according to kohlberg, right corresponds to seeing one's own needs met, taking responsibility for oneself, and allowing others to do the same in which stage of moral development?

Answers

Answer 1

Kohlberg associates the notion of right with meeting one's own needs, being responsible for oneself, and enabling others to do so in the stage of moral development called Stage 2: Individualism and Exchange.

In Stage 2 of Kohlberg's theory of moral development, individuals see morality as a matter of following rules to satisfy their own interests, but they also recognize the importance of the social exchange. This stage is focused on reciprocity and satisfying individual needs, with a strong emphasis on self-interest. Individuals who reach this stage prioritize their own needs while acknowledging the importance of meeting the needs of others, as long as it benefits them in some way. They recognize that social cooperation can be mutually beneficial and that fairness is essential to maintaining social relationships.

learn more about moral development here:

https://brainly.com/question/31041935

#SPJ11


Related Questions

Select the correct answer from each drop-down menu.
When you right-click a picture in a word processing program, which actions can you choose to perform on that image?
You can choose to
an image when you right-click the picture in the word processing program. You can also choose to
an image when you right-click the picture in the word processing program.

Answers

When you right-click a picture in a word processing program, the actions that can you choose to perform on that image are as follows:

Rotate.Resize.

What is a Word processing program?

A Word processing program may be characterized as a kind of advanced typing program that permits a user to track records information and then let the user perform a variety of other things with it.

According to the context of this question, you can opt to rotate an image when you right-click the picture with the utilization of a word processing program. Apart from this, you can also opt to resize an image through the same function of a word processing program.

Therefore, when you right-click a picture in a word processing program, the actions that can you choose to perform on that image are rotated and resized.

To learn more about Word processing programs, refer to the link:

https://brainly.com/question/985406

#SPJ1

Your question seems incomplete. The most probable complete question is as follows:

When you right-click a picture in a word processing program, which actions can you choose to perform on that image?

You can choose

RotateViewCompress

You can also choose to

ReviewResizeBookmark

Jess is pot she is running out of space in the section for this item and she decides to put the t

sol the mext shelf over where there is plenty of room. She notices that the cartons contain different

product than the other boxes on the shelf where she places them. Over time, these cartons ou

pushed to the back behind the item that is supposed to be stocked in this location

Answers

The shelf is rearranged by Jess who positions the new boxes in a location with greater room. The fresh cartons are ultimately put to the rear since they contain different things than the previous boxes on the shelf.

Jess is able to make place on the shelf where the item was meant to be stocked by moving the fresh cartons to a location with more room The cartons are gradually shifted behind the item that was initially intended to be put in that spot since they do not contain the same things as the other boxes on the shelf. Here is an illustration of how a shortage of space may frequently result in disorganized or improperly maintained merchandise, which can ultimately lead to confusion for consumers Jess should periodically check the shelf to make sure that the things are being stored in the right spot in order to avoid this from happening She should also confirm that the shelf has adequate room to accommodate all the things that will be put there.

Learn more about location here:

https://brainly.com/question/14643906

#SPJ4

If you want to change a number in a cell, you must delete it first before entering a new number
True
False
This is with Google Sheets.

If you want to change a number in a cell, you must delete it first before entering a new numberTrueFalseThis

Answers

Answer:

true

Explanation:

hope this helps.................

You are writing an algorithm that will subtract a smaller number from a larger
one. What should be the first step in your algorithm?
A. Subtract the smallest number from the largest number.
B. Show the difference between the two numbers.
C. Place the numbers in order from largest to smallest.
D. Find the numbers that are to be used in the math problem.

Answers

Place the numbers in order from largest to smallest. An algorithm is a detailed set of instructions created to carry out a certain activity. Algorithms are a step-by-step representation of how a software will carry out crucial actions.

What is  algorithm?

An algorithm is a step-by-step process that specifies a list of instructions to be carried out in a specific order in order to get the intended result. An algorithm can be implemented in more than one programming language because algorithms are typically constructed independent of the underlying languages.

The three basic phases of algorithm development are data input, data processing, and output of results. The particular order cannot be altered.

An algorithm is a detailed set of instructions created to carry out a certain activity. Algorithms are a step-by-step representation of how a software will carry out crucial actions.

