If myNum is initially 0, what is myNum's value after the following? if (myNum ~= 0) myNum = 10; end myNum = myNum + 2;

Answers

Answer 1

The value of myNum after the following if myNum is initially 0 is 2. ~= is a logical operator that signifies "not equal to" in MATLAB and other programming languages. It is used to compare two values and determine whether they are not equal.

The value of 0 is equivalent to "false" in MATLAB, while any other value is equivalent to "true.

"Here is the solution to your problem:-

myNum = 0; % myNum is initially 0 if (myNum ~= 0) % Since myNum is equal to 0, this condition will not be satisfied, so the code in this block will not run.myNum = 10; % If the condition had been met, this line would have set myNum equal to 10endmyNum = myNum + 2; % myNum is incremented by 2, so myNum is equal to 2 as it is initially 0. Therefore, the value of myNum after the following if myNum is initially 0 is 2.

To learn more about "Logical operator" visit: https://brainly.com/question/12033772

#SPJ11


Related Questions

what are the two methods of creating a folder​

Answers

Answer:

1. right click empty space, go to New, and click New Folder

2. press Ctrl + Shift + N

Explanation:

true or false: you can purchase a domain name localhost.

Answers

The domain name "localhost" is reserved for loopback IP addresses that refer to the local computer. It cannot be purchased as a regular domain name.

The correct answer is False .


You cannot purchase the domain name "localhost" because it is a reserved domain name used for local network addressing. In computer networking, localhost typically refers to the device used to access it, such as your own computer.

The domain name "localhost" is reserved for loopback IP addresses that refer to the local computer. It cannot be purchased as a regular domain name. You cannot purchase the domain name "localhost" because it is a reserved domain name used for local network addressing. In computer networking, localhost typically refers to the device used to access it, such as your own computer.

To know more about IP addresses visit :

https://brainly.com/question/31026862

#SPJ11

Some organizations and individuals, such as patent trolls, abuse intellectual property laws .



computer science

Answers

Answer:

False.

Explanation:

Patent can be defined as the exclusive or sole right granted to an inventor by a sovereign authority such as a government, which enables him or her to manufacture, use, or sell an invention for a specific period of time.

Generally, patents are used on innovation for products that are manufactured through the application of various technologies.

Basically, the three (3) main ways to protect an intellectual property is to employ the use of

I. Trademarks.

II. Patents.

III. Copyright.

Copyright law can be defined as a set of formal rules granted by a government to protect an intellectual property by giving the owner an exclusive right to use while preventing any unauthorized access, use or duplication by others.

Patent trolls buy up patents in order to collect royalties and sue other companies. This ultimately implies that, patent trolls are individuals or companies that are mainly focused on enforcing patent infringement claims against accused or potential infringers in order to win litigations for profits or competitive advantage.

Hence, some organizations and individuals, such as patent trolls, do not abuse intellectual property laws.

Answer:

the answer is intentionally

Explanation:

i took the test

which type of network treats all processors equally and allows peripheral devices to be shared without going to a separate server? lan wireless windows domain network peer-to-peer man

Answers

The type of network that treats all processors equally and allows peripheral devices to be shared without going to a separate server is known as Peer-to-Peer man. Thus, the correct option for this question is D.

What is a Network?

A network may be defined as a collection of computers that significantly share resources that are located on or provided by network nodes. It basically consists of two or more computers that are linked in order to share resources, exchange files, or allow electronic communications.

According to the context of this question, a peer-to-peer network tends all kinds of processors equally and is considerably utilized primarily in small networks with 10 or fewer users.

The numerous computers on the network can transmit or exchange data by direct access and can share peripheral devices without going through a separate server.

Therefore, a peer-to-peer network is a type of network that treats all processors equally and allows peripheral devices to be shared without going to a separate server. Thus, the correct option for this question is D.

To learn more about Peer-to-peer networks, refer to the link:

https://brainly.com/question/10571780

#SPJ1

Order the steps to successfully complete data validation.
Set Settings
Complete the Error Alert
Add Input Message
Click Data Tools in the
Data tab of the ribbon.
Select Data Validation.

Answers

1. Open the Data Validation dialog box Select one or more cells to validate, go to the Data tab > Data Tools group, and click the Data Validation button.

2. Create an Excel validation rule On the Settings tab, define the validation criteria according to your needs.

3. Add an input message (optional)

4. Display an error alert (optional)

Answer:

Select data validation

Set settings

Add input message

Complete the error alert

we can reduce the margin of error in an interval estimate of p by doing any of the following except _____.

