C# Language:
Question 1.
Given the properties and default no-arg constructor for a SmartPhone class, write a constructor that sets both properties
class SmartPhone
{
private string _number;
private string _operatingSystem;
// Constructors public SmartPhone()
{
Number = "+1(000)000-0000";
OperatingSystem = ""; }
public string Number { get => _number; set => _number = value; }
public string OperatingSystem { get => _operatingSystem; set => _operatingSystem = value; }
...
Fill in the blanks for the Constructor:
public SmartPhone (__________) {
___________
______________
}
-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Question 2.
Given the properties and default no-arg constructor for a Phone class, write a constructor that set all properties
class Phone
{
private string _number;
// Constructors
public Phone()
{
Number = "+1(000)000-0000";
}
public string Number { get => _number; set => _number = value; }
...
Fill in the blanks for the Constructor:
Phone (_______) {
________
__________

Answers

Answer 1

The purpose of the code is to write constructors for the SmartPhone and Phone classes in C# that initialize their respective properties with values provided by the user.

What is the purpose of the given code in Question 1 and Question 2?

In the given C# code, the SmartPhone class has two private properties, `_number` and `_operatingSystem`, along with their corresponding getters and setters. The task is to write a constructor that sets both properties.

The constructor for the SmartPhone class can be filled in as follows:

public SmartPhone(string number, string operatingSystem)

{

   Number = number;

   OperatingSystem = operatingSystem;

}

By providing two parameters, `number` and `operatingSystem`, the constructor allows the user to pass values for both properties when creating an instance of the SmartPhone class.

-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Question 2:

In the given C# code, the Phone class has a private property `_number` and its corresponding getter and setter. The task is to write a constructor that sets this property.

The constructor for the Phone class can be filled in as follows:

public Phone(string number)

{

   Number = number;

}

By providing a parameter `number`, the constructor allows the user to pass a value for the `_number` property when creating an instance of the Phone class.

Learn more about constructors

brainly.com/question/29802740

#SPJ11


Related Questions

Why did we use ""OR"" as the Boolean connector between the queries each time instead of ""AND""? How would the results have been different if we had used ""AND"" instead of ""OR"" each time in this compound query?

Answers

If one or both of the operands are TRUE or have a Boolean value of 1, the OR operator, which is a Boolean operation, will return the value TRUE.

What is a Boolean connector?

The relationship between two or more terms in the search expression that must exist for a document to be included in your search results is indicated by boolean search connectors.

Choose the Boolean connector that best matches your individual search parameters when entering your search expression to employ Boolean connectors.

The "OR" operator is our first illustration of a Boolean operator, which enlarges your search. This operator is used to indicate that the result of a particular query is true if any one of a set of two or more conditions is satisfied.

Learn more about  Boolean connector here:

https://brainly.com/question/14052528

#SPJ1

i need it real quick

i need it real quick

Answers

What exactly do you need help with?

true or false: change context allows you to change your login department without requiring you to log out first

Answers

Changing context typically refers to switching between different contexts or environments within a software application or system. It does not specifically relate to changing login departments.The statement is false.

A software application, commonly referred to as an "app," is a program or set of programs designed to perform specific tasks or functions on a computer or mobile device. These applications can range from simple programs that perform basic functions to complex applications that offer advanced features and capabilities.

Desktop Applications: These applications are designed to run on personal computers or laptops. They provide a wide range of functionalities, such as word processing, spreadsheet management, graphic design, video editing, and more. Examples include Microsoft Office Suite (Word, Excel, PowerPoint), Adobe Photoshop, and VLC Media Player.

Therefore, The statement is false.

Learn more about Desktop Applications on:

https://brainly.com/question/31783966

#SPJ1

An advantage of using digital media at work is that it Multiple Choice Enables routine messages to be delivered with speed.is effective for solving complex problems.enables interpretation of subtle nonverbal cues conveyed by a sender.engenders more trust among users than face-to-face communication does.safeguards sensitive or private information.

Answers

An advantage of using digital media at work is that it enables routine messages to be delivered with speed. This means that messages can be sent and received quickly, which can be beneficial for business operations.

Digital media, such as email and instant messaging, allows for instantaneous communication. This can save time and improve efficiency in the workplace, as routine messages and updates can be sent and received quickly without the need for face-to-face interaction.

