what's the difference between natural systems and man made systems

Answers

Answer 1

Answer:

Natural systems are already in place while man made systems were created by humans manipulating things in some way.

Explanation:

man made: human created

natural systems: existed without interference


Related Questions

Will mark Brainliest, need help ASAP!

Sherman needs to set up machines to send out updates about routing information using a multicast address. What does he need to configure?

RIPv1 class D of 224
RIPv1 class D of 240
RIPv2 class D of 224
RIPv2 class D of 240

Answers

Answer:

What Sherman needs to configure is:

RIPv2 class D of 240.

Explanation:

Multicast messages are usually dispatched to a select group of hosts on a network and require acknowledgement of the recipients. RIPv2 is a router-based internet protocol for exchanging routing information to the IP address 224.0. 0.9 on a network. It determine the most efficient way to route data on a network and to prevent routing loops.

Answer:

C. RIPv2 class D of 224

Explanation:

Coral Given three floating-point numbers x, y, and z, output x to the power of y, x to the power of (y to the power of z), the absolute value of x, and the square root of (x * y to the power of z).
Output all results with five digits after the decimal point, which can be achieved as follows:
Put result to output with 5 decimal places
Ex: If the input is:
5.0 2.5 1.5
the output is:
55.90170 579.32402 5.00000 6.64787
Hint: Coral has built-in math functions (discussed elsewhere) that may be used.

Answers

Answer:

The program is as follows:

float x

float y

float z

x = Get next input

y = Get next input

z = Get next input

Put RaiseToPower(x,y) to output with 5 decimal places

Put "\n" to output

Put RaiseToPower (x,RaiseToPower (y,z)) to output with 5 decimal places

Put "\n" to output

Put AbsoluteValue(x) to output with 5 decimal places

Put "\n" to output

Put SquareRoot(RaiseToPower (x * y,z)) to output with 5 decimal places

Explanation:

This declares all variables

float x

float y

float z

This gets input for all variables

x = Get next input

y = Get next input

z = Get next input

This prints x^y

Put RaiseToPower(x,y) to output with 5 decimal places

This prints a new line

Put "\n" to output

This prints x^(y^z)

Put RaiseToPower (x,RaiseToPower (y,z)) to output with 5 decimal places

This prints a new line

Put "\n" to output

This prints |x|

Put AbsoluteValue(x) to output with 5 decimal places

This prints a new line

Put "\n" to output

This prints sqrt((x * y)^z)

Put SquareRoot(RaiseToPower (x * y,z)) to output with 5 decimal places

The function of an audio mixer is to _____. layer audio tracks at their ideal volume combine, control, and route audio signals from inputs to outputs process and edit pre-recorded audio signals automatically adjust volume for audio channe

Answers

Answer: combine, control, and route audio signals from inputs to outputs

Explanation:

A audio mixer is refered to as the sound mixer or the mixing console and it's an electronic device that's used for mixing, and combining several audio signals and sounds.

The input to the console is the microphone. The audio mixer can also be used in controlling digital or analog signals. These are then summed up in producing output signals.

Therefore, the function of the audio mixer is to combine, control, and route audio signals from inputs to outputs.

A backbone network is Group of answer choices a high speed central network that connects other networks in a distance spanning up to several miles. a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information. a network spanning a geographical area that usually encompasses a city or county area (3 to 30 miles). a network spanning a large geographical area (up to thousands of miles). a network spanning exactly 200 miles with common carrier circuits.

Answers

Answer:

a high speed central network that connects other networks in a distance spanning up to several miles.

Explanation:

A backbone network functions just like the human backbone providing support for network systems by offering a network infrastructure that allows small, high speed internet connectivity. It is a principal data route between large interconnected networks which offers connection services spanning several miles. Most local area networks are able to connect to the backbone network as it is the largest data connection on the internet. This backbone networks are mainly utilized by large organizations requiring high bandwidth connection.

Will has been asked to recommend a protocol for his company to use for a VPN connection to the cloud service provider that his company uses. Which of the following protocols could he rule out as options for this connection?
a. IKEv2
b. TFTP
c. L2TP
d. GRE

Answers

Answer:

The protocols that Will could rule out as options for this connection are:

b. TFTP

d. GRE

Explanation:

A virtual private network (VPN) delivers encrypted connection over the Internet to prevent unauthorized data access, thereby facilitating remote work and the transmission of sensitive data.

