Write an Assembly language program that allow a user to input his/her name and age, then the program will show if the person is eligible to vote. A person who is eligible to vote must be older than or

Answers

Answer 1

The Assembly language program outlined allows a user to input their name and age, subsequently determining if they're eligible to vote.

This is accomplished by setting the voting age limit and comparing the user's input with it, subsequently displaying appropriate messages.

In the Assembly program, we firstly prompt the user to enter their name and age, which are stored in specific memory addresses. The input age is then compared to a set voting age (18 in this case). If the user's age is greater or equal to 18, a message of eligibility to vote is displayed; otherwise, an ineligibility message is shown. Please note that different Assembly syntax and conventions may be used depending on the specific Assembly language variant and processor architecture in use.

Learn more about Assembly language here:

https://brainly.com/question/31227537

#SPJ11


Related Questions

How can we solve mental stress?

Hello can anyone answer

Answers

Answer:

Please don't delete it. Because other people did!

Explanation:

Use guided meditation, Practice deep breathing, Maintain physical exercise and good nutrition!

Answer:

By making yourself comfortable around your environment.I know it can be hard but try making yourself feel distracted from stress.Have a break from what you are doing and take your time to heal.


Explanation:

PLZ HELP!!! Which of the following does the error checking for the frame?


CRC

SFD

FCS

LLC

Answers

Answer:

CRC

Explanation:

Answer:CRC

Explanation:

is an error-detecting code is commonly used in digital networks and storage devices to detect accidental changes to raw data. i dont know if this helped

Is system software that manages computer hardware and software resources and provides common services for computer progrmas

Answers

The system software that manages computer hardware and software resources and provides common services for computer programs is called an operating system.

An operating system (OS) is a fundamental component of a computer system that acts as an intermediary between hardware and software. Its primary purpose is to manage and coordinate the various hardware resources such as the CPU, memory, storage devices, and input/output devices. It also provides essential services and functionalities that enable computer programs to run efficiently and interact with the hardware.

The operating system performs tasks like process management, memory management, file system management, device management, and user interface management. It ensures the allocation and efficient utilization of system resources, facilitates multitasking and concurrency and provides security mechanisms to protect the system and user data.

Learn more about operating systems here:

https://brainly.com/question/29532405

#SPJ11

What phase of a batch job using a Batch scope must contain at least one message processor?
- Input
- Load and Dispatch
- Process Records
- On Complete

Answers

The "Process Records" phase of a batch job using a Batch scope must contain at least one message processor.

In a batch job using a Batch scope, the "Process Records" phase must contain at least one message processor.

The Batch scope is a powerful Mule component that enables the processing of large amounts of data in a batch.

When a batch job is executed, it is divided into several phases, which include the "Input" phase, the "Load and Dispatch" phase, the "Process Records" phase, and the "On Complete" phase.

The "Process Records" phase is where the actual processing of each record takes place.

It is in this phase where you can define the specific message processors that will be used to perform the desired processing tasks.

At least one message processor is required in this phase, as it is the core of the batch processing logic.

Without a message processor in this phase, the batch job will not be able to process any records.

For more such questions on  Message processor:

https://brainly.com/question/29371108

#SPJ11

convert decimal number 255 to hexadecimal representation and show your approach.

Answers

The decimal number 255 can be represented as FF in hexadecimal notation.

To convert a decimal number to its hexadecimal representation, we divide the decimal number by 16 and obtain the quotient and remainder. The remainder will be a digit in the hexadecimal representation, and the quotient will be further divided until we reach zero.

In this case, when we divide 255 by 16, we get a quotient of 15 and a remainder of 15. The remainder 15 corresponds to the hexadecimal digit F. Since the quotient is less than 16, we stop dividing and obtain the final hexadecimal representation of FF.

To summarize, the decimal number 255 is represented as FF in hexadecimal notation.

Learn more about  hexadecimal representation here :

https://brainly.com/question/14542979

#SPJ11

What are the 2 types of Digital Imagery?

Answers

Answer:

vector or raster

Explanation:

You have just finished installing an updated kernel on your email server that has been patched to solve a security vulnerability and wish to reboot as soon as possible. This is a busy time of day, and you do not want the server down any longer than necessary. Which option prevents fsck from running after the reboot and allows the system to boot faster?

Answers

In order to prevent fsck from running after the reboot and allow the system to boot faster, the `tune2fs` command can be used.

