Write a program that, given two binary numbers represented as strings, prints their sum in binary. The binary strings are comma separated, two per line. The final answer should not have any leading zeroes. In case the answer is zero, just print one zero i.e. 0

Answers

Answer 1

Here's an example program in Python that takes two binary numbers represented as strings, adds them, and prints their sum in binary format:

def add_binary_numbers(num1, num2):

   # Convert binary strings to integers

   num1 = int(num1, 2)

   num2 = int(num2, 2)

   # Add the two numbers

   result = num1 + num2

   # Convert the result back to binary

   binary_result = bin(result)[2:]  # Remove the '0b' prefix

   # Print the binary result without leading zeros

   print(binary_result.lstrip('0') or '0')

# Test the function

inputs = [

   ("1010", "11"),    # Example inputs

   ("0", "101"),      # Inputs with leading zeros

   ("1111", "1111"),  # Inputs resulting in all ones

   ("10", "10"),      # Inputs resulting in zero

   ("1110", "10"),    # Other inputs

   ("11001", "100"),

]

for num1, num2 in inputs:

   add_binary_numbers(num1, num2)

Learn more about the binary format, here:

https://brainly.com/question/26751570

#SPJ4


Related Questions

What is a Boolean Expression?
A) Statements that only run when certain conditions are true
B) Something a program checks to see whether it is true before deciding to take an action
C) An expression that evaluates to true or false

Answers

The answer is C, an expression that evaluates to true or false.

In computer science, a Boolean expression is an expression used in programming languages that produces a Boolean value when evaluated. A Boolean value is either true or false.

( Lol. I’m in 7th grade doing college work, so this was fun to answer! )

Marisol wants a data structure that is as flexible and controllable as possible. Which of these would be most appropriate?

A. primitive
B. Built-in
C. User-defined
D. String

Answers

Answer:

B. Built-in

Explanation:

You can modify built-in data structures like adding elements to an array and removing elements.

However, creating a data structure is more time-consuming such as manually sorting a list instead of using the built-in sort function.

what is the syntax and function of the HTML tags
<BODY>​

Answers

Answer:

Definition and Usage The <body> tag defines the document's body. The <body> element contains all the contents of an HTML document, such as headings, paragraphs, images, hyperlinks, tables, lists, etc. Note: There can only be one <body> element in an HTML document.

Tracy always starts facing which direction?


Answers

Answer:

tracy starts facing east

Explanation:

The time Yanni runs to catch Tracy is 20 minutes.

We are given that;

Speed of tracy= 1mile in 10min

Now,

We need to find the distance that Tracy and Yanni have traveled when they meet.

Let x be the time (in minutes) that Yanni runs, then Tracy runs for x + 20 minutes.

Since their speeds are given in miles per minute, we can write the following equations:

Distance traveled by Tracy = 1/10 * (x + 20)

Distance traveled by Yanni = 1/5 * x

They meet when their distances are equal, so we can set the equations equal and solve for x:

1/10 * (x + 20) = 1/5 * x

Multiply both sides by 10 to clear the fractions: x + 20 = 2x

Subtract x from both sides: 20 = x

Therefore, by algebra the answer will be 20 minutes.

More about the Algebra link is given below.

brainly.com/question/953809

#SPJ6

The complete question is;

Tracy is running a trail in Hanna park she can run 1 mile in 10 minutes Yanni is running the same trail as Tracy Johnny can run a mile in five minutes but starts running 20 minutes after Tracy started on the trail if they started the trail from the same point how long will it take Yanni to catch Tracy

I need help!!! i will make you a brainliest!!

I need help!!! i will make you a brainliest!!

Answers

Answer:

What you have is correct

Explanation:

Technology trends in education play a key role in a student’s: social life. motivation. career readiness. job search.

Answers

Answer:

job search

Explanation:

job search bc you can look for jobs that are avalible online.

Answer:

job search

Explanation:

You can look for jobs thats

avalible online

Which of the following lines correctly defines a String variable

A. String s = aplus;
B. s = "aplus";
C. String s = "aplus";
D. String = "aplus";
E. String;

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is C i.e. String s = "apluse";

The rule or syntax of declaring string in any programming language is given below:

String variable-name = "yourString";

For declaring string variable, first, you write "String" that is a keyword of a programming languages for declaring string variables, such as int before the variable name for declaring integer variable. Then, you need to write a meaningful name of the string as a variable. After string variable name, you need to put the equal operator and then write the string in double quotation("") marks and after that put the instruction terminator that is ";".

