Suppose list1 is an MyArrayList and list2 is a MyLinkedList. Both contains 1 million double values. Analyze the following code: A: while (list1.size() > 0) list1.remove(0); B: while (list2.size() > 0) list2.remove(0);

Answers

Answer 1

The code snippets involve removing elements from a MyArrayList (list1) and MyLinkedList (list2) with 1 million double values.

How is this so?

Code A uses a while loop to remove elements from list1 by shifting subsequent elements, resulting in a time complexity of O(n^2).

Code B does the same for list2, but as a MyLinkedList, it can efficiently remove elements at the head, resulting in a time complexity of O(n). Using a MyLinkedList for frequent removals can be more efficient.

Learn more about MyArrayList at:

https://brainly.com/question/29849650

#SPJ4


Related Questions

Complete the following sentences by choosing the best answer from the drop-down menus.
A_____ Programming Language is a language that physically runs on the website visitor's own computer.
An example of a programming language that is frequently used to develop websites with existing
databases is______
______is an example of a programming language that is supported in all browsers.
A program that physically runs on the web host's computer is called a____ Programming Language.

Answers

A Client-Side Programming Language is a language that physically runs on the website visitor's own computer.

What is an example of the programming language?

An example of a programming language that is frequently used to develop websites with existing databases is PHP.

JavaScript is an example of a programming language that is supported in all browsers.

A program that physically runs on the web host's computer is called a Server-Side Programming Language.

Read more about programming languages here:

https://brainly.com/question/16936315

#SPJ1

Answer:

Complete the following sentences by choosing the best answer from the drop-down menus.

A

✔ Client Side

Programming Language is a language that physically runs on the website visitor’s own computer.

An example of a programming language that is frequently used to develop websites with existing databases is

✔ PHP

.

✔ JavaScript

is an example of a programming language that is supported in all browsers.

A program that physically runs on the web host’s computer is called a

✔ Server Side

Programming Language.

Explanation:

BLANK refer to system maintenance activities such as backups and file management.

Remote desktop service
Network management services
Network encryption


BLANK provide features to prevent unauthorized access to the network.

Security services
File replication services
Printing services

Answers

First answer:
Network management services

Second answer:
Security services

You have purchased an LED monitor and connected it to the HDMI port on your computer using an HDMI cable. You configure the screen resolution to 1280 x 1024 with 32-bit color. The geometry of the images displayed on the screen appear to be distorted. What should you do to correct the problem

Answers

Answer:

Change the screen resolution to the native resolution of the monitor

Explanation:

Every monitor has a native resolution that shows pixels and colors best. Modern monitors are usually 1920x1080 or higher. If the resolution given to the monitor is not native to the monitor, then the pixels on the screen will appear pixelated or distorted.

Farmers must meet the changing needs of our planet and the expectations of regulators, consumers, and food processors and retailers- Analyze the statement and predict the most suitable solution

Answers

Farmers must meet the changing needs of our planet and the expectations of consumers.

Why is consumer the right answer?

Consumers are becoming sensitive ot how their product sare produced. For example, consumers will shun a product which was produced using child labor or using unethical practices.

Since protecting the earth is now a big issue, a front burner in with regadds to the global supply chain cycle, Farmers must pay attention to the changing needs of our planet.

Learn more about Consumers :
https://brainly.com/question/15869639
#SPJ1

selecting the range before you enter data saves time because it confines the movement of the active cell to the selected range. (True/False)

Answers

The statement "selecting the range before you enter data saves time because it confines the movement of the active cell to the selected range" is true.

Selecting the range before you enter data can indeed save time by confining the movement of the active cell to the selected range. This means that as you enter data, the active cell will not move outside of the selected range.

This is particularly useful if you have a specific pattern or layout in mind for your data and want to ensure that it is entered in the correct cells. By confining the movement of the active cell, you can avoid having to manually navigate to the correct cell after each entry, which can be time-consuming and error-prone.

Learn more about save time: brainly.com/question/26662329

#SPJ4

The purpose of data analysis is to filter the data so that only the important data is viewed.


False

True

Answers

Answer:

YES IT IS TRUE!

Explanation:

what commands will show information about the ios? (select two) group of answer choices show flash show ram show rom show version

Answers

Out of the given answer choices, two commands that can show information about the IOS are "show flash" and "show version".

The "show flash" command displays information about the IOS stored in the flash memory of the device. It shows the size of the flash memory, the amount of space used by the IOS image, and the space available for other files.

