When programming the emergency key for an SKEY1, which zone/sensor types are recommended to use?

Answers

Answer 1

When programming the emergency key for an SKEY1, it is recommended to use the zone/sensor types that are most critical to the security of the premises. For example, doors and windows that are easily accessible from the outside should be included as emergency zones, as well as motion sensors in areas where an intruder may attempt to enter. It is important to carefully consider which zones/sensors are most important for emergency situations and program them accordingly to ensure the best possible security measures are in place.
Hi! When programming the emergency key for an SKEY1, it is recommended to use the following zone/sensor types:

1. Panic: This type is suitable for emergency situations where immediate assistance is needed, like a break-in or personal threat.

2. Fire: This type is recommended for situations involving fire emergencies, which may require quick response from the fire department.

3. Medical: This type is designed for medical emergencies, like a sudden illness or injury, and will notify medical personnel.

Make sure to choose the appropriate zone/sensor type based on the specific emergency situation the SKEY1 key is intended to address.


Related Questions

Take one action in the next two days to build your network. You can join a club, talk to new people, or serve someone. Write about this action and submit this as your work for the lesson. icon Assignment

Answers

Making connections is crucial since it increases your versatility.You have a support system of people you can turn to when things get tough so they can help you find solutions or in any other way.

What are the advantages of joining a new club?

Support Network - Joining a club or organization can help you develop a support network in addition to helping you make new acquaintances and meet people.Your teammates and friends will be there for you not only during practice but also amid personal difficulties. Working collaboratively inside a group, between groups, between communities, or between villages is known as network building.One method of creating a network is by forming a group. Attending events and conferences and developing connections with other attendees and industry speakers is one of the finest methods to build a strong network.In fact, the framework of many networking events and conferences encourages networking and connection opportunities. Personal networking is the process of establishing connections with organizations or individuals that share our interests.Relationship growth often takes place at one of the three levels listed below:Networks for professionals.Neighborhood networks.Personal networks. Reaching out is part of an active communication process that will help you learn more about the other person's interests, needs, viewpoints, and contacts.It is a life skill that needs to be actively handled in order to preserve or, more importantly, to advance a prosperous profession. various network types.PAN (personal area network), LAN (local area network), MAN (metropolitan area network), and WAN (wide area network) are the different types of networks.

To learn more about network refer

https://brainly.com/question/28041042

#SPJ1    

Write a c program that uses iteration to find the sum of all multiples of 3
and all multiples of 4 between 3 and 150 inclusive. Print the sum.

Answers

#include<stdio.h>

int main()

{

int sum_3=0, sum_4=0; //Variable to store the sum of multiples of 3 and 4

for(int i=3; i<=150; i++) //Iterating from 3 to 150

{

if(i%3==0) //Checking if i is a multiple of 3

sum_3 += i; //Adding i to the sum of multiples of 3

if(i%4==0) //Checking if i is a multiple of 4

sum_4 += i; //Adding i to the sum of multiples of 4

}

printf("Sum of multiples of 3: %d\n", sum_3); //Printing the sum of multiples of 3

printf("Sum of multiples of 4: %d\n", sum_4); //Printing the sum of multiples of 4

return 0;

}

Does technology make us lazy? Explain. (Remember to support your
answer with citations and references)

Answers

The impact of technology on human laziness is a topic that has been widely debated and it is true to some extent.

Does technology make us lazy?

Some argue it makes us lazy, while others say it can enhance productivity and efficiency.

Argument - technology makes us lazy. Advocates claim tech's conveniences can promote inactivity and a sedentary lifestyle. Tasks once done by hand can now be completed with machines, leading to possible over-reliance on technology and less physical activity, which causes health issues.

Tech improves productivity and efficiency.  Tech revolutionized communication, info access, & task automation, enabling more accomplishment in less time.

Learn more about  technology  from

https://brainly.com/question/7788080

#SPJ1

what is the approximate bandwidth of a 13-wpm international morse code transmission?A. 13 HZB. 26 HZC. 52 HZD. 104 HZ

Answers

The correct answer is International Morse code is a method of transmitting information through a series of dots and dashes that represent letters, numbers, and symbols.

