A University Web server has 7 main components, each with the same reliability, each of the 7 main components of the University Web server must have a reliability of approximately 99.7% for the overall system to achieve a reliability of 94%.
We can use the idea of "reliability in series" to ascertain each component's level of reliability.
In this instance, the reliability of all 7 components will be multiplied together because they are all necessary for the server to operate.
Let's write the dependability of each component as "R." Since all parts are equally reliable, we can construct the following equation:
\(R^7\) = 0.94
To solve for R, we take the seventh root of both sides of the equation:
R = \(0.94^{(1/7)\)
R ≈ 0.997 or 99.7%.
Therefore, for the total system to attain a dependability of 94%, each of the University Web server's 7 primary components needs to have a reliability of about 99.7%.
For more details regarding reliability, visit:
https://brainly.com/question/29886942
#SPJ4
Which of the following is an example of an application ?
A person who leads a
group uses
skills.
Answer:
He uses skills to make sure he is good leader
Explanation:
In the function problem 1d, run 20 games of a random agent versus your alpha-betacutoff agent, with each agent playing 10 times as X and 10 times as O. Have the
function return its results as a tuple containing wins as X as the first item, and wins as
O as the second item. So if your agent wins every single game, it will return (10,10)
With each agent playing 10 times as X and 10 times as O, the function issue 1d should run 20 games between a random agent and an alpha-betacutoff agent. The function must produce a tuple with the victories represented as X.
How does a function return a tuple?Any object, even a tuple, can be returned by a Python function. Create the tuple object within the function body, then assign it to a variable called your tuple if you want to return a tuple.
Which operator gives back a tuple that has every element from the first and second tuple objects?Tuple objects are a type of sequence just like strings. As a result, the tuple can employ the same operators that are used with strings. The "plus" sign returns a tuple with all the items.
To know more about function visit:-
https://brainly.com/question/28939774
#SPJ1
In what ways is the information provided by a line-item budget useful to the following:
Program manager
Department head
Central budget office
Elected officials
Citizens
How would one substantially address how this information is useful to each entity listed above.
A line-item budget provides useful information to program managers, department heads, central budget offices, elected officials, and citizens by offering a detailed breakdown of expenses, facilitating accountability, and enabling informed decision-making.
A line-item budget is a financial document that outlines specific expenditure categories and allocated amounts. It is useful to program managers as it allows them to track expenses and ensure that funds are allocated appropriately for their respective programs.
By providing a detailed breakdown of expenses, program managers can effectively manage their budgets, identify areas of overspending or underspending, and make necessary adjustments to optimize resource allocation.
For department heads, the information provided by a line-item budget is essential for monitoring and controlling departmental expenditures. It enables them to assess the financial health of their departments, identify cost-saving opportunities, and ensure compliance with budgetary guidelines.
With this information, department heads can make informed decisions regarding resource allocation, staffing, and program priorities.
Central budget offices rely on line-item budgets to consolidate and analyze financial data from various departments or programs. This information helps them establish a comprehensive overview of the organization's finances, identify trends, and develop long-term financial strategies.
Line-item budgets enable central budget offices to allocate funds strategically, align spending with organizational goals, and ensure efficient use of resources.
Elected officials, such as members of a legislative body or governing board, benefit from line-item budgets as they provide transparency and accountability. By reviewing the detailed breakdown of expenditures, elected officials can assess the effectiveness and efficiency of government programs or organizational initiatives. This information enables them to make informed decisions during budgetary discussions, prioritize funding for critical areas, and hold program managers and department heads accountable for their financial management.
Citizens also find value in the information provided by line-item budgets. It promotes transparency and allows them to understand how public funds are allocated and spent. By having access to a detailed breakdown of expenses, citizens can assess the priorities of their government or organization, hold elected officials accountable for budgetary decisions, and actively participate in discussions regarding resource allocation.
Overall, a line-item budget serves as a valuable tool for program managers, department heads, central budget offices, elected officials, and citizens. It offers a detailed breakdown of expenses, facilitates accountability, and enables informed decision-making, ultimately contributing to efficient resource allocation and effective financial management.
Learn more about line-item budget
brainly.com/question/32249432
#SPJ11
Precisez la nature de l'information logique ou analogique pour chaque exaple ci dessous
Answer:
Bonjour pourriez vous m'aider svp ?
