Type the correct answer in the box. Spell all words correctly.
Which software is used to play, create, and modify audio and video files?
_______software is used to play, create, and modify audio and video files.

Type The Correct Answer In The Box. Spell All Words Correctly.Which Software Is Used To Play, Create,

Answers

Answer 1

Answer:

Adobe Premire pro

Explanation:

Answer 2

Answer:

video editing

Explanation:


Related Questions

A 4"x6" photo is digitized using 10,000 pixels. An 11"x7" photo is digitized using 30,000 pixels. Which image will have the better resolution?
the 11"x7" photo

the 4"x"6 photo

the photos will have the same resolution

Answers

An image which will have the better resolution is: A. the 11"x7" photo.

What is a camera lens?

A camera lens can be defined as a transparent optical instrument that is used in conjunction with a digital camera, so as to refract rays of light coming into the lens.

What is a resolution?

A resolution can be defined as the number of pixels that are contained in an image (picture or photo) or on a display monitor of a computer system such a laptop.

In this scenario, we can infer an logically deduce that an image which will have the better resolution is the 11"x7" photo because it has a higher number of pixel (30,000 pixels) than the 4"x"6 photo.

Read more on resolution here: https://brainly.com/question/14294025

#SPJ1

The systems such as computers and telecommunications, used for storing, retrieving, and exchanging information is information technology.
true or false

Answers

The systems such as computers and telecommunications, used for storing, retrieving, and exchanging information is information technology is a true statement.

What is information technology meaning?

Information technology (IT) is known to be a broad professional form or group that tend to cover some areas of  functions such as:

Building communications networkssafeguarding data and informationTroubleshooting computer problems, etc.

Therefore, The systems such as computers and telecommunications, used for storing, retrieving, and exchanging information is information technology is a true statement.

Learn more about information technology  from

https://brainly.com/question/14688347
#SPJ1

Will MARK BRAINLIEST TO WHOEVER GETS THIS CORRECT, PLS HELP!! PLS WRITE CODE IN PYTHON. CHECK THE IMAGE I PUT THERE.

Will MARK BRAINLIEST TO WHOEVER GETS THIS CORRECT, PLS HELP!! PLS WRITE CODE IN PYTHON. CHECK THE IMAGE

Answers

Answer:

def findLastBinary(s):

 binaryString = ""

 for c in s:

   binaryString += bin(ord(c))[2:].zfill(8)

 n = 0

 while(bin(n)[2:] in binaryString):

     n = n + 1

 return n-1

s = input("Enter a string: ")

n = findLastBinary(s)

print("The highest binary string found is", bin(n)[2:])

Explanation:

bin(n) converts an integer to binary

the [2:] index is to skip the "0b" prefix that is otherwise prepended.

zfill(8) left fills the ASCII number with zeros

what conservation law makes a contracting spherical cloud collapse into a disk?

Answers

The conservation law that makes a contracting spherical cloud collapse into a disk is the conservation of angular momentum.

As the cloud contracts due to gravity, its rotation speed increases to conserve angular momentum. This increase in rotation speed causes the cloud to flatten along the axis of rotation, forming a disk shape. This process is known as the conservation of angular momentum and is a fundamental principle in astrophysics that explains the formation of disks, such as protoplanetary disks, around stars and planetary systems.

You can learn more about  conservation of angular momentum at

https://brainly.com/question/30284719

#SPJ11

Data visualization is best defined as the use of _____ to present _____ data in a way that's easy to understand.

Answers

Data visualization is best defined as the use of bar chart to present report data in a way that's easy to understand.

What is data visualization?

The graphic display of information and data is known as data visualization. Data visualization tools offer a simple way to visualize and understand data by utilizing visual components like charts, graphs, and maps.

Hence, Data visualization is the study of data visualization, or data that has been abstracted in some schematic fashion and includes attributes or variables for the information units.

Learn more about Data visualization from

https://brainly.com/question/19566670
#SPJ1

Answer:

graphics; complex

Explanation:

I took the quiz

A Question 1 (3 points) Retake question Listen ▶ Lyrics, melodies and underlying musical notes all refer to the.... sound recording copyright music copyright master recording mechanical license

Answers

Lyrics, melodies, and underlying musical notes all refer to the music copyright.

Copyright is the legal right that belongs to an artist, publisher, or producer to be the sole user of a literary, musical, dramatic, or artistic work. Copyright laws grant creators of original works exclusive rights to the use, distribution, and display of their works. Copyright infringement happens when someone uses a creative work without the owner's permission.

