The mathematical rule that Excel follows to perform calculations in a formula in the proper order is called the order of operations"
Excel calculates according to the acronym PEMDAS, which stands for Parentheses, Exponents, Multiplication and Division, and Addition and Subtraction. This computation order can be changed by using parenthesis.
Using specified data in a particular order, a function is a preset formula that conducts calculations. Common functions that can be used to rapidly determine the sum, average, count, maximum value, and minimum value for a range of cells are included in all spreadsheet systems.
Thus, order of operations.
For more information about Excel, click here:
https://brainly.com/question/30911293
#SPJ4
Given a LinkedList with only a head node, what is the runtime for adding an element to the end of the list?
The runtime for adding an element to the end of a LinkedList with only a head node is O(n), where n is the number of elements in the list.
When adding an element to the end of a LinkedList, we must traverse the entire list to find the last node and then add the new node after it. In this case, since there is only a head node, we must traverse the entire list until we reach the end, which takes O(n) time. Therefore, the overall runtime for adding an element to the end of a LinkedList with only a head node is O(n). Adding an element to the end of a LinkedList with only a head node requires traversing the entire list until we reach the end node, which takes O(n) time, where n is the number of elements in the list. This is because there is no direct reference to the last node in the list and we must follow the links from the head node to the end of the list. Therefore, the overall runtime for adding an element to the end of the list is O(n).
learn more about LinkedList here:
https://brainly.com/question/31142389
#SPJ11
In network security assessments, which type of test employs software to scan internal networks and Internet facing servers for various types of vulnerabilities?
The type of test that employs software to scan internal networks and Internet-facing servers for various types of vulnerabilities is called vulnerability scanning.
Vulnerability scanning is a critical part of network security assessments and involves using automated tools to identify weaknesses in network systems, applications, and infrastructure. These tools scan the network and identify potential vulnerabilities that could be exploited by attackers to gain unauthorized access, steal data, or disrupt services. Vulnerability scanning tests are designed to detect a wide range of vulnerabilities, including software vulnerabilities, configuration errors, and weak passwords. They can also identify potential security holes in the network perimeter, such as open ports or unsecured wireless access points. Vulnerability scanning tests are typically performed on a regular basis to ensure that the network remains secure and that any new vulnerabilities are quickly identified and remediated.
In summary, vulnerability scanning is a critical component of network security assessments that employs software tools to identify vulnerabilities in network systems, applications, and infrastructure. It is an essential step in ensuring the security of networks, and should be conducted on a regular basis to detect new vulnerabilities as they arise.
Learn more about network here: https://brainly.com/question/13105401
#SPJ11
hackers know that most attacks require you to do this for them to work answer
Hackers often know that most attacks require some form of user interaction or vulnerability to be successful. This can include things like clicking on a malicious link in an email,
downloading and installing malware, entering sensitive information into a fake website, or failing to update software with security patches. By exploiting these vulnerabilities or social engineering users into performing actions that compromise security, hackers can gain access to sensitive data, systems, or networks. Therefore, it is important for users to be aware of potential risks and take steps to protect themselves, such as using strong passwords, keeping software up to date, and being cautious of suspicious emails and websites.
learn more about hackers here:
https://brainly.com/question/17881896
#SPJ11
True or False: Mimecast stores the contents of rejected emails for 7 days
Mimecast stores the contents of rejected emails for 7 days. The given statement is true.
Mimecast is a cloud-based email security provider that offers services such as email filtering, archiving, and continuity. When Mimecast filters an email and determines it to be spam or malicious, it will reject the email and store its contents in a secure environment for a period of 7 days.
This allows administrators to review the rejected emails and take necessary actions, such as releasing legitimate emails that were incorrectly blocked or investigating potential security threats. Mimecast's email archiving feature also allows organizations to store emails for a longer period of time for compliance or legal purposes.
Overall, Mimecast's email security services provide robust protection and advanced threat intelligence to help organizations safeguard their email communications.
Learn more about Mimecast:
https://brainly.com/question/31824624
#SPJ11
TRUE OR FALSE 78) You can use text mining tools to analyze unstructured data, such as memos and legal cases.
A) TRUE
B) FALSE
The statement "You can use text mining tools to analyze unstructured data, such as memos and legal cases" is true because it is a process that involves extracting useful information and insights from text data.