So, according to this syntax, option C is correct.

While other options are not correct because:

In option a, string is not encapsulated in double quotation. Option B does not have varaible type such as String and Option E does not have variable name and its value also. So, only option C is correct and all other except C are incorrect.

Company B is setting up commercial printing services on their network. Which of these are advantages of centrally managed commercial printers? Check all that apply.

Answers

Answer:

Centralized management of printing activities, allowing administrators to manage all print devices using a network.

Explanation:

The advantages of centrally managed commercial printers are:

Printers can be easily created and deployed in virtual sessions such as Citrix or VMwareCentralized management of printing activities, allowing administrators to manage all print devices using a network.Reduces the number of printer related issues thereby increasing productivity.It provides a way of keeping record those who are printing and what have been printerAll print related jobs can be easily managed from a central controlled network.Increased security as a print server allows you to total control over who can print what and where High availability and redundancy due to pooling of printers Easily customize printer profile

what's 3+3 and stop deleting my question i just wasted 41 points

Answers

Answer:

I am pretty confident that the answer is 6

Explanation:

3+3=6

What are the characteristics of a physical network topology? [Choose all that apply] A physical network topology displays the physical location of devices A physical network topology is a diagram of the network A physical network topology is a representation of the logical network A physical network topology displays the actual layout of the network

Answers

While logical topology describes how data is moving through the network, physical topology refers to the physical configuration of computer nodes based on the hardware configuration.

Both topologies exist in local area networks (LAN). A secure media connects every node in a LAN to every other node. According to their physical locations, nodes, computers, and other items are connected to one another in a network according to a physical topology.

It is necessary to check the physical setup of network cables and workstations. A logical topology, on the other hand, specifies how information travels between devices when using network protocols. It assesses how devices talk to one another inside.

As a result, network topology explains the virtual form, arrangement, and structure of a network from both a logical and physical standpoint.

To know more about the network:

brainly.com/question/13818848

#SPJ4

A formula might be used to add expenses in a spreadsheet. True False

i will mark brainlist

Answers

Answer:

the answer is true

Explanation:

Answer:

True

Explanation:

This answer is for anyone who has this question ⬇️

"A formula might be used to add expenses in a spreadsheet."

False

True

A formula might be used to add expenses in a spreadsheet. True Falsei will mark brainlist

Operations that run in protected mode must go through which of the following before they can access a computer’s hardware? A. Kernal B. Network C. Device driver D. User Interface

Answers

Answer:

Option A (Kernal) seems to be the right answer.

Explanation:

A Kernel appears to be the central component of such an OS. This handles machine as well as hardware activities, including most importantly storage as well as CPU power.This manages the majority of the initialization as well as program input/output requests, converting them into CPU data-processing commands.

The other given option are not related to the given circumstances. So that option A would be the right answer.

Answer:

kernel

Explanation:

[Files, for loops, exceptions; 20pt] Using a for loop, write a function called countWord(). It takes 2 parameters: The name of a text file (e.g. gettysburg.txt that is included with this test) and a word to be searched within that file. Your code should return the number of times the given word appears in the file. Capitalization should not matter. Make certain to handle file exceptions gracefully.

Answers

def countWord(name, word):

   try:

       f = open(name, "r")

       lst = ([])

       w = ""

       for x in f.readlines():

           w += x.lower()

       lst = w.split()

       f.close()

       return lst.count(word)

   except FileNotFoundError:

       print("Please create a file or use the name of an existing text file.")

print("Your word appears", countWord("gettysburg.txt", "random"), "time(s)")

The text file I used for testing looks like:

random words

random words

I'm putting random words in here

random

this is random

RaNdOm

I didn't really know what exceptions your professor is looking for so I just used the file not found one. Best of luck.

The pico question is a formula that is only used at the beginning of the process. select one:
a. true
b. false

Answers

The Pico question is a formula that is only used at the beginning of the process is a true statement.

What is PICO format?

PICO is known to be a kind of format that is known to be used for making or developing a good form of  clinical research question before the beginning of one's research.

Note that it is seen as one that is mnemonic in nature and that is used to tell about  the four elements of the sound clinical foreground question.

Therefore, The Pico question is a formula that is only used at the beginning of the process is a true statement.

Learn more about Pico question from

https://brainly.com/question/14078013

#SPJ1

You cannot remember the address of Kayah’s website. What type of tool will help you
locate/find it by typing in keywords to look for it?

