The option that the split command do on a file when no other options are specified is: d. It will split a file into new files that are 1,000 lines each.
What is split command?The split command is a utility tool that may be found in Linux, Unix and macOS among other operating systems. A huge file may be divided into smaller pieces using this technique as can a data stream.
The split command does not divide the file depending on file size or the number of lines when no additional arguments are given. Instead the file is divided into smaller files with a maximum size of 1,000 lines each in accordance with the default behaviour.
Therefore the correct option is d.
Learn more about split command here:https://brainly.com/question/20718032
#SPJ4
a(n) ________ is used to protect the computer from a power sag or power outages.
A UPS (Uninterruptible Power Supply) is used to protect the computer from power sag or power outages. It provides backup power in case of power interruptions, allowing the computer to continue running or to be safely shut down.
A UPS is a device that contains a battery or a set of batteries, which are charged when the mains power is available. In the event of a power sag or outage, the UPS automatically switches to battery power, providing a continuous and stable supply of electricity to the computer. This prevents abrupt shutdowns or data loss that can occur when power is suddenly cut off.
A UPS also offers protection against power surges and voltage spikes, which can damage computer components. It acts as a buffer, regulating the power supply and ensuring that the computer receives clean and consistent power.In summary, a UPS safeguards the computer by providing temporary power during sags or outages, preventing data loss, and protecting against power-related damages.
Learn more about computer here:
https://brainly.com/question/32297640
#SPJ11
______ of the 1980's allowed computing power to spread and gave rise to a decentralized approach to IT governance. a) Servers b) Mainframes c) Networks
c) Networks in the 1980s, networks played a pivotal role in allowing computing power to spread and gave rise to a decentralized approach to IT governance.
Networks connected computers and allowed them to communicate and share information, enabling the distribution of computing power across multiple systems. This decentralization shifted the control and management of IT resources from a centralized mainframe model to a more distributed architecture. It empowered individual users and departments to have their own computing capabilities, leading to increased productivity, collaboration, and flexibility in IT operations. Networks also laid the foundation for the internet and the interconnected world we live in today.
Learn more about architecture here:
https://brainly.com/question/29649525
#SPJ11
TRUE / FALSE. ios and android combine different structures, resulting in hybrid systems that address performance, security, and usability issues.
The statement is partially true. Both iOS and Android have their own unique structures and operating systems.
While iOS and Android have different structures, there are some similarities in terms of their approach to addressing performance, security, and usability. Both systems focus on optimizing performance to ensure smooth and fast operation of apps. They also have built-in security features to protect users from malware and data breaches.
It's important to note that hybrid systems that combine both iOS and Android structures are not common. In fact, most mobile app developers choose to build apps exclusively for one platform or the other. While there are some tools and frameworks available that can help developers create hybrid apps.
To know more about Android visit:
https://brainly.com/question/27936032
#SPJ11
routers configured with a link-state routing protocol use ______________________________ to inform neighbor routers on the internetwork.
The answer to your question is that routers configured with a link-state routing protocol use Link State Advertisements e-mail (LSAs) to inform neighbor routers on the internetwork. LSAs contain information about the router's directly connected links and the state of those links.
link-state routing protocols like OSPF (Open Shortest Path First) and IS-IS (Intermediate System to Intermediate System) use LSAs to communicate information about the network topology. Each router floods its LSAs to all directly connected neighbors, who then flood the LSAs to their neighbors, and so on. This allows all routers in the network to have a complete and consistent view of the network topology, which is used to calculate the shortest path to all destinations.
In contrast, distance-vector routing protocols like RIP (Routing Information Protocol) use periodic broadcasts to inform neighbors of their routing tables. This can result in inconsistencies and slow convergence times, especially in large networks.
To know more about e-mail visit:
https://brainly.com/question/13460074
#SPJ11
You need to configure File History to automatically delete any stored snapshots that are older than 1 month.
Click the option you would use in Control Panel to do this
To configure File History to automatically delete snapshots older than 1 month, you would use the "Advanced settings" option in the File History Control Panel.
