how do you delete your account when you forgot your password?! lol

Answers

Answer 1

Answer: okay if you remember the email you used, even if you logged in through goooooooooogle, just put the email and say forget the password. They will ask if you'd like to send a verification code to your email to change your password. Click yes. Go to your email change the password then use it to log in once again to your account.

Explanation:


Related Questions

a systems analyst conducts a preliminary investigation to study the _____ and recommend specific action.

Answers

A systems analyst conducts a preliminary investigation to study the schedule feasibility and recommend specific action.

A feasibility study is a thorough analysis of a proposed project that considers all elements essential to success in order to determine the project's likelihood of success. Business success can be primarily described in terms of ROI, which is the projected revenue from the project.

A proposed plan or project's viability is assessed in a feasibility study. A project or business venture is assessed for its viability as part of a feasibility study to ascertain if it will be successful.

A feasibility analysis, as its name suggests, is used to assess an idea's viability, such as confirming that a project is both legally and technically possible as well as economically justifiable.

As a project will fail if it is not finished on time, this assessment is crucial to its success. An organization determines the project's estimated completion time when determining scheduling feasibility.

The feasibility analysis assists in identifying any potential obstacles the proposed project may encounter, such as:

Internal project constraints, including those related to technology, finances, and resources.

Financial, marketing, and export restrictions are internal corporate constraints.

Logistics, the environment, laws and regulations, among other external constraints.

To know more about feasibility click on the link:

https://brainly.com/question/15016731

#SPJ4

susan wants to bring out as much tone and shading in her prints as possible what type of paper should she use

Answers

Since Susan wants to bring out as much tone and shading in her prints as possible, the type of paper that she need to use is Strathmore Toned papers.

What effect does value shading have on a piece of art?

Value is employed to simulate the appearance of highlights and shadows. The illusion of a light source is produced by the interaction of highlights and shadows.

Tone can be a key instrument for generating contrast in an artwork by establishing a sense of antagonism and tension between various elements or by drawing attention to certain areas of the composition.

Your speed increases on a toned surface. more approachable than a white paper. minimize glare when it is sunny. stronger compared to several other art paper varieties. come in a huge range of hues.

Therefore, In a sketchbook, artists would record the images that served as their sources for larger, more complex paintings.

Learn more about shading from

https://brainly.com/question/25729154

#SPJ1

concept of online storage

Answers

Answer: The Cloud

Explanation: The cloud is some close or far-off server that stores your data on WAN  and it goes on from here to Timbuktu and beyond. You pay a storage fee of a few dollars and month or a yearly fee of up to 300 bucks ..or more. has it as does another well know Web Browser  and a plethora of other companies .. problem is when you use these cloud drives on your computer your data is still stored on your computer as all as the drive ...Try to add on the web app and not the desktop app...

Do you know how many regular people are making 2k a day with 100% commissions?

Answers

Answer:

Depending on your job role, your commission may subsidize your paycheck or be dependent on it. Meaning you either have a base salary and earn extra money through bonus schemes or incentives, or you must make sales if you want to receive a paycheck at the end of the month.

5. From the following risks of BYOD (Bring Your Own Device), which one is the most
important for an Employee * (1 Point)
O Technical challenge of connecting to Wifi
O Privacy and confidentiality of 'personal information
Data Breach
Sharing resources like printers

Answers

Answer:

B

Explanation:

you can easily fix a bad connection, but getting other people's data breach is a serious violation.

There are.
A. 40
B. 20
C. 65
D. 15
questions on the Aspire science test.

Answers

A - The Science Aspire test is composed of 35 multiple choice and 5 constructed response questions.

A.40 questions on the Aspire science test.

Q1:most common cybercrimes?
Q2: Difference between Hacker and crackers ​

Answers

Q1: phishing and similar fraud

Q2: Hackers are good people who hack devices and systems with good intentions. They might hack a system for a specified purpose or for obtaining more knowledge out of it. Crackers are people who hack a system by breaking into it and violating it with some bad intentions.