On the other hand, the "show version" command provides detailed information about the IOS version installed on the device, including the version number, image name, release date, and the amount of RAM and flash memory on the device.

It's also worth noting that the "show ram" and "show rom" commands can display information about the device's RAM and read-only memory (ROM) respectively, but they do not specifically provide information about the IOS.

In summary, if you want to see information about the IOS on your device, the "show flash" and "show version" commands are the ones to use. It's always a good practice to know the different commands that you can use to troubleshoot and manage your network devices efficiently.

Learn more about IOS here

https://brainly.com/question/32289111

#SPJ11

A school is developing a program to keep track of information about students and their class schedules. In which of the following instances would a data abstraction be most helpful?

A. The program includes individual variables to store the names of each student rather than a single list of students.

B. A program includes multiple comments that could be combined into a single comment

C. A program includes repeated programming statements that could be moved inside a loop

D. A program includes repeated code that could be moved inside a function.

Answers

Answer: D

Explanation: A doesn't make sense, B doesn't either.

However you're left with C and D. In this case I can understand if you picked C, but I picked that and got the answer wrong.

D makes sense since data abstraction means to simplify the code to make it easy to read and point out details while removing other components.

A function allows one to understand the intention of the code by its name and thus it makes it easier to read.

Therefore, I suggest D.

If the school is to keep track of information about students and class schedules, a data abstraction would be most helpful if the program includes individual variables to store the names of each student rather than a single list of students.

Data abstraction can be described as the reducing of data in order for it to be more simplified and used to represent only the essential characteristics.

It would be most helpful in this option because it has been reduced to individual variables instead of the full list of the students

Read more on https://brainly.com/question/23230368?referrer=searchResults

How many times should the start function be defined in a program?
0
1
2
However many you like

Answers

I think its 2x they will start to define the program

Josef wants to read more about Justice Jackson. Josef would find most of the information?

Josef wants to read more about Justice Jackson. Josef would find most of the information?

Answers

Answer: the answer is d

Explanation:

TRUST ME !!!

Can covering up your laptop's camera with a sticky note damage it? I see some articles saying not to cover it and some to cover your camera.

Answers

Answer and Explanation:

I have a sticky note in front of my camera, just don't put the sticky part on the camera,

Bend it so that part of the sticky note is covering that top portion of your laptop, while also not covering your actually screen.

This makes sure that no one sees you if they were to hack into your camera with you knowing/not knowing

#teamtrees #PAW (Plant And Water)

which feature should you use to check for certain types of data stored in documents, such as hidden properties and personal information, that you do not want others to see?

Answers

So can find & hidden properties data in files that your plan to share by using the Doc Inspect tool in Word, Axles, Ppt, or Visio. Hidden data may consist of: In Word docs, there may be classified info or secret data that you don't want to share.

How can all properties be displayed in Excel?

On the File tab, click. You examine the workbook's characteristics, click Info. Mouse your finger over the parameter you wish to edit and input the information to add and otherwise change it.

How do you examine properties that are hidden?

Select the File tab from the previous document's copy, and then select Info. Click Inspection Documents after selecting Check for Issues. Check the boxes in the Content Inspector dialog box.

To know more about hidden properties visit:

https://brainly.com/question/12991415

#SPJ4

Does anyone know what's wrong with this code in Unity? HELP FAST PLEASE! This is for my game design course, I will give brainiest if you can help

Does anyone know what's wrong with this code in Unity? HELP FAST PLEASE! This is for my game design course,

Answers

its expecting a "{} around a certain area.

hope this helps!!!

How can you tell an open innovation project from one that is not?

Answers

An open innovation project is one in which a company seeks external ideas, knowledge, and expertise from outside the organization to advance its goals, rather than relying solely on internal resources. Conversely, a project that is not open innovation relies primarily on internal resources and expertise.

Here are some characteristics of an open innovation project:

Collaboration: Open innovation projects involve collaboration between internal teams and external partners such as customers, suppliers, academic institutions, startups, and other companies.

Sharing of knowledge: An open innovation project requires sharing of knowledge, information, and expertise between the internal and external parties.

Involvement of external parties: In an open innovation project, external parties are actively involved in the innovation process, from ideation to commercialization.

Innovation ecosystem: An open innovation project is part of a larger innovation ecosystem that fosters the exchange of ideas, knowledge, and expertise.

Access to resources: An open innovation project provides access to external resources such as funding, facilities, equipment, and talent.