In the context of music, the term "copyright" refers to the protection provided to original songs and music compositions. Lyrics and musical notes that make up a song are both protected by copyright. This means that anyone who wishes to use, record, or reproduce the song or composition must first acquire the necessary rights or licenses.

The mechanical license, master recording, and sound recording copyright are all related to the music industry and refer to different types of licenses and rights granted to music producers, artists, and copyright owners.

The mechanical license is granted to anyone who wants to create a cover or new version of a song. The master recording refers to the final version of a song that is used for commercial purposes, and the sound recording copyright refers to the protection provided to the sound recording of a song or musical composition.

To learn about copyright here:

https://brainly.com/question/357686

#SPJ11

When gathering information, which of the following tasks might you need to
perform?
A. Apply standards, such as measures of quality, beauty, usefulness,
or othics
B. Study objects, conduct tests, research written materials, and ask
questions
C. Seek out ideas from others and share your own ideas
D. Fill out forms, follow procedures, and apply math and science

Answers

I think it would be B but I’m not entirely sure.

Answer:

Study objects, conduct tests, research written materials, and ask questions

Explanation:

Choose the correct option. i) An object thrown from a moving bus is on example of
(A) Uniform circular motion
(B) Rectilinear motion
(C) Projectile motion
(D) Motion in one dimension​
age

Answers

PROJECTILE MOTION

The answer is option C: "Projectile motion."

Projectile motion refers to the motion of an object that is thrown or launched into the air and follows a parabolic path under the influence of gravity. An object thrown from a moving bus is an example of projectile motion because it is launched into the air and follows a curved path due to the force of gravity.

Option A: "Uniform circular motion" refers to the motion of an object moving in a circular path at a constant speed.

Option B: "Rectilinear motion" refers to the motion of an object moving in a straight line.

Option D: "Motion in one dimension" refers to motion that occurs along a single straight line, rather than in two or three dimensions.

Hope This Helps You!

What is the difference between active users and total users in GA4?

Answers

Where as total users are the number of unique users who have visited the website during the selected time period. The difference between active users and total users in GA4Active Users Active users are visitors who have interacted with your website or mobile app in some way during the selected time period.

For example, if someone visits your website, the GA4 tracking code sends an event to the server. If the visitor clicks on a button on your website, a second event is sent to the server. The server then interprets the two events as an active user.

As a result, a user may be counted multiple times if they perform multiple actions during the chosen time period. Total Users Total users, on the other hand, are users who have visited your website or mobile app at any point during the selected time period, regardless of whether they have interacted with your website or mobile app in any way.

This means that total users can include visitors who have only visited the website or mobile app once and have not returned, as well as visitors who have interacted with your website or mobile app frequently over the selected time period.

To know more about interacted visit:

https://brainly.com/question/31385713

#SPJ11

a customer calls in a problem that a printer isn't working. when the technician arrives, what is one of the first things the technician should check?

Answers

The technician should first check if an error code is present. If an error code is present it allows the technician to narrow down the specific way to solve the problem.

Which type of database application is considered more vulnerable and therefore has more strict security requirements for a business?.

Answers

A database application is considered more vulnerable to attacks if it has loose security controls. A database management system is software that enables users to store, access, manipulate, and analyze data in a secure manner.

According to recent surveys, over 80% of data breaches are caused by weak, stolen, or compromised passwords. It is critical to secure the database management system to prevent access by hackers or other unauthorized users. There are two types of database applications: web-based and client-server applications.Web-based database applications are accessible via the internet and are, therefore, more susceptible to attacks than client-server applications. Client-server applications require a client to access the database.

They are stored on a centralized server and are secured behind a firewall. Client-server applications are designed to offer improved security to the users, thereby making them less vulnerable to attacks than web-based applications.Web-based applications are vulnerable to several types of attacks, such as SQL injection attacks, cross-site scripting, and cross-site request forgery. Therefore, web-based database applications are considered more vulnerable and have stricter security requirements for businesses that rely on them.

To know  more about security visit:

https://brainly.com/question/32133916

#SPJ11

ts) 4. which of these (cv or percent error) is most closely associated with each of the following: scatter choose... (1pts) systemic error choose... (1pts) random error choose... (1pts) bias

Answers

Scatter is most closely associated with random error, systematic error is associated with bias, and both CV and percent error can be associated with either systematic or random error depending on the context.

