you have azure web app named webapp1. you need to integrate github as a source code repository for webapp1. what should you use?

Answers

Answer 1

What should we use to integrate GitHub as a source code repository for webapp1 is deployment center.

What is deployment center?

Deployment center is Azure DevOps that can simplifies your setting to your application.

Deployment center can be use and to integrate to GitHub with these step,

First, open web app in Azure portal.On the left of web app select the deployment center.You can see GitHub under continuous deployment, select that.Select GitHub actions.Next, select the repository, branch, and application stack of GitHub by dropdowns menuBefore click finish, you can see a preview of workflow file that be committed to the repository. If there is no problem then click finish.

Learn more about Azure here:

brainly.com/question/29508209

#SPJ4


Related Questions

What’s a SMART goal? I literally went thru my book 10 times and i can’t find it
S=?
M=?
A=?
R=?
T=?

Answers

Answer:

Specific, measurable, attainable, realistic, time-bound

Explanation:

Answer:

five SMART criteria (Specific, Measurable, Attainable, Relevant, and Time-Bound),

Whats a SMART goal? I literally went thru my book 10 times and i cant find itS=?M=?A=?R=?T=?

An excerpt of a sample business cover letter. The text uses curly font and has a warm to cold color background. What change does NOT need to be made to the above cover letter excerpt before sending it to an employer? a. Remove background color b. Change text to a basic font c. Remove business letter format d. Change font color to black Please select the best answer from the choices provided A B C D.

Answers

Answer:The answer is c because i took the quiz hope this helps

Explanation:

cccccccccccccccccccc

What is the force that resists the motion of an object through a fluid?

Answers

Answer:

Friction (drag)

Explanation:

The force resisting motion through a fluid is a type of friction, that is called drag.

when would instant messaging be the least effective means of communication

Answers

Instant messaging would be least effective means of communication when you have a series of complex questions to ask your colleague.

What is the aim of instant messaging?

Instant messaging is often used as a means of sending textual messages, It is known to be a short one and also quick in nature. It can occur   between business colleagues and friends.

Its  disadvantages is that its is an Ineffective tool for mass communication and also has issues when used for system for archiving.

See options below

A. When you want your colleague to let you know if the hyperlink you sent her is working

B. When you want to tell someone "Happy Birthday!"

C. When you have a series of complex questions to ask your colleague

D. When you want to call an impromptu meeting between some of the people in your office

Learn more about instant messaging from

https://brainly.com/question/26271202

Answer:

When you have a series of complex questions to ask your colleague.

Explanation:

Asking these questions on instant messaging is the least professional way you can ask a colleague about series topics that involve your job, it would be more professional to ask this at work rather than on via message.

SXXSSSSSSSSSZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ

Answers

Answer:

okkkk

Explanation:

MARK ME BRAINLIEST PLZZZZZZZZZZZZZZZZZZZZZZZZzzzzzzzzzzzzzzzzzzzz

a document used to track the progress of remediating identified risk.

Answers

A document commonly used to track the progress of remediating identified risks is a Risk Remediation Tracker or Risk Action Plan.

A Risk Remediation Tracker serves as a central document that lists all identified risks, their severity or impact level, and the corresponding actions or mitigation measures to address each risk. It allows stakeholders to monitor the progress of risk mitigation efforts and ensures that identified risks are being effectively addressed.

The Risk Remediation Tracker typically includes the following information:

Risk Identification: A description or reference to the identified risk, including its source, potential impact, and likelihood.

Risk Owner: The individual or team responsible for overseeing the remediation efforts and ensuring that the necessary actions are taken.

Action Steps: Specific tasks or actions that need to be performed to mitigate the identified risk. Each action step should be well-defined, with clear responsibilities and deadlines.

Status Updates: Regular updates on the progress of each action step, including completion status, any challenges encountered, and any changes or adjustments made to the mitigation approach.

Completion Date: The target date or deadline for completing each action step. By using a Risk Remediation Tracker, organizations can have better visibility into the status of risk mitigation efforts, ensure accountability, and track the overall progress of reducing identified risks to an acceptable level. It also helps in providing documentation and evidence of risk management activities for compliance and reporting purposes.

Learn more about document here

https://brainly.com/question/30434792

#SPJ11

write a function called settozero() that will work with the following section of code. you don't need to put in the prototype, but you need to write a complete function.