Answers

We can reduce the margin of error in an interval estimate of p by doing any of the aforementioned except using a planning value closer to 0.5. Therefore, the correct answer option is: B) using a planning value closer to 0.5.

What is a confidence interval?

In Mathematics and Statistics, a confidence interval is also referred to as level of confidence and it can be defined as a range of estimated values that defines the probability that a population parameter would fall or lie within it.

What is the margin of error?

In Mathematics, the margin of error (MOE) can be defined as a measure of the difference that exist between an observed value and a true value of the population parameter.

This ultimately implies that, the margin of error (MOE) can be used to determine the confidence interval. Additionally, the margin of error (MOE) can be reduced in a confidence interval estimate of p by increasing the sample size or the level of significance.

Read more on confidence interval here: brainly.com/question/28385660

#SPJ1

Complete Question:

We can reduce the margin of error in an interval estimate of p by doing any of the following except _____.

A) increasing the sample size.

B) using a planning value closer to 0.5.

C) increasing the level of significance.

D) reducing the confidence coefficient.

What is the name of the character set created to allow
computers to represent other languages?​

Answers

Answer:

UTF-8, which stands for Unicode Transformation Format – 8-bit.

Answer: ASCII

Explanation:

The ASCII character set is a 7-bit set of codes that allows 128 different characters.

If you found my answer useful then please mark me brainliest.

"describe the behavioral risk factor surveillance system. how does it differ from a surveillance system for infectious disease?"

Answers

The Behavioral Risk Factor Surveillance System (BRFSS) is a program that monitors behavioral risk factors for chronic diseases such as heart disease, diabetes, and cancer.

It collects information through telephone surveys and asks questions about lifestyle habits, such as smoking, physical activity, and nutrition. This information is used to identify trends and risk factors in the population and to develop interventions to improve health outcomes.

In contrast, a surveillance system for infectious diseases monitors the spread and occurrence of infectious diseases in a population. It collects data on the incidence and prevalence of diseases, as well as demographic and clinical information about the affected individuals. This information is used to identify outbreaks and to inform public health responses, such as vaccination campaigns and disease control measures.

The key difference between the BRFSS and a surveillance system for infectious disease is the focus of their data collection. While the BRFSS gathers information on behavioral risk factors for chronic diseases, an infectious disease surveillance system focuses on the spread and control of infectious diseases.

Learn more about Surveillance here:

https://brainly.com/question/14895186

#SPJ11

part 2a: (modify avl_tree & code by adding functions) query_tree.cc avl_tree.h bst_tree.h

Answers

When more words are associated within a propositional structure, the response time to access those words increases; this is called the fan effect.

The fan effect is a cognitive phenomenon that refers to the increase in response time as a result of the increase in the number of associations between concepts in memory. It suggests that the processing time to access information from memory depends on the number of links associated with that information.

To learn more about propositional click the link below:

brainly.com/question/28096727

#SPJ11

. Many Shakespeare plays deal with the idea of fate andior free will. Is fate something that
can be altered or is it predetermined? Is there such a thing as free will?


Pls help

Answers

Answer:

Love cools, friendship falls off, brothers divide: in cities, mutinies; in countries, discord; in palaces, treason; and the bond cracked between son and father" (1.2.58). Later, after Gloucester's enemies blind him and cast him into the wilds, Gloucester says to the loyal old servant attending him, “As flies to wanton boys, are we to the gods.

Explanation:

Answer:

it depends

Explanation:

if you think about it it free will and fate are connected, like gears, if you turn the first cog that is free will, you can set of a chain reaction of other cogs and wheels that ultimately determine the outcome which is fate, but fate can be altered by the choices you make and all that matters is the first cog

How is distributed ledger technology (DLT) used in a blockchain?
A. To change the ownership of assets in blockchains
B. To encrypt transactions into blocks of information
O c. To store assets in different financial institutions
O D. To keep records of transactions in different places

How is distributed ledger technology (DLT) used in a blockchain?A. To change the ownership of assets

Answers

Answer:

I believe the answer is D. To keep records of transactions in different places.