Step-by-step explanation:
1. Press the Windows key and type "Control Panel" in the search box, then press Enter to open the Control Panel.
2. Change the "View by" option to "Category" if it is not already set to that.
3. Click on "System and Security" in the Control Panel.
4. Under "File History," click on "Save backup copies of your files with File History."
5. In the left pane, click on "Advanced settings."
6. In the "Advanced settings" window, look for the "Versions" section.
7. Under "Keep saved versions," click on the drop-down menu and select "1 month" as the desired duration for keeping the stored snapshots.
8. Click on the "Save changes" button to apply the changes you made.
9. Close the Control Panel window.
By following these steps, File History will be configured to automatically delete any stored snapshots that are older than 1 month.
Know more about the Control Panel click here:
https://brainly.com/question/32215335
#SPJ11
which of the following wan technologies provides packet switching over high-quality digital lines at speeds greater than 1.544 mbps?
T3 (or DS3) is the WAN technology that provides packet switching over high-quality digital lines at speeds greater than 1.544 Mbps.
Which WAN technology provides packet switching over high-quality digital lines at speeds greater than 1.544 Mbps?Among the WAN technologies mentioned, the one that provides packet switching over high-quality digital lines at speeds greater than 1.544 Mbps is T3. T3, also known as DS3, is a widely used WAN technology that offers high-speed connectivity.
It operates at a data rate of 44.736 Mbps, which is significantly higher than the mentioned 1.544 Mbps.
T3 lines are commonly used to transmit large volumes of data, voice, and video traffic over long distances.
They are suitable for organizations requiring substantial bandwidth and reliable performance for their network applications.
T3 connections are established using fiber-optic or coaxial cables and are commonly used in enterprise networks and internet backbones.
Learn more about WAN technology
brainly.com/question/3500198
#SPJ11
the machine or process that is limiting overall output is called a constraint or
The machine or process that is limiting overall output is called a constraint or a bottleneck. A bottleneck is a point in the system where the flow of production is slowed or halted, thus affecting the entire process.
Bottlenecks typically arise when a specific machine, resource, or step in the process cannot match the demand or pace of the other components. This imbalance slows down the entire system, resulting in a constraint on overall productivity.
Identifying and addressing bottlenecks is crucial for optimizing processes and enhancing efficiency. By examining the workflow and pinpointing the bottleneck's location, steps can be taken to alleviate the constraint. This may involve increasing capacity, enhancing the process itself, or redistributing the workload to achieve better productivity.
To learn more about bottlenecks visit: https://brainly.com/question/29313227
#SPJ11
T/F. the lowest level of attack or simplest attack for cracking an encryption key would be a dictionary attack, which is basically trying to crack a key by trial and error.
False. The lowest level of attack or simplest attack for cracking an encryption key is a brute-force attack, not a dictionary attack. A brute-force attack involves systematically trying all possible combinations of characters until the correct key is found, while a dictionary attack uses a predefined list of words or phrases.
Brute-force attacks are more time-consuming as they try all possible combinations, making them slower but potentially more effective.
A dictionary attack relies on a predefined list of words or phrases (the "dictionary") to guess the encryption key. It involves trying each word or phrase in the dictionary as the key until a match is found. While it can be effective if the encryption key is a common word or a weak passphrase, it is not the lowest level or simplest attack.
On the other hand, a brute-force attack systematically tries all possible combinations of characters until the correct key is found. It doesn't rely on a predefined list but explores every possible combination. Brute-force attacks are time-consuming because they go through all possibilities, but they are considered the simplest form of attack as they don't require any specific knowledge or insight into the encryption algorithm or key.
Learn more about algorithm here:
https://brainly.com/question/21172316
#SPJ11
1. each row of the table represents an instance of an object. what is the best name for that object?
Each row of the table represents an instance of an object. The best name for that object would depend on the context and the specific nature of the table. However, a commonly used term for an object represented by a row in a table is a record.
In database terminology, a record typically refers to a collection of related data fields or attributes that describe a specific entity or object. Each row in a table represents a unique instance or record of that object, containing values for each attribute or field associated with it.
For example, in a table representing employees, each row would represent a different employee record with attributes such as name, age, job title, and salary. The row or instance of the employee in the table would be referred to as an employee record.
It's important to consider the specific domain and context of the table to determine the most appropriate name for the object represented by each row.
Learn more about row of the table here:
https://brainly.com/question/31839226
#SPJ11
________ involves copying only the data items that have changed since the last partial backup.
Incremental backup involves copying only the data items that have changed since the last partial backup. Incremental backup is a backup strategy that focuses on backing up only the data that has been modified or added since the last backup.
