Q2 Mr. Amit wants to buy a computer system and recently visited a newly opened electronic show room Called Impel Infosys. He wanted to find out about the computers but came out totally confused by the

Answers

Answer 1

Amit realizes he needs a mouse, but he is unsure what for. Here's an explanation of why a mouse is required and descriptions of different types of mice:

What is the computer system

Amit acknowledges his requirement for a mouse, but remains uncertain about its intended use. Discover the reason why a mouse is necessary and explore diverse types of mice.

A computer system requires a mouse as a crucial tool for its input operations. Users can control graphical user interfaces (GUIs) by using a cursor to navigate the screen and make selections or adjustments to objects. The standard mouse comprises a pointing device and buttons that sense its motion.

Learn more about computer system  from

https://brainly.com/question/22946942

#SPJ4

Mr. Amit wants to buy a computer system and recently visited a newly opened electronic show room Called Impel Infosys. He wanted to find out about the computers but came out totally confused by the "computerese" he heard. He has made a list of questions he needs answer and has come to you for help. Answer the question below: •Amit realizes he needs a mouse, but he is unsure what for. Explain why mouse is required and describe a mouse with a trackball, an infrared mouse, a mouse with a scroll wheel and cordless mouse. [10 Marks]


Related Questions

Edhesive 4.3 code practice question 1 PLZ SOMEONE
topic: Grandma Ester normally gives you hugs for your birthday - one for every year old you are. When you turned 15, she squished you with 15 hugs! This year, she, unfortunately, cannot see you on your birthday, so instead, she wants to send you virtual hugs!

Create a program that prompts the user for how old they are turning and then using a loop, output a virtual hug for every year old they are.

The following prints a single “virtual hug.”

Answers

Answer:

x = int(input("How old are you turning? "))

c = 0

while (c != x):

c = c + 1

print("**HUG**")

Following are the python program to calculate the virtual hugs:

Python Program:

age = int(input("How old are you? "))#defining the age variable that inputs age value in number

for x in range(0,age):#defining the loop that counts and prints the number of HUG value

   print("**HUG**")#print message

Output:

please find the attached file.

Program Explanation:

Defining the 'age' variable that inputs age value by using the input and int method that takes only numeric value.After the input value, a for loop is defined this loop that counts the age value and prints the number of 'HUG' values, by using the print method.

Learn more on python programs here:

brainly.com/question/17796174

Edhesive 4.3 code practice question 1 PLZ SOMEONEtopic: Grandma Ester normally gives you hugs for your

Smart art can be used to create that highlight relationships between two items

Answers

Answer:

The answer to this question is given below in this explanation section.

Explanation:

A smart Art graphic is a visual representation of your information and ideas.you create one by choosing a layout this fits your message.Some layouts specific kind of information,while other simply enhance the appearance of a bulleted list.

    You can create a smart graphic in excel power point,word,or in an email message in outlook.The smart button is one the insert tab and developing on your screen size,may look like.

Other office program do not allow for smart art art graphic creation,but you can copy and paste smart graphics as image into those programs.As part of this process,when you are prompted to choose a type such as process hierarchy,or relationship.A type is similar to a category of smart art graphic,and each type contains several different layouts.

Because you can quickly and easily switch layouts,try different layouts until you find the one that best illustrate your message.

electronic junk mail is considered a computer virus. (True or False)

Answers

FALSE, The claim is untrue since a virus is software, whereas electronic junk mail, or spam, is typically generated by marketing firms for commercial gain.

Regarded as electronic spam mail?

Email spam, commonly referred to as junk email, is the practise of sending unwanted email to a large list of subscribers in mass.

What is unsolicited email?

Bulk electronic mail transmitted over the internet to several recipients is known as spam email or junk email. These emails' primary objective is to promote themselves as much as possible. No human ever sends junk mail.

To know more about software visit:-

https://brainly.com/question/1022352

#SPJ4

Submit your definitions for the words below:

gigabyte
intranet
pixel
telecommunication
modem
raster graphic
vector graphic
digital
GUI

Answers

Answer:

1. gigabyte- Technology branded as GIGABYTE or sometimes GIGA-BYTE; formally GIGA-BYTE Technology Co., Ltd. it is a Taiwanese manufacturer and distributor of computer hardware. Gigabyte's principal business is motherboards.

