Mikhail is working in an IDE and needs to test a program one step at a time to find and fix errors. What tool should he use?
a) compiler
b) source code editor
c) amend
d) build automation tool

Answers

Answer 1

Answer:

c) De bug ger

Explanation:

Edge 2020

Answer 2

Answer:

Hi

Explanation:

The answer would be a  de bug ger!

:)


Related Questions

Why should even small-sized companies be vigilant about security?

Answers

Answer:businesses   systems and data are constantly in danger from hackers,malware,rogue employees, system failure and much more

Explanation:

hackers are everywhere

Some operating systems add the command interpreter to the kernel .what will be the justification for this design principle?

Answers

Answer:

Some operating systems add the command interpreter to the kernel. What will be the justification for this design principle? It displays all the apps and programs in the computer. Fab Numbers Sid wants to find out the average of Fab numbers.

Explanation:

Some operating systems add the command interpreter to the kernel. What will be the justification for this design principle? It displays all the apps and programs in the computer. Fab Numbers Sid wants to find out the average of Fab numbers.

which type of cache memory is fastest for the processor to use?

Answers

The fastest type of cache memory for a processor to use is L1 cache. L1 cache is the fastest type of cache memory for the processor to use due to its proximity to the processor and fast access time

L1 cache is the closest cache memory to the processor and is built directly onto the processor chip. It has the smallest capacity but the fastest access time, making it ideal for storing frequently accessed data and instructions. L2 and L3 cache memory are further away from the processor and have larger capacities but slower access times.

Cache memory is an important component in a computer system that helps speed up the processing time by storing frequently accessed data and instructions. There are different types of cache memory, including L1, L2, and L3 cache. L1 cache is the smallest and closest cache memory to the processor, built directly onto the processor chip. L2 and L3 cache memory are further away from the processor and have larger capacities but slower access times. The reason L1 cache is the fastest type of cache memory for the processor to use is due to its proximity to the processor. Since it is built directly onto the processor chip, it has a much faster access time than L2 and L3 cache memory, which are further away. This means that the processor can quickly access frequently used data and instructions, reducing the time it takes to complete a task.

To know more about cache memory visit :-

https://brainly.com/question/29977825

#SPJ11

Question 4 Fill in the blank: To keep a header row at the top of a spreadsheet, highlight the row and select _____ from the View menu. 1 point Set Pin Freeze Lock

Answers

To keep a header row at the top of a spreadsheet, highlight the row and select Freeze from the View menu.

Keeping the header at a place on a spreadsheet

A spreadsheet is a software program that helps a user to perform

mathematical calculations on statistical data Arrange  raw numbers when assigned operations like total, average   Generate data visualizations eg  charts

When working with a  long spreadsheet and you want the header to stay at a place, you can freeze the header row or column as the case may be , this is done by:

Going to the View tab, Windows GroupClick the Freeze Panes drop down arrowSelect  Freeze Top Row or Freeze First Column

A thin line is indicated to show  where the frozen pane  starts.

See related answer on Freezing header row:https://brainly.com/question/16128207

How to Fix The ""Trust Relationship Between This Workstation And The Primary Domain Failed"" Error

Answers

Answer:

The "Trust Relationship Between This Workstation and the Primary Domain Failed" error can be caused by a number of issues, but some common steps to fix it include:

Check the network connection: Make sure that the workstation is properly connected to the network and that there are no issues with the network that might be causing the trust relationship to fail.

Check the DNS settings: Ensure that the DNS settings on the workstation are correct, and that the workstation can communicate with the domain controller.

Check the date and time on the workstation: Make sure that the date and time on the workstation are correct, as an incorrect time can cause the trust relationship to fail.

Check the group policy settings: Ensure that the group policy settings on the workstation are correct, and that the workstation is receiving the correct group policy settings from the domain controller.

Check the computer name: Confirm that the computer name is correct and that it is not duplicating with another computer on the network.

Re-join the computer to the domain: If all else fails, one of the most common solutions is to remove the workstation from the domain and then re-join it. This can be done by opening the System Properties on the workstation, and under the Computer Name tab, click on "Change". Then click on "More" and click on "Delete". Now re-join the computer to the domain by clicking on "Change" again and select "Computer Domain" and enter the domain name, then click on OK.

