In UNIX, the return value for the fork system call is _____ for the child process and _____ for the parent process. This assumes the fork() was successful.

Answers

Answer 1

In UNIX, the return value for the fork system call is 0 for the child process, and the process ID (PID) of the child process for the parent process.

When the fork() system call is executed, it creates a new process by duplicating the existing process. The new process is called the child process, and the existing process is called the parent process.

After a successful fork() call, the return value in the parent process is the process ID (PID) of the child process. This allows the parent process to identify and manage the child process if needed. The parent process can use this value to perform actions such as monitoring the child process, sending signals, or waiting for the child process to complete its execution.

Learn more about process ID, here:

https://brainly.com/question/15058357

#SPJ4


Related Questions

The owner tells you that in the future, CSM Tech Publishing might need system fault tolerance to ensure that there's little or no downtime because this critical application will eventually be accessed at all times of the day and night. For now, he's just concerned about getting the system up and running. You check the existing server's capacity and determine that the new application's memory and disk requirements will likely exceed the existing server's 4 GB capabilities. The owner explains that there's enough budget for a new server, so you should plan for growth. As an aside, he mentions that because all his employees sign in at about the same time, the time it takes to sign in has been increasing. You need to come up with specifications for a new server. Describe some hardware features you plan to recommend for this new server, in particular the CPU architecture, number of CPUs, amount of RAM, and disk system. Explain your answers.

Answers

Answer:

Follows are the solution to this question:

Explanation:

New useful server specifications can be defined as follows:  

Space planning is enough to store units should also be available to handle the current load. The goals shall become converted through strategies Security was its key problem, thus the technology must at least be safeguarded by good chemical stability as well as virus protection.

RAM is also to be improved. Its 8 GB is viewed as good. The amount of redskins would increase performance if they had been increased. Numerous CPUs will be connected to a system for the procedure and is as required.

Its hard drive must be linked to structures with such a temperature of 1-2 TB more than. Besides that, the fault-tolerant equipment, tracking tools, reporting tools, audit tools, and data centers are frequently used.

It shows a larger thumbnail of the selected design and any available settings can be changed.
A. Margin guides
B. Customizable guides
C. Guides
D. Task pane

Answers

Answer:

customizable guides

thank u ❤

How do a router and switch differ when handling a message? Both a router and a switch use the message’s destination address to select the line to route the incoming message to. The switch will purposefully drop messages if message traffic exceeds its capacity. The router will purposefully drop messages if message traffic exceeds its capacity. There is no difference in how a router and a switch handle messages.

Answers

Answer:

The router will purposefully drop messages if message traffic exceeds its capacity.

Explanation:

As we know that the router and the switch are the connecting devices. The router works at the network layer and used for determining the shortest path

On the other hand the switch work is to connected many devices that are available in the network.

Therefore the correct option is second as the router also depicts when there is the purpose of the messaged drop[ed if the traffic of message exceeds than its capacity

Annie has a three year old laptop. She is giving it a full service before selling it on. (a) Annie runs some 'Disk Health' utility software to check for any problems with her HDD. (i) Define what is meant by utility software.​

Answers

Utility computer program could be a sort of computer program that gives particular usefulness to help with the upkeep as well as the administration of a computer framework.

What is utility software?

Utility computer program is computer program planned to assist analyze, arrange, optimize or keep up a computer. It is utilized to back the computer foundation - in differentiate to application program, which is pointed at specifically performing assignments that advantage standard clients

Therefore the use of MS Word is an case of application computer program created by the company Microsoft. It permits clients to sort and spare archives. It is accommodating as well for making records.

Learn more about utility software from

https://brainly.com/question/30365102

#SPJ1

In this activity, you will conduct online research and explain the impact of the Internet and the World Wide Web. The Internet and the World Wide Web have changed the world and our daily lives in many ways. Part A What are the fields that have been impacted the most by these technologies?

Answers

The World Wide Web (WWW), also referred to as the Web, is an information system that makes it possible to access documents and other web resources over the Internet.

Thus, Programs like web browsers can access documents and other downloaded media that are made available to the network through web servers.

Uniform resource locators, or URLs, are character strings that are used to identify and find servers and services on the World Wide Web. A web page with HTML formatting is the first and most widely used type of document.

This markup language enables simple text, graphics, video and audio content that has been embedded, as well as scripts (short programs) that handle complex user interaction.

