The active X specification from Microsoft is one of the client-side extensions that allows programmers to create applications that run inside the Internet Explorer browser.
What qualifies as a client-side extension?Dynamic-link libraries (DLLs), which are used to implement Group Policy on client computers, are referred to as client-side extensions. Implementing a Client-side Extension for Group Policy provides more details.In order to respond to particular kinds of requests, a client-side extension is a program that communicates directly with the web server. A document type definition (DTD) can be referred to in many Extensible Markup Language (XML) documents of the same kind.The active X specification from Microsoft is one of the client-side extensions that allows programmers to create applications that run inside the Internet Explorer browser.To learn more about active X refer to:
https://brainly.com/question/14987451
#SPJ4
It is common in DHCP configurations to exclude IP addresses from the scope of addresses you make available. What type of device might you exclude from a DHCP configuration
In DHCP configurations, it is common to exclude certain types of devices from the scope of available IP addresses. One type of device that might be excluded is a network router or gateway.
A network router or gateway is a device responsible for routing network traffic between different networks or subnets. These devices often have static IP addresses assigned to them to ensure their availability and to maintain consistent network connectivity.
When setting up a DHCP (Dynamic Host Configuration Protocol) server to assign IP addresses to devices on a network, it is advisable to exclude the IP address used by the network router or gateway from the pool of available addresses. This ensures that the router's IP address remains consistent and prevents any potential conflicts with dynamically assigned IP addresses.
By excluding the router or gateway IP address from the DHCP scope, it ensures that the IP address used for the device remains unchanged, allowing for reliable network connectivity and proper routing of traffic between networks.
Learn more about network here: https://brainly.com/question/30456221
#SPJ11
The lifetime of a new 6S hard-drive follows a Uniform
distribution over the range of [1.5, 3.0 years]. A 6S hard-drive
has been used for 2 years and is still working. What is the
probability that it i
The given hard-drive has been used for 2 years and is still working. We are to find the probability that it is still working after 2 years. Let A denote the event that the hard-drive lasts beyond 2 years. Then we can write the probability of A as follows:P(A) = P(the lifetime of the hard-drive exceeds 2 years).By definition of Uniform distribution, the probability density function of the lifetime of the hard-drive is given by:
f(x) = 1/(b - a) if a ≤ x ≤ b; 0 otherwise.where a = 1.5 years and b = 3.0 years are the minimum and maximum possible lifetimes of the hard-drive, respectively. Since the probability density function is uniform, the probability of the hard-lifetime of a new 6S hard-drive follows a Uniform distribution over the range of [1.5, 3.0 years]. We are to find the probability that a 6S hard-drive, which has been used for 2 years and is still working, will continue to work beyond 2 years.Let X denote the lifetime of the hard-drive in years.
Then X follows the Uniform distribution with a = 1.5 and b = 3.0. Thus, the probability density function of X is given by:f(x) = 1/(b - a) if a ≤ x ≤ b; 0 otherwise.Substituting the given values, we get:f(x) = 1/(3.0 - 1.5) = 1/1.5 if 1.5 ≤ x ≤ 3.0; 0 the integral is taken over the interval [2, 3] (since we want to find the probability that the hard-drive lasts beyond 2 years). Hence,P(A) = ∫f(x) dx = ∫1/1.5 dx = x/1.5 between the limits x = 2 and x = 3= [3/1.5] - [2/1.5] = 2/3Thus, the probability that a 6S hard-drive, which has been used for 2 years and is still working, will continue to work beyond 2 years is 2/3.
To know more about Uniform distribution visit:
brainly.com/question/13941002
#SPJ11
you have just downloaded a game onto your laptop. when you are not using the device, it unexpectedly downloads new content. which of these is the most likely cause of the issue
Answer:
deceptive software installed with the game.
Explanation:
outline the steps involved in changing the colour of a theme
Answer:
Right click on the desktop and click on personalize option and then click on window color. After that window color and appearance window appears. select a color scheme you want. Go to Appearance and personalization, click on theme and select any theme from the list and click on ok.
A hacker is viewing information that passes along a network line for the purpose of gathering information. This is called?
In order to obtain information, a hacker is seeing data as it travels through a network line. This is called sniffing. The correct option is a.
What is sniffing?In terms of network security, a sniffing attack entails the theft or interception of data through the use of a packet sniffer to record network traffic.