Answers

Answer:

A search engine

Explanation:

View the pdf

Frida has been given the task of creating a database to store all her company's records and sales records. She is going to produce a relational database. The customers records will have the fields Customer_id, Name, Contact_Phone, and card Number. The sales records will have the fields Invoice_number, Item_number, Item_description, Item_cost and Customer_ref.

Complete the diagram below to show how the tables will be combined.

Frida has been given the task of creating a database to store all her company's records and sales records.

Answers

Answer:

A value that's used to identify a record from a linked table is called a ______. ... A database administrator is setting up a new table that will contain customer ... The fields include name, address, company, phone, email, and customer ID. ... Gina does not know how to write SQL commands and no forms have been created.

Explanation:

problem 2. consider a modified mergesort algorithm that at each recursion splits an array of size n into two subarrays of sizes n/5 and 4n/5, respectively. write down a recurrence relation for this modified merge-sort algorithm and give its asymptotic solution.

Answers

The modified merge-sort algorithm splits an array of size n into two subarrays of sizes n/5 and 4n/5. The recurrence relation for this algorithm can be written as:

T(n) = T(n/5) + T(4n/5) + O(n)

Here, T(n/5) represents the time to sort the smaller subarray of size n/5, T(4n/5) represents the time to sort the larger subarray of size 4n/5, and O(n) accounts for the merging step.

The asymptotic solution for this recurrence relation is:

T(n) = O(n*log_5(n))

This is because the depth of the recursion tree is log_5(n) and at each level, the work done is proportional to n.

When answering questions on Brainly, you should always aim to be factually accurate, professional, and friendly. Additionally, you should be concise and avoid providing extraneous amounts of detail. It is also important to ignore any typos or irrelevant parts of the question. When providing an answer, it is helpful to use the relevant terms from the question. For example, in the student question: "Problem 2. Consider a modified mergesort algorithm that at each recursion splits an array of size n into two subarrays of sizes n/5 and 4n/5, respectively. Write down a recurrence relation for this modified merge-sort algorithm and give its asymptotic solution," it would be helpful to use the terms "modified merge-sort algorithm," "recurrence relation," and "asymptotic solution" in your response.

Learn more about mergesort algorithm here: brainly.com/question/28260163

#SPJ11

suppose the segments are limited to the 4 kib page size (so that they can be paged). is 4 bytes large enough for all page table entries (including those in the segment tables?

Answers

It is not clear what you mean by "segments" and "tables" in this context, as there are multiple types of segments and tables in computer systems. However, assuming you are referring to memory segments and page tables:

If the segments are limited to 4 kib page size, this means that each segment can be divided into multiple 4 kib pages for paging purposes. Each page table entry typically contains information about the physical memory address of the page, as well as other control bits such as permission bits and dirty bits.
The size of each page table entry depends on the system architecture and the number of control bits needed. In some systems, a page table entry may be 4 bytes or less, while in others it may be larger.
Therefore, whether 4 bytes is large enough for all page table entries in the segment tables depends on the specific system architecture and the number of control bits needed for each entry. In general, however, it is possible for page table entries to be 4 bytes or smaller.

To learn more about memory click the link below:

brainly.com/question/31054240

#SPJ11

how many instructions are supercomputers capable of processing in a single second?

Answers

Answer:

Trillions

Explanation:

A Supercomputer can process trillions of instructions in a second

Determine the minimum number of groups that can be formed such that each movie is in exactly one groupExample The numbers of awards per movie are awards = [1, 5, 4, 6, 8, 9, 2], and the maximum allowed difference is k = 3.One way to divide the movies into the minimum number of groups is:The first group can contain [2, 1]. The maximum difference between awards of any two movies is 1 which does not exceed k.The second group can contain [5, 4, 6]. The maximum difference between awards of any two movies is 2 which does not exceed kThe third group can contain [8, 9]. The maximum difference between awards of any two movies is 1 which does not exceed k.The movies can be divided into a minimum of 3 groups.

Answers

The minimum number of groups that can be formed such that each movie is in exactly one group is 3.

To determine the minimum number of groups that can be formed such that each movie is in exactly one group, you need to find groups of movies that have a maximum difference in awards that do not exceed the given maximum allowed difference (k).

One way to do this is to sort the movies by the number of awards they have and then form groups starting from the movie with the least number of awards.

For example, using the given list of awards = [1, 5, 4, 6, 8, 9, 2], and the maximum allowed difference k = 3, you can first sort the list in ascending order to get [1, 2, 4, 5, 6, 8, 9]. Then, starting from the first movie with one award, you can form groups by adding movies that have a maximum difference in awards of k or less from the previous movie added to the group.