It is important to note that these steps are not exhaustive, and the specific solution to the error may vary

Explanation:

python fundamentals 2.4 code practice question 1

write the code to input a number and print the square root. use the absolute value function to make sure that if the user enters a negative number, the program does not crash.

sample run: -16
sample output : 4.0​

Answers

Answer:

import math

inputNumber = float(input('Please input a number'))

inputNumber = abs(inputNumber)

print(math.sqrt(inputNumber))

Explanation:

hey GSPAULING! lets do some PYTHON and PYTHON is epic because its logo has those python looking things. theres one thats blue and one thats yellow you know what im talking about right? ANYWAYS LETS WRITE SOME CODE

First how do we start?We need an input statement right?

inputNumber = int(input('Please input a number'))

ok so the line above which starts with "input" is the first line of our code, it's gonna ask the user for a number and the number will become the variable called "inputNumber" and it will be an integer type of variable, right?

and now the absolute value function is: abs()

so lets incorporate that in the next line

inputNumber = abs(inputNumber)

so now the negative numbers are going to be turned into positive numbers.

ok but now lets not forget to import the math module, you should actually put this line at the very beginning:

import math

ok now we can find the square root of the inputNumber variable and print it:

print(math.sqrt(inputNumber))

so the final program will be as follows:

import math

inputNumber = float(input('Please input a number'))

inputNumber = abs(inputNumber)

print(math.sqrt(inputNumber))

Write an LMC program as follows instructions:
A) User to input a number (n)
B) Already store a number 113
C) Output number 113 in n times such as n=2, show 113
113.
D) add a comment with a details exp

Answers

The LMC program takes an input number (n) from the user, stores the number 113 in memory, and then outputs the number 113 n times.

The LMC program can be written as follows:

sql

Copy code

INP

STA 113

INP

LDA 113

OUT

SUB ONE

BRP LOOP

HLT

ONE DAT 1

Explanation:

A) The "INP" instruction is used to take input from the user and store it in the accumulator.

B) The "STA" instruction is used to store the number 113 in memory location 113.

C) The "INP" instruction is used to take input from the user again.

D) The "LDA" instruction loads the value from memory location 113 into the accumulator.

E) The "OUT" instruction outputs the value in the accumulator.

F) The "SUB" instruction subtracts 1 from the value in the accumulator.

G) The "BRP" instruction branches back to the "LOOP" label if the result of the subtraction is positive or zero.

H) The "HLT" instruction halts the program.

I) The "ONE" instruction defines a data value of 1.

The LMC program takes an input number (n) from the user, stores the number 113 in memory, and then outputs the number 113 n times.

To know more about LMC program visit :

https://brainly.com/question/14532071

#SPJ11

What type of connector is used to connect an analog modem to a telephone line socket?.

Answers

RJ11 connector  is used to connect an analog modem to a telephone line socket.

What is connector?

Connector is defined as a network device, such as a PC, hub, or switch, that eliminates a segment of cabling or implements a condition of access. Connectors are parts or devices used, among other things, to electrically connect or disconnect circuits.

You most often use this RJ11 connector while connecting a phone or an analog modem to your POTS system, also known as the Plain Old Telephone System. Technically speaking, this is a six-position, two-conductor connector.

Thus, RJ11 connector  is used to connect an analog modem to a telephone line socket.

To learn more about connector, refer to the link below:

https://brainly.com/question/28884222

#SPJ1

waluigi for smash who agrees ​

Answers

Answer:

I do

Explanation:

Well, if i didnt, i wouldn't be part of the internet, now would I?

(can i get brainliest? pls?)

totally i agree-even tho i dont really play anymore

which statements compares the copy and cut commands

Answers

The statement that accurately compares the copy and cut commands is 2)Only the cut command removes the text from the original document.

When using the copy command, the selected text is duplicated or copied to a temporary storage area called the clipboard.

This allows the user to paste the copied text elsewhere, such as in a different location within the same document or in a separate document altogether.

However, the original text remains in its original place.

The copy command does not remove or delete the text from the original document; it merely creates a duplicate that can be pasted elsewhere.

On the other hand, the cut command not only copies the selected text to the clipboard but also removes it from the original document.

This means that when the cut command is executed, the selected text is deleted or "cut" from its original location.

The user can then paste the cut text in a different place, effectively moving it from its original location to a new location.

The cut command is useful when you want to relocate or remove a section of text entirely from one part of a document to another.

