Section-C (Choose the correct Answers) (1 x 2 = 2 4. Program to create a file using file writer in Blue-J. import java.io.FileWriter; import java.io. [OlException, IOException] public class CreateFile { public static void main(String[] args) throws IOException { // Accept a string String = "File Handling in Java using "+" File Writer and FileReader"; // attach a file to File Writer File Writer fw= FileWriter("output.txt"); [old, new] // read character wise from string and write // into FileWriter for (int i = 0; i < str.length(); i++) fw.write(str.charAt(i)); System.out.println("Writing successful"); //close the file fw. LO; [open, close] } }

Answers

Answer 1

The provided code demonstrates how to create a file using the FileWriter class in Java. It imports the necessary packages, creates a FileWriter object, and writes a string character by character to the file.

Finally, it closes the file. However, there are a few errors in the code that need to be corrected.

To fix the errors in the code, the following modifications should be made:

The line File Writer fw= FileWriter("output.txt"); should be corrected to FileWriter fw = new FileWriter("output.txt");. This creates a new instance of the FileWriter class and specifies the file name as "output.txt".

The line fw.LO; should be corrected to fw.close();. This closes the FileWriter object and ensures that all the data is written to the file.

After making these modifications, the code should work correctly and create a file named "output.txt" containing the specified string.

To know more about file handling click here: brainly.com/question/32536520

#SPJ11


Related Questions

Companies use computers for which of the following?

Answers

Answer:

Buisness,creation,advertising.

A mechanic uses a screw driver to install a ¼-20 UNC bolt into a mechanical brace. What is the mechanical advantage of the system? What is the resistance force if the effort force is 5 lb.

Answers

Answer:

15.7 ; 78.5

Explanation:

Mechanical advantage of a screw = Circumference / pitch

Circumference = pi × d

Where :

pi = 3.142, D = diameter

Therefore ;

Circumference = 3.142 × (1/4) = 0.785 in

Pitch = 1/TPI

TPI (thread per inch) = 20

Pitch = 1/ 20 = 0.05

Mechanical advantage = 0.785 / 0.05 = 15.7

Resistance force if effort force is 5lb

Mechanical advantage = Fr / Fe

Fe = effort force, Fr = resistance force

15.7 = Fr / 5

Fr = 15.7 × 5 = 78.5 lbs

Here is a sequence of binary digits:
011000101110010100110100010001110101001110001010101
What could this sequence represent? What could it mean?

A. A piece of text
B. A number
C. A set of instructions
D. Musical notes
E. Any piece of information

Could I have some help please?

Answers

Answer:

E

Explanation:

trust me

c) Research the different ways to connect to the internet (e.g. phone line, cable, satellite, wireless) as well as a "ballpark" price range for internet service. Please share 3 different carriers (ie. Bell, Rogers, Telus, etc.) and state the specific plans/specifications.

Answers

The research about internet carriers are as follows.

Bell Canada: Offers DSL and fiber-optic connections. Plans include Bell Fibe Internet with speeds up to 1.5 Gbps. Prices range from $50 to $150 per month.Rogers: Provides cable and fiber connections. Plans include Ignite Internet with speeds up to 1 Gbps. Prices range from $60 to $110 per month.Telus: Offers DSL and fiber-optic connections. Plans include PureFibre Internet with speeds up to 1 Gbps. Prices range from $65 to $125 per monWhat is an internet carrier?

An Internet service provider (ISP) is a company that offers services for connecting to, utilizing, administering, or participating in the Internet. ISPs can be organized in a variety of ways, including commercial, community-owned, non-profit, or privately held.

The Internet, sometimes known as "the Net," is a worldwide network of computer networks -- a network of networks in which users at any one computer may obtain information from any other computer (and occasionally chat directly to users at other computers) provided they have permission.

Learn more about  internet at:

https://brainly.com/question/21527655

#SPJ1

What color line appears under a word that is spelled incorrectly in power point

Answers

Answer:a wavy red line

Explanation:

Hope this helps

Can I have brainliest pls

Answer:

ReD

Explanation:

BeCaUsE

What do you think could be done to encourage more women to study computer science

Answers

   many top colleges are making efforts to recruit female computer science students, making it an ideal time for women to pursue computer science degrees. The computer science field has been trying to appeal more to female employees by moving toward longer maternity leave and better work-life balance for working moms. I think that there have been great strides in encouraging women and minorities to consider studying computer science. I see increased interest and participation among women and minorities in my community and it is encouraging, however, I also recognize that I live in a pretty unique place. To combat this type of challenge, I think we need to continue to normalize the idea of females in Computer Science and also expand the programs outside of big cities and academic towns.