Answers

The `settozero()` function that can be used with the provided coding data

```c

#include <stdio.h>

void settozero(int* arr, int size) {

   for (int i = 0; i < size; i++) {

       arr[i] = 0;

   }

}

int main() {

   int numbers[] = {1, 2, 3, 4, 5};

   int size = sizeof(numbers) / sizeof(numbers[0]);

   // Calling the settozero() function

   settozero(numbers, size);

   // Printing the updated array

   for (int i = 0; i < size; i++) {

       printf("%d ", numbers[i]);

   }

   

   return 0;

}

```

In the above code, the `settozero()` function takes an array (`arr`) and its size (`size`) as parameters. It iterates over each element of the array and sets it to zero, effectively zeroing out all the elements.

In the `main()` function, we declare an array called `numbers` and determine its size using the `sizeof` operator. We then call the `settozero()` function, passing the `numbers` array and its size as arguments. After that, we print the updated array to verify that all elements have been set to zero.

Please note that the function assumes the array passed as a parameter is of type `int`. You can modify the data type according to your specific needs.

To know more about data visit:

brainly.com/question/30317504

#SPJ11

HELP 20 points THIS IS ON EDGE IF YOU DON'T KNOW THE ANSWER DON'T RESPOND
Directions
In this assignment, you'll use a word processor to create a newsletter.

Choose from one of the following topics for your newsletter:

Science project
Science report
State report
Country report
Biography
Your newsletter should meet these requirements:

Fill one page.
Include the following:
two or three columns
a title
at least three graphics, but not more than six
When you've finished creating your newsletter, remember to spell check and proofread. Then save your newsletter and upload it.

Question # 1
File Upload
Submit your newsletter that includes the following:

two or three columns
a title
at least three graphics, but not more than six

Answers

Column One: Who was Henry Ford?

            Henry Ford was the founder of Ford Motor Company and also the mass producer of the automobile. Henry Ford was born in 1863. At the age of 16, he worked as a machinist apprentice. Later, Henry began to work the family farm while still working on creating steam engines. Henry had a big interest in steam engines, which would later contribute to him building his first working automobile.

Column Two: How did Henry Ford contribute to our society?

           After marrying in 1888, Ford was hired to work for Edison Illuminating Company. His position was an engineer, and Ford began to accelerate his position in the company quickly. After a while, Ford created his first operating vehicle. This was called the "Quadricycle." Ford wanted to improve on his models, so he founded the Company Ford with others. Ford then began to develop methods of mass-producing automobiles to sell to the public. After success in business, he bought the whole company and owned it all by himself. Ford began to mass-produce automobiles. It is said that " The mass production techniques Henry Ford championed eventually allowed Ford Motor Company to turn out one Model T every 24 seconds." Ford passed away in 1945. He decided to give ownership to his son Edsel Ford before he died, but Edsel sadly died before Henry Ford. The Ford company's ownership was given to Ford's grandson, Henry Ford II.

Please re-word so it isn't plagerized

An Accenture healthcare client is interested in implementing an artificial intelligence solution to improve patient care, but is still skeptical about the technology

Answers

The statement's key point is that, despite their reservations regarding the technology and its efficacy, an Accenture healthcare client is interested in adopting artificial intelligence to enhance patient care.

A software programme known as an artificial intelligence (AI) solution simulates human intelligence and decision-making by using algorithms and machine learning techniques. AI solutions are made to quickly and accurately process and analyse enormous amounts of data, which makes them perfect for a variety of industries, including healthcare. By examining patient data, identifying patterns and trends, and providing individualised treatment suggestions, AI systems can assist healthcare providers in providing better patient care. AI technologies can be utilised to automate administrative activities, streamline operations, and cut expenses in addition to medical care. AI solutions have the potential to change the healthcare sector and enhance patient outcomes because of their capacity to learn and adapt over time.

Learn more about "artificial intelligence solution" here:

https://brainly.com/question/27873801

#SPJ4

which action taken by a teacher best illustrates a benefit digital learning

Answers

Cooperative learning, behaviour management, inquiry based instructions

of the ad formats available on the display network, which one will automatically adjust its presentation to best fit the available space on page?

