answer any one: write a computer program:which you know.​

Answers

Answer 1

hope this helps you.look it once

Answer Any One: Write A Computer Program:which You Know.

Related Questions

You want a cable that could be used as a bus segment for your office network. The cable should also be able to support up to 100 devices. Which cable should you use?

A.
RG-6
B.
RG-8
C.
RG-58U
D.
RG-59

Answers

Answer: C

Explanation:

is used for finding out about objects, properties and methods​

Answers

Answer:

science

Explanation:

What is the hamming distance between the following bits? Sent
bits: 101100111, Received bits: 100111001
Select one: 5. Or 3 or 6 or4​

Answers

I think

the hamming distance between the following bits its 5

Design a Python3 function to compare every prefix of a string X to every element of string Y, if there is a match, place it in a python set, sort and reversely sort the set, and return the sorted and reversely sorted sets.

Answers

Answer:

The function is as follows:

def compare_prefix(strX,strY):    

   prefix=set()

   for i in range(len(strX)):

       for j in range(i+1,len(strX)):

           chk =strX[i:j+1]

           if chk in strY:

               prefix.add(chk)

   

   sort_prefix = sorted(prefix)

   rev_sort_prefix = sorted(prefix,reverse=True)

   return(sort_prefix,rev_sort_prefix)

Explanation:

This defines the function

def compare_prefix(strX,strY):    

This creates an empty set, prefix

   prefix=set()

This iterates through each character in strX

   for i in range(len(strX)):

This iterates through every other character in strX

       for j in range(i+1,len(strX)):

This gets the prefix of strX by concatenating strings from i to j + 1

           chk =strX[i:j+1]

This checks if the prefix is in strY

           if chk in strY:

If yes, the string is added to set prefix

               prefix.add(chk)

   

This sorts prefix

   sort_prefix = sorted(prefix)

This reverses the sorted prefix

   rev_sort_prefix = sorted(prefix,reverse=True)

This returns the sorted and reversed prefix

   return(sort_prefix,rev_sort_prefix)

layers allow you to work with one element of an image without disturbing the others true or false​

Answers

I think it is True not sure but try it

Which of the following is the cause of transmission impairment?
Select one:
O Frequency
O Amplitude
O Attenuation
O Phase​

Answers

Answer:

attenuation is the third one

Write a program that lets the user perform arithmetic operations on fractions. Fractions are of the form a/b, in which a and b are integers and b is not equal to 0. Your program must be menu driven, allowing the user to select the operation ( , -, *, or /) and input the numerator and the denominator of each fraction. Furthermore, your program must consist of at least the following function

menu: This function informs the user about the program's purpose, explains how to enter data, how to quit and allows the user to select the operation.
addFractions: This function takes as input four integers representing the numerators and denominators of two fractions, adds the fractions, and returns the numerator and denominator of the result.
subtractFractions: This function takes as input four integers representing the numerators and denominators of two fractions, subtracts the fractions, and returns the numerator and denominator of the result.
multiplyFractions: This function takes as input four integers representing the numerators and denominators of two fractions, multiplies the fractions, and returns the numerator and denominator of the result.
divideFractions: This function takes as input four integers representing the numerators and denominators of two fractions, divides the fractions, and returns the numerator and denominator of the result.

Here are some sample outputs of the program:

3 / 4 +2 / 5 = 23 / 20
2 / 3 * 3 / 5 = 2 / 5

Answers

Answer:

Explanation:

The following code is written in Java, It asks the user to enter the numerator and denominator for both fraction 1 and 2. Then it prompts the user with a menu to choose the desired operation. The choice is passed into a switch statement and calls the correct function.

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       int num1, num2, den1, den2;

       System.out.println("Enter numerator for fraction 1: ");

       num1 = in.nextInt();

       System.out.println("Enter denominator for fraction 1: ");

       den1 = in.nextInt();

       System.out.println("Enter numerator for fraction 2: ");

       num2 = in.nextInt();

       System.out.println("Enter denominator for fraction 2: ");

       den2 = in.nextInt();

       System.out.println("Menu:");

       System.out.println("+ = add fractions");

       System.out.println("- = subtract fractions");

       System.out.println("/ = divide fractions");

       System.out.println("* = multiply fractions");

