A unique password should always be assigned to each new user as well as each existing user who requires a password reset. Avoid formulas with simple answers.
Set a time limit for the new temporary password. After only one use, ideally within 24 hours, it must be activated. Encryption and hashing are two techniques for safeguarding sensitive data. However, hashing rather than encryption should almost always be used for passwords. Hashing is a one-way function (i.e., it is impossible to "decrypt" a hash and obtain the original plaintext value). Hashing should be used for password validation. Use Alt+K to access Users and Passwords (Company). Now, the Users for Company screen will show up. The user roles you want to give the new users can be chosen. Examples include owner, data entry operator, etc.
Learn more about operator here-
https://brainly.com/question/14889834
#SPJ4
which of the following are good reasons to write tests that use your bag adt before the implementation is done? group of answer choices it helps confirm the design it helps check the suitability of the specification it helps check your understanding of the specification all of the abo
d) All of the above are good reasons to write tests for an ADT before its implementation is done. Writing tests before the implementation helps confirm the design.
It also helps check the suitability of the specification by identifying any limitations or constraints that may impact the functionality of the ADT. Additionally, writing tests before implementation helps check the developer's understanding of the specification by highlighting any misunderstandings or incorrect interpretations of the requirements. By writing tests early on in the development process, developers can catch potential problems before they become more difficult and time-consuming to fix. This leads to a more efficient development process and helps ensure that the final product meets the needs of its users.
Learn more about ADT: https://brainly.com/question/28457155
#SPJ4
what proofreading techniques should you use for both routine and complex documents? check all that apply.
Proofreading techniques include reading the document backwards, using a checklist, reading out loud, taking breaks, using tools, having someone else review, and repeating the process.
There are several proofreading techniques that can be used for both routine and complex documents:
Read the document backwards: This technique involves reading the document from the end to the beginning, starting with the last sentence and working your way to the beginning. This helps to focus on individual words and sentences rather than the meaning of the text as a whole.Use a checklist: Create a checklist of common errors, such as spelling, grammar, punctuation, and formatting, and use it to systematically review the document.Read the document out loud: Reading the document out loud helps you to pick up on errors that you might miss when reading silently.Take breaks: Taking breaks while proofreading allows you to clear your mind and come back to the document with fresh eyes.Use tools: Use grammar and spell check tools to help you identify errors, but be sure to double-check the suggestions as these tools are not foolproof.Have someone else review the document: Having another person review the document can provide a fresh perspective and help to catch errors that you might have missed.Repeat the process: Proofread the document multiple times to catch as many errors as possible.These proofreading techniques can be used for both routine and complex documents to help ensure that the final product is accurate and error-free.
Learn more about proofreading techniques here:
https://brainly.com/question/14605941
#SPJ4
When employing a private cloud, how would you minimize the risk of sensitive third-party (end-user) data being leaked?
The risk of sensitive third-party (end-user) data being leaked can be prevented by not sharing third-party (end-user) data with the private cloud.
What is a private cloud?A private cloud is a type of cloud computing where a single-user organization has exclusive access to the infrastructure.
A private cloud, at its most basic level, is a service that is solely managed by one company and not shared with others.
Therefore, by not exchanging third-party (end-user) data with the private cloud, the chance of sensitive third-party (end-user) data being disclosed can be reduced.
To learn more about private cloud, refer to the link:
https://brainly.com/question/13549413
#SPJ1
Answer: by issuing a warning to any possible offenders
Explanation:
IT managers use caution in trusting an outside service to manage and secure the data of a third party such as an end user. If the end user or company takes care of its own data and secures it, it remains responsible and capable of taking steps to keep its private cloud secure.
which of the following is/are true about an array of string type in ram? i. each element is a reference/address to a string object ii. each element is the text content of a string object iii. each element may be of char or string type
A particular sort of data structure called an array can hold a fixed-size sequential collection of identical-type elements.
Although an array is a container for a group of data, it is frequently more helpful to conceive of an array as a group of variables of the same type, such as 1. An array's components may all be integers. A definite number of String values make up a String Array. An ordered string of characters. In general, a string is an immutable object, meaning its value cannot be altered. The String Array works similarly to other data types of Array. When passing an array as a function argument in C, the Base address is used.