To calculate the bandwidth of a 13-wpm Morse code transmission, we need to consider the frequency range of the dots and dashes, as well as the spacing between them. Morse code transmissions typically use a keying tone to indicate the start and end of each character, which is typically a square wave with a frequency of around 800 Hz. The dots and dashes themselves are usually modulated onto this tone by varying the duration of the keying signal.  For a 13-wpm Morse code transmission, each character will take approximately 4.6 seconds to transmit (assuming a standard word length of 5 characters). The dots and dashes themselves are typically much shorter than this, lasting only a fraction of a second each. However, the keying tone and the spacing between characters also contribute to the overall bandwidth of the transmission. Based on these factors, the approximate bandwidth of a 13-wpm Morse code transmission is around 52 Hz. This takes into account the frequency range required to accurately transmit the keying tone, as well as the variations in duration between the dots, dashes, and spaces. It's worth noting that this is a relatively narrow bandwidth compared to many other forms of communication, such as voice or data transmissions, which typically require much higher bandwidths to transmit information accurately.

To learn more about transmission click on the link below:

brainly.com/question/14725358

#SPJ4

The arrow next to All Programs indicates _____.

A. The importance of the item
B. That this was the most recently used item
C. The presence of a submenu
D. that this item cannot be selected
NEED HELP FAST!

Answers

Answer:

c is the answer.

Explanation:

Answer:

C - Presence of a submenu

Explanation:

got it right, computer class edge 22

You work in a branch office and use a desktop system named Comp1. A Windows server named Srv1 is located in the main office.Srv1 stores several shared folders that you use, including the Data share. You use Offline Files in the branch office to make the files on the server are available when the WAN link is down.How can you prevent all files in the Data share from being cached while making sure files in other shared folders are still available?A. On Srv1, edit the Local Security Policy.B. On Comp1, edit the Offline Files settings in the Sync Center.C. On Srv1, edit the properties for the Datafolder.D. On Srv1, edit the Offline Files settings in the Sync Center.

Answers

Answer:

C. On Srv1, edit the properties for the Data folder

Explanation:

Using the caching feature of Offline Folder gives users access to shared folders through the maintenance of a local copy which allows users to continue working with the resources in the shared folder in the event the server hosting the folder cannot be reached, which leads to increased  productivity. However, when a shared folder is the storage location of sensitive data to which there is restricted access, it may be required to prevent the folder from being cached

The caching option property for the shared folder can be set from within the Offline Settings, to configure the availability of the folder when the server WAN link is down

Which phrases from the two selections MOST help the reader define the meaning of "captivity"?

A
wild animals; how nice its home is
B
suffer; rights like people have
C
needs cannot be met; any living thing
D
unnatural homes; holding wild animals

Answers

D is the right and sorry if weong

what do i do for this not to stop me from trying to ask a question. / What phrases are / could be hurtful to brainly? - Don't use such phrases here, not cool! It hurts our feelings :(

Answers

I’m mad confused like the person on top

Gina, an IT professional, noticed that the servers were running very slowly. She evaluated the system and made a recommendation to the workers at her company to improve the performance of the system. She told them that the most important thing they could do to help was to _____.


stop opening attachments

delete unneeded e-mail

log off the system for at least two hours each workday

limit the number of e-mails they replied to each week

Answers

Answer:

delete unneeded e-mail

Explanation:

this will free up space

delete unneeded e-mails

Explanation:

once you delete unneeded emails you wont have an risk for an slower functioning work day

29. What is systematic error detection?

Answers

Systematic error detection refers to the process of identifying and analyzing consistent inaccuracies or biases in measurements or data collection.

Systematic error detection refers to the process of identifying and correcting errors that occur consistently or repeatedly in a system or process. These errors may be caused by faulty equipment, flawed procedures, or other factors that impact the accuracy or reliability of data. By detecting and addressing these errors, organizations can improve the quality of their output and minimize the risk of costly mistakes. This process typically involves a combination of automated and manual checks to identify patterns and anomalies in data and to ensure that all inputs and outputs are functioning correctly.

Learn more about error here-

https://brainly.com/question/30524252

#SPJ11

Job opportunities in the computer science field are expected to (5 points)
A. increase
B. stay the same
C. decrease
D. be limited

Answers

Answer:

A) increase

Explanation:

Computer science is a high-demand job and is one of the crucial components needed to run future technology.

Answer:

(C) decrease

Explanation:

Because Artificial intelligence is coming ♕︎ first increase for few years but when it dec decrease then never will increase again.

Please help with filling out column K "Alaska specific mortality rate (MAR)" , column L "Alaska Mar*Pas" and Calculate the age-adjusted mortality rate for Alaska (SDR1).