In the context of data analysis and measurement, scatter refers to the variability or spread of data points around a central value. Random error, also known as noise, contributes to scatter and is associated with factors that introduce unpredictable variations during the measurement process. It can arise from instrument limitations, human errors, or environmental factors. Therefore, scatter is most closely associated with random error.

Systematic error, on the other hand, refers to consistent deviations from the true value due to flaws or biases in the measurement process. It can be caused by factors such as calibration issues, faulty equipment, or procedural errors. Systematic error affects the accuracy of measurements and introduces a consistent bias in the data. Thus, systematic error is associated with bias.

The choice between coefficient of variation (CV) and percent error depends on the context. CV is a statistical measure that expresses the standard deviation relative to the mean. It is often used to assess the relative variability in a dataset. Both systematic and random errors can contribute to the variability measured by CV. On the other hand, percent error is a measure of the deviation between an observed value and a true or expected value, expressed as a percentage. It is commonly used to quantify the accuracy of a measurement. In this case, both systematic and random errors can contribute to the percent error, depending on whether the true value or expected value is affected.

Therefore, while scatter is associated with random error, systematic error is associated with bias. The choice between CV and percent error depends on the context, as both can be influenced by either systematic or random errors.

Learn more about error here:

https://brainly.com/question/32985221

#SPJ11

3. The problem solving diagram displays how many parts.
A1
B.2
c.3
D.4

Answers

Answer:

3

Explanation:

If var = keyboard.nextInt(); var must be defined as which of the following types? *

Answers

keyboard.nextInt(); This is an example of using the scanner class to get input from the user. The nextInt(); function means that you're getting an integer from the user.

var must be defined as an int.

ome people argue that we can consider the whole address space as one single block in which each range of addresses is a sub-block to this single block. Elaborate on this idea. What happens to sub netting if we accept this concept? (5 Marks)

Answers

The idea that the whole address space can be considered as one single block, with each range of addresses as a sub-block, is referred to as "supernetting" or "classless inter-domain routing" (CIDR). If we accept this concept, sub-netting becomes more flexible and efficient as it allows for the allocation of variable-sized address blocks, enabling better address space utilization.

In traditional subnetting, IP addresses were divided into fixed-sized blocks, such as Class A, Class B, and Class C networks. This led to inefficient utilization of address space as organizations were assigned blocks larger than what they actually needed, resulting in address wastage.

With supernetting or CIDR, the address space is viewed as a single block, and addresses are allocated based on the actual requirements of each organization. Subnets can be created with varying sizes, allowing for more efficient utilization of addresses. This flexibility in address allocation leads to better management of IP addresses and helps address the issue of address exhaustion.

In summary, accepting the concept of considering the entire address space as one single block allows for supernetting or CIDR, which enhances the flexibility and efficiency of address allocation. It leads to better address space utilization and helps mitigate the problem of address exhaustion.

You can learn more about sub-netting at

https://brainly.com/question/28256854

#SPJ11

You are most likely to take advantage of automation when you

scan groceries at the supermarket

eat home-made bread

go to a hockey game

lock your front door

Answers

Answer:

scan groceries at the supermarket

What is the difference between business strategies and business models?
A. Business strategies include long-term business plans, while
business models include plans for daily business functions.
B. Business strategies focus on specific aspects of a business, while
business models focus on how different aspects affect the whole
business.
C. Business models focus on specific aspects of a business, while
business strategies focus on how different aspects affect the
whole business,
D. Business strategies incorporate forms of traditional business
advertising, while business models incorporate the use of social
media.

What is the difference between business strategies and business models?A. Business strategies include

Answers

Answer:

the answer is A

Explanation:

A is the answe

Answer:

B. Business strategies focus on specific aspects of a business, while business models focus on how different aspects affect the whole business.

Explanation:

Define an array to be a Mercurial array if a 3 does not occur between any two 1s. Write a function named isMercurial that returns 1 if its array argument is a Mercurial array, otherwise it returns 0

Answers

The Mercurial array program is an illustration of arrays, loops and conditional statements

How to write the program?