Answers

Responsive display  ads  will automatically adjust its presentation to best fit the available space on page.

What is meant by Responsive display ads?Ads that are responsive immediately modify their dimensions, visual style, and format to fit available ad slots. Consequently, a single responsive ad may show up as a large image ad in one location and a small text ad in another.The presentation of responsive display advertisements will automatically change to best fit the area on the page.The main distinction between responsive display ads and standard display ads is their versatility. As was already mentioned, responsive display ads instantly modify their shape, size, and format to fit into open ad spaces on that particular website.

To learn more about Responsive display ads refer to:

https://brainly.com/question/14918847

#SPJ4

Which device would allow an attacker to make network clients use an illegitimate default gateway?

Answers

The device that would allow an attacker to make network clients to use an illegitimate default gateway is option B: DHCP server

What is DHCP and why it is used?

This is known to be a kind of an automatic distribution and assignment of IP addresses, default gateways, and other network characteristics to client devices is performed by a DHCP server, that is a type of network server.

To reply to broadcast requests from clients, it uses the widely used Dynamic Host Configuration Protocol, or DHCP.

A network protocol called Dynamic Host Configuration Protocol (DHCP) is used to set up network devices for IP network communication.

Therefore, A DHCP client obtains configuration data from a DHCP server via the DHCP protocol, such as the use of an IP address, any kind of default route, as well as one or a lot of DNS server addresses.

Learn more about DHCP server from

https://brainly.com/question/14407739
#SPJ1

See full question below

Which device would allow an attacker to make network clients use an illegitimate default gateway?

a. RA guard b. DHCP server c. Proxy server d. Network-based firewall

The process of sliding or dragging and then dropping a thumbnail in a new location is called ____

Answers

Answer:The process of sliding or dragging and then dropping a thumbnail in a new location is called "drag and drop." This is a commonly used interaction technique in user interfaces and allows users to move files, icons, or other graphical elements from one location to another.

Explanation:

A business might want to use virtual machine to

allow outside customers access to files
completely eliminate physical servers
easily secure the company intranet
remotely maintain servers

Answers

Answer:

Allow outside customers to access files

Explanation:

A VM doesn't eliminate the need for additional load balancing hardware, an intranet is maintained with multiple computers typically, and remotely maintaining servers can be accomplished with SSH.

The reason you would want a VM for outside customer access is so that they can't interfere with anything outside of the sandboxed environment, this helps to mitigate hacking and easily isolate specific customer information.

A business might want to use virtual machine to allow outside customers access to files, completely eliminate physical servers, easily secure the company intranet, and remotely maintain servers.

What is virtual machine?

A virtual machine (VM) is a software-based emulation of a computer system, allowing a physical computer to run multiple operating systems and applications simultaneously.

A business might want to use virtual machines to:

Allow outside customers access to files: A virtual machine can be set up to provide external customers access to specific files or applications without compromising the security of the company's internal network.

Completely eliminate physical servers: Virtual machines allow multiple operating systems to run on a single physical server, reducing the need for physical hardware and saving costs on maintenance and power consumption.

Easily secure the company intranet: Virtual machines can be used to create a secure network environment that can be easily managed and isolated from the rest of the network.

Remotely maintain servers: Virtual machines can be managed and maintained remotely, which allows IT staff to perform tasks without having to be physically present at the server location. This can save time and reduce costs associated with travel and on-site maintenance.

Thus, all options are correct.

For more details regarding business, visit:

https://brainly.com/question/15826604

#SPJ2

Why does 5 g mm wave require more cells to achieve a better signal

Answers

The 5G mm Wave requires more cells to achieve a better signal due to its higher frequency, shorter wavelength, and limited range.

The 5G mm Wave (millimeter wave) operates at a higher frequency (between 24 GHz and 100 GHz) compared to previous cellular networks. The higher frequency results in a shorter wavelength, which in turn leads to a more limited range of signal propagation. Due to the short range and higher susceptibility to signal attenuation caused by obstacles such as buildings, trees, and even atmospheric conditions, 5G mmWave signals require more cells (smaller and more numerous base stations called small cells) to provide adequate coverage and maintain a strong signal.

The need for more cells in 5G mmWave networks is primarily due to its higher frequency, shorter wavelength, and limited range, which result in more signal attenuation and the need for smaller, more numerous base stations to maintain good coverage and signal strength.