Thus, The World Wide Web (WWW), also referred to as the Web, is an information system that makes it possible to access documents and other web resources over the Internet.

Learn more about World wide web, refer to the link:

https://brainly.com/question/20341337

#SPJ1

the following is a 2's-complement signed binary number: 1000000002. what is its decimal value?

Answers

The 2's complement signed binary number 1000000002 has a decimal value of -128.The given binary number is a 2's complement signed binary number: 1000000002. To find its decimal value, we need to follow these steps:

Step 1: Identify the sign bit. In a 2's complement binary number, the leftmost bit (MSB) represents the sign. If it is 0, the number is positive; if it is 1, the number is negative. In our case, the MSB is 1, so the number is negative.

Step 2: Find the magnitude of the number. To do this, we need to find the 2's complement of the given number.
1. Invert all the bits of the number: 0111111112
2. Add 1 to the inverted number: 0111111112 + 1 = 1000000002

Step 3: Convert the magnitude from binary to decimal. Here, the magnitude is the same as the original number: 1000000002. So, the decimal value is:
(1 x 2^7) = 128

Step 4: Combine the sign and magnitude to find the final decimal value. Since the number is negative, the decimal value is -128.

In summary, the 2's complement signed binary number 1000000002 has a decimal value of -128.

For more information on binary number visit:

brainly.com/question/31102086

#SPJ11

The lifetime of time, in days, of an electronic component used in a manufacturing a cellphone follows the following PDF fX​(x)={kexp(−5×10−4x)0​x≥0 otherwise ​ (a) determine the value of k (b) determine and sketch the corresponding CDF. (c) determine the probability that i. the component lasts more than 1000 days ii. the component fails before 2000 days

Answers

The problem involves determining the normalizing constant of a Probability Density Function (PDF), finding, and sketching.

the https://brainly.com/question/32512792?rCumulative Distribution Function (CDF), and calculating certain probabilities. We use integration techniques and the properties of exponential distributions to derive these solutions.

(a) To find k, we integrate the given function over its domain and set it equal to 1 (since the total probability must equal 1). Integrating gives us k = 5 x 10^-4.

(b) The Cumulative Distribution Function (CDF) of a random variable X is obtained by integrating the PDF from negative infinity to x. In this case, we get the CDF F(x) = 1 - exp(-5 x 10^-4x) for x≥0, and F(x) = 0 otherwise.

(c) To calculate the required probabilities, we substitute the appropriate values into the CDF. For instance, P(X>1000) = 1 - F(1000), and P(X<2000) = F(2000).

Learn more about PDF here:

https://brainly.com/question/32512792

#SPJ11

what is the real strength of cyberspace explain

Answers

Answer:

Explanation: The strength of cyberspace is in its numbers. The reason asking questions online works is that a lot of knowledgeable people are reading the questions. And if even a few of them offer intelligent answers, the sum total of world knowledge incre

question 2you are planning to add css to a web page that was written with html and has images on the page. what new formatting option will you gain by including css?

Answers

The styles of HTML web pages are defined using CSS, or Cascading Style Sheet. A web page's HTML features and styling are increased by adding CSS to the page.

What is the use of HTML?Standard markup for documents intended to be seen in a web browser is called HTML, or HyperText Markup Language. Cascading Style Sheets and JavaScript are two examples of technologies that frequently help with this. For presenting content acquired from the Internet, HTML is the formatting language used. Each retrieval unit is referred to as a Web page (from the term "World Wide Web"), and such pages usually include hypertext links that enable the retrieval of adjacent pages. To link from one page to another, use the element that describes a hyperlink. The href attribute, which describes the location of the link, is the most crucial property of the element. Links in every browser will by default look like this: Underlined and blue links that have not been viewed.

Therefore,

There are three methods for adding CSS to an HTML page: Inline, Internal, and External. All of the list items' backgrounds are colored when CSS is introduced to the page in one of these ways.

To learn more about HTML, refer to:

https://brainly.com/question/4056554

A data lake is composed of:
Select one:
A. historical data from legacy systems.
B. unstructured and structured data that has not been analyzed.
C. internal and external data sources.
D. historic and current internal data.
E. historic external data.

Answers

A data lake is composed of unstructured and structured data that has not been analyzed. The correct option is B.

What is a data?

Data is information that has been transformed into a format that is useful for transfer or processing in computing.

