what are the uses of joystick​

Answers

Answer 1
Joysticks are often used to control video games, and usually have one or more push-buttons whose state can also be read by the computer. A popular variation of the joystick used on modern video game consoles is the analog stick.

Related Questions

godwin pharmaceuticals has a private web server for its corporate network that runs on a linux operating system. you have been contacted to make its network remotely accessible to the it department so that the it department can have secure access to the workstations and, at the same time, the transmissions remain encrypted. which of the following protocols would you apply so that the employees can have secured remote access to the computer server?

Answers

Answer:

Explanation:nm

RDP enables remote network access and offers a safe, encrypted connection. Here, RDP can be utilized to give the staff members safe remote access to the computer server.

Which of the following protocols access to the computer server?

SSH

Secure Sockets Shell, or SSH, is a network that enables access to programs and services across a distant network.SSH does not offer a secure connection, but it does offer encrypted communication.

Telnet

Terminal Network, sometimes known as Telnet, is a client-server protocol that utilizes the TCP/IP protocol.Telnet enables running programs through a distant network or computer. Only one remote login is required.

RDP

RDP offers a remote desktop connection and desktop, enabling remote access to data and programs.RDP utilizes the TCP/IP protocol, which offers secure communication and encrypted transmission.

POP3

Post Office Protocol version 3 is known as POP3.It is a protocol that facilitates working with emails.Mails can be accessed remotely through a remote server.

To know more about Secure Sockets Shell, visit:

https://brainly.com/question/17465910

#SPJ4

Ramshewak goes to market for buying some fruits and vegetables. He ishaving a currency of Rs 500 with him for marketing. From a shop he purchases 2.0 kg Apple priced Rs. 50.0 per kg, 1.5 kg Mango priced Rs.35.0 per kg, 2.5 kg Potato priced Rs.10.0 per kg, and 1.0 kg Tomato priced Rs.15 per kg. He gives the currency of Rs. 500 to the shopkeeper. Find out the amount shopkeeper will return to Ramshewak. and also tell the total item purchased. write the algorithm to the problem​

Answers

Answer:

Explanation:

To find the amount that the shopkeeper will return to Ramshewak and the total items purchased, we can use the following algorithm:

Set the initial amount paid by Ramshewak to the shopkeeper as 500.

Calculate the cost of 2.0 kg of apples at Rs. 50 per kg: 2.0 x 50 = 100

Add the cost of apples to the initial amount: 500 + 100 = 600

Calculate the cost of 1.5 kg of mangoes at Rs. 35 per kg: 1.5 x 35 = 52.5

Add the cost of mangoes to the total amount: 600 + 52.5 = 652.5

Calculate the cost of 2.5 kg of potatoes at Rs. 10 per kg: 2.5 x 10 = 25

Add the cost of potatoes to the total amount: 652.5 + 25 = 677.5

Calculate the cost of 1.0 kg of tomatoes at Rs. 15 per kg: 1.0 x 15 = 15

Add the cost of tomatoes to the total amount: 677.5 + 15 = 692.5

Subtract the total amount from the initial amount paid by Ramshewak to find the amount that the shopkeeper will return: 500 - 692.5 = -192.5

Since the total amount of the items purchased is Rs. 692.5 and Ramshewak paid Rs. 500, the shopkeeper will return Rs. 192.5 to Ramshewak.

Algorithm:

Set initial amount paid by Ramshewak to 500

Calculate cost of 2.0 kg of apples at Rs. 50 per kg

Add cost of apples to the initial amount

Calculate cost of 1.5 kg of mangoes at Rs. 35 per kg

Add cost of mangoes to the total amount

Calculate cost of 2.5 kg of potatoes at Rs. 10 per kg

Add cost of potatoes to the total amount

Calculate cost of 1.0 kg of tomatoes at Rs. 15 per kg

Add cost of tomatoes to the total amount

Subtract total amount from initial amount paid by Ramshewak to find amount shopkeeper will return to Ramshewak.

100 point question, with Brainliest and ratings promised if a correct answer is recieved.
Irrelevant answers will be blocked, reported, deleted and points extracted.