Text mining tools can indeed be used to analyze unstructured data, including memos and legal cases. Text mining, also known as text analytics, involves extracting useful information, patterns, and insights from unstructured text data.
These tools utilize techniques like natural language processing, machine learning, and statistical analysis to process and analyze text data.
With the help of text mining tools, organizations can extract key concepts, sentiment analysis, topic modeling, and entity recognition, and perform various other tasks to gain valuable insights from unstructured data sources.
This can be particularly useful in fields such as legal, where analyzing large amounts of textual information, such as legal cases, contracts, and documents, can be time-consuming and complex.
Learn more about text mining tools: https://brainly.com/question/19326812
#SPJ11
What was created to define a standard directory structure and common file location for Linux?
a. FSH
b. X.500
c. FHS
d. root directory
The option that was created to define a standard directory structure and common file location for Linux is:
(c.) FHS (Filesystem Hierarchy Standard).
The Filesystem Hierarchy Standard (FHS) was created to provide a standard directory structure and common file location for Linux. The standard was created to ensure that software developers could write programs that would run on any Linux distribution without the need for significant changes to the code.
Overall, FHS provides a clear and standardized directory structure for Linux systems, which helps with software development, system administration, and user understanding of file locations.
Thus, the correct option is : (c) FHS (Filesystem Hierarchy Standard).
To learn more about Filesystem Hierarchy Standard (FHS) visit : https://brainly.com/question/31455340
#SPJ11
the linkedin page for brands is called a _____ page.
The LinkedIn page for brands is called a LinkedIn Company Page. A LinkedIn Company Page is a valuable tool for businesses to establish their presence on the world's largest professional network.
A LinkedIn Company Page is a dedicated online presence on LinkedIn that allows businesses, organizations, and institutions to showcase their brand, products, and services to LinkedIn's professional community. It serves as a platform for businesses to engage with their target audience, share company updates, job opportunities, and industry insights. The page provides a comprehensive overview of the company, including its mission, vision, values, and achievements. Companies can also use the page to promote their thought leadership by sharing relevant content and insights, as well as to build relationships with customers, prospects, and other stakeholders.
Learn more about LinkedIn Company here:
https://brainly.com/question/2190520
#SPJ11
Write a program that removes the odd numbers from an array and replaces them with even numbers. Your array must have 10 elements and be initialized with the following numbers: 42, 9, 23, 101, 99, 22, 13, 5, 77, 28
The program initializes an array with 10 elements, replaces odd numbers with even numbers, and prints the modified array.
array = [42, 9, 23, 101, 99, 22, 13, 5, 77, 28]
for i in range(len(array)):
if array[i] % 2 != 0:
array[i] = array[i] + 1
print(array)
The program initializes an array with 10 elements containing the given numbers. It then iterates over each element in the array using a for loop. Inside the loop, it checks if the current element is odd by checking if the remainder of dividing it by 2 is not zero (array[i] % 2 != 0). If the element is odd, it adds 1 to it, effectively replacing the odd number with the next even number. Finally, the program prints the modified array, which now contains even numbers in place of odd numbers.
learn more about modified array here:
https://brainly.com/question/30615912
#SPJ11
The Client Status field is used for billing purposes. true or false
Without more context, it is difficult to provide a definitive answer. However, in general, the Client Status field in Relativity is not specifically used for billing purposes.
The Client Status field is a field that can be added to a Relativity workspace to track the status of a client or customer. This field is typically used to indicate whether a client is active or inactive, and can be customized to include additional status options as needed.While the Client Status field could potentially be used to help determine billing rates or to track billing-related information, it is not a field that is specifically designed or intended for billing purposes.
To learn more about Client click the link below:
brainly.com/question/30770983
#SPJ11
What is the difference between a Localizer-Type Directional Aid (LDA) and the ILS localizer?
Both Localizer-Type Directional Aid (LDA) and Instrument Landing System (ILS) localizer are radio navigation aids used for aircraft guidance during the approach and landing phases of flight.
However, there are some key differences between the two systems:
Coverage area: The coverage area of an LDA is generally smaller than that of an ILS localizer. LDAs are designed to serve smaller airports and provide precision approach guidance in areas where there may be terrain or other obstacles that prevent the installation of a full ILS. ILS, on the other hand, is typically used at larger airports and provides coverage over a wider area.