However, it is important to note that digital media may not be effective for solving complex problems or interpreting subtle nonverbal cues conveyed by a sender. In addition, it may not engender as much trust among users as face-to-face communication does. Furthermore, safeguarding sensitive or private information may also be a concern when using digital media.

In conclusion, while digital media has its advantages, it is important to consider the potential limitations and drawbacks when using it in the workplace.

To know more about digital media visit:

https://brainly.com/question/31643583

#SPJ11

What is the highest level of normalization that you can achieve with a database?

Answers

The highest level of normalization that you can achieve with a database is the Fifth Normal Form (5NF), also known as the Project-Join Normal Form (PJ/NF). Normalization is a process of organizing data in a database to reduce redundancy and improve data integrity.

The process involves breaking down complex tables into smaller, more managed ones while maintaining relationships between them.

The normalization process goes through various stages, called normal forms, starting from the First Normal Form (1NF) to the Fifth Normal Form (5NF). Each normal form imposes certain rules and conditions to ensure data consistency and eliminate anomalies:

1. First Normal Form (1NF): Eliminates duplicate columns and ensures each table has a primary key.

2. Second Normal Form (2NF): Ensures that all non-primary key attributes are fully functionally dependent on the primary key.

3. Third Normal Form (3NF): Removes any transitive dependencies among attributes, ensuring that non-primary key attributes are determined only by the primary key.

4. Boyce-Codd Normal Form (BCNF): A stronger version of 3NF, which ensures that every determinant in a table is a candidate key.

5. Fourth Normal Form (4NF): Removes multi-valued dependencies, where an attribute depends on a set of other attributes, rather than a single attribute.

6. Fifth Normal Form (5NF): Ensures that a table cannot be decomposed further into smaller tables without loss of data or dependencies.

While 5NF is the highest level of normalization, there is also a Sixth Normal Form (6NF), which deals with temporal databases and is not typically used in standard database design.

In summary, the Fifth Normal Form (5NF) is the highest level of normalization that you can achieve with a database. It ensures data consistency and integrity by eliminating redundancy and organizing data into manageable, smaller tables

for such more question on managed

https://brainly.com/question/7020331

#SPJ11

You find that disk operations on your server have gradually gotten slower. You look at the hard disk light and it seems to be almost constantly active and the disk seems noisier than when you first installed the system. What is the likely problem

Answers

Answer:

Disk is fragmented

Explanation:

Question #6
Plagiarism is the
of someone else's words or
ideas and presenting them as your own.
O borrowing
O rewording
O remixing
O stealing
Read Question

Answers

Answer:
D. Stealing


Explanation:
Rewriting someone’s words. “Plagiarism” is known as stealing someone’s words.

Answer:

D. Stealing

Explanation:

Plagiarism is "the practice of taking someone else's work or ideas and passing them off as one's own."

In other words, stealing someone's words and claiming them as your own.

Plagiarism is illegal with fines of anywhere between $100 and $50,000.

So, be sure to put quotes (") around published articles or paragraphs if it's for an assignment. If it's not an assignment, don't use it. Unless you wanna be fined anywhere between $100 and $50,000

In batch operating system three job J1 J2 and J3 are submitted for execution each job involes an I/O activity a CPU time and another i/o activity job a requires a total of 20 ms with 2 ms CPU time J2 requires 30 ms total time with 6 ms CPU time J3 requires15 ms total time 3 ms CPU time what will be the CPU utilization for uniprogramming and multiprogramming

Answers

Answer:

(A) The CPU time for J1 is =2 ms other time is =18 ms, for J2 CPU time =6 ms other time = 24 ms, for J3 CPU time = 3 ms and other time = 12 ms (B) The CPU Utilization for uni-programming is 0.203 or 20.3% (C) For Multi-programming, when a program is not free and busy with an operation, the CPU is allocated to other programs.

Explanation:

Solution

Given that:

A(1)Job J1 = CPU time = 2ms  

Other time =18 ms

Total time = 20 ms

(2)Job J2 = CPU time 6ms

Other time = 24 ms

Total time = 30 ms

(3)Job J3 = CPU time = 3ms

Other time =12ms

Total time = 15 ms

(B) For the CPU Utilization for uni-programming, we have the following as follows:

CPU utilization =The total time of CPU/The total real time

Thus,

=(2 +6+3) / (18+24+12)

= 11/54

=0.203 or 20.3%

(C) For the CPU utilization for multi-programming,  when a program is not available that is busy in an operation, such as the input and output the CPU can be allocated or designated to other programs

ILL GIVE BRAINLIEST TO FIRST ANSWER David is adopting an iOS app from a non-retina screen to a retina screen. The app currently works at a pixel density of 150DPI, what density should it be on a retina screen to maintain its apparent size?