To learn more about algorithm refer to:

brainly.com/question/11302120

#SPJ1

Answer:

D. Find the numbers that are to be used in the math problem.

Explanation:

yes

What is generally included in an llc's operating agreement? (check all that apply. )

Answers

An LLC operating agreement typically contains a variety of provisions that govern the LLC's internal operations. This agreement is a document that outlines how the limited liability company (LLC) will be run.

In essence, it is an LLC's internal governance document and the most crucial piece of the company's legal structure. This document generally includes the following:

1. Owners' names, roles, and responsibilities.

2. Profit distribution and equity splits.

3. Duration of the company.

4. Tax operating of the company.

In conclusion, an LLC's operating agreement outlines the internal governance of the company and contains important information about the company's operations. It is a crucial legal document that should be drafted and reviewed by an experienced attorney.

To know more about operating visit:

https://brainly.com/question/11596110

#SPJ11

advanced computer solutions, incorporated has two main services: (1) time on a timeshared computer system and (2) proprietary computer programs. the operation department (op) provides computer time and the programming department (p) writes programs. the percentage of each service used by each department for a typical period is: supplied user op p op --- 35% p 25% --- sold to customers 75% 65% in a typical period, the operation department (op) spends $6,400 and the programming department (p) spends $4,400. under the step method (op first), what is the cost of the computer time and the computer programs for sale? time programs a. $ 6,400 $ 4,400 b. $ 4,800 $ 6,000 c. $ 1,600 $ 9,200 d. $ 4,160 $ 6,640

Answers

Answer:

Explanation:

Using the step method, we can determine the cost of computer time and computer programs for sale as follows:

   Calculate the total cost of each department's operations:

   Operation department (OP): $6,400

   Programming department (P): $4,400

   Allocate the costs of each department's operations based on the percentage of services used:

   OP supplies 35% of time and 75% of programs, so allocate 35% of OP's cost to time and 75% of OP's cost to programs:

       Time: $6,400 x 35% = $2,240

       Programs: $6,400 x 75% = $4,800

   P supplies 25% of time and 65% of programs, so allocate 25% of P's cost to time and 65% of P's cost to programs:

       Time: $4,400 x 25% = $1,100

       Programs: $4,400 x 65% = $2,860

   Add up the allocated costs for each service:

   Time: $2,240 + $1,100 = $3,340

   Programs: $4,800 + $2,860 = $7,660

Therefore, the cost of computer time and computer programs for sale is $3,340 and $7,660, respectively.

Answer: (a) $6,400 for time and $4,400 for programs are the total costs of each department's operations, not the allocated costs of each service.

Why does the evolving technology help the entrants more than the incumbents? 1) Because the incumbents do not have the means to use the new technology 2) Because the entrants can create technology faster than incumbents 3) Because incumbents do not like new technology and neither do their customers 04) Because the entrants can use the technology to target customers that do not currently have solutions 5) Because the incumbents already have a strong customer base and do not see the point of adding new technology Which one of the following factors contributes to enterprises becoming successful in the long run? 1) By leveraging the technological core and their business model. 2) The ability to understand the consumer better and create products that solve their consumers' job. 3) Plan and forecast based on correlated data. 4) By keeping all of the elements of servicing the customer under their control. Which statement best describes the "Theory of Disruptive Innovation"? 1) Disruptive Innovation is the process by which technology eliminates friction and improves efficiency within various e-commerce, retail, and commercial banking transactions. 2) Disruptive Innovation is the process by which technology enables entrants to launch inexpensive and more accessible products and services that gradually replace those of established competitors. 3) Disruptive Innovation is the process by which technology generates data for. and executes instructions from, Al-enabled systems within retail and manufacturing industries. Disruptive Innovation is the process by which technology enables entrants to launch inexpensive and more accessible products that work collectively with today's comparable market offerings. 5) None of the above. 4)

Answers

Evolution of technology helps the entrants more than the incumbents because entrants can use technology to target customers that do not currently have solutions. Entrants can create technology faster than incumbents, and they are not limited by legacy systems that incumbents are stuck with.

They have the agility to innovate and change direction as necessary to keep pace with technological advances. The incumbents are at a disadvantage because they have already established customer bases and a strong reputation, and they are unlikely to be willing to risk losing that by adopting new technology that may not be as reliable as what they already have. So, the evolving technology helps the entrants to compete with the incumbents.



One of the factors that contributes to enterprises becoming successful in the long run is the ability to understand the consumer better and create products that solve their consumers' job. By leveraging the technological core and their business model, businesses can ensure that their products are meeting the needs of their customers. Plan and forecast based on correlated data is another important factor in the success of enterprises.

