A technician installs a new touch screen on a laptop. Directly touching on an on-screen button doesn't depress or activate the button, but touching near the button does.
Which of the following actions will correct the misalignment?
Update the touchscreen display driver.
Lower the screen resolution.
Disable all mouse or touchpad devices.
Calibrate the touchscreen.

Answers

Answer 1

Calibrate the touchscreen.

Calibrate the touchscreen procedure will correct the misalignment.

What is a Touchscreen?

A touch screen is a type of display that enables users to interact with computers by using their finger or a stylus. They can be used in place of a mouse or keyboard to navigate a GUI (graphical user interface).

Touch screens can be found in a variety of devices, including computer and laptop displays, smartphones, tablets, cash registers, and information kiosks. Instead of using touch-sensitive input, some touch screens use a grid of infrared beams to detect the presence of a finger.

Today, all PCs support touch screens, and the majority of laptop computers allow users running Microsoft Windows 10 to use a touch screen.

To know more about Touchscreen, visit: https://brainly.com/question/28039940

#SPJ4


Related Questions

What app can I use to buy now and pay later?

Answers

Buy-now, pay-later apps can let you purchase items today and pay for them in installments.Best for user experience: Quadpay.

The word "application" is abbreviated "app," and it refers to a particular kind of software that may be downloaded and used on a computer, tablet, smartphone, or other electronic device. A mobile application or a piece of software that is installed and utilised on a computer are the two terms that are most frequently used to describe an app. The majority of programmes do a single, limited task. Due to a number of factors, such as the following, apps can be particularly crucial to business owners and organisations.

can assist company owners in rapidly deploying software that improves the performance of the firm

compared to other types of software, are more cost-effective.

able to widen a company's market

able to boost a company's productivity

learn more about apps here:

https://brainly.com/question/11070666

#SPJ4

Define Stop Motion OR Rotoscoping
Explain how this kind of animation is made

Answers

Answer:

Stop motion is an animated filmmaking technique in which objects are physically manipulated in small increments between individually photographed frames so that they will appear to exhibit independent motion or change when the series of frames is played back.

A level designer would create which of the following features of a video game?

a. vehicle choices for a racing theme

b. location choices for a hunting theme

c. artillery choices for a war theme

d. team choices for a sports theme

Answers

Answer:

b. location choices for a hunting theme

Explanation:

A level game designer is a type of game developer that develops a particular level of a game that usually includes location of items, map features, etc.

Therefore, a level designer would create location choices for a hunting theme features of a video game.

Who Find the exact web server that hosted the website by looking in a huge database of internet addresses

Answers

Answer:

The Internet service provider (ISP)

Explanation:

The internet service provider provides individuals and other companies access to the internet and other web services. The internet service provider looks through a huge database of internet addresses to find the exact web server that a website is hosted on when a query is sent.

use a command to output the number of lines, words and file size of the file. how many lines are in the file according to this output?

Answers

To output the number of lines, words, and file size of a file, you can use the `wc` command in Unix/Linux systems. Assuming you're referring to a file named "example.txt," you can run the following command:

```shell

wc example.txt

```

The output will look something like this:

```

3  10  52 example.txt

```

In this output, the first value represents the number of lines, the second value represents the number of words, and the third value represents the file size in bytes.

To determine the number of lines in the file according to this output, you would look at the first value. In the example output above, the number of lines would be 3.

Learn more about linux here:

https://brainly.com/question/32144575

#SPJ11

what do u mean by software​

Answers

Answer:

Software comprises the entire set of programs, procedures, and routines associated with the operation of a computer system. The term was coined to differentiate these instructions from hardware—i.e., the physical components of a computer system.

How many bits would be needed to count all of the students in class today?

10 students in the class

Answers

Answer:

If you have 12 students in class you will need 4 bits.

2. Xamarin.Forms is a UI toolkit to develop the application. A. TRUE B. FALSE C. Can be true or false D. Can not say

Answers

The statement "Xamarin.Forms is a UI toolkit to develop the application" is true because Xamarin.Forms is indeed a UI toolkit used for developing applications. Option a is correct.

Xamarin.Forms is a cross-platform UI toolkit provided by Microsoft that allows developers to create user interfaces for mobile, desktop, and web applications using a single codebase. It provides a set of controls and layouts that can be used to create visually appealing and responsive user interfaces across different platforms, including iOS, Android, and Windows.