1. Create a function called numberGuess. Function numberGuess will first choose a random number in the range 1 to 1000. The number that is chosen is what the user is supposed to guess. Following this, your function should then display the following





The player then types a first guess. The function responds with one of the following:






Your function must not stop asking for guesses until the user has provided a correct solution. Your program should keep telling the player Too high or Too low to help them narrow down the answer. Count the number of guesses the player makes. At the end when the user finally guesses correctly, print Either you know the secret or you got lucky! if the number of guesses were 10 or less. If the player guesses the number in 10 tries, then print Ahah! You know the secret! If the player makes more than 10 guesses, then print You should be able to do better!
-


- I already have some code however not sure if its 100% correct
Please review feedback will appreciated, thanks
#include
using namespace std;

int main()
{
int num, guess, tries = 0;
srand(time(0)); //seed random number generator
num = rand() % 1000 + 1; // random number between 1 and 1000
cout << "I have a number between 1 and 1000"< > guess;
tries++;

if (guess > num)
cout << "Too high!\n\n";
}
while(guess < num);
cout << "Too low!\n\n";
if(10<=guess)
cout << "\nCorrect!either you know the secret or you got lucky" << tries << " guesses!" < {

} if (guess==10){
cout<<" Ahah! You know the secret!"< }
else


{
cout<< "You should be able to do better! ";
cout<< " Would you like to play again? (Y/N)";



}



}

Answers

You can edit this code whatever you want! Good luck.

What malware is similar to a virus but is transmitted over a network?
A) anti-malware
B) adware
C) worms
D) spyware

Answers

the Answer is C worms

Answer:Worms

Explanation: Worms are self replicating. Worms also don’t need a host computer to run like viruses do.

converting 13975 from decimal number to binary format​

Answers

13975 from decimal to binary is 11011010010111.

The python language is not sensitive to block structuring of code.

a. True
b. False

Answers

Answer: False

Resource of Information: Quizlet

The statement "The python language is not sensitive to block structuring of code" is false.

What is python language?

Python is a popular computer programming language used to create software and websites, automate processes, and analyze data. Python is a general-purpose language, which means it may be used to make many various types of applications and isn't tailored for any particular issues.

Python's syntax differs from various other programming languages in that it enables programmers to construct applications with fewer lines of code.

Python uses block structuring and indents for loops, so this is simply untrue. Pressing the tab will indent the code, and anything that is not indented will not be included in the loop. Python is therefore responsive to block structuring.

Therefore, the statement is false.

To learn more about the python language, refer to the link:

https://brainly.com/question/14068778

#SPJ12

What is the difference between symbolic addressing and absolute addressing? Which addressing is easier to understand

Answers

Symbolic addressing varies from Absolute Addresses in that they specify relocatable addresses by either utilizing an emblem as the label in the name field of an assembler code statement or equating a symbol to a relocatable expression. Absolute addressing (or values) are obtained by equating a marker to an absolute expression.

What is a symbolic address?

A symbolic address is associated with a program symbol or a symbol defined by the Equate subcommand. The topic of certified symbolic addressing is covered further down. See Restrictions on the Use of Symbols for a more thorough explanation.

In memory management, the compiler binds symbolic addresses from the source program on disk to relocatable locations (which are the instruction addresses relative to each other). The linker then associates the relocatable address with absolute addresses (which are the physical addresses allocated in key memory).

The contents of a register reflect an absolute address. The contents of a register reflect an absolute address. In the sense that it is not stated relative to the present instruction address, this addressing method is absolute.

Learn more about addressing:
https://brainly.com/question/28769221
#SPJ1

Ashan Bhetwal wants to create a personal website to display and sell his artwork. He also wants to show the location of his studio, and a video of him painting. What features might he want to add to his website? What tools might he use to build the website?

Answers

The  features and  tools that might he use to build the website is the  use of video embed and go ogle maps features.

What is the easiest method of website design?

Using a website builder is the simplest approach to make a website. Utilizing one of their pre-made templates, you may build a website using these interactive, browser-based tools. However, just because the templates are "ready-made" doesn't imply you'll end up with a generic website.

A website, often known as a web site, is a collection of web pages and related material that is published on at least one web server and given a shared domain name.

Therefore, In social media posts or other web media, embedding describes the incorporation of links, photographs, videos, gifs, and other content. The inclusion of embedded content gives posts a visual component that promotes more clicks and engagement.

Learn more about website from

https://brainly.com/question/28114357
#SPJ1

how often does windows automatically defragment a hard drive or trim a solid-state drive

Answers

If there is extraordinary fragmentation that is getting close to the "maximum fragmentation threshold," Windows will automatically consider partially defragmenting an SSD once a month.