I have an Ipad Mini 4, and a friend of mine recently changed its' password ( they knew what the old password was ). Today, when I tried to login to it, my friend claimed they forgot the password but they could remember a few distinct details :

- It had the numbers 2,6,9,8,4, and 2 ( not all of them, but these are the only possible numbers used )
- It's a six digit password
- It definitely isn't 269842
- It definitely has a double 6 or a double 9

I have already tried 26642 and 29942 and my Ipad is currently locked. I cannot guarantee a recent backup, so I cannot reset it as I have very important files on it and lots of memories. It was purchased for me by someone very dear to me. My question is, what are the password combinations?

I have already asked this before and recieved combinations, however none of them have been correct so far.

Help is very much appreciated. Thank you for your time!

Answers

Based on the information provided, we can start generating possible six-digit password combinations by considering the following:

   The password contains one or more of the numbers 2, 6, 9, 8, and 4.

   The password has a double 6 or a double 9.

   The password does not include 269842.

One approach to generating the password combinations is to create a list of all possible combinations of the five relevant numbers and then add the double 6 and double 9 combinations to the list. Then, we can eliminate any combinations that include 269842.

Using this method, we can generate the following list of possible password combinations:

669846

969846

669842

969842

628496

928496

628492

928492

624896

924896

624892

924892

648296

948296

648292

948292

Note that this list includes all possible combinations of the relevant numbers with a double 6 or a double 9. However, it is still possible that the password is something completely different.

A vulnerability assessment solution is hosted in the cloud. This solution will be used as an accurate inventory data source for both the configuration management database and the governance, risk, and compliance tool. An analyst has been asked to automate the data acquisition. Which of the following would be the BEST way to acquire the data?

API or SOAR?

Answers

Since the analyst has been asked to automate the data acquisition process, the best way to acquire this data is: C. API.

What is an API?

API is an abbreviation for application programming interface and it can be defined as a software application intermediary (computing interface) that is made up of tools, set of executable codes, and protocols that is designed and developed to help software applications and computers to function properly, as well enable the exchange of data.

In Computer technology, an application programming interface (API) allows a computer network device and a cloud-based server or two cloud-based servers to share data and functionality within the cloud.

In conclusion, a software developer is saddled with the responsibility of integrating an application programming interface (API) into the software.

Read more on API here: brainly.com/question/20910074

#SPJ1

Complete Question:

A vulnerability assessment solution is hosted in the cloud. This solution will be used as an accurate inventory data source for both the configuration management database and the governance, risk, and compliance tool. An analyst has been asked to automate the data acquisition. Which of the following would be the BEST way to acquire the data?

A. CSV export

B. SOAR

C. API

D. Machine learning

Which statement about firewall policy NAT is true?

Answers

Answer:

An incoming interface is mandatory in a firewall policy, but an outgoing interface is optional. -A zone can be chosen as the outgoing interface. -Only the any interface can be chosen as an incoming interface.

3.) Create an algorithm and a flowchart that will compute the sum of two numbers. If the sum is below or equal to twenty, two numbers will be entered again. If the sum is above 20, it will display the sum.

4) Create an algorithm and a flowchart that will output the largest number among the three numbers.

Answers

An algorithm and a flowchart that will compute the sum of two numbers. If the sum is below or equal to twenty, two numbers will be entered again. If the sum is above 20, it will display the sum is given below

The Algorithm

Start → Declare variables → Initialise variables → Perform operation → Display output → Stop.

Start

Enter two numbers

Add the numbers

If

The sum is below or equals to 20

Then

Enter another two numbers

Else

If

Sum greater or equals to 20

Then

Display

End

What is an Algorithm?

This refers to the well-defined instructions that are used to execute a program that solves a problem;

An algorithm and a flowchart that will output the largest number among the three numbers is given below:

The 2nd Algorithm

Start

Display the result of the sum

Then

Display the largest number from the numbers

End

Read more about algorithms here:

https://brainly.com/question/13800096

#SPJ1

6. In the Essentials workspace, there are three additional docks on the right of the screen. Each dock can be expanded
or collapsed, and each dock contains panels that can be docked or undocked. Starting from the center of the
workspace and working outward, name a panel from each dock:
a)?
b)?
c)?

Answers

Answer:

A. Brushes - you use to select, modify, or create a brush for use.

B. Character - gives option where you can use a text tool.

C. Info - displays general information about your image, info on color, position, dimension's, and more.

Explanation:

the pane of the site setup dialog box defines the settings you need to upload site files through dreamweaver files panel.