2. intranet-a computer network for sharing information, collaboration tools, operational systems, and other computing services within an organization, usually to the exclusion of access by outsiders.

3.  pixel-a minute area of illumination on a display screen, one of many from which an image is composed.

4. telecommunication-the transmission of information by various types of technologies over wire, radio, optical or other electromagnetic systems.

5. modem- a  combined device for modulation and demodulation, for example, between the digital data of a computer and the analog signal of a phone line.

6. raster graphic-In computer graphics and digital photography, a raster graphic or bitmap image is a dot matrix data structure that represents a generally rectangular grid of pixels (points of color), viewable via a bitmapped display (monitor), paper, or other display medium.

7.  vector graphic-computer graphics images that are defined in terms of points on a Cartesian plane, which are connected by lines and curves to form polygons and other shapes.

8.  digital-expressed as series of the digits 0 and 1, typically represented by values of a physical quantity such as voltage or magnetic polarization.GUI-a system of interactive visual components for computer software.

9. GUI- displays objects that convey information, and represent actions that can be taken by the user. The objects change color, size, or visibility when the user interacts with them.punineep and 15 more users found this answer helpful4.0(6 votes)

Explanation:

36 points!!



The federal government established a law called the Fair Labor Standards Act in 1938. What does this law do?
O A
It establishes a federal minimum wage for all workers.
OB.
It makes sure that all workers are given a safe working environment.
O C.
It provides men and women with equal pay.
OD.
It requires that all companies provide workers with health insurance.

36 points!!The federal government established a law called the Fair Labor Standards Act in 1938. What

Answers

It’s A, the law created a right to minimum wage for all workers. Also crates the right for overtime pay and does not allow child labor.
The answer is A, establishes a federal minimum wage.

Text,Audio and graphic is entered into the computer using
a)A cpu
b)Output
C)Input
ICT Question​ asap pls help

Answers

Answer:

I think it's input, not sure tho

Direction: Put a check (/)mark if the statement is
correct and Irofessional. Letter W if it is incorrect.

Direction: Put a check (/)mark if the statement iscorrect and Irofessional. Letter W if it is incorrect.

Answers

Explanation:

Xghhdghxhdhzhhzshh, hdhshxxx

You have N boxes in your room which you want to carry to a different place. There are too many to carry in one trip, so you want to split them into several piles using the following algorithm: if the current pile has at most M boxes, you can carry it as is, otherwise you split it into P parts as equally as possible (i. E. So that the sizes of the parts differ at most by 1) and apply the same algorithm to each of the parts. If you're trying to split less than P boxes into P piles, discard resulting zero-sized piles (see example 2).


Required:

Calculate the number of piles you'll get in the end

Answers


Start with the total number of boxes, N, that you have in your room. Check if the current pile has at most M boxes. If it does, you can carry it as is.  If the current pile has more than M boxes, you need to split it into P parts as equally as possible. To split the pile, divide the total number of boxes in the pile by P. The resulting quotient will give you the number of boxes in each part.

Check if there are any remaining boxes after the division. If there are, distribute them among the parts in a way that the sizes of the parts differ at most by 1. This means some parts may have one extra box compared to others.  Repeat the algorithm for each part. If a part has less than P boxes, discard the resulting zero-sized piles. Keep repeating the algorithm until all the piles have at most M boxes. Let's consider an example to better understand this algorithm: Initially, you have one pile with 20 boxes. Since it exceeds M (5), you need to split it into P (3) parts. Dividing 20 by 3 gives you 6 boxes per part (with 2 remaining boxes).


Distribute the remaining 2 boxes among the parts, ensuring that the sizes differ by at most 1. This could result in one part having 7 boxes and the other two having 6 boxes each. Now you have three piles: one with 7 boxes and two with 6 boxes each. Repeat the algorithm for each pile. Since the pile with 7 boxes exceeds M (5), you split it into three parts, resulting in three piles of 3, 2, and 2 boxes. The two piles with 6 boxes each do not need to be split further, as they already satisfy the condition of at most M (5) boxes.

To know more about  M boxes visit;  

https://brainly.com/question/29848981

#SPJ11

Which of the following are secure protocols, ports, services, or applications? (Select TWO.)
a. SLP
b. Port 443
c. SMTP
d. SSH
e. Ports 161/162

Answers

The secure protocols, ports, services, or applications are Port 443 and SSH. The correct options are b and d.