IKEv2 (Internet Key Exchange version 2) and Layer Two Tunneling Protocol (L2TP) are secure encryption protocols that enable virtual private network (VPN).

 

Trivial File Transfer Protocol (TFTP) is not encrypted for receiving and sending files but a simple boot-loading File Transfer Protocol.

Generic routing encapsulation (GRE) tunnels do not encrypt data and are not secure unless used with other secure tunnelling protocols.

1) Design a class named Axolotl that holds attributes for an axolotl's name, weight, and color. Include methods to set and get each of these attributes

2)Create a small program that declares two Axolotl objects (using the class above) and sets each axolotl's name, weight, and color attributes. The program must also output each axolotl's name, weight, and color after they are set

Answers

what subject is this exactly?

Prepare an algorithm and draw a corresponding flowchart to compute the sum
and product of all prime numbers between 1 and 50.

Answers

Answer:

Explanation:

Given

Predictive Algorithms Identify one use/application in which tprediction might cause significant ethical harms.

a. True
b. False

Answers

I do believe this would be true.

Select the correct answer.
Oliver is working for a team that uses object-oriented concepts to design software. Which language would they use to develop this software?
A.
Scheme
B.
Prolog
C.
R
D.
Ruby

Answers

Answer:

B.

Explanation:

Because

Answer:

Ruby

is the correct answer

What happens when a dataset includes records with missing data?

Answers

Answer:

However, if the dataset is relatively small, every data point counts. In these situations, a missing data point means loss of valuable information. In any case, generally missing data creates imbalanced observations, cause biased estimates, and in extreme cases, can even lead to invalid conclusions.

It makes data analysis to be more ambiguous and more difficult.

Missing data is simply the same as saying that there are values and information that are unavailable. This could be due to missing files or unavailable information.

A dataset set with missing data means more work for the analyst. There needs to be a transformation in those fields before the dataset can be used.

Generally speaking missing data could lead to bias in the estimation of data.

A data scientist is a data expert who is in charge of data. He performs the job of data extraction, data analysis, data transformation.

read more at https://brainly.com/question/17578521?referrer=searchResults

Code Example 4-2 def get_volume(width, height, length=2): volume = width * height * length return volume def main(): l = 3 w = 4 h = 5 v = get_volume(l, w, h) print(v) if __name__ == "__main__": main() Refer to Code Example 4-2: If you add the following code to the end of the main() method, what does it print to the console? print(get_volume(10, 2))

Answers

Answer:

Hence the answer is 4.

Explanation:

get_volume(3,4,5) returns 3*4*5 = 60

width is 3

height is 4

length is 5

A or an is a simple chip with two or more processor core

Answers

a multi-core processor, i’m pretty sure

Suppose you were charged with putting together a large LAN to support IP telephony (only) and that multiple users may want to carry on a phone call at the same time. Recall that IP telephony digitizes and packetizes voice at a constant bit rate when a user is making an IP phone call. How well suited are these four protocols for this scenario

Answers

Answer:

TDMA: Time-division multiple access (TDMA) will operate effectively.

CSMA: Carrier-sense multiple access (CSMA)  will NOT operate properly.

Slotted Aloha: Slotted Aloha will NOT perform effectively.

Token passing: Token passing will operate effectively.

Explanation:

Note: This question is not complete. The complete question is therefore provided before answering the question as follows:

Suppose you were charged with putting together a LAN to support IP telephony (only) and that multiple users may want to carry on a phone call at the same time. Recall that IP telephony digitizes and packetizes voice at a constant bit rate when a user is making an IP phone call. How well suited are these four protocols for this scenario?

TDMA:

CSMA:

Slotted Aloha:

Token passing:

Provide a brief explanation of each answer.

The explanation of the answers is now provided as follows:

TDMA: Time-division multiple access (TDMA) will operate effectively in this situation because it provides a consistent bit rate service of one slot every frame.

CSMA: Because of collisions and a changing amount of time to access the channel, Carrier-sense multiple access (CSMA)  will NOT operate properly in this situation. Also, the length of time it takes to access a channel is not limited.

Slotted Aloha: Just like CSMA, Slotted Aloha will NOT perform effectively in this situation because of collisions and a different amount of time to access the channel. Also, the length of time it takes to access a channel is limitless.