In this post, we define defrag and discuss why doing it on an SSD is often a terrible idea.

However, that is a pretty straightforward response to a much more complex reality that most websites and forums get incorrect. If you want to know that, when left to Microsoft, defragging and optimizing an SSD are both excellent things, keep reading this article.

It saves time, energy, and wear and tear for disk read heads to not have to skip around your spinning disk in search of all the pieces by moving the thousands of file parts into sequential order during defragmentation of a spinning hard drive.

However, if there is extraordinary fragmentation that is getting close to the "maximum fragmentation threshold," Windows will automatically consider partially defragmenting an SSD once per month. After that point, the SSD will stop reading and writing because the "meta data" for the file fragments is too much for the SSD to manage. Microsoft will cautiously defrag the seldom potentially dangerous files because this is a negative thing.

To know more about fragmentation click on the link:

https://brainly.com/question/14127090

#SPJ4

in java, when a character is stored in memory, it is actually the ________ that is stored.

Answers

In java, when a character is stored in memory, it is actually the Unicode number that is stored.

Every character in Unicode has a unique number, regardless of the platform, language, or software it is used with. There were hundreds of distinct encoding techniques for allocating this number prior to the creation of Unicode. Not enough characters could fit in a single encoding: To cover all of its languages, for instance, the European Union alone needs a number of distinct encodings.

No one encoding was sufficient for all the letters, punctuation, and technical symbols in regular usage, not even for a single language like English. Additionally, several encoding techniques clash with one another. The same number may be used by two distinct encodings for two different characters or by a single character in both.

Data always runs the danger of damage when it is transferred between multiple encodings or platforms, even if any particular computer (especially servers) needs to support a wide variety of encodings.

Both students and working professionals can benefit from our fundamental Java programming tutorial. Java is a general-purpose, concurrent, secured, object-oriented, class-based, and computer programming language. It is an established, reliable technique.

A platform is any hardware or software environment in which a program is run. Java is referred to as a platform since it has a runtime environment (JRE) and an API.

To know more about unicode click on the link:

https://brainly.com/question/17147612

#SPJ4

Which of the following is NOT true of summary notes?
a. They can be created with a computer.
b. They tie together content from all readings, lectures, and lab sessions.
c. They are the same as the notes you take throughout the term in class.
d. They are created specifically for test reviews.

Answers

The incorrect statement about the summary notes is they are the same as the notes you take throughout the term in class. The correct option is c.

What are summary notes?

Summary notes are compact notes that are made for revision of purposes. These notes are the extract of all your studies. They contain main things and important subjects and topics.

They can be created on computers and phones, and they are smaller than the notes that are prepared in class.

Therefore, the correct option is c. They are the same as the notes you take throughout the term in class.

To learn more about summary notes, refer to the below link:

https://brainly.com/question/28176775

#SPJ1

What building on the Castle Crasher Playground will be the THIRD knocked over according to this project?

Answers

5 buildings on the Castle Crasher Playground will be the THIRD knocked over according to this project.

Project

A project is any individual or collaborative undertaking, possibly involving research as well as design, that is carefully planned to achieve a specific goal. An alternative viewpoint regards a project as a series of events: a "set of interrelated tasks to be completed over a fixed period of time and within certain cost and other constraints." A project is a temporary (rather than permanent) social system (work system) that may be staffed by teams (within or across organisations) to complete specific tasks under time constraints.

The algorithm should be written in such a way that the VR Robot can knock down all five buildings regardless of the layout of the Playground. Without modifying the project, knock down all buildings in five Castle Layouts.

To learn more about project

https://brainly.com/question/25009327

#SPJ9

a program to search words in c++

Answers

Answer:

a starting point might be after you get this working, you can allow them to enter more words and iterate your search,

for each argument (not counting the first one that is the file name)

search for the word, show the lines...

and more files too, for that matter, for each file, for all the words... (at this point you MUST put flags on what each thing is, up to now, you can use the order of args)

just note that arg[] are c-strings. you can assign a string a c-string, so promotion lets you do things more normally, or you can process it as-is depending on what you use it for (see how I just used it in the file name but moved it to a string in the target?). I plan to use target a lot, but the file name only in one statement ever, no need to upcast it.

Explanation:

int main(int argc, char* argv[])

{

   if(argc < 3) //if the user did not provide enough command line inputs.  