Accuracy: While both systems provide horizontal guidance to the pilot during approach and landing, the ILS localizer is generally more precise than an LDA. ILS localizers are designed to provide accuracy to within a few feet, while LDAs have a typical accuracy of around 0.5 degrees.
learn more about navigation here :
https://brainly.com/question/31640509
#SPJ11
A good alternative to setting up a dedicated proxy server for small businesses is to use a publicly accessible proxy server online. True False
True. Using a publicly accessible proxy server online can be a good alternative for small businesses who do not want to set up a dedicated proxy server.
There are many free and paid options available that offer various levels of security and anonymity. However, it is important to note that using a public proxy server can come with some risks, such as a lack of control over the server and potential security vulnerabilities. It is important to thoroughly research and vet any proxy server before using it for business purposes.
Learn more about alternative here:
https://brainly.com/question/19718027
#SPJ11
01AF (base 16) = _____ (base 10)
01AF (base 16) is equal to 4319 (base 10). To convert a hexadecimal number (base 16) to a decimal number (base 10), we can use the following method:
1. Write down the hexadecimal number
2. Assign each digit of the number a power of 16, starting from the rightmost digit and increasing by one for each subsequent digit
3. Multiply each digit by its corresponding power of 16
4. Add up the results of the multiplication
For example:
- The first digit in 01AF is 0, and its corresponding power of 16 is 3 (since it's the rightmost digit)
- 0 multiplied by 16^3 is 0
- The second digit is 1, and its corresponding power of 16 is 2
- 1 multiplied by 16^2 is 256
- The third digit is A, which represents the value 10 in decimal, and its corresponding power of 16 is 1
- 10 multiplied by 16^1 is 160
- The fourth digit is F, which represents the value 15 in decimal, and its corresponding power of 16 is 0
- 15 multiplied by 16^0 is 15
- Add up the results of the multiplication: 0 + 256 + 160 + 15 = 4319
Therefore, 01AF (base 16) is equal to 4319 (base 10).
Learn more about hexadecimal here:
https://brainly.com/question/28875438
#SPJ11
Which guideline should an employee use when taking notes for a report?
A. Create long, accurate notes by copying and pasting
O B. Stick to key points, uncluttered with the name of the source
O C. Include information about unrelated topics in case he or she
expands the report
OD. Write ideas briefly in his or her own words, and give the source
The guideline that an employee should use when taking notes for a report is option D. Write ideas briefly in his or her own words, and give the source
What is the guideline?This approach makes a difference to guarantee that the notes are exact and pertinent to the report's subject. Moreover, citing the source makes a difference to maintain a strategic distance from plagiarization and gives credit to the initial author.
Therefore, It is not prescribed to form long, exact notes by replicating and sticking because it can lead to a report that lacks creativity and basic considering.
Learn more about guideline from
https://brainly.com/question/1198649
#SPJ1
In most languages, anything passed by reference must be a(n) what?
In most programming languages, anything passed by reference must be a variable. This is because variables are stored in memory locations, which can be accessed by functions using their memory addresses.
Pass by reference is a programming technique that enables a function to modify the value of a variable that exists outside the function. When we pass an argument by reference, we are passing the memory address of the variable instead of its actual value. This means that any changes made to the parameter inside the function will also affect the original variable.
For example, if we have a function that takes a parameter by reference, we can pass a variable to that function and modify its value within the function. The changes made to the variable inside the function will also be reflected in the original variable that was passed as an argument. In C++ reference variables can be created using '&'.
Learn more about Pass-by-reference: https://brainly.com/question/27019258
#SPJ11
Data loss can occur when changing fields from the following types (Select 3)
Data loss can occur when changing fields from the following types:
A larger data type to a smaller oneA numeric data type to a text data typeA non-null data type to a null data type.Changing the field type of data can lead to data loss if the target type is not large enough to store the original data. For example, if a field is changed from a large data type to a smaller one, such as from a double to a float, then data loss can occur due to precision issues.
Similarly, changing a numeric data type to a text data type can result in loss of precision and formatting. Finally, changing a non-null data type to a null data type can lead to the loss of data that is not null. It is important to be aware of these potential issues when changing field types and to ensure that data is backed up before any changes are made.
