe is responsible for the security of the systems that control and monitor devices for a power plant. what type of system does joe likely administer?
Joe probably manages a system of the type known as Supervisory Control and Data Acquisition (SCADA).
Which kind of analysis is most appropriate for evaluating the danger to a company's reputation?Data loss, system downtime, and legal repercussions are a few examples of the risks that can be identified through qualitative risk assessments.
Who ought to take part in risk management activities?An summary of the project's risks and opportunities, together with a plan for risk mitigation or opportunity exploitation, are provided by the risk manager to help management make decisions. They serve as the focal point for the project's risk management efforts.
To know more about SCADA visit :-
https://brainly.com/question/29453664
#SPJ4
select all that apply. in an inheritance situation, the new class that you create from an existing class is known as the
The new class that you create from an existing class in an inheritance situation is referred to as the base class function Object.
Inheritance enables programmers to independently modify original software via public classes and interfaces, to specify a new implementation while preserving the same behaviours, and to construct classes that are built upon existing classes. Several derived classes inherit from a single base class in this style of inheritance. The constructors are called in the same order that classes are inherited when they are created.
What is multiple inheritance?
The base class function Object will be invoked first followed by the function Object of the derived class if we have a base class and one derived class that inherits this base class. Creating a class by deriving from multiple direct base classes is known as multiple inheritance.
To learn more about inheritance from given link
brainly.com/question/14930526
#SPJ4
From the prespective of networking infrastrcutre, sound waves, such as the human voice, vary continuously over time and are considered what type of data?
From the perspective of networking infrastrcutre, sound waves, such as the human voice analog data, as it is a continuous electrical signal.
What is Analog data?Analog data is a type of data that is represented by continuous physical measurements. Analog data is typically represented by a physical quantity such as voltage, current, temperature, pressure, or sound. This type of data is typically converted into a digital form for storage, processing, and analysis. Analog data is often used in industries such as healthcare, manufacturing, and oil and gas. Analog data is used to represent data or information in a physical form, such as a waveform or electrical signal. These signals are created through analog-to-digital converters and are typically used for measurement and control systems. Analog data is typically used for analog-to-digital conversion, audio and video recording, and medical imaging. It is also used to measure temperature, pressure, humidity, and other physical properties.To learn more about analog data refer to:
https://brainly.com/question/28711451
#SPJ4
What is the horizon on a perspective drawing?
One form of eye-level line is the horizon. Eye-level lines are the lines that naturally direct the viewer's eye into a photograph.
What is photograph?Photograph is defined as a picture made when light strikes a photosensitive surface, either a piece of film for photography or an electronic image sensor like a CCD or CMOS chip. Photography, which means "painting with light" in its literal sense.
A natural form of line to direct the viewer's eye level is a horizontal line. Because it enables you to manage the height of the viewer's eye as they stare at the image, a horizon line is crucial in art. The horizon line is always visible to you at eye level.
Thus, one form of eye-level line is the horizon. Eye-level lines are the lines that naturally direct the viewer's eye into a photograph.
To learn more about photograph, refer to the link below:
https://brainly.com/question/25379778
#SPJ1
how can an algorithm be described in which the work it does grows as a function of the square of the problem size?
The algorithm be described as : quadratic
About Time-Complexity:
Your program is functional, but it runs too slowly. Or perhaps your neat little piece of code is running just fine, but slower than that other, longer one. In computer science, the Big-O notation is frequently used to describe the efficiency or complexity of an algorithm. Practically speaking, it serves as a gauge to determine whether your function is effective and whether it needs to be improved.
As you continue your education, time-complexity will play a bigger role in your development environment. You'll eventually be able to evaluate your software and determine which programs fit into which time complexity categories (constant, linear, quadratic, exponential, logarithmic). To better understand how Time-Complexity works in your code and in real life, we'll be breaking down the fundamentals in this guide.
O(N²) — Quadratic Time:
An algorithm with quadratic time complexity has performance that is squarely correlated with the size of the input data set (think of Linear, but squared). This temporal complexity will appear in our applications anytime we nest over numerous iterations in the data sets.
Let's look at the cards again. How to eliminate all the cards with the same number if, for example, you chose the first card in the deck. You would need to go through the deck and eliminate any duplicate cards. You would repeat the process with the next card, the next, and so on until you reached the last card in the deck after you were certain that all the duplicates had been eliminated. An illustration of quadratic time complexity is this.
To learn more about time complexity visit:
https://brainly.com/question/28014440
#SPJ4
in file systems consistent with unix semantics: a. users cannot share the pointer of current location into a file. b. writes to a file by a user are immediately visible to other users that have this file open. c. writes performed by one user are not seen by other users . d. a file cannot be opened by one user only.
