In the context of gps-enabled location-based services, the ability to see another person's location is an example of ________ service.

Answers

Answer 1

In the context of GPS-enabled location-based services, the ability to see another person's location is an example of a tracking service.

What are GPS-enabled location-based services?

GPS-enabled location-based services are smartphone applications that use the device's location information to deliver services, content, or advertising relevant to a user's current location.

Users can receive information on restaurants, shops, events, and other points of interest within their current location, as well as reviews, ratings, and recommendations for these locations.

Learn more about GPS at:

https://brainly.com/question/14897262

#SPJ11


Related Questions

Can you solve this challenging activity?

Can you solve this challenging activity?

Answers

Answer: See below

Explanation:

user_age = int(input('Enter your age: '))

if user_age <= 18:

   print('18 or less')

else:

   print('Over 18')

Which can be used to create a poll on a web page?
CSS
HTML
JavaScript
Text editor​

Answers

Answer:

HTML can be used to create a poll on a web page.

Answer:

HTML

Explanation:

is it important to know the basic foot massage first before giving foot spa treatment? why?​

Answers

Answer:

Just like your neck, back, and shoulders, your feet can also benefit from a regular rubdown. Foot massage improves circulation, stimulates muscles, reduces tension, and often eases pain. It also gives you a chance to check out your feet so you can get a jump on treating blisters, bunions, corns, and toenail problems.A good foot spa session releases the tension formed around the tight muscles and tendons and allows blood to flow and circulate smoothly to your other bodily organs and brain. Sliding into liquid bliss allows knots to unknot and pain for to be gently soothed away.

Hope this helps, have a wonderful day/night, and stay safe!

the question mark (?) is the wildcard character which stands for any single character in criteria. true or false

Answers

The statement "the question mark (?) is the wildcard character which stands for any single character in criteria" is true. In Excel, when we are searching for data or applying filters, we can use the question mark as a placeholder for any single character.

However, it's important to note that the question mark only stands for a single character. If we want to search for multiple characters or strings, we need to use other wildcards such as the asterisk (*) or tilde (~). The asterisk stands for any number of characters, while the tilde is used to search for actual question marks or asterisks.

In summary, the question mark is a useful wildcard character in Excel that allows us to search for any single character in criteria. It's important to understand how to use wildcards effectively to make our searches more efficient and accurate.

To know more about Excel visit:-

https://brainly.com/question/30324226

#SPJ11

The person most likely to create a Website would be a?

Answers

Answer:

Web Developers And Web Designers

You are designing a simple calculator program for young children to use. Right now, if they do something that the program didn’t expect, a message appears that reads, “User input deemed invalid.” What changes could you make so that the message would be more suitable for this audience?

Answers

The change you could make to make the message more suitable for this audience would be to identify a suitable message so that the children understand that they made a mistake using the program. For example: You made a mistake, try again.

What is a user input?

A user input is a term that refers to the action performed by a user of a digital system or a specific program. This message has been standardized to indicate to the user that he has made a mistake in pressing buttons or in handling a program.

How to modify the message?

To modify the message we must edit the base font of the program so that the message that we want to appear on the screen is different. On the other hand, we must identify a message that is simple and direct so that the children understand that they made a mistake when using the program.

What message can we put for the children?

The right message for children should clearly communicate to them what has happened without discouraging them. So a suitable example of a message would be:

You've made a mistake, try again.

Learn more about user input in: https://brainly.com/question/8789964

#SPJ1

Give at lesat 3 examples of how is NLG (Natural Language Generation) beneficial and unbeneficial (pls support your points)

Answers

NLG (Natural Language Generation) is beneficial isuch as automating content creation, personalizing user experiences, and generating insights from data but have limitations including potential biases in generated content and difficulties in capturing nuanced human language.

How is NLG beneficial and unbeneficial?

NLG offers numerous benefits including the ability to automate the generation of content across different domains, such as news articles, product descriptions, and weather reports. This helps save time and resources by eliminating the need for manual content creation.

NLG systems may have limitations. One concern is the potential for biased content generation as the models are trained on existing data that may contain biases. This can lead to the generation of discriminatory or misleading content.