    //you can, and should probably, do more exhaustive input validation and maybe have them

    //do flags as well rather than rely on the order of the arguments to be correct.

     {

        cout << "usage:  mygrep filename word"

        return 1;

     }

   ifstream infile(argv[1]);  //attempt to open the first target as the file

   string target = argv[2];   //assign target from the second argument

   

   ...

Which statement is NOT related to computational thinking?

Answers

The statement that is not related to computational thinking are option A, B and D:

The result of computational thinking is a problem broken down into its parts to create a generalized model and possible solutions.  

Computational thinking involves the techniques of decomposition, pattern recognition, abstraction, and algorithm development.

Computational thinking is a set of techniques used to help solve complex problems or understand complex systems.

What exactly is computational thought?

That difficult challenge is broken down into a succession of smaller, more manageable problems using computational thinking (decomposition).

Note that the ability to apply core ideas and logic from computer science and computing to address issues across all domains is known as computational thinking. CT is a set of problem-solving techniques used in education that entails describing issues and potential answers in a way that a computer might also carry out.

Therefore, The ability to solve problems in the actual world is computational thinking's greatest advantage.

Learn more about computational thinking  from

https://brainly.com/question/19189179
#SPJ1

See choices of this question below:

The result of computational thinking is a problem broken down into its parts to create a generalized model and possible solutions,

Computational thinking involves the techniques of decomposition, pattern recognition, abstraction, and algorithm development.

Computational thinking is basically synonymous with programming.

Computational thinking is a set of techniques used to help solve complex problems or understand complex systems

Understanding all of the minor details about a problem is critical in computational thinking

Both radio and television signals are carried by radio waves. What other type of electromagnetic radiation is used to send information over long distances?



a
ultraviolet light
b
X-rays
c
gamma rays
d
microwaves

Answers

Answer:

Explanation:

c

1. Your employer is opening a new location, and the IT director has assigned you the task of calculating subnets for the new network. You’ve determined that you need 50 subnets for the class B network beginning with the network ID 172.20.0.0. how many unused subnets will be waiting on hold for future expansion? How many possible hosts can each subnet support?

Answers

14 subnets that are unused will be waiting on hold for future expansion.1022 possible hosts can each subnet support.

What is subnets?

A subnetwork, also known as a subnet, is a logical division of an IP network. Subnetting is the practise of dividing a network in to the two or more networks. Computers on the same subnet are addressed in their IP addresses with the same most-significant bit-group. As a result, an IP address is logically divided up into two fields: the network number or routing prefix and the rest field as well as host identifier. The rest field identifies a particular host or network interface.

After subnetting, we have 16+6 = 22 network and 16-6=10 host bits.

No. of unused subnets = 2^6-50 = 14 subnets

No. of hosts. per each subnet =2^10-2 = 1022 hosts.

To learn more about subnets

https://brainly.com/question/28256854

#SPJ9

Consider photographing a football stadium fully lit with stadium lights compared to
a football stadium lit by nothing but candlelight. What is the main difference
between these two lighting situations?
(1 point)
O the light intensity
O the light quality
O the shadow of the light
O the position of the light

Answers

The main difference between these two lighting situations is: A. the light intensity.

What is a photoshoot?

A photoshoot simply refers to a photography session which typically involves the use of digital media equipment and lighting equipment, to take series of pictures (photographs) of models, group, things or places, etc., especially by a professional photographer.

What is light intensity?

Light intensity can be defined as a measure of the rate at which light radiates over the surface of an area such as a football stadium, with respect to the distance from a source. This ultimately implies that, the unit of measurement of light intensity is Watts per steradian (W/sr).

In conclusion, light intensity is simply a difference between a fully lit area and a partially lit area.

Read more on light intensity here: https://brainly.com/question/28145811

#SPJ1

Answer: A.) light intensity

Explanation: edge 2023

Which of the following are notes which can be electronically entered into documents without changing the content of the document?


: Comparisons

Comments

Changes

Reviews

Answers

The option that are notes which can be electronically entered into documents without changing the content of the document is option B: Comments.

What type of word is comments?

As a noun and a verb, "comment" has numerous more meanings. When people comment on something, they are expressing their viewpoint or opinion about it in the form of an observation or a criticism. Short statements typically make up comments. Longer critique or a collection of remarks are referred to as a commentary.