For more questions like Data click the link below:
https://brainly.com/question/30456204
#SPJ11
22. Today, there is no clear winner in the competition for higher-speed Internet access. What technology or technologies do you think will dominate in 2 years' time? Why?
To unlink a mask from the layer it is masking, you can click on the chain link icon between the layer and the mask thumbnail in the Layers panel.
This icon represents the link between the layer and the mask, and clicking on it will break the link and unlink the mask from the layer. Once the link is broken, you can move, transform, or edit the layer and mask independently of each other. This can be useful when you need to adjust the mask separately from the layer it is masking, or when you want to apply a different mask to the same layer.
To learn more about thumbnail click on the link below:
brainly.com/question/25638529
#SPJ11
Which type of IPv6 address refers to any unicast address that is assigned to multiple hosts?
The type of IPv6 address that refers to any unicast address that is assigned to multiple hosts is known as the "anycast" address.
Anycast is a routing technique that allows multiple devices to share a single IP address. When a packet is sent to an anycast address, the network delivers the packet to the nearest device that shares the same anycast address. This means that multiple devices can use the same IP address, but the network only delivers the packet to the closest one. Anycast addresses are used in a variety of scenarios, such as load balancing, content distribution, and service discovery. For example, a web server might use anycast addresses to distribute traffic across multiple data centers, allowing users to access the website from the closest location.
In contrast to anycast addresses, multicast addresses are used to send a single packet to multiple hosts that have joined a specific multicast group. Unicast addresses, on the other hand, are used to send a packet to a single host. By understanding the different types of IPv6 addresses, network administrators can design more efficient and scalable networks that meet the needs of their users.
Learn more about website here: https://brainly.com/question/28631216
#SPJ11
What does MX record stand for?
What does it do?
MX record stands for Mail Exchange record.
Mail Exchange record or MX record is a type of DNS(Domain Name System) record that specifies which mail server is responsible for accepting email messages on behalf of a particular domain. When someone sends an email to an email address within that domain, the email is first routed to the MX record, which then directs it to the appropriate mail server. In essence, the MX record helps to ensure that email messages are delivered correctly and efficiently to their intended recipients.
In summary, MX records play a crucial role in the email delivery process, as they help direct email messages to the correct mail server for a domain. Without MX records, email delivery would be much less reliable, as there would be no standard way of directing email messages to the correct mail server.
To learn more about DNS visit : https://brainly.com/question/27960126
#SPJ11
It is to be noted that MX record stands for Mail Exchange record.
What is mail exchange record?MX records are a sort of DNS (Domain Name System) record that defines which mail server is in charge of receiving email messages on behalf of a specific domain. When an email is sent to a domain email address, it is first routed to the MX record, which then routes it to the proper mail server.
In essence, the MX record ensures that email messages are delivered to their intended recipients accurately and effectively.
In conclusion, MX records are important in the email delivery process since they assist send email messages to the relevant mail server for a domain.
Email delivery would be substantially less reliable without MX records since there would be no standard mechanism of routing email messages to the relevant mail server.
To learn more about Mail Exchange:
https://brainly.com/question/31969365
#SPJ4
To call a procedure in SQL Server, use the EXEC command. T/F
True. To call a procedure in SQL Server, you can use the EXEC command followed by the name of the procedure.
The EXEC command is used to execute a command or a stored procedure in SQL Server. When you call a procedure using the EXEC command, you need to pass any required parameters within parentheses. The parameters are used to provide input values to the procedure or to retrieve output values from the procedure. A procedure is a stored set of SQL statements that can be executed repeatedly. It is used to group a set of SQL statements into a single unit of work that can be executed whenever needed. Procedures are used to simplify complex operations and can be called from different parts of an application.
Overall, using the EXEC command to call a procedure in SQL Server is a common practice that helps to streamline database operations and improve performance. By grouping a set of SQL statements into a single procedure, developers can easily execute complex operations with a single command, reducing the amount of code that needs to be written and improving the overall efficiency of the database.
Learn more about database here: https://brainly.com/question/30634903
#SPJ11
An operating system may provide:
Select one:
a. Many general-purpose file systems and one special-purpose file system
b. Only one special-purpose file system
c. Only one general-purpose file system and one special-purpose file system
d. Only one general-purpose file system
Depending on the operating system There are numerous general-purpose file systems and just one dedicated file system. Therefore, option (A) is correct.