What are secure protocols?

The standard HTTP port is 80. This indicates that port 80 is where the server request is received. However, a standard HTTP request can be intercepted. SSL encryption is used to secure an HTTP connection to prevent it (HTTPS protocol).

The URL string in this instance starts with "HTTPS" setting it apart from a typical online request. Instead of using port 80, HTTPS services by default utilize port 443.

Therefore, the correct options are b. Port 443 and d. SSH.

To learn more about secure protocols, refer to the link:

https://brainly.com/question/14600532

#SPJ1

Which of the following would an interactive media proffessional must likely need

Answers

A certificate, an associate of arts degree and a bachelors degree. Hope this helped!

when qos is implemented in a converged network, which two factors can be controlled to improve network performance for real-time traffic? (choose two.)

Answers

QoS (Quality of Service) is implemented in a converged network, two factors that can be controlled to improve network performance for real-time traffic are bandwidth and latency.

1. Bandwidth: Bandwidth refers to the amount of data that can be transmitted over a network in a given amount of time. QoS can allocate a specific amount of bandwidth for real-time traffic to ensure that it has enough resources to operate smoothly. By prioritizing bandwidth for real-time traffic, QoS can prevent congestion and packet loss, which can degrade performance and affect the user experience.

2. Latency: Latency refers to the delay or lag that occurs between the time a packet is sent and the time it is received. Real-time traffic, such as VoIP (Voice over IP) and video conferencing, is highly sensitive to latency because any delay can cause significant disruptions or distortions in the communication. QoS can control latency by providing priority treatment for real-time traffic, reducing the queuing and processing times, and minimizing the delay in packet transmission.

To know more about bandwidth  visit:-

https://brainly.com/question/1958028

#SPJ11

define the term network topology?​

Answers

Answer:

Network TOPOLOGY is a passage way network is arranged, including the logical description of links and how they are set up to relate with each other.

Examples of network topology are:

a) Star ring

b) Star bus network.

Explanation:

Hope it helps.

Consider the following method:

public static void mystery(int[] data) {
for (int i = 1; i < data.length - 1; i++) {
if (data[i] == data[i - 1] + data[i + 1]) {
data[i] = data[i] / 2;
}
}
}

For each array below, indicate what the array's contents would be after the method mystery were called and passed that array as its parameter.


{3, 7, 4}
{0, 3, 7, 4, 1}
{4, 3, 8, 5, 1, 2}
{2, 1, 5, 4, 10, 6, 2}
{1, 2, 1, 2, 1, 2, 1}

Answers

The array contents after the method mystery were called are:

{3,3,4}{0,3,3,2,1}{4,3,4,2,1,2}{2, 1, 2, 4, 5, 6, 2}{1, 1, 1, 1, 1, 1, 1}

How to determine the array contents

The flow of the mystery method is as follows:

The method takes an array as its argumentIt iterates from the elements at index 1 through index n - 1 (n represents the array length)If the current element in the iteration adds up to the adjacent elements, the current element is halved.

Using the above flow, the array contents after the method mystery were called are: {3,3,4}, {0,3,3,2,1}, {4,3,4,2,1,2}, {2, 1, 2, 4, 5, 6, 2} and {1, 1, 1, 1, 1, 1, 1}

Read more about arrays at:

https://brainly.com/question/15683939

Answer: {3,3,4}, {0,3,3,2,1}, {4,3,4,2,1,2}, {2, 1, 2, 4, 5, 6, 2} and {1, 1, 1, 1, 1, 1, 1}

Explanation:

a computer can function in the absence of software true or false​

Answers

Answer:false

Explanation:

it’s false, but it doesn’t have to be a complete operating system.

The ______ tab is a contextual tab and displays only when media content on your slide is selected

Answers

The complete statement is:

The Table Tools tab is a contextual tab and displays only when media content on your slide is selected

How to determine the tab

There are several tabs in Microsoft Office packages

Some of these tabs include

Home Page layoutReview and ViewEtc

Of all the available tabs in these packages, the table tool tab is contextual.

This is so because it is not display unless the media is selected

Read more about tabs at:

https://brainly.com/question/14139335

excel functions are prebuilt formulas within excel.

