What are 3 inputs and outputs of an ipad?

Answers

Answer 1

Answer:

do u mean pros and cons?????

Explanation:


Related Questions

Why do companies collect information about consumers? A. Because they want to meet new friends on social networks B. Because they take consumers' best interests to heart C. Because they want to effectively advertise to consumers D. Because they are looking for good employees to hire​

Answers

Answer:

C. Because they want to effectively advertise to consumers.

Explanation:

Companies collect info for more accurate advertisements, which are designed to make people interact with them more commonly.

What is the most important quality of lossless compression? Enviar The data is transformed to usually make it smaller. It can always be re-constructed back to the original. The data is transformed to always make it smaller. It can always be re-constructed back to the original. The data is transformed to usually make it smaller. It cannot always be re-constructed back to the original. The data is transformed to always make it smaller. It cannot always be re-constructed back to the original. Enviar

Answers

Answer:

The answer is "Option A".

Explanation:

In the given question the numbering of the choices was missing, which is defined in the attached file, please find it.

The Lossless compression would be a class of algorithms in a compress, which enables its initial data to re-construct completely from its compressed data. It can be loss-or lossless for compress, which means its picture quality is just like the file size, and the incorrect choice can be defined as follows:

In option B, It is wrong because the data can't be re-constructed always.Option C, and Option D both were wrong because when the data is uncompressed, it returns in its original form.
What is the most important quality of lossless compression? Enviar The data is transformed to usually

What are some ways you can give staying off your phone a "boost" and make it easier to do?

If you're trying to break a bad habit, what are some things you can do so that you don't slip back into old ways?

Please help this is due today and I really need help.

Answers

Answer:

go do something outside and leave your phone inside to charge

Explanation:

algorithm and flowchart and c program to display sum of 5 different number​

Answers

The algorithm and flow chart and c program to sum of 5 different number is given below.

Describe C programming?

C is a compiled language, which means that programs written in C must be compiled before they can be run. This compilation process produces machine code, which is the code that can be executed by a computer. Because of this, C programs can be very fast and efficient.

One of the strengths of C is its ability to work with memory directly through pointers. Pointers are variables that store memory addresses, allowing the programmer to manipulate the data at that address. This can be useful in low-level programming tasks, such as working with hardware or writing device drivers.

Here's the algorithm to display the sum of 5 different numbers:

Declare a variable sum and initialize it to zero.Prompt the user to enter the first number and store it in a variable.Add the value of the first number to the sum variable.Repeat steps 2-3 for the second, third, fourth, and fifth numbers.Output the value of the sum variable.

Here's the flowchart for the same:

          Start

             ↓

Initialize sum = 0

             ↓

Prompt user for first number

             ↓

Add first number to sum

             ↓

Prompt user for second number

             ↓

Add second number to sum

             ↓

Prompt user for third number

             ↓

Add third number to sum

             ↓

Prompt user for fourth number

             ↓

Add fourth number to sum

             ↓

Prompt user for fifth number

             ↓

Add fifth number to sum

              ↓

Output sum

               ↓

            End

Here's the C program to display the sum of 5 different numbers:

#include <stdio.h>

int main() {

   int num1, num2, num3, num4, num5, sum;

   printf("Enter the first number: ");

   scanf("%d", &num1);

   printf("Enter the second number: ");

   scanf("%d", &num2);

   printf("Enter the third number: ");

   scanf("%d", &num3);

   printf("Enter the fourth number: ");

   scanf("%d", &num4);

   printf("Enter the fifth number: ");

   scanf("%d", &num5);

   sum = num1 + num2 + num3 + num4 + num5;

   printf("The sum of the numbers is %d\n", sum);

   return 0;

}

This program prompts the user to enter 5 different numbers, stores them in variables, calculates their sum, and outputs the result.

To know more about sum visit:

https://brainly.com/question/13437666

#SPJ9

2D array indexing: Finding the center element of a square array Assign middleElement with the element in the center of squareArray. Assume squareArray is always an n times n array, where n is odd. Ex: If squareArray is [1, 2, 3; 4, 5, 6; 7, 8, 9], then middleElement is 5. Function middleElement = FindMiddle(squareArray) % FindMiddle: Return the element in the center of squareArray % Inputs: squareArray - n times n input array, where n is odd % % Outputs: selectedData - center element of squareArray % Assign elementIndex with location of middle row/col elementIndex = 0; % Assign middleElement with the center element of squareArray middleElement = 0; end Run Your Solution Code to call your function when you click Run

Answers

In order to retrieve the middle element in an odd 2D array, we have assigned Assign middleElement to the squareArray's centre element and plugged in the values from the row vector we received using the size() function.