Therefore, An explanation or annotation in a computer program's source code that can be viewed by programmers is known as a remark. Compilers and interpreters typically ignore them because they were introduced to make the source code simpler for humans to understand.

Learn more about Comments from

https://brainly.com/question/27798319

#SPJ1

Answer: comments

Explanation:

Assume that c is a char variable that has been declared and already given a value. Write an expression whose value is true if and only if c is what is called a whitespace character (that is a space or a tab or a newline-- none of which result in ink being printed on paper).

Answers

The expression whose value is true if and only if c is what is called a whitespace character is ( c == " II c== '\n' || c == '\t').

The "white-space character" space, tab, line feed (newline), carriage return, form feed, and vertical tab serve the same function as the spaces between words and lines on a printed page: they facilitate reading. White-space characters and other tokens, including operators and punctuation, serve as token delimiters (bounded spaces).

The C compiler ignores white-space characters while parsing code unless you use them as separators, as parts of character constants, or as literal strings. To make a program easier to read, use white space characters. Take note that comments are also treated as white space by the compiler.

Any character or string of characters used to represent horizontal or vertical space in typography is known as whitespace in computer programming. A whitespace character usually takes up space on a page even though it does not correlate to a mark when it is rendered.

For instance, the standard whitespace symbol U+0020 SPACE (also known as ASCII 32) is a punctuation mark for a blank space that is used to separate words in Western scripts.

To know more about whitespace character click on the link:

https://brainly.com/question/14936585

#SPJ4

Write a program that receives a series of numbers from the user and allows the user to press the enter key to indicate that he or she is finished providing inputs. After the user presses the enter key, the program should print the sum of the numbers and their average.

Answers

The program that receives a series of numbers from the user is:

theSum = 0.0

# stores the number of terms entered by the user

n = 0

# loop until user presses the enter key

# infinite loop

while True:

# get user input from user

data = input("Enter a number or press Enter to quit: ")

# if user presses enter

if data == '':

# break out of the loop

break

# convert data into float using float()

number = float(data)

# add the entered number to theSum

theSum += number

# increase the number of terms

n += 1

print()

print("The sum is", theSum)

# if numbers of terms entered are greater than 0

if n > 0:

# calculate average

average = theSum / n

print('The average is', average)

# if no terms are entered

else:

print('Average : undefined (as the number of terms entered are 0)')

What is a program?

A computer program is a set of instructions written in a programming language that a computer is supposed to obey.

Computer programs are one of the intangible components of the software, which also includes documentation and other components. The version of a computer program that humans can read is called the source code.

Learn more about program on;

https://brainly.com/question/23275071

#SPJ1

You're installing a new network for CSM Tech Publishing, a new publisher of technical books and training materials. There will be 10 client computers running Windows 10, and CSM Tech Publishing plans to run a web-based order processing/inventory program that for now is used only by in-house employees while they're on site. CSM Tech Publishing wants to be able to manage client computer and user policies and allow employees to share documents. Sign in and security should be centrally managed. What network model, workgroup, or domain, should be used? Explain your answer, including any server roles you may need to install.

Answers

The network model, workgroup, or domain, that should be used include TCP, Microsoft, and Windows domain respectively.

How to illustrate the information?

The TCP/IP paradigm is employed in this scenario because it requires established protocols for packet and data transmission over a network of 10 clients and in-house personnel. TCP/IP is a connection-oriented protocol that aids in packet transport.

The workgroup that adheres to Microsoft Windows guidelines can be used. These workgroups play a significant role in the management of LAN PCs by offering peer-to-peer connectivity. Peer-to-peer networking facilitates file sharing and local resource sharing.

The PCs can be managed via the Windows Domain. The Windows Domain also aids in resource sharing. The network administrator plays a vital role in network monitoring by using a monitoring tool. The administrator scans the network for various vulnerabilities.

Learn more about network on:

https://brainly.com/question/1027666

#SPJ1

if you delete a shortcut from your desktop, have you also deleted the original file?

Answers

I don’t think so. When you delete a shortcut, it’s deleting the way to get there faster and not the file itself. To delete the original file, you would have to go directly to it or delete. Also make sure to delete it permanently if you want, because after you delete it there tends to be an option where you could bring it back, unless the device actually tells your the file is going to be deleted permanently the first time.