The `fsck` command is a file system checking tool that can be used to check the integrity of a file system, as well as to repair inconsistencies that are discovered.What is tune2fs?The `tune2fs` command is a Linux command that can be used to change the file system parameters of the `ext2`, `ext3`, or `ext4` file system.

This can include changing parameters such as the size of the file system journal, the maximum number of mounts before the file system is checked, and so on.

Now, to prevent `fsck` from running after the reboot and allow the system to boot faster, execute the following command:`tune2fs -c 0 -i 0 /dev/sda1`Where:`-c` stands for "maximum mount count."

Set to 0 to disable check on a specified number of mounts `-i` stands for "time interval."

Set to 0 to disable time-based checking. `/dev/sda1` stands for the block device that corresponds to the root partition.

To know more about `fsck` command, visit https://brainly.com/question/32137810

#SPJ11

please convert this for loop into while loop

please convert this for loop into while loop

Answers

Answer:

The code segment was written in Python Programming Language;

The while loop equivalent is as follows:

i = 1

j = 1

while i < 6:

     while j < i + 1:

           print('*',end='')

           j = j + 1

     i = i + 1

     print()

Explanation:

(See attachment for proper format of the program)

In the given lines of code to while loop, the iterating variables i and j were initialised to i;

So, the equivalent program segment (in while loop) must also start by initialising both variables to 1;

i = 1

j = 1

The range of the outer iteration is, i = 1 to 6

The equivalent of this (using while loop) is

while ( i < 6)

Not to forget that variable i has been initialized to 1.

The range of the inner iteration is, j = 1 to i + 1;

The equivalent of this (using while loop) is

while ( j < i + 1)

Also, not to forget that variable j has been initialized to 1.

The two iteration is then followed by a print statement; print('*',end='')

After the print statement has been executed, the inner loop must be close (thus was done by the statement on line 6, j = j + 1)

As seen in the for loop statements, the outer loop was closed immediately after the inner loop;

The same is done in the while loop statement (on line 7)

The closure of the inner loop is followed by another print statement on line 7 (i = i + 1)

Both loops were followed by a print statement on line 8.

The output of both program is

*

*

*

*

*

please convert this for loop into while loop

How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas

Answers

The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.

How did Native Americans gain from the long cattle drives?

When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.

Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.

There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.

Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.

Learn more about cattle drives from

https://brainly.com/question/16118067
#SPJ1

I have a very quick question. So im applying for Early college and i need some future educational goals and maybe im just thinking about it ENTIRELY too much but what are some goals?? like are they asking for what i plan on doing in my future as in job?? Or what?? I put it in Computers and tech bc thats the subject i plan on pursuing

Answers

Answer:

no sé no entiendo inglés

1. .……............. can be considered as raw data.

(a) Sithum’s G.C.E. (O/L) examination results

(b) Z-Score of G.C.E. (O/L) examination results

(c) The average marks of students of G.C.E. (O/L) examination

(d) The top ten total marks of students of G.C.E. (O/L) examination

Answers

Answer:

(a) Sithum's G.C.E. (O/L) examination results

Explanation:

Raw data which is also known as primary data, are the data collected when performing a research, investigation or study, which are obtained through a survey, experiment, or observation and from which correlations and distributions can be calculated, only when the data is complete

Therefore, raw data is unprocessed data, and the option which can be considered as raw data is the option which is not processed, which is Sithum's G.C.E. (O/L) examination results.

you plan to create an azure container instance named container1 that will use a docker image named image1. you need to ensure that container1 has persistent storage. which azure resources should you deploy for the persistent storage?

Answers

To provide persistent storage for the Azure Container Instance (ACI) named container1, you can deploy either Azure File Shares or Azure Blob Storage resources.

To ensure that the Azure Container Instance (ACI) named container1 has persistent storage, you can deploy Azure File Shares or Azure Blob Storage as the persistent storage resources.

1. Azure File Shares: Azure File Shares provide fully managed file shares in the cloud that can be accessed using the Server Message Block (SMB) protocol. You can create an Azure File Share and mount it as a volume within the container instance. This allows the container to read and write data to the file share, providing persistent storage.

2. Azure Blob Storage: Azure Blob Storage is an object storage solution that offers highly scalable and durable storage for various types of data. You can create a Blob Storage container and mount it as a volume within the container instance. This enables the container to store and retrieve files as blobs, ensuring persistent storage.