The solution code to add is:

element index = size (squareArray);

elementIndex = (elementIndex / 2) + 0.5;

middleElement = squareArray (elementIndex, elementIndex);

middleElement = squareArray(elementIndex(1), elementIndex(2));

An array of arrays that stores homogeneous data in tabular form is what is referred to as a multi-dimensional array. Data are stored in multidimensional arrays in row-major order. Multiplying the dimensions' sizes yields the total number of elements that can be stored in a multidimensional array.

For instance: 200 elements total (10*20) can be stored in the array int x[10][20].

The array int x[5][10][20] can hold a total of (5*10*20) = 1000 elements in a similar manner.

The most basic type of multidimensional array is a two-dimensional array. For ease of understanding, we can think of a two-dimensional array as an array of one-dimensional arrays. The simplest way to declare a two-dimensional array of size x, y is as follows:

data type array name[x][y]; The type of data to be stored is indicated here by data type.

To learn more about 2D array click here:

brainly.com/question/27171171

#SPJ4

Can anyone help me with a mental ability work plzz

Can anyone help me with a mental ability work plzz

Answers

choose the correct option:

1) using

2) is

3) use

4) to eat

5) use

What is risk? how can it be quantified? what problems might you encounter in trying to quantify risk?

Answers

Risk refers to potential harm or loss. It can be quantified using methods like probability assessment, but faces challenges due to uncertainty and complexity.

quantifying risk can be challenging due to several problems. Firstly, there is inherent uncertainty and variability associated with future events, making accurate predictions difficult. Additionally, risks often involve complex interdependencies and interactions, making their assessment and quantification more complex. Limited data availability or poor data quality can also hinder the accurate quantification of risks. Furthermore, different stakeholders may have varying perceptions of risks and their potential impacts, leading to subjective assessments and difficulties in reaching a consensus. These factors can introduce biases, errors, and limitations in the process of quantifying risk.

Learn more about Risk here:

https://brainly.com/question/31964911

#SPJ11

How does one of the algorithms in your program function?

Answers

Answer:

An algorithm is simply a set of steps used to complete a specific task. They're the building blocks for programming, and they allow things like computers, smartphones, and websites to function and make decisions.

Please help me with these short questions >..

Please help me with these short questions &gt;..

Answers

Answer:

bmjcmbbobnkpkkjkbk

Explanation:

vuvkopbbkvkhovjlplbkp

Please help me with these short questions &gt;..

Select the correct answer from each drop-down menu.
A multimedia company wants to implement virtualization on machines with no host operating system. Which type of hypervisor should they
use?
The multimedia company should use a(n)
_______ hypervisor. This hypervisor is installed
__________

Answers

Answer:

1. Bare-metal hypervisor

2. top of a physical server

Explanation:

The multimedia company should use a(n) " BARE-METAL" Hypervisor. This hypervisor is installed "top of a physical server"

The bare-Metal hypervisor is often known as the Type 1 hypervisor. It is characterized by good performance and strength.

Also, this type 1 hypervisors is considered to be the operating system on its own.

Hence, in this case, the correct answer to the question is:

1. Bare-metal hypervisor

2. top of a physical server

Answer:

1.)TYPE 1  2.) Directly on the machine. :) I got the answer right!

Explanation:

i am making a project i have to advertise a product i picked a futureistic car
can any one halp me with a unknown name that is cool plss

Answers

Answer:

The Futuristic Car. That name is bussin

Were the colonists loyal to the British king after the war began? WILL GIVE BRANLEST PLS ASAP

Colonists were loyal to the French once the American Revolution began.
Colonists were never loyal to the king, so the war didn’t change anything.
There was no more British loyalty in the American colonies once the war began.
The colonists still felt loyalty for their king even after the start of the war.

Answers

Answer:

There was no more British loyalty in the American colonies once the war began.

