Answers

Answer 1

Answer:

I think you have to ask to your parents


Related Questions

Please help please help

Answers

Answer:

Explanation:

je pense que la reponse est la suivante a et b puis c

Even though it would be convenient to build a network with only one transmission medium, why wouldn't it be practical for big corporations?

A.
because they have far too many hackers breaching their security on a daily basis for only one transmission medium

B.
because they prefer a fancier network to match their elite reputation

C.
because they require a combination of transmission media types to function properly

D.
because with such large user-bases, they couldn't afford to build a network with only one medium

Answers

The reason why it wouldn't be practical for big corporations to build a network with only one (1) transmission medium is: C.  because they require a combination of transmission media types to function properly.

A big corporation can be defined as a corporate organization that has facilities and owns (controls) assets that are used for the manufacturing of goods and services in at least one (1) country, other than its headquarter (home office) located in its home country.

This ultimately implies that, a big corporation is a corporate organization that owns (controls) its business operations in two or more countries.

In light of the above, a big corporation require a combination of multiple transmission medium or transmission media types such as the following, in order for them to function properly, effectively, and efficiently:

Fiber-optic cableTwisted pairDigitalAnalogue

Read more on transmission media here: https://brainly.com/question/7120023

An IT security threat is anything that might cause serious harm to a computer system.
Question 16 options:
True
False

Answers

Answer:

True

Explanation:

this is true because a threat can endanger the computer and its system

Consider the following method, which is intended to return the product of 3 and the nonnegative difference between two int parameters.

public int threeTimesDiff(int num1, int num2) {

return 3 * (num1 - num2);

}
Which precondition is required so that the method works as intended for all values of the parameters that satisfy the precondition?
A. num1 > 0, num2 > 0
B. num1 >= 0, num2 >= 0
C. num1 >= num2
D. num2 >= num1

Answers

Methods are code segments that are executed when called or evoked.

The required precondition for the method to work as intended is (c) num1 >= num2

The return value of the method is given as:

3 * (num1 - num2).

The return value is said to be non-negative.

So, the following condition must be true

[tex]3 \times (num1 - num2) \ge 0[/tex]

Divide both sides of the equation by 3

[tex](num1 - num2) \ge 0[/tex]

Remove the bracket

[tex]num1 - num2 \ge 0[/tex]

Add num2 to both sides of the equation

[tex]num1 \ge num2[/tex]

Hence, the required precondition for the method to work as intended is (c) num1 >= num2

Read more about preconditions at:

https://brainly.com/question/13795586

Help please

What is an ordered pair?

1. a type of font in Microsoft Word

2. the end of the x-axis on a coordinate grid

3. two numbers that tell the location of a point on a coordinate grid

4. a type of table located in the Table drop-down menu

Answers

Answer:

two numbers that tell the location of a point on a coordinate grid

Explanation:

Answer:

Two numbers that tell the location of a point on a coordinate grid.

Explanation:

An ordered pair would look like this

(0, 4) or (7, 2)

the first number would be on the x-axis and then the second would be on the y-axis

When the logging and managing information flow between management hosts and the managed devices travels on a dedicated management network, this is considered what?

Answers

What must be considered is the number of IPs that are allowed to access the management network.

We can arrive at this answer because:

During the management of information flow, it is necessary to guarantee the security of the system, preventing intruders from attacking.This can be done by restricting authorized IPs to access the management interface.This type of security measure is often neglected in systems that use a dedicated management network, as this type of network can only be accessed by a single device in the same VLAN.

However, the IPs restriction must be considered even in this system, as there are software that can provoke invasions that cause the leak of shared information.

You can find more information about software here:

https://brainly.com/question/24032221

Physical components of a computer system such as a keyboard, mouse, or modem.

Question 25 options:


Software


Network


Browser


Hardware

Answers

Answer:

D

Explanation:

D: Hardware. These are the things like mouse or Modem that you can touch physically.

Software is what the computer runs to make itself useful.

Network is the connection (either virtual or physical) that connects computers together.

Browser is a software program used to navigate the internet

Oil refining is an example of:

Construction Production
Extractive Production
Domestic Production
Traditional Production

Answers

Answer:

i think the answer is B but i could be wrong...