Both Azure File Shares and Azure Blob Storage can be used as durable and scalable options for persistent storage in Azure Container Instances. The choice between them depends on the specific requirements of your application. If you need to access files using the traditional file system APIs, Azure File Shares is a suitable option. If your application works with objects or requires more flexibility in terms of storage capabilities, Azure Blob Storage is a good choice.

By utilizing either Azure File Shares or Azure Blob Storage, you can provide persistent storage to your container instance, allowing data to be retained even when the container is restarted or redeployed.

Learn more about Azure:

https://brainly.com/question/28400230

#SPJ11

write short cut of
fully justified​

Answers

Answer:

To make text justified, select and highlight the text first, then hold down Ctrl (the control key) on the keyboard and then press J. To make the text left aligned again, press and hold down Ctrl on the keyboard and press L

What are the flowchart symbols?​

Answers

Answer:Flowchart use to represent different types of action and steps in the process.These are known as flowchart symbol.

Explanation:The flowchart symbols are lines and arrows show the step and relations, these are known as flowchart symbol.

Diamond shape: This types of  flow chart symbols represent a decision.

Rectangle shape:This types of flow chart symbols represent a process.

Start/End : it represent that start or end point.

Arrows: it represent that representative shapes.

Input/output: it represent that input or output.

Which of the following is considered data? Attributes that define properties or characteristics of an object Documents that outline useful statistics and figures for humans Quantities, characters, or symbols computers use to perform operations Values derived from facts that have meaning for people

Answers

The statement which is considered data is: quantities, characters, or symbols computers use to perform operations.

What is data?

Data simply refers to any representation of factual instructions or information in a formalized and structured manner, especially as a series of binary digits (bits), symbols, characters, quantities, or strings that are used on computer systems in a company.

The kinds of data type.

In Computer programming, there are four (4) common data types and these include:

Boolean (bool)String (str)Integer type (int)Floating point type (float).

In conclusion, we can reasonably infer and logically deduce that data simply refers to an information that has not been processed.

Read more on data here: brainly.com/question/26207955

#SPJ1

a data analyst is working with a data frame called salary data. they want to create a new column named hourly salary that includes data from the wages column divided by 40. what code chunk lets the analyst create the hourly salary column?

Answers

The analyst can use the mutate() function to create a new column for wages divided by 40 called hourly_salary.

What does wage data collection entail?

A approach known as a pay survey is used to gather data about employee compensation, including salaries and benefits. These are conducted to establish pay ranges for particular job categories and are typically done by location, industry, or job classification with comparison penalties.

Why is pay information crucial?

Underpaying employees as well as issues with attrition and retention can be reduced by regularly reviewing an organization's pay and using compensation data from salary surveys.

                    The reduction of overpaying, which has the negative effect of weakening the financial situation, can also be aided by useful compensation data.

The code chunk is mutate(salary_data, hourly_salary = wages / 40) . The analyst can use the mutate() function to create a new column for wages divided by 40 called hourly_salary.

Learn more about salary data

brainly.com/question/13285192

#SPJ4

once you move your company to the aws cloud, which tools will help you with security compliance to ensure that the correct security settings are put into place? choose all that apply.

Answers

When moving your company to the AWS cloud, several tools can help with security compliance to ensure the correct security settings are put into place.

These tools include AWS Config, Amazon Inspector, and AWS Security Hub. AWS Config provides continuous monitoring of your AWS resources, allowing you to assess, audit, and evaluate configurations. Amazon Inspector automatically assesses applications for vulnerabilities and deviations from best practices. AWS Security Hub provides a comprehensive view of your security posture across AWS accounts, aggregating and organizing security findings from multiple services. By leveraging these tools, you can maintain a secure and compliant environment within your AWS cloud infrastructure.

To know more about AWS cloud visit:

brainly.com/question/29708896

#SPJ11

POINTS
leaving brainly so uh yee have the few points I got left

POINTSleaving brainly so uh yee have the few points I got left

Answers

Have fun in life dude

ᕙ(⇀‸↼‶)ᕗ ಠ‿ಠ

documentation on the memory modules in a computer says that each row is refreshed frequently, specifically, every 64ms. what type of memory is installed? group of answer choices sram cmos ram dram flash ram

Answers

True. A notch on a RAM module's contact surface enables the module to be correctly positioned with a motherboard memory bank.

Random Access Memory (RAM), often known as main memory, primary memory, or system memory, is a piece of hardware that enables the storing and retrieval of data on a computer. DRAM is a kind of memory module, and RAM is frequently related to it. The computer can retrieve data considerably more quickly since it is accessed randomly rather than sequentially like it is on a CD or hard disk. However, RAM is a volatile memory and needs the power to keep the data accessible, unlike ROM or the hard drive. All information in RAM is lost if the computer is switched off.

