pictures that you can click on to tell your computer what to do.

Answers

Answer 1
what do you mean ? I’m confused..
Answer 2
You might need to add picture so we can see what you need

Related Questions

Question 1 (1 point)
These errors can be difficult to identify, because the program still runs but it does
not do what you expect it to do.
1.Runtime
2.Logic
3.Syntax
4.Executing

Answers

Answer:

Logic

Explanation: I took the test in k12 and got it correct

which device would you most likely find in the home of a hearing person but not in the home of a deaf person today?a counter timer wireless speaker system bed shakera teletypewriter

Answers

Answer: some deaf people don’t have speakers or telephones  

Explanation:

1-DESIGN TAB....................2-LAYOUT TAB .

1-wordart styles,

2-table size,

1-Table styles,

2-alignment,

1-draw borders,

2-rows and columns

1-DESIGN TAB....................2-LAYOUT TAB . 1-wordart styles,2-table size,1-Table styles,2-alignment,1-draw

Answers

design tab

wordart stylestable stylesdraw border

layout tab

table sizerows and columnsalignment

Answer:

The person above is correct.

Explanation:

1-DESIGN TAB....................2-LAYOUT TAB . 1-wordart styles,2-table size,1-Table styles,2-alignment,1-draw

you are working with a windows nano server installation and have been tasked with removing the iis package as the server will no longer provide these services. what two cmdlets along with their associated options should you utilize in order to disable and remove this service? (choose two.)

Answers

To disable and remove the IIS package on a Windows Nano Server installation, you can use the following two cmdlets:

Disable-WindowsOptionalFeature.Uninstall-WindowsFeature.

Disable-W!ndows Optional Feature: This cmdlet can be used to disable an optional feature or a group of optional features in the current edition of W!ndows. You can use the -Feature Name option to specify the name of the optional feature that you want to disable.

Uninstall-Windows Feature: This cmdlet can be used to uninstall a Windows feature or a group of features. You can use the -Name option to specify the name of the feature that you want to uninstall.

IIS (Internet Information Services) is a web server software developed by Microsoft. It is included with Windows operating systems and is used to host and serve web content. On a Windows Nano Server installation, the IIS package includes the components and features needed to host and serve web content, such as the HTTP protocol stack, the web server, and the web application runtime.

Learn more about IIS, here https://brainly.com/question/29572266

#SPJ4

PLEASE HELP MEH IDK WHAT TO DO!!!!! PLEASE!!!!!!!!!!!!

What is the one question you need to ask yourself when comparing your store's items to a competitor's?

A. "What kind of customers do they attract?"

B. "How much more expensive is their product as opposed to mine?"

C. "Why would I buy my store's merchandise instead of theirs?"

D. None of these.

Answers

I would ask myself c
This a personal question because I would go with B.

which task is the mac layer responsible for in an 802.15.4 device?

Answers

The MAC (Media Access Control) layer in an 802.15.4 device is responsible for managing access to the shared wireless medium and coordinating communication between devices.

In an 802.15.4 device, the MAC layer performs several key tasks. Firstly, it governs how devices access the shared wireless medium, ensuring fair and efficient utilization of the available bandwidth. The MAC layer defines mechanisms for contention-based and scheduled access methods, such as carrier sense multiple access with collision avoidance (CSMA-CA) and time-division multiple access (TDMA). Additionally, the MAC layer handles device addressing, frame synchronization, error detection, and acknowledgment of received data. It also manages the formation and maintenance of network topologies, including device association and disassociation, as well as network synchronization. Overall, the MAC layer plays a crucial role in facilitating reliable and efficient communication between devices in an 802.15.4 wireless network.

learn more about MAC layer here:

https://brainly.com/question/29243087

#SPJ11

Which statement describes one of the responsibilities of a computer programmer?

A.
providing remote technical support to users
B.
installing, configuring, and monitoring network systems
C.
using computer-generated software to create special effects
D.
using coding languages to create software for retrieving data
E.
designing and implementing databases

Answers

Answer:

d i think

Explanation:

4. Each mobile device described in this chapter requires that the user have a/an ____________________ associated with services offered by the publisher of the mobile OS in use on the device.

Answers

All mobile devices requires that end users have an account that is associated with services offered by the publisher of the mobile operating system (OS) installed on the device.