Learn more about Evolution of technology: https://brainly.com/question/7788080

#SPJ11

Assignment: Blues Progression
Blues is a sub-genre of jazz that follows some specific guidelines: specifically, the Blues scale and the Blues chord progression.
In this assignment, you’ll write out a 12-bar Blues chord progression. This assignment is a MuseScore assignment. Do not turn in this document for grading.

Directions:

1. Create a new document in MuseScore
a. For the title, write “MuseScore Assignment: Blues”.
b. For the composer, write your name., then click "next".
c. Under "general", choose “Grand Staff”, then click “Next”.
d. Choose G major for your key signature (1 sharp), then click next.
e. Choose “Piano” (in the Keyboards section) for your instrument. (This step may or may not show for you. It's ok either way!)
f. Choose 4/4 for your Time Signature and 12 measures for number of measure.
g. Click “Finish”.

2. In the Bass Clef, write out a 12-bar Blues Chord Progression.
a. Use whole notes for your chords
b. I – I – I – I – IV – IV – I – I – V7 – IV – I – V7

Save your assignment (with your name!) and submit it to the Composition: Blues Progression Dropbox basket. Turn in the MuseScore file only.

Answers

Explanation:

I can provide you with the 12-bar Blues chord progression as you requested:

In the key of G major:

I (G) – I (G) – I (G) – I (G)

IV (C) – IV (C) – I (G) – I (G)

V7 (D7) – IV (C) – I (G) – V7 (D7)

The Roman numerals in parentheses represent the chords to play in each measure, and the chord names outside the parentheses indicate the actual chords to play in the key of G major.

Can someone please help with this thanks luvs c

Can someone please help with this thanks luvs c

Answers

Answer:

HELLO, be nice spread love... DO NOT HATE ON OTHERS

░░░░░▐▀█▀▌░░░░▀█▄░░░

░░░░░▐█▄█▌░░░░░░▀█▄░░

░░░░░░▀▄▀░░░▄▄▄▄▄▀▀░░

░░░░▄▄▄██▀▀▀▀░░░░░░

░░░█▀▄▄▄█░▀▀░░

░░░▌░▄▄▄▐▌▀▀▀░░ This is Bob

▄░▐░░░▄▄░█░▀▀ ░░

▀█▌░░░▄░▀█▀░▀ ░░ Copy and paste him so he can take over brainly.

░░░░░░░▀███▀█░▄░░

░░░░░░▐▌▀▄▀▄▀▐▄░░

░░░░░░▐▀░░░░░░▐▌░░

░░░░░░█░░░░░░░░█░

COPY AND PASTE LETS DEFEAT BRAINLY

Explanation:

which kind of blocks is used to hold values​

Answers

Answer:

Variable block.

Explanation:

In Computer programming, a variable can be defined as a placeholder or container for holding a piece of information that can be modified or edited.

Basically, variable stores information which is passed from the location of the method call directly to the method that is called by the program.

For example, they can serve as a model for a function; when used as an input, such as for passing a value to a function and when used as an output, such as for retrieving a value from the same function. Therefore, when you create variables in a function, you can can set the values for their parameters.

For instance, to pass a class to a family of classes use the code;

\\parameter Name as Type (Keywords) = value;

\\procedure XorSwap (var a,b :integer) = "myvalue";

Hence, variable block is used to hold values. Also, it can be used to hold strings in variables, which may be displayed through the computer monitor.

i think it is a or c is it right?

i think it is a or c is it right?

Answers

C
She is emailing her boss that something is wrong.

The ______, or address operator, is a unary operator that returns the address of its operand. a) & b) && c) * d) **

Answers

The correct option is a)  &.The `&` operator is used to obtain the address of a variable.

Explanation:In programming, the & operator is referred to as the address operator. It's a unary operator that returns the memory address of the operand.

It can be used with pointers and non-pointer variables.

The expression &a returns the memory address of the variable a. If a is an int variable, &a will result in an integer pointer to a.

The '&' symbol is used as an address operator.

This is a unary operator that returns the memory address of a variable.

For example, the memory address of variable var can be obtained using the expression '&var'.

The address operator is used to pass a pointer to a function.

If a pointer is passed to a function, the function receives a copy of the pointer, which it can use to manipulate the original variable.