The program written in Python, where comments are used to explain each action is as follows:

#This defines the function

def checkMercurialarray(myarr):

   #This checks if the array contains 3

   if myarr.count(3) > 0:

       #If yes, this checks if the elements before and after 3 is 1

       if myarr[myarr.index(3)- 1] == 1 and myarr[myarr.index(3)+ 1] == 1:

           #This returns 1 if true

           return "1"

   #This returns 0

   return "0"

Read more about Python programs at:

https://brainly.com/question/26497128

#SPJ1

Which of these is NOT a part of the organizational change model used to support change management for Information security requirements. a. freezing b. unfreezing c. moving d. security training

Answers

The organizational change model used to support change management for Information security requirements typically involves three stages: unfreezing, moving, and refreezing. The option that is NOT part of this model is (a) freezing.

Unfreezing (b) is the first stage, where the organization acknowledges the need for change and begins to prepare for it. This involves breaking down existing structures, beliefs, and habits to create a sense of urgency and receptiveness to new ideas.

Moving (c) is the second stage, where the organization implements new processes, systems, and behaviors to address the identified Information security requirements. This stage may involve redefining roles, creating new policies, and incorporating new technologies to improve security.

Refreezing (d) is the final stage, where the organization solidifies the changes and ensures their sustainability. This involves integrating new processes and practices into the organization's culture, as well as providing ongoing support and reinforcement.

Security training, while essential in improving Information security, is not a distinct stage in the organizational change model. It is, however, an important component within the moving stage to help employees adapt to new policies and procedures effectively. Hence, a is the correct option.

You can learn more about organizational change at: brainly.com/question/29764667

#SPJ11

2. How is accessing the Internet through a home network and public Wi-Fi similar?​

Answers

Answer: it is not the same

Explanation: via public wi-fi u can easily be hacked but your home wi-fi is yours and u are safe there

Ashley wrote this paragraph:

Gabe is a hardworking art student. He painted his family history on the fence in front of his home. First, he painted his great-grandfather, who had invented a new kind of long-lasting glue. Then, Gabe added his grandfather, dad, mother, and sisters to the mural. The purple and pink flowers that his mother liked are in the background.

Which would be the best concluding sentence?

A. However, Gabe also earns money loading groceries at the supermarket.
B. Finally, Gabe painted the tree that his dad had planted when they moved into the house.
C. In addition, Gabe does well in school.
D. On the other hand, Gabe forgot to include a painting of his favorite dog.

Answers

Answer:

B

Explanation:

The best concluding sentence is finally, Gabe painted the tree that his dad had planted when they moved into the house.

What does concluding sentences do?

The role of  concluding sentences do is known to entails the act of summarizing the given clues or points and also ending of any passage.

Note that The best concluding sentence is finally, Gabe painted the tree that his dad had planted when they moved into the house as it is one that can give the best summary of what the passage is about.

Learn more about concluding sentence from

https://brainly.com/question/5427622

#SPJ2



what type of data structure associates items together?


A. binary code


B. dictionary

C. interface

D. editor ​

Answers

The  type of data structure associates items together is dictionary.

A dictionary, additionally known as a map or associative array, is the structure of a record that shops statistics in key-price pairs. It permits green retrieval and manipulation of data by associating a unique key with each price.

In a dictionary, the key serves as the identifier or label for a selected price. This key-cost affiliation permits brief get admission to values based on their corresponding keys. Just like an actual-international dictionary, where phrases (keys) are related to their definitions (values), a dictionary data shape allows you to appearance up values with the aid of their associated keys.

The gain of using a dictionary is that it affords rapid retrieval and green searching of facts, as it makes use of a hashing or indexing mechanism internally. This makes dictionaries suitable for eventualities wherein you need to quickly get admission to or replace values based on their unique identifiers.

Therefore, whilst you want to associate items collectively and retrieve them using their corresponding keys, a dictionary is the right facts structure to apply.

Read more about dictionary at:

https://brainly.com/question/17197962

A digital computer uses mechanical operations to perform calculations.

true or false

Answers

False:  A digital computer does not use mechanical operations to perform calculations.

A digital computer operates using electronic components such as transistors and integrated circuits, rather than mechanical operations. These electronic components, which are made of materials like silicon, are capable of manipulating and processing binary data in the form of bits. The fundamental unit of information in a digital computer is the bit, which can represent either a 0 or a 1.

The calculations performed by a digital computer are based on a series of logical operations, including arithmetic, Boolean algebra, and data manipulation. These operations are executed through electronic circuits that utilize the principles of digital logic, such as AND, OR, and NOT gates. The digital computer's central processing unit (CPU) coordinates and controls these operations, following instructions stored in memory.