Read more about Natural Language

brainly.com/question/14222695

#SPJ1

NLG is beneficial in generating content quickly and accurately, maintaining consistency, and providing a personalized user experience

NLG, or Natural Language Generation, is the method of generating natural language text using computer algorithms. It is a subfield of artificial intelligence that focuses on creating human-like texts, thereby making it easier for humans to interact with machines. Natural Language Generation is beneficial in many ways, but it also has its limitations. In this response, we will discuss the benefits and drawbacks of NLG in detail. Benefits of Natural Language Generation (NLG):

1. Efficient content creation: NLG algorithms can generate content faster than human writers, making it easier for businesses and publishers to create large amounts of content in less time. This is particularly beneficial for news and sports articles, where quick updates are required.

2. Consistent quality and tone: NLG can ensure that the content is written in a consistent tone and style, maintaining the brand's voice and values. In contrast, human writers can experience mood changes, which may influence the quality of their writing.

3. Personalization: NLG algorithms can create personalized messages and content, providing a better user experience for customers and clients. It can also be used for chatbots to provide human-like interactions with customers, improving customer satisfaction.

Unbeneficial of Natural Language Generation (NLG):1. Limited creativity: NLG algorithms can generate text based on the data it is fed. However, it lacks creativity and may fail to produce the same level of creativity as human writers. NLG cannot replace human writers' creativity, which is required in fields such as literature and poetry.

2. Dependence on data quality: NLG requires high-quality data to generate effective texts. Low-quality data may result in incorrect information and errors in the generated text.

3. Lack of empathy: NLG algorithms lack human empathy and understanding of social and emotional contexts. This may cause problems in situations that require a high level of emotional intelligence, such as counseling, medical diagnosis, and human resources. Therefore, NLG is beneficial in generating content quickly and accurately, maintaining consistency, and providing a personalized user experience. However, it has its limitations and cannot replace human creativity, empathy, and emotional intelligence.

For more questions on articles

https://brainly.com/question/25276233

#SPJ8

A typical day in programming and software development would involve

monitoring network connections.

figuring out why a computer will not turn on.

using an image-editing program.

writing code for a software program.

Answers

Answer:

writing code for a software program.

Explanation:

Software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.

Some of the models used in the software development life cycle (SDLC) are; waterfall model, incremental model, spiral model, agile model, big bang model, and V-shaped model.

The five (5) standard stages of development in software development are;

I. Analysis.

II. Design.

III. Implementation (coding).

IV. Testing.

V. Maintenance.

A typical day in programming and software development would involve writing code for a software program.

Generally, software applications or programs require a code containing series of sequential instruction to perform specific tasks, commands and processes. These sets of code are typically written by a software developer (programmer).

The purpose of cache memory is to keep handy the most recently accessed data and instructions so that the CPU can access them repeatedly without wasting time. This purpose is similar to that of the ____ of a Web browser.

Answers

Answer: Bookmark File

Explanation: Cache is like short term memory, like history on a web browser. You can manually clear it, just like on the web. If you bookmark a file though, it gets saved to memory, and you can call on it later

What should I watch on Netflix (shows for a 14 year old) ?

Answers

Answer:

The flash

Explanation:

Answer:

Im not a big horse fan but loved this show its called free rein

Explanation:

loved itttttt!

Imagine that you have just been given a super high-tech, life-sized robot that can communicate with you and accomplish tasks. Describe how this robot is a computer system using the five parts we discussed in the unit. Be sure to give specific examples.

Answers

Answer:

The robot has several inputs for speech recognition and sight like a microphone (as its ears) and cameras for sight. The robot has neural networks of programmed instructions in its processor which is used to process data received from the input devices and the result comes out as a response (like the robot speaking with a speaker as its mouth). This clearly defines the robot as a computer system.

Explanation:

A computer system is an electronic device that accepts input from a user or its surrounding, processes the data received and returns the output of the processed data.

The robot is able to receive data, process the data with its processor and responds or sends feedback to the user.

Match the parts of the e-mail message with the letters that label them. Note: your answer will be a number, not a letter!

1. A. 2.B. 3.C. 4.D. 5.E.

1)E-mail
2)the body of the message is typed here
3)indicates the importance of the message
4)provides the messages purpose 5)shows the message still needs attention.

Answers

Note that the above parts of the e-mail message with the letters that label them is matched accordingly:

A. 2

B. 1

C. 4

D. 3

E. 5

Why are emails important?

Emails are a widely used communication tool, and they are important for several reasons.