A hacker is a person who attacks or stole pieces of information illegally. They catch the line system of the computer, and they hack software, money, or data.
Thus, the correct option is a. Sniffing.
To learn more about sniffing, refer to the below link:
https://brainly.com/question/17100775
#SPJ1
The question is incomplete. Your most probably complete question is given below:
a. Sniffing
b. Spoofing
c. Hijacking
d. Impersonation
pulsed laser technology called lidar to detect and monitor the environment is an integral part of .
Pulsed laser technology called lidar to detect and monitor the environment is an integral part of Self-driving trucks.
What type of laser is LiDAR?Topographic and bathymetric lidar are said to be of two different types. While bathymetric lidar also measures elevations of the seafloor and riverbeds using water-penetrating green light, topographic lidar typically maps the land using a near-infrared laser.
Therefore in regards to self-driving vehicles, self-driving trucks, sometimes referred to as autonomous trucks or robo-trucks, operate without a human driver. Self-driving semi trucks are being tested by many businesses. Similar to self-driving vehicles, self-driving trucks, sometimes referred to as autonomous trucks or robo-trucks, operate without a human driver.
Learn more about Self-driving trucks from
https://brainly.com/question/22527873
#SPJ1
what are tasks performed by pascaline?
Answer:
The Pascaline is a direct adding machine (it has no crank), so the value of a number is added to the accumulator as it is being dialed in. By moving a display bar, the operator can see either the number stored in the calculator or the complement of its value.
Explanation:
What is the output for the following program? numB = 2 while numB < 15: numB = numB + 5 print(numB) Output:
The following program is a while loop that will output the following data
7,12,17.
In the first iteration, the variable numB is 2, since 2 is less than 15, the program will run the command
numB = numB+5 and it will print 7
The second iteration is still valid because numB is now 7 and is less than 15, so the program will run the command
numB = numB+5 and it will print 12
The third iteration is still valid because numB is now 12 and is less than 15, so the program will run the command
numB = numB+5 and it will print 17
The fourth iteration is not valid because numB is now 17 and is greater than 15, so the program will not run the command
Learn more:
https://brainly.com/question/19344465
Answer: 7,12,17.
Explanation: got it right on edgen
the security system has detected a downgrade attempt when contacting the 3-part spn
Text version of LSA Event 40970 When contacting the 3-part SPN, the security system discovered an attempt to downgrade.
What is a three-part SPN?The service class comes first, the host name comes second, and the service name comes third (if it's present). Adding a ":port" or ":instancename" component as a suffix to the host name part is optional.Text version of LSA Event 40970 When contacting the three-part SPN, the security system discovered an attempt to downgrade. The error message reads, "The SAM database on the Windows Server does not have a computer account for the workstation trust relationship (0x0000018b)" An authentication refusal was made.In every domain of an Active Directory, there is a default account called KRBTGT. It serves as the domain controllers' KDC (Key Distribution Centre) service account.To learn more about Security system refer to:
https://brainly.com/question/29037358
#SPJ4
for the following assembly program, if the content of d[9] is 3. what is the value in r5 and r6 after the program completes?
For the following assembly program, assuming that the content of D[9] is 2, the value in R5 and R6 after the program completes will be 3 and 2 respectively.
What is the explanation for the above?The program starts by moving the value 1 into R6 and moving the value 9 into R5. Then it jumps to the label label1 if R5 is equal to 0. Since R5 is not equal to 0, it does not jump to the label and instead adds the values in R5 and R6, which are 9 and 1 respectively, to produce the value 10 in R5.
Next, the program adds the values in R5 and R6 again, producing the value 11 in R5. Finally, it subtracts the value in R6 from the value in R5, which is 11 and 1 respectively, to produce the value 10 in R6. Therefore, at the end of the program, R5 has a value of 3 and R6 has a value of 2.
Learn more about the assembly program:
brainly.com/question/14190352?
#SPJ1
Full Question:
For the following assembly program, assuming that the content of D[9] i s 2. What is the value in R5 and R6 after the program completes? MOV R6, #1 MOV R5, 9 JMPZ R5, label1 ADD R5, R5, R6 label1: ADD R5, R5, R6 SUB R6, R5, R6
Which of the following is true concerning derivative classification? Select one: a. Only appointed individuals may perform derivative classification. b. Derivative classifiers are responsible for analyzing and evaluating information to identify elements that require classification. c. Consulting the Original Classification Authority (OCA) is the first step in the derivative classification process. d. Photocopying a Secret document is an example of derivative classification.