Explanation:

Match the careers with the career clusters.
curriculum developer
tax auditor
paralegal
attorney
federal aid coordinator
speech-language
pathologist
Education and
Training
Government and Law, Public Safety,
Public Administration Corrections, and
Security

Answers

Answer:

Answer:education and training- speech Language pathologist And curriculum developer

Government and public administration- tax auditor and federal aid coordinator

Law, public safety corrections and security- attorney and paralegal

Explanation:

In Python, a function is _____.

a group of instructions that can be used to organize a program or perform a repeated task

a value that can be passed back to the calling part of a program

a formula that pairs each x-value with a unique y-value

a value that can be passed

Answers

Answer:

a group of instructions that can be used to organize a program or perform a repeated task

Explanation:

A function is a group of commands that can be called upon with extra parameters if needed.

Example:

def foo():                          #defining this function and naming it foo

    return True                 #what is performed when foo is called on

if foo() == True:               #foo() is calling on a function named foo

   print('yes')

Computer not letting me go on password page

I start my computer, I go to the thing to put in my password, it takes me back to the thing with the time and date
Please explain to me what is wrong with my computer and how to fix it

Computer not letting me go on password pageI start my computer, I go to the thing to put in my password,

Answers

it could be a boot loop. did you research ways to fix it ?

In e-mail, a copy of a note sent to an addresses other than the main addresses is known as a ?

Answers

Answer:

carbon copy

Explanation:

I think the answer to this question is carbon copy. A carbon copy is a e-mail sent to more than one recipents.

Answer:

haha crabon copy

Explanation:

Should Microsoft bring paid ads to its X-Box gaming space in light of the new activision deal? Is Microsoft moving to slow with it acquisition based strategy and should they look to develop solutions in house?

Answers

Key factors to keep in mind when utilizing paid advertisements within the box gaming domain, as well as effective methods for gaining new customers is User Experience.

What is the gaming space

The addition of advertisements that require payment within the box gaming world has the potential to adversely affect the user experience. Most gamers usually desire unbroken gaming and might react unfavorably towards advertisements that are intrusive or that cause disruptions.

To increase revenue on the box platform, Microsoft may consider implementing paid advertisements as a form of monetization. By making use of advertising income, there is a potential to acquire additional funds that can be utilized for various endeavors such as enhancing platform development, etc.

Learn more about gaming space from

https://brainly.com/question/24855677

#SPJ4

discuss different generation of computer with the technologies used in each generation​

Answers

Answer: Each generation is defined by a significant technological development that changes fundamentally how computers operate – leading to more compact, less expensive, but more powerful, efficient and robust machines. These early computers used vacuum tubes as circuitry and magnetic drums for memory.

Explanation:

Why is computer called versatile machine? What is second generation of computer? What is memory? Write down the differen memory? What is software? Write down the different What is hardware? Write down any three in What is Internet? Write down the uses of In Write down the difference between first and computer.​

Answers

Answer:

1. Because it can be programmed to carry out a wide range of functions, a computer is a versatile machine. It is capable of handling a variety of inputs, processing data, storing information, and producing output in various formats, including text, images, and sound. It can also be used for entertainment, education, research, communication, etc.

2. The term "second generation" of computers refers to the years 1959–65 when transistors replaced vacuum tubes in the circuitry. These PCs were more modest, quicker, solid, and energy-proficient than their ancestors. Additionally, they introduced magnetic core memory, which was faster and more compact than drum memory.

3. Memory is part of a computer system that stores data and processing programs and instructions. In a computer, there are two main types of memory: secondary memory (also known as storage) and primary memory (also known as RAM or Random Access Memory). Virtual memory is utilized for putting away information briefly. At the same time, the PC is being used, which is unpredictable, implying that the information is lost when the power is switched off. Data is stored permanently in secondary memory, which is non-volatile and retains the data even when power is turned off. Flash drives, solid-state drives, and hard drives are all examples of secondary memory.

4. The programs, applications, and other instructions run on a computer system to carry out various tasks are software. The software comes in two main categories: application software and system software. System software manages computer hardware and provides a platform for applications. Operating systems, device drivers, and utility programs are examples of system software. On the other hand, application software is made to help users with specific tasks or functions. Word processors, spreadsheets, web browsers, and games are all examples of application software.

5. Equipment alludes to the actual parts of a PC framework, like the focal handling unit (computer chip), memory, input/yield gadgets, and capacity gadgets. Instances of equipment incorporate a PC screen, a console, and a printer.

6. The Internet is a global network of connected computers and other devices using standard communication protocols. It lets people access and share information, talk to others, deal with business, and do many other things. One example is searching for information using search engines.

7.