A mobile device can be defined as a small, portable, programmable electronic device that is designed and developed for the transmission and receipt of data signals (messages) over a network. Thus, a mobile device must be designed as a handheld device with communication capabilities.

Additionally, mobile devices such as smartphones have a mobile operating system (OS) installed on them, so as to enable them perform various tasks such as:

Taking pictures and creating video files.Typing and sending both text and multimedia messages.Browsing the Internet.Making both audio and video calls.

As a general rule, all mobile devices requires that end users have a registered account associated with the services offered by a publisher of the mobile operating system (OS) installed on the device. This registered account serves as a unique identifier and it connects an end user with the publisher of the mobile operating system (OS).

Read more: https://brainly.com/question/4922532

you are troubleshooting a network connectivity issue on a client computer. you cannot ping the computer and the computer cannot ping any other computers on the network, but the network interface is showing a valid network connection. you run the ipconfig program and see that the computer's ip address is 169.254.100.19. what do think the problem is likely to be?

Answers

Based on the information provided, it is likely that the client computer is experiencing a problem with obtaining a valid IP address from the DHCP server.

The IP address 169.254.x.x is a default address range used by Windows when it cannot obtain a valid IP address from the DHCP server. This address range is known as Automatic Private IP Addressing (APIPA) and is used as a fallback mechanism for network devices when they are unable to obtain a valid IP address from the DHCP server. To resolve the issue, you can try the following steps ,Check the network settings on the client computer to ensure that it is configured to obtain an IP address automatically from the DHCP server.

When a computer is configured to obtain an IP address automatically and fails to receive one from a DHCP server, it will self-assign an IP address in the 169.254.x.x range. This is known as APIPA. In this case, the computer's IP address is 169.254.100.19, which falls within the APIPA range. This suggests that the computer is unable to communicate with the DHCP server to obtain a valid IP address, leading to the network connectivity issue. Check the network cable and connections to ensure they are secure.
To know more about DHCP server visit :

https://brainly.com/question/30637949

#SPJ11

In this troubleshooting case the client is configured to use DHCP but no DHCP server is responding.

What is DHCP Server?

The full meaning of  DHCP is  Dynamic Host Configuration Protocol server.

It allows devices to obtain an IP address dynamically, eliminating the need for manual IP address configuration.

The DHCP server manages a pool of IP addresses and leases them to devices on a temporary basis. It simplifies network administration and enables efficient IP address allocation in a network environment.

Learn more about DHCP Server at:

https://brainly.com/question/30602774

#SPJ4

Data digitalization is one of the techniques of the 21st century to process and store physical data. It’s however not without its shortcoming.

State at least six ways by which data digitalization are at disadvantage

Answers

digitization is the process of changing from analog to digital format.” This process creates digitized data “without any different-in-kind changes to the process itself

After the computer process the data, the result is first save in

Answers

Answer:

Answer

Saved In Computer

During registration at Tech every quarter, students in the Department of Management must have their courses approved by the departmental advisor. It takes the advisor an average of 5 minutes (exponentially distributed) to approve each schedule, and students arrive at the advisor's office at the rate of 7 per hour (Poisson distributed). Compute L, Lq,W,Wq, and rho. (Round rho answer to 0 decimal places, e.g. 5% and other answers to 2 decimal places, e.g. 5.50.) L Lq W hr Wq hr rho %

Answers

To calculate the requested values, we can use the formulas for an M/M/1 queueing system:

Arrival rate (λ) = 7 students per hour

Service rate (μ) = 1 / (average service time) = 1 / 5 minutes per student = 12 students per hour

Utilization (ρ) = λ / μ = 7 / 12 = 0.5833 ≈ 58.33%

L = λ / (μ - λ) = 7 / (12 - 7) = 1.4

Lq = ρ^2 / (1 - ρ) = (0.5833^2) / (1 - 0.5833) = 0.1979 ≈ 0.20

W = L / λ = 1.4 / 7 = 0.20 hours ≈ 12 minutes

Wq = Lq / λ = 0.1979 / 7 = 0.0283 hours ≈ 1.70 minutes

Now, let's summarize the results:

L = 1.40

Lq = 0.20

W = 0.20 hours or 12 minutes

Wq = 0.0283 hours or 1.70 minutes

ρ = 58.33%

Learn more about formulas  here

https://brainly.com/question/20748250

#SPJ11

Today, scientists agree that good research is ethical in nature and is guided by basic respect for human dignity and safety. However, as you read in the Tuskegee Syphilis Study, this was not the case. Discuss any THREE (3) the ethical violations in the study

Answers

Answer:

Ethical violations in the Tuskegee Syphilis Study

1)  Discrimination. Syphilis was recognized as a disease with a major impact on the afro-descendant and in poor conditions population. The studied population was not treated fairly, they were selected from a vulnerable group. Against the bioethical principles of justice.