The true statement about concerning derivative classification is ---Derivative classifiers are responsible for analyzing and evaluating information to identify elements that require classification.
Option B is correct.
What is Derived Classification?“Derivative classification” means incorporating, paraphrasing, rephrasing, or creating in a new form information that has already been classified and marking newly developed material in accordance with the classification markings applied to the source information. increase.
What is the significance of derivative classification?Readers can infer classified information by performing additional interpretations or analyses. Derivative Classifiers are responsible for forwarding classification guidance and applicable downgrade and declassification instructions.
Who can be a derived classifier?A person authorized to certify that an unmarked document or material is unclassified or to determine that it has been classified as acceptable according to the authority's designation.
Learn more about derivative classification:
brainly.com/question/14294203
#SPJ4
what does a technician need in order to make changes to software installed on the computer of a customer?
A technician needs the customer's permission before making any changes to a computer.
What kind of work does a level one technician at a call center typically do?A level one technician's main duty is to obtain information from the customer. All of the data must be accurately entered into the work order by the level one technician.
Which of the following software launches first when you turn on your laptop?computing device. When a computer is turned on, an operating system, a specific program, must be started. By handling the intricate logistics of hardware management, the operating system's job is to make other computer applications more functional.
To know more about technician visit:-
https://brainly.com/question/14290207
#SPJ1
I ONLY NEED HELP WITH QUESTION 6 SHOWING HOW TO USE EXCEL FORMULA WHEN FINDING THE ANSWER:EXERCISE 8: USING "LOOKUP" AND "COUNTIF" FUNCTIONS TO RANK EMPLOYEE PERFORMANCE Managers often like to rank employees performance. One scheme called "20-70-10," or more disparagingly as "Rank and Yank," categorizes the top 20 percent of employees as "Best," the middle 70 percent of employees "Near Best," and the bottom 10 percent as "Below Best." Go to the "Excel Student Spreadsheets BUS 2000" and click on the tab/worksheet labeled "Lookup". There you will find the performance ratings—on a ten-point scale—for 20 employees. Each employee has 3 performance ratings. • In the 5th Column, or Column E, calculate the average performance rating for each employee to one decimal place. • Then, in the 6th Column, or Column F, use the LOOKUP function below to classify the employees. o =LOOKUP(E2,{0,4,9,10},{"Below Best", "Near Best", "Best"}) The Lookup formula is structured as follows: • E2 is the Cell containing the data for which the calculation should be made. • 0 to 4 is the classification of "Below Best". • 4 to 9 is the classification of "Near Best". • 9 to 10 is the classification of "Best". • The words "Below Best", "Near Best", and "Best" are placed for each of the three classifications according to an employee’s average rating. Using the results, do the following: 1. List the names of the "Best" employees 2. List the names of the "Near Best" employees 3. List the names of the "Below Best" employees Next, redefine the Lookup function to classify employees as "Above Average" and "Below Average" based on whether they scored above or below an average of 5 in their three performance scores. Place the results in the 7th Column, or Column G. Next, we’re going to count how many employees were categorized as either "Above Average" or "Below Average". Place the following results in cells B23 and B24. 4. How many people scored "Above Average?" 5. How many people scored "Below Average?"To answer these questions, use the COUNTIF function. Its form is =COUNTIF(G2:G21, "Above Average"), where G2:G21 is the range of cells. In this example, the function counts the number of employees that were "Above Average" according to the former classification.Lastly, you will notice that more people scored "Above Average" than "Below Average" using 5 as the cut point. Redefine the LOOKUP formula so that a roughly equal number of employees are classified as "Above Average" and as "Below Average." 6. What is the new cutoff point?
The new cutoff point to classify employees as "Above Average" or "Below Average" is 4. This ensures a roughly equal distribution of employees in both categories, taking into account an average score of 5 as the dividing point.
To determine the new cutoff point in order to classify an equal number of employees as "Above Average" and "Below Average," we need to adjust the ranges in the LOOKUP function. Let's walk through the steps to find the new cutoff point
Step 1: Calculate the average performance rating for each employee in Column E.