Technology: Circuitry in first-generation computers was made with vacuum tubes, whereas transistors were used in second-generation computers. Computers became smaller, faster, and more effective thanks to transistors, which were smaller, faster, and more dependable than vacuum tubes.

Memory: Magnetic drum memory, which was slow and bulky in the first generation of computers, was replaced by magnetic core memory, which was faster and smaller in the second generation.

Programming: For programming, first-generation computers used machine or assembly language, which was very low-level and difficult to use. On the other hand, second-generation computers used higher-level programming languages like FORTRAN and COBOL, which were more powerful and easier to use.

Explanation: ^^

Why is a computer called a versatile machine?
A computer is called a versatile machine because it can be programmed to perform a wide range of tasks. It can be used for various purposes like typing documents, creating spreadsheets, browsing the internet, playing games, designing graphics, processing data, and many more. Computers can be easily reprogrammed to perform different functions, making them incredibly versatile machines.

What is the second generation of computers?
The second generation of computers refers to the period between 1959 to 1964 when transistors replaced vacuum tubes in computer circuitry. These computers were faster, more reliable, and smaller than their predecessors. They also consumed less power, produced less heat, and were easier to maintain.

What is memory, and what are the different types of memory?
Memory refers to the component of a computer that stores data and instructions for processing. There are two main types of memory: primary memory (also known as RAM) and secondary memory (also known as storage).

Primary memory is the computer's temporary workspace, where it stores data and instructions while it is being processed. RAM is an example of primary memory.

Secondary memory is the computer's permanent storage, where it stores data and instructions even after the computer is turned off. Examples of secondary memory include hard disk drives, solid-state drives, and USB drives.

What is software, and what are the different types of software?
Software refers to the programs, applications, and other instructions that tell a computer what to do. There are two main types of software: system software and application software.

System software is the software that manages the computer's hardware and provides the foundation for other software programs to run. Examples of system software include operating systems, device drivers, and utility programs.

Application software, on the other hand, is the software that performs specific tasks for the user. Examples of application software include word processors, spreadsheets, web browsers, and video games.

What is hardware, and what are three examples of hardware?
Hardware refers to the physical components of a computer that can be touched and manipulated. Some examples of hardware include:

Central processing unit (CPU): This is the brain of the computer that performs all the processing tasks.
Random Access Memory (RAM): This is the primary memory that temporarily stores data and instructions.
Hard disk drive (HDD): This is the secondary memory that stores data and instructions permanently.
What is the internet, and what are some uses of the internet?
The internet is a global network of interconnected computers and servers that allows users to share information and communicate with each other. Some common uses of the internet include:

Sending and receiving emails
Browsing the web for information
Online shopping and banking
Social networking
Online gaming
Video and voice calling
What is the difference between the first and second generation of computers?
The first generation of computers used vacuum tubes to process data and were large, expensive, and unreliable. They were also slow and generated a lot of heat, which made them difficult to maintain. The second generation of computers used transistors instead of vacuum tubes, which made them faster, smaller, and more reliable. They were also less expensive and consumed less power than their predecessors.

although plants and ainamals are both living things___

Answers

Answer:

Plants and animals are both living things, but at first glance, they seem very different. Animals tend to move around, while plants stay rooted in one place. Animals eat their food, while plants convert sunlight into the energy they need.

Explanation:

Hope it helps you..

Just correct me if i am wrong or something..

But, your welcome in advance..

(◍•ᴗ•◍)

Cho 1 biến x thuộc kiểu dữ liệu Integer , hãy cho biết biến x dùng để làm gì?

Answers

Answer:

???

Explanation:

this is a pictorial way of representing knowledge. it is used to help organize ideas and present information.

Answers

This is a description of a concept known as a concept map or mind map. It is a visual tool that is used to organize and present information in a hierarchical structure, with the main idea in the center and branches representing related concepts.

Mind map is often used in education and problem-solving to help students and professionals understand and organize complex information. A mind map is a type of visual tool used to organize and present information in a hierarchical structure. It typically starts with a central idea or concept, represented by a word or image, with branches or lines connecting to related ideas and sub-ideas. Mind maps are often created using diagrams and images, and they can be used to organize ideas, plan projects, take notes, or brainstorm solutions to problems. Mind maps are widely used in education and business for visualizing, structuring, and brainstorming ideas. It's also an effective tool for memory and idea recall.