Answer:

Extractive production

Explanation:

See

Oil refining denotes to after oil extraction situationFirst oil is extracted then gets refinedSo it's extractive production

Kari needs to change the brightness and contrast on an image she has inserted into a Word document. Which group should she use to do this? Adjust Picture Styles Arrange

Answers

Answer:

adjust

Explanation:

it can be found in the top left corner

Are theese speeds considered slow? (I used Ookla Speedtest)
PING ms
5
DOWNLOAD Mbps
86.54
UPLOAD Mbps
98.21

Answers

Answer:

No

Explanation:

They are pretty solid speeds and 5ms for ping is relativley low. If youre planning a large download (100+ gigs) I still recomend giving it a few

hours

Choose one scene or object to photograph. Take and submit at least three photographs of this scene at three different times of day. Be sure to note the times of day that you choose. Write a brief response about how the light changed in the photograph.
Take and submit photographs of someone using frontlighting, backlighting, and sidelighting. You can use the sun or other lighting.
Practice taking photographs on a cloudy or rainy day. Turn in three of your favorites from that practice.
Take some portrait photographs using a reflector. (Remember that white paper, poster board, sheets, or a wall can all act a reflector.) Practice moving the subject in different positions relative to the reflector. Turn in three of your favorite photographs.
Practice taking photographs in different lighting conditions (indoors and outdoors, different times of day, different weather, and so on) to help you better understand the impact of light on your photographs. Turn in three of your favorite photographs from your practice sessions.

Answers

Answer:

i dont get what you mean

Explanation:

For Internet Protocol (IP) v6 traffic to travel on an IP v4 network, which two technologies are used? Check all that apply.

Answers

The two (2) technologies that must be used in order to allow Internet Protocol version 6 (IPv6) traffic travel on an Internet protocol version 4 (IPv4) network are:

1. Datagram

2. IPv6 tunneling

An IP address is an abbreviation for internet protocol address and it can be defined as a unique number that is assigned to a computer or other network devices, so as to differentiate them from one another in an active network system.

In Computer networking, the internet protocol (IP) address comprises two (2) main versions and these include;

Internet protocol version 4 (IPv4)Internet protocol version 6 (IPv6)

IPv6 is the modified (latest) version and it was developed and introduced to replace the IPv4 address system because it can accommodate more addresses or nodes. An example of an IPv6 is 2001:db8:1234:1:0:567:8:1.

Furthermore, the two (2) technologies that must be used in order to allow Internet Protocol version 6 (IPv6) traffic travel on an Internet protocol version 4 (IPv4) network are:

1. Datagram

2. IPv6 tunneling

Read more on IPv6 here: https://brainly.com/question/11874164

I know this isn't the right platform for this question, but where should I go to get a good PC and a good monitor? I'm thinking about becoming a streamer.

Answers

Answer: Alienware is really good if you are into fps games such as call of duty but it depends on your price I know alien ware can be pretty expensive so it's up to you.

Write a program Election that computes the tally in a write-in election, and announces the winner. Since the votes are write-in, there is no pre-determined set of candidates. Whoever appears the most in the votes is the winner. The user enters the individual votes, one vote per line, and ends entering with typing -1 or an empty line. To compute the tally, the program uses two arrays, a String [ ] variable (names), and an int [ ] variable (count). Upon receiving a single vote, the program checks if the name on the vote appears in names, and if it does, the program adds 1 to the value of the element in count. If the name does not appear in names, the program extends both arrays by one element, stores the name in names at the last position and store 1 in count at the last position. In this manner, the two arrays will have the same lengths. The initial length is 0 for both arrays. Below is an example of how the program may runplease I need to demonstrate the code,I need some comments next to every single line

Answers

The election program illustrates the use of ArrayLists, loops and conditional statements.

ArrayLists are resizable arrays, while loops and conditional statements are used to perform repetitions and make decisions, respectively.

The election program written in Java, where comments are used to explain each line is as follows:

import java.util.*;

public class Main {

 public static void main(String[] args) {

     //This creates a Scanner object

   Scanner input = new Scanner(System.in);

   //This creates a string ArrayList for the names of the candidates

   ArrayList<String> names = new ArrayList<String>();

   //This creates an Integer ArrayList for the vote count of the candidates

   ArrayList<Integer> votes = new ArrayList<Integer>();

   //This declares name as string

   String name;

   //This gets input for the name of the candidates

   name = input.nextLine();

   //This is repeated until the user enters "-1"

   while (!"-1".equals(name)){

       //If name is in the list,

       if(names.contains(name)){

             //This gets the index of the name  

             int pos =names.indexOf(name);

             //This calculates the number of votes

             Integer value = votes.get(pos)+1;  