First, they allow people to send and receive messages quickly and easily, regardless of distance. This is particularly important for business, where timely communication is critical for success.

Second, emails provide a written record of conversations and information, which can be stored and easily retrieved for future reference.

Third, emails are a cost-effective way to communicate, as they eliminate the need for paper, printing, and postage.

Finally, emails are flexible and can be used for a variety of purposes, including sending documents, scheduling meetings, and keeping in touch with friends and family.

Learn more about Emails:

https://brainly.com/question/14380249

#SPJ1

how many 2/8 pound patties can she make from 7/8 of a pound of hamburger

Answers

Answer:

3/8

Explanation:

Because 2 can't go into 7, the next best thing is 6, so 2x3 is 6 with 1/8 left over~~~~~hope this helps :) pls brainlist

in the source data worksheet sort the data alphabetically by customerid and then by product.

Answers

To sort the data alphabetically by the customer ID and then by-product in the source data worksheet, follow these steps:

1. Open the source data worksheet in your spreadsheet software.
2. Click on any cell within the data range you want to sort.
3. Navigate to your spreadsheet software's "Data" tab or menu.
4. Click the "Sort" button or option to open the Sort dialog box.
5. In the Sort dialog box, select "Customer ID" from the first drop-down list under "Sort by" or "Column."
6. Choose "A to Z" or "Ascending" to sort alphabetically.
7. Click on the "Add Level" or "Then by" button to add another sorting criterion.
8. Select "product" from the second drop-down list.
9. Choose "A to Z" or "Ascending" to sort alphabetically.
10. Click "OK" to apply the sorting.
Your data in the source data worksheet is sorted alphabetically by the customer ID and then by product.

Learn more about Worksheet here: brainly.com/question/13129393.

#SPJ11

Please provide an idea for both a personal project and a group
project. The scope needs to be reasonable in size, as the time to
complete the project and the resources will be limited. (you can
provid

Answers

A personal project idea is to create a personal finance tracker to track income and expenses. A group project idea is to create a community garden in a public space, requiring planning, planting schedules, and recruiting volunteers to provide fresh produce for the community.

Personal Project Idea:
Create a personal finance tracker: This project involves creating a spreadsheet or using a personal finance app to track income and expenses. The tracker should include categories for expenses such as rent, food, utilities, entertainment, and savings, as well as a budget for each category. The tracker can be customized to meet individual needs and can be used to identify areas where spending can be reduced and savings can be increased.

Group Project Idea:
Community garden project: This project involves creating a community garden in a public space such as a park or schoolyard. The project would require planning and organizing planting schedules, obtaining necessary supplies such as soil, seeds, and gardening tools, and recruiting volunteers to help with planting, maintenance, and harvesting. The garden can be used to provide fresh produce for the community and can also serve as an educational resource for local schools.

To know more about personal projects, visit:
brainly.com/question/32301757
#SPJ11

you manage a windows server. for the d:\reports\finances.xls file you explicitly grant the mary user account the allow modify ntfs permissions. you need to move the file from the existing folder to the d:\confidential folder. you want to keep the existing ntfs permissions on the file. you want to accomplish this with the least amount of effort possible. what should you do?

Answers

This will paste the file from the clipboard to the D:\Confidential folder. The file will be moved to the D:\Confidential folder with the same permissions as in the original location.

You need to simply move the file from the existing folder to the D:\Confidential folder without modifying the existing permissions on it. It is possible to keep the existing ntfs permissions on the file while moving it from the existing folder to the D:\Confidential folder. It is simple to accomplish this with the least amount of effort possible without modifying the existing permissions on the file. What should you do to accomplish this You must perform the following procedure to move the file from the existing folder to the D:\Confidential folder without modifying the existing permissions on it Firstly, locate the file that you want to move, which is D:\Reports\Finances.xls.Secondly, right-click on the file, and select Copy from the context menu. The file will be copied to the clipboard.Thirdly, open the D:\Confidential folder where you want to place the file, and right-click on it. Select the Paste option from the context menu.

learn here about Confidential folder here:

https://brainly.com/question/29588297

#SPJ11

________ are professional accountants who serve the general​ public, not one particular company.

Answers

Certified public accountants

(25 POINTS)Which statement best reflects the importance of following safety guidelines?

Workplace injuries can result in losses to an organization’s profits.