In contrast, a project that is not open innovation is typically driven by internal resources and expertise. Internal teams are responsible for all aspects of the innovation process, and external parties are not involved in any significant way.

In summary, an open innovation project involves collaboration, sharing of knowledge, involvement of external parties, an innovation ecosystem, and access to external resources.

What is the term for the psychology, reasoning, and history behind a character's reactions in certain situations?

Answers

There are a lot of factors in behavioral neuroscience. For starters, there are social-cultural influences and biological and psychological influences. You can operate on a social script ( an action made off of previously perceived scenarios)
Most teenagers operate off of social-cultural psychology, primarily because of propaganda on TV, family traditions, etc.
Psychological factors like cognition could serve as a trait for situations.
Biological traits like testosterone, bipolar disorder, etc. It can affect these situations.

Which operation is not efficiently supported by (min) binary heaps?
a. DeleteMin
b. DeleteMax
c. FindMin
d. Insert
e. All of the above are efficiently supprted

Answers

The operation that is not efficiently supported by (min) binary heaps is DeleteMax.

How does the efficiency of (min) binary heaps differ for different operations?

Binary heaps are a type of data structure that are commonly used to implement priority queues. In a (min) binary heap, the minimum element is always located at the root, and the children of each node are guaranteed to be larger than their parent. This structure allows for efficient access to the minimum element (FindMin) and insertion of new elements (Insert) in logarithmic time complexity.

However, the DeleteMax operation is not efficiently supported by (min) binary heaps. Since the heap is organized in a way that the minimum element is always at the root, deleting the maximum element would require traversing the entire heap to find the maximum element and remove it. This operation would take linear time complexity, resulting in reduced efficiency compared to other operations.

Learn more about Binary heaps

brainly.com/question/14953093

#SPJ11

Evaluate the merits of a hard disk drive or a solid state drive to use as the secondary storage
in a laptop computer

Answers

SSDs have a higher processing speed, shorter read and write times, and low latency. This is because they use electrical circuitry and have no moving parts, unlike HDDs. SSDs are smaller and more power-efficient because they have no external mechanics or motors attached to the drive.  SSDs have a higher bandwidth than HDDs. A typical HDD will deliver a read/write speed of 80-160MB/s. On the other hand, a typical SSD will deliver read/write speed of between 200 MB/s to 550 MB/s.

SSDs are quite reliable, since they have no moving parts and because of this can withstand some level of extreme and harsh environments and may even withstand accidental drops, shocks, or vibration but they have a finite number of reads and write before they fail. SSDs have a higher cost per GB (For example, a 1 TB SSD Samsung 870 EVO costs ~$100 but a 1TB HDD Seagate BarraCuda costs ~$45. In this case, the SSD costs $0.1 per GB and the HDD costs $0.045 per GB) and could not store as much data as HDDs (Comercial SSDs have a storage capacity of 120 GB to 4 TB max, HDDs could go from 250 GB to 14 TB).

HDDs have a lower cost per GB and higher storage than SSDs. However, HDDs are VERY fragile, they could fail if they are handled roughly or dropped they could fail. They are less reliable due to the possibility of mechanical failure, like head crash and susceptibility to strong magnets. They generate heat, use more power, are heavier, higher latency, lower speed, and lower bandwidth. Finally, HDDs usually suffer from disk fragmentation, which means files are divided into pieces and scattered around the hard drive. This will slowdown speed and  because the File System have to search through different parts of the hard drive to put together a single file. The cause of disk fragmentation is the frequent creating, deleting, and modifying of files. To fix you need to defragment your HDDs regularly.

I hope this helps <3

For this challenge you will need to write a program that will produce the display for the individual frames, given the user inputting the number of pins knocked down in each frame of bowling.
Rules:
• The game of bowling consists of 10 frames, where a player gets 2 attempts to knock down 10 pins.
• If the player knocks down all 10 pins on the first roll, that should be displayed as X, and the next number will be the first roll of the next frame.
• If the player doesn't knock down any pins, that should be displayed as -
• If the player gets a spare (knocks down the remaining pins on the second roll of the frame, that should be displayed as /
The user will input integers tha represent the number of pins that have been kncked down on each roll. The list is not a fixed size, as bowling a perfect game requires only 12 rolls, while most games would use more rolls. Use anvil to make this and send the link.

Answers

This method takes a list of numbers that represent how many pins were knocked down on each roll and outputs a string that displays the separate frames in accordance with bowling rules.