Answers

Answer: what density should it be on a retina screen to maintain its apparent size?

who plays pokemon shield or sword

Answers

Answer: I haven’t played but i wanna

Explanation:

Answer:

no

Explanation:

i don't

compare and contrast science and technology

Answers

Answer:

Comparisons: Science and technology are always two things that are being constantly refined. They are also quite useful things to know in day to day life. However, technology depends on science. Science is more conceptual than technology; technology is a thing, while science is a concept of knowledge.

which term defines the practice of collecting evidence from computer systems to an accepted standard in a court of law?

Answers

A computer system is a basic, fully functional setup of hardware and software that includes every element required to carry out computing tasks.

Thus, It makes it possible for people to input, process, and output data efficiently and methodically. A computer system is made up of a number of interconnected, integrated components that work together to complete one or more tasks.

It frequently includes both hardware and software components, including as memory, input/output devices, storage devices, drivers, operating systems, programs, and CPUs.

The invention of mechanical calculators in the early 19th century can be credited as the beginning of computer systems. These devices were developed to carry out calculations. But the actual progress of computer systems began with the introduction of electronic computers.

Thus, A computer system is a basic, fully functional setup of hardware and software that includes every element required to carry out computing tasks.

Learn more about Computer system, refer to the link:

https://brainly.com/question/14583494

#SPJ1

Question 2 of 10
Lauren is the HR manager at a business that hires electricians. She reads an
article that says fewer young people are choosing to prepare for this field.
How will this decline in the labor supply be likely to affect Lauren's company?
OA. The falling labor supply will make it harder to find qualified people.
OB. The falling labor supply will reduce the company's demand for
labor.
OC. The falling labor supply will lower the cost of labor for
electricians.
OD. The falling labor supply will increase the company's demand for
labor.
SUBMIT

Answers

As the labor supply fall the demand for labor in the company will increase as the demand could not match the number of people available. Thus, the correct option is D.

What is demand?

Demand is the quantity of something which is required to fulfill the needs of consumers in a business. Demand of anything increases when enough the thing is not available in enough amount.

Here, lauren's company require labors to work as electricians but due to decline in the labor supply they could not get enough employees which increases the demand for employees.  

Therefore, the correct option is D.

Learn more about Demand here:

https://brainly.com/question/14456267

#SPJ1

Answer:

A. The falling labor supply will make it harder to find qualified people

Hope this helps :)

In the context of territory routing plans, _____ moves in concentric loops that spirals across the territory.

Answers

In the context of territory routing plans, the route moves in concentric loops that spiral across the territory.

What is a Territory Routing Plan?

A territory routing plan is a course of action that outlines the most effective method for a company to deploy its sales reps in a specific geographical area (territory)

This approach assists sales managers in effectively managing and monitoring their teams, as well as ensuring that every sales representative is assigned to a particular region of the market.

Analysis of the territory: In this phase, the company's marketing team analyses the current geographical market and identifies opportunities and potential customers

Learn more about routing at:

https://brainly.com/question/28965873

#SPJ11

An individual involved with the aspect of a project will be concerned with budgets and the costs associated with running a business.

Answers

The storming stage of team development is complete when conflicts are resolved and leadership roles are accepted.

Answer:

this doesn't make any sense at all

Explanation:

i think it is a or c is it right?

i think it is a or c is it right?

Answers

C
She is emailing her boss that something is wrong.

A company that provides internet access to customers for a fee
A.)URL
B.)ISP
C.)HTTP

Answers

Answer:

ISP

Explanation:

ISP is a company that provides Internet access to its customers.

URL is the address of a website

HTTP is communication between web browsers and web servers

How do we “read” and “write” in MAR and MDR memory unit, please help I am very confused :)

Answers

Answer:

No entiendo

Por favor traduce al español

which of the following is not a physical security mechanism?motion-activated camerasintegrated intrusion alarmsfirewall aclsperimeter fence detection

Answers

Firewall ACLs is not a physical security mechanism. Option D

What are firewall ACLs?

Firewall Access Control Lists (ACLs) serve as a network security mechanism that governs and sifts through inbound and outbound traffic through predetermined regulations.