Explanation:

The American Revolution began in 1775 as a response to the absolutist policies imposed by King George of Great Britain, specifically in economic and political matters, on the Thirteen Colonies and their citizens.

During the reign of King George, many civil, political and economic freedoms were suppressed (through the Intolerable Acts and other similar regulations), with which popular support for the monarchy was gradually losing size. Thus, new liberal ideologies began to appear, based on the postulates of philosophers such as John Locke or Jean Jacques Rousseau, who promoted the freedom of the individual and the respect of their natural rights as the fundamental premises of social organization.

For this reason, at the time of the Revolution, most of the settlers were pro-independence, while small minorities continued to support Great Britain. Precisely, these minorities, after the advance of the armed conflict, began to move towards what is now Canada, which continued to be a British stronghold.

Answer:

The colonists still felt loyalty for their king even after the start of the war.

Explanation:

Loyalists were American colonists who remained loyal to the British Crown during the American Revolutionary War, often referred to as Tories, Royalists or King's Men at the time. They were opposed by the Patriots, who supported the revolution, and called them "persons inimical to the liberties of America."

when creating a query using the query design command, first you must . a. create relationships in the database b. select the table or tables containing the data you want to retrieve c. compact the database d. enter criteria in the design grid e. use the run command to run the query

Answers

You add the data sources and fields separately while using Design view to add data sources. But if you want to, you can simply add other data sources later.

Click Query Design under the Other group on the Create tab. When using Access, a relationship enables you to merge data from two separate tables. Each relationship consists of equivalent fields from two tables. For instance, you might have a Product ID entry in both an Order Details database and a table for products. By adding a table to the query twice and joining a field from the first copy of the table to a different field from the second copy of the table, you may generate a self-join query.

Learn more about database here-

https://brainly.com/question/6447559

#SPJ4

Open the list10-2.js file and directly below the code populating the links array, declare the htmlCode variable. Store within the variable the following text:

Image Movie Description Score

Open the list10-2.js file and directly below your previous code create a for loop with a counter variable i that goes from 0 to 9. Each time through the for loop add the following text to the htmlCode variable:

Image titles_i
summaries_i
ratings_i

where i is the value of the counter variable, and links_i, titles_i, summaries_i, and ratings_i are the values from the links, titles, summaries, and ratings array with index number i.

After the for loop add the following text to the htmlCode variable:

The other image

Store the value of the htmlCode variable in the inner HTML of the element with the ID list.

Open the list10-2.js file and directly below the code populating the links array, declare the htmlCode
Open the list10-2.js file and directly below the code populating the links array, declare the htmlCode
Open the list10-2.js file and directly below the code populating the links array, declare the htmlCode

Answers

Answer:

// Populating links array

var links = ["link0", "link1", "link2", "link3", "link4", "link5", "link6", "link7", "link8", "link9"];

// Populating titles array

var titles = ["Title 1", "Title 2", "Title 3", "Title 4", "Title 5", "Title 6", "Title 7", "Title 8", "Title 9", "Title 10"];

// Populating summaries array

var summaries = ["Summary 1", "Summary 2", "Summary 3", "Summary 4", "Summary 5", "Summary 6", "Summary 7", "Summary 8", "Summary 9", "Summary 10"];

// Populating ratings array

var ratings = ["Rating 1", "Rating 2", "Rating 3", "Rating 4", "Rating 5", "Rating 6", "Rating 7", "Rating 8", "Rating 9", "Rating 10"];

// Initializing htmlCode variable

var htmlCode = "Image Movie Description Score";

// Adding data to htmlCode variable

for (var i = 0; i < 10; i++) {

 htmlCode += "<br>Image " + titles[i] + " " + summaries[i] + " " + ratings[i];

}

// Adding last line to htmlCode variable

htmlCode += "<br>The other image";

// Storing value of htmlCode variable in the inner HTML of the element with the ID list

document.getElementById("list").innerHTML = htmlCode;

In the story, the old men represent the seasons. How do their characters contribute to the theme of the story?

Answers

Answer:

what story??

Explanation:

What is the place value position of the 7 in the number below?

1,376

A ones) b tens) c hundreds) d thousands)

Answers

Tens hope that helps
The answer is b tens

Write a power function in armv8 assembly. it should take a double precision floating point number (a) and a power (n). it should compute ! and return the results.