       String answer = in.next();

       switch (answer.charAt(0)) {

           case '+': add(num1, den1, num2, den2); break;

           case '-': subtract(num1, den1, num2, den2); break;

           case '*': multiply(num1, den1, num2, den2); break;

           case '/': divide(num1, den1, num2, den2); break;

       }

   }

   public static void add(int num1, int den1, int num2, int den2) {

       int num3 = (num1 * den2) + (num2 * den1);

       int den3 = den1 * den2;

       System.out.println("New Fraction: " + num3 + " / " + den3);

   }

   public static void subtract(int num1, int den1, int num2, int den2) {

       int num3 = (num1 * den2) - (num2 * den1);

       int den3 = den1 * den2;

       System.out.println("New Fraction: " + num3 + " / " + den3);

   }

   public static void divide(int num1, int den1, int num2, int den2) {

       int num3 = num1 * den2;

       int den3 = den1 * num2;

       System.out.println("New Fraction: " + num3 + " / " + den3);

   }

   public static void multiply(int num1, int den1, int num2, int den2) {

       int num3 = num1 * num2;

       int den3 = den1 * den2;

       System.out.println("New Fraction: " + num3 + " / " + den3);

   }

}

How are status reports useful

Answers

Answer:

Project managers use status reports to keep stakeholders informed of progress and monitor costs, risks, time and work. Project status reports allow project managers and stakeholders to visualize project data through charts and graphs.

Write a MIPS assembly language program that prompts for a user to enter a series of floating point numbers and calls read_float to read in numbers and store them in an array only if the same number is not stored in the array yet. Then the program should display the array content on the console window.
Consult the green sheet and the chapter 3 for assembly instructions for floating point numbers. Here is one instruction that you might use:
c.eq.s $f2, $f4
bc1t Label1
Here if the value in the register $f2 is equals to the value in $f4, it jumps to the Label1. If it should jump when the value in the register $f2 is NOT equals to the value in $f4, then it should be:
c.eq.s $f2, $f4
bc1f Label1
To load a single precision floating point number (instead of lw for an integer), you might use:
l.s $f12, 0($t0)
To store a single precision floating point number (instead of sw for an integer), you might use:
s.s $f12, 0($t0)
To assign a constant floating point number (instead of li for an integer), you might use:
li.s $f12, 123.45
To copy a floating point number from one register to another (instead of move for an integer), you might use:
mov.s $f10, $f12
The following shows the syscall numbers needed for this assignment.
System Call System Call System Call
Number Operation Description
2 print_float $v0 = 2, $f12 = float number to be printed
4 print_string $v0 = 4, $a0 = address of beginning of ASCIIZ string
6 read_float $v0 = 6; user types a float number at keyboard; value is store in $f0
8 read_string $v0 = 8; user types string at keybd; addr of beginning of string is store in $a0; len in $a1
------------------------------------------
C program will ask a user to enter numbers and store them in an array
only if the same number is not in the array yet.
Then it prints out the result array content.
You need to write MIPS assembly code based on the following C code.
-------------------------------------------
void main( )
{
int arraysize = 10;
float array[arraysize];
int i, j, alreadyStored;
float num;
i = 0;
while (i < arraysize)
{
printf("Enter a number:\n");
//read an integer from a user input and store it in num1
scanf("%f", &num);
//check if the number is already stored in the array
alreadyStored = 0;
for (j = 0; j < i; j++)
{
if (array[j] == num)
{
alreadyStored = 1;
}
}
//Only if the same number is not in the array yet
if (alreadyStored == 0)
{
array[i] = num;
i++;
}
}
printf("The array contains the following:\n");
i = 0;
while (i < arraysize)
{
printf("%f\n", array[i]);
i++;
}
return;
}
Here are sample outputs (user input is in bold): -- note that you might get some rounding errors
Enter a number:
3
Enter a number:
54.4
Enter a number:
2
Enter a number:
5
Enter a number:
2
Enter a number:
-4
Enter a number:
5
Enter a number:
76
Enter a number:
-23
Enter a number:
43.53
Enter a number:
-43.53
Enter a number:
43.53
Enter a number:
65.43
The array contains the following:
3.00000000
54.40000153
2.00000000
5.00000000
-4.00000000
76.00000000
-23.00000000
43.52999878
-43.52999878
65.43000031

Answers

Explanation:

Here if the value in the register $f2 is equals to the value in $f4, it jumps to the Label1. If it should jump when the value in the register $f2 is NOT equals to the value in $f4, then it should be

the shadows she fancied has tricked her. what does that mean

Answers

Answer: the room had been dark, she had not been able to see him clearly

Explanation:

The word FANCIED means desire or  fancied would mean supposed, believed, or imagined.