Précisez la nature de l'information (logique ou analogique pour chaque exemple ci dessous:
a) poids
b) conformité d'une pièce de monnaie
c) niveau d'eau dans une bouteille
d)porte ouverte ou fermée
e) force de pression
f) présence d'une personne dans une pièce
g)position angulaire
h) température inférieur ou supérieur à 15°C
i) vitesse du vent
j) présence de matériaux métallique à proximité
suppose we used an Internet Addressing protocol that used 4 bits to encode a single address. How many devices would be supported on the Internet? How many unique addresses would be there ?
A. 4
B. 8
C. 16
D. 32
The number of unique addresses that would be there is 16.
Firstly, it should be noted that an internet protocol refers to the protocol which defines the structure of an internet address and then assigns a unique address to the device that is on the internet.
It should be noted that one bit can support four addresses. Therefore, the number of unique addresses that would be in 4 bits will be 16.
Read related link on:
https://brainly.com/question/17128378
e. What is computer memory? Why does a computer need primary memory?
Computer memory refers to the storage space in a computer where we can temporarily or permanently store data and instructions. There are two categories: primary memory and secondary memory.
Why a computer needs primary memory?A computer needs primary memory because it allows it to access and process the data and instructions it needs quickly.
The computer's operating system uses primary storage to manage memory allocation and determine which stores data and instructions in primary memory and which should move to secondary memory.
It is also sufficient for storing the data and instructions that the computer is currently using and enables programs to run efficiently.
ANSWER ASAP PLEASE, 100 POINTS. Xavier wants to print the slides of his PowerPoint presentation to practice and make notes but doesn't want to use too much ink or paper. What print option should Xavier use?
A: Print Full Page Slides
B: Print Handouts
C: Print Notes Pages
D: Print Presentation
Answer:
c
Explanation:
The print option should Xavier use is print Notes Pages. Hence option C is correct.
What is print?Print is defined as a computer sending information to a printer, which creates a hard copy (printed copy) of the information being printed. Not only are books and newspapers printed, but also textiles, plates, wall coverings, packaging, and billboards. It has also been used in the creation of small electrical circuits. The general consensus is that print media is more reliable than digital media.
Each presentation slide and your notes are included on the notes pages. Every slide has its own notes page when printed. Your notes are attached to the slide. Your notes pages can contain information, such as graphs and pictures.
Thus, the print option should Xavier use is print Notes Pages. Hence option C is correct.
To learn more about print, refer to the link below:
https://brainly.com/question/14668983
#SPJ3
1
2 points
When might an organization use a WAN?
When it has a network with very low
bandwidth
When large files are sent frequently over its
network
When a wide variety of devices are in its
network
When it has multiple locations that are far
apart
An organization might use a Wide Area Network (WAN) in several situations.
WANs are designed to connect geographically dispersed locations over long distances, often using public or private telecommunication links. If an organization has a network with low bandwidth, such as limited capacity for data transmission, a WAN can help improve connectivity and facilitate data transfer between different locations.
If an organization frequently needs to send large files across its network, a WAN can provide the necessary infrastructure to handle the high volume of data and ensure efficient transmission. WANs typically offer higher bandwidth and optimized routing for such file transfers, enabling faster and reliable delivery.
Learn more about Wide Area Network on:
https://brainly.com/question/18062734
#SPJ1
Can someone show me how to do these in excel?
Project X has an initial cost of $19,800 and a cash inflow of
$25,000 in Year 3. Project Y costs $40,700 and has cash flows of
$12,000, $25,000, and $10,0
In Excel, create a spreadsheet with columns for projects, initial costs, and cash inflows. Use the SUM function to calculate net cash flows for each project in specific years.
What are the steps?1. Open Microsoft Excel and create a new spreadsheet.
2. In column A, enter the headings "Project" and list the projects as "X" and "Y" in thesubsequent cells.
3. In column B, enter the heading "Initial Cost" and enter the values $19,800 and $40,700 in the corresponding cells.
4. In column Center the heading "Cash Inflows" and enter the values $0, $0, $25,000 for Project X and $12,000, $25,000,$10,000 for Project Y.
5. To calculate the net cash flow for each project in a specific year, you can use the SUM function. For example,in cell D2, you can enter the formula "=SUM(C2:C3)" to calculate the net cash flow for Project X in Year 3.