Answers

To fill out column K, divide the number of deaths in Alaska by the population of Alaska, multiplied by 1000.

To calculate the Alaska specific mortality rate (MAR) in column K, you would need the number of deaths in Alaska and the population of Alaska. The formula for the mortality rate is:

MAR = (Number of deaths in Alaska / Population of Alaska) * 1000

Once you have the MAR, you can calculate the product of the MAR and the proportion of the population in each age group (Pas) to fill out column L. For example, if you have age groups A, B, C, and D, and their respective proportions are P1, P2, P3, and P4, the formula would be:

Alaska Mar*Pas = MAR * Pas

To calculate the age-adjusted mortality rate for Alaska (SDR1), you would need the age-specific mortality rates for Alaska and the standard population. The age-specific mortality rates represent the mortality rates within each age group. The standard population is a hypothetical population with known age distribution, which is used as a reference to compare mortality rates across different populations.

The formula for calculating the age-adjusted mortality rate is:

SDR1 = Σ [(ASMRi * Wi) / Wstd]

Where ASMRi is the age-specific mortality rate for each age group, Wi is the proportion of the standard population in each age group, and Wstd is the sum of the proportions of the standard population.

By summing the products of the age-specific mortality rates and their corresponding weights (based on the standard population), you can calculate the age-adjusted mortality rate for Alaska (SDR1).

Remember to ensure that all necessary data is available, such as the number of deaths, population data, age-specific mortality rates, and the proportion of the standard population in each age group, in order to accurately calculate the mortality rates and fill out the columns.

learn more about Alaska Mortality.

brainly.com/question/33487721

#SPJ11

This sentence is false
A. Boolean
B. Not Boolean

Answers

Based on the above scenario, This sentence is false is Not Boolean.

Is false A Boolean?

There are two boolean values. They are known to be True and False .

Note that Capitalization is vital, since true and false are not boolean values and as such, Based on the above scenario, This sentence is false is Not Boolean. because the Boolean is known to be  case sensitive as it is in small letters.

Learn more about Boolean from

https://brainly.com/question/2467366

#SPJ1

Looking at the screen while typing can help with key memorization.
true
false

Answers

Answer:

true

Explanation:

true because you can catch your typos as they occour

True if you aren’t looking at the keyboard obviously you would be mesmerized it

Which Information Does a Traditional Stateful Firewall Maintain?
a. A stateful firewall keeps track of all incoming and outgoing traffic and compares it against a set of predefined rules. If the traffic does not match the rules, it is blocked.
b. A stateful firewall can also keep track of different types of traffic, such as UDP or TCP, and allow or deny based on that information.
c. A stateful firewall can keep track of different connections and allow or deny them based on the connection’s state.

Answers

A traditional stateful firewall maintains information about different connections and allows or denies them based on the connection’s state. The correct option is c.

A traditional stateful firewall is a firewall that has the ability to monitor the state of active connections and block those that are deemed dangerous. A stateful firewall maintains information about different connections and allows or denies them based on the connection's state. This type of firewall keeps track of all incoming and outgoing traffic and compares it against a set of predefined rules.A traditional stateful firewall maintains information about different connections and allows or denies them based on the connection’s state. If a packet is accepted, the firewall remembers this and automatically permits all future packets that are part of the same connection. It also filters packets based on source and destination address, source and destination port, and the direction of the packet (inbound or outbound). Stateful firewalls can also monitor the state of active connections and block those that are deemed dangerous.Traditional stateful firewalls offer the following benefits:Stateful inspection: This firewall inspects all data packets that come into and out of the network to ensure they conform to preconfigured security rules. The system recognizes the relationships between packets, and it can thus block potentially dangerous traffic without interrupting legitimate business traffic.Multilayer filtering: These firewalls can filter traffic on many layers of the OSI model, from the network layer to the application layer. The different types of filtering help to protect the network from a wide range of security threats.Easy management: These firewalls are typically simple to set up and manage. They're designed to work out of the box and to require only basic configuration, making them suitable for smaller businesses with less complex needs.Therefore, the correct option is c.