Answers

The Site Setup dialog box in Adobe Dreamweaver is used to define the parameters of a website.

What is Site Setup?

Site Setup is the process of configuring a website for hosting on a web server. This includes setting up the domain name, setting up the web server, configuring the web server for the specific website, and setting up the server software. This process also includes setting up the database and configuring the security for the website. It may also involve setting up email accounts, setting up the FTP access, and setting up the website content. Site Setup is an important step in setting up a website and should be done properly to ensure the website is able to run properly and securely.

This includes the local and remote locations, which are the folders where files (such as HTML and image files) are stored on your computer and the web server, respectively. In addition, the Site Setup dialog box allows you to set up the connection type (FTP, SFTP, etc.) and credentials (username, password, etc.) you need to upload your site files to the remote server. Once these settings are configured, you can use the Files panel in Dreamweaver to quickly upload and download files to and from the server.


To learn more about website
https://brainly.com/question/28431103
#SPJ4

Complete the body of the decrement static method using only the NaturalNumberKernel methods (multiplyBy10, divideBy10, and isZero). The code for increment is provided as an example of a recursive method on NaturalNumber.

Answers

Answer:true

Explanation:mark as brainliest

What can toxic substances do to your body?
Select all that apply.

Answers

Answer:

burn you, affect your whole body

Explanation:

hope this helps :) !!!

Gary is unable to log in to the production environment. Gary tries three times and is then locked out of trying again for one hour. Why? (D3, L3.3.1)

Answers

Answer:

Gary is likely locked out of trying to log in again for one hour after three failed login attempts as part of a security measure to prevent unauthorized access or brute force attacks in the production environment. This policy is often implemented in computer systems or applications to protect against malicious activities, such as repeatedly guessing passwords or using automated scripts to gain unauthorized access to user accounts.

By locking out an account for a certain period of time after a specified number of failed login attempts, the system aims to deter potential attackers from continuously attempting to guess passwords or gain unauthorized access. This helps to enhance the security of the production environment and protect sensitive data or resources from unauthorized access.

The specific duration of the lockout period (one hour in this case) and the number of allowed failed login attempts may vary depending on the security settings and policies configured in the system. It is a common security practice to implement account lockout policies as part of a comprehensive security strategy to protect against unauthorized access and ensure the integrity and confidentiality of data in the production environment.

Can some one help me right a 3 paragraph sentace on iPhone and androids specs it has too be 7 sentaces each paragraph

Can some one help me right a 3 paragraph sentace on iPhone and androids specs it has too be 7 sentaces

Answers

Answer:

iPhone

The iPhone has come a long way since its first model, the iPhone 3G. Now, the current iPhone 11 Pro Max comes with a 6.5-inch Super Retina XDR OLED display, a triple-camera system, and up to 512GB of storage. It has a powerful A13 Bionic chip with a neural engine and is powered by a 3,969 mAh battery. With its dual-SIM support and 5G capability, the iPhone is a great choice for those who want the latest and greatest in mobile technology.

Android

Android phones come in a wide range of specs and sizes, so there’s something for everyone. The current top-of-the-line Android phone is the Samsung Galaxy S20 Ultra 5G, which boasts a 6.9-inch Dynamic AMOLED display, a triple-camera system, and up to 512GB of storage. It has a Qualcomm Snapdragon 865 processor and is powered by a 5,000 mAh battery. With its dual-SIM support and 5G capability, the Android phone offers a great mix of performance and features.

Comparison

When it comes to specs, the iPhone and Android phones offer a comparable experience. Both come with powerful processors and large displays, as well as dual-SIM support and 5G capability. The main differences are in design and the camera systems. The iPhone has a unique design and a triple-camera system, while Android phones come in a variety of shapes and sizes, and often feature four or more cameras. The choice ultimately comes down to personal preference.

Which of the following would be considered unethical for a programmer to do? (5 points)

Create software used to protect users from identity theft
Ignore errors in programming code that could cause security issues
Protect users from unauthorized access to their personal information
Use someone else's code with the original developer's permission

Answers

One thing that would be onsidered unethical for a programmer to do is B. Ignore errors in programming code that could cause security issues

Why would this be unethical for a programmer ?

Creating software designed to protect users from identity theft stands as a commendable and ethical endeavor, demonstrating the programmer's commitment to safeguarding user information and thwarting identity theft.