For more questions on cut commands

https://brainly.com/question/19971377

#SPJ8

Question: Which statement compares the copy and cut commands?

1. only the copy command requires the highlighting text

2. only to cut command removes the text from the original document

3. only the cut command uses the paste command to complete the task

4. only the copy command is used to add text from a document to a new document

State 5 or more differences between an application and a website or webpage

Answers

The differences between an application and a website or webpage are:

Since a website is simply a collection of web pages, creating one is typically simple.

Because it has more security, a wider range of functionalities based on data processing, and different sorts of users than a website, a web application is more difficult to create.

What are the differences?

A webpage is a single web page with a specific URL, whereas a website is a collection of various webpages with information on various topics connected together under a single domain name.

Therefore, A website offers text and graphic content that visitors may view and read without having any interaction. With a web application, the user can do more than just view the page's content.

Learn more about website from

https://brainly.com/question/25817628
#SPJ1

to minimize the effect of echo, a device called a(n) ____ can be attached to a line. A.) echo supressor B.) repeater C.) amplifier D.) hub

Answers

Answer:

A) echo suppressor

Explanation:

Every command or instruction is called

Answers

Answer:

statement........................

Answer:

Exclamation action

Explanation:

command and a instruction use the same symbols

In a three-tier database architecture, what tier is used to model data?

Answers

The third tier is used to model data. This tier is often referred to as the Data Modeling tier and is responsible for the conceptualization of data and the organization of the data into a logical structure.

What is Data?
Data can be defined as a collection of values, symbols, or observations that are organized and processed so that they can be utilized for further analysis or interpretation. Data can come in many forms, such as numbers, text, images, audio, or video. Data can also be collected from a variety of sources, including surveys, observations, experiments, and databases. Data can be used to answer questions, make decisions, or support research.

To know more about Data
https://brainly.com/question/30395228
#SPJ4

can someone tell me why it says that and how i can fix it pls

can someone tell me why it says that and how i can fix it pls
can someone tell me why it says that and how i can fix it pls

Answers

View the image below for the answer.

can someone tell me why it says that and how i can fix it pls

What is cuny first login?

Answers

CUNY First is an online system used by the City University of New York (CUNY) for students, faculty, and staff to access academic and administrative information and services.

The CUNY First login is the process of entering your username and password to access your account on the CUNY First system. Once you are logged in, you can view your class schedule, grades, financial aid information, and more. It is important to keep your login information secure and not share it with anyone else.

The system allows users to register for classes, check grades, view financial aid information, and view student accounts. CUNY First also provides access to library resources, student services, and various administrative offices. In addition, CUNY First allows users to communicate with faculty and staff members using a secure messaging system.

Learn more about City University of New York at: https://brainly.com/question/29834134

#SPJ11

When you insert a Quick table, you cannot format it true or false

Answers

Answer:

True

Explanation:

Format the table the way you want — e.g. borders, shading, row height, alignment, emphasis, font size, etc. for the heading row and the table rows. You can use manual formatting, or one of the built-in table designs

Harry is the cloud administrator for a company that stores object-based data in a public cloud. Because of regulatory restrictions on user access to sensitive security data, what type of access control would you suggest he implement to meet his company's security policies?

Answers

Answer:

The correct answer will be "Mandatory access control".

Explanation:

MAC seems to be a security standard protocols limited by the designation, initialization including verification of the systems. These policies and configurations are implemented through one centralized controller and therefore are accessible to the system admin.MAC establishes and maintains a centralized implementation of sensitive requirements in information security.

Question 8 of 10
Which group may provide the best perspective on student life at a particular
school?
A. College deans
B. College professors
C. Freshman-year college students
D. Upperclassmen at the college
SUBMIT

Answers

Answer:

The answer would be D.

Explanation:

Answer:

D. Upperclassmen at the college

Explanation:

assume planets is an arraylist of strings and it currently contains several elements. also assume a string variable named first has been declared. write a statement that will assign the first element of the arraylist to the first variable. planets[0]

Answers

Use the get (index) method to obtain the first element of an array list by specifying index = 0. Utilize the get (index) method to obtain the last element of an array list by passing index = size – 1.

What assign first element array list to the first variable?

The element of the current Array List object at the provided index is returned by the get() function of the Array List class, which accepts an integer indicating the index value. As a result, if you supply 0 or list to this method, you can obtain the first element of the current Array List.