Token passing: Token passing will operate effectively in this case because each station has a turn to transmit once per token round, resulting in a service with an effectively constant bit rate.

Virtualization:

a. can boost server utilization rates to 70% or higher.
b. has enabled microprocessor manufacturers to reduce the size of transistors to the width of an atom.
c. uses the principles of quantum physics to represent data.
d. allows smartphones to run full-fledged operating systems.
e. allows one operating system to manage several physical machines.

Answers

The answer: A

If you would like to understand more on this, I have found an excellent quizlet.
Search this up: Using IS for Bus. Problems chp.5 practice quiz

Suppose a company A decides to set up a cloud to deliver Software as a Service to its clients through a remote location. Answer the following [3] a) What are the security risks for which a customer needs to be careful about? b) What kind of infrastructural set up will be required to set up a cloud? c) What sort of billing model will such customers have?

Answers

Answer:

perdonnosee

Explanation:

Consider the following generalization of the Activity Selection Problem: You are given a set of n activities each with a start time si , a finish time fi , and a weight wi . Design a dynamic programming algorithm to find the weight of a set of non-conflicting activities with maximum weight.

Answers

Answer:  

Assumption: Only 1 job can be taken at a time  

This becomes a weighted job scheduling problem.  

Suppose there are n jobs

   Sort the jobs according to fj(finish time)

   Define an array named arr to store max profit till that job

       arr[0] = v1(value of 1st job)

       For i>0. arr[i] = maximum of arr[i-1] (profit till the previous job) or wi(weight of ith job) + profit till the previous non-conflicting job

   Final ans = arr[n-1]

The previous non-conflicting job here means the last job with end timeless than equal to the current job.  

To find the previous non-conflicting job if we traverse the array linearly Complexity(search = O(n)) = O(n.n) = O(n^2)  

else if we use a binary search to find the job Complexity((search = O(Logn)) = O(n.Log(n))

Danielle is analyzing logs and baselines of the systems and services that she is responsible for in her organization. She wants to begin taking advantage of a technology that can analyze some of the information for her and learn from that data analysis to make decisions rather than relying on explicit programming for the analysis. Which of the following describes this technique?

a. Systematic processing
b. Machine learning
c. Cumulative wisdom
d. S.M.A.R.T.

Answers

Answer:

b. Machine learning

Explanation:

The technique that is being described in this situation is known as Machine Learning. This is a fairly new technology that has become popular over the last decade. Machine learning uses artificial intelligence to analyze data and learn from it. Every time the system analyzes the data it learns something new, saves it, and implements it to its processes. Therefore, the more times it repeats the more it learns. These systems are continuously getting better and learning more, which makes them incredibly efficient.

Write a demo test to verify the above Rectangle object accessible from demo test main program and can execute display() method to output.

Answers

Answer:

Explanation:

The Rectangle class was not provided in this question but after a quick online search I was able to find the class code. Due to this I was able to create a test code in the main Method of my program to create a Rectangle object and call it's display() method. The Test code and the output can be seen in the attached image below. While the code below is simply the Main Test Program as requested.

class Brainly {  

   public static void main(String[] args) {

       Rectangle rectangle = new Rectangle(20, 8);

       rectangle.display();

   }

}

How can using Prezi software for a presentation allow the presenter to better respond to audience needs?

Answers

Answer:

The description of the given question is summarized in the explanation section below.

Explanation:

Prezi makes things simpler to move around freely from one location to another even though you may pass through slides conventional standard edition presenting. If users spend nearly the audience's listening that would be very useful.Unless the organization's crowd looks puzzled or makes a statement, you may backtrack to that same topic without navigating several slides expediently.

Your organization network diagram is shown in the figure below. Your company has the class C address range of 199.11.33.0. You need to subnet the address into three subnets and make the best use of the available address space. Which of the following represents the addressing scheme you would apply to the New York office and Toronto Office?
(A) 199.11.33.160/31
(B) 199.11.33.0/25
(C) 199.11.33.128/27
(D) 199.11.33.0/31
(E) 199.11.33.160/30
(F) 199.11.33.128/28

Answers

Answer:

aaaa

Explanation:

Discuss at least five ways of practicing good device care and placement

Answers

Answer:

The points according to the given question are provided below.