Engaging in such behavior would be considered unethical since it undermines the security and integrity of the software, potentially exposing users to vulnerabilities and compromising their sensitive data. Respecting intellectual property rights and obtaining proper authorization reflects adherence to ethical and legal standards.

Find out more on programmers at https://brainly.com/question/13341308

#SPJ1

If I am designing an application, which code to I input to create a link​

Answers

Answer:

\({ \tt{ < a \: href = url > < a > }}\)

The last must be a closing tag

Can anyone do this I can't under stand

Can anyone do this I can't under stand
Can anyone do this I can't under stand
Can anyone do this I can't under stand
Can anyone do this I can't under stand
Can anyone do this I can't under stand

Answers

Answer:

I think u had to take notes in class

Explanation:

u have yo write 4 strings

Without revealing the name of your employer, comment on the efforts of your employer to promote a work environment in which employees are encouraged to act ethically.​

Answers

Answer:

Helpfull

Explanation:

He is helpfull by allowing people to bring their device for helping them with some problems

What was the Internet originally created to do? (select all that apply)

Answers

The Internet was initially constituted for various purposes. it is was   originally created to options a, c and d:

share researchcommunicateshare documentsWhat is Internet

Communication: The Internet was planned to aid ideas and data exchange 'tween analysts and chemists. It proposed to combine various calculating and networks to authorize logical ideas and cooperation.

Research and Development: The Internet's production was driven for one need to share research verdicts, experimental dossier, and possessions among academies, research organizations, and administration institutions.

Read more about Internet here:

https://brainly.com/question/21527655

#SPJ4

You have read about the beginnings of the Internet and how it was created. What was the Internet originally created to do? (select all that apply)

share research.

Play games.

Communicate.

Share documents.

Sell toys

Difference between Python vs Pandas?

Answers

Python and Pandas are not directly comparable as they serve different purposes. Here's an explanation of each:

Python:

Python is a general-purpose programming language known for its simplicity and readability. It provides a wide range of functionalities and can be used for various tasks, including web development, data analysis, machine learning, and more. Python has a large standard library and an active community, making it versatile and widely used in different domains.

Pandas:

Pandas, on the other hand, is a powerful open-source library built on top of Python. It is specifically designed for data manipulation and analysis. Pandas provides easy-to-use data structures, such as Series (one-dimensional labeled arrays) and DataFrame (two-dimensional labeled data tables), along with a variety of functions for data cleaning, transformation, filtering, grouping, and aggregation.

In essence, Python is the programming language itself, while Pandas is a Python library that extends its capabilities for data analysis and manipulation. You can use Python to write code for a wide range of purposes, while Pandas is focused on providing efficient and convenient tools for working with structured data.

for similar questions on Python.

https://brainly.com/question/26497128

#SPJ8

Please help me with these questions please

Please help me with these questions please

Answers

Answer:

The answer is 20, if this helps you please give the brainliest award.

Extend the class linkedListType by adding the following operations: Write a function that returns the info of the kth element of the linked list. If no such element exists, terminate the program. Write a function that deletes the kth element of the linked list. If no such element exists, terminate the program.

Answers

Answer:

Explanation:

The following code is written in Java. Both functions traverse the linkedlist, until it reaches the desired index and either returns that value or deletes it. If no value is found the function terminates.

public int GetNth(int index)

       {

       Node current = head;

       int count = 0;

       while (current != null)

       {

       if (count == index)

       return current.data;

       count++;

       current = current.next;

       }

       assert (false);

       return 0;

       }

public int removeNth(int index)

       {

       Node current = head;

       int count = 0;

       while (current != null)

       {

       if (count == index)

       return current.remove;

       count++;

       current = current.next;

       }

       assert (false);

       return 0;

       }

What do y’all think are the pros and cons to using technology?

Answers

Answer:

Explanation:

pros. convenient, easy to use, and educational  cons. addictive, mentally draining, and creates a social divide.

A 5G network will have the following advantages over a 4G network: a. Overall network support and operations costs are reduced, new applications can be made available sooner, and the risk of human error is reduced. b. Ability to support more concurrent devices, minimal infrastructure changes, and lower latency. c. Lower latency, greater bandwidth, and ability to support more devices. d. Ability to support exciting new applications, greater bandwidth, and improved security

Answers

A 5G network will have the following advantages over a 4G network except that C. Lower latency, greater bandwidth, and ability to support more devices.

