7. (a) An algorithm has been written in pseudocode to Input 50 numbers. Positive numbers are stored
in the array PosNum[ ]. Negative numbers are stored in the array NegNum ).
Zeros are not included in the positive and negative counts.
Count 0
PosCount Count
NegCount + Count
REPEAT
INPUT Number
IF Number > 0
THEN
PosCount PosCount + 1
PosNum[PosCount] = Number
ELSE
NegCount = NegCount
NegNum[NegCount] = Number
ENDIF
Count Count + 1
UNTIL Count >= 50
OUTPUT "There are ", PosCount," positive numbers"
OUTPUT "There are ", NegCount," negative numbers"
(b) The algorithm needs to be changed so there is no limit to how many numbers can be input.
When the number 9999 is input, the algorithm stops more numbers being input and outputs
the results. The number 9999 is not to be stored nor counted as a positive number.
Explain how you would change the algorithm.​

Answers

Answer 1

Answer:

The numbers do not have to be stored and the counter is also unnecessary, so take out all lines with PosNum[], NegNum[] and Count.

The repeat...until clause can be changed to:

REPEAT

...

UNTIL Number = 9999

and the IF Number>0 THEN must be changed to

IF Number > 0 AND Number != 9999 THEN

That should do the trick.


Related Questions

Kris is the project manager for a large software company. Which part of project management describes the overall project in detail?

1) Analysis report

2) Resources document

3) Scope

4) Scope creep

Answers

The answer is 2), good luck.

Answer:

Scope or 3)

hope this helps

always love to be marked brainliest

Secondary technology skills are skills that may be improved as the online class progresses.

Answers

Answer:

yes

Explanation:

it helps in the future

Answer:

yes

Explanation:

How Can I add a image in an HTML program?​ please tell

Answers

Answer:

use the img tag

Explanation:

First of al, HTML is not a program, it is a markup language.

To add an image, use:

<img src="...url to the image...">

Which shot is not the best for a widescreen image

Long shot
Closeup
Establishing shot

Answers

Closeup because well it’s close and not far away

Terascale computing is the ability of a computer to process one ____ floating point operations per second (teraflops).

Answers

Terascale computing is the ability of a computer to process one trillion floating point operations per second (teraflops).

A computer that can perform at least one teraflops of floating-point operations is known as a terascale computer. These types of computers are required for high-end scientific and engineering simulations, as well as other processor-intensive applications, including machine learning, image, and signal processing, and data analytics.

Here's a step-by-step explanation of what terascale computing means:

Step 1: Terascale Computing refers to the capability of a computer to process at least one trillion floating-point operations per second (teraflops).

Step 2: TeraflopsTeraflops is a unit of measurement used to describe the speed of a computer in terms of floating-point operations per second. It is equivalent to one trillion floating-point operations per second.

Step 3: Terascale Computer that is capable of processing at least one teraflops of floating-point operations is known as a terascale computer. These types of computers are used for scientific and engineering simulations, machine learning, image and signal processing, and data analytics.

Step 4: ApplicationsThe use of terascale computing is becoming increasingly important in many fields, including scientific research, national security, finance, and more. Terascale computers can perform complex simulations and data analysis at faster rates, making it possible to process large amounts of data and achieve significant scientific and technological advancements.

Know more about the terascale computing click here:

https://brainly.com/question/30478121

#SPJ11


Please answer as quickly as possible and correctly and I will
give a thumbs up all steps do NOT have to be shown as long as the
final answer is correct, thank you.​​​​​​​
A mechatronic engineer receives royalty payments through a joint consortium of automotive manufacturers for his patent in a safety device. The engineer will be paid $ 100,000 per year for the f

Answers

The mechatronic engineer will receive $100,000 per year in royalty payments from the joint consortium of automotive manufacturers.

The mechatronic engineer receives $100,000 per year as royalty payments for his patent in a safety device through a joint consortium of automotive manufacturers. This means that each year, the engineer will be paid $100,000 for the use of his patent by the automotive manufacturers.

The royalty payments serve as compensation for the engineer's invention, which is being used by the manufacturers to enhance safety in their vehicles.

It's important to note that the question doesn't provide information about the duration of the royalty payments. If the payments are ongoing and continue for multiple years, the engineer can expect to receive $100,000 annually. However, if the payments are for a specific period of time, it would be necessary to know the duration to calculate the total payment.

Overall, the mechatronic engineer will receive $100,000 per year in royalty payments from the joint consortium of automotive manufacturers.