Incremental backup involves identifying the changes made to the data and copying only those specific changes rather than duplicating the entire dataset. This approach helps to optimize storage space and reduce the time required for backups.
In an incremental backup scheme, the initial backup is typically a full backup that captures all the data. Subsequent backups are then performed incrementally by identifying and copying only the data that has changed or been added since the previous backup.
This can be achieved by keeping track of timestamps or using specialized backup software that tracks modifications at a file or block level.
By copying only the changed data, incremental backups are generally faster and require less storage space compared to full backups. However, the process of restoring data from incremental backups can be more complex, as it requires restoring the full backup followed by each subsequent incremental backup in chronological order to restore the complete dataset.
Overall, incremental backups provide an efficient and space-saving method for regularly backing up data by focusing on capturing only the changes made since the last backup.
Learn more about Incremental backup here :
https://brainly.com/question/29981694
#SPJ11
jit is an example of information driven technology innovation. True or false?
False. JIT (Just-in-Time) is not an example of information-driven technology innovation.
JIT is a production strategy aimed at minimizing inventory and production costs by producing and delivering goods exactly when they are needed, thus reducing waste and increasing efficiency. While information and technology may be used to support JIT implementation, the core concept of JIT is focused on the optimization of production and supply chain processes rather than being driven primarily by information technology innovations.
Learn more about innovations here:
https://brainly.com/question/30857786
#SPJ11
write a query to print the maximum number of discounted tours any one family in the families table can choose from
The answer to your question is: SELECT MAX(discounted_tours) FROM families; if you want to print the maximum dual-boot setup number of discounted tours any one family in the families table can choose from, you can use the SQL query SELECT MAX(discounted_tours) FROM families;
This SQL query selects the maximum number of discounted tours that any one family in the "families" table can choose from. The "MAX()" function is used to find the highest value in the "discounted_tours" column, which represents the number of discounted tours a family can choose from. The "FROM" keyword specifies the table we are querying, which in this case is "families".
In the "families" table, there is likely a column that represents the number of discounted tours a family can choose from. Let's assume this column is named "discounted_tours". To find the maximum number of discounted tours any one family can choose from, we need to use the "MAX()" function in SQL. The "MAX()" function returns the highest value in a column. In this case, we want to find the maximum number of discounted tours. Therefore, we can use the following SQL query:
SELECT MAX(discounted_tours) FROM families; This SQL query selects the maximum value in the "discounted_tours" column from the "families" table. The result will be a single number, which represents the highest number of discounted tours that any one family in the table can choose from.
To know more about dual-boot setup visit:
https://brainly.com/question/31812680
#SPJ11
strike termination devices must be connected to the structural steel framing by ? .
Strike termination devices, such as lightning rods or lightning protection systems, must be connected to the structural steel framing by a conductor or bonding conductor.
To ensure effective lightning protection, strike termination devices are typically connected to the structural steel framing using conductive elements such as copper or aluminum conductors. These conductors serve as pathways for the dissipation of lightning currents, safely redirecting them into the ground. The conductor or bonding conductor creates a low-impedance path, facilitating the safe discharge of electrical energy from a lightning strike. The connection between strike termination devices and the structural steel framing is critical for establishing a reliable and efficient grounding system, which helps protect the building or structure from the damaging effects of lightning strikes.
Learn more about bonding conductor here:
https://brainly.com/question/13002378
#SPJ11
In the following code, which field in the associated form is being used for the Case structure? Select Case [Course] Case "CIS 101" lblMessage, Caption = "Prerequisite CIS 100 required"
The field being used for the Case structure in the given code is "Course". The code uses a Select Case statement to check the value of the "Course" field.
If the value of the "Course" field is "CIS 101", then the code sets the caption of a label control to "Prerequisite CIS 100 required". This means that the code is checking the value of the "Course" field to determine which action to take. If the value of the field matches a specific case, then the code will execute the corresponding code block for that case. This allows for more efficient and organized code, as the code only needs to check the value of the field once and can take different actions based on that value.
To know more about Course visit:
https://brainly.com/question/29726888
#SPJ11
code analysis is the analysis of a computer osftwarre that id preformed with esecuring programs built forom that software on a real T/F
The statement "Code analysis is the analysis of computer software that is performed with securing programs built from that software on a real" is False.