They are utilized in the networking layer and function within the digital domain, furnishing logical entry management to network assets.

Physical security measures such as motion-triggered cameras, integrated intrusion alarms, and perimeter fence detection systems are employed to oversee and safeguard physical areas by detecting and preventing unauthorized access or movement, thus reducing the likelihood of security breaches.

Learn more about firewall ACLs at: https://brainly.com/question/15006683

#SPJ4

Select the correct answer.
Nancy wants to buy a cooking stove that’s electrically insulated and resistant to heat. What material should she choose for the cooktop?
A.
composite
B.
polymer
C.
metal
D.
ceramic
E.
semiconductor

Answers

Answer:

E I think is the best answer

for binary data, define a glm using the log link. show that effects refer to the relative risk. why do you think this link is not often used

Answers

A Generalized Linear Model (GLM) using the log link is a type of GLM that uses the natural logarithm to link the predicted probability of an outcome to the explanatory variables. The log link is not often used because the interpretation of the relative risk can be more difficult to interpret than the interpretation of a GLM with another link function.

Binary data is a type of data in which each observation can only have two possible outcomes (usually 0 or 1). It is often used to measure the relative risk associated with a particular explanatory variable, as it allows for the effects of the explanatory variable to be expressed in terms of the odds ratio (i.e., the ratio of the probability of one outcome to the probability of the other).

Additionally, the log link does not allow for an easy comparison of relative risk for different explanatory variables since it does not produce results in terms of the relative risk ratio.

You can learn more about Generalized Linear Model at: brainly.com/question/30584334

#SPJ11

(n) ____ operator requires a single operand either before or after the operator. unary single binary

Answers

A unary operator requires a single operand either before or after the operator.

Who is a  unary operator?

This is known to be a person or  an operator that is often known to use or operate only on a single operand so as to return a new value.

Note that A unary operator requires a single operand either before or after the operator.

Learn more about   unary operator from

https://brainly.com/question/13814474

#SPJ1

what are some challenges that existing data centers face as they move toward supporting cloud computing? group of answer choices increased it labor costs to manager the cloud environment. greater energy consumption for the same load of applications.

Answers

As long as you have internet connectivity, cloud computing enables you to access resources, data, services, and applications from anywhere.

What is cloud computing?

Simply described, cloud computing is the distribution of computing services over the Internet ("the cloud"), including servers, storage, databases, networking, software, analytics, and intelligence, in order to provide speedier innovation, adaptable resources, and scale economies.

Here are the main challenges facing cloud computing, in brief:

concerns with cyber security.

cost containment and management.lacking in resources or knowledge.Governance/Control.Compliance.managing several clouds.Performance.creating a private cloud.

Here, there are a number of important difficulties that need to be addressed, including lengthy troubleshooting, application unavailability, migration agents, and cutover complexity.

As long as you have internet connectivity, cloud computing enables you to access resources, data, services, and applications from anywhere. Some tools and strategies will enable you to access information even if you are not connected to the internet.

To learn more about cloud computing refer to:

https://brainly.com/question/19057393

#SPJ4

Why error occurs during transmission? Explain different types of errors with suitable examples. 5 (b) How do you detect error using CRC? Generate the CRC code for the data word 1101011011 The divisor is x4+x+1. 7

Answers

During transmission, errors occur due to a variety of factors such as atmospheric conditions, system malfunction, or network errors.

Different types of errors include Single Bit Error, Burst Error, and Burst Error Correction. Here are the different types of errors with suitable examples: Single Bit Error: It occurs when one bit of data is changed from 1 to 0 or from 0 to 1 in data transfer. This type of error is mainly caused by a small amount of interference or noise in the transmission medium. For instance, a parity bit error.Burst Error: It occurs when two or more bits are incorrect during data transmission. A Burst Error occurs when bits of data are lost or changed in groups, which can affect multiple data bits at once. It can be caused by signal loss or attenuation in fiber-optic cables. Burst Error Correction: To overcome the issue of Burst Error, Burst Error Correction is used. This method divides data into blocks to detect and fix errors. Reed-Solomon coding and Viterbi decoding are two types of burst error correction techniques. There are different techniques for error detection, and the Cyclic Redundancy Check (CRC) is one of them. CRC checks the checksum at the receiver's end to ensure that the data was not corrupted during transmission. To detect errors using CRC, follow these steps: Divide the data word by the generator polynomial. Generator polynomial: x4 + x + 1 Divide 1101011011 by x4 + x + 1 and find the remainder by using the modulo 2 division method.1101011011 10011- 10011000- 10011000- 10010100- 10010100- 10000001- 10000001- 1111100- 1111100- 1001The remainder of the above step is the CRC code of the data word, which is 1001. Therefore, the CRC code for the data word 1101011011 is 1001.

know more about type of error.

https://brainly.com/question/31751999

#SPJ11

What term is used to describe a website with an audio interface that allows you to request information verbally and then replies with the the information you want to know using a computer-generated voice reply?.