Explanation:

Batteries are quite a highly crucial part of EVs and should be handled accordingly.Whenever a part becomes obsolete, it should have been substituted every year using an innovative version.Before using an electric car, it should have been fully charged and ready to go.Within a certain duration of time, the gadget needs to be serviced again.Be sure to keep your mobile device or another gadget in such a secure location.

Write code that prints: Ready! numVal ... 2 1 Go! Your code should contain a for loop. Print a newline after each number and after each line of text Ex: numVal = 3 outputs: Ready!
3
2
1
Go!
public class ForLoops {
public static void main (String [] args) {
int countNum;
int i;
countNum = 3;
/* Your solution goes here */
}
}

Answers

Answer:

public class ForLoops {

   public static void main (String [] args) {

       int countNum;

       int i;  

       countNum = 3;  

       System.out.println("Ready!");

       for(i = countNum;i>0;i--) {

           System.out.println(i);

       }

       System.out.println("Go!");

   }

}  

Output:

Gimme Shelter Roofers maintains a file of past customers, including a customer number, name, address, date of job, and price of job. It also maintains a file of estimates given for jobs not yet performed; this file contains a customer number, name, address, proposed date of job, and proposed price. Each file is in customer number order.

Required:
Design the logic that merges the two files to produce one combined file of all customers whether past or proposed with no duplicates; when a customer who has been given an estimate is also a past customer.

Answers

Answer:

Hence the complete implementation of python code that reads two files and merges them together.

def merge_file(past_file_path,proposed_file_path, merged_file_path):

   past_file_contents=load_file(past_file_path)

   proposed_file_contents=load_file(proposed_file_path)

   proposed_customer_name = []

   for row in proposed_file_contents:

       proposed_customer_name.append(row[1])

   with open(merged_file_path,'w') as outputf:

       outputf.write("Customer Number, Customer Name, Address\r\n")

       for row in proposed_file_contents:

           line = str(row[0]) +", " + str(row[1]) + ", " + str(row[2]) +"\r\n"

           outputf.write(line)

       for row in past_file_contents:

           if row[1] in proposed_customer_name:

               continue

           else:

               line = str(row[0]) + ", " + str(row[1]) + ", " + str(row[2]) + "\r\n"

               outputf.write(line)

       print("Files merged successfully!")

# reads the file and returns the content as 2D lists

def load_file(path):

   file_contents = []

   with open(path, 'r') as pastf:

       for line in pastf:

           cells = line.split(",")

           row = []

           for cell in cells:

               if(cell.lower().strip()=="customer number"):

                   break

               else:

                   row.append(cell.strip())

           if  len(row)>0:

               file_contents.append(row)

   return file_contents

past_file_path="F:\\Past Customer.txt"

proposed_file_path="F:\\Proposed Customer.txt"

merged_file_path="F:\\Merged File.txt"

merge_file(past_file_path,proposed_file_path,merged_file_path)

Brandon has configured one of the applications hosted on his cloud service provider to increase the number of resources as needed. Which of the following describes this capability?

a. Continuity
b. Adaptability
c. Vertical scaling
d. Horizontal scaling

Answers

Answer:

The description of this capability is:

d. Horizontal scaling

Explanation:

The capability that Brandon has achieved is horizontal scaling, which involves the increasing of the resources of cloud applications to meet his increasing demand for cloud services.  Vertical scaling involves the addition or subtraction of power to a cloud server, which practically upgrades the memory, storage, or processing power.  But to scale horizontally, more resources are added or subtracted.  The purpose of horizontal scaling is to spread out or in the workload of existing resources and either increase or decrease overall performance and capacity.

Write a program that will generate a personalized invitation within a text file for each guest in the guest list file using the event information found in the event details file. Put all the generated invitation files in a directory called invitations. Ensure that the name of each invitation file uniquely identifies each guest's invitation

Answers

Answer:

Code:  

import os   # os module to create directory  

event_file = open("event_details.txt", "r") # Getting event file  

event_details = ""  # event details to be stored  

for row in event_file:  # traversing through the event_file  

   event_details += row    # appending event details  

os.mkdir("./invitations")   # make directory in the same parent directory  

names = open("guest_list.txt", "r") # getting names of the people  

for name in names:  # traversing through names in guest_list file

   name = name.replace('\n', '')   # removing the ending '\n' from the name  

   invitation_msg = "Hi! " + name + ", You are heartly invited in the Ceremony.\nAt " + event_details # Generating the invitation message  

   file_name = '_'.join(name.split(' '))   # Spliting name in space and joining with the '_'  

   file_path = "./invitations/" + file_name + ".txt" # Generating each file path  

   invite_file = open(file_path, "w")  # Creating the file for each name  

   invite_file.write(invitation_msg)   # Write invitation to file

Output:

Write a program that solves the following problem:

One marker costs 80 cents. A package of five markers costs $3.50. This encourages people to buy complete packages rather than having to break packages open. The tax is 6.5% of the total. The shipping cost is 5% of the total (before tax). Your program will prompt for a number of markers (an integer). It will calculate and display:

⢠The number of complete packages of markers
⢠The number of separate markers (hint: use // and %)
⢠The cost for the markers before shipping and tax
⢠The cost of shipping
⢠The cost of tax
⢠The total cost of the markers after shipping and tax are added (the grand total)

Answers

Answer:

def main():

   singleMarkerPrice = 0.80

   packageOfMarkersPrice = 3.50

   tax = 0.065

   shipping = 0.050

   userInput = int(input("How many markers do you want? "))

   amountOfPackages = 0

   singleMarkers = 0

   if userInput % 5 == 0:

       amountOfPackages = userInput / 5

   else:

       amountOfPackages = userInput // 5

       singleMarkers = userInput % 5

   # Just for syntax so if the single marker amount is one, it prints package instead of packages

   if amountOfPackages == 1:

       print("You have " + str(int(amountOfPackages)) + " complete package")

   else:

       print("You have " + str(int(amountOfPackages)) + " complete packages")

   # Just for syntax so if the single marker amount is one, it prints marker instead of markers

   if singleMarkers == 1:

       print("You have " + str(int(singleMarkers)) + " single marker")

   else:

       print("You have " + str(int(singleMarkers)) + " single markers")

   totalAmountBeforeTax = (amountOfPackages * packageOfMarkersPrice) + (singleMarkers * singleMarkerPrice)

   print("The total amount before tax comes out to " + str(float(totalAmountBeforeTax)))

   costOfShipping = float(round((totalAmountBeforeTax * shipping), 2))

   costOfTax = float(round((totalAmountBeforeTax * tax), 2))

   print("The cost of shipping is " + str(costOfShipping))

   print("The cost of tax is " + str(costOfTax))

   totalAmount = totalAmountBeforeTax + costOfShipping + costOfTax

   print("The total amount comes out to " + str(round(totalAmount, 2)))

main()

Explanation:

This should be correct. If it isn't let me know so I can fix the code.

Suppose you are among those who believe that the NLRA should be transformed. What arguments support the claim that a complete overhaul is necessary

Answers

Answer:

See explanation below.

Explanation:

Note: This question is not complete. The complete question is therefore provided before answering the question follows:

Suppose you are among those who believe that the NLRA should be transformed. What arguments support the claim that a complete overhaul is necessary? What alternative models might be considered as a replacement for the NLRA model of exclusive representation?

The explanation of the answers is now provided as follows:

a. What arguments support the claim that a complete overhaul is necessary?

The adversarial nature of labor relations in the United States, which many claim is produced by the National Labor Relations Act's (NLRA)'s very existence, is the fundamental reason for its transformation. In a global economy, supporters of transformation say that adversarialism is undesirable for employees and employers because it makes representation and profit maximization more difficult. The principles of exclusive representation and majority support are specific aspects of the NLRA that promote adversarialism.

The fact that it is compulsory for a union to win the support of a majority of workers, the process of representation results into a tone of a "u versus. them". As a result, both sides try to make the other look bad in the eyes of the employees who will vote.

Based on the above, a  complete overhaul is necessary.

b. What alternative models might be considered as a replacement for the NLRA model of exclusive representation?

Giving nonmajority unions legal protection by requiring employers to negotiate with them is one alternative to replace the NLRA model of exclusive representation. Under this, the contracts would not cover all employees; only those who are union members would be covered.

Another alternative is that work councils could also be used to supplement or replace the certification process. Employee free speech rights, wrongful dismissal procedures, employee participation on business boards of directors, and the right to workplace information are all potential transformation factors that might be taken into consideration.