Explanation: these are reasons why women should do computer science.

hope this helps :)

Need the answer rn!!!!

Need the answer rn!!!!

Answers

Answer:

what language is this? english or no

Explanation:

True/False : Software engineering is a balancing act. Solutions are not right or wrong; at most they are better or worse.

Answers

True. Software engineering is a complex and multifaceted field that involves finding solutions to a wide range of problems. Because software systems are often highly complex and involve many interacting components, there is rarely a single "right" solution to a given problem.

Instead, software engineering is often a matter of balancing trade-offs between different factors such as performance, security, maintainability, usability, and cost.

As a result, software engineering often involves making difficult decisions about which features to include, which technologies to use, and how to allocate resources. In many cases, the "best" solution is the one that strikes the right balance between competing priorities and constraints.

However, it is important to note that even if there is no one "right" solution to a given problem, there are still better and worse solutions based on various criteria such as efficiency, scalability, maintainability, and user satisfaction. Therefore, software engineers must be skilled in evaluating and selecting the best solutions for a given problem based on the available information and the specific requirements of the project.

Learn more about Software here:

https://brainly.com/question/985406

#SPJ11

In the shared responsibility model, AWS responsible for providing what?(Select best answer)
Pilihan jawaban
Security of the cloud
Security to the cloud
Security for the cloud
Security in the cloud

Answers

In the shared responsibility model, Amazon Web Services (AWS): responsible for providing Security of the cloud.

What exactly is AWS responsibility “Security of the Cloud”?

AWS is responsible for the infrastructure that underpins all AWS Cloud services. This infrastructure consists of the hardware, software, networking, and facilities used to provide AWS Cloud services.

AWS and all its customers share the responsibility for security and compliance. This shared model can help relieve the customer's operational burden because AWS operates, manages, and controls the components from the host operating system and virtualization layer down to the physical security of the infrastructure where the service is provided.

The customer is responsible for and manages the guest operating system (including updates and security patches), other associated application software, and the AWS provided security group firewall.

To learn more about Amazon Web Services (AWS):, visit: https://brainly.com/question/14014995

#SPJ4

Do you think it's ethical for tech companies to use someone's personality type, browsing habits, and online behavior to personalize their experience?

Answers

Answer:

Yes. As long as they tell you about it and give you the option to opt out.

Explanation:

With the user's consent, it is fine. If the user does not know about it or says no and the company continues then it becomes unethical as it is a breach of trust and a violation of that user's privacy.

Explain the application of artificial applications.

Answers

Explanation:

AIAI or artificial intelligence is the simulation of human intelligence processes by machines, especially computer systems. These processes include learning, reasoning and self-correction. Some of the applications of AI include expert systems, speech recognition and machine vision. Artificial Intelligence is advancing dramatically. It is already transforming our world socially, economically and politically.

AI was coined by John McCarthy, an American computer scientist, in 1956 at The Dartmouth Conference where the discipline was born. Today, it is an umbrella term that encompasses everything from robotic process automation to actual robotics. AI can perform tasks such as identifying patterns in the data more efficiently than humans, enabling businesses to gain more insight out of their data. With the help from AI, massive amounts of data can be analyzed to map poverty and climate change, automate agricultural practices and irrigation, individualize healthcare and learning, predict consumption patterns, streamline energy-usage and waste-management.

Answer:

May not be as long as the other answer but here is what I got

Explanation:

AI or artificial intelligence is the simulation of human intelligence processes by machines, especially computer systems. These processes include learning, reasoning and self-correction. Some of the applications of AI include expert systems, speech recognition and machine vision.

Please mark as brainliest

Which situations are a good fit for using telehealth? Select 4 options.
A. You need an appointment to get tested for allergies.
B. You doctor sends you an email to remind you about an appointment.
C. You had a car wreck.
D. Your doctor emails you because your heart monitor shows an abnormality.
E. You need a referral to a skin doctor.

Answers

Answer:

A, B, C and E

Here, hope this helps...... ;)

what information about a cisco router can be verified using the show version command?