Learn more about Array here-
https://brainly.com/question/13107940
#SPJ4
true or false? content-dependent access control requires the access control mechanism to look at the data to decide who should get to see it.
which of the following statements about objects is correct? an object defines only the methods for a class. every object has its own set of data and a set of methods to manipulate the data. an object is a sequence of instructions that performs a task. all entities, even numbers, are objects.
Option B is correct. Every object has its own set of data and a set of methods to manipulate the data.
Explain significance of object.Each object contains a unique set of data as well as a variety of ways to change that data. An object in object-oriented programming is an instance of a class which establishes a template for producing objects. Both data (sometimes referred to as attributes or attributes) and methods, which are procedures that operate on the data, are contained in the object. An object's state and behaviour are determined by its data and methods. Through the use of method calls, objects communicate with one another. Because of this, it is true that "every object has its own collection of data and a set of methods to change the data."
To know more about Object visit:
brainly.com/question/30077797
#SPJ4
hubspot test true or false? when importing contacts, hubspot automatically searches for matches with your spreadsheet columns and pairs your existing properties, such as first name and last name.
The correct answer is The statement that "HubSpot automatically looks for matches with your spreadsheet fields and couples your existing attributes, such as first name and last name, when importing contacts, is correct."
a method that focuses on using software to conveniently store and source contact information, such as a person's name, contact information, email address, and more. Ideally, you want to focus on a core subject that receives a lot of monthly searches and is pertinent to your industry (and customers). Typically, a relevance of between 50 and 70% is a reasonable place to start, while greater is also acceptable. Software that is designed to automate marketing actions is referred to as marketing automation. In many marketing organisations, repeated processes like emails, social network posts, and other website actions must be automated. These duties are made simpler by the marketing automation technologies.
To learn more about HubSpot click the link below:
brainly.com/question/29488459
#SPJ4
What is the decimal value of the following binary number? 10011101
The decimal value of the following binary number given below 10011101 is 157.
How do decimal numbers work?One way to change a value from a decimal to a binary is to divide it by two recursively. After that, the remainders are recorded until the final quotient reaches zero. The remainders are then written in reverse order to generate the binary equivalent of the provided decimal number.
A number with two parts is called a decimal. both the whole and the part. The numerical value of whole and part-whole quantities is expressed using decimal numbers in the intervals between integers.
One complete pizza and a half of another pizza, for instance, can be seen in the image. This can be demonstrated in two ways:
Fractional division: The number one and a half can be expressed in fractions.
Learn more about binary numbers:
brainly.com/question/15268808
#SPJ4
files failed to validate and will be reacquired steam
The Clean Disk (CHKDSK) software can fix drive sectors to resolve the Steam refused to validate problem, and some Steam customers have confirmed this.
What are the fundamental files in a computer?Computers store three basic types of files: system files, data files, and programme files. The icons that appear for files in a Graphical (graphical user interface), like Windows Xp, are related to the software that opens the file.
What is in system files?An essential file that is a component of a windows os or a device is known as a system file. For a system to operate effectively, all necessary system files must be present. Users need to know how to reinstall or recover system files when malware has damaged them.
To know more about files visit:
https://brainly.com/question/29230375
#SPJ4
Compared to CPU cache, Random Access Memory is usually____________.
Compared to CPU cache, Random Access Memory is usually slower. Data on a hard drive, SSD, or other long-term storage device can be accessed by a computer from RAM memory much more quickly.
Do you use primary or secondary random access memory?Primary volatile memory is Read Only Memory (ROM), while primary non-volatile memory is Random Access Memory (RAM). It goes by the names read-write memory, main memory, and primary memory. In this memory are kept the programmes and data that the CPU needs to run a programme.
Are random access memories considered auxiliary storage?When the CPU needs data or programmes, they are transferred from secondary storage to random access memory, or RAM. Because RAM's contents are only accessible while the machine is turned on, it is volatile.
To know more about RAM visit:
https://brainly.com/question/11411472
#SPJ4
what tracking system did the u.s. department of defense create that uses satellites to support navigation?
The U.S. Department of Defense formed a geostationary navigation system called global Positioning System (GPS).
What is a GPS system, and how does it operate?A network of satellites & receiving device called the global positioning system (GPS) is employed to locate objects on Earth. Some GPS receivers have a precision of one centimeter, allowing them to pinpoint their location (0.4 inches). Location is provided by GPS receivers in terms of latitude, longitude, and altitude.