To know more about frequency visit:

https://brainly.com/question/12924624

#SPJ11

Can someone help me with python

Can someone help me with python

Answers

Answer:

here

Explanation:

Python is an interpreted high-level general-purpose programming language. Its design philosophy emphasizes code readability with its use of significant indentation.

Question 1
An example of a function is

Answers

Answer:

red blood cells the red which is responsible for the transport and delivery of oxygen to other body tissues

During active listening, which response is NOT an example of providing feedback to the speaker to show that you understand his or her thoughts?
A.
nodding your head
B.
turning your back to the speaker
C.
saying, "You're saying that his reaction made you feel appreciated?"
D.
saying, "Sorry to interrupt, but can you explain that part again?"

Answers

Answer:

The answer is D.

Explanation:

They/you are asking the speaker to clarify what they just said.

Answer:

B. turning your back to the speaker

Explanation:

Julie is purchasing new shoes on a website for her favorite store. Which of the following would indicate that a website is a secure site? http https www wwws

Answers

Answer:

https

Explanation:

looking at one right now tryna get me some shoes

Answer:

https

Explanation:

what are the main functionalities in ip addresses. hint: there are two.

Answers

The two main functionalities of IP addresses are: Identification and Addressing and Routing.

Identification: IP addresses serve as unique identifiers for devices connected to a network. They enable devices to be identified and distinguished from each other on the internet or within a local network. IP addresses consist of a combination of numbers and are used to establish communication between devices.

Addressing and Routing: IP addresses are used for addressing and routing data packets across networks. When data is sent over the internet, it is divided into packets and each packet is assigned the source and destination IP addresses. Routers use these addresses to determine the appropriate path for the packets to reach their destination. IP addresses play a crucial role in ensuring that data is correctly routed and delivered to the intended recipient.

Know more about IP addresses here:

https://brainly.com/question/31026862

#SPJ11

Miriam Is a network administrator. A few employees want to access sensitive Information stored on a backup device. She wants to give access
rights these employees. Which option will she use?
ОА.
remote desktop
ОВ.
monitoring service
Oc.
user accounts
OD.
print service
OE.
directory service

Miriam Is a network administrator. A few employees want to access sensitive Information stored on a backup

Answers

Answer:

C. user accounts

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list primarily is composed of a set of permissions and operations associated with a NTFS file such as full control, read only, write, read and execute and modify.

Generally, access control list are defined for specific user accounts and may either be an administrator, standard user or guest account.

In this scenario, Miriam a network administrator wants to give access rights to employees who are interested in accessing sensitive Information stored on a backup device. Thus, the option Miriam should use is user account.

Answer:

user accounts

Explanation:

quick question;
In two to three sentences, describe how a business can benefit from data mining.

Answers

A company could benefit from data mining finding valuables in said data. They could use it to earn bitcoin which can be cashed out. Also they can find hidden items unreleased in files.

hope this helps! :D

(30) write a multithreaded program (using posix pthreads) that calculates various statistical values for a list of numbers. this program will be passed a series of numbers on the command line and will then create five separate worker threads. one thread will determine the average of the numbers, the second will determine the maximum value, the third will determine the minimum value, the fourth thread will determine the median value, and the fifth thread will determine the standard deviation. for example, suppose your program is passed the integers 90 81 78 95 79 72 85 the program will report the average value is 82.86 the minimum value is 72.00 the maximum value is 95.00 the median value is 81.00 the standard deviation is 7.77 the variables representing the average, minimum, maximum, median, and standard deviation values will be stored globally. the worker threads will set these values, and the parent thread will output the values once the workers have exited. comment your code and submit it in a file named numstats.cpp

Answers

Programming multiple, concurrent execution threads is known as multithreading.

Explain the multithreading ?On a single CPU, multithreading creates the appearance of parallel processing. The processor actually switches by utilizing a scheduling technique. Alternately, it may flip in response to a mix of outside inputs (interrupts) and the order in which the threads were prioritized.True parallel computing involves multithreading on many processor cores. Together, several microprocessors may provide the desired outcome more quickly. There are several concurrent, simultaneous tasks going on at once.Teams working on development projects nowadays value multithreading. And as technology advances, it will still be crucial.More operations are being conducted on several processor cores as we approach the limitations of what can be done on a single CPU. For AI, this is very crucial.