A 5G network simply means the 5th generation mobile network. It enables a new kind of network that is designed to connect everyone and devices.

The advantages of a 5G network over a 4G network include lower latency, greater bandwidth, and the ability to support more devices.

Read related link on:

https://brainly.com/question/25530245

Compare a Wi-Fi hotspot with a cybercafé.

Answers

Answer:

A WiFi Hotspot is a wireless internet connection that allows a computer, smartphone, or any other internet-enabled devices to connect to internet access points.

A cybercafe refers to any business place that allows people to access the internet usually within its premises after paying for connection access to connect to it.

Explanation:

different uses of quick access toolbar

Answers

“The Quick Access Toolbar provides access to frequently used commands, and the option to customize the toolbar with the commands that you use most often. By default, the New, Open, Save, Quick Print, Run, Cut, Copy, Paste, Undo, and Redo buttons appear on the Quick Access Toolbar” -Information Builders

Small organizations with only a few computers can manage each device in an ad hoc way without standardization. Larger organizations need to use standardization to scale their ability to support many users. Consider what you’ve learned about Active Directory and Group Policy and how they can be used to simplify user support and desktop configuration. You can search the Internet for examples. Create a posting that describes your thoughts on how Active Directory and Group Policy improve management in large organizations.

Answers

Organizational security is the principal application of Group Policy Management. Group policies, also known as Group Policy Objects (GPOs), enable decision-makers and IT professionals to deploy critical cybersecurity measures throughout an organization from a single place.

What is an Active Directory?

Microsoft Active Directory has a feature called Group Policy. Its primary function is to allow IT administrators to manage people and machines throughout an AD domain from a single location.

Microsoft Active Directory is a directory service designed for Windows domain networks. It is featured as a set of processes and services in the majority of Windows Server operating systems. Active Directory was initially exclusively used for centralized domain management.

Group Policy is a hierarchical framework that enables a network administrator in charge of Microsoft's Active Directory to implement specified user and computer configurations. Group Policy is essentially a security tool for applying security settings to people and machines.

Learn more about Active Directories:
https://brainly.com/question/14469917
#SPJ1

A stack is a ___________________ data structure.

Answers

Answer:

A stack is a base data structure.

In a programming language, how to write a statement that increases numPeople by 5?

Answers

The statement to increase the value of a variable called numPeople by 5 will depend on the specific programming language you are using. Here is an example:

Python:

numPeople += 5

Coding is the process of using a programming language to create software, applications, or systems that can perform specific tasks or solve specific problems. Coding involves writing code, which is a set of instructions that a computer can understand and execute.

Coding is also called as computer programming, that it is used as the way to communicate with computers. Code will tell a computer what should to do, and writing code is like creating a set of commands.

Learn more about coding: brainly.com/question/30434576

#SPJ4

In a programming language, how to write a statement that increases numPeople by 5?

Which software development method uses highly skilled programmers to shorten the development process while producing quality software

Answers

RAD Model or Rapid Application Development model is an agile software development model that prioritizes rapid prototyping over planning.

What is a RAD Model?

The RAD Model is an agile software development approach that focuses more on ongoing software projects than planning them, that is, it gives higher priority to development tasks.

Characteristics of a RAD Model

By having numerous iterations, components and prototypes deployed from time to time, it easily measures and evaluates the development of the project.

It enables developers to take on multi-disciplined roles, quickly creating working code and prototypes.

Therefore, we can conclude that the main idea of the RAD Model is to deliver high quality systems, in a short time and with a low investment cost.

Learn more about RAD Model here: https://brainly.com/question/23898192

which of the following is a personal benifit of earning a college degree?
A) you have more friends
B) you are more likely to exercise
C) you are more likely to vote for the right candidate.
D) you have a longer life expectancy

Answers

Answer:

you have a longer life expectancy

Explanation:

please answer this now I need please.


write a statement to do the following.
a)to give yellow colour to the for writing text on the graphics window
b)To give green as background colour to the graphics window
c)to give pink colour to the brush which is used to fill the shapes in the graphics window​

Answers

Answer:

You can change the color of text in your Word document. Select the text that you want to change. On the Home tab, in the Font group, choose the arrow next to Font Color, and then select a color.