Learn more about Mind map here: https://brainly.com/question/29506148

#SPJ4

can someone help me with this trace table - its computer science

can someone help me with this trace table - its computer science

Answers

TThe while loop keeps going until count is greater than or equal to 10.

count = 0, sum = 0

count = 2, sum =2

count = 4, sum = 6

count = 6, sum = 12

count = 8, sum = 20

count = 10, sum = 30

Now that count is equal to 10, it exits the while loop and the program ends. The values above complete your trace table.


Aiden visits a chat room online. He starts talking to one person about a movie. He doesn’t agree with the person’s opinions. He says mean things and makes fun of this person. How should Aiden have behaved?

Answers

Answer:

He should have politely disagreed with them and not escalated the situations and said mean things.

Explanation:

People often engage in conversation . Aiden should have politely disagreed with them and not increase the gravity of the situations and say mean things.

How do you deal with opinions you do not agree with?

Dissent is known to be the right way for one to express strong disagreement, often in terms with what people  think or say. One can do so by;

Do not make it personal. Try and Avoid putting down other people's opinion and beliefs. Listen to the view point of others.

learn more about Online from

https://brainly.com/question/14591988

a stored program that is stored within the database and compiled when used is called a trigger. true or false

Answers

The given statement, "a stored program that is stored within the database and compiled when used is called a trigger" is False.

A trigger is a database object, while a stored procedure is a stored program that is stored within the database and compiled when used.

A stored program refers to a set of instructions that is saved in a database for subsequent use. It is essentially a computer program that is stored in a database, where it can be retrieved and executed as needed. A stored program can include a variety of tasks and operations, such as database queries, calculations, and logic control.

A trigger is a database object that is executed automatically in response to certain database events. It can be used to enforce business rules, maintain data integrity, or automate common database tasks. A trigger is usually created using a special SQL command and can be triggered by a variety of events, such as database insertions, updates, or deletions.

More on stored program: https://brainly.com/question/13014281

#SPJ11

What is wrong with each of the following code segments? int[] values; for (int i = 0; i < values.length; i++) { values[i] = i * i; }

Answers

Answer:

values have been declared but not initialized nor allocated memory. So you are not allowed to use "values.length"


Select the correct answer from each drop-down menu.
Jeff writes a blog on digital photography. His most recent post was about visual artifacts. Identify the visual artifacts in the sentences below.
. A visual artifact of digital projectors is called
An inappropriate color difference in an image is called

Answers

Answer:

Screen-door effect

Explanation:

Answer:

An inappropriate color difference in an image is called: image noise

A visual artifact of digital projectors is called: fixed-pattern noise

Explanation:

trust me

Which type of free software contains embedded marketing material within the program?

shareware

freeware

Spyware

adware

Answers

Adware is the answer

suppose you scan a 5 x 7 inch photograph at 300 ppi (points per inch or pixels per inch) if we quantize the color mode to use 128 indexed colors, how big is the file in bytes

Answers

5 x 7 prints are approximately 13 x 18 cm (127 x 178 mm) in size. The dimensions are stated as length by height, with portrait (vertical) and landscape (horizontal) pictures being 5 by 7 and 5 by 7, respectively.

What resolution is appropriate for a 5x7 photo?

The image resolution needs to be at least 1024 x 768 pixels for a 5" x 7" print. The image resolution needs to be at least 1536 × 1024 pixels for an 8" x 10" print. The image resolution needs to be at least 1600 x 1200 pixels for a 16" x 20" print.

An image that is 7x5 in ratio?

You must understand the ratios needed for typical print sizes if you intend to print your photos: 6 x 4” = 1.5:1 7 x 5" equals a 1.4:1 ratio.

To know more about image resolution visit:-

https://brainly.com/question/12724719

#SPJ4

write essay about how to use credit correctly

Answers

Using credit have to be safe and don’t have to be it but if your don’t understand

when you call a string's split() method, the method divides the string into two substrings of equal size. true or false

Answers

False. When you call a string's split() method, you can specify a delimiter and the method will divide the string into multiple substrings based on that delimiter.

The size of each substring may vary depending on the length and location of the delimiter within the original string. For example, if you split the string "Hello world" using the space character as the delimiter, the resulting substrings would be "Hello" and "world", which are not of equal size. Therefore, it is incorrect to say that the split() method divides a string into two substrings of equal size.

The split() method is a useful tool for manipulating and analyzing strings in programming, allowing you to extract specific parts of a string based on certain criteria. It is important to understand how the split() method works and how to use it effectively in order to fully utilize the capabilities of string manipulation in programming.