With Xamarin.Forms, developers can write their UI code once and deploy it to multiple platforms, reducing the effort and time required to develop and maintain applications for different operating systems.

Option a is correct.

Learn more about developers https://brainly.com/question/19837091

#SPJ11

Exam Instructions
Question 6 of 20:
Select the best answer for the question.
6. Which of the following would most likely indicate the sequence in which milk
travels through a production plant to each stage of a cheese manufacturing
process?
OA. A single-line diagram
OB. A piping schedule
OC. Manufacturer's drawings
OD. A process schedule
Mark for review (Will be highlighted on the review pago)

Answers

A diagram which indicates the sequence in which milk travels through a production plant to each stage of a cheese manufacturing process is: D. A process schedule

What is a process schedule?

A process schedule can be defined as a type of diagram (schematic) which is designed and developed to illustrate the various processes and stages (steps) that are associated with manufacturing of a particular product.

In this context, a process schedule is a diagram which would most likely indicate the sequence in which milk travels through a production plant to each stage of a cheese manufacturing process.

Read more on cheese manufacturing here: https://brainly.com/question/21148228

#SPJ1

what is the answer to the image​

what is the answer to the image

Answers

your answer is

b

you’re welcome

difine the term pigment​

Answers

Explanation:

pigment is material which give color to skin

Answer:

a substance occurring in plant or animal tissue and producing a characteristic colour, such as chlorophyll in green plants and haemoglobin in red blood. any substance used to impart colour.

Explanation:

Which of the following is a location or selection of text which can be named to mark and navigate to different locations?

Endnotes

Footnotes

Bookmarks

Citations

Answers

Answer:

bookmarks because it is able to navigate diffrent locations

Explanation:

How do I convert BCD to denary and denary to BCD? (For Both positive and Negative integer of denary)

Answers

Answer:

BCD is very similar to regular binary code. Decimal digits are represented as binary like so:

0 = 0000

1 = 0001

2 = 0010

3 = 0011

etc...

9 = 1001

However, in BCD the structure of decimal code is maintained, so e.g., the number 123 would be encoded digit-by-digit as:

0001 0010 0011

whereas in pure binary it would be encoded as

01111011

So you immediately see that BCD is not so efficient. That's why it is not used very often. Encoding and decoding is very easy as you take the same approach as with pure binary, but perform it per digit (ie., per group of 4 bits).

Which technology might support the advancement of Moore's law into the next decade? a. 3D chips b. Computer Graphical Interfaces c. Graphical User Interface d. Quantum computing

Answers

d. Quantum computing is the technology that may support the advancement of Moore's law in the next decade.

Moore's law is an empirical rule that claims that the number of transistors that can be inserted on a microchip doubles every two years, resulting in the constant decrease in the price of computing power for more than half a century. Quantum computing is the technology that may support the advancement of Moore's law in the next decade. Quantum computing is the technology that may support the advancement of Moore's law in the next decade.

Moore's law is an empirical rule that claims that the number of transistors that can be inserted on a microchip doubles every two years, resulting in the constant decrease in the price of computing power for more than half a century. Quantum computing is the technology that may support the advancement of Moore's law in the next decade.

Learn more about microchip :

https://brainly.com/question/29235982

#SPJ11

1.what are the ways on how to maintain you hand tools properly?

2.why is it important to have proper maintenance of hand tools?


3.why do you think 5s is important in the workplace?


help:(

Answers

There are several ways to maintain your hand tools properly. Store them in a safe and organized manner, and regularly inspect them for any damage or wear and tear. Cleaning your hand tools after use helps prevent rust and corrosion, which can lead to deterioration and eventually make them unusable.

Proper maintenance of hand tools is important for several reasons. It prolongs their lifespan and ensures they function properly, which saves you time and money in the long run. Explanation-wise, when hand tools are well-maintained, they are less likely to break or malfunction, which can cause delays or accidents in the workplace. Additionally, having to constantly replace broken or worn-out tools can be costly and time-consuming, so proper maintenance is a smart investment.

5S is important in the workplace for several reasons. It promotes safety, efficiency, and productivity by organizing the workplace and reducing waste. 5S involves five steps: sorting, straightening, shining, standardizing, and sustaining. By sorting through materials and equipment and getting rid of anything that is not necessary, the workplace becomes safer and more efficient. Straightening involves organizing everything in a logical and accessible manner, which makes it easier to find and use tools. Shining refers to keeping everything clean and in good condition, which helps prevent accidents and prolongs the lifespan of equipment.