Exactly how precise is military GPS?UTC is distributed by the government and is updated by the US. Naval Observatory (USNO) through the GPS signal in space with a 95% of the time time transfer precision of 30 nanoseconds (billionths of a second) or less in relation to UTC (USNO).
To know more about GPS visit :
https://brainly.com/question/28275639
#SPJ4
Suppose we add a fixed amount of money into our bank account at the beginning of every year. Modify the program from this section to show how many years it takes for the balance to double, given the annual contributions and the interest. Also print the final balance.
import java.util.Scanner;
/**
This program computes the time required to double an investment
with an annual contribution.
*/
public class DoubleInvestment
{
public static void main(String[] args)
{
final double RATE = 5;
final double INITIAL_BALANCE = 10000;
final double TARGET = 2 * INITIAL_BALANCE;
Scanner in = new Scanner(System.in);
System.out.print("Annual contribution: ");
double contribution = in.nextDouble();
double balance = INITIAL_BALANCE;
int year = 0;
// TODO: Add annual contribution, but not in year 0
System.out.println("Year: " + year);
}
Here is the updated code that determines how many years it will take, given the annual contributions and interest rate, for the amount to double:
import java.util.Scanner;
/**
This program computes the time required to double an investment
with an annual contribution.
*/
public class DoubleInvestment
{
public static void main(String[] args)
{
final double RATE = 5;
final double INITIAL_BALANCE = 10000;
final double TARGET = 2 * INITIAL_BALANCE;
Scanner in = new Scanner(System.in);
System.out.print("Annual contribution: ");
double contribution = in.nextDouble();
double balance = INITIAL_BALANCE;
int year = 0;
while (balance < TARGET)
{
year++;
balance = balance * (1 + RATE/100) + contribution;
}
System.out.println("Years to double investment: " + year);
System.out.println("Final balance: " + balance);
}
}
Output
Here is an example output based on an annual contribution of $1000:
Annual contribution: 1000
Years to double investment: 14
Final balance: 24214.791299020994
To know more about Code Contributions Please click on the given link
https://brainly.com/question/10286981
#SPJ4
Answer:#include <iostream>
using namespace std;
int main()
{
const double RATE = 5;
const double INITIAL_BALANCE = 10000;
const double TARGET = 2 * INITIAL_BALANCE;
cout << "Annual contribution: " << endl;
double contribution;
cin >> contribution;
double balance = INITIAL_BALANCE;
int year = 0;
// Add annual contribution, but not in year 0
while (balance < TARGET){
year++;
balance = balance * (1 + RATE/100) + contribution;
}
balance = balance - contribution;
cout << "Year: " << year << endl;
cout << "Balance: " << balance << endl;
return 0;
}
Explanation:
Answer in c++
#include <iostream>
using namespace std;
int main()
{
const double RATE = 5;
const double INITIAL_BALANCE = 10000;
const double TARGET = 2 * INITIAL_BALANCE;
cout << "Annual contribution: " << endl;
double contribution;
cin >> contribution;
double balance = INITIAL_BALANCE;
int year = 0;
// Add annual contribution, but not in year 0
while (balance < TARGET){
year++;
balance = balance * (1 + RATE/100) + contribution;
}
balance = balance - contribution;
cout << "Year: " << year << endl;
cout << "Balance: " << balance << endl;
return 0;
}
which layer accept application layer data and format it so that one type of application and host can understand data from another type of application and host.
Layer accept application layer data and format it so that one type of application and host is the presentation layer.
What is the presentation layer?The presentation layer is the lowest layer where data structure and presentation are taken into account by application programmers rather than just transferring data between hosts as packets or datagrams. Data is sent from the application layer to the presentation layer, which converts it into a format and grammar that other computers can understand. This data is translated into a general format that is not application-specific so that the other systems may recognize it.
Learn more about the presentation layer: https://brainly.com/question/28565122
#SPJ4
All internet traffic should be treated equally. This is called?
All internet traffic should be treated equally. This is called net neutrality.
Network neutrality ensures that all data on the internet is treated equally by internet service providers (ISPs) and governments, regardless of content, user, platform, application, or device. For users, net neutrality enables access and transparency of internet content and allows access to all internet services and applications.