An operating system (OS) is a piece of software that controls all other application programs in a computer after being originally loaded by a boot program. Utilizing an established application program interface (API), the application programs request services from the operating system.
Operating systems like Windows, Linux, and Android are a few examples that let users run applications like file system Microsoft Office, Notepad, and games on a computer or mobile device. For the computer to operate simple programs like browsers, at least one operating system must be installed.
Learn more about operating system , from :
brainly.com/question/31551584
#SPJ4
True or False: The set delivery time for the digest will correspond to the end user's timezone.
It is untrue to say that the digest will be delivered at the time that is selected to match with the end user.
An end user is a human being or other type of entity who utilizes or consumes products made by businesses.
Due to the possibility delivered that the entity or person who purchases a good or service may not be the one who really uses it, an end user may differ from a customer in this regard. Protecting the information resources to which they have access is the responsibility of end users.
They are responsible for information and information technology equipment, both digital and not.
Learn more about end user, from :
brainly.com/question/28487871
#SPJ4
*Ch. 5-10. Execute a command that undoes the previous deletion.
In order to undo the previous deletion in chapters 5-10, you can use the "undo" command. This command allows you to revert back to the previous action that was taken, in this case the deletion.
To use the undo command, simply type "undo" into the command prompt and press enter. This should revert the file back to its previous state before the deletion occurred. It is important to note that the undo command only works for the most recent action taken. If multiple actions have been taken since the deletion, the undo command may not revert the file back to its exact previous state. Additionally, some commands may not be able to be undone, so it is important to check the documentation or seek further assistance if you are unsure. Overall, the undo command is a useful tool to have in your arsenal when working with files and commands in chapters 5-10. By being able to easily revert back to a previous action, you can save time and avoid potentially irreversible mistakes.
Learn more about undo command here:
https://brainly.com/question/5026154
#SPJ11
Ch. 10-6. Create a list of all book titles and costs. Precede each book's cost with asterisks so that the width of the displayed Cost field is 12.
To create a list of all book titles and costs with asterisks preceding each book's cost and the width of the displayed cost field set to 12, you can follow the below-given steps.
The steps are-
1. Open the file or document containing the book titles and costs.
2. Select the entire column of costs.
3. Right-click on the selected column and choose "Format Cells" from the context menu.
4. In the "Format Cells" dialog box, select the "Custom" category.
5. In the "Type" field, enter the following code: "************0.00".
6. Click "OK" to apply the formatting to the selected cells. This will add 12 asterisks before each cost value and align them to the right, creating a field width of 12.
7. Adjust the column width if necessary to ensure that all the costs are fully displayed.
8. Save the file or document with the updated formatting.
Once you have completed these steps, you will have a clear and visually appealing list of all book titles and costs with asterisks preceding each cost and the width of the displayed cost field set to 12. This formatting can help make it easier to read and compare the costs of different books in the list.
Learn more about formatting here: https://brainly.com/question/11523374
#SPJ11
36. Compare and contrast DES and public key encryption.
DES data encryption standard and public key encryption are both methods of encrypting data, but they differ in several ways. DES is a symmetric key encryption method, which means that the same key is used for both encryption and decryption. Public key encryption, on the other hand, uses two keys – a public key for encryption and a private key for decryption.
DES is a relatively fast and simple encryption method, but it is now considered less secure due to advances in computing power. Public key encryption, on the other hand, is more secure because the private key is kept secret and cannot be easily obtained.
One major advantage of public key encryption is that it can be used for digital signatures, which allow for secure authentication of electronic documents. DES does not have this capability.
In summary, while DES and public key encryption are both methods of encrypting data, they differ in their security level, key management, and additional features like digital signatures.
learn more about DES data encryption standard here:
https://brainly.com/question/13025568
#SPJ11
What information will your previous employee need to provide in order for you to write an effective recommendation
In order to write an effective recommendation, your previous employee will need to provide relevant information about their skills, experiences, achievements, and specific examples of their work.
To write an effective recommendation for a previous employee, it is important to have detailed information about their professional background. This includes their skills, areas of expertise, and specific experiences that highlight their strengths and accomplishments. It is helpful to know about any notable projects they have worked on, their contributions to the team or organization, and any recognition or awards they have received.