To know more about inspect visit:-

https://brainly.com/question/30727643

#SPJ11

which of the following list is a point-of-sale (pos) station output device?

Answers

The output device commonly used in a Point of Sale (POS) station is a receipt printer.



A receipt printer is responsible for generating printed receipts for customers after a transaction is completed. It connects to the POS system and provides a physical record of the transaction details, including the purchased items, prices, payment method, and any other relevant information. Receipt printers can use various printing technologies, such as thermal printing or impact printing, and may offer additional features like barcode printing or logo customization.



learn more about station here :



https://brainly.com/question/31652938



#SPJ11

1)Which tool can you use to find duplicates in Excel?
Select an answer:
a. Flash Fill
b. VLOOKUP
c. Conditional Formatting
d. Concatenation
2)What does Power Query use to change to what it determines is the appropriate data type?
Select an answer:
a.the headers
b. the first real row of data
c. data in the formula bar
3)Combining the definitions of three words describes a data analyst. What are the three words?
Select an answer:
a. analysis, analyze, and technology
b. data, programs, and analysis
c. analyze, data, and programs
d. data, analysis, and analyze

Answers

The tool that you can use to find duplicates in Excel is c. Conditional Formatting

b. the first real row of datac. analyze, data, and programs

What is Conditional Formatting?

Excel makes use of Conditional Formatting as a means to identify duplicate records. Users can utilize this feature to identify cells or ranges that satisfy specific criteria, like possessing repetitive values, by highlighting them.

Using conditional formatting rules makes it effortless to spot repeated values and set them apart visually from the other information. This function enables users to swiftly identify and handle identical records within their Excel worksheets, useful for activities like data examination and sanitation.

Read more about Conditional Formatting here:

https://brainly.com/question/30652094

#SPJ4

Please please help ASAP it’s timed

Please please help ASAP its timed

Answers

Answer:By pressing the Control key and the “C” key

Explanation:

Hopefully it could help you

[4] b.A sequential data file called "Record.txt" has stored data under the field heading RollNo., Name, Gender, English, Nepali Maths and Computer. Write a program to display all the information of male
students whose obtained marks in computer is more than 90.​

Answers

Answer:

Explanation:

Assuming that the data in the "Record.txt" file is stored in the following format:

RollNo. Name Gender English Nepali Maths Computer

101 John M 80 85 90 95

102 Jane F 85 80 75 92

103 David M 90 95 85 89

104 Mary F 75 90 80 94

105 Peter M 95 85 90 98

Here is a Python program that reads the data from the file and displays the information of male students whose obtained marks in computer is more than 90:

# Open the Record.txt file for reading

with open("Record.txt", "r") as file:

   # Read the file line by line

   for line in file:

       # Split the line into fields

       fields = line.strip().split()

       # Check if the student is male and has obtained more than 90 marks in Computer

       if fields[2] == "M" and int(fields[6]) > 90:

           # Display the student's information

           print("RollNo.:", fields[0])

           print("Name:", fields[1])

           print("Gender:", fields[2])

           print("English:", fields[3])

           print("Nepali:", fields[4])

           print("Maths:", fields[5])

           print("Computer:", fields[6])

           print()

This program reads each line of the "Record.txt" file and splits it into fields. It then checks if the student is male and has obtained more than 90 marks in Computer. If so, it displays the student's information on the console.

The program to display all the information of male students whose obtained marks in computer is more than 90. is in the explanation part.

What is programming?

Computer programming is the process of performing specific computations, typically through the design and development of executable computer programmes.

Assuming that the data in the "Record.txt" file is structured in a specific format and separated by commas, here is an example Python programme that reads the data from the file and displays information about male students who received more than 90 points in Computer:

# Open the file for reading

with open('Record.txt', 'r') as f:

   # Read each line of the file

   for line in f:

       

       # Split the line by commas

       data = line.split(',')

       # Check if the student is male and has obtained more than 90 marks in Computer

       if data[2] == 'M' and int(data[6]) > 90:

           # Display the information of the student

           print(f"Roll No.: {data[0]}\nName: {data[1]}\nGender: {data[2]}\nEnglish: {data[3]}\nNepali: {data[4]}\nMaths: {data[5]}\nComputer: {data[6]}\n")

Thus, in this program, we use the open() function to open the "Record.txt" file for reading.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ2

VGV Corp. releases a print ad in which readers are provided a phone number. Readers can call this number to ask queries related to the product. This type of a posttest is known as a(n) ______.