Using this approach, you can form the following groups:

- Group 1: [1, 2], maximum difference = 1
- Group 2: [4, 5, 6], maximum difference = 2
- Group 3: [8, 9], maximum difference = 1

You can learn more about ascending order at: brainly.com/question/20681445

#SPJ11

To prepare 0.250 L of 0.100 M aqueous NaCl (58.4 g/mol), one may
a.
dissolve 0.100 g of NaCl in 250 mL of water.
b.
dissolve 1.46 g of NaCl in 250 mL of water.
c.
dissolve 0.100 g of NaCl in enough water to make 0.250 kg of solution.
d.
dissolve 1.46 g of NaCl in enough water to make 0.250 L of solution.
e.
dissolve 0.100 g NaCl in 0.250 kg of water.

Answers

To prepare 0.250 L of 0.100 M aqueous NaCl (58.4 g/mol), the correct option is d. dissolve 1.46 g of NaCl in enough water to make 0.250 L of solution.

The molarity (M) of a solution is calculated by dividing the moles of solute by the volume of the solution in liters. To prepare 0.250 L of 0.100 M NaCl, we need to determine the mass of NaCl required. The formula for calculating the mass is: mass = moles × molar mass. First, calculate the moles of NaCl: moles = Molarity × Volume (in liters), moles = 0.100 M × 0.250 L = 0.025 mol. Next, calculate the mass of NaCl: mass = 0.025 mol × 58.4 g/mol = 1.46 g. Therefore, option d. dissolve 1.46 g of NaCl in enough water to make 0.250 L of solution is the correct choice to prepare the desired solution. Options a, b, c, and e either do not provide the correct mass of NaCl or the correct volume of solution, resulting in an incorrect concentration of the solution.

Learn more about molarity (M) of a solution here:

https://brainly.com/question/29366031

#SPJ11

what are the social and ethical consequences of emerging technology hard to predict.

Answers

Answer:

The social and ethical consequences of emerging technology are hard to predict since it is truly impossible to see how technology will be applied to situations that have not really occurred yet.  

Explanation:

Which of the following is not a principle of the manifesto for agile software development?
A)
Working software is delivered frequently (weeks rather than months)
B)
Projects are built around motivated individuals, who should be trusted
C)
Face-to-face conversation is the best form of communication (co-location)
D)
Commitment to the plan despite changing circumstances

Answers

The correct option is: option D - "Commitment to the plan despite changing circumstances" is not a principle of the manifesto for agile software development.

The manifesto for agile software development consists of 12 principles that emphasize on delivering working software frequently, collaborating with customers, and responding to change. The other options A, B, and C are all principles of the manifesto.

Option A emphasizes the importance of delivering working software in shorter time frames, option B highlights the significance of motivated individuals who work together as a team, and option C emphasizes the value of face-to-face communication in building a better understanding and trust among team members.

To know more about Agile software visit:-

https://brainly.com/question/28945985

#SPJ11

Which of the following uses replication to Infect multiple computers?
Viruses
Trojan horse
Spyware
Worms​

Answers

Answer:

Trojan horse

Explanation:

mostly all the above mentioned use replication to infect computers but the one that uses replication to invest multiple computers at a time is Trojan horse.

hope it helps .

Answer:

trojan house

Explanation:

i just took the house

After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence. The information gained from the phishing attack was a result of users visiting known malicious websites. What must be done in order to prevent this from happening in the future

Answers

Answer:

The organization could make it so that specific websutes that seem fake/unsafe are not accessible to the users. For example, downloading an extension into all the devices, that blocks these malicious websites (uBlock Origin)

A company has a popular gaming platform running on AWS. The application is sensitive to latency because latency can impact the user experience and introduce unfair advantages to some players. The application is deployed in every AWS Region it runs on Amazon EC2 instances that are part of Auto Scaling groups configured behind Application Load Balancers (ALBs) A solutions architect needs to implement a mechanism to monitor the health of the application and redirect traffic to healthy endpoints.
Which solution meets these requirements?
A . Configure an accelerator in AWS Global Accelerator Add a listener for the port that the application listens on. and attach it to a Regional endpoint in each Region Add the ALB as the endpoint
B . Create an Amazon CloudFront distribution and specify the ALB as the origin server. Configure the cache behavior to use origin cache headers Use AWS Lambda functions to optimize the traffic
C . Create an Amazon CloudFront distribution and specify Amazon S3 as the origin server. Configure the cache behavior to use origin cache headers. Use AWS Lambda functions to optimize the traffic
D . Configure an Amazon DynamoDB database to serve as the data store for the application Create a DynamoDB Accelerator (DAX) cluster to act as the in-memory cache for DynamoDB hosting the application data.