6. Repeat the SUM functionfor the remaining years and projects to calculate their respective net cash flows.
Learn more about Excel at:
https://brainly.com/question/29985287
#SPJ4
you use a linux distribution that uses rpm for package management. which command would you use to display a list of all packages available for installation within the internet repositories configured on the system?
Entering yum listing available at the command line will display the online repositories that this machine is set to utilise for yum on a Linux distribution which use RPM for package management.
What do Linux rpms stand for?Red Redhat Package Manager is referred to as RPM. It was created by Red Hat and therefore is primarily used with Linux operating systems that are Red Hat-based (Fedora, CentOS, RHEL, etc.). An RPM package is a package (a collection) of various files that has the.rpm extension.
Are Yum and RPM the same?RPM is independent and uses its very own database to store details about the packages that have been installed. The front tool is called YUM maintains products using the RPM package manager. The backend of the tool also makes usage of the RPM database.
To know more about Linux rpm visit:
https://brainly.com/question/15122141
#SPJ4
Silas is planning on configuring various default options in PowerPoint 2016. Which tab will provide him with the ability to modify the AutoCorrect options?
General
Save
Proofing
Language
Answer:
Proofing
Explanation:
C: Proofing
Selma needs to ensure that users who have access to her presentation are unable to make changes to the presentation. What should she do?
1. Apply password protection and only distribute the read-only password.
2. Use the Mark as Final feature
3. Restrict access to the presentation at the file server
4. Use the Protected View option.
Answer:
A
Explanation:
took the test...
She should apply for password protection and only distribute the read-only password. The correct option is 1.
What is a presentation?A PowerPoint presentation is a function of Microsoft. It is used to make presentations in an easy and innovative way. They made the presentation of data in meetings very easy and in an arranged form.
There are many more functions of Microsoft that are used for multiple purposes like calculating high calculations, and making files, paragraphs, and resumes. These functions are word and excel. They work on computers.
Selma must take precautions to prevent users from altering her presentation once they gain access to it.
Therefore, the correct option is 1. Apply for password protection and only distribute the read-only password.
To learn more about the presentation, refer to the link:
https://brainly.com/question/649397
#SPJ2
a stored program that is attached to a table or view is called ________.
The stored program that is attached to a table or view is called a database trigger. It is a type of stored procedure in a database management system that automatically initiates a specific action when a particular event or transaction occurs.
The trigger can be used to enforce business rules, perform data validation, maintain data integrity, or synchronize related tables.
A trigger is defined with a specific event, such as INSERT, UPDATE, or DELETE, that occurs on a table or view. When the event occurs, the trigger's code is executed, which can include SQL statements or calls to other stored procedures. A trigger can be either a row-level trigger, which is executed once for each affected row, or a statement-level trigger, which is executed once for each affected statement.
Triggers are commonly used in database applications to enforce complex data constraints that cannot be achieved with simple constraints or referential integrity. They can also be used to automate database maintenance tasks, such as updating summary tables, generating audit records, or sending notifications. Overall, triggers provide a powerful mechanism for customizing database behavior and ensuring data consistency.
Learn more about database management system here:-
https://brainly.com/question/13467952
#SPJ11
High performance work systems: Select one: a. are separated by time, geographic distance, culture and/or organizational boundaries b. use HR metrics such as productivity and absenteeism that are accessible by employees and managers through the company intranet or human resource information system c. involve line employee that are trained to specialize in individual tasks. d. use employees who communicate directly with suppliers and customers. e. maximize the fit between the company's social system (employees) and technical system.
High-performance work systems strive to create a synergistic relationship between the social and technical aspects of an organization, leading to higher levels of productivity, efficiency, and overall success. The correct answer is option E.
High performance work systems (HPWS) are a set of human resource practices designed to enhance organizational performance and productivity. Of the given options, option E - maximizing the fit between the company's social system (employees) and technical system - is the correct answer. HPWS aim to align the social and technical systems of an organization to achieve maximum performance. This involves ensuring that employees are trained and equipped with the necessary skills and knowledge to perform their tasks effectively, and that the technical systems and processes are designed to support their work. In conclusion, high performance work systems focus on optimizing the fit between the social and technical systems of an organization to achieve maximum performance and productivity. By investing in employee training and development and designing efficient technical systems, organizations can create a culture of high performance and achieve their business goals.