2) The ethical principle of beneficence was violated since the participants did not have a real benefit from their participation and in the case of the sick people, they had no option to be treated (in 1947 penicillin was already used as a treatment).

Due to the ignorance of the study, the general population was affected by the transmission of the infectious disease.

3) There was no informed consent against the autonomy principle of clinical Ethic. People were studied for about 40 years (1932 - 1972) with no information about it.

Explanation:

It was a study conducted by the Public Health Service in the city of Tuskegee (Alabama). The objective was the study of the natural progression of syphilis.

The controversies regarding this study were related to the fact that it was conducted in an African American and literate population that was not informed and did not have access to treatment.

Write a python program to check whether the number is divisible by 7. If its divisible, print its divisible otherwise find previous number and the next number which is divisible by 7​

Answers

f = int(input("Enter a number: "))

if(f%7==0):

   print("It's divisible by 7.")

else:

   if(f<7):

       print("7")

   else:

       print(str(f-(f%7))+", "+str(f+(7-(f%7))))

Read the Python program below: num1 = int(input()) num2 = 10 + num1 * 2 print(num2) num1 = 20 print(num1) Question 1 When this program is executed, if the user types 10 on the keyboard, what will be displayed on the screen as a result of executing line 3? A. 30 B. 40 C. 10 + 10 * 2 D. 10 + num1 * 2

Answers

Answer

B. 30

Explanation:

Assuming the code is written like this:

1. num1 = int(input())

2. num2 = 10 + num1 * 2

3. print(num2)

4. num1 = 20

5. print(num1)

Line 3 will print 30 when the number 10 is inputted at line 1.

Remember to use Order of Operations! :)

In the event of a file catastrophe, ____ can be used to restore the file or database to its current state at the time of the last backup.

Answers

In computer technologies, there are some ways that data which has been lost, can be retrieved. But not in all cases. In the event of a file catastrophe, recovery procedures can be used to restore the file or database to its current state at the time of the last backup.

In computing, data recovery is simply known as the method of saving or  salvaging data that are inaccessible, lost, corrupted, damaged or formatted from secondary storage, removable media etc.

This form of recovery often  restores data that has been lost, accidentally deleted etc.

In Firm or organization IT, data recovery is simply the restoration of data to a desktop, laptop, server or external storage system from a backup.

Learn more from

https://brainly.com/question/17968818

research on the current issue on the reshuffle in the leadership of minority in parliament​

Answers

The current issue on the reshuffle in the leadership of the minority in the US parliament is tension over representation and diversity.

How can the above issues be resolved?

Note that the issue can be resolved by prioritizing diversity and representation in leadership positions, and ensuring that underrepresented communities have a voice in decision-making.

This can be achieved through measures such as affirmative action, mentorship programs, and transparent hiring and promotion processes. It is also important to address any underlying biases or discrimination that may be hindering progress towards greater diversity and inclusivity.

Open communication and a willingness to listen to all perspectives can also help resolve tensions and build stronger, more representative teams.

Learn more about US parliament:

https://brainly.com/question/673870

#SPJ1

What is 4991 rounded to the nearest thousand

Answers

Answer:

5000

Explanation:

Answer: 5000

Explanation:

This is the answer because of the nine’s.

This sentence is an example of which type of narrative point of view? I did not know what the future held of marvel or surprise for me.​

Answers

Answer: First person

Explanation:

First-person narrative point of view is the mode of storytelling whereby the storyteller recounts the events that occured based on their own point of view. In this case, pronouns such as I, we, our, us and ourselves are used in telling the story.

In the sentence given " I did not know what the future held of marvel or surprise for me" shows that the person is recounting the event based on his or her own point of view. This is therefore, a first person narrative.

what country is reputed to be the home of apple strudel?