Data is information that has been transformed into binary digital form for use with modern computers and communication mediums. The topic of data may be used in either the singular or the plural.

Large amounts of organised, semistructured, and unstructured data can be stored, processed, and secured using a data lake, a centralised repository. It can process any type of data, regardless of its variety or magnitude, and save it in its original format.

Thus, the correct option is B.

For more details regarding data, visit:

https://brainly.com/question/10980404

#SPJ4

Ignore this it a temporary note for me: SPSstudents

Answers

Answer:

okk

Explanation:

An advanced computer sends information to its various parts via infrared light pulses traveling through silicon fibers. To acquire data from memory, the central processing unit sends a light-pulse request to the memory unit. The memory unit processes the request, then sends a data pulse back to the central processing unit. The memory unit takes 0. 5 ns to process a request. If the information has to be obtained from memory in 2. 0 ns, what is the maximum distance the memory unit can be from the central processing unit?

Answers

The maximum distance between the memory unit and the central processing unit is d= 6.4 cm

About Central Processing Unit (CPU):

The following features make up a central processing unit (CPU):

The computer's CPU is referred to as its brain.The CPU carries out all kinds of data processing tasks.It keeps data, interim outcomes, and directions (program).All computer components are operated under its direction.

The three items below make up the CPU itself:

Memory or Storage UnitControl UnitALU(Arithmetic Logic Unit)

Detailed Solution:

A advanced computer is said to communicate with its many components via infrared light pulses that flow through silicon fibers.

A request is processed by the memory unit in 0.5 ns. It takes the memory unit 2.0 ns to send the information back to the central processor unit.

The refractive index of silicon is n = 3.50.

The speed of light is  calculated by :

\(v = \frac{c}{n}\) ,

where v is speed of light in silicon fibers, c is speed of light in vacuum,  n is the refractive index of silicon.

Substituting  \(c= 3.0 * 10^{8} m/s\) and , n = 3.50:

\(v = \frac{3.0 * 10^{8}m/s }{3.50}\)

⇒\(v= 0.857*10^{8}m/s\)

The time taken by the infrared light to travel to the memory unit from the central processing unit is

Δt=(2.0-0.5)ns

⇒Δt=1.5ns

We can find the total distance travelled by the infrared light by the following formula:

\(d_{total}\) = v Δt

\(d_{total}\) = \((0.857 * 10^{8}m/s)(1.5ns)(\frac{1s}{10^{9}ns })\)

\(d_{total} = \frac{9}{70}m\)

The distance between the central processing unit and the memory unit is half of the total distance travelled:

\(d=\frac{d_{total}}{2}\)

\(d=\frac{9m}{2(70)}\)

\(d=6.4*10^{-2}m\)

\(d=(6.4*10^{-2}m)(\frac{100cm}{1m})\)

⇒d= 6.4 cm

To know more about CPU visit:

https://brainly.com/question/16254036

#SPJ4

Digital literacy involves having a current knowledge and understanding of computers, mobile devices, the internet, and related technologies. group of answer choices
a. true
b. false

Answers

Digital literacy involves having a current knowledge and understanding of computers, mobile devices, the internet, and related technologies is option b: false statement.

What is meant by digital literacy?

Digital literacy is known to be a term that connote when a person is said to be having the skills that they need to live, learn, as well as work in a society where communication as well as access to information is known to be  increasingly via the use of digital technologies such as internet platforms, social media, and others.

Therefore, Digital literacy involves having a current knowledge and understanding of computers, mobile devices, the internet, and related technologies is option b: false statement.

Learn more about Digital literacy from

https://brainly.com/question/11983600

#SPJ1

When you use the implicit syntax for coding joins, the join conditions are coded in the ____________ clause.

Answers

When you use the implicit syntax for coding joins, the join conditions are coded in the WHERE clause.

What is syntax?

It should be noted that syntax simply means the rule that defines the language structure in programming.

In this case, when you use the implicit syntax for coding joins, the join conditions are coded in the WHERE clause.

Learn more about syntax on:

brainly.com/question/21926388

#SPJ12

List the different types of views in which Reports can be displayed.

Answers

Answer:

Depending upon the type of report you are viewing, the following view types are available. Report view is the default view for most reports. It consists of a time period, an optional comparison period, a chart, and a data table. Trend view displays data for individual metrics over time.