Net neutrality fulfils an important role in ensuring that people can freely access information and impart ideas across our information society. It promotes diversity, pluralism, and innovation.
Here you can learn more about Network neutrality
brainly.com/question/13165766
#SPJ4
Is a point in the program where execution will be paused?
A breakpoint is a point in the program where execution will be halted in debugging mode.
What is a breakpoint?A programmer can include a breakpoint in the code they write. A point in a program where the code will stop being executed is known as a breakpoint.
For instance, if the programmer modifies the logic fault in the trace table example, they might want to set a breakpoint in the algorithm. Symbols like an arrow or a circle frequently serve as denotations for breakpoints.
When a breakpoint is set and triggered, the program will only show the values of the variables at the breakpoint. The programmer would be able to check that the value of the total variable updates correctly if the algorithm were changed to accept.
In large programs, it is common practice to use a trace table before setting breakpoints.
Learn more about programmes :
https://brainly.com/question/11345571
#SPJ4
a data analyst is studying weather data. they write the following code chunk: bias(actual temp, predicted temp) what will this code chunk calculate? 1 point the total average of the values the minimum difference between the actual and predicted values the maximum difference between the actual and predicted values the average difference between the actual and predicted values
To determine if the data model is biased, use the bias() function to calculate the average amount a predicted outcome and actual outcome differ.
What is bias function in the code chunk?A code chunk is a runnable piece of R code. If the document is reproduced, the calculations will be re-run. The code chunk technique is useful because it reduces the possibility of a mismatch between comments in a publication and the findings being discussed.The Insert button in the RStudio toolbar or the keyboard shortcut Ctrl + Alt + I (Cmd + Option + I on macOS) can be used to enter a R code chunk.Exiting and reentering the world, as well as disconnecting and reconnecting/reloading the server, can resolve chunk issues.The following code snippet: bias (actual temp, predicted temp). The average difference between the actual and predicted values is used to calculate the code chunk.To learn more about bias function refer to :
https://brainly.com/question/30143152
#SPJ4
which standard that was first available in windows 95 and that incorporated as a biosconfiguration option to conserve electrical power?
Advanced Power Management (APM) is a standard that was first available in Windows 95 and that incorporated as a BIOS configuration option to conserve electrical power.
What is BIOS configuration?BIOS configuration is the process of setting up and establishing the basic operating parameters of a computer's Basic Input/Output System (BIOS). BIOS configuration allows users to customize the computer's hardware settings and operating system settings to best suit their needs. Parameters that can be configured in BIOS include the system time and date, memory settings, boot sequence, hard disk settings, and security settings.
It allowed computer hardware to be powered down to a low power state when not in use, such as when the computer was idle, and then powered back up when needed. APM was superseded by Advanced Configuration and Power Interface (ACPI) in Windows 2000 and later.
To learn more about BIOS configuration
https://brainly.com/question/14767803
#SPJ4
all computers are automated computing devices, and all automated computing devices true or false are computers.
False, Every automated computing device, including computers, is an automated computing device.
False. It's not necessarily accurate to say that "all computers are automated computing devices, and all automated computing devices are computers." Automated computing devices refer to any device that uses a computer to automate a task, such as a programmable thermostat or a robot. Not all automated computing devices are computers in the traditional sense, such as laptops, desktops, and servers. Some automated computing devices are specifically designed for a single task and do not have the same capabilities or functions as general-purpose computers.
Therefore, it is possible for a device to be an automated computing device without being considered a computer. The term "computer" typically refers to a general-purpose device that can perform a wide range of tasks and is capable of running different types of software. It usually includes features such as a central processing unit, memory, storage, and input/output capabilities. On the other hand, an automated computing device is designed to perform a specific task and may not have all the capabilities of a general-purpose computer.
Learn more about computing device here:
https://brainly.com/question/30068750
#SPJ4
scenario 1, continued before you begin working with your data, you need to import it and save it as a data frame. to get started, you open your rstudio workspace and load all the necessary libraries and packages. you upload a .csv file containing the data to rstudio and store it in a project folder named flavors of cacao.csv. you use the read csv() function to import the data from the .csv file. assume that the name of the data frame is flavors df and the .csv file is in the working directory. what code chunk lets you create the data frame?
To create the data frame in R, you can use the following code chunk:
flavors_df <- read.csv("flavors of cacao.csv")
This code uses the read.csv function to import the data from the .csv file into R and store it in a data frame named flavors_df.