Example:```#include int main() {   int a = 10;   printf("Address of a: %p", &a);   return 0;}```This code will output `Address of a: 0x7fff57d92abc` which is the memory address of variable `a`.

The `&` operator is used to obtain the address of a variable.

To know more about address visit;

brainly.com/question/17339314

#SPJ11

the person or user associated in computer field is called​

Answers

Explanation:

A computer programmer, sometimes called a software developer, a programmer or more recently a coder (especially in more informal contexts), is a person who creates computer software.

Answer:

computer technision because it's the person who fixes and maintenance of the computer and makes sure everything is running ok with it and has no bugs or viruses or spam.

Unsupervised learning is:
a. learning without
computers

b. learning from the
environment

c. learning from teachers d. Problem based
learning

Answers

Answer:

The answer is A, duhhhhhhh

What happened when the disk you inserted is not readable by this computer?

Answers

When the disk you have inserted is not readable by the computer, it means that the computer is unable to access or retrieve any data from the disk.

This can happen due to several reasons. One possibility is that the disk is corrupted or damaged. In such cases, the computer may display an error message stating that the disk is unreadable or cannot be recognized. Another possibility is that the disk format is not supported by the computer's operating system. Different operating systems have different file systems, and if the disk is formatted in a file system that is not compatible with the computer, it won't be readable. Additionally, if the disk is encrypted or password-protected, the computer won't be able to read it without the correct credentials. In conclusion, when the disk you inserted is not readable by the computer, it could be due to disk corruption, incompatible file system, or encryption/ password protection.

To know more about Operating system , Visit:

https://brainly.com/question/29532405

#SPJ11

write down the features of spread sheet package​

Answers

Answer:

Features of Spreadsheet

Microsoft Excel is easy to learn and thus, it does not require any specialised training programme.

MS Excel basically provides an electronic spreadsheet where all the calculations can be done automatically through built in programs

Spreadsheets are required mainly for tabulation of data . It minimizes manual work and provides high degree of accuracy in results

It also provides multiple copies of the spreadsheets

It presents the information in the form of charts and graphics.

Uses

By default, it creates arrangement of data into columns and rows called cells .

The data that is input into the spreadsheet can be either in the form of numbers, strings or formulae.

The inbuilt programs allow you to change the appearance of the spreadsheet, including column width, row height, font colour and colour of the spreadsheet very easily .

You can choose to work with or print a whole spreadsheet or specify a particular area, called a range

a manager has told you she is concerned about her employees writing their passwords for websites, network files, and database resources on sticky notes. your office runs exclusively in a windows environment. which tool could you use to prevent this behavior?

Answers

Answer:

Credential Manager

10) What are some advantages of being able to see an image right after
you've taken it (such as with an instant camera or being able to reven the
image on a digital camera)?

Answers

If you get to see the image right after you take it you can tell if it’s worth it to take more photos or decide if you’re happy with the photo you just took.

3. A file of unknown length needs to be read. The following algorithm is given: students File.open("students.txt") while (studentsFile.readLine() endwhilE Complete the condition in the WHILE loop. print JUTT [1] please help explanation + answer greatly appreciated​

Answers

To read a file named "students.txt" of unknown length, use the following code snippet in Ruby:

The Program

students_file = File.open("students.txt")

students_file.each_line do |line|

 puts "JUTT [1]"

 # Your code here to process each line

end

students_file.close

This code opens the file, iterates over each line, prints "JUTT [1]" for each line, and allows you to process the line within the loop. Finally, the file is closed.

Read more about programs here:

https://brainly.com/question/23275071
#SPJ1

what human-readable data

Answers

Explanation:

what?? there is no question

Answer: A human-readable medium or human-readable format is any encoding of data or information that can be naturally read by humans.

Developers in your company need to interact with AWS from the Command Line Interface. Which security item will you need to provide to the developers

Answers

Developers in your company will need to provide an access key ID and a secret access key to interact with AWS from the Command Line Interface. These keys are used to authenticate the user and authorize access to the necessary AWS resources.

The access key ID is a unique identifier that is used to identify the user or application making the request, while the secret access key is a secret code used to sign requests and verify the authenticity of the user or application.

It is important to keep the access key ID and secret access key secure, as they provide access to your AWS resources. Best practices include restricting access to the keys to only those who need them, rotating the keys periodically, and revoking access to the keys when they are no longer needed.