Learn more about multithreading refer :

https://brainly.com/question/15062443

#SPJ1

(30) write a multithreaded program (using posix pthreads) that calculates various statistical values

On SnapI blocked someone, unblocked them and I want to add them again but I forgot their username. Is there anything I can do? Does snap have a list of like my former friends or people I’ve blocked?

Answers

Answer:

There is no list of people you had blocked formerly, however you should have seen their username when unblocking them? That's the only way I can think to find their user. Maybe if you have a friend who knows their username, you can get it that way. Or if you remember just a bit of it or their first/last name, you can try searching that.

Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.

Answers

Answer:

I am using normally using conditions it will suit for all programming language

Explanation:

if(minimum){

hours=10

}

who sang devil went down to georgia

Answers

Answer:

Charlie Daniels sang that one for sure

HELP ASAP. Which of the following is the best example of an installation issue? A computer can’t find the file that it needs to perform an operating system function. A computer displays error messages, and then the Blue Screen of Death appears. A user made an error while trying to set up a software program. A software program is not compatible with the computer’s operating system.

Answers

Answer:

The question is sufficiently broad that multiple answers would be likely candidates.  I would say though that the most likely "correct" answer is the last one - a program is incompatible with the OS.  That's definitely an issue with installing the wrong package.

Explanation:

With the first answer - A computer can't find the file it needs to perform an OS operation - that's more likely due to file corruption, accidental deletion, or some other event like that.  It could potentially be an issue with installation of the OS, but I doubt that's what's meant.

With the second answer - A computer displays errors and gives you a BSOD - this could be any number of issues, but installation is not the best candidate.

With the third - A user made an error while trying to set up a software - that depends on what they mean by "set up".  If they mean installation, then that's an acceptable answer.  If on the other hand they mean configuration, then it's not.

With the last - A computer program is not compatible with the system's OS - That is very definitely an issue with installation as far as it being installed on the wrong OS goes.  One could however say that the installation was successful, and that the choice of which package to install was a human error.

N processes are running concurrently in a virtual memory system. A dedicated disk is used for paging.
Explain whether N should be increased, decreased, or left unchanged, if it is observed that the CPU utilization is very low and disk utilization is very high.

Answers

To address the observed low CPU utilization and high disk utilization in a virtual memory system with dedicated disk paging, it is recommended to decrease the number of processes (N) to better balance the resource utilization and improve system performance.

If it is observed that the CPU utilization is very low and disk utilization is very high in a virtual memory system with dedicated disk paging, N (the number of processes) should be decreased.

Explanation: In this scenario, the low CPU utilization indicates that the CPU is not being fully utilized, while the high disk utilization suggests that the disk is under heavy load due to excessive paging. This imbalance between CPU and disk utilization indicates that there are too many processes running concurrently, leading to a high demand for memory and excessive paging.

By decreasing the number of processes (N), the overall memory demand and subsequent paging activity can be reduced. This allows for a more efficient utilization of system resources, including the CPU and disk, and can help alleviate the high disk utilization issue.

To know more about memory system visit :

https://brainly.com/question/32124561

#SPJ11

Why is the ISPM 15 Code/Marking used?

Answers

The ISPM 15 (International Standards for Phytosanitary Measures No. 15) code/markings are used for a specific purpose related to international trade and the movement of wood packaging materials (WPM). The primary objective of ISPM 15 is to prevent the spread of pests and diseases that can be carried by wood packaging materials.

Wood packaging materials, such as pallets, crates, and dunnage, can harbor harmful insects and pathogens. When these materials are transported across international borders, there is a risk of introducing pests or diseases to new regions, which can have devastating consequences for agriculture, forestry, and ecosystems.

To address this risk, the ISPM 15 code/markings set out guidelines for treating WPM through approved methods such as heat treatment or fumigation. Treated WPM is then marked with a specific stamp or branding that certifies its compliance with ISPM 15 standards. This marking serves as evidence that the wood packaging has undergone appropriate treatment, reducing the risk of pest or disease transmission.

The use of ISPM 15 code/markings promotes phytosanitary measures and helps ensure that international trade involving wood packaging materials is conducted in a manner that protects plant health and minimizes the spread of pests and diseases across borders.