Learn more about firewalls: https://brainly.com/question/13693641

#SPJ11

Where does the revolver get the IP address of a site not visited before?

the file server

the name server

the IP provider

the print spooler

Answers

Answer: The name server

Explanation:

Nameservers are part of a large database called the Domain Name System (DNS), which acts like a directory for devices and the IP addresses attached to them. What nameservers do is use this information to translate domain names into numerical IP addresses – the language our computers understand

A form of encryption that uses only one key to encrypt and decrypt a file. This is a less
secure form of encryption
O Wiretapping
Symmetric Encryption
Type 2 Authentication
Asymmetric Encryption

A form of encryption that uses only one key to encrypt and decrypt a file. This is a lesssecure form

Answers

Answer:

symmetric encryption

Explanation:

Asymmetric encryption uses 2 keys.

write a function f to c that accepts a temperature in degrees fahrenheit and returns the temperature in degrees celsius. the equation is

Answers

The formula used to convert between Fahrenheit and Celsius is °C = 5/9(°F - 32). The temperature in Fahrenheit can be readily converted to Celsius using the Fahrenheit to Celsius method (F to C formula).

This math tells us that 37.78 degrees Celsius is equal to 100 degrees Fahrenheit.

temp = input("Input the  temperature you like to convert? (e.g., 45F, 102C etc.) : ")

degree = int(temp[:-1])

i_convention = temp[-1]

if i_convention.upper() == "C":

 result = int(round((9 * degree) / 5 + 32))

 o_convention = "Fahrenheit"

elif i_convention.upper() == "F":

 result = int(round((degree - 32) * 5 / 9))

 o_convention = "Celsius"

else:

 print("Input proper convention.")

 quit()

print("The temperature in", o_convention, "is", result, "degrees.")

Learn more about method here-

https://brainly.com/question/18088056

#SPJ4

A Flexible Manufacturing System (FMS) is able to efficiently adapt to changing
needs.
Which of the following developments in the manufacturing industry is said to have
directly contributed to FMS technology?

Answers

Answer:

easily adapt to changes in the type and quantity of the product being manufactured

Explanation:

(Java) Complete the method definition to output the hours given minutes.Output for sample program: 3.5public class HourToMinConv {public void outputMinutesAsHours(double origMinutes) {/* Your solution goes here */}public static void main (String [] args) {HourToMinConv timeConv = new HourToMinConv();// Will be run with 210.0, 3600.0, and 0.0.timeConv.outputMinutesAsHours(210.0);System.out.println("");}}

Answers

Structured Streaming introduces the idea of the output mode. Spark Structured Streaming needs a sink, as we already stated in our previous post. The result table's data is written according to the output mode.

The best way to read streaming data into a DataFrame is by what method?

call readStream(). Using the read. stream() method in R. You can specify the specifics of the source, including the data format, schema, options, etc., in a manner similar to the read interface for creating static DataFrame.

Data output command: what is it?

A data output command instructs the interface to transfer data from the bus into one of its registers in response. The data input command is the polar opposite of the data output command.

To know more about DataFrame visit:-

brainly.com/question/28190273

#SPJ4

Does anyone know? If you do please answer.

Answers

whats the question..

The first step of data analysis after generating questions,
is:
a. Preparation - ensuring data integrity
b. Analyze Data
c. Evaluation results
d. Visualizing results

Answers

The first step of data analysis after generating questions is Visualizing results. Thus, option d is correct.

Data analysis is a process of examining, sanctifying, transubstantiating, and modeling data with the thing of discovering useful information, informing conclusions, and supporting decision- timber. Data analysis has multiple angles and approaches, encompassing different ways under a variety of names, and is used in different business, wisdom, and social wisdom disciplines. In moment's business world, data analysis plays a part in making opinions more scientific and helping businesses operate more effectively.

Data mining is a particular data analysis fashion that focuses on statistical modeling and knowledge discovery for prophetic rather than purely descriptive purposes, while business intelligence covers data analysis that relies heavily on aggregation, fastening substantially on business information.

Learn more about data analysis here:

https://brainly.com/question/30094947

#SPJ4

in what way is a transactional model of communication uniquely different from action and interaction models?

Answers

The transactional model of communication is uniquely different from the action and interaction models in that it views communication as a dynamic process that involves both the sender and the receiver.

Unlike the action model, which views communication as a one-way process where the sender simply sends a message to the receiver, and the interaction model, which views communication as a two-way process where the sender and receiver take turns sending and receiving messages, the transactional model emphasizes the importance of feedback, context, and mutual understanding in communication.In the transactional model, both the sender and the receiver are seen as simultaneously sending and receiving messages, and the meaning of the message is created through their interaction. This model recognizes that communication is a complex and continuous process that involves the exchange of verbal and nonverbal cues, and that the interpretation of those cues is shaped by the context in which they are presented. Therefore, the transactional model is a more comprehensive and holistic approach to understanding communication than the action and interaction models.