You can display a graphics window and draw colorful shapes in it if you use the Show operation of the GraphicsWindow object. You can also specify properties of the graphics window, such as its title, height, width, and background color.

Explanation: Sorry I couldn't do the third question but hope it helps.

Answer:

hii , you are an army?

reply in the comment

Other Questions
Find the value of x. 115 105 x 139 137 x 116 When the charges in the rod are in equilibrium, what is the magnitude EEE of the electric field within the rod A B cell is first stimulated by ______.free antigenantigen presented on an MHC class I molecule of an infected cellantigen presented on an MHC class II molecule of an APCantigen presented on an MHC class I molecule of an APC Which of the following described a global network connecting billions of computers and otherdevices?A) WiFiBISPCWorld Wide WebDInternet The boost converter supply voltage is 25V and the switching frequency is 10kHz. The load resistance is 50.Calculate the necessary inductance value so that converter operates in the continuous conduction mode if the output voltage varies in range 30V-65V.2- The boost converter supply voltage is 25V and the switching frequency is 10kHz. The load resistance is 50.Calculate the necessary capacitance value so that the ripple of the output voltage is below 100mV. The output voltage varies in range 45V-60V. How many liters is 79.1 mL? Answer with correct significant numbers. Lee's demand for ice cream cones. if the market price is $3.50. What is leela/s consumer surplas? Imagine you have been hired as a consultant to support a firm that wishes to expand its operations internationally. your first assignment is to explain to the ceo and their staff the importance of understanding the difference between domestic expansion and international expansion. for your initial discussion post, consider the following questions as a basis to your explanation to the ceo: a. why is foreign investment so different from domestic investment?b. what should c-level executives consider in expanding internationally, as compared to domestically?c. what types of risk mitigation techniques could you suggest to the executives so that the firm can be successful in the proposed expansion? Can someone help pleaseeee Please help me with these 2 last questions Ill give you all my points Which component of an e-commerce technology infrastructure performs several fundamental services including security and identification, retrieval and sending of web pages, web site tracking, and web site development?. Solve for d. 3 + d < 3 d d < 6d < 6d < 0d < 3 A profit-maximising firm should increase its outputuntila. marginal revenue equals marginal costb. marginal profit equals the wage ratec. marginal profit equals marginal costd. marginal profit is you want to install molding around the circular room. How much it would cost you to install the molding that you picked if it cost $4.22 per foot? During the first year with a company, Finley was paid an annual salary of $57,000, with a 4% raise for each following year. Which equation represents Finley's annual salary, f (n), during the nth year? f (n) = 57,000(0.04n 1) f (n) = 57,000(1.04n) f (n) = 57,000(1.04n 1) f (n) = 57,000(0.96n) the bandeiras corporation, a merchandising firm, has budgeted its activity for december according to the following information: sales at $600,000, all for cash. merchandise inventory on november 30 was $275,000. the cash balance at december 1 was $33,000. selling and administrative expenses are budgeted at $105,000 for december and are paid in cash. budgeted depreciation for december is $55,000. the planned merchandise inventory on december 31 is $305,000. the cost of goods sold is 70% of the sales price. all purchases are paid for in cash. there is no interest expense or income tax expense. the budgeted cash receipts for december are: PLEASE HELP FAST!!! How many solutions does this system have?Y=3/4x+-5-3x+4y=-20Which one is it? A. OneB. TwoC. An infinite number D. No solution Smith manufactures coffee mugs that it sells to other companies for customizing with their own logos. Smith prepares flexible budgets and uses a standard cost system to control manufacturing costs. The standard unit cost of a coffee mug is based on static budget volume of 60,000 coffee mugs per month: Actual cost and production information for July 2018 follows: (Click the icon to view actual cost and production Read the requirements. EEB (Click the icon to view the cost data.) Requirement 1. Compute the cost and efficiency variances for direct materials and direct labor. Begin with the cost variances. Select the required formulas, compute the cost variances for direct materials and direct labor, and identify whether each variance is favorable (F) or unfavorable (U) (Abbreviations used: AC actual cost; AQ actual quantity; FOH fixed overhead; SC standard cost; SQ standard quantity.) magine a monohybrid cross studying stem length. the tall phenotype (t) is dominant; and the short phenotype (t) is recessive. what would you predict for the gametes made by the tall plant of the p generation? 4.What number must be added to complete the square?2+3x3/2O 3none of the answer choicesOO6