Answers

- the routing protocol version that is enabled.
- the value of the configuration register.
- the operational status of serial interfaces.
- the administrative distance used to reach networks.

Which virtualization products are used for bare-metal virtualization?

Answers

Bare-metal virtualization, also known as Type 1 or native virtualization, involves running a hypervisor directly on the host's hardware without the need for a separate operating system. This allows for efficient and direct access to the underlying hardware resources. Several virtualization products are commonly used for bare-metal virtualization. Here are some examples:

1. VMware ESXi: VMware ESXi is a leading virtualization platform specifically designed for bare-metal virtualization. It is a lightweight hypervisor that directly runs on the server hardware. ESXi provides advanced features for managing and consolidating virtual machines (VMs), such as live migration, high availability, and resource allocation controls.

2. Microsoft Hyper-V: Hyper-V is Microsoft's native hypervisor for bare-metal virtualization. It is an integral component of the Windows Server operating system. Hyper-V offers features like live migration, clustering, and integration with other Microsoft technologies. It is commonly used in enterprise environments running Windows-based virtual machines.

3. Citrix Hypervisor: Formerly known as Citrix XenServer, Citrix Hypervisor is a robust bare-metal virtualization solution. It is based on the open-source Xen hypervisor and provides enterprise-level features such as high availability, resource pooling, and virtual machine live migration. Citrix Hypervisor is often used in virtualized desktop infrastructure (VDI) environments.

4. KVM (Kernel-based Virtual Machine): KVM is an open-source virtualization solution built into the Linux kernel. It allows for bare-metal virtualization on Linux servers. KVM provides strong performance and scalability and is widely used in cloud computing environments. It is supported by various Linux distributions and can run both Linux and Windows-based virtual machines.

5. Oracle VM Server: Oracle VM Server is a hypervisor-based virtualization solution developed by Oracle. It is designed to run on bare-metal servers and provides features like live migration, high availability, and centralized management. Oracle VM Server is commonly used in Oracle software and hardware environments.

These virtualization products enable the creation and management of virtual machines directly on the hardware, allowing for efficient resource utilization and improved performance. They offer various features and management tools to facilitate the deployment, monitoring, and administration of virtualized environments. The choice of a virtualization product for bare-metal virtualization depends on factors such as specific requirements, compatibility with existing infrastructure, vendor support, and cost considerations.

Please mark this as the answer, Thank You!

Geraldo would like to compare two areas of text, Text1 and Text2, to each other. What steps should he take?
od
select Text1, hit F1, click. "Compare to another selection," select Text2
select Text1, hold Shift+F1, click "Compare to another selection," select Text2
hold Shift+F1, select Text1, hold Shift+F1 again, select Text2
Ohit F1, select Text1, hit F1 again, select Text2

Answers

i think the second one

​during termination of twisted pair cabling, what should be done to ensure minimal cross talk is introduced?

Answers

​During termination of twisted pair cabling, the factor that should be done to ensure minimal cross talk is introduced is that ​No more than 1 inch of the cable should be exposed.

What is the most common termination method for twisted pair wire?

Crimping is known to be the most commonly used form or method of wire termination, and it is known to be one that is seen as the most efficient for high-weight  wire termination.

Therefore, ​During termination of twisted pair cabling, the factor that should be done to ensure minimal cross talk is introduced is that ​No more than 1 inch of the cable should be exposed.

Learn more about twisted pair cabling from

https://brainly.com/question/25337328

#SPJ1

During termination of twisted pair cabling, what should be done to ensure minimal cross talk is introduced?

​No more than 1 inch of the cable should be exposed.

​No less than 1 inch of the cable should be exposed.

​Each pair should be stripped of insulation so that it doesn't get caught in the jack.

​Each pair should be twisted around another pair to reduce cross talk.

What does ""we have received notice that the originating post is preparing to dispatch this mail piece"" mean (from USPS)?

Answers

It indicates that the item or items you are shipping through the USPS have had tracking information generated for them, have typically been scanned into the system, and that the originating post, which serves as the starting point for those packages, is preparing to move that shipment through the USPS infrastructure.

What is USPS (U.S. Postal Service)?

The U.S Post Office, also referred to as the United States Postal Service (USPS).

The delivery of mail service throughout the United States, including its associated states and insular territories, is the responsibility of U.S. Mail, an independent executive branch organization.

It is one of the few governmental organizations that the US Constitution expressly grants authority to.