             //This adds the vote to the vote ArrayList

             votes.set(pos, value);

       }

       //If otherwise

       else{

           //This adds the candidate name to the name ArrayList

           names.add(name);

           //This adds 1 as the vote of the candidate to the vote ArrayList

           votes.add(1);

       }

       //This gets input for the name of another candidates

       name = input.nextLine();

   }

   //This prints the name of the election winner

   System.out.println("Winner : " +names.get(votes.indexOf(Collections.max(votes))));

 }

}

Read more about ArrayLists, loops and conditional statements at:

https://brainly.com/question/19504703

the windows logon process has unexpectedly terminated

Answers

Answer

Windows corrupted

Explanation:

Try buying a new windows or resetting your laptop/pc

or your service failed to register/start

Windows login allows user accounts to log on to the system by opening the subscriber notification database and initiating user-level operations. The system may start with reduced functionality if the system resources required for Windows logon are insufficient.

What windows logon process has unexpectedly terminated?

In order to read the list of user accounts that are set up for the machine, the Windows operating system reads the registry at logon.

The Windows logon page won't appear if the data can't be read, making it impossible for users to sign in to Windows. The level of registry damage determines whether Windows can finish the startup procedure or not.

You will need to boot the computer into the Recovery Console rather than Windows in this circumstance. Use the Startup Repair tool after entering the Recovery Console. For Windows installations that won't boot, Startup Repair automates frequent diagnostic and repair activities.

Therefore, All logon attempts, however, will be blocked if the Windows registry is seriously damaged. Windows crashes when you try to log on, and it restarts after that.

Learn more about Windows here:

https://brainly.com/question/6969788

#SPJ5

How many things can a computer compare at one time?

Answers

Answer: billion of items at one time

Explanation: The computer is very capable of comparing items bulk at one time

What's the technique of drawing a 3D object with one vanishing point?​

Answers

I don’t no it brother n I was searching for this answer can u plz tell me
A one-point perspective drawing means that the drawing has a single vanishing point, usually (though not necessarily) directly opposite the viewer's eye and usually (though not necessarily) on the horizon line. All lines parallel with the viewer's line of sight recede to the horizon towards this vanishing point.

One Point Perspective is a type of linear perspective that uses a single vanishing point to create the illusion of depth in a work of art.
Parallel – Parallel lines are lines that never touch… even if they are extended indefinitely.
Horizontal Lines – Lines drawn from side to side level with the horizon.

john wants to draw a letter L. The turtle is pointing towards the top of the screen. Which series of commands will draw the shape? *

BACK 100 LEFT 90 FORWARD 50
BACK 100 RIGHT 90 FORWARD 50
BACK 200 RIGHT 90 BACKWARD 50
RIGHT 180 FORWARD 100 RIGHT 90 FORWARD 50

Answers

Explanation:

BACK 100 RIGHT 90 FORWARD 50

what is the difference between windows 10 and windows 11

Answers

Answer: Windows 11 brings a brand-new, more Mac-like interface to the OS. It features a clean design with rounded corners and pastel shades. The iconic Start menu also moves to the centre of the screen along with the Taskbar. But you can move those back to the left, as they are in Windows 10, if you prefer.

Explanation:

Windows 11 will be a better operating system than Windows 10 when it comes to gaming. ... The new DirectStorage will also allow those with a high-performance NVMe SSD to see even faster loading times, as games will be able to load assets to the graphics card without 'bogging down' the CPU.

Alex needs to create a function capable of counting item reference numbers that he is inserting into a spread sheet. The purpose of this function will be to keep track of inventory. How would Alex go about finding a function to do this? Click the Home tab and use the Find.

Answers

Alex can find a function to do this by entering the item reference numbers into the worksheet, and click the Sort button to count the items.

A spreadsheet can be defined as a document or file which comprises cells in a tabulated format (rows and columns), that are typically used for formatting, arranging, analyzing, storing, calculating, counting, and sorting data on computer systems through the use of a spreadsheet application such as Microsoft Excel.

In this scenario, Alex wants to keep track of inventory by creating a function that is capable of counting item reference numbers as he is inserting into a spread sheet. Thus, he should enter the reference numbers of each item into the worksheet, and click the Sort button to count the items.

Read more: https://brainly.com/question/14299634

Answer:

It’s C

Explanation:

edge

what does reporter failure mean on adt alarm system

Answers

On ADT alarm system, Failure trouble basically means that the monitoring service isn't working properly because of a communication issue with the system. As a result, the home or business is vulnerable.