To know more about communication visit:

https://brainly.com/question/14809617

#SPJ4

you are installing a 1.5 tb hard drive in a computer. what two methods could you use to partition the hard drive?

Answers

There are several methods to partition a hard drive, but two common methods that could be used to partition a 1.5 TB hard drive are:

Disk Management UtilityThird-Party Partitioning Tool

How do one  partition the hard drive?

Disk Management Utility: The Disk Management Utility is a built-in tool in Windows that can be used to partition a hard drive. To use this method, you can follow these steps:

Open the Disk Management Utility by pressing the Windows key + X and selecting "Disk Management".In the Disk Management window, locate the 1.5 TB hard drive, right-click it, and select "Shrink Volume".Enter the amount of space you want to shrink in MB (1 GB = 1024 MB), and click "Shrink".You will see the unallocated space that you have created. Right-click on it and select "New Simple Volume".Follow the on-screen instructions to set up the partition.

Lastly, in Third-Party Partitioning Tool: There are many third-party partitioning tools available, such as EaseUS Partition Master, MiniTool Partition Wizard, and Paragon Partition Manager. To use this method, you can follow these steps:

Download and install a partitioning tool of your choice.Open the partitioning tool and locate the 1.5 TB hard drive.Use the tool's interface to create a new partition by specifying the size of the partition, the drive letter, and the file system.Follow the on-screen instructions to complete the process.

Learn more about hard drive from

https://brainly.com/question/29608399

#SPJ1

In the function mileage (miles, rate), what does miles and rate represents? keywords function arguments. sub procedures comments

Answers

In the function `mileage(miles, rate)`, the terms "miles" and "rate" represent the function arguments or parameters

1. `miles`: This argument represents the distance traveled in miles. It is a numerical value that indicates the number of miles covered.

2. `rate`: This argument represents the rate of travel, typically measured in miles per hour (mph) or kilometers per hour (km/h). It indicates how fast the distance is being covered.

Function arguments serve as inputs to a function, allowing you to pass values into the function when it is called. In the case of the `mileage` function, these arguments would be used to calculate the total mileage or distance traveled based on the rate of travel.

For example, if you were to call the `mileage` function with `mileage(50, 60)`, it would calculate the total distance traveled when covering 50 miles at a rate of 60 mph.

Regarding "sub procedures comments," it seems like a separate topic. Sub procedures typically refer to subroutines or functions within a program, and comments are explanatory statements added to code to improve its readability and understanding. If you have specific questions about sub procedures or comments, please let me know, and I'll be happy to assist you further.

To learn more about  function click here:

brainly.com/question/29977019?

#SPJ11

Find the total cost of a $125 coat purchased in Los Angeles County where the sales tax is 9%. Use the expression c + 0.09c
A
$11.25
B
$112.50
c
$126.25
0 $136.25

Answers

The answer is B I believe

What action will help make a social media campaign successful? (5 points) Group of answer choices Avoid challenging the audience Create a big goal Avoid using personal stories Show others how to get involved

Answers

You need interesting content if you want to succeed on social media. More clients are drawn to visual content these days than to notes or paragraphs regarding your goods or services.

What social media campaign successful?

Creating engaging content with a message that appeals to your target audience is essential to the success of your media strategy. For the social media sites you'll be using, and for your target, your material should be customized.

Therefore, As an illustration, you can see that I also share visual information on social media platforms, and it is really effective.

Learn more about social media here:

https://brainly.com/question/27588046

#SPJ1

In 2-5 paragraphs, describe how you would create a new database using your software.

Answers

Answer:

1. open the software

2. select a new blank database or database wizard

3. name the database

4. enter field names and select the type of field (text, number, date, currency)

5. make one of the fields the primary key

6. click done, or save and close

7. open the table and add records

which of the following is a short-range wireless personal area network that supports low-power, long-use iot needs?

Answers

The short-range wireless personal area network (PAN) that supports low-power, long-use IoT needs is Bluetooth Low Energy (BLE).