The argument passed to the read.csv function is the file path, which in this case is "flavors of cacao.csv". This assumes that the .csv file is in the working directory. Coding refers to computer programming, that's show how we communicate with computers.
Code give a command to a computer what the action that should to take, and writing code means like creating a set of instructions. By learning to write code, you can give instruction to computers what to do or how to behave in a much faster way.
Learn more about coding: https://brainly.com/question/20712703
#SPJ4
compare and contrast separate function files with anonymous functions. in your opinion, when may it be best to use one over the other? can you use them interchangeably in all circumstances?
The difference between separate function files with anonymous function is:
Separate function files are named functions that are defined in their own individual files and can be imported and used in multiple parts of a program. They are useful for organizing code into reusable components and for creating functions that are intended to be used by other parts of a program. Anonymous functions, on the other hand, are unnamed functions that are defined inline, typically as arguments to other functions. They are useful for situations where a function is only used once and does not need to be reused.In general, separate function files are better for defining reusable functions, while anonymous functions are better for situations where a function is only needed in one place. However, both types of functions can be used interchangeably in many circumstances, depending on the specific requirements of the program. Ultimately, the choice between separate function files and anonymous functions will depend on the needs of the program and the programming style of the developer.
Learn more about function files: https://brainly.com/question/10940617
#SPJ4
in terms of information systems, a collaboration tool that helps a team communicate, organize, plan, schedule, track, and delegate jobs would be an example of _________.
A. a personal information system B. a workgroup information system C. an enterprise information system D. an organizational complement
In terms of data systems, an organisational complement can be a collaborative tool that aids in team communication, planning, scheduling, tracking, and task delegation.
What are the various types of information systems?An information system is a formal, sociotechnical organisational framework intended for the collection, processing, storing, and dissemination of information (IS). From a sociotechnical perspective, information systems are made up of four elements: the task, the people, the organization (or roles), and the technology.
Information system: Why is it?Operational data, communication logs, papers, and modification history can all be stored using information systems. If manual storage arrays is employed, the organisation will have to devote a lot of time looking for certain data.
To know more about information system visit:
https://brainly.com/question/5419206
#SPJ4
consider the scenario shown below four hosts sending messages to four servers on the top. what is the average throughput?
The average throughput would depend on the size of the messages being sent and the speed of the connection between the hosts and the servers. Without knowing this information, it is not possible to calculate the average throughput.
What is connection?Connection is the act of linking two or more things together. It can refer to the physical linking of items, such as when two computer systems are connected through a cable, or it can refer to the connection between two people, such as when two people create a bond of friendship or love. Connection can also refer to the process of establishing a link between two or more ideas, such as when someone connects two pieces of data to form a conclusion. Connection is an essential part of communication, as it allows ideas and information to be shared and exchanged.
To learn more about connection
https://brainly.com/question/1970643
#SPJ4
Create an algorithm based on the problem statement "Unsustainable Foreign Debt in Belize"
1. Gather data on Belize’s foreign debt and the sources of the debt.
2. Analyze the data to understand the debt’s sustainability and the sources of the debt.
3. Identify potential solutions to reduce the unsustainable foreign debt.
4. Develop an action plan to implement the solutions.
5. Monitor the progress of the action plan and adjust as needed.
6. Evaluate the success of the action plan and identify additional areas for improvement.
why is it important to keep your browser up to date
Answer:
to protect from new viruses
Suppose a slide contains three ovals and you want to evenly space the ovals horizontally across the slide. after you select the three ovals, which command would you use to accomplish this?
The slide's oval shapes can be uniformly spaced apart using the Align tool. Selecting the three ovals and then choosing "Align Horizontally" from the Align panel will accomplish this.
To evenly space three ovals horizontally across a slide in Microsoft PowerPoint, you can use the Align command. Here are the steps:
Select the three ovals that you want to align.
Go to the "Home" tab on the ribbon and click on the "Align" button in the "Arrange" section.
From the drop-down menu, select "Align Center." This will center all three ovals horizontally on the slide. Next, select "Distribute Horizontally." This will evenly space the ovals across the slide so that the same amount of space is between each oval. Finally, check to make sure that the ovals are aligned and spaced correctly. By using the Align and Distribute commands, you can easily and accurately arrange multiple objects on a slide. This can save time and ensure that your presentation looks professional and organized.