To know more about payments, visit:

https://brainly.com/question/15136793

#SPJ11

Datawriter
Create a File object using "data.txt" as the argument to its constructor. Store the reference to the new File object in a variable of type File.
Will mark brainliest

Answers

Answer:

Explanation:

1.what are the ways on how to maintain you hand tools properly?

2.why is it important to have proper maintenance of hand tools?


3.why do you think 5s is important in the workplace?


help:(

Answers

There are several ways to maintain your hand tools properly. Store them in a safe and organized manner, and regularly inspect them for any damage or wear and tear. Cleaning your hand tools after use helps prevent rust and corrosion, which can lead to deterioration and eventually make them unusable.

Proper maintenance of hand tools is important for several reasons. It prolongs their lifespan and ensures they function properly, which saves you time and money in the long run. Explanation-wise, when hand tools are well-maintained, they are less likely to break or malfunction, which can cause delays or accidents in the workplace. Additionally, having to constantly replace broken or worn-out tools can be costly and time-consuming, so proper maintenance is a smart investment.

5S is important in the workplace for several reasons. It promotes safety, efficiency, and productivity by organizing the workplace and reducing waste. 5S involves five steps: sorting, straightening, shining, standardizing, and sustaining. By sorting through materials and equipment and getting rid of anything that is not necessary, the workplace becomes safer and more efficient. Straightening involves organizing everything in a logical and accessible manner, which makes it easier to find and use tools. Shining refers to keeping everything clean and in good condition, which helps prevent accidents and prolongs the lifespan of equipment.

To know more about inspect visit:-

https://brainly.com/question/30727643

#SPJ11

a character is stored in . group of answer choices three bytes two bytes four bytes one byte

Answers

In computing, a character can be stored in different ways depending on the encoding used. One common encoding is ASCII, where each character is represented by one byte. So, the answer is "one byte".



To understand this, let's break it down. A byte is a unit of data that consists of 8 bits. Each bit can be either 0 or 1, representing binary values. In ASCII, there are 128 characters, including uppercase and lowercase letters, numbers, punctuation marks, and control characters.

Since a byte can represent 256 different values (2^8), ASCII only uses half of those values. This means that each character in ASCII is represented by one byte.

For example, the ASCII value for the letter 'A' is 65, which is represented as 01000001 in binary. Similarly, the ASCII value for the letter 'a' is 97, represented as 01100001.

Therefore, whether it's an uppercase letter, lowercase letter, number, or symbol, a character can be stored in one byte when using ASCII encoding.

In summary, a character is stored in one byte in ASCII encoding.

To know more about encoding visit:

https://brainly.com/question/13963375

#SPJ11

How can a user access the Mailbox Cleanup tools?

Start a new AutoArchive.

Enter the Backstage view.

Left-click the Inbox folder.

Open the Deleted Items folder.

Answers

Answer:

Sorry this isn’t an answer but does anyone know of a quizlet for the Microsoft Office course because I can’t find anything anywhere. Help a fellow student out. I need answers.

Explanation:

Answer: B: enter backstage view

Explanation:

I took the test. Plz mark me brainliest!

Write a program that declares and initializes a variable representing the weight in milligrams from user input. The program displays the equivalent weight in kilograms, grams, and milligrams. For example, 1050042 milligrams are equivalent to 1 kilogram, 50 grams, and 42 milligrams. *Please write in java!* Thanks!

Answers

A Java program that prompts the user to enter the weight in milligrams and then calculates and displays the equivalent weight in kilograms, grams, and milligrams:

import java. util. Scanner;

public class Weight Converter {

   public static void main(String[] args) {

       // Create a scanner object to read user input

       Scanner scanner = new Scanner(System.in);

       

       // Prompt the user to enter the weight in milligrams

       System. out. print("Enter the weight in milligrams: ");

       long milligrams = scanner. next Long();

       

       // Calculate the equivalent weight in kilograms, grams, and milligrams

       long kilograms = milligrams / 1000000;

       long grams = (milligrams % 1000000) / 1000;

       long remaining Milli grams = (milligrams % 1000000) % 1000;

       

       // Display the equivalent weights

       System. out. println("Equivalent weight:");

       System. out. println("Kilograms: " + kilograms);

       System. out. println("Grams: " + grams);

       System. out. println("Milligrams: " + remaining Milligrams);

       

       // Close the scanner

       scanner. close();

   }

}

To run the program, simply compile and execute the Java file. It will prompt you to enter the weight in milligrams, and then it will display the equivalent weight in kilograms, grams, and milligrams.