Answers

The country reputed to be the home of apple strudel is Austria. Apple strudel, or Apfelstrudel in German, is a famous pastry that is often associated with Austrian cuisine. This delicious dessert consists of a flaky, buttery pastry filled with thinly sliced apples, sugar, cinnamon, and sometimes raisins and nuts.

It is typically served warm and is often accompanied by a dusting of powdered sugar and a side of vanilla sauce or whipped cream. Apple strudel has become an iconic dish in Austrian culinary tradition and is enjoyed both locally and internationally.

Austria's claim to being the home of apple strudel is rooted in its historical connection to the dish. The origins of strudel can be traced back to the Austro-Hungarian Empire in the 18th century. It is believed that apple strudel was introduced to Vienna, the capital city of Austria, by Hungarian bakers who brought their pastry-making skills to the region. Over time, apple strudel became a popular dessert in Austrian cuisine and an integral part of Austrian cultural heritage. Today, it is considered one of the quintessential Austrian dishes and is enjoyed by locals and visitors alike in traditional Viennese cafes and pastry shops.

Learn more about quintessential, here:

brainly.com/question/20235560

#SPJ11

unauthorized disclosure of sensitive information data
which of the following risks is least likely to cause a financial misstatement (in other words, an overstatement or understatement of a $ amount for a GL account)?

Answers

Among the following risks, the unauthorized disclosure of sensitive information data is least likely to cause a financial misstatement (an overstatement or understatement of a dollar amount for a GL account).

Financial misstatements typically result from errors, fraud, or other risks that affect the accuracy and completeness of financial records. Unauthorized disclosure of sensitive information data, while a significant concern for data security and privacy, is less likely to directly impact the financial reporting process or the dollar amounts associated with general ledger (GL) accounts. Financial misstatements are more commonly caused by factors such as errors in recording transactions, misapplication of accounting principles, intentional manipulation of financial data, or inadequate internal controls.

However, it is important to note that unauthorized disclosure of sensitive information data can still have serious consequences, including reputational damage, regulatory penalties, and potential indirect financial implications. Organizations should implement appropriate security measures to safeguard sensitive data and ensure compliance with data protection regulations.

To know more about general ledger (GL) accounts

brainly.com/question/30487462

#SPJ11

edhesive code practice 3.2

Answers

This question is already answered, just look it up here on brainly!

For this assignment, you will create a function to calculate the maximum length of the third side of a triangle and its hypotenuse. You will collect two side lengths from the user

Answers

A function in C++ that speaks to the above tasks is

#  include <iostream>

#i nclude <cmath>

#include   <iomanip>

using namespace std;

// Function to calculate maximum length of third side and hypotenuse

double calculateThirdSideAndHypotenuse(double side1, double side2) {

   double maxLength = side1 + side2 - 1;

   double hypotenuse = sqrt(pow(side1, 2) + pow(side2, 2));

   return hypotenuse;

}

// Main function

int main() {

   // Program information

   cout << "// Name: Your Name" << endl;

   cout << "// Date: 27th April 2023" << endl;

   cout << "// Program Name: Triangle Calculation" << endl;

   cout << "// Description: Calculates maximum length of third side and hypotenuse of a triangle" << endl << endl;

   

   // Collect side lengths from user

   double side1, side2;

   cout << "Please enter the two known sides of the triangle: ";

   cin >> side1 >> side2;

   

   // Calculate maximum length of third side and hypotenuse

   double maxLength = calculateThirdSideAndHypotenuse(side1, side2);

   double hypotenuse = round(calculateThirdSideAndHypotenuse(side1, side2) * 100) / 100;

   

   // Display results

   cout << "The maximum length of your third side is: " << maxLength << endl;

   cout << "Your triangle's hypotenuse is: " << fixed << setprecision(2) << hypotenuse << endl;

   

   return 0;

}

How does the above C++ program above work?

Take note that e above   function will calculate the maximum length of the third side of a triangle and its   hypotenuse.

It also includes some error checking to ensure that the values entered are valid.

Learn more about function  at:

https://brainly.com/question/16757242

#SPJ4



Full Question
For this assignment, you will create a function to calculate the maximum length of the third side of a triangle and its hypotenuse. You will collect two side lengths from the user. The programming language is C++


Requirements:


Formula
Maximum length = side 1 + side 2 - 1
*Hypotenuse = V(side1^2 + side^2) .