To know more about Space ovals Please click on the given link.
https://brainly.com/question/30112524
#SPJ4
web developers can use the css grid layout to design a multiple-column layout, but it has less accuracy than float, width, and clear properties. a. true b. false
The correct answer is True For more semantic layouts, fewer mixins can be utilised. By using padding, columns produce gutters (gaps between column content). For rows, that padding is offset.
As its creator Tim Berners-Lee sees it, the Semantic Web's ultimate goal is to make it possible for computers to more effectively modify information on our behalf. He continues by explaining that the word "semantic" refers to what a machine may do with the data when used in the context of the Semantic Web. Semantics is the study of how words, phrases, sentences, and texts are understood. This can be further divided into subcategories such lexical semantics, which is the current focus, formal semantics (logical features of meaning), and conceptual semantics (cognitive structure of meaning) (word and phrase meaning).
To learn more about semantic layouts click on the link below:
brainly.com/question/1259405
#SPJ4
the w3c markup validator indicates the html below has an error. what attribute, which describes how characters are represented in the document, is missing from ?
an ethernet switch's mac address table can only have one mac address for every port number. group of answer choices true false
True , an ethernet switch's mac address table can only have one mac address for every port number.
What is Ethernet :
Ethernet is a family of computer networking technologies commonly used in local area networks (LANs). It uses a variety of cable types and topologies, and has a data throughput of 10 Mbps to 10 Gbps. Ethernet is the most widely used local area network technology, and is the standard for connecting computers, routers, switches, and other network devices. It is also used to connect to the internet. Examples of Ethernet technologies include:
• 10BASE-T: Commonly used in home networks, it uses twisted pair cables and has a data rate of 10 Mbps.
• 100BASE-T: Commonly used in businesses, it uses twisted pair cables and has a data rate of 100 Mbps.
• 1000BASE-T: Also known as "Gigabit Ethernet," it uses twisted pair cables and has a data rate of 1 Gbps.
• 10GBASE-T: Also known as "10 Gigabit Ethernet," it uses twisted pair cables and has a data rate of 10 Gbps.
To know more about Ethernet
https://brainly.com/question/14620096
#SPJ4
if you want to manage frequency within your programmatic guaranteed deals across multiple publishers, at what level should this be configured in your account settings?
The use of programmatic guaranteed deals enables you to carry out direct purchases from publishers while doing away with time-consuming manual tasks like trading tags, resolving conflicts, and managing numerous invoices. Further limiting who sees your advertisement is audience targeting.
How does the setup for a programmatic guaranteed deal?Programmatic Guaranteed Deals offer an automated purchasing option with tugless trafficking, precise targeting, and integrated reporting and billing.
Programmatic Guaranteed aids in helping you concentrate on your company's primary priorities by using a more automated method of dealing.
You should be aware that your account must have Marketplace activated. For additional details, get in touch with your account manager.
When the publisher submits a proposal to you, negotiations start. Alternatively, you can start the negotiation process by submitting a request for proposals (RFP) to the publisher.
Campaign information, such as inventory and a suggested price, is contained in proposals. You and the publisher discuss and exchange revisions of the proposal until both sides are satisfied.
A request for proposal (RFP) is a letter that inventory suppliers receive from media planners like you asking them to supply them with media (inventory) for advertising purposes. The majority of publishers and inventory providers only offer their products to buyers after receiving an RFP from them.
To Learn more About advertisement Refer To:
https://brainly.com/question/1658517
#SPJ4
T/F - REM sleep begins about 90 minutes after sleep begins.
Because REM sleep starts roughly 90 minutes after sleep starts, this statement is accurate.
That is how it was determined. "Why did R.E.M. quit?"The band was simply becoming weary of everything that came with being in R.E.M., Buck said, not because they felt like they had stopped making excellent music. He said, "We thought we created a wonderful last record.
What does a quick change in REM?A Potential Sign of Much more Impulsive Decision-Making is Fast Eye Movements. Contrary to popular belief, the Mona Lisa's eyes do not saccade. Johns Hopkins researchers offer evidence that persons who are less calm tend to shift their eyes more quickly using a straightforward eye movement study.
To know more about REM visit:
https://brainly.com/question/9185936
#SPJ4