To learn more about synergistic relationship, visit:
https://brainly.com/question/29486967
#SPJ11
Write a function in c++ named kineticenergy that accepts an object’s mass (in kilograms) and velocity (in meters per second) as arguments. the function should return the amount of kinetic energy that the object has. demonstrate the function by calling it in a program that asks the user to enter values for mass and velocity.
the following formula can be used to determine a moving object’s kinetic energy:
ke – ½ mv2
the variables in the formula are as follows: ke is the kinetic energy, m is the object’s mass in kilograms, and v is the object’s velocity, in meters per second.
The kineticenergy function takes the mass and velocity of an object as arguments, calculates the kinetic energy using the formula given in the question, and returns the value of ke. This function can be used to calculate the kinetic energy of any moving object, making it a useful tool for physics calculations.
To write the function that accepts the mass and velocity of an object as arguments and then uses the above formula to calculate the kinetic energy of the object. The function will then return the value of the kinetic energy.
Here is an example of what the function might look like:
#include
using namespace std;
double kineticenergy(double mass, double velocity) {
double ke = 0.5 * mass * velocity * velocity;
return ke;
}
int main() {
double mass, velocity;
cout << "Enter the mass of the object in kilograms: ";
cin >> mass;
cout << "Enter the velocity of the object in meters per second: ";
cin >> velocity;
double ke = kineticenergy(mass, velocity);
cout << "The kinetic energy of the object is " << ke << " Joules." << endl;
return 0;
}
In the above program, we first declare the function named kineticenergy that takes two arguments - mass and velocity. The function uses the formula given in the question to calculate the kinetic energy and returns the value of ke.
In the main function, we ask the user to enter the mass and velocity of the object. We then call the kineticenergy function and pass it the values entered by the user. The function returns the calculated kinetic energy, which we store in the variable ke. Finally, we display the value of ke to the user.
To know more about kinetic energy visit:
https://brainly.com/question/14993089
#SPJ11
100 POINTS
What is the value of zebra after these Java statements execute?
String quote = "She sells sea shells";
String zebra = quote.replace( "sh" , "b" );
After these Java statements execute, the value of zebra would be:
"Se bells sea bells"
What is a Java Statement?In Java, a statement is a single line of code that performs a specific action or task. It can include expressions, variables, method calls, and other components.
With regard to the above code, the replace() method replaces all occurrences of the first string (in this case "sh") with the second string (in this case "b") in the original string (in this case "She sells sea shells").
Therefore, "She sells sea shells" becomes "Se bells sea bells" in the variable zebra.
Learn more about Statement on:
https://brainly.com/question/30457076
#SPJ1
define client and.server
Answer:
Client-server model is a model is a distributed application structure that partitions
tasks or workloads between the providers of a resource or service, called servers, and service requesters, called clients.
Houston-based Advanced Electronics manufactures audio speakers for desktop computers. The following data relate to the period just ended when the company produced and sold 42,000 speaker sets: Sales Variable costs Fixed costs $3,444,000 861,000 2,250,000 Management is considering relocating its manufacturing facilities to northern Mexico to reduce costs. Variable costs are expected to average $20.00 per set; annual fixed costs are anticipated to be $1,990,000. (In the following requirements, ignore income taxes.) Required: 1. Calculate the company's current income and determine the level of dollar sales needed to double that figure, assuming that manufacturing operations remain in the United States. 2. Determine the break-even point in speaker sets if operations are shifted to Mexico. 3. Assume that management desires to achieve the Mexican break-even point; however, operations will remain in the United States. a. If variable costs remain constant, by how much must fixed costs change? b. If fixed costs remain constant, by how much must unit variable cost change? 4. Determine the impact (increase, decrease, or no effect) of the following operating changes. Complete this question by entering your answers in the tabs below. Required 1 Required 2 Required 3 Required 4 Calculate the company's current income and determine the level of dollar sales needed to double that figure, assuming that manufacturing operations remain in the United States. (Do not round intermediate calculations and round your final answers to nearest whole dollar.) Current income Required dollar sales < Required 1 Required 2
To calculate the company's current income, we need to subtract the variable costs and fixed costs from the sales revenue. Given that the sales revenue is \($3,444,000\), the variable costs are \($861,000\), and the fixed costs are \($2,250,000\), we can calculate the current income as follows.