So it means that she might think that the shadow (assuming the shadow was a person who was invisible) was just her imagination or hallucination but in reality, the shadow (invisible person) tricked her.

_________________

Brainliest would be greatly appreciated!

_________________

#SpreadTheLove

#SaveTheTrees

- Mitsu JK

Write a Perl program that uses a hash and a large number of operations on the hash. For example, the hash could store people’s names and their ages. A random- number generator could be used to create three- character names and ages, which could be added to the hash. When a duplicate name was generated, it would cause an access to the hash but not add a new element. Rewrite the same program without using hashes. Compare the execution efficiency of the two. Compare the ease of programming and readability of the two.

Answers

Answer:

The Perl code is attached in the attachment. The execution time for using hashes is 0 seconds while that for without hash is 27 seconds.

Explanation:

In terms of ease of access and readability, both approaches are similar. However, it is evident from the time of execution that the with hashes is more efficient than the value of without hashes. This indicates that using hashes is more efficient.

Research and build a chroot jail that isolates ssh users who belong to the restrictssh group. (You will also need to create the restrictssh group). Next, install an ftp server and configure it to allow anonymous logins. Create a second chroot jail that can be accessed by the anonymous account. You will probably need to create several new user accounts to facilitate testing your setups.

Answers

Answer:

Explanation:

#!/bin/bash

# This script can be used to create simple chroot environment

# Written by LinuxConfig.org  

# (c) 2020 LinuxConfig under GNU GPL v3.0+

#!/bin/bash

CHROOT='/var/chroot'

mkdir $CHROOT

for i in $( ldd $* | grep -v dynamic | cut -d " " -f 3 | sed 's/://' | sort | uniq )

 do

   cp --parents $i $CHROOT

 done

# ARCH amd64

if [ -f /lib64/ld-linux-x86-64.so.2 ]; then

  cp --parents /lib64/ld-linux-x86-64.so.2 /$CHROOT

fi

# ARCH i386

if [ -f  /lib/ld-linux.so.2 ]; then

  cp --parents /lib/ld-linux.so.2 /$CHROOT

fi

echo "Chroot jail is ready. To access it execute: chroot $CHROOT"

list the main industries in Sierra Leone​

Answers

Answer:

The main industries in Sierra Leone are: Diamond mining

Petroleum refining

Small - scale manufacturing (beverage, textiles,footwear)

Explanation:

They also engage in commercial ship repair

The following code segment appears in a class other than Backyard. It is intended to print true if b1 and b2 have the same lengths and widths, and to print false otherwise. Assume that x, y, j, and k are properly declared and initialized variables of type int.

Backyard b1 = new Backyard(x, y);
Backyard b2 = new Backyard(j, k);
System.out.println( /* missing code */ );

Which of the following can be used as a replacement for /* missing code */ so the code segment works as intended?

a. b1 == b2
b. b1.equals(b2)
c. equals(b1, b2)
d. b1.equals(b2.getLength(), b2.getWidth())
e. b1.length == b2.length && b1.width == b2.width

Answers

Answer:

b. b1.equals(b2)

Explanation:

The question has a missing source file (which can be found online).

The function that compares b1 and b2 is:

public boolean equals(Object other) {

if (other == null) {

return false; }

Backyard b = (Backyard) object;

return (length == b.getLength() && width == b.getWidth());

}

Using the function definition, we have:

equals(Object other)

This implies that, the first object will be compared to the second, using the function name.

i,e,

b1.equals(b2)

Hence (b) is correct

In this exercise we have to use the knowledge in computational language in C++ to describe a code that best suits, so we have:

The code can be found in the attached image.

To make it simpler we can write this code as:

public boolean equals(Object other) {

if (other == null) {

return false; }

Backyard b = (Backyard) object;

return (length == b.getLength() && width == b.getWidth());

}

This program will result in the following missing variable:

b1.equals(b2)

See more about C++ at brainly.com/question/19705654

What is the function of a bread crumb trial in a website

Answers

Answer:

A “breadcrumb” (or “breadcrumb trail”) is a type of secondary navigation scheme that reveals the user's location in a website or Web application. The term comes from the Hansel and Gretel fairy tale in which the two title children drop breadcrumbs to form a trail back to their home.