Answers

Here's an example of a power function in ARMv8 assembly that takes a double precision floating point number (a) and a power (n) and computes and returns the result:

power:

   fmov    d2, #1.0              // Initialize the result to 1.0

   cmp     w1, #0               // Check if n is 0

   beq     done                 // If n is 0, return 1.0

   fcmp    d1, #0.0             // Check if a is 0.0

   beq     done                 // If a is 0.0, return 0.0

   fcmp    d1, #1.0             // Check if a is 1.0

   beq     done                 // If a is 1.0, return 1.0

   mov     x3, #0               // Initialize the exponent counter to 0

   b       loop                 // Branch to the loop

   

loop:

   cmp     x3, w1               // Compare the exponent counter with n

   b.eq    done                 // If they are equal, return the result

   fmul    d2, d2, d1           // Multiply the result by a

   add     x3, x3, #1           // Increment the exponent counter

   b       loop                 // Branch back to the loop

   

done:

   ret                          // Return the result

The function first initializes the result to 1.0 and checks if the power (n) is 0 or if the base (a) is 0.0 or 1.0. If any of these conditions are true, the function immediately returns the corresponding result.

Otherwise, the function initializes an exponent counter to 0 and enters a loop. In each iteration of the loop, the function multiplies the current result by the base (a) and increments the exponent counter. The loop continues until the exponent counter is equal to the power (n), at which point the function returns the result.

Note that this implementation assumes that the function is called with valid arguments and does not perform any error checking or handling.

Learn more about ARMv8 here:

https://brainly.com/question/14774978

#SPJ11

Why is storage and important part of the computing process? It must be atleast five sentences.

Answers

Your computer needs storage because the processor needs a place to perform its magic — a scratchpad for mad doodles, if you will. All computers need storage. ... Memory is where the processor does its work, where programs run, and where information is stored while it's being worked on.

And why five sentences?

What does “int” means in php code

Answers

Answer:

integer

Explanation:

___________ is the number of pixels per inch

Answers

Answer:

Explanation:

What ever the number is inches is divide it by pixels

Your cousin, a senior in high school, asks you to play a Jeopardy-style game with her to help prepare for her computer science exam next week. She gives you these two clues about a type of relational database key: No column values may be NULL, and columns may be combined to create a unique primary key. Which type of key is she referring to

Answers

Answer:

She is referring to composite primary key

Explanation:

Composite primary key comprises of several columns with each having column having its own individual uniqueness.  

In a composite primary, all columns need to have some value as none of them can be null. Also, these individual columns are grouped to get a unique value.  

29.the data suggests that global climate change stems from what human activity? a)burning of fossil fuels b)depleting the ozone layer c)the burying of toxic wastes d)the incineration of municipal wastes e)a and b but not c and d

Answers

Correct answer:- (a) burning of fossil fuels

The data suggests that global climate change stems from the human activity of burning fossil fuels.

What type of human activity affects the environment most significantly?

There is ample proof that human activities, particularly the burning of fossil fuels, are raising atmospheric concentrations of carbon dioxide and other greenhouse gases, which in turn amplifies the natural greenhouse effect and raises the temperature of the Earth's atmosphere, oceans, and land surface.

What are the anthropogenic factors causing climate change?

fossil fuel burning, agriculture, logging, and cement production. Because fossil fuels like oil, coal, and gasoline are used, carbon dioxide (CO2) is released into the atmosphere, causing climate change. a.k.a. automobiles/trains, power plants, etc.

How does global climate change work?

Long-term modifications to weather and temperature patterns are referred to as climate change. These changes might occur naturally, for instance through variations in the solar cycle. But since the 1800s, burning fossil fuels like coal, oil, and gas has been the primary cause of climate change, which is mostly attributable to human activity.

To know more about fossil fuels visit:

https://brainly.com/question/10172005

#SPJ4

question 1 you ask volunteers at a theater production which tasks they have already completed and add that data to a spreadsheet containing all required tasks. you will use the information provided by the volunteers to figure out which tasks still need to be done. this is an example of which phase of analysis?

Answers

you will use the information provided by the volunteers to figure out which tasks still need to be done.this is an example of Get input from others phase of analysis  to a spreadsheet.

A spreadsheet is a computer application that can record, display, and edit data that is organised in rows and columns. Spreadsheets are one of the most common tools accessible on personal computers.