Specific examples and anecdotes can add depth and credibility to the recommendation. Additionally, understanding the employee's career goals and aspirations can help tailor the recommendation to align with their future endeavors. By gathering comprehensive information about the employee's professional profile, an effective recommendation can be crafted that showcases their abilities and potential to prospective employers or others who may be reading the recommendation.
You can learn more about recommendation at
https://brainly.com/question/25288497
#SPJ11
You can indicate a table's primary key by underlining the column or collection of columns that comprises the primary key for each table in the database. T/F
The correct answer is True.In a database schema diagram or in a table design document, it is common practice to indicate the primary key of a table by underlining the column or collection of columns that comprises the primary key for that table.
This is a visual way to communicate to database users and developers which column or columns are used to uniquely identify each record in the table.In addition to underlining the primary key columns, it is also common to include other information about the table and its columns, such as data types, constraints, and relationships to other tables in the database. By using visual cues and clear documentation, it becomes easier to understand and work with the database schema, even as it grows in complexity.
To learn more about database click the link below:
brainly.com/question/30100936
#SPJ11
True or False: If a Secure Delivery Definition has "Strict" applied in the Encryption Mode, the emails using this definition will never connect with a self-signed certificate.
If a Secure Delivery Definition has "Strict" applied in the Encryption Mode, the emails using this definition will never connect with a self-signed certificate. Thus, the given statement is true.
When communications are delivered, the Secure Delivery policy is enforced if: From Mimecast to your enterprise, inbound. Leaving Mimecast and sending to other recipients. Your transmitting and receiving servers must both have an SSL certificate installed for you to use the TLS technology made possible by Mimecast Secure Delivery.
Having an SSL certificate from a Mimecast-trusted public root certificate authority is highly advised. When using Relaxed TLS, self-signed certificates are permitted but should only be used momentarily to investigate delivery problems.
Learn more about Encryption Mode here:
https://brainly.com/question/10179884
#SPJ4
In Oracle and SQL Server, use the ____ function to truncate everything to the right of the decimal point.
a.TRUNCATE
b. REMOVE
c. TRIM
d. FLOOR
In Oracle and SQL Server, you can use the TRUNC function to truncate everything to the right of the decimal point.
This function removes the decimal portion of a number and returns the integer part. The TRUNC function can be useful in situations where you need to perform calculations that only require whole numbers, such as counting or indexing. It is important to note that the TRUNC function does not round the number, it simply removes the decimal portion. This means that if the number is negative, the function will round towards zero. Overall, the TRUNC function is a powerful tool for working with numerical data in both Oracle and SQL Server.
learn more about TRUNC function here:
https://brainly.com/question/15875812
#SPJ11
Indicate which PCB fields may change during a process's lifetime.
parent
a)May change
b)Will not change
The parent field in a PCB design may change during a process's lifetime. The parent field is used to indicate the hierarchical relationship between different components on the PCB. For example, the parent of a resistor component may be the circuit board on which it is mounted, while the parent of a circuit board may be the assembly that it is a part of.
In summary, the parent field in a PCB design may change during a process's lifetime, depending on the current hierarchical relationship between the components and any changes to the design or manufacturing processes.It is not accurate to say that the parent field will not change during a process's lifetime, as the field reflects the hierarchical relationship between the components on the PCB, which may evolve over time. However, proper project management practices, such as regular communication between team members and maintaining up-to-date documentation, can help ensure that the parent field is always accurate and reflects the current hierarchical relationships between the components.
To learn more about assembly click on the link below:
brainly.com/question/21305476
#SPJ11
Which of the following give chart elements a realistic, three-dimensional look?
A. bold fonts
B. outlines
C. increased outline weight
D. bevels and shadows
Bevels and shadows give chart elements a realistic, three-dimensional look. Option D is correct.
Bevels and shadows are graphical effects that can be applied to chart elements, such as bars, lines, and text, to give them a three-dimensional appearance. Bevels create the illusion of depth by adding a raised or lowered edge to an element, while shadows create the appearance of depth by casting a shadow behind an element.
Bold fonts and outlines can help to emphasize chart elements and make them more visible, but they do not specifically give elements a three-dimensional look. Increased outline weight can help to create a bolder and more prominent outline, but it does not specifically give the element a three-dimensional appearance.
Therefore, the correct answer is D) bevels and shadows.
Learn more about chart elements https://brainly.com/question/9013183
#SPJ11