Unlike mechanical computers, which rely on physical gears, levers, and other mechanical components to perform calculations, digital computers utilize the rapid switching of electronic components to represent and process information. This electronic nature allows digital computers to perform calculations at much higher speeds and with greater precision compared to mechanical computers.

In summary, a digital computer does not employ mechanical operations but instead utilizes electronic components and logical operations to perform calculations.

Learn more about digital computer

brainly.com/question/33041523

#SPJ11

pls answer i need to turn it in today!!

In computing flowcharts how are decisions represented?

What is the command used most for decisions?

Answers

Answer:

See Explanation

Explanation:

How decisions are represented?

In flowcharts, decisions are represented using diamond shapes (see attachment)

Decisions could be conditional statement or repetition operations which may have the form of loops or iterations.

Either of theses are represented using the diamond shapes.

Take for instance:

To check if a is greater than b... Simply write if a > b i the diamond box

Command used for most decisions

Most decisions are conditional statements; hence, the if command is often used for decisions.

pls answer i need to turn it in today!!In computing flowcharts how are decisions represented?What is

HOW MANY PROGRAMMING LANGUAGES SHOULD I LEARN TO MAKE A GAME LIKE AGAR.IO, SLITHER.IO ETC

Answers

Answer:

learn to make slither

Explanation:

it is such a cool game

also please can you heart and like my comment and rate it 5 stars please and give it brainliest pls i beg you thx !!!

Answer:

u could learn one as simple as scratch program language the one with the orange cat

Explanation:

coding is really hard i do not understnad java at all

One element of database security is to provide only authorized users with?

Answers

One element of database security is to provide only authorized users with access to sensitive data. This is a critical aspect of ensuring the confidentiality and integrity of data stored in a database. In order to achieve this level of security, a variety of mechanisms can be put in place, including authentication, authorization, and encryption.

Authentication is the process of verifying the identity of a user, and is typically accomplished through the use of usernames and passwords. This ensures that only authorized users are able to access the database, and helps to prevent unauthorized access.Authorization involves granting specific privileges or permissions to users based on their role or level of access. For example, a database administrator may have full access to all data, while a regular user may only be able to view and modify certain records.Encryption is another important aspect of database security, as it involves converting sensitive data into an unreadable format using a key or algorithm. This helps to protect data from unauthorized access, as even if someone gains access to the data, they will not be able to read or interpret it without the appropriate key.Providing only authorized users with access to sensitive data is a key element of database security, and involves a combination of authentication, authorization, and encryption techniques. By implementing these mechanisms, organizations can ensure that their data is secure and protected from unauthorized access.

For such more questions on database security

https://brainly.com/question/29808101

#SPJ11

keisha is a network administrator. she wants a cloud-based service that will allow her to load operating systems on virtual machines and manage them as if they were local servers. what service is keisha looking for?

Answers

The service is keisha looking for is cloud computing. Cloud computing depends on resource sharing to accomplish coherence.

In order to provide quicker innovation, adaptable resources, and scale economies, cloud computing, in its simplest form, is the supply of computing services via the Internet ("the cloud"), encompassing servers, storage, databases, networking, software, analytics, and intelligence.

The on-demand availability of computer system resources, in particular data storage (cloud storage) and processing power, without direct active supervision by the user, is known as cloud computing. Functions in large clouds are frequently dispersed over several sites, each of which is a data center. Cloud computing often uses a "pay as you go" model, which can help reduce capital expenses but may also result in unanticipated running expenses for users. Cloud computing depends on resource sharing to accomplish coherence.

To know more about cloud computing click here:

https://brainly.com/question/11973901

#SPJ4

The short-range two-way communication technology behind contactless payments is called ____.

Answers

Answer:The answer is near field communication.

Explanation:

How is video compression accomplished?
Video compression works by making the pixel size smaller.
Video compression works by removing the sound.
Video compression works by smoothing the pixels.
Video compression works by removing unnecessary parts of frames

Answers

Video compression works by making pixels smaller, so A.

Answer:

A. Video compression works by making the pixel size smaller.

Explanation:

E2020!

in this clip, the filmmakers connect each shot using a technique called – . these editing choices are intended to maintain cinematic – and hide the edit.

Answers

The filmmakers connect each shot using a technique called Cutting on action.

These editing choices are intended to maintain cinematic hides the shift from one shot to the next and hide the edit.

What is meant by cutting on action?