Answers

Voice user interfaces (VUI) is the term that is used to describe a website with an audio interface that allows you to request information verbally and then replies with the the information you want to know.

A voice-user interface (VUI) enables spoken communication between humans and computers. It uses speech recognition to comprehend instructions and inquiries, and often uses text-to-speech to play back responses. A voice user interface-controlled device is referred to as a voice command device (VCD).

Automobiles, home automation systems, computer operating systems, home appliances including washing machines and microwave ovens, and television remote controls all now feature voice user interfaces. The systems of interactions with virtual assistants on smartphones and smart devices take place this way.

Older interactive voice response systems and automated attendants that direct phone calls to the appropriate extension and handle more complex phone transactions can react to keypad button presses through DTMF tones.

To know more about voice-user interface click here:

https://brainly.com/question/15704118

#SPJ4

To use an outline for writing a formal business document, what should you do
after entering your bottom-line statement?
OA. Move the bottom-line statement to the end of the document.
OB. Write a topic sentence for every detail.
C. Enter each supporting detail from the outline on a separate line.
D. Enter each major point from the outline on a separate line.

Answers

To enter your bottom-line statement you

C. Enter each supporting detail from the outline on a separate line.

How to add bottom-line statement

After entering your bottom-line statement in an outline for writing a formal business document, you should enter each major point from the outline on a separate line This means that you should write down the key ideas that support your bottom-line statement and each idea should be placed on its own line to clearly differentiate them These major points will become the topic sentences for each section of your document

Once you have entered each major point on a separate line you can then enter each supporting detail from the outline on a separate line under its corresponding major point This helps to organize the information in a logical manner and allows you to expand on each major point in a structured and cohesive way

Learn more about bottom-line statement at

https://brainly.com/question/8630249

#SPJ1

What is the difference between weak AI and strong AI?

Answers

Explanation:Strong AI has a complex algorithm that helps it act in different situations, while all the actions in weak AIs are pre-programmed by a human. Strong AI-powered machines have a mind of their own. They can process and make independent decisions, while weak AI-based machines can only simulate human behavior.

How does the technology work

Answers

Answer:  it does – or perhaps appears to do – in the world.

Explanation:

sorry if am not right have a nice day lol

Answer: technology work by chips wires in the botton of it or in the back of it and there metel in it they wire thing to it to make it better like phon

How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas

Answers

The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.

How did Native Americans gain from the long cattle drives?

When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.

Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.

There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.

Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.

Learn more about cattle drives from

https://brainly.com/question/16118067
#SPJ1

Birthday collision attack implementation

Implement the given algorithm in C/C++ or Python to search for collisions in a toy example of a cryptographic hash function with n-but output where n are the first n bits of the SHA-1 message digest. Specifically, write the program which searches for collisions in the first 4,8,12,16... bits of the SHA-1 digest. Work with the hex representation of the digest. Search for a pair of SHA-1 digests with the first 1,2,3... symbols (in hex) being the same. Stop at the number of bits which takes a long time (over 15 mins).

For each output length, count the timing which the birthday attack takes.

Algorithm for finding collisions in constant space input: H: M->{0,1)n Output: Distinct x, x, st. H(x)-H(x) for i = 1, 2, , N do: x = H(x) x = H(H(x)) if x = x break x=x, x=x0 for j 1 to i do: if H(x) -H(x) return x,x and halt else x- H(x), x - H(x).