Step 2: Use the LOOKUP function in Column F to classify employees as "Below Best," "Near Best," or "Best" based on their average rating. The formula is as follows:
=LOOKUP(E2, {0, 4, 9, 10}, {"Below Best", "Near Best", "Best"}
Step 3: List the names of the employees classified as "Best" in one column, the names of the employees classified as "Near Best" in another column, and the names of the employees classified as "Below Best" in a third column.
Step 4: Redefine the LOOKUP function in Column G to classify employees as "Above Average" or "Below Average" based on whether they scored above or below an average of 5 in their three performance scores. The formula is as follows:
=LOOKUP(E2, {0, 5, 10}, {"Below Average", "Above Average"}
Step 5: Use the COUNTIF function to count the number of employees categorized as "Above Average" and "Below Average." Place the results in cells B23 and B24. The formulas are as follows
B23: =COUNTIF(G2:G21, "Above Average")
B24: =COUNTIF(G2:G21, "Below Average")
Step 6: Compare he counts of employees classified as "Above Average" and "Below Average." If there are more employees classified as "Above Average," we need to adjust the cutoff point to achieve a roughly equal distribution.
To find the new cutoff point, we can adjust the ranges in the LOOKUP function in Column G. We want to divide the range of scores evenly between "Below Average" and "Above Average." Let's say we have N employees in total, and we want to divide them equally.
The new rnges in the LOOKUP function can be calculated as follows:
"Below Average" range: 0 to (5 - 1)
"Above Average" range: (5 - 1) to 1
Here, (5 - 1) represents the new cutoff point. We subtract 1 because we want to exclude the exact average score of 5 from either classification.
Therefore, the new cutoff point is 4.
To know more about EXCEL visit :
https://brainly.com/question/32047461
#SPJ11
#done with school already
Answer: omg yes same hate it
Explanation:school is boring and we have to do work.
If your domain name is practicelabs. Com, then what would be the zone file name?
The zone file name for the domain name practicelabscom would be "practicelabscomzone".
The zone file nameZone files are used to map domain names to IP addresses and other resources. The zone file name is typically the domain name followed by the word "zone". So in this case, the zone file name would be "practicelabscomzone".
It is important to note that the zone file name may also include the top-level domain (TLD), such as "com", "net", or "org". This is to ensure that the zone file is unique and does not conflict with other zone files for different TLDs.
Learn more about TLDs:
brainly.com/question/28299644
#SPJ11
Discuss the Autonomous Robots and Additive Manufacturing contribution to Smart Systems. Why are these two technologies are important for the Smart Systems? Explain the technologies with an example.
How to Find Top 5 Values and Names in Excel ?
To find the top 5 values and names in Excel, you can use the LARGE function. Here is the syntax for this function: LARGE(array, k).
The array is the range of cells you want to evaluate and the k is the number of the largest value to return. For example, if you have a column of numbers and you want to find the top 5, you would type LARGE(A1:A10,1) to find the largest value, then LARGE(A1:A10,2) to find the second largest value and so on. Additionally, you can use the INDEX and MATCH functions to match the value with the corresponding name.
To find the top 5 values and names in Excel, you can use the following steps:
1. First, you need to have your data organized in a table. The names should be in one column and the values in another column.
2. Next, you need to sort the data in descending order based on the values. To do this, select the entire table and go to the Data tab in the Excel ribbon. Click on the Sort button and choose the column with the values. Make sure to select the "Largest to Smallest" option to sort the data in descending order.
3. After sorting the data, you can now easily find the top 5 values and names. The top 5 values will be in the first 5 rows of the sorted table, and the corresponding names will be in the same rows in the other column.
4. You can then use the INDEX and MATCH functions to extract the top 5 values and names.
5. Repeat the above steps for the other 4 values and names, replacing the MAX function with the LARGE function and specifying the rank of the value you want to find.
Learn more about Excel: https://brainly.com/question/25863198
#SPJ11
the users of the hr application have entered some employee social security numbers (ssns) with dashes (such as 222-33-4444) and some without dashes (such as 222334444). you need to remove all of the dashes from any ssn that contains dashes. the ssns are always stored in a variable named strsocial. you will use the method to edit the code so that only numeric characters are stored in the strsocial variable. a. replace b. substring c. trim d. delete
To remove dashes from employee social security numbers (SSNs) that have been entered with them, the code needs to be modified. This can be done using the 'replace' method in Python.