Explanation:

A breadcrumb or breadcrumb trail is a graphical control element frequently used as a navigational aid in user interfaces and on web pages. It allows users to keep track and maintain awareness of their locations within programs, documents, or websites. Breadcrumbs make it easier for users to navigate a website – and they encourage users to browse other sections of the site. ... You head to their site and end up on The Nestle company history page. Using their breadcrumbs, you can easily navigate back to About Us, History, or even their home page.

Which statement best describes Link State routing? Group of answer choices Each router builds a cost-weighted graph of the network of all the routers and the shortest links between them, based on information received from each router regarding only its nearest neighbors All of these Each router uses a HELLO packet to announce its presence to its neighbors Each router builds a table with the best distance between each router and the link to use, based on each router’s providing data on distances to all the routers in its routing table to its nearest neighbors

Answers

Answer:

Each router builds a cost-weighted graph of the network of all the routers and the shortest links between them, based on information received from each router regarding only its nearest neighbors.

Explanation:

A routing protocol can be defined as a set of defined rules or algorithms used by routers to determine the communication paths unto which data should be exchanged between the source router and destination or host device.

Additionally, in order for packets to be sent to a remote destination, these three parameters must be configured on a host.

I. Default gateway

II. IP address

III. Subnet mask

After a router successfully determines the destination network, the router checks the routing table for the resulting destination network number. If a match is found, the interface associated with the network number receives the packets. Else, the default gateway configured is used. Also, If there is no default gateway, the packet is dropped.

Basically, there are two (2) main categories of routing protocols used in packet switching networks and these includes;

1. Distance-vector routing.

2. Link state routing.

Link state routing refers to a complex routing technique in which each router learns about it's own neighborhood or directly connected networks (links) and shares the information with every other router present in the network.

Hence, the statement which best describes Link State routing is that, each router builds a cost-weighted graph of the network of all the routers and the shortest links between them, based on information received from each router regarding only its nearest neighbors. Some examples are intermediate system to intermediate system (IS-IS) and open shortest path first (OSPF).

Which keyboard shortcut do we use to turn on APC?​

Answers

Answer:

ctrl p I gusse hop it helps

bye know have a great day

Explanation:

NEED HELP IMMEDIATELY!!
Highlight the upsides and downsides of seeking online help for a technical problems.

Answers

Answer:

Pros: Experts are there to help, Help can be found almost 24 hours of the day so you don't have to wait for an expert to be available, easier to ask more in detail.

Cons: Answers may not always come quickly, there is no face to face interaction so you dont know how legit the person is, some advice may be incorrect or old.

Explanation:

A new school is being built in the local school district.It will have three computer labs with 28 computers each. There will be 58 classrooms with 2 computers each that need to be on one sub-subnet.The office staff and administrators will need 7 computers. The guidance and attendance office will have 5 computers. The school has been given the address 223.145.75.0/24. Subnets are assigned from largest to smallest. Everything is based on the number of usable hosts.
Complete the information required below.
Subnet Subnet Mask (/X) Subnet First Usable Last Usable Broadcast
Address Host Host Address
1
2
3
4
5
6
7

Answers

Answer:

Following are the responses to the given question:

Explanation:

The subnet mask /25 could be the host 128 hosts.

The subnet mask /26 could be the host 64 hosts.

The subnet mask /27 could be the host 32hosts.

The subnet mask /28 could be the host 16 hosts.

The subnet mask /29 could be the host 8 hosts.

The subnet mask /30 could be the host 4 hosts.

It is based on the requirement in which I have been using /25,/27,/28,/29 subnet masks on the basis of the usable slots.

Write a program that lets a maker of chips and salsa keep track of sales for five different types of salsa: mild, medium, sweet, hot, and zesty. The program should use two parallel 5-element arrays: an array of strings that holds the five salsa names and an array of integers that holds the number of jars sold during the past month for each salsa type. The salsa names should be stored using an initialization list at the time the name array is created. The program should prompt the user to enter the number of jars sold for each type. Once this sales data has been entered, the program should produce a report that displays sales for each salsa type, total sales, and the names of the highest selling and lowest selling products.