How does the ADT alarm system function?

ADT will strategically place sensors throughout the home to ensure that each zone is covered. The motion then activates a reaction, such as a security light or a camera that begins recording, all through the wireless connection. The movement can also be reported to the ADT monitoring team.

ADT indoor security cameras come with phone security alerts, infrared night vision, a slim design, and secure WiFi. They provide a variety of views for live and recorded feeds and include professional installation.

Failure trouble on an ADT alarm system basically means that the monitoring service isn't working properly due to a communication issue with the system.

Learn more about the ADT alarm system, refer to:

https://brainly.com/question/28199257

#SPJ5

In the context of an ADT alarm system, "reporter failure" typically refers to a communication issue between the alarm panel and the monitoring center.

ADT alarm systems are designed to send signals or reports to a central monitoring station when an alarm event occurs, such as a break-in or a fire. The monitoring center then takes appropriate actions, such as contacting the homeowner or dispatching emergency services.

When the alarm system displays a "reporter failure" message, it indicates that the panel is unable to establish communication with the monitoring center. This can happen due to various reasons, including but not limited to:

Network or internet connectivity issues: If the alarm system relies on an internet or cellular connection to communicate with the monitoring center, any disruptions in the connection can result in a reporter failure.

Learn more about network on:

https://brainly.com/question/29350844

#SPJ6

# I need help with my python code, it won't work, and no matter what I try, I can't get it to run properly. Every time I try top run it, it gives me an error saying:

# syntaxError, bad input on line 43, I am not very good at programming, and I just started. I wanted to ask if you guys could help me.
# Here's my code, the purpose of it is to be a rock paper scissors game:

```
import random

def welcome_prompt():
print ("Rock paper Scissors game")
print ("Rules: Rocks beats Scissors, Scissors beats Paper, Paper beats Rock")

def get_player_move():
print ('Round ' + str(round))
print ("Please play one of the following")
move = raw_input(" 1) [R]ock, 2) [P]aper, 3) [S]cissors:")

if get_player_move == ("R"):
print ("You used Rock!")
return 1
elif get_player_move == ("P"):
print ("You used Paper!")
return 2
elif get_player_move == ("S"):
print ("You used Scissors!")
return 3
else:
print "Invalid input, please use capitalized initial (R,P,S)"
return get_player_move()

def get_computer_move():
get_computer_move = random.randint(1,3)

if get_computer_move == 1:
print ("Computer used Rock!")
return 1
elif get_computer_move == 2:
print ("Computer used Paper!")
return 2
elif get_computer_move == 3:
print ("Computer used Scissors!")
return 3

def compare_moves(get_player_move, get_computer_move):

if (get_player_move == 1 and get_computer_move == 1) or (get_player_move
== 2 and get_computer_move == 2) or (get_player_move == 3 and
get_computer_move == 3):
print ("It's a tie!")
return 0

elif (get_player_move == 1 and get_computer_move == 3) or
(get_player_move == 2 and get_computer_move == 1) or (get_player_move ==
3 and get_computer_move == 2):
print ("You win the round!")
return 1

elif (get_player_move == 1 and get_computer_move == 2) or
(get_player_move == 2 and get_computer_move == 3) or (get_player_move ==
3 and get_computer_move == 1):
print ("You lose the round!")
return -1

elif (get_player_move == 4):
print ("You didn't put in correct input, computer gets a free win")
return -1

player_score = 0
comp_score = 0
round = 0

welcome_prompt()

('Round ' + str(round))
while round< 10:
round = round + 1
get_player_move()
get_computer_move()
compare_moves(get_player_move, get_computer_move)

if compare_moves == 1:
player_score = player_score + 1
print 'Player Score'+ str(player_score)
print 'Computer Score'+ str(player_score)
elif compare_moves == -1:
comp_score = comp_score + 1
print 'Player Score'+ str(player_score)
print 'Computer Score'+ str(player_score)

print ("Game Over")

Answers

Answer:

hmm i would assume your syntax code has a hidden error that's messing up your code that you are trying to input inside your computers field matrix to do the game. question is where is that error?

Explanation:

EASY 15 POINTS IF YOU CAN HELP
What is the value of the variable named result after this code is executed?

numA = 3

numB = 2

result = numA ** numB

A. 5
B. 9
C. an error has occurred
D. 6

Answers

Answer:9

Explanation:

The value of the variable named result after this code is executed "numA = 3 numB = 2 result = numA ** numB  is 9.

What does value mean?

The value of an output is known to be the sum or the monetary worth of that thing.

Note that looking at the  variable of the code that is executed "numA = 3 numB = 2 result = numA ** numB, we can say that the output is 9.as one can ger it when 3 multiplied itself twice.

Learn more about value from

https://brainly.com/question/843074

#SPJ2

what is the full form of Blog​

Answers

The term “Blog” is a shortened form for “web log”. Individual articles on a blog are referred to as “post”, the person who created the blog post is often called a “blogger” and the activity of keeping a blog is known as “blogging”.

what is syllabus of diploma in computer after class 10​

Answers

Answer:

[tex] \: [/tex]

List Of Best Computer Courses After 10th :

Certificate Program In MS OfficeBasic Computer CourseWeb Designing CourseDigital Marketing CourseData Entry CourseGraphic Designing CourseWeb Development CourseAnimation And VFX CourseComputer Science Diploma/EngineeringDiploma In Financial Accounting

list ten features of word processing packages​

Answers

Answer:

Entering text.

Editing text.

Formatting paragraph.

Formatting page style.

Importing text, graphics and images.

Entering mathematical symbols.

Checking spelling and grammar.

Header and footer and other.

A computer has __ IP address(es).


A. Many
B. One

Answers

Answer:

A computer has one IP address(es).

One

Explanation:

Have a great day!

What is an electrical conductor? Name five electrical conductors

Answers

Answer:

Explanation:

silver.

copper.

gold.

Steel

Seawater.

Explanation:

Electrical conductors are those which allows the electrons to flow easily. Examples of five conductors are :-

Gold Silver CopperAluminium Iron.

My sister told me an extremely funny joke. what is the direct object for this sentence ?

Answers

Answer:

Explanation:

What is my mistake in this case?

Answers

Answer:

I think it suppose to be #print out house

Answer:

i guess take the hint, bro.

Explanation:

Other Questions
Timothy noticed that copper wires are wrapped in a plastic material to prevent you from getting shocked when you touch them. Which list shows other materials that could be used to wrap the copper wire?A. Aluminum foil, rubber, a cotton shirtB. Glass coating, rubber, cotton clothing C. Glass coating, rubber, steel wrapping D. Wood, rubber, copper coating the number of Significant Figures in 13410000* Clara is making a pennant. She attaches a rectangle that is 1 inch wide and 6 inches long to a triangle that has a base of 6 inches and a height of 28 inches. What is the area of thepennant? pls help on my maths The diagram shows structures that form the surface of the trachea.Which level of organisation is the structure labelled S?A. CellB. Organ C. Organ system D. Tissue Disheartened about the team's prospects in the tournament after injuries to the two leading scorers, kenji nevertheless tried to be when he talked with his teammates. The following table provides phenotypic data for a population of mammoths living in cold environments based on fossil and DNA evidence.Characteristic Percent of Population Showing Trait by GenerationGeneration 1 Generation 2 Generation 3Tusks greater than 2.5 m in length 25 25 25Tusks less than 2.5 m in length 75 75 75Mass greater than 4,000 kg 15 15 15Mass less than 4,000 kg 85 85 85Fur thickness greater than 6 cm 15 25 35Fur thickness less than 6 cm 85 75 65Based on this data and your knowledge of natural selection, which explanation best explains the trends seen in the data?A. Individuals with thicker fur had a survival