OSHA responds to complaints of unsafe work environments, and can fine or take negligent employers to court.

Every year, thousands of people die as a result of workplace injuries.

Using equipment safely is faster and makes work more efficient.

Answers

Answer:

I think, Every year, thousands of people die as a result of workplace injuries.

Answer:

B

Explanation:

can someone help me complete this lab tutorial?

Answers

nskskakakskssnnsnskaak

the value in this type of local variable persists between function calls._____

Answers

Answer:

lotería sturnds

Explanation:

una de los más fuertes del mercado

Select the correct answer.
Which of these components is utilized in use case diagrams?
A.
classes
B.
components
C.
flow
D.
actors

Answers

Answer:

B.components

Explanation:

Taking a business online can involve many different steps. When starting out, which activity could be a part of this process?

A
Sending flyers with your web address to customers

B
Creating a business listing in online local directories

C
Increasing print and billboard advertising

Building a team of digital advertising experts

Answers

Answer:

I think it's building a team of digital advertising experts

Explanation:

if you build a team that has good knowledge and enough experience in digital advertising, they will help spread you business in no time as the world begins using more and more of the Internet and social media

complete the implementation of a Bag collection. Bag.java 1 import java.util.Arraylist; I ∗∗
* An implementation of a Bag based using an ArrayList as the underlying collection * Cauthor Dr. Gerald Cohen, Ph.D. * eversion 1.2 * eparam * public class Bag implements BagADT \{ 11 12 13 14 *ublic Bag() \& pu \} * Return number of elements in the bag - ereturn " public int size() ( 3θ 31 * Sees whether this bag is full. * ereturn true if the bag is full, or false if not * Coverride public boolean isfull() \{ \} I** Sees whether this bag is empty. * ereturn true if the bag is empty, or false if not * coverride public boolean isEmpty() \{ \} . Adds a new entry to this bag. - eparam newentry the object to be added as a new entry - ereturn true if the addition is successful, or false if not - a0verride public boolean add(T newEntry \} 67 68 O0 70 * Removes one unspecified entry from this bag, if possible. * areturn either the removed entry, if the removal was successful, or null * Qoverride public T remove() \{ return removeRandom(); \} /** Removes one occurrence of a given entry from this bag, if possible. * eparam anentry the entry to be removed * greturn true if the removal was successful, or false if not. */ (O)verride public boolean remove(T anEntry) \{ \} . Removes and returns a random elenent from this bag - areturn object if the renoval was successfut. or null if not * ceret Coverride public T removeRandom() £ int size = size() If ( size =θ){ ! return natl: int index = (int) (Math.random(h) + sizal):

Answers

Here's the completed implementation of the Bag class based on an ArrayList:

import java.util.ArrayList;

public class Bag<T> implements BagADT<T> {

   private ArrayList<T> bag;

   public Bag() {

       bag = new ArrayList<>();

   }

   public int size() {

       return bag.size();

   }

   public boolean isFull() {

       return false; // Bag implemented with ArrayList is never full

   }

   public boolean isEmpty() {

       return bag.isEmpty();

   }

   public boolean add(T newEntry) {

       return bag.add(newEntry);

   }

   public T remove() {

       return removeRandom();

   }

   public boolean remove(T anEntry) {

       return bag.remove(anEntry);

   }

   public T removeRandom() {

       int size = size();

       if (size == 0) {

           return null;

       }

       int index = (int) (Math.random() * size);

       return bag.remove(index);

   }

}

In this implementation, the Bag class implements the BagADT interface. It uses an ArrayList to store the elements of the bag.

The methods size, isFull, isEmpty, add, remove, removeRandom, and remove are implemented as per the contract defined in the interface.

Note that the isFull method always returns false since an ArrayList can dynamically grow and doesn't have a fixed capacity. The removeRandom method uses Math.random() to generate a random index within the valid range of the bag's size and removes the element at that index.

Make sure to have the BagADT interface defined with the necessary method signatures before using this implementation.