Explanation:

Read everything and give me your answer, do not forget to give me 5 stars, thank you

If an assessment does not include questions that must be graded by your instructor, Blackboard will display your grade for the test after it has been submitted successfully.
a. true
b. false

Answers

Answer- true: If an assessment does not include questions that must be graded by your instructor, Blackboard will display your grade for the test after it has been submitted successfully.

Morphine sulfate is an opioid analgesic that can depress the respiratory system, leading to respiratory depression, hypoventilation, and potentially respiratory arrest.

While assessing circulation, cough reflex, and nausea/vomiting are also important assessments to perform for clients receiving morphine sulfate, they are not the priority assessment. Assessing lung sounds takes priority over these other assessments because respiratory depression is a potentially life-threatening side effect of morphine sulfate.

If the client's lung sounds indicate respiratory distress or depression, prompt intervention and treatment are necessary to prevent further complications.

Learn more about  assessment here

https://brainly.com/question/30925498

#SPJ11

In python please!! Write the definition of a function named countPos that needs integer values from standard input until there are none left and returns the number that are positive. The function must not use a loop of any kind.

Answers

Answer:

Explanation:

The following code is written in Python it doesn't use any loops, instead it uses a recursive function in order to continue asking the user for the inputs and count the number of positive values. If anything other than a number is passed it automatically ends the program.

def countPos(number=input("Enter number: "), counter=0):

   try:

       number = int(number)

       if number > 0:

           counter += 1

           newNumber = input("Enter number: ")

           return countPos(newNumber, counter)

       else:

           newNumber = input("Enter number: ")

           return countPos(newNumber, counter)

   except:

       print(counter)

       print("Program Finished")

countPos()

In python please!! Write the definition of a function named countPos that needs integer values from standard

to help ensure that an html document renders well in many different web browsers

Answers

Answer:

Doctype Declaration

Explanation:

In order to make sure that it renders correctly in a wide range of browsers, a Doctype Declaration needs to be added to the top of the HTML code. This declaration basically makes sure that the web browser knows how the code was written so that it can correctly read it. This is used because many web browsers use different default settings for reading code and can sometimes not display code that was not designed specifically for that web browser unless otherwise specified.

Answer:

I think it is:

B. a doctype declaration

Explanation:

(25 POINTS)Which statement best reflects the importance of following safety guidelines?

Workplace injuries can result in losses to an organization’s profits.

OSHA responds to complaints of unsafe work environments, and can fine or take negligent employers to court.

Every year, thousands of people die as a result of workplace injuries.

Using equipment safely is faster and makes work more efficient.

Answers

Answer:

I think, Every year, thousands of people die as a result of workplace injuries.

Answer:

B

Explanation:

HELP!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Primary memory is and .
~ Volatile ~ Permanent
~ Not Volatile ~ Not Permanent

Answers

Answer:

Volatile and permanent

Explanation:

hope it is helpful

Answer:

Volatile and not permanent

Explanation:

On which tab are the print commands in Excel 2016 accessed?

Home

File (Backstage)

View

Edit

Answers

Answer:

file (backstage)

Explanation:

edginuity 2020

The tab that is the print commands in Excel 2016 accessed is File (Backstage). The correct option is b.

What is Excel?

Microsoft produced Microsoft Excel, a spreadsheet, for Windows, macOS, Android, and iOS. It has calculation, graphing tools, pivot tables, and Visual Basic for Applications, a macro programming language. Microsoft created a spreadsheet for it.

It has calculation, graphing tools, pivot tables, and Visual Basic for Applications, a macro programming language. A spreadsheet application that is a part of the Microsoft Office suite of programs. Spreadsheets display value tables arranged in rows and columns that can be mathematically manipulated using both fundamental and sophisticated functions.

Therefore, the correct option is b. File (Backstage).

To learn more about Excel, refer to the link:

https://brainly.com/question/24202382

#SPJ5

The __________ uses an algorithm that is designed to provide only the digital signature function and cannot be used for encryption or key exchange.

Answers

Answer:

Digital Signature Standard (DSS)

Explanation:

The term that is being described is known as Digital Signature Standard (DSS). This term is mainly used in the context of cryptography and was created by the Federal Information Processing Standard(FIPS) in order to define algorithms that are used to generate digital signatures using a specifically designed Secure Hash Algorithm(SHA) to authenticate electronic documents.

Complete the procedure for adding a contact from an email message by selecting the correct term from each drop-down menu.