Answers

Formulas are mathematical equations that integrate cell references, excel  values, and operators to compute results. It is not necessary to write the underlying formula when using functions because they are prebuilt formulas that can be rapidly fed values.

What do Excel's functions and formulas mean?

Functions are pre-written formulas that perform calculations using specific variables, also known as inputs, in a predetermined order or structure. Functions can be used to do calculations of any complexity. The Formulas tab on the Ribbon contains the syntax for all of Excel's functions.

What is the name of the pre-written formulas in Excel?

An already written formula is a function. A function performs an operation on a value (or values), then returns a new value (or values.)

To know more about excel  visit:-

https://brainly.com/question/3441128

#SPJ4

in environmental swot analysis, the external organizational position is analyzed according to its

Answers

In an environmental SWOT analysis, the external organizational position is analyzed according to its opportunities and threats.

SWOT Analysis is a strategic tool used to identify an organization's internal and external factors. SWOT stands for Strengths, Weaknesses, Opportunities, and Threats.

A SWOT analysis can assist in identifying areas where a company is excelling, areas where it may improve, and the external factors that could impact its success.

In an environmental SWOT analysis, the organization examines the external factors that could impact its operations. Opportunities are defined as positive external factors that may benefit the organization.

Threats are external factors that may have a negative impact on the organization.

Know more about SWOT analysis here:

https://brainly.com/question/25066799

#SPJ11

Answer pls pls pls pls pls ​

Answer pls pls pls pls pls

Answers

Answer:

identify materials to create a prototype

What are some potential challenges that society will face given the digital revolution? You may want to think particularly of the news industry. Discuss how these challenges could impact young people such as yourself.

Answers

Answer:

Some said that technology causes more problems than it solves. ... Others said humans' uses and abuses of digital technologies are causing ... Highly technological societies have to be iterative if they hope to ... where we believe we can tell honestly delivered information from fake news and disinformation.

hope this helps...

Explanation:

Who invented the television and what year did color come out? Explain​

Answers

The television was not invented by a single person, but its development involved contributions from several inventors and engineers.

How is this so?

Philo Farnsworth is often credited as one of the key inventors of television, as he successfully demonstrated the first working electronic television system in 1927.

As for color television, it was first introduced commercially in the United States in 1953 by RCA.

The introduction of color television marked a significant milestone in broadcasting, enhancing the viewing experience for audiences worldwide.

Learn more about television at:

https://brainly.com/question/12079773

#SPJ1

Digital exclusion, also known as the digital divide, separates
O
O
social media users and non-social media users.
those who have Internet access and those who don't.
those who live in poverty and those who don't.
young Internet users from old Internet users.

Answers

those who have Internet access and those who don't.

what is a cell address in xsl sheet

Answers

Answer:

cell address is the exact location of a particular cell of ms-excle

Explanation:

A1 refers to first row and first column.

A2 refers to second row first column.

i.e.

in 'A1' : 'A' indicate column { A= first column, B= second

column, C= third column. and soon.....}

'1' indicate row { 1 = first row, 2 = second row, 3= third row..... soon .......}

The toolbox was a feature of the Mac OS that____?

GUYS I NEED HELP ASAP

a) made it Incredibly stable
b) Allowed Users to locate The Important Files
c) ensured Applications Would Have A Constant Look And Feel
d) Allowed User To Access Icons

Answers

Answer:

I think its c

Explanation:

Because launch pad is B and D and A does nothing to that

Which two devices are used to connect IoT devices to a home network?
A. Cisco 2960 switch
B. Cisco 2911 router
C. DNS server
D. home gateway
E. registration server

Answers

The two devices commonly used to connect IoT (Internet of Things) devices to a home network are the home gateway and the router are d) home gateway and b) Cisco 2911 router.

1)Home Gateway: A home gateway, also known as a residential gateway, is a device that acts as an interface between the local home network and the Internet.

It serves as a central point of connection for various devices, including IoT devices, within a home.

The home gateway typically combines the functions of a router, modem, and firewall. It allows devices in the home to access the Internet while providing security features to protect the network from external threats.

The gateway manages the communication between the IoT devices and the Internet, enabling seamless connectivity and control.

2)Router: A router is a networking device that forwards data packets between computer networks.

In the context of IoT, a router plays a crucial role in connecting IoT devices to the home network.

It serves as the bridge between the local network and the Internet, facilitating communication between devices within the home and enabling access to online services.