Code analysis refers to the examination and evaluation of computer software's source code or binary code to identify potential issues, vulnerabilities, or areas of improvement. It involves analyzing the code structure, syntax, and logic to ensure compliance with coding standards, best practices, and security requirements.
However, the second part of the statement, which mentions "securing programs built from that software on a real," is unclear and does not align with the definition of code analysis. Code analysis focuses on the software itself rather than the execution or securing of programs built from that software on a real system.
Securing programs typically involves additional activities such as testing, deployment, configuration management, and implementing security measures to protect the software and its users. These activities are separate from code analysis and may be performed in conjunction with it to ensure the overall security and reliability of the software during its real-world usage.
Learn more about Code analysis here:
https://brainly.com/question/1056731
#SPJ11
many password-protected oss and applications store passwords in the form of ____ or sha hash values.
Password-protected refers to the security measure where access to a system, device, file, or resource is restricted and requires a valid password to authenticate and gain authorized entry.
Many password-protected operating systems (OSs) and applications store passwords in the form of hashed values or SHA (Secure Hash Algorithm) hash values. Hashing is a process that converts a plain-text password into a fixed-length string of characters using a mathematical algorithm. This hash value is then stored in the system instead of the actual password.
Learn more about password-protected here:
https://brainly.com/question/30747746
#SPJ11
which is probably true about an organziation that acquires a packaged software
The organization likely needs a specific software solution, has evaluated and selected the packaged software, and expects cost savings and faster implementation compared to custom software development, among other things.
What can be expected about an organization that acquires packaged software?When an organization acquires a packaged software, several things are likely to be true:
The organization needs a specific software solution to address its business requirements.The organization has evaluated and selected the packaged software as the most suitable option available in the market.The organization prefers to use an existing software solution rather than developing a custom software from scratch. The organization expects the packaged software to provide functionality and features that align with its needs. The organization anticipates cost savings and faster implementation compared to developing a custom software solution.The organization may need to adapt its processes and workflows to fit the capabilities and limitations of the packaged software.Learn more about organization
brainly.com/question/12825206
#SPJ11
the path betwwn a trees root and any other node is not unqiue T/F
True.
The path between a tree's root and any other node is not necessarily unique. This is because a tree can have multiple paths that lead to the same node. For example, if a tree has a branching structure, there may be multiple ways to reach a particular node by following different paths.
Additionally, if there are multiple nodes at the same level in the tree, there may be different paths to reach those nodes depending on which branch is taken. It's important to note that while the path between the root and a given node may not be unique, the path between any two nodes in the tree is always unique.
To know more about nodes visit:
https://brainly.com/question/30885569
#SPJ11
SQL ________ frameworks provide a set of tools that provide persistence by linking classes to parameters and results of SQL queries
SQL query mapping frameworks provide a set of tools that provide persistence by linking classes to parameters and results of SQL queries.
SQL frameworks are software tools that provide a layer of abstraction between a database and the application. These frameworks make it easier to interact with a database by providing a set of tools that handle persistence. By linking classes to the parameters and results of SQL queries, these frameworks can automatically map database tables to objects in the application, making it easier to perform CRUD (Create, Read, Update, Delete) operations. Some popular SQL frameworks include Hibernate for Java, Django ORM for Python, and Entity Framework for .NET. These frameworks can help reduce the amount of boilerplate code required for database interactions, making it easier and faster to build applications that rely on a database backend.
To know more about SQL frameworks visit:
https://brainly.com/question/31663284
#SPJ11
what technique is used to assure the currency and integrity of files when system failures occur during file changes?
The technique used to assure the currency and integrity of files when system failures occur during file changes is called
file system journaling
What is file system journaling ?File system journaling is a method employed by modern file systems to maintain the consistency and integrity of files and file system metadata in the event of system failures or unexpected power outages. It works by keeping a log or journal of file system transactions or changes that are about to be made.
When a file change operation is initiated the file system records the details of the change in the journal before actually performing the operation. this includes information such as the file being modified, the nature of the modification, and the location where the modification will occur.
Learn more about system failures at
https://brainly.com/question/29945086
#SPJ4
to transfer your web application files to a web server, you can use a/an ___________ client such as filezilla.