1. In an email message, right-click
, and select Add to Outlook Contacts.

2. In the
window, enter information for the contact.

3. Click the Save & Close button.

Answers

Answer:

An email address

Contact

Explanation:

right on edge

In an email message, right-click, and select "Add to Outlook Contacts". In the "Add Contact" window, enter information for the contact. The window will typically include fields for the contact's name, email address, phone number, and other contact information.

What is email?

Email, often known as electronic mail, is a way for individuals or organizations to communicate digitally.

This is done through the use of computers, cellphones, or tablets. Email is a common form of communication that is employed in a wide range of professions and sectors, both personally and professionally.

In an email message, right-click, and select "Add to Outlook Contacts".In the "Add Contact" window, enter information for the contact. The window will typically include fields for the contact's name, email address, phone number, and other contact information.Click the "Save & Close" button to save the contact information to your Outlook contacts list.

Thus, the new contact will now be available for use in Outlook and other applications that use your contacts list.

For more details regarding Email, visit:

https://brainly.com/question/14666241

#SPJ2

The D:\ drive in your computer has been formatted with NTFS. The Mary user account has been assigned the following permissions:
-Allow Full Control to the D:\Reports folder
-Deny Full Control to the D:\Sales folder
-Deny Full Control to the D:\Reports\2010.doc file
-Allow Full Control to the D:\Sales\2010sales.doc file

What effective permissions does Mary have to both files?
a. Deny Full control to both
b. Allow Full Control to both
c. Allow full control to D:\Reports\2010reports.doc; Deny full control to D:\Sales\2010sales.doc
d. Deny full control to D:\Reports\2010reports.doc; Allow full control to D:\Sales\2010sales.doc

Answers

A deny full control to both , because Mary had to have both files or denied full control

What kind of technology is helping people who don't have access to the internet get it? A) Airplanes B) Balloons C) Routers D) Ships

Answers

Answer: c router

Explanation:

I took a test with the same question

Which parameter is used to identify applications when a user sends a service request to a remote server

Answers

The parameter that is used to identify applications when a user sends a service request to a remote server is called "Port Number."A port number is used to identify applications when a user sends a service request to a remote server.

A port number is a 16-bit unsigned integer, thus, it can range from 0 to 65535. This port number identifies the endpoint of the connection on the transport layer, i.e., TCP or UDP.Protocol type, IP address, and port number is the typical format for a socket address used to connect a client to a server application on the internet.

The port number has been broken down into three distinct classes, namely well-known, registered, and dynamic or private ports. The well-known ports are reserved for usage by particular applications or protocols.Well-known ports range from 0 to 1023, registered ports range from 1024 to 49151, and dynamic or private ports range from 49152 to 65535.Therefore, it can be concluded that a port number is used to identify applications when a user sends a service request to a remote server.

Learn more about TCP here,

https://brainly.com/question/17387945

#SPJ11


What is the process used for creating natural
sets?

Answers

Answer:

natural sets of what thing?

What is the output of this program?
numA = 2
numB = 3
if numA == 2 or numB == 2:
print("yes")
elif numA == 2 and numB == 3:
print("no")
Output:

Answers

Answer:

Output: yes

Explanation:

First if statement is satisfied, since numA==2, so yes is printed.

The elif statement is skipped altogether, since elif statements are only evaluated, when the statement above if false, which it is not.

discuss the main functions for accessing a database in pear db, and how each is used.

Answers

PEAR DB is a database abstraction layer for PHP that provides a common interface for accessing different types of databases.

There are several main functions for accessing a database in PEAR DB, including:

1. connect(): This function establishes a connection to the database server using the specified connection parameters. It takes in the database type, hostname, username, password, and database name as arguments.

2. query(): This function executes a SQL query on the database and returns the result set as a PHP object or array. It takes in the SQL statement as an argument.

3. fetchRow(): This function retrieves the next row from the result set returned by a query and returns it as an array. It takes in the result set object as an argument.

4. fetchAll(): This function retrieves all the rows from the result set returned by a query and returns them as an array. It takes in the result set object as an argument.


5. affectedRows(): This function is used to retrieve the number of rows affected by the most recent database operation. It takes the database handle as a parameter, and returns the number of rows affected.

6. numRows(): This function returns the number of rows in the result set returned by a query. It takes in the result set object as an argument.