\(Current income = Sales revenue - Variable costs - Fixed costs\)
\(Current income = $3,444,000 - $861,000 - $2,250,000\)
\(Current income = $333,000\)
To determine the level of dollar sales needed to double that figure, we need to multiply the current income by 2. Therefore:
\(Required dollar sales = Current income * 2\)
\(Required dollar sales = $333,000 * 2\)
\(Required dollar sales = $666,000\)
To know more about company's visit:
https://brainly.com/question/30532251
#SPJ11
What type of device gathers data and converts them into electronic form for use by the computer? san input device optical storage magnetic storage output device
input devices, examples are keyboard, mouse
In this design problem you will create a VI that simulates a vending machine. The vending machine sells three items: a. Candy bars for $0.80 each, b. Potato chips for $0.60 a bag, and c. Chewing gum for $0.40 The vending machine accepts only five dollar bills, one dollar bills, quarters, dimes and nickels. Inputs on the front panel should include a numerical control for the user to enter the amount of money inserted into the vending machine and three more integer numeric controls that designate how many of each item the user wishes to purchase from the vending machine. Your VI should check to see if the amount of money input is greater than or equal to the cost of the selected purchase. If there is not enough money, display a message notifying the customer that more money is needed to meet the total. Then light an LED indicator on the front panel and display the amount needed on a numeric indicator. If enough money is inserted into vending machine based on the user selection, output the change user will receive, showing the quantity of dollar bills, quarters, dimes and nickels to be dispensed by the vending machine. (Hint: use "Stop" function from function palette (Programming>> Application Control) to abort execution in the case your VI goes to infinite execution. Use quotient and Remainder function to calculate change) 5. Work through Chapter 1 in Essick and turn in the resulting VI for "Sine Wave Generator-While Loop". Using Labview
In this design problem, you will be creating a VI (Virtual Instrument) that simulates a vending machine. The vending machine sells three items: Candy bars for $0.80 each .
To create the VI, you will need to include several inputs on the front panel numerical control for the user to enter the amount of money inserted into the vending machine.three more integer numeric controls to designate how many of each item the user wishes to purchase from the vending machine.Next, your VI should check if the amount of money input is greater than or equal to the cost of the selected purchase.Next, your VI should check if the amount of money input is greater than or equal to the cost of the selected purchase.
. If there is not enough money, display a message notifying the customer that more money is needed to meet the total. Additionally, you should light an LED indicator on the front panel and display the amount needed on a numeric indicator.On the other hand, if enough money is inserted into the vending machine based on the user's selection, your VI should output the change the user will receive. This should include the quantity of dollar bills, quarters, dimes, and nickels to be dispensed by the vending machine display the change on the front panel using appropriate indicators.
To know more about simulates visit:-
https://brainly.com/question/2166921
#SPJ11
What information most likely presents a security risk on your personal social networking profile?.
Answer:
Your personal social networking profile may pose security risks if you post certain information publicly. Individuals' Personally Identifiable Information (PII) or Protected Health Information (PHI) is considered to be PHI.
Explanation:
hope this helps!!!!!
The information that is most likely presents a security risk on your personal social networking profile is birthday and hometown. The correct option is B.
Your birthday and hometown are the two pieces of information on your personal social networking page that most likely pose a security issue. Malicious persons may use this information to pose as you or obtain unauthorised access to your accounts.
Through identity theft or phishing scams, attackers may try to use your birthdate to access sensitive information about you, like your social security number or account passwords.
Your online accounts could be compromised if someone uses information about your hometown to crack passwords or figure out security questions.
To safeguard your privacy and improve your online security, you should exercise caution while disclosing such sensitive personal information on social media networks.
Thus, the correct option is B.
For more details regarding social networking, visit:
https://brainly.com/question/29708102
#SPJ6
Your question seems incomplete, the probable complete question is:
What information most likely presents a security risk on your personal social networking profile?.
A) Status
B) Birthday and hometown
C) List of favorite movies and music
D) Number of friends and followers
iii) Imagine a close friend of yours shares with you that they are facing the physical/cognitive/emotional challenges related to gaming/over usage of technology, what would you recommend for them to improve all forms of their health?