Learn more about substrings here:

https://brainly.com/question/28447336

#SPJ11

Other Questions
WHAT ARE THESE IN SPANISH1. de la maana:2. esta tarde:3. despus:4. esta noche:5. entonces: Fish and shell fish production advantage? How does RNA polymerase initiate transcription in E coli? Twice the sum of a number and 8, equals negative 4 times thenumber, plus 4. What is the number? The following direct materials and direct labor data pertain to the operations of Laurel Company for the month of August Costs Actual laborale $13 ger hour Actual material price $120 perton Standard labor rate $12.50 per hour Standard materials price 5124 perton Quantities Actuall hours incurred and used Actual quantity of materials purchased and used Standard hours used Standard quantity of materials used (A) 4900 hours 2000 tons 4.950 bours 1.990 to Standard hours used 4,960 hours Standard quantity of materials used 1.990 tons (A) Compute the total, price, and quantity variances for materials and labor. Total materials variance S Material price variance S Materials quantity variance i Total labor variance Labor price variance Labor quantity variance What might go wrong if you do not have a strong sense of who your audience is? The force needed to make an object with a mass of 5kg accelerate at 10 m/sec2 = Question 5 options: 500 Newtons 50 Newtons 100 Newtons 10 Newtons How would you rate your mental health from a scale of 1 (lowest) to 5 (highest) and why? 8^x=2 what is the value of x Which has greater momentum, a 2.0kg hockey puck moving east at 2.5m/s or a 1.3kg hockey puck moving south at 3.0m/s? Solve 13/12+4/12 and show on number line Marta is interviewing candidates for a position in the Human Resources department at her company. She is deciding who to interview by going through resums and looking at the subject areas in which each candidate studied. Which of the four candidates would be the best choice for Marta to interview? The scope of disaster recovery is ______________ than that of generalized Business Continuity; generalized Business Continuity spans the entire organization, but disaster recovery is said to be ______________. Select one: a. Wider / mission-critical b. Narrower / IT-centric c. Wider / technically prejudiced d. Narrower / peripherally vulnerable the number of toy cars that ray has is a multiple of . when he loses two of them, the number of cars that he has left is a multiple of . if is a positive even integer less than , then how many possible values are there for ? 1 Unit 8 Quiz SOWhich statement BEST describes the conclusion of the world systems approach? A. Equality among nations is the goal of the system. B. Core nations require fewer resources than peripheral nations. C. The system favors core nations at the expense of peripheral nations. D. There are far more core nations than peripheral nations in the world. Which system produces chemical messengers called hormones that control homeostasis, development, and growth? Read paragraph 81 of the story. Then answer the multiple-choice questions that follow. From "Ghosts" by Chimamanda Ngozi AdichieI am sitting now in my study, where I helped Nkiru with her difficult secondary school math assignments. The armchair leather is solid and worn. The pastel paint above the bookshelves is peeling. I wonder why it never came up, throughout the years, that Ikenna did not die. True, we did sometimes hear stories of men who had been thought dead and who walked into their compounds months, even years, after January 1970; I can only imagine the quantity of sand poured on broken men by family members suspended between disbelief and hope. But we hardly talked about the war. When we did it was with an implacable vagueness, as if what mattered were not that we crouched in muddy bunkers during air raids after which we buried corpses with bits of pink on their charred skin, not that we ate cassava peels and watched our childrens bellies swell, but that we survived. It was a tacit agreement among all of us, the survivors of Biafra. Even Ebere and I, who had debated our first childs name, Zik, for months, agreed very quickly on Nkiru: what is ahead is better. We will look forward, forward, forward.Which evidence best supports the answer to question 1?A. I am sitting now in my study, where I helped Nkiru with her difficult secondary school math assignments.B.When we did it was with an implacable vagueness, as if what mattered were not that we crouched in muddy bunkers during air raids after which we buried corpses..."C. True, we did sometimes hear stories of men who had been thought dead and who walked into their compounds months, even years, after January 1970..."D."Even Ebere and I, who had debated our first childs name, Zik, for months, agreed very quickly on Nkiru..." someone help me pleaseeeeee Please help I dont understand what i am supposed to do 100g (mL) of HO to dissolve thesesolutes. Multiplying or dividing your soluteamount is now necessary.- If 10 g dissolve in 100g (mL)- 5 g dissolve in 50g (mL)- 20g dissolve in 200g (mL)