A spreadsheet is often used to store numerical data and short text characters. Spreadsheet cells are spaces in a spreadsheet application that house data elements. These can be renamed to better represent the data they contain and can be cross-referenced using row numbers and column letters.

A single spreadsheet can be used as a worksheet to gather data for a specific purpose, or numerous sheets can be joined to make a full workbook.

Each column or row cell refers to a value and is labelled according to its location (for example: A1, A2, A3).

Learn more about Spreadsheet here:

https://brainly.com/question/8029562

#SPJ4

HELPPPPP PLEEEAAASSSSEEEEE I'VE BEEN STUCK FOR HALF AN HOUR ALREADY PLEASE HELPPP!!!!!!!!Bella is creating a research paper for the first time in Microsoft Word. She is taking a lot of time to create and format the bibliography section. Which section in Microsoft Word can she use to expedite the process? Bella can use the section called_/_/_/_/_/_/_/ in Microsoft Word to create the bibliography.

Answers

Answer:

Citations & Bibliography section.

Explanation:

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users to type, format and save text-based documents.

In Microsoft Word 2019, the users are availed with the ability to edit the word document in the following view type;

I. View Mode.

II. Print Mode.

III. Drift Layout.

In this scenario, Bella is creating a research paper for the first time in Microsoft Word. She is taking a lot of time to create and format the bibliography section.

Hence, Bella can use the section called Citations & Bibliography in Microsoft Word to create the bibliography. It is found in the References tab of the Microsoft Word program.

Citations are references or links to all of the sources from which an author, writer, or researcher got his or her information from while bibliography is a list of all the sources used in a literary work such as a research paper.

Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.

Answers

Answer:

I am using normally using conditions it will suit for all programming language

Explanation:

if(minimum){

hours=10

}

before the it security group can begin an eradication effort, it must _____.

Answers

Before the IT security group can begin an eradication effort, it must identify the root cause of the security incident and the extent of the damage caused by the attack.

This involves analyzing system logs, network traffic, and other forensic evidence to determine how the attacker gained access to the system, what actions they took while inside, and what data or systems were compromised. Once the cause and extent of the incident are understood, the security group can develop a plan to eliminate the threat and prevent future attacks.

This may involve patching vulnerable software, removing malicious files or malware, and enhancing security controls to prevent similar attacks in the future. It is important to document the entire eradication process to ensure that all steps are performed correctly and to provide a record of the incident for future reference.

Learn more about security  here:

https://brainly.com/question/15278726

#SPJ11

when communicating on social media, we rely almost exclusively on-props-the script-nonverbal cues-the backstage

Answers

Based on social media communication strategy, when communicating on social media, we rely almost exclusively on the script

What is meant by a Script?

The script is a term that is used to describe the primitives of a scripting language which are often basic operations or API calls, and the scripting language enables their variety into other programs.

Generally, scripting may automate environments including text editors, web pages, operating system shells, embedded systems, and computer games.

Usually, for a certain environment, a scripting language can be thought of as a domain-specific language; when used to script an application, this language is also referred to as an extension language.

Hence, in this case, it is concluded that due to the script's propensity to function at high levels of abstraction, scripting languages are also frequently referred to as very high-level programming languages (VLP) or control languages

Learn more about Script, here :

brainly.com/question/28447571

#SPJ1

how to fix "your computer appears to be sending too many requests at one time. please try again later."

Answers

Because the user sent too many requests in a short period of time, you are getting the 429 Too Many Requests error message (could be a plugin, a DDos, or something else). The server is requesting that you cease making requests. 

HTTP Error 429: Too Many Requests: Possible Causes Technically speaking, a 429 response is not an error; rather, it is a message from a server, application programming interface (API), or plugin instructing the client application to cease issuing requests since they now lack the capabilities to do so. A rateLimitExceeded error is generated when a user sends an excessive number of requests in a short period of time. Use exponential backoff to retry the request to resolve this problem. Only browsers can encounter the "Bad Request - Request Too Long" problem. Clearing your browser's cache and cookies is a common option.

To learn more about server click the link below:

brainly.com/question/30168195

#SPJ4

addressing information overload means more than just deleting emails; it can also include dealing with threats to your privacy and to the overall security of your computer. group of answer choices true false

Answers

The statement "Addressing information overload means more than just deleting emails; it can also include dealing with threats to your privacy and to the overall security of your computer" is true.