True. To transfer web application files to a web server, you can use an FTP (File Transfer Protocol) client such as FileZilla.
FileZilla is a popular FTP client that provides a user-friendly interface for transferring files between a local computer and a remote server. It supports various protocols, including FTP, FTPS, and SFTP, making it a versatile tool for web development. By connecting to the web server using FileZilla, you can navigate through the local and remote file systems, upload or download files, and manage the transfer process.
Using an FTP client like FileZilla simplifies the process of deploying web application files to a web server, ensuring that the necessary files are securely and efficiently transferred to the correct location on the server.
Learn more about web application files here:
https://brainly.com/question/31845574
#SPJ11
a _________ cipher processes the plaintext input in fixed sized blocks and produces a block of ciphertext of equal size for each plaintext block.
A block cipher processes the plaintext input in fixed sized blocks and produces a block of ciphertext of equal size for each plaintext block.
The term "planet" is not relevant to the question.
In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is encipherment. To encipher or encode is to convert information into cipher or code. In common parlance, "cipher" is synonymous with "code", as they are both a set of steps that encrypt a message; however, the concepts are distinct in cryptography, especially classical cryptography.
Codes generally substitute different length strings of characters in the output, while ciphers generally substitute the same number of characters as are input. A code maps one meaning with another. Words and phrases can be coded as letters or numbers. Codes typically have direct meaning from input to key. Codes primarily function to save time. Ciphers are algorithmic. The given input must follow the cipher's process to be solved. Ciphers are commonly used to encrypt written information.
To know more about planet refer https://brainly.com/question/14754515
#SPJ11
TRUE / FALSE. the current fcc ruling is that toy-character shows are permissible as long as the toys featured are not advertised during the show.
The given statement " the current fcc ruling is that toy-character shows are permissible as long as the toys featured are not advertised during the show." is TRUE because According to the Children's Television Act of 1990, toy-character shows are permissible as long as the toys featured are not advertised during the show.
This regulation aims to protect children from excessive commercialization and to ensure that the programming content remains focused on education and entertainment, rather than promoting specific products. The FCC closely monitors children's television to maintain a balance between commercial interests and the well-being of young viewers.
Learn more about advertising at https://brainly.com/question/7626020
#SPJ11
FILL THE BLANK. after bingeing on cakes and cookies, bonnie practices self-induced vomiting to avoid gaining weight. based on this information, you would expect to notice ________ as a sign of her purging behavior.
Based on this information, you would expect to notice signs of "dental erosion" as a result of Bonnie's purging behavior.
Self-induced vomiting can lead to the exposure of stomach acid to the teeth, which can erode the enamel and cause dental problems. This is a common consequence of purging behaviors in individuals with eating disorders. It is important to note that purging behaviors can have serious physical and psychological effects and should be addressed with appropriate support and treatment.
Learn more about dental erosion here;
https://brainly.com/question/32269821
#SPJ11
in general, ________ tools show what has already happened in a business and ________ tools show what might or could happen in the future.
In general, historical tools show what has already happened in a business, while predictive tools show what might or could happen in the future.
Historical tools analyze past data to provide insights on past performance, trends, and patterns, helping businesses make informed decisions based on actual outcomes. On the other hand, predictive tools use statistical models and algorithms to forecast potential future scenarios.
These projections allow businesses to prepare for different possibilities, manage risks, and make strategic plans to optimize growth and success. Both types of tools play a vital role in the decision-making process, ensuring that businesses stay competitive and adaptable in the ever-changing market.
Learn more about business tool at https://brainly.com/question/13135951
#SPJ11
what is the recommended way to depart when docked on the windward side, in strong winds?
The recommended way to depart when docked on the windward side in strong winds is to release the dock lines gradually while applying forward power, keeping the boat under control and avoiding sudden movements.
In strong winds, departing from the windward side can be challenging due to the force pushing the boat against the dock. To depart safely, it's crucial to release the dock lines gradually to prevent the boat from being pulled back into the dock or causing sudden movements that could lead to collisions or damage. Applying forward power while releasing the lines helps maintain control and allows the boat to move away from the dock smoothly. It's essential to maintain situational awareness and adjust the power and steering as needed to counteract the wind and safely navigate away from the dock.