516,636 career employees and 136,531 non-career employees work for the USPS as of 2021.

To know more about USPS, visit: https://brainly.com/question/28163049

#SPJ4

Which expression can be used to find the surface area of the following square pyramid?
10

Which expression can be used to find the surface area of the following square pyramid?10

Answers

Answer:

100+40+40+40+40

Explanation:

hopes this help :)

Machine learning systems analyze patterns in data to improve their performance automatically.
True
False

Answers

Note It is TRUE to state that Machine learning systems analyze patterns in data to improve their performance automatically.

What is a Machine learning System?

Machine learning is a branch of artificial intelligence that is widely described as a machine's capacity to mimic intelligent human behavior. Artificial intelligence systems are used to do complicated tasks in a manner comparable to how people solve issues.

There are three forms of machine learning: supervised, unsupervised, and reinforcement learning.

Machine learning is used in search engines, email filters to filter out spam, websites to create personalized recommendations, banking software to detect anomalous transactions, and many apps on mobile phones, such as voice recognition.

Learn more about Machine Learning Systems:
https://brainly.com/question/28470561
#SPJ1

isdn stands for a. integrated services digital network b. inter-state data network c. improved speed digital network d. inter-state digital network

Answers

ISDN stands for Integrated Services Digital Network.

ISDN is a telecommunications network that allows the transmission of digital data, voice, and video over existing copper telephone lines. It was developed as a successor to the traditional analog telephone system, providing improved speed and efficiency for transmitting various types of information.

ISDN enables the integration of multiple services, such as telephone calls and data transfer, over a single network connection. It supports digital signaling and offers faster data transfer rates compared to analog systems. The acronym "ISDN" specifically refers to "Integrated Services Digital Network," emphasizing its capability to handle different types of services simultaneously.

Learn more about network click here:

brainly.com/question/29350844

#SPJ11

''/--//.I want a new account///.--/'''

Answers

Answer:

nice cause nice

Explanation:

it's nice due to you wanting a new account

Answer:

Instead of signing into this account, you can click on "sign up" and then create a new account..

Explanation:

If that doesn't work, then I'm sorry.

Have a great day, or night, wherever your at, and always know that I'm here if you need someone to talk to if something or someone is bothering you.

HELP ASAP PLZ!
A shape with a Wipe animation wipes from left to right, but Paco wants it to wipe from right to left. What button
should he click on the Animations tab to change the animation?
a)Effect Options
b)Reorder Animation
c) Duration
d) Timing

Answers

B. Reorder Animation

Click on the effect options in the animation tab to change the animation.

Microsoft PowerPoint is a presentation program that allows users to create visual presentations comprised of individual slides.

In PowerPoint, you can animate text and objects such as clip art, shapes, and pictures so as to draw the audience's attention to specific content or to make the slide easier to read.

You can change the effects of animation, these options can be accessed from the Effect Options command in the Animation group.

Find out more at: https://brainly.com/question/12104004

Difference between software developer and software engineer.

Answers

Answer:

The core difference between the two jobs is that software developers are the creative force that deals with design and program implementation, while software engineers use the principles of engineering to build computer programs and applications.

Explanation:

Answer: The terms "software developer" and "software engineer" are often used interchangeably, but there are some subtle differences between the two roles.

Explanation: Here are some key differences:

Focus: A software developer typically focuses on the implementation of software code and applications based on design specifications, while a software engineer is involved in the entire software development lifecycle, including design, development, testing, deployment, and maintenance.Education and training: Software engineers usually have a broader education and training than software developers, with a strong foundation in computer science and software engineering principles. Software developers may have more specialized training in specific programming languages, frameworks, or technologies.Job responsibilities: Software engineers often take on more managerial or leadership responsibilities, such as project management, requirements analysis, and team leadership, while software developers typically focus more on writing and testing code.Professional standards: Software engineering is typically governed by professional standards and codes of ethics, which may not apply to software development. This reflects the more rigorous and disciplined approach to software engineering compared to software development.

To learn more about software developer; https://brainly.com/question/3188992

Which of the follow efficiencies would be considered unreasonable?

Answers

Answer:

Exponential or factorial efficiencies algorithms

Explanation:

In a computer engineering system, the efficiencies that would be considered unreasonable is the "Exponential or factorial efficiencies algorithms"

This is unlike Algorithms with a polynomial efficiency that is considered to have Reasonable Time.