Answers

Yetwywywywywywyyw would


Critically review the different types of ERP software, along
with their strengths and weaknesses, such as Off-the-shelf,
In-house, and Open-Source ERPs

Answers

There are different types of ERP software available, including off-the-shelf, in-house, and open-source ERPs. Each type has its strengths and weaknesses. Off-the-shelf ERPs offer pre-built solutions with extensive functionalities but may lack customization options. In-house ERPs provide tailored solutions to meet specific business requirements but can be costly and time-consuming to develop.

Open-source ERPs offer flexibility and cost-effectiveness, allowing customization and collaboration but may require technical expertise for implementation and ongoing maintenance. Off-the-shelf ERPs, such as SAP and Oracle, are popular due to their comprehensive features and wide industry acceptance. They provide a ready-made solution that can be quickly implemented, reducing development time and costs. However, they may lack customization options and may require businesses to adapt their processes to fit the software's functionality.

In-house ERPs are built from scratch, allowing organizations to tailor the system to their specific needs. This provides maximum control and customization possibilities, ensuring a perfect fit for the business. However, in-house ERPs can be expensive and time-consuming to develop, requiring significant resources and technical expertise. Additionally, ongoing maintenance and updates can be challenging.

Open-source ERPs, like Odoo and ERPNext, offer flexibility and cost-effectiveness. They provide access to the source code, allowing customization and collaboration within the developer community. Open-source ERPs can be more affordable and adaptable to changing business requirements. However, implementation and maintenance require technical expertise, and support may rely on community forums.

Ultimately, the choice of ERP software depends on the organization's specific needs, budget, resources, and technical capabilities. It is important to carefully evaluate the strengths and weaknesses of each type before selecting the most suitable option.

Learn more about resources here: https://brainly.com/question/30799012

#SPJ11

Python String Functions: Create a new Python Program called StringPractice. Prompt the user to input their name, then complete the following:
Length
• Print: “The length of your name is: [insert length here]”
Equals
• Test to see if the user typed in your name. If so, print an appropriate message

Really appreciate the help.

Answers

#Swap this value by your name. Mine is Hamza :)

my_name = "Hamza"

#Get input from user.

inp = input("What's your name?: ")

#Print the length of his/her name.

print("The length of your name is",len(inp),"characters.")

#Check if the input matches with my name?

#Using lower() method due to the case insensitive. Much important!!

if(inp.lower()==my_name.lower()):

   print("My name is",my_name,"too! Nice to meet you then.")

internet-based research Which of the following examples of using the internet to conduct research meets the federal definition of research with human subjects?

Answers

According to the federal definition, research with human subjects involves the collection of data from living individuals through intervention or interaction with them, or by obtaining identifiable private information.

Therefore, using the internet to conduct research with human subjects would involve interacting with individuals online or collecting identifiable private information through online means.

One example that meets this definition is a study that uses an online survey to collect data on the experiences of individuals living with a particular medical condition. The survey would involve interaction with individuals and could potentially collect identifiable private information, such as their name or contact information.

On the other hand, using the internet to conduct research that simply involves collecting data from publicly available sources, such as news articles or social media posts, would not meet the federal definition of research with human subjects.

To learn more about, research

https://brainly.com/question/31048855

#SPJ11

what technology uses a technology of satellites to provide internet access to remote or hard to reach areas

Answers

The technology that uses satellites to provide internet access to remote or hard to reach areas is called satellite internet.

This technology involves a network of satellites that orbit the Earth and transmit internet signals to a dish installed on the ground. These signals are then transmitted to a modem, which converts them into a usable internet connection.

Satellite internet is ideal for areas that do not have access to traditional broadband services such as DSL or cable. It is also used by individuals and businesses that require internet access in remote areas such as rural or mountainous regions, as well as on ships and airplanes.

While satellite internet is a reliable option for remote areas, it does have some limitations. The service can be affected by weather conditions such as heavy rain or snow, which can interfere with the satellite signal.

Additionally, satellite internet can be slower than traditional broadband due to the distance the signal must travel. Despite these limitations, satellite internet remains a valuable technology for providing internet access to remote and hard to reach areas.