Learn more about RAM here:

https://brainly.com/question/29582870

#SPJ4

Which two functions are primary functions of a router? (Choose two.)packet forwardingmicrosegmentationdomain name resolutionpath selectionflow control

Answers

The two primary functions of a router are packet forwarding and path selection. Option A and Option D are the correct answers.

Packet forwarding: Routers are responsible for receiving incoming packets and determining the optimal path for forwarding them to their destination. They examine the packet headers, make routing decisions based on the destination IP address, and choose the appropriate outgoing interface for each packet.

Path selection: Routers use routing protocols to exchange information with other routers and build a routing table. The routing table contains information about available network paths and their associated metrics. Based on this information, routers determine the best path for forwarding packets to their destination, considering factors such as cost, network congestion, and link reliability.

Option A and Option D are the correct answers.

You can learn more about router at

https://brainly.com/question/24812743

#SPJ11

Final answer:

The primary functions of a router are packet forwarding and path selection. Packet forwarding is about receiving, processing, and forwarding data to the appropriate destination. Path selection is about determining the best route for the packet from source to destination.

Explanation:

The two primary functions of a router are packet forwarding and path selection. Packet forwarding refers to the process of receiving, processing, and forwarding data to the appropriate destination based on routing protocols whereas path selection is the function of determining the best path via which packets can travel from the source to the destination. Flow control, domain name resolution and micro segmentation are also router operations, but they are not its primary functions.

Learn more about Router Functions here:

https://brainly.com/question/33937042

URGENT! REALLY URGENT! I NEED HELP CREATING A JAVASCRIPT GRAPHICS CODE THAT FULFILLS ALL THESE REQUIREMENTS!

URGENT! REALLY URGENT! I NEED HELP CREATING A JAVASCRIPT GRAPHICS CODE THAT FULFILLS ALL THESE REQUIREMENTS!

Answers

In the program for the game, we have a garden scene represented by a green background and a black rectangular border. The cartoon character is a yellow circle with two black eyes, a smiling face, and arcs for the body. The character is drawn in the center of the screen.

How to explain the information

The game uses Pygame library to handle the graphics and game loop. The garden is drawn using the draw_garden function, and the cartoon character is drawn using the draw_cartoon_character function.

The game loop continuously updates the scene by redrawing the garden and the cartoon character. It also handles user input events and ensures a smooth frame rate. The game exits when the user closes the window.

This example includes appropriate use of variables, a function definition (draw_garden and draw_cartoon_character), and a loop (the main game loop). Additionally, it meets the requirement of using the entire width and height of the canvas, uses a background based on the screen size, and includes shapes (circles, rectangles, arcs) that are used appropriately in the context of the game.

Learn more about program on

https://brainly.com/question/23275071

#SPJ1

how do computer does get a virus​

Answers

Answer: Usually when you go to a unprotected site or download a suspicious link.

Explanation:

When a site is unsecured, it might have viruses that can give hackers your personal data. The same thing by downloading a random link from the internet. Many times, these links have viruses that can break your device or share your data with hackers. These hackers then can sell your data to companies or threaten you with the information they found.

What types of games became popular in the 90s? List three games and how they had evolved from their successful 80s video game rivals.

Answers

Answer:

Doom (1993) Half Life (1998) Super Mario 64 (1997)

Explanation:

Doom and Half-Life were PC games.

Doom was an early 90s PC shooter that was "3d" it wasn't actually 3d but it used a unique rendering system to make it look 3d. It was a level to level shooter that also included secrets

Half-Life was a Actual 3D game and required quite a beefy Graphics card in your computer at the time to run it smoothly, It was a long story-driven game

Super Mario 64 was one of the first "True 3D" games on Home console because it was a launch title for the brand new N64 It utilized the hardware for a brand new experience for console players.

Most 80s games were even more primitive and were either Hosted in arcade cabinets at your local Arcade Such as Outrun (1986) (Btw great soundtrack!) or the NES that allowed you to play the Original few Mario games that were all 2D.

So one of the biggest Evolutions in 80s to 90s gaming is the introduction of 3D titles being able to run on good computers in the early 90s and home consoles could also run 3D titles at the end of the 90s

Pls, mark Brainliest I put my heart and soul into this. Very fun Question!!!