#SPJ11

Learn more about ArrayList:

https://brainly.com/question/30000210

plsss helppp me with thisss plsss

plsss helppp me with thisss plsss

Answers

Answer:

Here is an example of what you're asking in Python.

import random

def buildList(x):

   # Create an empty list to store the random integers

   random_list = []

   # Use a for loop to generate x random integers

   for i in range(x):

       # Append a random integer between 100 and 199 to the list

       random_list.append(random.randint(100, 199))

   return random_list

# Get the number of random integers from the user

x = int(input("Enter the number of random integers to generate: "))

# Call the buildList function to generate the random integers

random_integers = buildList(x)

# Print the list of random integers

print(random_integers)

Explanation:

This script uses the 'random.randint()' function from the built-in 'random' module to generate a random integer between 100 and 199, and then it saves the generated random integers in a list. The script also prompts the user for the number of random integers to generate and calls the buildList function with the user input. Finally, it prints the list of random integers.

The use of CPT Category II codes does not affect reimbursement and is: Multiple Choice mandatory required optional None of these are correct

Answers

The use of CPT Category II codes does not affect reimbursement and is optional.

The correct answer to the question is that the use of CPT Category II codes is optional.

1. CPT Codes: Current Procedural Terminology (CPT) codes are a standardized set of codes used to describe medical procedures and services provided by healthcare professionals. These codes are used for billing and reimbursement purposes.

2. CPT Category II Codes: Category II codes are a subset of CPT codes that are used to capture additional data elements related to performance measurement and quality reporting. These codes are designed to provide information on specific clinical actions or outcomes.

3. Reimbursement Impact: Unlike CPT Category I codes, which are used for reporting actual procedures and services and directly affect reimbursement, Category II codes do not have a direct impact on reimbursement. They are used for informational and quality reporting purposes.

4. Optional Usage: Healthcare providers have the option to use Category II codes when they want to provide additional data for quality improvement initiatives or participate in performance measurement programs. However, their use is not mandatory, and providers can choose whether or not to include them in their billing and coding practices.

In summary, the use of CPT Category II codes is optional and does not have a direct impact on reimbursement. Healthcare providers can choose to include these codes when they want to provide additional data for quality reporting or performance measurement.

To learn more about CPT category, click here: brainly.com/question/15047884

#SPJ11

Although not an exact equivalent, the first column in a vlookup table_array serves a role that is similar to what database concept?.

Answers

It is most similar to a database primary key.

The first column in a vlookup table_array serves a role that is similar to the concept of A key

What is VLOOKUP?

This is known to be one of the most flexible way to get back data that is often use through the VLOOKUP function.

This is one that shows the value a person want to lookup in a tableThe term VLOOKUP searches for any kind of matching value in the leftmost column of the table, and then gets it back that is that same value in the same row.

Learn more about VLOOKUP  from

https://brainly.com/question/20566143

Roland knew that the code to his sister toy safe was only two digits ong he was able to crack the safe open by attempting every two digit code until he found the correct one what method code breaking did Roland use

Answers

Answer:

Brute-force attack

Explanation:

a brute force attack is when you use a bunch of random passwords in the hopes of eventually getting it right

Answer:

Permutation cipher

This is a complete enumeration of all possible keys of small length (we have a length of 2).

The first digit is 1, 2, 3, ..., 8, 9.

Second digit 0, 1, 2,…, 8, 9

Number of options: 9*10 = 90

10, 11, 12, … 97, 98, 99

the recovery option in the services tool allows you to specify which action is taken after first, second, and subsequent failures. True or False

Answers

True. The Recovery option in the Services tool allows you to specify what action Windows takes after the first, second, and subsequent failures of a service.

What is Services tool ?

The Services tool is an application that is designed to help administrators manage and monitor Windows services. It is used to start, stop, pause, and restart services on a computer running the Windows operating system. It can also be used to configure the startup type of services, as well as to enable or disable services. Additionally, the Services tool provides detailed information about each service, such as its status, description, and dependencies. This tool can be used to troubleshoot any service-related issues, as well as to manage services efficiently. It is a valuable tool for system administrators, as it provides a quick and easy way to manage services on their computers.

The available actions are: take no action, restart the service, run a program, or restart the computer. You can also specify the time for the service to wait before taking an action.

To learn more about Services tool
https://brainly.com/question/30505572
#SPJ4

You have a technical interview for a new position in digital media. One of the questions you are
asked is this: “A client asks your advice as to whether their promotional video should be fixed or
streaming and confesses that they aren't entirely clear on the difference between the two. What
would you advise them and why?" How would you respond to this question?