Write a function named multiply_by_20. The function should accept an argument and display the product of its argument multiplied by 20

Answers

Answer:

def multiply_by_20(num):

   print(num * 20)

Explanation:

def multiply_by_20(num):

   print(num * 20)

# Testing the function here. ignore/remove the code below if not required

multiply_by_20(2)

multiply_by_20(7)

multiply_by_20(5)

In our discussion of Computer Hardware, we talked about three essential hardware components that are there inside every computer. Name them and explain the significance of each in the working of the computer. Why is a 64 bit processor better than a 32 bit processor

Answers

Answer:

CPU, RAM, and Storage

Explanation:

The three hardware components that are inside every computer and are essential for it to function are CPU, RAM, and Storage (HDD, SSD). CPU is basically the brain of the computer where everything is calculated. The RAM is the memory that stores temporary information. Lastly, the Storage device is where the entire operating system and persistent data will be saved and accessed from. 64-bit processors are better simply because they can access more memory at any given time and therefore allows it to manipulate more data at the same time.

Briefly describe the fundamental differences between project-based and product-based Software Engineering.

Answers

Answer:

Product-based companies make a specific product and try to market it as a solution. But project-based companies create a solution based on many products and sell it as a packaged solution to a particular need or problem.

Explanation:

hope this helps

Product firms make and try to market a certain product as a solution. But projects are creating a solution based on many product lines as well as selling them for specific needs or issues as such is.

Project-Based Software Engineering:

Software developers based on projects follow a service-oriented strategy. At one time, not only software but multiple projects are being developed, operated, and delivered. It accomplishes a software development process from requirement collection to testing and maintenance. It is carried out in compliance with implementation methods or specified period for achieving the software package meant for use.

Product-Based Software Engineering:

A product-based business is a venture that produces a product that may or might not have software connections. Even before resulted in a demand, it will create or design its goods or applications ahead of time. Once the product is produced or applied, it is opened up for market use and only works if a client meets specific requirements and needs. It is used to start creating some goods including Oracle, Adobe, Samsung, etc.

Learn more:

brainly.com/question/14725376

Other Questions
Need answers in 2 minutes ASAP Jillian bought 3 pounds of apples for $3.09 per pound. she then bought 6 pounds of peanuts for $0.87 per pound. How much did Jillian spend all together? Se o preo de 8 potes de nutella 288 reais, qual e o preo se 5 potes de Nutella Two closely related beetle species are in the same location. They exhibit reproductive isolation, and they are both diploid. Biologists are arguing about whether it is more likely that they evolved via sympatric or via allopatric speciation. What statement presents the best argument A line passes through the point (12,-4) and is perpendicular to the line with the equation y=6x +3 42 deliveries in 3 hours = deliveries per hour Asking yourself whether your mind is currently occupied by things that can take your concentration off the road is something you should do ______. Is 6272 a perfect square? If not find the smallest number by which it must be divided so that the product becomes a perfect square. What is the correct clases for this drugs Promethazineheelp me please What were key characteristics of Athenian democracy?Choose all answers that are correct. Though all citizens were equal, only the wealthy and well-born were likely to serve as jurors or council members.Paid juries of citizens heard legal cases and made decisions.Power was in the hands of the people and all citizens were equal before the law.Ten elected generals were responsible for carrying on the work of the Assembly and Council. Samuel takes 5 hours to make a table and a chair. He takes 9 hours to make 3 chairsand a table. How much time does he take to make a table? how would an anti-federalist most likely have responded to Hamilton's assertion solve: x^2-x-12x+5 0 vt cht tn ti khch quan hay ch quan? v sao? A uniform electric field of strength E points to the right. An electron is fired with a velocity v0 to the right and travels a distance d before coming to a stop. An second electron is then fired upwards through the same field at a velocity of v0. After the electron moving vertical has traveled vertically upwards a distance d, how far will it have moved horizontally? help me please urgent need In "The Yellow Wallpaper," Charlotte Perkins Gilman's choice of narrator and storystructure creates mystery in the story. Explain how the narrator and structure resultin mystery and eventually surprise in the text. Be sure to provide an introductionparagraph that lays out your argument, body paragraphs that develop your thesis,and a conclusion paragraph that wraps up your argument. (30 points) Traffic jams- people late for work and consequently they feel stressed Select one: O a causes O b. cause O c. make d. makes Why were iron tools more difficult to obtain than copper ones?O A. Iron requires a lot of sea salt.B. Iron requires ore, which is rare in Africa.C. Iron requires copper for smelting.D. Iron requires more advanced technology. Why were European traders from centuries ago attracted to India?