Answers

Hence, based on the actions of VGV Corp, we can see that this is a call to action.

What is a Call to Action?

This has to do with the marketing strategy that is used to get an instant response from customers and get them to buy its products.

Hence, the action of providing a number for easy reach to make queries that are related to the product by VGV Corporation is simply known as a call to action.

Read more about call to action here:

https://brainly.com/question/23142539

describe at least five ways in which Information Technology can help students studying subject other than computing ​

Answers

Answer:

‘Computer Science’ and ‘information technology’ are completely different subjects. Information Technology (IT) is-

(i) the study,

(ii) design,

(iii) development,

(iv) implementation, and

(v) support or management

of computer-based information systems, particularly software applications and computer hardware.

Information Technology (IT) deals with the use of electronic computers and computer software to-

(i) convert,

(ii) store,

(iii) protect,

(iv) process,

(v) transmit, and

(vi) securely retrieve information.

Shortly, information technology (IT) itself means learning to use technology in business or in studies of some subject matter using technology.

Hence, IT could help students studying subjects other than computing with the above mentioned points considered.

What are the motivations of hackers?

Answers

Revenge is a frequent motivation for hacking, with financial benefit or disruption being a byproduct of their anger.

This is especially true when dealing with disgruntled employees because their intimate information of their modern or former enterprise gives them a leg up in opposition to protection systems.

What are the types of hackers and motivation?

White hat hackers probe cybersecurity weaknesses to assist groups improve more desirable security; black hat hackers are motivated through malicious intent; and Gray hat hackers operate in the nebulous place in between — they're now not malicious, but they're no longer constantly ethical either.

What motivates hackers to do cyber crime?

For instance, all cybercrimes linked to ransomware, phishing, on-line economic crimes, on line fraud, password cracking, malware, hacking, sextortion are generally motivated via economic attain but for some of them motivation can be due to pranks, activism, cyber theft, espionage (e.g. malware).

Learn more about motivations of hackers here;

brainly.com/question/24108528

#SPJ4

name two different colors used in the python program file window.name the type of program content that has each color ......

whoever answer this correct i will rate them 5 stars and a like .....
please urgent ​

Answers

In the Python program window, black is used for code and syntax, while white is used as the background.

How is this so?

1. Black  -  The color black is typically used for the program's code and syntax. It represents the actual Python code and includes keywords, functions, variables, and other programming constructs.

2. White  -  The color white is commonly used as the background color in the program window. It provides a clean and neutral backdrop for the code and makes it easier to read and understand.

Learn more about python program at:

https://brainly.com/question/26497128

#SPJ1

what are each pieces named on the microscope​

Answers

Head/Body houses the optical parts in the upper part of the microscope

Base of the microscope supports the microscope and houses the illuminator

Arm connects to the base and supports the microscope head. It is also used to carry the microscope.

Eyepiece or Ocular is what you look through at the top of the microscope. Typically, standard eyepieces have a magnifying power of 10x. Optional eyepieces of varying powers are available, typically from 5x-30x.

Eyepiece Tube holds the eyepieces in place above the objective lens. Binocular microscope heads typically incorporate a diopter adjustment ring that allows for the possible inconsistencies of our eyesight in one or both eyes. The monocular (single eye usage) microscope does not need a diopter. Binocular microscopes also swivel (Interpupillary Adjustment) to allow for different distances between the eyes of different individuals.

Objective Lenses are the primary optical lenses on a microscope. They range from 4x-100x and typically, include, three, four or five on lens on most microscopes. Objectives can be forward or rear-facing.

Nosepiece houses the objectives. The objectives are exposed and are mounted on a rotating turret so that different objectives can be conveniently selected. Standard objectives include 4x, 10x, 40x and 100x although different power objectives are available.

Coarse and Fine Focus knobs are used to focus the microscope. Increasingly, they are coaxial knobs - that is to say they are built on the same axis with the fine focus knob on the outside. Coaxial focus knobs are more convenient since the viewer does not have to grope for a different knob.