Other users with this file open are immediately able to see any changes made by one user. The right answer is (b).
How a system functions ?Simply described, a system is a well-organized group of components (or subsystems) that work closely together to achieve a single objective. The system receives a variety of inputs, processes those inputs through certain steps to create specific outputs, and then combines those outputs to achieve its ultimate objective.
What are the top five system types?Information systems, monetary systems, eco - systems, computer systems, and educational systems are all things that everyone is connected with. I can also add a number of other things that are commonly referred to as systems by experts in a certain field to this list.
To know more about System visit :
https://brainly.com/question/14253652
#SPJ4
6.of the following hard drives, which one is fastest? a.sata 6 gb/s ssd b.sata 6 gb/s 10,000 rpm drive c.m.2 ssd using a sata revision 3.0 interface d.pcie nvme ssd card
Solid State Drive is an acronym. No moving parts can be found on these disks. The information is entirely kept on non-volatile flash memory instead. The fact that no needle needs to move makes them substantially faster than SATA drives because neither reading nor writing data requires the movement of a needle.
What is an SSD card used for?
SSDs permanently store data on an integrated circuit, usually using flash memory. Because an SSD has flash memory instead of the mechanical hard-disk drives' moving elements, data can be written, transferred, and deleted discreetly and electronically (HDDs).
Do SSDs outperform hard drives?
SSDs are more energy-efficient, more durable, quieter, and faster. In the event of damage, HDDs may provide a simpler data recovery option. Given that contemporary SSDs are nearly as reliable as HDDs, SSDs win out as long as price isn't the deciding factor.
To know more about SSD visit;
https://brainly.com/question/9380140
#SPJ4
what is the name of the hacker who maintained propaganda websites and posted hacker training tutorials for the e-jihad?
Youni Tsoulis is the name of the hacker who maintained propaganda websites and posted hacker training tutorials for the e-jihad.
What is a cyberjihad?A concept called "cyber jihad" was created to broadly characterize how Islamic extremist terrorists utilize the internet. in their conflict with the opposition by using the Internet as a tool for communications, fundraising, recruiting, training, and strategy.
What is the role of an ethical hacker?The duty of doing risk analyses and testing systems for security flaws is given to ethical hackers since they have the knowledge, expertise, and experience to do so. In order to defend businesses from assaults, these tests are run against all conceivable security lapses, exploits, and vulnerability situations.
To know more about Hacker visit
brainly.com/question/14672629
#SPJ4
a student claimed that he has learned about an authentication mechanism that is used for identity verification of remote devices that are connected to a network but are outside of the network. what authentication is the student talking about? group of answer choices ping command dns authentication remote network authentication endpoint authentication
The student talking about endpoint authentication as it is used for identity verification of remote devices that are connected to a network but are outside of the network.
What is endpoint authentication?In network environments where remote users frequently arrive in waves, endpoint authentication is put into practise. Endpoint security systems that identify, validate, and authorise access to the connected network are typically used to implement endpoint authentication. The user or individual is verified, but the connecting endpoint device is also validated. The endpoint device needs to follow the network's security guidelines in order to be granted access to the network.
For instance, endpoint authentication-based wireless networks check both the security protocols used by the endpoint device as well as user credentials, such as a service set identifier (SSID) and password. The list of endpoint media access control (MAC) or physical device addresses that some security systems may keep on file helps to ensure that only authorised devices, regardless of user or individual, are connected.
Learn more about authentication
https://brainly.com/question/28344005
#SPJ4
Kristy just received a laptop from her employer so she can work from home. She wonders if she can also use the laptop for personal activity, such as streaming movies. What documentation should Kristy check to find the answer to her question?
A. Acceptable use policy (AUP)
B. Knowledge base
C. Code of conduct
D. Warranty
Answer:
A
Explanation:
Acceptable use policy
maybe
a wireless access point configured to use wired equivalent privacy (wep) is an example of which kind of vulnerability? answer unpatched software default settings weak security configurations zero-day exploit
Weak security settings include those that employ access control privacy (wep) on wireless access points.
What is wifi, for instance?A number of these terms may be familiar to you already: Radio and television communication, radar, gsm, global navigation systems (GPS), WiFi, Nfc, and rf are examples of "wireless" technology. identification, all of which have drastically diverse applications in various circumstances.
Which gadget is wireless?There is some form of network connectivity on a wireless device. If a laptop or PDA had a wireless modem, they would also be wireless, much like a mobile phone. Software are mobile when they connect to a network and exchange the data with it.
To know more about Wireless visit :
https://brainly.com/question/29730597
#SPJ4