The router assigns unique IP addresses to each connected device, allowing them to send and receive data over the network.

It also performs network address translation (NAT) to ensure that multiple devices can share a single public IP address.

For more questions on IoT

https://brainly.com/question/14087456

#SPJ8

How do i fix this? ((My computer is on))

How do i fix this? ((My computer is on))

Answers

Answer:

the picture is not clear. there could be many reasons of why this is happening. has your computer had any physical damage recently?

Answer:your computer had a Damage by u get it 101 Battery

and if u want to fix it go to laptop shop and tells him to fix this laptop

Explanation:

Complete each statement by choosing the correct answer from the drop-down menu.

The data type can hold whole positive and negative numbers.
The terms TRUE and FALSE are usually associated with data types.
Values such as 9.0, –1245.1, and 0.777 are examples of data types.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct matching answers for this question are given below. In this question, it is asked to identify the data type of the given scenario.

Integer short and integer long data type:

These data types can hold whole positive and negative numbers. however, you can also store positive and negative values in float and double data type also.

Boolean data type:

Boolean data type usually stores true or false values such as yer or no, true or false etc. It stores binary values i.e 1 or 0.

Float and Double data type: float and double data type can store positive and negative numbers with decimals. But, the float data type can store 4 bytes of data and sufficient for storing 7 decimal digits. while double data type has a size of 8 bytes of data and sufficient for storing 15 decimal digits.

However, for the given scenario in the question,  the float data type can accomodate these values easily.

Answer: Integer, Boolean, Floating-Point!

Explanation:

I did it edge 2020

cengage which command can be used on an ubuntu device to display the operating system version?

Answers

The command that can be used on an Ubuntu device to display the operating system version is "lsb_release -a." This command is used to display information about the Linux Standard Base (LSB) and the distribution-specific information of the Ubuntu operating system.

When this command is executed on an Ubuntu device, it will display the following information:

Distributor ID: This line will display the name of the distributor, which in this case will be "Ubuntu".

Description: This line will display a short description of the operating system, including the version number.

Release: This line will display the release number of the operating system, such as "18.04" or "20.04".

Codename: This line will display the code name of the operating system release, such as "Bionic Beaver" or "Focal Fossa".

For example, if you execute the command "lsb_release -a" on an Ubuntu 20.04 device, you might see output like the following:

Distributor ID: Ubuntu

Description: Ubuntu 20.04.3 LTS

Release: 20.04

Codename: focal

Learn more about Ubuntu here:

https://brainly.com/question/28477629

#SPJ11

Which of the following correctly describes JSON vs XML? Both JSON and XML are "self describing" (human readable) Both JSON and XML can be parsed and used by lots of programming languages {XM

Answers

JSON stands for JavaScript Object Notation, which is a lightweight data-interchange format that is easy for humans to read and write and easy for machines to parse and generate. It is a text format that is completely language-independent, making it ideal for exchanging data between different systems.

XML, on the other hand, stands for Extensible Markup Language. It is a markup language that is used to store and transport data. XML is designed to be self-describing, meaning that the data in an XML document can be easily understood by humans, without the need for additional documentation.

Both JSON and XML are "self-describing" (human-readable), and both can be parsed and used by lots of programming languages. The key difference between the two is that JSON is more lightweight than XML, making it faster and easier to parse. JSON is also easier to read and write than XML, making it more popular among developers.

Thus, both JSON and XML are "self-describing" and can be parsed and used by lots of programming languages.

Learn more about  programming languages at: https://brainly.com/question/16936315

#SPJ11

Which IPR will provide legal protection to the product from competitior infringement

Answers

The product would have legal protection from competitor infringement under trade mark protection.

In order for people to coexist in freedom, regardless of their lifestyle or political views, the Ministry of Justice and Security is tasked with upholding the law. Because it safeguards original expression that is fixed in a tangible medium and the result of writing, copyright law is distinctive within the broader intellectual property regime. As used herein and as supported by an inquiry, the phrase "Protection Cases" refers to instances of child abuse, institutional abuse, neglect, and/or institutional neglect. Making sure a person's rights are not disregarded or violated is what it means to protect rights. From service commencement to discharge and follow-up, every step of the process reflects this affirmation and protection.