Answers

Answer:

The program in Java is as follows:

import java.util.*;

public class Main{

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 String [] salsa = {"Mild","Medium","Sweet","Hot","Zesty"};

 int [] number = new int[5];

 for(int i = 0;i<5;i++){

     System.out.print(salsa[i]+" number: ");

     number[i] = input.nextInt();

 }

 for(int i = 0;i<5;i++){

     System.out.println(salsa[i]+" : "+number[i]);

 }

 int smallest = number[0];  int highest = number[0];

 int count = 0;

 for(int i = 0;i<5;i++){

     if(smallest > number[i]){

         smallest = number[i];

         count = i;

     }

 }

 System.out.println("Smallest");

 System.out.println(salsa[count]+" : "+smallest);

    for(int i = 0;i<5;i++){

     if(highest < number[i]){

         highest = number[i];

         count = i;

     }

 }

 System.out.println("Highest");

 System.out.println(salsa[count]+" : "+highest);

}

}

Explanation:

This initializes the salsa names

 String [] salsa = {"Mild","Medium","Sweet","Hot","Zesty"};

This declares the array for the amount of salsa

 int [] number = new int[5];

This iterates through the 5 salsas and get input for the amount of each

 for(int i = 0;i<5;i++){

     System.out.print(salsa[i]+" number: ");

     number[i] = input.nextInt();

 }

This prints each salsa and the amount sold

 for(int i = 0;i<5;i++){

     System.out.println(salsa[i]+" : "+number[i]);

 }

This initializes smallest and largest to the first array element

 int smallest = number[0];  int highest = number[0];

This initializes the index of the highest or lowest to 0

 int count = 0;

The following iteration gets the smallest of the array elements

 for(int i = 0;i<5;i++){

     if(smallest > number[i]){

         smallest = number[i];

This gets the index of the smallest

         count = i;

     }

 }

This prints the smallest

 System.out.println("Smallest");

 System.out.println(salsa[count]+" : "+smallest);

The following iteration gets the largest of the array elements    

for(int i = 0;i<5;i++){

     if(highest < number[i]){

         highest = number[i];

This gets the index of the highest

         count = i;

     }

 }

This prints the highest

 System.out.println("Highest");

 System.out.println(salsa[count]+" : "+highest);

SMTP (Simple Mail Transfer Protocol) is the standard protocol for transferring mail between hosts over TCP. A TCP connection is set up between a user agent and a server program. The server listens on TCP port 25 for incoming connection requests. The user end of the connection is on a TCP port number above 1023. Suppose you wish to build a packet filter rule set allowing inbound and outbound SMTP traffic. You generate the following rule set:

Rule Direction Src Addr Dest Addr Protocol Dest Port Action
A In External Internal TCP 25 Permit
B Out Internal External TCP >1023 Permit
C Out Internal External TCP 25 Permit
D In External Internal TCP >1023 Permit
E Either Any Any Any Any Deny

Required:
Describe the effect of each rule.

Answers

Answer:

The five rules are described as follows:

Rule A permits the inbound Simple Mail Transfer Protocol (SMTP) connection.

Rule B permits the inbound Simple Mail Transfer Protocol (SMTP) connection.

Rule C permits the outbound Simple Mail Transfer Protocol (SMTP) connection.

Rule D permits the outbound Simple Mail Transfer Protocol (SMTP) connection.

Rule E does not perform any action. Thus it is when the action is denied.

Explanation:

Rule A allows information transfer of the incoming email from the external server to the internal remote server, thus this allows an inbound connection.

Rule B allows information transfer of the incoming email from the remote server to the external remote server, thus this allows an inbound connection.

Rule C allows information transfer of outgoing email from the external server to the internal remote server, thus this allows an outbound connection.

Rule D allows information transfer of the outgoing email from the remote server to the external remote server, thus this allows an outbound connection.

Rule E does not allow any action in either direction thus it is when action is denied.

A new school is being built in the local school district. It will have three computer labs with 28 computers each. There will be 58 classrooms with 2 computers each that need to be on one sub-subnet. The office staff and administrators will need 7 computers. The guidance and attendance office will have 5 computers. The school has been given the address 223.145.75.0/24.

Complete the information required below.

Subnet Subnet Mask (/X) Subnet Address First Usable Host Last Usable Host Broadcast Address
1

2

3

4

5

6

7

8

9

10

Answers

Answer:

The table is formed as attached figure.