You have a technical interview for a new position in digital media. One of the questions you areasked

Answers

In this context, I believe "Fixed" would mean "Fixed bitrate", and "streaming" would mean "Variable/adaptive bitrate".

Fixed would be a good solution when you want the highest quality possible in a controlled environment or in a reduced size media storage, like a physical media.

Adaptive streaming would be the best solution for online streaming, so your client can provide the best user experience based on the end user internet bandwidth.

let’s say you’re working on a post for a campaign, and want to create several variations of that post, without altering the original. which technique or feature would you use?

Answers

A/B testing or split testing is a function that may be used to make multiple versions of a post for a campaign without changing the original. A/B testing is producing many copies of a post.

(or any other digital asset) with minor changes to the content or design, then testing these variants against one another to see which one performs better in terms of engagement, conversions, or other metrics. You can run A/B testing using a variety of programs and websites that provide this function, including  Optimize, Optimizely, and VWO. With the help of these tools, you may make different versions of a post and randomly show them to a portion of your audience while monitoring how each version performs working on a post for a campaign, and want to create several variations of that post.

learn more about testing  here:

https://brainly.com/question/29309134

#SPJ4

Other Questions
plz help i need to write an essy about one of the six major biomes i dont care what u choose. Help me please now please PLS HELP pq has endpoints at p(-5,4) and q(7,-5).what is the midpoint of pq? what are the cordinates of the point 2/3 of the way from p to q? It is recommended to use air container for storing oil for long time . Give scientific reason. Simplify 2(x+3)-2(x-6) The First Reconstruction Act divided the South into how many military districts?fivethreetenseven An aggregate supply curve depicts the relationship between A the price level and the aggregate quantity supplied, given other things constant. B household expenditures and household income, given other things constant. C) the price level and nominal GDP, given other things constant.. D the price level and the aggregate quantity demanded, given other things constant.. With respect to the stars, the MoonA. circles the EarthB. and the Earth circle each otherC. remains stationary while the Earth circles about itD. does not rotate about its own axis as the Earth does I need help. I dont understand this part of my homework.. asap.. tyy f(x)= x2 10x -11g(x)= x+1Find (f g)(x) How does systematic desensitization help patients? Lucy is a witness in a criminal trial. She replies to one question from the prosecutor by saying, "I refuse to answer that question on thegrounds that it might incriminate me."What protection provided for in the Bill of Rights has Lucy invoked?the right to a speedy and public trialthe right not to testify against herselfthe right not to be put in double jeopardythe right to confront witnesses against her Keith Hernandez has asked Jerry and Kramer to help him move into a new apartment on Sunday morning. He has asked them both in case one of them does not show up. From past experience, Keith knows that there is a 41% chance that Jerry will not show up and a 31% chance that Kramer will not show up. Even though Jerry and Kramer know each other, their decisions can be assumed to be independent.a. What is the probability that both Jerry and Kramer will show up? (Round your answer to 2 decimal places.)Probability b. What is the probability that at least one of them will show up? (Round your answer to 2 decimal places.)Probability c. What is the probability that neither Jerry nor Kramer will show up? (Round your answer to 2 decimal places.)Probability If an ad is overly detailed in it's portrayal of a target market, it might fail because it will be perceived as too _______. Which of the events happened first?A. the founding of the Jamestown colonyB.Europeans using both tobacco and potatoesC.thousands of Native Americans dying from new diseasesD.Columbus landing in Hispaniola Help me ;-;Find (2)(3) After randomly selecting 1,009 adults and surveying each of them, 545 of them indicated that they were not comfortable with a drone delivering packages to them. The pollster concluded from the data that precisely 54 percent of all American adults are therefore not comfortable having drones make deliveries to them.Determine whether the pollsters conclusion makes sense. Address whether the pollster is correct in drawing this conclusion based upon the given information. In preparing your answer, include the following terms:statistics and parameters,estimation,margin of error,and any other concepts from the assigned readings and/or class sessions you deem helpful and appropriate. Assume that you are the Managing Director of a company dealingwith electronic equipment. Write an email to Inform all youremployees about the newcommunity hall which the company is going to inaugur Find the slope intercept form of the equation of the line thats has the given properties (1 , 3) m=1/4 HELP ME PLEASE LOOK AT THE IMAGE ABOVE PLEASE I NEED TO TURN IT IN SOON