Learn more about legal protection here

https://brainly.com/question/30433228

#SPJ4

Which code is easier to learn, Python or C++. And which one is better than the other in your opinion

Answers

Okay so I’m terms of easiest to learn it depends on the person for me it is Python and python is better because it can be used for lots of purposes
Other Questions
In circle L, =9LM=9 and the area of shaded sector = 2727. Find the length of MN . Express your answer as a fraction times . Albedo is the percentage of energy ________ from an object compared to the original amount of energy that struck the object. I REALLY NEED HELP PLZ :(((((Xavier performs the elementary row operation represented by [tex]R_{1} -\frac{1}{2} R_{2}[/tex] on matrix AWhat matrix results from this transformation? Enter any fractions as simplified fractions. Why does the author included tales about Lynn's night owl at Lakeview restaurant in all American slurp A.To reveal the narrators rejection of American culture B.To reveal the narrators frustration with her parents rules C. To illustrate the narrators difficulties adapting to American culture D.To illustrate the narrative dislike of dining in public places A comparative balance sheet for Carla Vista Corporation is presented below. December 31Assets 2020 2019Cash $80,240 $25,960 Accounts receivable 96,760 77,880 Inventory 200,600 223,020 Land 83,780 129,800 Equipment 330,400 236,000 Accumulated depreciation-equipment (87,320) (49,560) Total $704,460 $643,100 Liabilities and Stockholders' Equity Accounts payable $40,120 $55,460 Bonds payable 177,000 236,000 Common stock ($1 par) 193,520 193,520 Retained earnings 293,820 158,120 Total $704,460 $643,100Additional information: 1. Net income for 2020 was $182,900; there were no gains or losses. 2. Cash dividends of $47,200 were declared and paid. 3. Bonds payable of $59,000 were retired. Compute each of the following: (Show amounts that decrease cash flow with either a - sign e.g. -15,000 or in parenthesis e.g. (15,000).) 1. Net cash provided by operating activities $ 2. Net cash provided (used) by investing activities $ 3. Net cash provided (used) by financing activities $ for which category are diarthrotic joints divided? a las ocho menos cuatro, what is that in digital form identify the scientific law that is used in the process of balancing chemical equations. Which geologic structure will most likely take the longest time to form?1. A fault2. A sinkhole3. A river meander4. A mountain range PLEASE HELPPPFind the equation of the line.Use exact numbers.y =+y98+7+6+543+2+1-9-8-7-6-5-4-3-21 2 3 4 5 6 7 8 9-21-3- What do you call the structure at the front end of the container consisting of top and bottom rails attached to the front corner posts and the corner castings? 2r +23r+56=0Solve by factoring Charles received his MLO endorsement and has been performing activities for the last five days. He has yet to notify the Bureau of Real Estate of these activities. How much will he be penalized How did you solve business problems during the early years of your business operation ? x-2(x+10)=12 (Show work pls) in this sentence, wilson compares the german government to governments of the past. what is he hoping to convey? the comparison attempts to make the german government look uncivilized and brutal. the comparison makes the united states seem more suitable for war than germany. the comparison reminds the audience of how war was fought more often by emperors and kings. the comparison hopes to change the way governments look at decisions of war. What is the difference between starch and cellulose? why do we include them in our diet? use the following equation to answerIf 20 moles of fuel are combusted in the above equation, how many moles of CO2 are produced? MONTRESOR: My dear Fortunato, you are luckily met. How remarkably well you are looking to-day! But I have received a pipe of what passes for Amontillado, and I have my doubts.FORTUNATO: How? Amontillado? A pipe? Impossible! And in the middle of the carnival!MONTRESOR: I have my doubts, and I was silly enough to pay the full Amontillado price without consulting you in the matter. You were not to be found, and I was fearful of losing a bargain.FORTUNATO: Amontillado!MONTRESOR: I have my doubts.FORTUNATO: Amontillado!MONTRESOR: And I must satisfy them.FORTUNATO: Amontillado!MONTRESOR: As you are engaged, I am on my way to Luchesi. If any one has a critical turn, it is he. He will tell meFORTUNATO: Luchesi cannot tell Amontillado from Sherry.MONTRESOR: And yet some fools will have it that his taste is a match for your own.FORTUNATO: Come, let us go.MONTRESOR: Whither?FORTUNATO: To your vaults. Mathematic 14 dont undertsqnd