Stage is where the specimen to be viewed is placed. A mechanical stage is used when working at higher magnifications where delicate movements of the specimen slide are required.

Stage Clips are used when there is no mechanical stage. The viewer is required to move the slide manually to view different sections of the specimen.

Aperture is the hole in the stage through which the base (transmitted) light reaches the stage.

Illuminator is the light source for a microscope, typically located in the base of the microscope. Most light microscopes use low voltage, halogen bulbs with continuous variable lighting control located within the base.

Condenser is used to collect and focus the light from the illuminator on to the specimen. It is located under the stage often in conjunction with an iris diaphragm.

Iris Diaphragm controls the amount of light reaching the specimen. It is located above the condenser and below the stage. Most high quality microscopes include an Abbe condenser with an iris diaphragm. Combined, they control both the focus and quantity of light applied to the specimen.

Condenser Focus Knob moves the condenser up or down to control the lighting focus on the specimen.

three-tier architecture has the following three tiers: select one: a. presentation tier, control tier and data tier b. presentation tier, application tier and data tier c. application tier, control tier and data tier d. presentation tier, application tier and network tier

Answers

The three-tier architecture has option b. presentation tier, application tier, and data tier.

What is the three-tier architecture?

Presentation tie: This level is dependable for dealing with the client interaction and showing data to the client. It incorporates components such as web browsers, portable apps, or desktop applications that give the client interface.

Application level: This level contains the application rationale and preparing. It handles assignments such as information approval, commerce rules, and application workflows.

Learn more about three-tier architecture from

https://brainly.com/question/12627837

#SPJ4

The value that excel displays for a cell is always the precise value you enter in the spreadsheet or the precise value resulting from a formula in that cell that is stored by the software.a. Trueb. False

Answers

This claim is untrue since Excel should always show the exact number that you enter into the column or the exact value that results from a calculation that is placed in that cell.

What are a few illustrations of spreadsheet applications?

A type of computer application called a technology program may be used to organise, store, and analyse data in a tabular format. The application can imitate digital versions of paper accounting spreadsheets. They could also have several connected sheets with content is shown text, statistics, or graphics.

Which spreadsheet programme is the most straightforward?

LibreOffice Arithmetic or Apache Avian influenza viruses Calc offline may indeed be adequate if you simply need a basic computer for straightforward administrative tasks, such as calculations. if you desire more complex features.

To know more about Spreadsheet visit:

https://brainly.com/question/8284022

#SPJ4

Bare metal virtualization is best for desktop virtualization. TRUE/FALSE

Answers

Answer:

False - It would be Server Virtualization.

Explanation:

Hypervisors translate requests between the physical and virtual resources, making virtualization possible. When a hypervisor is installed directly on the hardware of a physical machine, between the hardware and the operating system (OS), it is called a bare metal hypervisor

Example - Installing a VM Hypervisor just to run Windows 11 is not a reason to run it.

FALSE.

Bare metal virtualization is not the best choice for desktop virtualization. Bare metal virtualization, also known as Type-1 hypervisor, is a type of virtualization that runs directly on the hardware, without the need for a host operating system. This approach is well-suited for server virtualization, where performance and security are critical.

On the other hand, desktop virtualization typically benefits from Type-2 hypervisors, which run on a host operating system, such as Windows or macOS. Type-2 hypervisors are more flexible and easier to manage, making them a better choice for desktop environments. Users can continue to use their preferred operating system while running virtual machines with different operating systems or configurations.

In summary, although bare metal virtualization offers performance and security advantages, it is not the best choice for desktop virtualization due to its lack of flexibility and user-friendliness. Type-2 hypervisors are more appropriate for this purpose.

To know more about virtualization visit :

https://brainly.com/question/31257788

#SPJ11

Give three general features of application software

Answers

Answer:

Three general features of application software are:

1. User Interface: Application software has a user interface that allows users to interact with the program. This interface can include menus, icons, buttons, and other graphical elements that make it easy for users to navigate the software and access its features.

2. Functionality: Application software is designed to perform specific tasks or functions. Examples of application software include word processors, spreadsheet programs, graphic design software, and web browsers. Each of these programs has a specific set of features and functions that are tailored to the needs of its users.