1. Collect the length of two sides of a triangle from the user.

2. Within one function, calculate the maximum third length of a triangle and its hypotenuse. Return the value of the hypotenuse to main().

3. Display the results for the triangle's maximum third side and its hypotenuse in main(). Round the hypotenuse to the nearest 10th

4. Run three sets of test data through your program.

5. Output must be labelled and easy to read as shown in the sample output below.

6. Program must be documented with the following:

// Name

// Date

// Program Name

// Description
7. Flowchart the logic of the program


Please enter the two known sides of the triangle: 8  10
The maximum length of your third side is: 17

Your triangle's hypentuse is: 12.81


Please enter the two known sides of the triangle: 3 6

The maximum length of your third side is: 8

Your triangle's hypotenuse is: 6.71

Please enter the two known sides Of the triangle: 12  19

The maximum length of your third side is: 30

our triangle's hypotenuse is: 22.47

help
pls need quickly

helppls need quickly

Answers

Answer:

Themes

Explanation:

In the slide thumbnail pane on the left, select a slide.On the Design tab, in the Themes group, click the More button (illustrated below) to open the entire gallery of themes:Point the mouse at the theme you want to apply. Right-click it, and then select Apply to All Slides.

(Mulitple choice) in the following list of attributes in an entity what type of normalization issue would exist if attribute 3 determined attribute 4?
Table 1 -
PK - Attribute 1
Attribute 2
Attribute 3
Attribute 4
Attribute 5
Answers:
A) 1st normal form
B) 2nd normal form
C) 3rd normal form
D) Boyce Codd Normal form

Answers

If attribute 3 determines attribute 4 in the given list of attributes, it indicates a normalization issue related to functional dependencies. The specific normalization issue would be addressed in the explanation.

The type of normalization issue that would exist if attribute 3 determines attribute 4 in the given entity is related to functional dependencies. Functional dependency occurs when the value of one attribute determines the value of another attribute in the same table.

In this case, if attribute 3 determines attribute 4, it implies that the value of attribute 4 can be uniquely determined based on the value of attribute 3. This violates the principles of normalization, specifically the second normal form (2NF).

The second normal form (2NF) requires that each non-key attribute in a table is functionally dependent on the entire primary key and not on any subset of the key. If attribute 3 determines attribute 4, it means that attribute 4 is functionally dependent on a subset of the key (attribute 3), which violates the 2NF.

Therefore, the correct answer would be B) 2nd normal form, as it represents the normalization issue where attribute 3 determines attribute 4, violating the principles of the 2NF.

Learn more about second normal form here:

https://brainly.com/question/32284517

#SPJ11

Which command can an administrator issue on a Cisco router to send debug messages to the vty lines?answer choices- terminal monitor- logging console- logging buffered- logging synchronous

Answers

These messages must be sent to the terminal lines using the terminal monitor command.

What do you meant by terminal monitor ?

On the VTYSH session, the terminal monitor is utilized to dynamically display a selection of logs. Only the live or active logs are seen when the switch's terminal monitor capability is activated. On the SSH session or console session, these logs are visible.

Description. For the current terminal session (i.e., VTY or asynchronous line), this command permits the display of debugging messages and system error messages.

The command no logging console can be used to turn off console logging; it does not apply to the console itself. How do I access Ubuntu Monitor from the terminal? Simply enter any name for System Monitor followed by the command gnome-system-monitor, apply. As soon as you click disabled, select any keyboard shortcut, such as Alt + E. Pressing Alt + E will quickly launch System Monitor.

To learn more about terminal monitor refer to:

https://brainly.com/question/29650773

#SPJ4

complete the truth table for the following logic circuit.

complete the truth table for the following logic circuit.

Answers

Answer:

A  B   X

0   0   0

0   1    1

1    0   1

1    1    1

Explanation:

If A=1, the output X is 1 as well, due to the OR gate. So that takes care of the last two rows.

If B=0, the AND gate will be 0 so it cannot contribute to X becoming 1. So that takes care of the first row (X=0).

For A=0, B=1, the AND gate will be 1, so X will be as well. You can see that the truth table matches that of a simple OR gate, X=A+B

Rather than exercising the circuit like this, you can also find this outcome algebraically:

X = (A + (A' * B)) [apply distributive law]

X = (A + A')*(A + B) [complement law]

X = 1 * (A + B)

X = A + B

What is output? Select all that apply. c = 0 while (c < 5): c = c + 1 print(c) 6 5 2 4 3 0 1

Answers

Answer:

2 4 3 0 1

Explanation:

What is the name of the item that supplies the exact or near exact voltage at the required wattage to all of the circuitry inside your computer?