Therefore, The first item in an array is indexed as 0 when using zero-based array indexing, while the first item in an array using one-based array indexing is indexed as 1.

Learn more about array list here:

https://brainly.com/question/29309602

#SPJ1

Find the entropy of a source that emits one of 10 symbols A,B,C,D,E,F,G,H and I in a statistically independent sequence with probabilities 1/2,1/4,1/8,1/2,1/8,1/1,1/4,1/2 and 1/4 respectively

Answers

The entropy of the source is 2.079 bits. Entropy can be defined as a measure of the amount of uncertainty in a probability distribution.

In Information theory, it is used to quantify the amount of information that is conveyed by a message.

Given the probabilities p1, p2, ..., pn of n symbols, the entropy of the source is given by the formula:

H(X) = -p1 log p1 - p2 log p2 - ... - pn log pnIn this case, there are 10 symbols A, B, C, D, E, F, G, H, and I. Let p1, p2, ..., p10 denote their respective probabilities. We are told that these symbols are emitted in a statistically independent sequence.

This means that the probability of observing a particular sequence of symbols is simply the product of their individual probabilities.For example, the probability of observing the sequence ABFGI is given by:

P(ABFGI) = p1 * p2 * p6 * p8 * p10 Now, we are given the probabilities of the individual symbols:

p1 = 1/2p2 = 1/4p3 = 1/8p4 = 1/2p5 = 1/8p6 = 1/1p7 = 1/4p8 = 1/2p9 = 1/4

Using these probabilities, we can calculate the entropy of the source: H(X) = -p1 log p1 - p2 log p2 - ... - p10 log p10H(X) = -(1/2) log(1/2) - (1/4) log(1/4) - (1/8) log(1/8) - (1/2) log(1/2) - (1/8) log(1/8) - (1/1) log(1/1) - (1/4) log(1/4) - (1/2) log(1/2) - (1/4) log(1/4)H(X) = 2.079 bits

Therefore, the entropy of the source is 2.079 bits.

To know more about entropy visit:

brainly.com/question/9171028

#SPJ11

True or False:
The national institute of standards and technology (NIST) maintains the common vulnerabilities and exposures (cve) list.

Answers

The National Institute of Standards and Technology (NIST) does not maintain the Common Vulnerabilities and Exposures (CVE) list. False. statement.

The CVE list is actually managed and maintained by the MITRE Corporation, a not-for-profit organization that operates federally funded research and development centers (FFRDCs) in the United States.

NIST, on the other hand, is a non-regulatory agency within the United States Department of Commerce that focuses on advancing measurement science, standards, and technology. While NIST is involved in cybersecurity, its role is different from that of the MITRE Corporation in maintaining the CVE list.NIST does provide the National Vulnerability Database (NVD), which is a comprehensive resource for information about security vulnerabilities, including those from the CVE list. The NVD includes information such as the severity of each vulnerability, potential impacts, and possible mitigations. However, it is essential to distinguish between the roles of NIST and MITRE Corporation in managing and maintaining information related to cybersecurity vulnerabilities.

Know more about the cybersecurity

https://brainly.com/question/28004913

#SPJ11

You have to insert the author's name at the bottom of all the pages of an article
prepared in the word processor. Which of the following tools is the most suitable
for this?
a) Footer
b) Merge Cells
c) Insert Rows
d) Header​

Answers

Answer:

Footer

Explanation:

what security feature can be used on the pitt fitness access database?

Answers

The security feature that can be used on the pitt fitness access database is revoke a given user's right.

Depending on the use for which it was created, an Access database can hold thousands, hundreds of thousands, or even millions of records. A teacher may have dozens of records in the databases for their classes; a school district may have hundreds or thousands of records to collect and maintain; an organization like IBM will have tens of thousands, perhaps even millions, of records spread across multiple databases that contain information about its employees and other types of data; and a US government agency like the IRS will undoubtedly have database with millions of records.

It is challenging to maintain such vast amounts of data. It's not unexpected that the computer has come to the aid of those of us who want to manage data because it is difficult to keep even tiny amounts of data.

People have come up with the idea of organizing data into records to prevent a hodgepodge of data arranged randomly. Fields are found in records. The fundamental components of data, text and numbers, are entered into each field as entries.