3. Customization: Application software can often be customized to meet the specific needs of individual users or organizations. For example, a spreadsheet program can be customized to include specific formulas and calculations that are unique to a particular business or industry. Customization allows users to tailor the software to their specific needs, making it more efficient and effective for their particular use case.

By buying in bulk, Deborah managed to have 6,000 CDs manufactured for $9,000. What was the cost per unit for manufacturing?

Answers

Answer: It would be $1.50 per unit

Explanation

John is now responsible for system security at a small bookkeeping firm. He wants to ensure that he implements good fundamental security. What is the

Answers

To implement good fundamental security practices at the bookkeeping firm, John should consider the following:
Strong Passwords: Encourage employees to use unique and complex passwords for their accounts, and regularly update them. Multi-factor Authentication

Employee Training: Educate employees on security best practices, such as identifying phishing emails, avoiding suspicious downloads, and being cautious about sharing sensitive Access Control: Implement strict access control measures to limit employee access to sensitive data and systems based on the principle of least privilege.

Regular Security Audits: Conduct regular security audits to identify any vulnerabilities and address them promptly.
By following these fundamental security practices, John can help ensure the safety of the bookkeeping firm's systems and data.

To know more about fundamental security visit :-

https://brainly.com/question/31718409

#SPJ11

Other Questions
(5ytohte power 2+2y+7)-(3yto the power two +y+5) find the product with steps g+60=6help please this doesnt make sens to me.???? Which one of the quotes below is an example of SITUATIONAL IRONY?Required to answer. Single choice.(1 Point)A. My feet were running on their own. I tried to protect myself from the blows by hiding behind others.B. [The camp] had an iron gate with the overhead inscriptionWork makes you free.C. Comrades, you are now in the concentration camp Auschwitz. Ahead of you lies a long road paved with suffering.D. After the roll call, the prisoners from all the blocks dispersed, looking for friends, relatives, or neighbors among the arrivals. Which of the following statements is true of the system below?-2x 3y =-1x + = 0The solution to this system is (3,-2).O The solution to this system is (2,-1).This system has no solutions.O This system has infinitely many solutions.DONE Federal authorities say a Marine Reservist charged in last year's riots at the U.S. Capitol also conspired with a nurse to steal, forge and sell hundreds of coronavirus vaccination cards. Properties of the cell membrane ____________are proteins that bind to the core promoter near the start point for transcription and are involved in the recruitment of RNA polymerase II. When a NACL spring board procedure is performed to return from the NACL address space to the running program, the NACL springboard procedure will return to which of the following locations? a. The next 64-byte aligned instruction after the trampoline routine that jumped into the NACL address space. b. The next 32-byte aligned instruction after the trampoline routine that jumped into the NACL address space. c. An arbitrary memory address provided by the binary. d. The next instruction after the trampoline routine that jumped into the NACL address space. What values can you derive from dancing the ballroom dance explain? Three important differences from the novel and movie Big Fish Subtractxyz-4xy+5 from 5xyz+xy+3yz-4 What is the thermal speed of hydrogen (H2) molecules at 800 K?Please give your answer in km/s Select the correct answer. Steps for writing an action plan include: A. Making sure the goal is extremely unrealistic B. Specifying how you will track your progress C. Writing the pros/cons of setting the goal D. Not telling anyone about your goal which excerpt from tom sawyer allows the reader to infer the time of year? In the image is the blood hypertonic, isotonic, or hypotonic comparedto the matrix of the brain? In a gambling game, you roll 2 die and if you toss 2 sixes, you win $100, otherwise you lose $5.a. What is the chance you win?b. What is the expected value of the game? Can someone help with my English essay: write an informative essay on Greek mythical character your essay will use reasearch to summarize the plot of the myth and explain the mythical characters cultural significance snap:jacob.savege What color scheme can an artist use to convey a joyful mood?A: complementaryB: GrayscaleC: MonochromaticD: Polychromatic solve the equation r 18.6 = 21.9 for x. Silicon Valley Killer robot caseFrom the Randy samuels perspective? Why is my team's character not responsible for the death of Bart Matthews? 2. Suggest 2 possible actions that my character could have taken to prevent this tragedy:a) Explain how each of these actions might have changed the final outcome.b) Are there any sideeffects from implementing the 2 suggested actions?3. Which character do you think is the most guilty? Only pick one character.a) Give at least 2 reasons to justify your choice.