In bowling, how many pins are there?

At the start of each frame, ten pins are placed at the end of the bowling lane. With the triangle's point towards the bowler, they are positioned in a triangle arrangement.

function score(display frames):

body num = 1

0 for roll num

Result: ""

range(len(scores)) for I

If roll num = 3 and frame num = 10:

break

If roll num = 1 and scores[i] = 10:

result += "X "

frame num plus one

if roll num == 1, then

score(s[i]) + output += str(i) + " "

roll num plus one

else:

if scores[i-1] plus scores[i] equal 10, then

result += "/ "

else:

score(s[i]) + output += str(i) + " "

frame num plus one

0 for roll num

bring back output.strip ()

# A sample of usage

Result = [10, 7, 3, 9, 0, 10, 0, 8, 8, 2, 0, 6, 10, 10, 10, 8, 1]

print(display frames(scores)) # Results: X 7/9 - X 0/8 - X X/X/X 8 1

To know more about outputs  visit:-

https://brainly.com/question/19088371

#SPJ1

why is an isa unlikely to change between successive generations of microarchitectures that implement it? for example, why would intel want to make certain that the isa implemented by the pentium iii is the same as the one implemented by the pentium ii? hint: when you upgrade your computer (or buy one with a newer cpu), do you need to throw out all your old software?

Answers

An Instruction Set Architecture (ISA) is unlikely to change between successive generations of microarchitectures to ensure software compatibility. This allows users to upgrade or purchase new CPUs without the need to discard their existing software.

The ISA serves as an interface between the hardware and software layers of a computer system. It defines the set of instructions that a processor can execute, along with the formats and behaviors of those instructions. By maintaining compatibility between microarchitectures, Intel ensures that software written for an older generation of processors can still run on newer ones.

Changing the ISA between successive generations would introduce incompatibilities, requiring software developers to rewrite or modify their applications to work on the new architecture. This would impose significant costs and effort on both developers and users. By keeping the ISA consistent, Intel allows users to seamlessly upgrade their hardware while preserving software compatibility.

Additionally, a consistent ISA enables a vibrant software ecosystem. It allows third-party developers to create a wide range of applications, libraries, and tools that target a specific ISA, knowing that their software will be compatible with future microarchitectures that implement the same ISA. This promotes innovation, market growth, and software longevity, as users can continue using their existing software investments across multiple hardware generations. Overall, maintaining a stable ISA benefits both users and software developers by ensuring compatibility and fostering a thriving software ecosystem.

Learn more about software here:

https://brainly.com/question/31356628

#SPJ11

Write a SELECT statement that returns four columns from the Invoices table, named Number, Total, Credits, and Balance: Number Column alias for the InvoiceNumber column Total Column alias for the InvoiceTotal column Credits Sum of the PaymentTotal and CreditTotal columns Balance InvoiceTotal minus the sum of PaymentTotal and CreditTotal Use the AS keyword to assign column aliases.

Answers

Answer and Explanation:

For returning four columns from the  Invoices table, named Number, Total, Credits, and Balance the SELECt statement is as follows

Select     Invoice Number     As     Number

              Invoice Total          As      Total

Payment total + credit total  As      Credits

Invoice total

(Payment total + credit total) As     Balance

These are displayed as above

Which security measure can be used to generate and store cryptographic keys?.

Answers

Answer:

Explanation:

All HSMs securely generate and store cryptographic keys and can be used to perform cryptographic functions (such as encryption, decryption, signing and authentication).

1. Readability, navigation, consistency, layout and typography are all factors which
influence the usability of web pages. Briefly describe each of these factors.

Answers

Answer:

1) Readability is the ease with which a reader can understand a written text. Readability is more than simply legibility—which is a measure of how easily a reader can distinguish individual letters or characters from each other.

2) Navigation is a field of study that focuses on the process of monitoring and controlling the movement of a craft or vehicle from one place to another. The field of navigation includes four general categories: land navigation, marine navigation, aeronautic navigation, and space navigation. It is also the term of art used for the specialized knowledge used by navigators to perform navigation tasks.

3) In classical deductive logic, a consistent theory is one that does not entail a contradiction. The lack of contradiction can be defined in either semantic or syntactic terms. The semantic definition states that a theory is consistent if it has a model, i.e., there exists an interpretation under which all formulas in the theory are true. This is the sense used in traditional Aristotelian logic, although in contemporary mathematical logic the term satisfiable is used instead.