BLE is a wireless communication technology designed for short-range communication between devices. It is a power-efficient variant of the classic Bluetooth technology and is commonly used in IoT devices, wearables, and smart home applications. BLE offers low power consumption, making it suitable for IoT devices that operate on limited battery power and need to function for extended periods. It provides connectivity for a wide range of devices, allowing them to communicate and exchange data over short distances. With its low power requirements, BLE enables energy-efficient operation and extends the battery life of IoT devices. It supports various applications such as health monitoring, asset tracking, smart sensors, and home automation, where low-power, long-use capabilities are essential. Therefore, Bluetooth Low Energy (BLE) is a short-range wireless personal area network that supports low-power, long-use IoT needs.

learn more about short-range wireless here:

https://brainly.com/question/30165807

#SPJ11

Having sound enhances your App, do you agree with this? Explain.

Answers

Answer:

Yes, it does.

Explanation:

I mean, having some sort of audio feedback is obviously useful for a user.

(If it's a media-content-viewer, of course you need sound)

We should discuss some cases here:

1. In case it's a game, sound enhances the experience of the virtual world, by creating what is called an "ambience", or the acoustical surroundings of the environment since you can perceive stuff without the need to look at it.

2. Other apps: It makes the app seem more friendly and comfortable to use, especially if partnered with an animation

Other Questions
Evan cut a triangular piece of cloth to use in a quilt. The perimeter of the cloth is 934 cm. The base of the triangular cloth is 214cm. The remaining two sides are the same length. What is the value of this expression?1,22416 Tia equally shares 8 cookies among 4 friends. Which fraction shows how many cookies each person gets. Can someone help please ? The stomach is primarily located in the ________ quadrant. A food truck did a daily survey of customers to find their food preferences. The data is partially entered in the frequency table. Complete the table to analyzequestionsLikes hamburgers Does not like hamburgers Total77Likes burritos38Does not like burritos95128Total13471Part A What percentage of the survey respondents did not like either hamburgersburritos? (2 points)Part 3: Create a relative frequency table and determine what percentage of students who like hamburgers also like burritos. (3 points)Part C. Use the conditional relative frequencies to determine which two data point has strongest association of its two factors. Use complete sentences to explain your answer. (5 points)X6= 2 X SourceBIUS X, XT-35 Styles- Format-Font- Sad- A - A - ? what is 4/7x -3x-3/x-x A standardized biological microscope has an 4.0-mm-focal-length objective. What focal-length eyepiece should be used to achieve a total magnification of 200X? Express your answer to two significant figures and include the appropriate units.. The soccer team practices passing for 3/4 hour and shooting for 4/5 hour. On which drill does the team spend less time? Explain how you can use the model to find the answer. copernicus: characterizing the performance implications of compression formats used in sparse workloads In 3 to 4 sentences, explain how the consumers OR the suppliers can promote the common good. The answer should also contain the relevant chosen concept/s of supply and/or demand. the scatter plot shows the average ticket price and the number of wins fora certain NFL teams.How much more is the average price of a ticket for a team with than a team with 3 wins? round to the nearest dollar if necessary.PLS HELP ME AHHH State the slope and y-intercept of the graph of y+2x=3 Select two examples of how Naomi Shihab Nye uses metaphors in the poem, "Making a Fist." (Check all that apply) what technologies enabled europeans to travel out into the open oceans to search for and secure new trade routes to china and india? where did the europeans acquire these technologies? Describe the different types of proteins that facilitate diffusion across the membrane, explaining how they accomplish this task.LO#2 (Set 2) A convex mirror is used in automobiles to have a Clear View of the traffic behind? give reason A homeowner wishes to put a fence around a space in her yard to create a dog pen. The space that she wants to fence in is shown below where each unit on thegraph represents one foot,6How many feet of fencing will the homeowner need to build the dog pen?38 + 4V2545238 + 1072 Which sentence describes an approach used by good fiction writers to orient readers early in a story?Describe the sequence of important events leading to the storys climax.Tell the reader what the story will be about, in a brief summary.Introduce major characters, provide some setting details, and reveal the conflict using sensory details.Carefully describe the narrator and point of view for the story. I will give brainliest for correct answerYou plan to survey people to see what percent own their home and what percent rent. Which survey is most likely to give you a random sample?a. You mail a survey to every 10th address from a list of retirement community addresses.b. You interview people in the street near an apartment complex.c. You mail a survey to every 20th person in the telephone book.d. You interview people outside a pool supply store in the suburbs.