Cutting on Action is known to be a term that is said to be used by editor and it is one that implies the  cuts in the middle of a given action to another shot that tends to matches the first shot's  said action.

Note that it is seen as a common editing method that tends to hides the shift from one shot angle  to another shot angle and this is often done  by stopping the first shot in the middle of another continuing action and then beginning the next shot at some distance along in the similar action.

Therefore,  The filmmakers connect each shot using a technique called Cutting on action. These editing choices are intended to maintain cinematic hides the shift from one shot to the next and hide the edit.

Learn more about filmmakers from

https://brainly.com/question/28110104
#SPJ1

Other Questions
china was not supportive of attempts by the United States in __________A. Creating a Sphere of influenceB. Trade with Great BritainC. The Roosevelt CorollaryD. The Spanish American War Identify the role of women in American society before, during, and after World War I. In this reaction, how many moles of propane (C3H8) would react with 15 moles of O2? C3H8 + 5O2 4H2O + 3CO2 A new and improved snack has 22% fewer calories less thatn the origanal version of the snack. If the old version had 200 calories how many calories does the new snack have. List three conditions for current to flow in a circuit. in lecture, it was explained that the pope issued a papal bull dividing the east and west trade routes and lands between spain and portugal primarily for the following reason: group of answer choices they had the most powerful land armies they were the wealthiest countries in europe at the time they were the strongest naval powers they were the only loyal catholic countries =* When the stock market fell, Hayes lost 18% of the value of his stocks. Thestock was worth $2,486.95 before the loss. What was the stock worth after?the loss choose the correct top, front, and side views for this object and labeled each one. A ____ is characterized by "" angle brackets. there are many different kinds in html. *a. documentb. tagc. contentd. element A single acting 40 mm diameter cylinder has a spring return. The spring is relaxed when the piston rod is fully retracted and the spring has a stiffness of 50 N/m. a. The piston rod is extended 120 mm against a load of 10 N. What is the pressure in the cylinder when the extension is 60 mm ? What is the pressure in the cylinder when the extension is 120 mm ? Neglect friction in the cylinder. b. Assuming that the net force on the load is zero at all times and that the flow rate into the cylinder is 40,000 mm 3 /second how long does the above described extension take? c. At the end of the extension period the supply valve is switched so that the piston chamber exhausts through an exhaust port. Determine the flow rate through the exhaust port if the retraction takes 5 seconds, assuming this flow rate is constant in time. d. During the retraction find the pressure in the cylinder as a function of time. Call t=0 the time at the beginning of the retraction and t=5 seconds the end of the retraction period and plot the pressure versus time. PLEASEEE HELP ME WITH THISSSS The constant of 2/3 cupcakes per minute means that in a minute, 2/3 of a cupcake is made. Given the graph of w(x), w(2) = ?(the graph is below) during which stages of sleep do individuals experience a drowsy inteveral between waking and sleeping, charaterized by hallucinatory, dreamlike experiences known as a hypnagogic state? Can anyone help me with this? a box of oranges weighs 4kg. if one orange weighs 80 g how many oranges are in the box? (a-2)^2=64 Please help solve? Which inequality represents all values of x for which the quotient below isdefined?im not rlly understanding how to do this A Galapagos turtle travels 7 cm/s. How long would it take the turtle to travel 90 m (that'sthe length of the science hallway ANSWER QUESTIONS WILL GIVE BRAINLIEST DOSEN'T NEED TO BE TO PROFOUND JUST STRAIGHT ANSWERS 30 PTS1) The Dark Ages were a time of danger, confusion, and disorder. Why do you think the expression 'Dark Ages' is used to describe the Middle Ages in Europe?2) The people in Western Europe were threatened by barbarians, robbers, Vikings, bandits, Huns, Mongols, etc...If you lived during this 'dark time', would you have given up your freedom and become a serf in exchange for protection? 3) Give 2 examples of how the code of chivalry are used today.4) Although lords expected their serfs to work hard, they rarely mistreated or overtaxed them. Why do you think this was the case?5) Serfs lived a life of misery and hardship. They could not leave the manor without permission. They had to give share of their crops and labors to the lord. They lived relatively poorly and ate simple meals. Why did so many 'accept' this lifestyle? Outside temperature over a day can be modeled as a sinusoidal function. Suppose you know the high temperature of 53 degrees occurs at 4 PM and the average temperature for the day is 45 degrees. Find the temperature, to the nearest degree, at 11 AM.