Learn more about AWS here:

https://brainly.com/question/30176139

#SPJ11

Write a pseudo code to complete the factorial of 5 recursively and print the value on the screen. I’ll mark brianliest

Answers

Answer:

number = int(input('Enter number: '))  

factorial = 1

for i in range(1, number + 1):

   factorial = factorial * i

print(factorial)

You will need to input 5 when you run the code. Or you can add change the "number" to "number = 5"

During a data _____ phase, a database administrator refreshes a data warehouse and replaces incompatible keys with consistent values.

Answers

During a data cleansing phase, a database administrator refreshes a data warehouse and replaces incompatible keys with consistent values.

The data cleansing phase is a crucial part of maintaining a healthy database. This process involves detecting, correcting, and removing errors or inconsistencies from data sets. In this case, the database administrator (DBA) identifies incompatible keys within the data warehouse, which may cause issues during data retrieval or analysis. The DBA then replaces these incompatible keys with consistent values to ensure the data's accuracy and reliability.

Data cleansing is an essential step in managing and maintaining a data warehouse. By refreshing the data and replacing incompatible keys with consistent values, a database administrator ensures the data's accuracy, consistency, and overall quality.

To know more about data cleansing visit:

https://brainly.com/question/5546051

#SPJ11

what is a iteration in program code?​

Answers

Answer:

it's when the code keeps repeating e.g while loop

Explanation:

help pleaseee got 15 points on this

.

Roxy has some raw footage shot on a videotape. She wants to edit this footage. She decides to use the linear editing technique. How should she set up her equipment? Roxy should load the raw footage in the ______ and a blank tape in the ______ first blank: VTR deck, VTP deck, edit controller. second blank is the same thing​

Answers

I belive it is vtr deck

While using a web-based order form, an attacker enters an unusually large value in the Quantity field. The value he or she entered is so large that it exceeds the maximum value supported by the variable type used to store the quantity in the web application. This causes the value of the quantity variable to wrap around to the minimum possible value, which is a negative number. As a result, the web application processes the order as a return instead of a purchase, and the attacker's account is credited with a large sum of money. Which practices would have prevented this exploit

Answers

Answer:

Implementing client side validation

Explanation:

Given that this type of attack is known as Integer Overflow, the best means or practices to prevent this kind of attack is " implementing client-side validation."

This is because implementing client-side validation assists to prevent the validation errors that will arise from the integer overflow thereby resulting in a reduction of the network and server load.

Hence, in this case, the correct answer is "Implementing the client-side validation."

After the data is sent, server-side validation occurs on the server. It is used to validate data before it is saved in a database or used by the application in any other way.

Whereas if data fails validation, a reply is sent to the client with the necessary adjustments.Client-side validation is indeed an initial inspection and a key aspect of good user experience; identifying erroneous data on the client-side allows the user to fix it immediately. When sending data to a server, make sure that almost all essential form controls are completed in the proper format. It's defined as client-side form validation, so it guarantees that the data provided satisfies the requirements specified inside the control buttons.

The final answer is "Implementing client-side and server-side validation".

Learn more:

brainly.com/question/5003091

match each option to the description of the task it accomplishes.
arrange>
shape styles>
size>
insert shapes>
wordart styles

match each option to the description of the task it accomplishes. arrange>shape styles>size>insert

Answers

Answer:

Follows are the solution to the given question:

Explanation:

Please find the attached file of the matching.

Arrange: In shape formatting, the "arrange" is used to provide an arrangement in the positing of the shape on the given slide.

shape styles: In shape formatting, it is used for applying a new design to the shape.

size: In shape formatting, the size is used for modifying the shape.

insert shapes: In shape formatting, the insert shape is used to add a new shape.

Wordart styles: In shape formatting, Wordart is used to provide a text design on the shape.

match each option to the description of the task it accomplishes. arrange>shape styles>size>insert

Why did we decide to send a message as a sequence of two options rather than modifying our devices to represent more options?

Answers

Answer:

Following are the solution to this question:

Explanation:

Please find the complete question in the attachment file.

The binary message is also an XML text SMS, which is used to represent in binary character. It may also flag the binary text as binary, and it can attach the UDH as just the start of its message. In this question, we assume that you can include A and B because there could be no more than 2 choices in such a binary message.