Option A is the correct answer
The replace method can be used to replace a specific character or string in a given string with another character or string. In this case, the dashes need to be removed from the SSNs that have been entered with them. The replace method can be used to replace the dashes with an empty string, effectively removing them.
The SSNs are stored in a variable named strsocial. To remove the dashes, the replace method can be used as follows:
strsocial = strsocial.replace('-', '')
This code will search for all instances of the '-' character in the strsocial variable and replace them with an empty string. The result will be a string containing only the numeric characters of the SSN.
In addition to removing the dashes, the code needs to ensure that only numeric characters are stored in the strsocial variable. This can be done using the 'isdigit' method, which returns True if all the characters in the string are numeric, and False otherwise. To use this method, the substring method can be used to extract only the numeric characters from the string.
strsocial = ''.join(filter(str.isdigit, strsocial))
This code uses the filter method to iterate through each character in the strsocial string and return only the numeric characters. The join method is then used to concatenate these characters back into a string.
In summary, the 'replace' method can be used to remove dashes from employee SSNs, while the 'isdigit' and 'substring' methods can be used to ensure that only numeric characters are stored in the strsocial variable. These modifications will ensure that the HR application processes SSNs correctly and efficiently.Option A is the correct answer
For more such question on Python
https://brainly.com/question/28675211
#SPJ11
write the steps to open an existing file in MS Word.
Explanation:
Choose Open from the File menu. The Open a File dialog box lists files and folders in your current folder. ...
Select the name of the document you want to open, or type the document name in the Enter file name field.
Press Return or click OK.
Answer:
Go to FILE, then OPEn and go through folders to find your file that you saved, then click on it and open it. I will add in images as well.
Please mark as brainliest, thank you!
Explanation:
Cuá es la relación entre la tecnología y la vida?
Answer:
La innovación tecnológica ha permitido que la humanidad avanzara sobre la base de disponer de unas prótesis más potentes en el divagar por la tierra
Explanation:
Hola! Dicho esto en el mundo en que vivimos hoy en día hemos podido con la tecnología inventar cosas que nos ayudan con nuestras vidas cotidianas como son los medios de comunicación, transporte, entre otros. Y para terminar de contestar la pregunta como tal pues sería algo como:
"La relación entre la tecnología y la vida es que la tecnología ayuda al ser humano en diferentes áreas tales como el transporte y la comunicación que hoy en día son un punto clave para poder vivir mejor."
¡Espero que te haya ayudado mucho!! ¡Bonito día!
Work Breakdown Structure (A hierarchical "tree" of work elements (tasks) to be produced by the project team during the project.) Each box should include the activity name, cost for the activity & the time required for the activity (hours or days). (20 - 40 activities are fine). The project is an app and website promoting steelpan activities worldwide
Below is a work breakdown structure (WBS) for the app and website project promoting steelpan activities worldwide. It includes 20 activities with their associated costs and time requirements.
The work breakdown structure (WBS) provides a hierarchical breakdown of the project's work elements or tasks. Here is an example WBS for the app and website project promoting steelpan activities worldwide:
1. Project Planning
- Define project scope, cost, and timeline (Cost: $5,000, Time: 5 days)
- Identify project stakeholders and team members (Cost: $2,000, Time: 2 days)
- Conduct market research and competitor analysis (Cost: $3,000, Time: 3 days)
- Develop project plan and schedule (Cost: $4,000, Time: 4 days)
2. App Development
- Design user interface and wireframes (Cost: $3,500, Time: 5 days)
- Develop backend infrastructure and database (Cost: $6,000, Time: 10 days)
- Implement frontend functionality and features (Cost: $7,500, Time: 15 days)
3. Website Development
- Design website layout and navigation (Cost: $2,500, Time: 5 days)
- Develop website architecture and content management system (Cost: $4,000, Time: 8 days)
- Integrate website with backend systems (Cost: $3,500, Time: 7 days)
4. Testing and Quality Assurance
- Conduct user testing and feedback collection (Cost: $2,500, Time: 5 days)
- Perform functionality and compatibility testing (Cost: $3,000, Time: 6 days)
- Identify and fix bugs and issues (Cost: $2,000, Time: 4 days)
5. Deployment and Launch
- Prepare app and website for deployment (Cost: $2,500, Time: 3 days)
- Publish app to app stores and launch website (Cost: $3,500, Time: 5 days)
- Conduct post-launch monitoring and support (Cost: $2,000, Time: 7 days)
Please note that the costs and time requirements provided are fictional and may vary depending on the specific project and resources available. The WBS serves as a visual representation of the project's tasks and helps in organizing and managing the project's work elements.