advantage in the cold environment, allowing these individuals to reproduce more often and create more offspring.B.Individuals within this population of mammoths tend to only mate with individuals that have thick fur.C.This population of mammoths appear to be in Hardy-Weinberg equilibrium since no allele frequencies are changing over time.D.Individuals with thick fur migrated into the population of mammoths, increasing the proportion of these individuals. PLEASEEE HELPPP MEEEE!!!! How does the sexual life cycle of the human species introduce geneticvariations? *2 points1. Random fertilizationII. Crossing over of allelesIII. Independent assortment of chromosomesO I, II, and IIIO I and II onlyO I onlyO I and III only Please someone help solve:2/2t34-23 Was the Holocaust a secret? Saint Paul's Cathedral in London, England by Christopher Wren. The church has two towers, a domed center, and columns in the front. Where on the church pictured above can you locate evidence of Baroque influence? a. There are dramatic towers on both sides of the dome. B. The frieze has a detailed, ornate, bas relief. C. The facade contains deep porticos which cause a dramatic play of light and shadow. D. None of the above. Which detail is most important to include in this essay? In feudal Japan, many people worked as farmers and had little money.Japanese warriors spent a lot of time waiting to be called on by their lord.In feudal Japan, wealthy people hired warriors for protection against enemies.Todays Japanese warriors have an ancient link to samurai women of the past. Question 1A truck driver drove 48 miles in 45 minutes. At this rate, how many miles can the truck driver drive in one hour?__ miles in one hourpls no links ty I need you to change the wording the best you can 100 pointsTo survive is to continue to live or exist, typically in spite of an accident, ordeal, ordifficult circumstances. To survive, individuals must sometimes change and adapt to theirenvironment. Survival is one of the main themes in the novel A Long Walk to Water by LindaSue Park. The main characters, Nya and Salva, both experience difficult circumstances. In thenovel, Park uses the stories of the two main characters to show the mental, emotional, andphysical challenges that occur when struggling to survive.In the novel, A Long Walk to Water, one of the main characters, Salva, was forced toleave his home due to the Sudanese Civil War. He went on a difficult journey through the deserton his way to a refugee camp. On his journey, he faced challenges such as limited food andwater, hungry lions, and losing people close to him. Despite the many obstacles Salva faced, hekept going. Park writes, Salva would think of his family and his village, and he was somehowable to keep his wounded feet moving forward, one painful step at a time (Park 54). This quoteshows how Salva managed to survive his challenging circumstances and physical pain by stayingpositive and focusing on what was important to him.The other main character, Nya, also had to face struggles while trying to survive inSouthern Sudan. Nya had to walk many hours each day to get water for her and her family. Thewater she collected was not always clean and safe which caused her family members to becomesick. Seeing her sister fighting for her life because of dirty water became an additional emotionalLast Name 1challenge for Nya. Her long and tiring journey to get this water became a part of her dailyroutine, and it became a necessary part of survival. Park writes Nya would now make hersecond trip to the pond. To the pond and back -- to the pond and back -- nearly a full day ofwalking altogether. This was Nyas daily routine seven months of the year. Daily. Every singleday (Park 20). This quote shows how the struggle to survive became a part of Nyas everydaylife. She was forced to adapt her daily routine to make time to collect the water necessary for herand her familys survival.The struggle to survive and adapt to changing circumstances is something that impactsmany people. In the novel, Salva has a close relationship with his uncle. His uncle acts as aleader to Salva and their entire group. He acts as a support system and helps Salva throughdifficult moments. When he eventually passed away this caused Salva great pain, but he waseventually able to become a leader and help others the way his uncle had. I can relate to Salvasexperience of losing his uncle. When I was younger, I had a close relationship with mygrandmother. She acted as a leader and support system for me and my little sister. She was theglue that held our family together. When she passed away, I was devastated. I did not know whatto do, just like Salva. Eventually, after a lot of time, I was able to heal and work on becoming aleader and support system for my little sister just like my grandmother was to me. Salva realizedthat he needed to help others the way his uncle had helped him, and I realized that I needed tolove and support my sister the way my grandmother had done for me.To survive is to make changes and adapt to the environment around you. Salva wasforced to adapt to life without his uncle and to become a leader for his people. Nya was forced toadapt her daily routine to make time for the long walk to get water each day. Even when lifepresents people with challenges, they must continue to live and exist in their changing world.Last Name 1This is something I and many have faced. For me, it was losing someone close to me but life canpresent challenges in many forms. All you can do is keep moving forward. HEY I HOPE U ARE DOING WELL COULD SOMEONE PLEASE TELL ME IF I CLICK THE RIGHT AWSNER PLEASE IT WOULD BE GREAT IF U CAN HELP ASAP :) which was the first cooperative of nepal Which sentence most clearly contains an allusion?O A. The dog thought the racoon had run up the oak, but Fido wasbarking up the wrong tree.B. My friend managed to finish all his homework during lunch hourlike some kind of Merlin.C. I had so many customers nagging me at work today, I almost hadto scream with joy.D. Trying to predict where an electron is in an atom is like playing agame of whack-a-mole. the membrane activity most nearly opposite to exocytosis is: how did brunelleschi construct his dome without temporary wooden scaffolding? Which of the following contributed the most to the rise to power of totalitarian leaders in Italy and Germany in the 1930s?A.) certainty about the futureB.) stability in the aftermath of warC.) serious economic problemsD.) abundant natural resources