Why did we decide to send a message as a sequence of two options rather than modifying our devices to

We decided to send a message as a sequence of two states (A and B) rather than modifying our devices to represent more states (State C, State D, State E, etc.) primarily for simplicity and efficiency.

Using a binary communication system with just two states is straightforward and easier to implement than introducing more complex modifications for additional states.

Binary communication allows for clear and unambiguous encoding and decoding, making it more reliable and less prone to errors.

While using more states could potentially convey more information, it would also require more complex hardware and software, increasing the risk of communication errors and complicating the overall system design and operation.

Know more about binary communication:

https://brainly.com/question/32447290

#SPJ3

Your question is incomplete, but most probably your full question was.

Why did we decide to send a message as a sequence of state (A and B) rather than modifying our devices to represent more State (State C, State D, State E,....)?

Give two examples of situations or appliance where electrical circuits are used​

Answers

Answer:

An electric circuit includes a device that gives energy to the charged particles constituting the current, such as a battery or a generator; devices that use current, such as lamps, electric motors, or computers; and the connecting wires or transmission lines.

The item in this illustration that is highlighted is _____.



help
the status bar
zoom control
the title bar

The item in this illustration that is highlighted is _____.helpthe status barzoom controlthe title bar

Answers

Answer:the title bar

Explanation:

Answer:

I think it's title bar

Explanation:

I'm not positive but another guy said it and its the only one that makes sense

Other Questions
Have an imaginary conversation with your best friend. Write four (4) lines of dialogue about a business that you support or want to start supporting. Heres the catch you may NOT use the letter E in ANY word in any line of dialogue!100 Points Application identification and content inspection depend on the information in the Applications and Threats content updates True or false there were many serious illnesses during the middle passage what attitudes andbeliefs drove the Nazis' actions during the Holocaust? if you assume the potential vanishes at infinity, the potential will be zero at some point (x0,0) with -3 m < x0 < 1 m. write an expression for x0 in terms of q1, q2, x1, and x2. From which landmark Supreme Court case is this excerpt taken?A)Plessy v. FergusonB)Worcester v. GeorgiaC)Dred Scott v. SandfordD)Nat Turner v. Virginia The student council raised $2,790 during its annual fundraiser. The money was shared equally among the Events Committee, the Sports Committee, and the Sunshine Committee. a. The Sports Committee wants to use its share of the money to purchase t-shirts. If each t-shirt costs $12, what is the greatest number of t-shirts the Sports Committee can purchase? The greatest number of t-shirts that the Sports Committee can purchase is . fill in the blank. the electroencephalogram (eeg) records three types of electrical activity:___waves when a person is awake and attentive,___waves when a person is awake but relaxed and nonattentive, and___waves when a person is in deep sleep. Assume that you contribute $330 per month to a retirement plan for 15 years. Then you are able to increase the contribution to $530 per month for the next 25 years. Given an 8 percent interest rate. What is the value of your retirement plan after the 40 years? (Do not round intermediate calculations and round your final answer to 2 decimal places.) Complete the following analysis. Do not hard code values in your calculations. Middle-school-age children utilize _____________ when information is fuzzy or incomplete, such as asking for clarifications of information. in the molecule cocl2, carbon is the central atom. draw the best lewis structure for cocl2. in the structure you provided, what is the formal charge on carbon? individuals with schizophrenia are much more likely to die at a younger age than the general population and most often that death is attributable to what condition The expression 3(x-9) is equivalent to03(x)+9.O 3(x)+3(9).o 3(x) 9.3(x) 3(9). Please help I would really appreciate it -273/90 in simplest form which is the best evidence that a gene involved in antibiotic resistance in bacteria underwent lateral gene transfer? Emily is a doctoral student in psychology. She plans to use ________ to complete her doctoral paper, carefully monitoring a group of children without interacting with them. She's also thinking about reaching out to them in the distant future to see how their beliefs differ over a 10-year period.A) naturalistic observationsB) case studiesC) surveysD) assessments Which of these is TRUE about prokaryotes and eukaryotes?Group of answer choicesBoth prokaryotes and eukaryotes are the same size no matter what organelles they have.Both prokaryotes and eukaryotes are large and contain many organellesProkaryotes are small and do not contain a nucleus or complex organelles.Eukaryotes are small and prokaryotes contain complex organelles What are the elements of the story? malik wanted to give 1/5 of his bag of balloons to each of 3 of his friends how many of his balloons will he give away plz help its 10;29 im only ten i need so much help plz