Answer:
i would recommend him or her to rest playing games
Explanation:
remember gaming is like betting you get addicted so he has to go for counseling
The VLOOKUP function looks up values in a table with which feature?
column labels in the top row
column labels in the bottom row
row labels in the leftmost column
row labels in the rightmost column
The VLOOKUP function looks up values in a table with the feature that allows row labels in the leftmost column. Thus, the correct option for this question is C.
What is the VLOOKUP function?The VLOOKUP function may be characterized as a built-in Excel function that helps you look for a specified value by searching for it vertically across the sheet. This function in Excel may sound complicated, but you will find out that it is a very easy and useful tool once you try it.
The VLOOKUP function lets you search the leftmost column for a value and return another value on the same row in a column you specify. The range of cells in which the VLOOKUP will search for the lookup_value and the return value.
Therefore, row labels in the leftmost column are the feature through which the VLOOKUP function looks up values in a table. Thus, the correct option for this question is C.
To learn more about VLOOKUP function, refer to the link:
https://brainly.com/question/29646445
#SPJ1
Answer:
A -column labels in the top row.
Explanation:
Is the correct answer.
PLEASE FULLY HELP WITH JAVA CODING ASSIGNMENT
Also please try to make the screenshots readable
The code defines a BankAccount class with private variables balance and name. The constructor initializes the name and sets the balance to 1000.0.
The Programpublic class BankAccount {
private double balance;
private String name;
public BankAccount(String name) {
this.name = name;
this.balance = 1000.0;
}
public double getBalance() {
return balance;
}
public static void main(String[] args) {
BankAccount account = new BankAccount("John Doe");
System.out.println("Balance for " + account.name + ": $" + account.getBalance());
}
}
Output:
Balance for John Doe: $1000.0
The code defines a BankAccount class with private variables balance and name. The constructor initializes name and sets balance to 1000.0.
The getBalance() method returns balance. In the main method, a BankAccount object is created with the name "John Doe" and printed using System.out.println(). The output displays the account name and balance.
Read more about Java programs here:
https://brainly.com/question/26789430
#SPJ1
which of these is not a valid relationship type
where is the items or options
________ is the general name for a security flaw in a program. Group of answer choices A security fault A virus Malware A vulnerability
Answer:
Hi there it is A vulnerability
Explanation:
a computer typically connects to a router via a...
Usually, a network interface card is used to link a computer to a router. A separate LAN card is not required today because the majority of modern PCs have NIC cards integrated into the motherboard.
A computer's NIC offers a dedicated, constant connection to a network. It implements the physical layer hardware needed to communicate with a data link layer standard, such as Ethernet or Wi-Fi. Each card functions as a device and has the capacity to organize, transmit, and control the flow of data throughout the network. NICs are directly linked to the motherboard of your computer, either near the USB ports on the back or on the back of the computer (for external network expansion cards) (for onboard NICs). These cards are still extensively used for desktop PCs that lack a motherboard-integrated Ethernet port. Together with other networking devices, NICs are used to establish a connection to a network. Utilizing NICs, only other devices can be connected to. You need a router in order to connect to the internet. Routers are what connect a local network to the internet.
Learn more about network interface card here
https://brainly.com/question/20689912
#SPJ4
In a DTP project, Fiona is looking for a way to make a page layout attractive to readers. Help Fiona pick the correct word to complete the sentence.
You’ll need a(n) _____ to capture the attention of your audience. It can be an illustration, a photograph, a block of bold text, or a quote in a column of white space.
You’ll need a(n) a block of bold text to capture the attention of your audience.
How do you make text bold in pages?First one need to select Format and then Font and then Bold.
Note that by bolding a selected text, it can capture the mind of the people to the page layout.
Hence, You’ll need a(n) a block of bold text to capture the attention of your audience.
Learn more about page layout from
https://brainly.com/question/12129748
#SPJ1
snow is a _ that can affect the structural durability of building products
Snow is a factor that can affect the structural durability of building products.
Snow can cause damage to building materials such as roofs, walls, and foundations, leading to issues such as leaks, cracks, and weakening of the structure. The weight of accumulated snow can also put stress on the building, potentially causing a collapse in extreme cases. Therefore, it is important for buildings in snowy climates to be designed and constructed with these factors in mind, and for regular maintenance and snow removal to be conducted to ensure the durability and safety of the structure.
Learn more about accumulated snow: https://brainly.com/question/29066077
#SPJ11