Explanation:

Subnets can use specific number of hosts so /25 can host 128 hosts, reducing by a factor of 2 leading to /30 as with only 4 hosts. Thus the subnets are alloted as indicated in the attached image.

How to make a project using PID and thermacouple

Answers

Explanation:

Required tools and components:

Soldering iron

Solder

Flux pen

Fine gauge solder (23 gauge or finer)

Wire cutter

MAX31855 thermocouple interface chip (available directly from Maxim Integrated)

Thermocouple with junction suitable for your application (e.g., probe, washer, etc.)

J-type (-40°C to +750°C)

K-type (-200°C to +1350°C)

T-type (-200°C to +350°C) Solid state relay (will depend on your application)

USB FTDI 5V cable (Note: A single cable can be used for many different microcontroller projects)

Computer with Arduino IDE v1.0

Wall-wart 9V/1.5A, 2.1mm center positive

help meeeee pleaaaseee ​

Answers

Answer:

just drop out that the easiest solution

Which tab should you click if you want to access the Show All Comments option in a worksheet?

Home
Page Layout
Review
View

Answers

Answer: Review

Because you want to review the comments

Answer:

C.) Reivew

Explanation:

Doing it on EDG now!

Best luck to yall :3

Have a good day and byee

what connect webpages?​

Answers

Anchor tags or hyperlinks are used to connect webpages.

Answer:

"Hypertext links are those words that take you from one web page to another when you click them with your mouse. Although the same HTML tag you study in this hour is also used to make graphical images into clickable links, graphical links aren't explicitly discussed here" I got this from https://www.informit.com/articles/article.aspx?p=440289 sorry I couldnt take the time myself here to help :(

Explanation:

One way to add a table to a presentation is to click on Clip Art under the Insert tab. click on WordArt under the Insert tab. right-click on an existing page with content and choose Add Table. add a new slide and left-click on the Table symbol in an empty area.

Answers

Huh? What is this? …..

Describe how being a global citizen in the world of advanced technology can be beneficial to your success in meeting your personal, academic, and professional goals.

Answers

Answer:

well you could have more options of careers and more possibilities, online jobs can pay more and give more experience to the employees

A field is a group of related records that can be identified by the user with a name, type, and size.

Answers

Answer: False

Explanation:

The statement that a field is referred to as a group of related records which can be identified by the user with a name, type, and size is wrong.

The above definition represents a table. The group of related records is referred to as a table. On the other hand, a field refers to a set of data values, which are of identical data type.

Theo is working on data for his business using Design view in an Access form. He wants to change a text field box's
number of products sold from 10,789 to 10,790. In which section of the form should Theo to make this change?
form footer
O form detail
form data
form header

Answers

Answer: the answer si b . form detail

Explanation

Answer:

the answer is b . form detail

Explanation:

Other Questions
1. What was the first area in western Virginia to be settled?2. Where is the dividing line between eastern and westernWest Virginia?3. In what region is West Virginia's largest county in area? The following graph shows a decay chain. Which part of the decay will take the most time? the decay of U-238 to Th-234, the decay of Th-234 to Ra-226, the decay of Ra-226 to Po-214, the decay of Po-214 to Pb-206 1) Which equation is true?0.7 : 0.35 = 20.35 : 0.7 = 50.5 : 0.35 = 70.1 : 0.35 = 0.35 Helpppppp againnn plzzz Attachment.need words 20 what three types of electromagnetic waves carry most of the sun's energy that strikes Earth. Do Not Send Me A Link. Please help me with this.(NO FILES OR LINKS AS YOUR ANSWER, I CAN'T DOWNLOAD THEM) please help to find a5 from the above question Chief Joseph of the Noz Perce Indians made this speech of surrender to the US Army after attempting to cross the border into Canadarather than move to a reservation After traveling for more than 1000 miles and fighting the army all along the way, the remainingmembers of the tribe were trapped and defeated 40 miles from the Canadian borderSince that 1877 event, what Joseph said or didn't say after he handed his rifle to Colonel Milos has been disputed - possibly the longestdispute over a text in western American literature. CES Wood, the 25-year old aide-de-camp of General Howard, publicly claimed all hislife that he wrote down verbatim a 155 word (+ -) speech given by Chief Joseph after he handed over his nfle. No one at Bear's Paw thatday including General Howard - ever published anything corroborating Wood's text. While he had varying degrees of editorial controlover the nineteen versions of the speech published between 1877 and 1939. Wood also revised the text, speaker, and contexts. AfterWood's death in 1944, historians doubting Wood's truthfulness became more explicit, even though the "Surrender Speech' hadbecome nationally accepted as authentic Native American oratoryOctober 5, 1877I am tired of lighting Our chiefs are killed Looking Glass is deadToohuthulsoto is doad The old men are all dead It is the young men who say yes or noHe who led the young men is deadIt is cold and we have no blankets The little children are freezing to death My people, some of them have run away to the hills and have no blankets no food. No one knows where they are perhaps freezing to death. I want to have time to look for my children and see how many I can find. Maybe I shall find them among dead. Hear me my chiefs I am tired my heart is sick and sad from where the sun now stands I will fight no moreQuestions:Part AWhich of the following is an advantage of Passage 1 in presenting the topic of Chief Joseph's surrender over viewing Passage 2?O Passage 1 emphasizes the dramatic standoff between Chief Joseph and the US ArmyO Passage 1 highlights Chief Joseph's desperation to find his family who fled into the hills.Passage 1 visualizes how emotionally difficult it was for Chief Joseph to accept surrender.O Passage 1 provides the distressing circumstances of Chief Joseph's submission to the US army.Part B.Select two phrases from Passage 1 that support the evaluation selected in Part A"rather than move to a reservation (paragraph 1)O "trapped and defeated 40 miles from the Canadian border" (paragraph 1)"publicly claimed all his life that he wrote down verbatim a 155-word speech" (paragraph 2)"historians doubting Wood's truthfulness became more explicit" (paragraph 2)"No one knows where they are" (paragraph 4)Questions:Complete the table by evaluating the advantages and disadvantages of viewing Passage 2 when considering the information presented in speech Passage 1Advantage DisadvantageWatching the interaction between the Chief and US army allows the viewer to fool the tension between the two parties.[A or D]Watching the video allows the viewer to disregard the historical context for which the Chief gave his speech. [A or D]Listening to the Chief's speech allows the viewer to feel the emotional impact of the speaker's resignation. [A or D] Which of the following describes the sequence of events leading up to the United States involvement in World War II? A. Germany was invading other European countries, the Allies declared war on Germany, Roosevelt signed the Lend-Lease Act but still refused to enter the war, Pearl Harbor was attacked, the United States entered the war. B. Germany defeated and took control of France, then attacked Great Britain for months before defeating it as well, Roosevelt still refused to enter the war, then the Japanese attacked Pearl Harbor, the United States entered the war. C. France invaded Germany but failed to defeat the army there, Germany then invaded Great Britain and gained control over it, Roosevelt told the Allies the United States would enter the war to help them defeat the Axis Powers. D. Great Britain attacked Germany in response to an assassination, France and Poland were invaded by Italy, Roosevelt was opposed to entering another European war, Japan attacked Pearl Harbor, the United States entered the war.please help! :(thank you :) Janelle (age 12 ) and her cousin, marquita (age14 ) , go to 7:00 P.M show generate an equivalent expression for the total cost of admission. What is the total cost 1.) how are arthropods vital to fruit crops?2.) how are earth worms important? Is oil a reasonable energy source? Why or why not? Joan deposits $20,000 into a savings account that pays 4% annual interest compounded monthly. What will be the value of her deposit in 8 years? Read the passage from The American Plague.Finally, Washington turned to Attorney General Edmund Randolph. As the nation's chief law official and legal counsel of the United States, Randolph was someone whose opinion held great weight. In a delicately worded letter, Randolph told Washington that no, the president could not move Congress, even in an emergency. "It seems to be unconstitutional," Randolph noted.Which sentence contains the central idea of the passage?Finally, Washington turned to Attorney General Edmund Randolph.As the nation's chief law official and legal counsel of the United States, Randolph was someone whose opinion held great weight.In a delicately worded letter, Randolph told Washington that no, the president could not move Congress, even in an emergency."It seems to be unconstitutional," Randolph noted. Which word has a stronger connotation than the word mad? what reaction type is 4+224+22 Mark and eight of his friends went out toeat. They decided to split the bill evenly.Each person paid $9. What was the totalbill? ggghhhhhhhhhhhhjujjj Im marking as Brainliest! Answer the following questions!