You are the new IT admin of Sherpa Logistics. The company's in-house application is showing some aberrant behaviors and your team lead has asked you to handle the situation in his absence. What would be your first point of action in such a scenario?

Answers

The first action in such a scenario would be to Troubleshoot the software. This will yield insight into what the issue is and give more understanding of the problem.

What are the steps to solving a software problem?

In general, fixing a software challenge may be separated into four steps:

Determine the issueObtain informationIterate on possible solutions.Try out your solution.

A problem does not always manifest itself with flashing red lights—the software simply does not perform as expected.

Even if this is the case, you should do your best to describe the issue. Ask yourself (and perhaps write down your replies) the following questions:

What am I attempting to accomplish?What have I already done?What do I believe the program should accomplish?What exactly is it doing?

Learn more about software problems:
https://brainly.com/question/13533992
#SPJ1

Which of the following measures the amount of substance?

candela
kilogram
ampere
mole

Answers

The measure of the amount of substance is the mole. The correct option is d.

What is the amount of substance?

The mole, denoted by the sign MOL, is the SI unit for measuring the amount of a substance made up of a particular elementary particle. Examples are an atom, molecule, ion, electron, or other particle or a specific set of particles.

Calculating the amount of any material is done using the mole, a SI unit of measurement.

Therefore, the correct option is d. mole.

To learn more about the amount of substance, refer to the below link:

https://brainly.com/question/20486415

#SPJ1

You have a customer who is having issues with their
computer audio, What do you have them check first?*

Answers

Answer:

Explanation:

What is the Product Rule of Exponents?When multiplying two numbers with the same base, their powers/exponents would be added.For example, .Given:(a²c)³Therefore:(a²c)³ = (a²c)(a²c)(a²c) (a²c)³ = (a²c)³ = Therefore, applying the product rule of exponents, (a²c)³ = .

Other Questions
At the bicycle shop there are 23 bicycles and 18 tricycles. Each bicycle has 2 wheels, and each tricycle has three wheels. How many wheels are there at the bicycle shop? angie just bought a new lamp for her bedside table.the old lamp was 2 1/4 feet tall and the new lamp is 4 feet how much taller is the new lamp than the old lamp? Under what conditions would a nation be viewed as being neither a net borrower nor a net lender in the international economy?. When a substance changes into a different substance, a __change has occurred. Which of the following statements is NOT true about wave packets and their use in describing particles?a. A wave packet is fundamentally a region over which a number of waves of different frequencies and amplitudes are added together to form a non-zero result.b. The movement and travel of a wave packet is governed by the phase velocity.c. An important property of a wave packet describing a particle is the superposition of many different waves.d. The particle can be described using Fourier series and a Fourier integral.e .An important property of a wave packet describing a particle is the localization of wave amplitude. When did medical technological advances begin? Why were these advances made? A triangle has sides of length 7 centimeters, 5.6 centimeters, and 4.2 centimeters. What is the perimeter? Corporal punishment, schools, and race: An update Amylase is a protein. The low pH in the stomach (compared to the mouth) will affect ___________ bonds and cause the protein to become ____________. what is tan x + cot x ?pls help The establishment of Ellis Island in 1982 enabled In the late twentieth century, US companies began using labor outside the companyto provide certain services. What was this business practice called?1- outsourcing2- embezzling3- offshoring Analyzing word parts 2. Summarize the scene between Gillespie and the Purdys. Howdoes their blaming of Sam further complicate the plot? Whatrole docs Virgil play in this interview? In our discussion of the toyota production system, what quick changeover technique, credited to japanese consultant shigeo shingo, reduced setup overhead and allowed just in time lean manufacturing to be more agile?. Your composition should be about 250 wordsWrite an article for publication in your school magazine on the topihow he/she has Influenced me. The following chemical reaction takes place in aqueous solution:2 AgNO3(aq)+NaCO3(aq) AgCO3(s)+2 NaNO3(aq)Write the net ionic equation for this reaction.00-0X compare the x-intercepts for the two linear functions represented in the table below. which of the following statements is true? A rectangular pool is surrounded by a walk 3 meters wide. The pool is 5 meters longer than its width. If the total area of the pool and walk is 270 square meters more than the area of the pool, find the dimensions of the pool. A. In a game, each player receives the sameamount of play money. They each gettwenty-five $1's, three $5's, four $10's, two$100's. How much money does each playerget?v