4) The way in which the parts of something are arranged or laid out.

5) Typography is the art and technique of arranging type to make written language legible, readable and appealing when displayed. The arrangement of type involves selecting typefaces, point sizes, line lengths, line-spacing (leading), and letter-spacing (tracking), and adjusting the space between pairs of letters (kerning ).

Explanation:

Hope it helps :)


need help
5. In VSM the data boxes are filled with data that comes from where? What are the types of data that are collected? 6. The process of VSM begins where? 7. What is the NIST definition of Lean

Answers

In Value Stream Mapping (VSM), the data boxes are filled with data that comes from various sources within the organization. The types of data that are collected in VSM can vary depending on the specific value stream being analyzed.

The process of VSM typically begins by selecting a specific value stream that needs improvem.The National Institute of Standards and Technology (NIST) defines Lean as a systematic approach to identifying and eliminating waste in any process. In summary, in Value Stream Mapping (VSM), the data boxes are filled with data that comes from various sources within the organization.

The types of data collected can include cycle time, lead time, inventory levels, process steps, and bottlenecks. The process of VSM begins by selecting a value stream and creating a current state map. The NIST definition of Lean describes it as a systematic approach to eliminating waste and optimizing the flow of materials, information, and actions in a process.

To know more about visit:

https://brainly.com/question/12825206

#SPJ11

pls help
Question 2 (1 point)
True or false: when you use someone's copyrighted work in something you are
selling, you only have to cite them.

Answers

The given statement of copyrighted work is false.

What do you mean by copyright?

A copyright is a type of intellectual property that grants the owner the exclusive right to copy, distribute, adapt, display, and perform a creative work for a specific period of time. The creative work could be literary, artistic, educational, or musical in nature. The purpose of copyright is to protect the original expression of an idea in the form of a creative work, not the idea itself. A copyright is subject to public interest limitations, such as the fair use doctrine in the United States.

When you use someone's copyrighted work in something you are selling, you must get their permission first.

To learn more about copyright

https://brainly.com/question/357686

#SPJ13

can someone help me answer this, I can’t fail tysm :)

can someone help me answer this, I cant fail tysm :)

Answers

Don’t know what the answer is but do you, I have the test for that today

The name of a cell (for example, A1) is its cell ________. PLZ HELP I HAVE TO TURN THIS IN SOON
The quesyion is asking about google sheets

Answers

Answer:

The answer is "Address".

Explanation:

This address cell is also known as the reference cell, which is used for providing the cell specification.  The address cell is also an alpha value used for a list for the identification of a particular cell. Each selected is preceded by one or more letters. Each column is identified by the letter and the number is the row.

True or false
A compiler translates a source program one line of code at a time.

Answers

Answer:

True

Explanation:

yes It translates one line at a time to be able to confirm all information.

Answer:

True

Explanation:

I hope this helps you

Which of the following is NOT an advantage of database systems?

Redundant data

Program-data independence

Better data quality

Reduced program maintenance

Answers

Redundant data is NOT an advantage of database systems. Database systems offer numerous advantages for managing data efficiently.

Redundant data, however, is not one of them. Redundancy refers to the duplication of data, which can lead to several problems in a database system. It consumes extra storage space, increases the risk of data inconsistency, and complicates data maintenance and updates. In contrast, database systems aim to minimize redundancy by promoting data normalization and providing mechanisms for data integrity and consistency.

Program-data independence is one of the advantages of database systems. It refers to the separation of the application programs from the physical aspects of data storage and access. This allows for flexibility and scalability, as changes in the database structure do not require modifying all the application programs. It also enables concurrent access to data by multiple users and provides data security and privacy controls.

Better data quality is another advantage of database systems. Centralized data management allows for data validation and integrity checks, ensuring that the data entered into the system is accurate, complete, and consistent. This leads to improved decision-making, as users can rely on the quality of the data stored in the database.

Reduced program maintenance is yet another advantage of database systems. With a well-designed database system, program maintenance becomes easier and more efficient. Changes to data structures or access methods can be handled at the database level without requiring modifications to all the associated programs. This reduces the time, effort, and potential errors associated with program updates and maintenance.

In summary, while redundant data is not an advantage, database systems provide benefits such as program-data independence, better data quality, and reduced program maintenance.

Learn more about Database here:

https://brainly.com/question/29412324

#SPJ11

Identify the correct characteristics of Python numbers. Check all that apply.