Select the correct answer. which pci security requirement relates to the physical protection of banks’ customer data? a. network security testing b. access control measures c. credit card data protection d. network vulnerability management e. information security policy

Answers

''Network vulnerability management" pci security requirement relates to the physical protection of banks customer data.

By reducing the likelihood that errors in code or configuration may compromise the security of an endpoint or system, vulnerability management refers to a proactive approach to managing network security.

The best technique to evaluate a PC setup for potential security flaws and loopholes is through a network vulnerability assessment.

System directors use it to evaluate a system's security architecture and resistance to potential threats and weaknesses.

Four basic forms of vulnerability—human-social, physical, economic, and environmental—as well as the related direct and indirect losses.

Learn more about bank's customer:

https://brainly.com/question/14955377

#SPJ4

T/F. Only constants and variables may be passed as arguments to methods.

Answers

False. In addition to constants and variables, other entities can be passed as arguments to methods in programming languages. These entities include:

Expressions: An expression can be passed as an argument to a method. For example, you can pass the result of a mathematical expression or a function call as an argument.

Objects: In object-oriented programming, objects can be passed as arguments to methods. Objects encapsulate both data and behavior, allowing them to be used as method arguments.

Arrays: Arrays can be passed as arguments to methods. This allows you to manipulate or access elements of an array within the method.

References: References to objects or variables can be passed as arguments. This allows methods to modify the original object or variable.

It's important to note that the specific language and its syntax determine the types of entities that can be passed as method arguments. The flexibility in passing different types of entities enhances the versatility and functionality of methods in programming.

Learn more about constants here:

https://brainly.com/question/29382237

#SPJ11

What is a combination of two or more simple machines?

a complicated machine
a compound machine
a compiled machine
a converted machine

Answers

A compound machine is a combination of two or more simple machines.
A compound machine hope this helps

Fred works at a publishing house. He is fond of his work and is a passionate team member. His colleagues show concern for him and his work, and he experiences a positive feeling about his work. In the context of job satisfaction, the feeling experienced by Fred is known as

Answers

The feeling experienced by Fred, characterized by his fondness for his work, passion, and positive relationship with colleagues, is known as job satisfaction.

The feeling experienced by Fred, where he has a positive attitude and emotional attachment towards his work, is known as "job satisfaction." Job satisfaction refers to an individual's overall positive or negative evaluation of their job or work experience. It encompasses various aspects such as the fulfillment of one's needs, enjoyment of tasks, positive relationships with colleagues, a sense of achievement, and alignment with personal values and goals.In Fred's case, his fondness for his work, passion, and the positive regard shown by his colleagues contribute to his job satisfaction. He likely finds his work meaningful, enjoys the tasks and responsibilities, feels a sense of belonging within the team, and experiences positive emotions related to his work.


learn more about relationship here :

https://brainly.com/question/2375276

#SPJ11


Write the role of UPS and spike guard in terms of power protection.​

Answers

Answer:

It allows for safe and orderly shutdown of the Computer and Other Connected devices or equipments attached to It.  It can be used as an immediate backup during power cut or failure.

Explanation:

The role of the UPS and spike guard in power protection is absorption of power surges and fluctuations.

The spike guard is a device used to protect electrical equipments from fluctuations and surges.

The UPS is a device used to provide power backup been electrical power drops or fails to a certain unacceptable voltage level.

Role of UPSIt provides steady power to equipment during power failureIt absorbs power surges.

Role of spike guardIt protects electrical equipments from power fluctuationsIt also protects from power surges.

Therefore, the role of the UPS and spike guard in power protection is absorption of power surges and fluctuations.

Learn more about Uninterrupted power supply here:

https://brainly.com/question/7850680

#SPJ2

What are different social phenomenas are you aware of that used part of a social movement, change, or cause

Answers

Answer:

Social change in the broadest sense is any change in social relations. Viewed this way, social change is an ever-present phenomenon in any society.

Explanation:

What does a photovoltaic cell do

Answers

Answer: Photovoltaic simply means they convert sunlight into electricity.

Explanation:

Answer:

Photovoltaic cells have the basic commitment to convert the sun’s energy into usable electricity.