These functions are used to perform various operations on the database, such as executing queries, retrieving data, and counting rows. They are essential for interacting with databases in a consistent and reliable way, regardless of the specific database type being used.

Learn more about database here:

https://brainly.com/question/30634903

#SPJ11

____ is an easy way to invitation through a web page​

Answers

Correct Question:

_______ is an easy way to navigate through a web page.

Answer:

Scrolling.

Explanation:

The responsiveness of a webpage is an ability of the design to respond to the end user's digital device and screen size.

In Computer programming, a responsive web design makes it possible for various websites to change layouts in accordance with the user's digital device and screen size.

This ultimately implies that, a responsive design is a strategic approach which enables websites to display or render properly with respect to the digital device and screen size of the user.

Additionally, media queries are simple filter design that can be applied to cascaded style sheets(css).

Depending on the size of the viewport, media queries makes it easy to tweak styles depending on parameters such as width, orientation, height, resolution and display type of the device rendering the data

Hence, scrolling is an easy way to navigate through a web page. It avails the end users an ability to scroll (navigate) from side to side (left-right or right-left) and top to bottom (bottom-top) by using the horizontal and vertical onscreen scrollbars respectively.

Other Questions
Plot each point on the coordinate grid an expectation of business process design is that the improvements in performance will be at a minimum incremental. __________medications are the treatment of choice for epilepsy. a. Anti-inflammatory b. Dopamine replacement c. Anticonvulsive d. Antiviral What is QR ? Enter your answer in the box. Units The figure shows what appears to be obtuse triangle Q R S with obtuse angle R. Point T is on side Q R. Single tick marks pass through segments Q T and T R. Point U is on side R S. Double tick marks pass through segments R U and U S. Point V is on side S Q. Triple tick marks pass through segments S V and V Q. Segment T V is drawn and has length 5. 4. Segment U V is drawn and has length 6 in 2017 consumers' disposable income increased by $626 billion and their spending increased by $555 billion. what was the mpc? Marcus hikes at an average rate of 3 1 half miles per hour. How long will it take Marcus to hike 9 1 third miles at this rate? Type your answer in the blank as a mixed number in simplest form. Waves WS51. The following standing wave takes 2.0 s to complete.a) How many waves are here?b) Wavelength?c) Amplitude?d) Frequency?e) Speed? Explain the impacts of uneven development(4 Points)Quick response to be marked BRAINLIEST! Based on the map above, which of the following best explains why the Persian Gulf is important to oil production? Use The Chain Rule To Evaluate The Partial Derivative ????thetaG At The Point (????,theta)=(22,????4),(R,)=(22,4), Where ????(x,y)=1x+y2,G(X,Y)=1x+Y2, x=32????cos(theta),X=32rcos(), y=3????sin(theta).Y=3rsin(). (Use SymbolicUse the Chain Rule to evaluate the partial derivativeat the point (r, 0) == (2V2,4), where g(x, y) = x+12, x = 32r cos(8),Use the Chain Rule to evaluate the partial derivative ????thetag at the point (????,theta)=(22,????4),(r,)=(22,4), where ????(x,y)=1x+y2,g(x,y)=1x+y2, x=32????cos(theta),x=32rcos(), y=3????sin(theta).y=3rsin().(Use symbolic notation and fractions where needed.) Should international intervention in the internal affairs of other states be justified under international law? Why or why not? Explain.why does Goodall contrast the chimps and baboon behavior PLEASE HELPP!! I NEED THIS TO BE DONE IN 10 MINS ASAPPP ILL GIVE BRAINLY HELP Please!Read and choose the correct option to complete the sentence. Juanita y yo bajbamos por rpidamente. (1 point) la cuerda O la rayuela el tobogn el trompo Explain how this model represents the Pythagorean Theorem. The equation of (4+3) +5 = 4 +(3+5) is the Associative lawCommutative LawDistributive LawTransitive Law 21-3+18/6What is the correct answer? FDR and World WarIIPlease Answer the following questions Fast A cultural cause of prejudice is that itA.helps people bond to their own ethnic groupB.encourages acculturationC.increases disobedienceD.replaces official forms of discrimination in general, radio and television programming around the globe closely resembles that found in which nation? A population data set produced the following information N-250 x=9880, y=1456. xy-85080 x=485870, y = 135675 Find the value of oe and p LOOK AT THE IMAGE ABOVE to solve the problems. Please only answer if you KNOW.Show full steps please.Its due today!