For more such questions on technology, click on:

https://brainly.com/question/7788080

#SPJ11

Other Questions
Which of these answer choices best describes the overall effects that would occur in an animal that consumes this plant? (Please help)-5 - (-5/3) There are 8 fish tanks in the pet shop. They justreceived an order of 216 goldfish. The owner of thepet shop wants each tank to have the same numberof fish. How many goldfish will each tank havein it? Yo shawty pls help you are a real one fr if you do Read this sentence. The FDA currently regulates nanotechnology on the basis of size.How do you know this sentence contains objective language?The writer has a strong opinion about what nanotechnology can do.The writer believes that the size of nanotechnology is important.The reader assumes that the FDA regulates nanotechnology.The reader can verify that the FDA regulates nanotechnology. The location of the famous siege fought by early Greek heroes was What is provided to the muscles during exercise?A. Oxygen and carbon dioxideB. Glucose and carbon dioxideC. Oxygen and glucoseD. Water and glucose You are setting up a scholarship fund for your favorite university by making monthly deposits into a savings account earning 8.28\% APR compounded monthly. Your first deposit is today, and the last is in 8 years. You expect the perpetual endowment will finance student scholarships of $4,250 per year, with the first scholarship awarded exactly one year after the final deposit is made. The principal in the account will never be drawn-down (it too earns 8.28% compounded monthly). According to this scenario, approximately how much must you deposit each month? Round your answer to two decimal places. Use any method to multiply (-14ab)(a + 3b - 4c). Find solutions for your homework Find solutions for your homework businessfinancefinance questions and answersdr. stein has just invested $10,000 for his son (age 7). the money will be used for his son's education 10 years from now. he calculates that he will need $25,940 for his son's education by the time the boy goes to school. what rate of return will dr. stein need to achieve this goal? select one: 9% 7% 8% 10% 11% 2% Question: Dr. Stein Has Just Invested $10,000 For His Son (Age 7). The Money Will Be Used For His Son's Education 10 Years From Now. He Calculates That He Will Need $25,940 For His Son's Education By The Time The Boy Goes To School. What Rate Of Return Will Dr. Stein Need To Achieve This Goal? Select One: 9% 7% 8% 10% 11% 2% Dr. Stein has just invested $10,000 for his son (age 7). The money will be used for his son's education 10 years from now. He calculates that he will need $25,940 for his son's education by the time the boy goes to school. What rate of return will Dr. Stein need to achieve this goal? Select one: 9% 7% 8% 10% 11% 2% WHAT IF? A locus that affects susceptibility to a degenerative brain disease has two alleles, V and v. In a population, 16 people have genotype V V, 92 have genotype V v , and 12 have genotype v v . Is this population evolving? Explain. with speech recognition, it is possible to issue commands and search for information by speaking into your mobile device. C&a+sold+30%+of+the+5000+items+that+it+carried+last+week. +there+were+500+items+for+which+some+demand+was+not+satisfied. +what+is+the+in-stock+probability+for+last+week?. Blonde or Black Answer pleasee ok so if Jill and Scott went running . jill ran 9/10 and of a mile in 1/6 of an hour . Scott ran 7/10 of a mile in 2/15 of an hour , whats both of their unite rate during the run ? your sister who is living at home with your parents has written to confide in you that she is going to elope with the man she wants to marry but whom your parent has not approve of .write to her advising her against her plan Why did Tom go to the graveyard? a principle that creates a contract out of fairness and justice, even though the contract elements are not present is called: group of answer choices perfect tender. mailbox rule. utilitarian. quasi contract. Concrete poetry is poetry that visually conveys meaning. It uses graphic arrangement of letters, words, or symbols on the page to create meaning. It is also known as shape poetry or visual poetry. The words form a picture for the reader to see and read. The shape itself does not create meaning. However, it adds to the meaning of the poem. Poets also believe that the space within the letters as created by shape poetry add to the meaning. Look at the following shape poem. The arrangement of letters and the space between them help the reader see the effect of wind on the poet.Wind Pushes me AwayFrom My selfWind S c a t t e r sMy thoughtsHow does the organizational structure of the passage support the author's purpose?A. It shows how visual and concrete poetry are different.B. It lists various subgroups of the topic it introduces.C. It shows how concrete poetry developed over time.D. It uses an example to make the concept clearer. what case tested the court's commitment to protecting symbolic speech of a highly unpopular nature by asking it to evaluate a man's conviction under state law for burning an american flag?