Explanation:

Trust me it’s right

Other Questions
Convert the following hexadecimal numbers to binary. a. x10 b. x801 d. xOFIE2D e. xBCAD number of atoms presented in H2so4 .b) The following regression summary is for the number of unauthorized days that employees are absent per year and the distance (miles) between home and work for the employees SUMMARY OUTPUT Regression Statistics Multiple R 0.8359 R Square 0.6987 Adjusted R Square 0.5983 Standard Error 1.3444 Observations 5 Coefficients 7.2689 Standard Error 1.0494 1 Stat 6.9265 P-value 0.0062 Lower Upper 95% 95% 3.9291 10.6086 Lower Upper 95.0% 95.0% 3.9291 10.6082 Intercept Distance to Work(miles) -0.2466 0.0935 -2.6379 0.0778 -0.5441 0.05092 -0.5441 0.0509 i) State and interpret the correlation coefficient. (2 marks) ii) Write the regression equation for the analysis and interpret the equation. (4 marks) iii) How many unauthorized absent days would an employee who lived 15 miles take? (2 marks)Previous question Find the lower and upper extreme in the first 8 whole numbers. what is the statement of |+1|+5=2 Formamide disrupts hydrogen bonds in aqueous (water-based) solutions. How would you expect formamide to impact the structure of a double-stranded RNA molecule? Briefly ( Can you make a concept map out of the information listed in thechart.?How do the words in the chart relate to each other. Can youcreate a concept map that shows their relationship?Chapter 26 Assignment 1 A Make a concept map with the following terms. Email me a picture of it (or a file). Due by the end of 5/8/22. Hip Gluteus extensors maximus Iliopsoas Hip flexors Tensor fascia When creating an investment policy statement, what do we call the time until the money is going to be needed A. Liquidity B. Constraints C. Margin D. Horizon What is the equation for the graph shown? the amount of apple juice in a 500 ml can from a certain company is distributed as find the probability that fewer than 10 cans in a sample of 60 contain less than 499 ml of juice (round off to third decimal place). At a school dance, the parents sell pizza slices. The table shows the number of pizza slices that are available. A student chooses a slice at random. What is the probability that the student chooses a thin crust slice with pepperoni? the carhart asset pricing model, which includes momentum as an additional factor besides the market excess return, is another name for the fama french 3-factor model. a pension fund manager is considering three mutual funds. the first is a stock fund, the second is a long-term government and corporate bond fund, and the third is a t-bill money market fund that yields a sure rate of 4.2%. the probability distributions of the risky funds are: what is the expected return and standard deviation what is into relation with suitable example In the long run, according to the quantity theory of money and the classical macroeconomic theory, if velocity is constant, then _____ determines real GDP and _____ determines nominal GDP.A) the productive capability of the economy; the money supplyB) the money supply; the productive capability of the economyC) velocity; the money supplyD) the money supply; velocity Choose the sentence that is the strongest conclusion for Silvia's essay.Earning money isn't easy when you're a student. However, it is possible as well as rewarding. Here's what I recommend: Take theentrepreneurial route and go into business for yourself! Lots of kids I know have started their own babysitting or lawn-care businesses. Iopted to open a dog-care business in my neighborhood.I started by researching what other dog-care businesses did and what they charged for their services. Based on that information, Ifigured out a fair price to charge for walking and feeding a dog. I then printed out flyers with my contact information and a description ofthe services I offered. I posted one at the library and gave out a few to neighbors I knew.I started getting calls right away. My mother and I would interview potential clients together and create a plan for each pet. Soon Iwas busy nearly every weekend and a few afternoons after school. I worked hard to care for each dog as if it were my own.Just last year, I was wondering how I could make money.I am learning a lot and providing a valuable service to my clients.I am thinking of opening up my business to include other kinds of pets.If you do not like dogs, I am sure you can think of a job you would enjoy. When Nick reaches for his fork so that he can take a bite of his pasta, he can consciously do so because he is using his _____ nervous system. what was one impact of the stock market crash and the depression on american society?responsesgovernment redistribution of wealthgovernment redistribution of wealtha trend toward larger familiesa trend toward larger familiesrecord high rates of unemploymentrecord high rates of unemploymenta return to a more rural way of lifea return to a more rural way of life 3. A) What were the two major problems immediately facing the Territorial Governorupon arrival? In the question given below, there are two statements marked as Assertion(A) and Reason (R). Read the statements and chose the correct option: Assertion (A): Human capital is superior to other resources. Reason (R): Other resources can be developed only by human beings with their skills and knowledge *1 pointa.Both A and R are true and R is the correct explanation of A.b.Both A and R are true but R is not the correct explanation of A.c.A is correct but R is wrongd.A is wrong but R is correct