learn more about work breakdown structure here
https://brainly.com/question/30455319
#SPJ11
What is the typical educational requirement for a non-entry level software programmer?
a high school diploma
b technical certificate
c bachelor’s degree
d master’s degree
Answer:Technical Certificate
Explanation:just took the unit test
Answer:
B ON EDG.
Explanation:
For what type of image is a megapixel a unit of measurement?
film
cligital
print
Answer:
answer number 1
Explanation:
If you were creating your own website, what would you include to make sure your website was reliable and
valid?
Answer:
I would make sure to include all the sources i used? IT depends on what the website is about.
Explanation:
Hey there!
These are the best things to do to your website if you want to make sure it's reliable and valid:
Include research Do NOT include any biased opinionsHope this helps!
Have a great day! :)
What tag is used to contain information about a web page, such as the title and related pages?
Answer:
<head>
Explanation:
correct on edge 2021
The tag that has been used for the headings and titles and the information contained in a web page is <head>.
What is a tag?A tag is given as the label that has been attached to someone or something in order to add identification to the particular thing. The tag in the HTML or any other language has been used for the conversion of the HTML document into web pages. The tags are braced in the < >.
The headings and the subheadings or titles stand for the analysis of the topic and the concern of the particular topic or subject. There was the presence of the tag such as head, meta, footer, and header.
The title and the heading to a particular subject have been the representation of the topic that has been covered in the meta description part. Thereby, the title and important information are given in the <head> tag.
Learn more about the tag, here:
https://brainly.com/question/8441225
#SPJ5
Question 55 :You use a computer named Wkst1 on a TCP/IP network, which is installed with an application that uses UDP to send a file from your computer to a computer named Wkst2. Data collisions occur, and several data packets are lost during transmission. What will most likely occur as a result of losing the packets during transmission?
Answer:
The protocol will drop the packets
The application will automatically re-transmit the packets
Explanation:
Based on design, the routers will drop the packets as allowed by the Internet Protocol, due to the collision that resulted from the router being busy and the network is congested or that the packet is corrupt as indicated by the check sequence of the Ethernet frame or the IPv4 header checksum
Given that the application uses User Datagram Protocol (UDP) which does not allow recovery of lost packets, but have their defined methods of overseeing lost packets, as such the application will re-transmit the packet.
Whats the difference between Input and Output? Give and example of an example on a M:B
Answer:
Entrar en algún lugar no es como irse de algún lugar, o qué tipo de pregunta significa para mi acción
3.2.1.1 if statements checkpoint 4
An IF statement is a way to make decisions based on a condition.
What is an IF statement?
It has two possible outcomes: one for when the condition is true, and one for when it is false. For example, in Excel, you can use an IF statement to check if a cell value is “Yes” or “No” and return a different number accordingly. You can also combine IF statements with other functions like AND, OR and NOT to test multiple conditions2. Here is an example of an IF statement in Excel:
=IF(A1>10,“Large”,“Small”)
This formula checks if the value in cell A1 is greater than 10. If it is, it returns “Large”. If not, it returns “Small”. This is how you can use an IF statement to control the flow of your program or spreadsheet based on a logical test.
To learn more about IF statement, visit: https://brainly.com/question/30751419
#SPJ1
does anyone mind helping me with this please
People's willingness to help can vary, so it's important to approach others with courtesy and understanding.
How can you show your appreciation for someone who has helped you?Certainly! Many people are often willing to help when asked politely. Whether it's seeking assistance with a problem, understanding a concept, or receiving guidance, there are usually individuals who are happy to lend a hand.
When reaching out for help, it's important to be respectful and appreciative of others' time and expertise. By clearly stating your request and showing gratitude for their assistance, you increase the likelihood of receiving support. Remember, people's willingness to help can vary, so it's important to approach others with courtesy and understanding.
Learn more about help
brainly.com/question/11264894
#SPJ11
Access 1.04 knowing your audience
Answer:
What?
Explanation:
I would like to help, but what is the question