Learn more about dock here:
https://brainly.com/question/30335091
#SPJ11
Which of the following statements is false when a packet is being compared to an access list?A. Its always compared with each line of the access list in sequential order.B. Once the packet matches the condition on a line of the access list, the packet is acted upon and no further comparisons take place.C. There is an implicit deny at the end of each access list.D. Until all lines have been analyzed, the comparison is not over.
When a packet is being compared to an access list, the false statement is A. It is not always compared with each line of the access list in sequential order. The order of comparison can depend on the type of access list being used, whether it is standard or extended.
In a standard access list, the conditions are based solely on the source IP address. The access list is processed sequentially, and if there is a match, the packet is acted upon. However, in an extended access list, the conditions are based on a variety of factors, including the source and destination IP addresses, port numbers, and protocol type. In this case, the access list is processed in a top-down order, and the packet is compared with each line of the access list until a match is found.
Once a match is found in either a standard or extended access list, the packet is acted upon, and no further comparisons take place. This statement (B) is true. Also, there is always an implicit deny at the end of each access list (C), meaning that if a packet does not match any of the conditions in the access list, it is denied. Finally, until all lines have been analyzed, the comparison is not over (D), as the packet must be checked against each line until a match is found or the end of the access list is reached.
To learn more about access list, refer:-
https://brainly.com/question/30652448
#SPJ11
Show the number of instructors who live in NY state and has a street number of 518. (HINT: use string functions such as SUBSTR and INSTR)Q5. Display the lowest, highest, and average numeric grade of Project grade type. (HINT: use the MIN, MAX, and AVG function; join GRADE and GRADE_TYPE)
To show the number of instructors who live in NY state and have a street number of 518, you can use string functions such as SUBSTR and INSTR in combination with a SQL query.
Assuming you have a table named Instructors with columns Address and State, you can use the following query: This query uses SUBSTR to extract the street number from the "Address" column, and INSTR to find the position of the first space in the address. It then checks if the extracted street number is '518' and the state is 'NY'. COUNT(*) is used to count the number of matching rows, representing the number of instructors who meet the specified conditions.
Learn more about INSTR here:
https://brainly.com/question/31798060
#SPJ11
True/False: the original development goals for unix were twofold: to develop an operating system that would support software development, and to keep its algorithms as simple as possible.
False. The original development goals for Unix were not twofold but rather threefold:
To provide a convenient and efficient operating system for software development.To allow easy portability of the operating system across different hardware platforms.To keep the design and implementation of the system as simple and elegant as possible.The simplicity and elegance of Unix's design were seen as important goals by its creators, Ken Thompson and Dennis Ritchie. They aimed to create a modular and flexible operating system that could be easily understood, extended, and maintained. This emphasis on simplicity contributed to Unix's success and its influence on subsequent operating systems.
learn more about development here :
nly.com/question/28011228
#SPJ11
Describe the difference between a java.util.HashMap and a java.util.TreeMap. h
O The TreeMap class is efficient for locating a value, inserting an entry, and deleting an entry. The HashMap class is efficient for traversing the keys in a sorted order.
O The HashMap has a linked-list implementation that supports an ordering of the entries in the map. The TreeMap class is efficient for traversing the keys in a sorted order.
O The TreeMap has a linked-list implementation that supports an ordering of the entries in the map. The HashMap class is efficient for traversing the keys in a sorted order.
O The HashMap class is efficient for locating a value, inserting an entry, and deleting an entry. The TreeMap class is efficient for traversing the keys in a sorted order.
The correct answer is: The HashMap class is efficient for locating a value, inserting an entry, and deleting an entry.
The TreeMap class is efficient for traversing the keys in a sorted order. Both classes are implementations of the Map interface in Java, but they differ in the way they store and sort keys. HashMap uses a hash table for storing keys and values, while TreeMap uses a red-black tree.
HashMap allows null values and keys, but TreeMap does not. HashMap does not guarantee any particular order of iteration, while TreeMap guarantees a sorted order based on the natural ordering of the keys or a Comparator that is provided during instantiation.
Therefore, if you need to store and access data based on a key-value pair, use HashMap for faster retrieval, insertion, and deletion. If you need to iterate over the keys in a sorted order, use TreeMap.
To know more HashMap refer https://brainly.com/question/8367090
#SPJ11