1.What is the term referring to an amount of money that is owed?

Answers

Answer:

debt

Explanation:

ur welcome brody

Answer:

Debt?

Explanation:

type cat /etc/passwd at the prompt to answer the following questions: what is the uid for the schawla user account? what is the full user's name (gecos field) for the rcronn user account? what is the primary group id for the ftp user account? what is the path of the home directory for the root user account?

Answers

When you type the command at the prompt, the response based on the question are:

The UID for the schawla user account is 509.The  full user's name (GECOS field) for the rcronn user account is Robert Cronn.The primary group ID for the ftp user account is 50The  path of the home directory for the root user account is /root.

What is etc command?

The term, the file is said to be a form of a tool that is often used to keep note or records  of all registered user that has access to a system.

Note that the  file is said to be a colon-separated form of  file that has  the information such as the User name and an encrypted password.

The cat  is said to be the short  form for “concatenate“  command  and it is known to be one that used a lot in commands in the are of Linux/Unix-like operating systems. The cat command gives us room to be able to make  single or a lot of files, view content of a file, as well as concatenate files and move the output in terminal or files.

Learn more about  Command  from

https://brainly.com/question/25808182
#SPJ1

31) Listed below are four general means of authenticating a user's identity, which can be used alone or in combination, provide two examples of each mean. a) Something the individual knows b) Something the individual possesses: c) Something the individual is (static biometrics): d) Something the individual does (dynamic biometrics): 20 points 32) Explain the following attacks and provide the countermeasure for each on of then: a) Specific Account Attack The standard countermeasure b) Workstation Hijacking The standard countermeasure C)Password Guessing Against single user The standard countermeasure

Answers

Answer:

31) Examples of the means of authenticating a user's identity that can be used alone or in combination are;

a) Something the individual knows;

The Personal Identification Number (PIN)

The password to an account

Answer to a (complete) set of questions

b) Something the individual possesses

An ATM card

A SIM card

Other examples includes;

Physical keys to a lock

Smart cards

Electronic Key-Card used for physical entrance into an apartment

c) Something the individual is (Static biometrics)

The fingerprint

Face recognition

Retina recognition

d) Something the individual does (dynamic biometrics);

Recognition of typing rhythm

Characteristics of the users handwriting

Voice pattern recognition

32) a) Specific account attack

A specific account is targeted for the attack by the attacker attempting to gain access by submitting guesses of the account password with the aim of finding the correct password

Countermeasure;

Limiting the number of password guesses

The use of strong passwords having over 8 characters that includes special characters

Use of multi-factor authentication

b) Workstation Hijacking

The attacker takes advantage of an logged-in unattended workstation

Countermeasure;

The use of automatic lock functions that use time of inactivity on a system or the absence of a paired device

c) Password Guessing

Password guessing is the technique used while online in an attempt to prove to being the authentic particular user by means of trial and error of a user password

Countermeasure;

The use of a two or more of authentication method also known as a multi-factor authentication MFA

Explanation:

When HTTPS is used, the contents of the document are encrypted but the URL of the requested document is still sent in plaintext.

Answers

The given statement that is "When HTTPS is used, the contents of the document are encrypted but the URL of the requested document is still sent in plaintext" is FALSE.

HTTPS stands for Hypertext Transfer Protocol Secure. It is a secure version of HTTP, the protocol used to send data between your web browser and the website you are accessing.

HTTPS is designed to keep your data safe and prevent third parties from accessing it. It is achieved by encrypting the data sent between your browser and the website with a secure connection called SSL (Secure Sockets Layer) or TLS (Transport Layer Security).

When you visit a website using HTTPS, the entire communication between your browser and the website is encrypted. This means that not only the contents of the document, but also the URL of the requested document is encrypted and sent in ciphertext instead of plaintext. Therefore, the given statement is False.

Learn more about HTTPS at

https://brainly.com/question/12717811

#SPJ11

A scanner connected to your mac is giving problems and you suspect corrupted device drivers. What should you do first? second?.

Answers

The first thing you should do is to download and install drivers from the scanner manufacturer and then update your macOS.

What is a scanner?

A scanner can be defined as a type of input device that is designed and developed to access, read, scan, or store (memorize) information about a physical object such as a paper-document, especially through the use of a light beam.

In this scenario, the first thing you should do is to download and install drivers from the scanner manufacturer's website and then update your computer's operating system (macOS).