Answers

Answer:

It's the power supply

Explanation:

The power supply is what essentially enables the computer to operate. It is able to do that by converting the incoming alternating current (AC) to direct current (DC) at the correct wattage rating that is required by the computer to function. The power supply is a metal box that is generally placed in the corner of the case.

as a network analyst, you want the acl (access control list) to forward the icmp (internet control message protocol) traffic from host machine 2.2.2.2 to host machine 5.5.5.5. which of the following commands will you use in this scenario? 1. access-list acl_2 permit icmp any any2. access-list acl_2 deny icmp any any3. access-list acl_2 permit tcp host 2.2.2.2 host 5.5.5.54. access-list acl_2 permit tcp host 2.2.2.2 host 3.3.3.3 eq www

Answers

The third option, "access-list acl 2 permit tcp host 2.2.2.2 host 5.5.5.5" is what I must select as a network analyst if I want the ACL (Access Control List) to forward the ICMP (Internet Control Message Protocol) traffic from host machine 2.2.2.2 to host machine 5.5.5.5.

What is Access Control List ?

In particular in computer security settings, the term "Access Control List" (ACL) refers to a specific set of rules used for filtering network traffic. ACLs also grant authorized users access to specific system objects like directories or files while denying unauthorized users access.

ACLs are primarily found in switches and routers that have packet filtering capabilities.

What is the Internet Control Message Protocol ?

Network devices use the Internet Control Message Protocol (ICMP), a network layer protocol, to identify problems with network communication. ICMP is primarily used to check whether data is arriving at its target location on time. The ICMP protocol is frequently used on network equipment, such as routers. Although ICMP is essential for error reporting and testing, distributed denial-of-service (DDoS) attacks can also make use of it.

To know more about ACL, check out:

https://brainly.com/question/13198620

#SPJ1

Other Questions
answer pls cmon answer As the value of Roman coins decreased people began to ________ again. List some nicknames for Yolanda. How does she feel about these names? What might multiple versions of Yolanda's name signify in this story? x^2-18x+81=4 solve completing the square king middle school has clubs and sports teams as its after-school activities. The ratio of clubs to sports teams is 3:2. What is the ratio of sports teams to all after-school activities? how big are yoongi's feet Find value of the arbitrary constants on the given equations. 1. Make the curve y = ax?" + bxz + cx + d passthrough (0,0), (1, 1) and have critical point at (3,7). 2. Find a, b, c and d so that the curve y = ax3 + bx2 + cx +at will pass through points (0,12)and (1, 6) and have inflection point at (2, 6). What forces are acting on the race car while it is in motion? (hint: there are 3forces) the coordinate of a particle in meters is given by x(t) = 18t 2t3, where the time t is in seconds. the particle is momentarily at rest at t = Find 4 words that describe the setting. why is there a difference in the icf percentages in males versus females? marriage rules are always subject to some negotiation, as illustrated by the marriage practices of the ju/'hoansi of the kalahari desert. a. true b. false Wall of Prizesa carnival game is set up with a board containing pictures of prizes. if a student throws a dart and hits within a shape with a prize, they win that prize Identify the error in the passage below:Is that new puppy your's? He is so adorable! you have a client who is positive for tuberculosis. after caring for your client, what ppe item is to be removed first? a nursing home resident returns to the facility after receiving a hemodialysis treatment. which symptom observed by the charge nurse suggests that the client has developed disequilibrium syndrome? How does the phospholipid bilayer of a transport vesicle contribute to cellular functions? A radar antenna is rotating and makes one revolution every 29 s, as measured on earth. However, instruments on a spaceship moving with respect to the earth at a speed v measure that the antenna makes one revolution every 46 s. What is the ratio v/c of the speed v to the speed c of light in a vacuum the complexity and variety of organic molecules is due togroup of answer choicestheir interaction with water.the chemical versatility of carbon atoms.the fact that they can be synthesized only in living organisms.the variety of rare elements in organic molecules. What is the radius of of a circle in the equation x2+ y2 2x 4y 20 0?