1. Python numbers can be large integers.

2. Python numbers can be complex values such as 12B16cd.

3. Python numbers can be floating-point numbers.

4. Python numbers have numeric values.

5. Python numbers are created automatically.

Answers

Answer:

The answers are 1, 2, 3, and 4

Explanation:

i just did it on edge

Answer:

The answers are 1, 2, 3, and 4

Explanation:

im simply good

Authentication is concerned with determining _______.

Answers

Authentication can be described as the process of determining whether someone or something is, in fact, who or what it says it is. Authentication technology serves us to access control for systems by checking to see if a user's credentials match the credentials in a database of authorized users or in a data authentication server.

There are three basic kind of authentication. The first is knowledge-based — something like a password or PIN code that only the identified user would know. The second is property-based, meaning the user possesses an access card, key, key fob or authorized device unique to them. The third is biologically based.

You can learn more about authentication at https://brainly.com/question/28398310

#SPJ4

Other Questions
The product of three different whole numbers is 40. What is the largest possible sum of the 3 numbers does anybody know the awnser to w=7a+4b which acids caused the effects seen on the teeth in the study analyze relationships (lots of points for correct answer!!)if u answer correctly and on spot, ill give u a thanks on ur account Key resources describes the most important actions a company must take to operate successfully.a. Trueb. False State three factors that determine a torque. 1. Sara wants to see if a new brand of hair dye lasts longer than the brand shecurrently uses. She puts the new hair dye on the left side of her head and the oldbrand on her right side. After 2 weeks she observes which side of her head hasmore gray hair showing through. Which source could best help answer the research question "Does cutting art and music programs impact high school students academic success?a wiki page about government-funded art and music programs for studentsa museums website that focuses on the history of modern arta government website that includes a study about a music program at a schoola blog that showcases student music from schools around the country write formulas for the compounds that form from k and each of the following element: n, o, f. HURRY ASAP WILL GIVE BRAINLIEST!!!What was the Triangle Trade?A. trade began for the purpose of shutting out a particular nation's merchants and craftspeopleB. trade in slaves, sugar, and manufactured goods between Europe, Africa, and the AmericasC. trade based on the supply of the big three resources from China: silk, spices, and porcelainD. trade that began in China and went through India before reaching Europe or the Middle East Explain if true or false Financial markets and institutions are involved in tangency conditions, which characterize utility maximization ( 65 words or more ) Segments of financial markets include the government's decision to abolish the requirements that no meat be consumed on Friday ( 63 words or more) Financial markets are critical because consumers have a mental block recalling the relationship between the concepts manually independent and preference ( 75 words or more ) As the risk of an investment decreases, funds suppliers in a financial market are less willing to purchase a claim ( 30 words or more ) An increase in expected inflation implies that suppliers will be repaid with dollars that will have less purchasing power than anticipated initially ( 30 words or more ) The use of money contributes to economic efficiency because group of answer choices it is necessary for the creation of capital goods. roundabout production could not occur without the availability of money. it promotes specialization by overcoming the problems with barter. governmental direction of the production and distribution of output can be avoided by using money. Find the area of each triangle. Round your answers to the nearest tenth. what mass of mass phosphoric acid will be produced if 42.0 grams of water react This morning, Lashonda's car had 13.01 gallons of fuel. Now, 2.6 gallons are left. How much fuel did Lashonda use? Who was the first pope to pursue church reform in response to protestants?. A high school senior whose family is very poor wants to go to college, but the family cannot afford the expenses. To help finance her education, she should try to obtain the type of loan where interest charges do not build up while she is in school and even during the first few months after graduation. This type of financing is known as a(n) 1.Which TWO statements should be included in an objective summary of the article?AEmmett Till's murder was only reported in Black media outlets.BEmmett Till's murder stunned Americans because lynching was so unusual.CEmmett Till's murder revealed that all white Americans supported the murderers.DEmmett Till's murder inspired many Americans to fight against racism and injustice.EEmmett Till's murder illustrated the danger that Black Americans lived with every day.FEmmett Till's murder prompted Mississippi to make its justice system fairer towards all. which of the following does not qualify as an exempt transaction under the uniform securities act? a a sale of common stock to an insurance company b a sale of preferred stock by an executor of an estate c a sale of an outstanding security that is listed on the new york stock exchange d an isolated sale of corporate bonds on behalf of an issuer Why are tables helpful for displaying data? A. They are the only way to display data. B. They do not use numerical information. C. They are the only way to see patterns in data. D. They allow you to easily see all the data values at once.