Read more on input devices here: brainly.com/question/5430107

#SPJ1

The first step is to obtain and install scanner drivers, followed by a macOS update.

What is an input device?

An input device is any piece of hardware that sends data to the computer.

A scanner connected to your mac is giving problems and you suspect corrupted device drivers.

A scanner is a sort of input machine that enables a laser beam to view, read, scan, or store (memorize) details about a physical product such as a printed document.

In this case, the first step you should go to the scanner company's website and simply download drivers, then install your computer or network.

More about the input device link is given below.

https://brainly.com/question/13014455

#SPJ4

Which table code is correct?

Which table code is correct?

Answers

Answer:  3rd one down

Explanation:

Other Questions
A consumer's utility function isu = xx-awhere 1 and 2 are the quantities consumed of goods one and two, respectively, and a is a parameter. Let P1 and p2 denote the prices of goods one and two, respectively, so that the total expenditure in goods one and two is P11+ P2x2. The minimum expenditure that can be achieved subject to the constraint that the consumer achieves the level of utility u is given bye = papaa(this expression can be obtained by solving the corresponding constrained optimization problem). Calculate an approximation to the change in e due to increasing the level of utility by a small quantity d. Complex numbers are used in electronics to describe the current in an electric circuit. Ohm's law relates the current in a circuit, I, in amperes, the voltage of the circuit, E, in volts, and the resistance of the circuit, R, in ohms, by the formula E=ir . Find E, the voltage of a circuit if i=(6-3i) amperes and r=(7+8i) Kelsey just got an F on her midterm. When she comes home, she becomes angry at her little brother for making loud noises. It is likely that Kelsey will: Do you believe peace in Israel/West Bank is possible? Why or why not? Who sailed To Englands new Colonies on the Mayflower because They wished to protect their Freedom Or religion worship? A. john smith and and john rolfe B. the PilgrimsC. Spuanto and samoset D. The anglicans A new homeowner is purchasing a living room set for $2,975 and must decide between two financing offers.Offer 1: $250 down payment, remaining balanced financed at a 24.90% interest rate, compounded monthly, for 3 years.Offer 2: $400 down payment, remaining balanced financed at a 22.90% interest rate, compounded monthly, for 4 years.Part A: What is the total cost of offer 1? Explain which technology you used to solve and each step of your process. Part B: What is the total cost of offer 2? Explain which technology you used to solve and each step of your process. Part C: Which financing offer should the new homeowner choose? Explain your reasoning. write out the products that would be created during this neutralization reaction H2SO4 + Cu(OH)2 Which of the following value would be counted as a part of 2022s GDP ____?A) the market value of a pharmaceutical stock you bought in 2022.B) the bonus check your friend got from his car dealership job in 2022.C) the market value of an HD TV produced in 2021 but sold in 2022.D) the market value of treasury bills sold by the US federal government in 2022. Which of the following refers to an underlying belief that causes people to choose between plausible courses of action?A. NormsB. ParadigmsC. ProtocolsD. Values can I have the answer and a quick explanation plz? who are the target audience for stolen generation Evaluate n(x) = -1 - x + 4 when x = -2, 0, and 5 PLEASE HELP WITH THIS ONE QUESTION 9. (1 {pt}) Which of the following can be used to classify bacteria into subspecies or serovars? a) Flagella b) Ribosomes c) Peptidoglycan d) Plasma membrane e) All of the above 10. (2 pt The 17 year-old female is diagnosed with bulimia nervosa. Which lab result does the nurse anticipate?Increased serum glucoseIncreased sodium retentionDecreased serum potassiumDecreased blood urea nitrogen (BUN) A rock is placed in 10-mL of water causing the water level to riseto 25-mL. The same rock has a mass of 7 grams. What is the densityof the rock? What was the decision in Griswold v. Connecticut on what did Justice Goldberg base his concurring opinion? inside a wave describe the motion of water particles as the wave particles as the wave passes through Which of the following is true of good salespeople?They know how to oversell their product so the customer can't say no.They have tenacity but know when to walk away and move on to the next sales prospect.They make promises they may not be able to keep in order to secure a sale.They don't leave voice mail messages. The graph shows how the vertical velocity of a parachutist changes from the moment the parachutist jumps from the aircraft until landing on the ground. Using the idea of forces, explain why the parachutist reaches a terminal velocity and why opening the parachute reduces the terminal velocity.