To know more about database click on the link:

https://brainly.com/question/6447559

#SPJ4

How do you debug an Xcode project?

A.
by selecting the Debug option in the Tools menu
B.
by clicking on the Debug Navigator
C.
by clicking on the Run button
D.
by clicking on the Debug button on the bottom right

How do you debug an Xcode project? A. by selecting the Debug option in the Tools menu B. by clicking

Answers

Answer:

in my opinion i think it is "C" by clicking on the run button...

write down the stages in the information prcessing cycle in correct order​

Answers

Answer:

The answer is below

Explanation:

The various stages in the information processing cycle in the correct order​ is as follows:

1. Input stage: this is when the data is sent into the computer through the hardware

2. Processing stage: this when the is being refined in the central processing unit of the computer

3. Storage stage: this is when the data is being saved or stored in the computer memory such as Hard drive or external storage such as Flash drive

4. Output stage: this is when the refined or processed data is produced to the user either through the monitor screen or printing

What are the file extensions of files created with: - Microsoft Office Access - Microsoft Office Publisher

Answers

Answer:

The file extensions of files created with Microsoft Office Access is .adb for Access project

The file extension of files created with Microsoft publisher is .pub

Explanation:

The file extensions of files created with Microsoft Office Access are;

.adp = Access project

.adn = Access blank project template

.accdb= Access database for 2007, 2010, 2013, and 2016 versions

Other file extensions include

laccdb, .accdw, .accdc, .accda, .accdr, .accdt, .mdb, .mda, .mdw, .mdf, .mde, .accde, .mam, .mad, .maq, .mar, .mat, .maf

The file extension of files created with Microsoft publisher is the .pub

To create a minimal Linux installation, for a bastion host for example, which mode should you install the operating system in?

Answers

Answer:

"Text" is the right approach. A further explanation is given below.

Explanation:

Visitors understand exactly unless the whole dashboard or window becomes black, you're throughout text format, demonstrating characters. Predominantly, a text-mode authentication display shows several other additional data about everything from the computer system you're continuing to operate on, this same signature including its device, and perhaps a encourage desperately looking for someone like you to sign this into Linux.

Enter the following calculations in the claims log (retaining the banded rows effect when you AutoFill formulas over rows): a. In column H, display the hold time in seconds for each call made to the claims center by calculating the difference between the column G and column F values and multiplying that difference by 24*60*60, Check your formula by verifying that the first hold time is 29 seconds. B. If column I, use the IF function to return the value if the hold time from column H is greater than the hold-time goal in cell B10; otherwise, return the value 0. C. In column K, calculate the length of the call with the agent in minutes by subtracting the values in column J from the values of column G, and then multiplying the difference by 24*60. Use the ROUNDUP function to round the value to the next highest integer. Check your formula by verifying that the first call duration is 21 minutes d. In column L, use the Quick Analysis tool to calculate the running total of the call duration values in minutes. Remove the boldface font from the values. Check your work by verifying that the value in cell L1287 is 32597

Answers

D. In column L, use the Quick Analysis tool to calculate the running total of the call duration values in minutes. Remove the boldface font from the values. Check work: 32597.

What is the values ?

The values of any given concept or situation can vary depending on the perspective of the individual. In some cases, values may be rooted in personal beliefs, cultural norms, or religious teachings. In other cases, values may be determined by societal trends or empirical data. Some values may be universal, while others may be unique to specific groups or individuals. Ultimately, values are the principles and standards that we live by and guide our attitudes, behavior, and decision making.