What is information overload?

Information overload refers to a situation in which a person receives too much information and is unable to process or handle it effectively. It occurs when the amount of data received exceeds a person's processing capacity or ability to handle it efficiently. Because of the vast amounts of information available online, people frequently experience information overload.

The answer to the question is true because dealing with threats to your privacy and to the overall security of your computer is one of the essential ways to address information overload. Addressing information overload goes beyond simply deleting emails; it also entails managing data privacy, ensuring data security, and employing various techniques to handle data efficiently.

Learn more about information overload :https://brainly.com/question/14975235

#SPJ11

Firms that adopt software as a service actually buy a system's software and hardware, so these systems become a fixed operating expense. group of answer choices true false

Answers

False, Firms that adopt software as a service actually buy a system's software and hardware, so these systems become a fixed operating expense.

What is the distinction between usage and adoption?

The basic assessment of how a user interacts with the software. If software usage is how frequently or for what purposes the software is used, software adoption is how fully utilized the software is.

What is user adoption technology?

User adoption is the method of getting users of software or technology to use it the way it is planned and help them make the most out of it. A user adoption strategy can help companies boost productivity, deliver a better user experience, increase user engagement, and more inferior churn rates

To learn more about software programs , refer

https://brainly.com/question/1538272

#SPJ4

Other Questions
(04.02 LC) Which of the following is the name for a substance made of two or more types of atoms that are not chemically bonded together? (2 points)Select one:a. Compoundb. Mixturec. Soluted. Molecule what role do politics, law and the local economy have on theethical decision made by the businesses? True or false? When two objects interact, both force and motion are caused. in a server farm such as that used by amazon or ebay, a single failure does not cause the entire system to crash. instead, it will reduce the number of requests that can be satisfied at any one time. if a company has 10,000 computers, each with a mttf of 40 days, and it experiences catastrophic failure only if 1/4 of the computers fail, what is the mttf for the system? HELP DUE IN 30 MINS! Leave answers as simplified fractions if necessary.z =?? From someone who has recently taken an ACT test: do the scores come in the mail? ~Easy Points ~ ...... wht does it mean to plagiarize ?.....(stup!d answers will be deleted) How did the modern art movement in America start?a.with Impressionismb.with Expressionismc.with Realismd.with NeoclassicismPlease select the best answer from the choices providedABCD how can healthy weight be defined? group of answer choices a body weight that is generally acceptable by society a body weight that enhances an individual's physical attributes a body weight that is the easiest to maintain by all individuals of a given height and age a body weight that does not increase the risk of developing weight-related problems or diseases people who take medication that makes them extremely nauseous whenever they take a small drink of alcohol is undergoing what type of treatment for their addiction? so I am in algebra 1 and I need help with A+B=C but it says solve for A and I wanted to see if you can show how to do it for more questions in the future How do entrepreneurs currently use computers? Check all of the boxes that apply. to create and submit invoices automatically to communicate with employees via instant messaging to advertise on social networking sites to serve customers around the world to collaborate with virtual team members to complete taxes automatically What is 8 3/4 percent expressed as a fraction "how did the students react to the handsome teacher when he dismissed himself Find the centroid(x bar, y bar) of the region bounded by: y = 8x^2 + 2x, y = 0, x = 0, and x = 3 x bar = _________________ y bar = ___________________ Jaxon Furnishings Company is considering logging opportunities in Alaska to obtain wood for their products. The market analysis team is busy comparing the benefits of increased wood production to the costs of deforestation and resulting environmental conditions. The company is using the _____ approach to make this ethical decision. Fixed marketing expense totaled $23,000 and fixed administrative expense totaled $39,000. The price per bar of soap is $46. How many units must be sold to yield targeted income of $70,000 What are the translations of this function f(x)=(x+1)^2+2 true/false: Bandwidth refers to the range of frequencies that can be transmitted by a telecommunications channel. The quadrilateral is made up of one rectangle and two right triangles. The rectangle has a height of twelve units and a length of twelve units. Each right triangle has a height of twelve units and a base of four units. What is the area, in square units, of the parallelogram? 96 square units 168 square units 192 square units 240 square units