Answers

Here's an implementation of the algorithm in Python for searching collisions in the first 4, 8, 12, 16... bits of the SHA-1 digest prints out the number of collisions found and the time it took to find them for each output length. The timing will vary depending on the computer used, but it should be under 15 minutes for the given output lengths.

import hashlib

import time

def sha1_collisions(n):

   t0 = time.time()

   # Convert number of hex symbols to number of bits

   num_bits = n * 4

   

   # Set up the hash function and initial values

   sha1 = hashlib.sha1

   x = sha1(b'').digest()

   x0 = sha1(b'\x01').digest()

   # Iterate to find a collision

   while True:

       x = sha1(x).digest()

       x = sha1(x).digest()

       if x == x0:

           break

   # Iterate to find collisions with the same first n bits

   prefix = x.hex()[:n]

   x = sha1(b'').digest()

   x0 = sha1(b'\x01').digest()

   count = 0

   while True:

       x = sha1(x).digest()

       x1 = x.hex()[:n]

       if x1 == prefix:

           count += 1

           if x == x0:

               break

       else:

           x = sha1(x).digest()

           x0 = sha1(x0).digest()

   t1 = time.time()

   print(f"{n} bits: {count} collisions found in {t1-t0:.3f} seconds")

# Test the function for different output lengths

for i in range(1, 9):

   sha1_collisions(i)

Learn more collisions   here

https://brainly.com/question/13138178

#SPJ11

Other Questions
SHARP COLLISIONS OF LIGHT AND SHADE WAS AN EFFECT CAUSED BY A TECHNIQUE KNOWN AS ________AND IT WAS USED BY ________ DURING THE_______ PERIOD. Assume you are using a significance level of =0.05 to test theclaim that making a decision about the name, subject, or other identifier under which you file the material is part of what step in the filing process? Express 3.81 as a mixed number. Using trigonometry, Find x smoothing parameter (alpha) close to 1 gives more weight or influence to recent observations over the forecast. group of answer choices true false Francisco is looking for career information online. Websites with what abbreviations at the end are MOST likely to provide trustworthy information? A. .co and .uk B. .edu and .gov C. .com and .biz D. .org and .net Nick and Peter have played 55 tennis matches.Nick has won 26 times.Peter won the rest.a) Estimate the probability that Nick wins. The price of long-distance telephone service fell from 40 cents per minute in 1996 to 22 cents per minute in 1999, a 45-percent (18 cents/40 cents) decrease. Suppose that the Consumer Price Index increased by percent over this period. What happened to the real price of telephone service?Part 2The real price of telephone service decreasedincreaseddecreased by enter your response here percent. (Enter your response rounded to two decimal places.) someone pls help due in 15 mins!!!!!!!!!!!!!!!!!!! during the 1980s and 1990s, when the government participated in price-cap regulation involving public utilities, a common pattern was to require a price that ____________ over time. Describe the role of the polycomb group proteins in maintaining gene repression. 100-200 words Area is found by multiplying the length of a surface times the width. If a floor measures 5.28 m2, how many square centimeters does this represent? Mr. Franklin was a wise man, and when he found his son bent on a sailor's life, determined to give him a taste of it, in the hope that this would be enough. John was therefore taken from school at the age of thirteen, and sent in a merchantman to Lisbon. The Bay of Biscay, however, did not cure his enthusiasm; and so we next find John Franklin as a midshipman on board the Polyphemus, seventy-four guns.What two ideas do these sentences reveal about the author's point of view? The author admires John Franklin for his unwavering enthusiasm. The author supports Mr. Franklin's strategy to deter his son. The author is indifferent about John Franklin's determination. The author believes Mr. Franklin's plan reinforces his son's ambition. The author thinks John Franklin was too young to sail. Why was the Cherokee writing system important? I need your opinion Over the past decade or so, educators began to argue that the presence of students from diverse cultures enriched and broadened the education experience for all students. This would be an example of Group of answer choices b) a pluralistic society model. d) multicultural education. c) a cultural assimilation model. a) diversity. The perimeter of a square is increasing at a rate of 555 meters per hour. At a certain instant, the perimeter is 303030 meters. What is the rate of change of the area of the square at that instant (in square meters per hour) Can you please solve for X please Nine months after the death of Merv, Fred Fiddlesticks (a creditor unknown to Merv's executor) approached the executor of Merv's estate. He claimed that Merv owed him $10,000 for services performed. After reviewing his claim the executor for Merv's estate paid the claim. Which of the following requirements must be met in order to secure an estate deduction for the $10,000 paid claim?Group of answer choicesFred must present satisfactory evidence to the executor that the debt existed.Fred must present evidence that the debt was still outstanding at the time of Merv's death.The executor must approve the claim.The executor must actually pay the claim.A deduction is not availabe for this claim even though it was paid.