A. In column H, enter the formula "=(G2-F2)*24*60*60" and AutoFill down. Check work: 29 seconds.

B. In column I, enter the formula "=IF(H2>$B$10,H2,0)" and AutoFill down.

C. In column K, enter the formula "=ROUNDUP((G2-J2)*24*60,0)" and AutoFill down. Check work: 21 minutes.

To learn more about values

https://brainly.com/question/30317504

#SPJ1

The CEO of CorpNet.xyz has hired your firm to obtain some passwords for their company. A senior IT network administrator, Oliver Lennon, is suspected of wrongdoing and suspects he is going to be fired from the company. The problem is that he changed many of the standard passwords known to only the top executives, and now he is the only one that knows them. Your company has completed the legal documents needed to protect you and the company. With the help of a CorpNet.xyz executive, you were allowed into the IT Admin's office after hours. You unplugged the keyboard from the back of the ITAdmin computer and placed a USB keylogger into the USB, then plugged the USB keyboard into the keylogger. After a week, the company executive lets you back into the IT Admin's office after hours again. In this lab, your task is to use the keylogger to recover the changed passwords as follows: Move the keyboard USB connector to a different USB port on ITAdmin. Remove the keylogger from ITAdmin. Move the consultant laptop from the Shelf to the Workspace. Plug the keylogger into the consultant laptop's USB drive. Use the SBK key combination to toggle the USB keylogger from keylogger mode to USB flash drive mode. Open the LOG.txt file and inspect the contents. Find the olennon account's password. Find the Administrator account's password. Answer the questions.

Answers

Answer:

The olennon account's password: See the attached file for this.

The Administrator account's password: 4Lm87Qde

Explanation:

Note: See the attached excel file for the olennon account's password as I was unable to save it here because I was instead getting the following message:

"Oh no! It seems that your answer contains swearwords. You can't add it!"

The olennon account's password and the Administrator account's password can be found as follows:

To see the rear of the computer, click Back from the menu bar above the computer.

Drag the USB Type A connector for the keyboard from the rear of the computer to another USB port on the machine.

Make sure the keyboard is plugged back in.

Expand System Cases on the shelf.

Add the Laptop to the Workspace by dragging it there.

To see the rear of the laptop, click Back from the menu above the laptop.

Drag the keylogger from the computer to the laptop's USB port.

Select Front from the menu above the laptop to see the front of the laptop.

Select Click to display Windows 10 on the laptop.

Toggle between keylogger and flash drive mode by pressing S + B + K.

To control what occurs with detachable drives, select Tap.

To view files, choose Open folder.

To open the file, double-click LOG.txt.

Select Answer Questions in the top right corner.

Respond to the questions.

Choose Score Lab as the option.

Therefore, we have:

The olennon account's password:

The Administrator account's password: 4Lm87Qde

Other Questions
What is the biggest lesson we can learn from theHolocaust? 5-7 sentences What is the measure of this missing angle plsss teach me how to do this Is this a function or not. Then state domain and range. WILL GIVE BRAINLEIST Briefly explain why many of the subjects of Renaissance art are Christian in nature the force between two charges is 10 n. if the distance between the two charges is tripled and both of the charges are tripled, what is the resulting force between the two charges? What is the perimeter of the shape below, given a = 8.16, b = 234, C = 461,0 =2.56, e = 8.00, f = 2.51, g = 9.81 (5x-3)^2 -60x=(5x-3)^2 Assume the propagation delay in a broadcast network is 5 yes and the frame transmission time is 10 js. (2 points) (a) How long does it take for the first bit to reach the destination? (b) How long does it take for the last bit to reach the destination after the first bit has arrived? What is the potential difference between yi =3cm and yf =3cm in the uniform electric field E =(20,000i^75,000j^)V/m?Express your answer as an integer and include the appropriate units. Well-structured relation contains minimal redundancy and allows users to manipulate the relation without errors or inconsistencies. true/ false 3. PHYSICS Suppose you are traveling in a car when a beam of light passes from the air to the windshield. The measure of the angle of incidence 0; is 55, and the measure of the angle of refraction 0, is 35.25. sin i Use Snell's Law, = n, to find the index of sin Or refraction n of the windshield to the nearest thousandth which state of matter is this picture ? based on their scientific names one can tell that the big cats panthera tigris panthera leo panthera onca and panthera pardus do not belong to the same what The rate constant of a certain reaction is known to obey the Arrhenius equation, and to have an activation energy =Ea20. 0/kJmol. If the rate constant of this reaction is 7. 7107M1s1 at 221. 0C, what will the rate constant be at 253. 0C?Round your answer to 2 significant digits Why a community must help in cleaning up the beach Choose the right answers to the following: a) Which of the following is NOT a property of organizational communication network links, according to lecture? Group of answer choices a.Strength b.Symmetry c.Parallelism d.Multiplexity e.None of the above 2 - 7 = 5 +8Can u help me plzzzzz Using C language.Write a program that reads an integer number from a.txt file and prints maximum digit in the number. how can you correct other people from believing different myths and fallacies about non-communicable disease?please help Ancientgrew to 40 m, but are smaller today.