To learn more about phytosanitary, visit:

https://brainly.com/question/33281097

#SPJ11

Identify the reaction type for each generic chemical equation. a b → ab: ab → a b: hydrocarbon o2 → co2 h2o: ab cd → ad cb:

Answers

The type for each generic chemical equation is:

A + B → AB is synthesis.AB → A + B is decomposition.Hydrocarbon + O₂ → CO₂ + H₂O is combustion.AB + CD → AD + CB is double displacement.

A chemical equation refers to the symbolic that perform of a chemical reaction in the form of symbols and chemical formulas. A chemical equation can also be meant by equations that is use to show chemical formula and symbols to show chemical reactions. The reactants in the chemical equation is located in the left hand side. The products in the chemical equations is located in the right-hand side. The example of chemical equation is 2H₂ + O₂ → 2H₂O.

The missing part in the question is shown below:

Identify the reaction type for each generic chemical equation.

1. A + B → AB:

2. AB → A + B:

3. Hydrocarbon + O₂ → CO₂ + H₂O:

4. AB + CD → AD + CB:

Learn more about chemical reaction here https://brainly.com/question/29039149

#SPJ4

Other Questions
Which are partial products of 1,262 x 3?A. 6 and 500B. 15 and 180C. 600 and 900D. 180 and 3,000 What can letters do that are used as plot devices? Choose four answers. one of the reasons it is preferable to use the metric system is international transactions is that group of answer choices it is the only system of measurement in most countries of the world. it is the preferred system of measurement in most countries of the world. it is one of the most commonly used system of measurements in the world. of all of the systems of measurement in the world, it is the simplest one to use. it is more widely accepted than the english system of measurements Two numbers, A and B, are stored in one byte floating point notation using the least significant (rightmost) 3 bits for the exponent. Both parts of each number are in 2's complement. If the A and B are 00110111 and 11011000, then A+B in the same notation as the operands is (select all correct answers)a) 10000010b) Any of the numerical answersc) 11110000d) None of the numerical answerse) 11100111f) 11000110 the second law of thermodynamics states that disorder in a system is always increasing. in simple terms, one can think about dropping nacl crystals into a glass of water. the solvation and diffusion of ions is favored by there is an increase in: group of answer choices What value of g makes the equation true? A triangle with a perimeter of 24 meters was created from a triangle with a perimeter of 3 meters using a scale factor. What is the scale factor?A) 8:1B) 28:1C) 32:1D) 72:1 Help.. It is given that Cos(A) = 1/4 and Sin(B) = 1/2 Where A is in the 3rd quadrant and B is in the 2nd quadrant a) Find value of Sin(A)b) Find Value of Cos(A)c) Find value of cos(A + B) and cos (A - B)d) Find Value of Sin(A + B) and sin (A - B)e) What is the quadrant of A + B and A - Bf) Find the value of Sin(2A + 2B) a typical lie made by potential mates on an online dating site is help!! A letter is chosen from the word BELIEVABLE Which describes theprobability of randomly choosing a consonant? what is the solution to the following system of linear equationsx + y = -83x = -4 + y write 2 in simplified form El anlisis del cuento el gato cocido for a single connection we need to have an average TCP throughput = 6Gbps . assume , RTT = 10 msec and no errorfirst, the average TCP throughput in GBps is ?second, How many bytes are traveling per RTT? (unist bytes)third, assume that all segments have a size of 1800 bytes, what will be the window size? Scientists hypthonize that the greenhouses effect plays a major role in the potential for climate chnage. Which of the following of Earth atmosphere is affected by the green house effect what are some different types of mutual funds? mutual funds are categorized based on certain criteria such as investment policies, investment objective and the risk and return profile of the investment assets. When Cameron moved into a new house, he planted two trees in his backyard. At thetime of planting, Tree A was 24 inches tall and Tree B was 39 inches tall. Each yearthereafter, Tree A grew by 6 inches per year and Tree B grew by 3 inches per year. LetA represent the height of Tree At years after being planted and let B represent theheight of Tree B t years after being planted. Write an equation for each situation, interms oft, and determine the interval of time, t, when Tree A is taller than Tree B. the graph on the other page What is the difference between human capital and capital goods?