Learn more about Java program here:

https://brainly.com/question/2266606

#SPJ11

What does CAD stand for?


Communicating Assisted Design

Counting All Dimensions

Computer Aided Design

Computer Assisted Development


helppp pless....!

Answers

Computer Aided Design is the correct answer

Answer:

C. Computer Aided Development

Explanation:

CAD stand for Computer Aided Development


I hope it helps! Have a great day!

Lilac~

What are the 6 exclusive rights of copyright?

Answers

Answer:

1. Right to control the reproduction of the work

2. Right to control the making of derivative works

3. Right to control the distribution of the work

4. Right to control the public performance of the work

5. Right to control the public display of the work

6. Right to perform a sound recording publicly by means of digital audio transmission

Explanation:

which registry hive is used to store global information about apps regardless of the user that is signed in?

Answers

the correct answer is to store global information about apps regardless of the user that is signed in is HKEY_GLOBAL_CONFIG HKEY_CURRENT_USER.

HKEY_CURRENT_CONFIG, sometimes shortened to HKCC, is a registry hive that's a part of the Windows Registry. It doesn't store any information itself but instead acts as a pointer, or a shortcut, to a registry key that keeps the information about the hardware profile currently being used.

to learn about HKEY_GLOBAL_CONFIG HKEY_CURRENT_USER click the link below:

brainly.com/question/15123508\

#SPJ4

Backup tools work with a restore tool. t/f

Answers

True. However, creating backups alone is not enough. In order to restore the original data, a restore tool is required. The restore tool is specifically designed to retrieve the backed-up data and restore it to its original location or device.

Backup tools are used to create copies of important data or files as a precautionary measure in case the original data is lost or damaged. These backups are usually stored in a different location or device. However, if the need arises to restore the original data, a restore tool is required. The restore tool is specifically designed to retrieve the backed-up data and restore it to its original location or device.

Yes, backup tools work with a restore tool. In fact, backup and restore tools are two sides of the same coin. Backup tools are used to create backups of important data or files. These backups can be stored in a variety of locations, such as external hard drives, cloud storage, or network storage devices. The purpose of these backups is to ensure that if the original data is lost or damaged, there is a copy available that can be used to restore it. This is done by accessing the backup file and extracting the data from it. The restore tool then transfers this data back to the original location or device, effectively restoring the data to its previous state.


To know more about backups visit:

https://brainly.com/question/6847516

#SPJ11


which cables are immune to electromagnetic interference

Answers

Answer:

Fibre optic cables are non-metallic... they transmit signals using pulses of light in glass threads! As a result, they are immune to Electro-Magnetic Interference and Radio Frequency Interferenc

you have installed an 802.11ac wireless access point for a company. to cut costs, the company wanted only one central access point in the building, which is about 150 feet long. users at both ends of the building report intermittent wireless connectivity drops and slow access. what is most likely the cause of the problem?

Answers

Low radio frequency signal is the cause of the problem. Keep the only one central access point in the building it makes your connection slower because there is much of the computer connect but the signal that is provided is less.

Radio frequency (RF) refers to a measurement showing the oscillation rate of electromagnetic radiation spectrum, or electromagnetic radio waves, from frequencies ranging from 300 gigahertz (GHz) to as low as 9 kilohertz (kHz). RF is used in many kind of electronics and appliances, which consist radio and television broadcasting, cellular telephones, satellite communications, microwave ovens, radars, and industrial heaters and sealers.

Learn more about radio frequency, here https://brainly.com/question/14400059

#SPJ4

Julie scrolls through her social media feed and it seems like everyone's life
is so exciting when hers is so ... boring! She starts to feel bad about herself.
What should Julie be paying attention to right now?
A- Oversharing
B- Red flag feeling
C- Miscalculation

Answers

Answer:

b

Explanation:

and julie needs to geta life

What are the 3 P's of Storytelling? (select 3 answers)
Pantomime
Place
Predicament (Problem)
Percentage
People

Answers

I think it would be
People, place, and predicament
Those make the most sense

3 things in terms of photography to learn about.

Answers

The three important principle in photography are;

Light Subject and Composition.

What is the explanation for these terms?

Photography is about light. Without it, you couldn't even take images, let alone excellent ones.

The quality of light varies from one to photograph, yet it is always what gives your photographs their underlying structure. It doesn't get any more basic than that.

Most of us snap photos because something catches our attention.

Unsurprisingly, that "something" is your subject.

If you're explaining a photograph to someone else, the topic is most likely the first thing you'll mention.

Finally, the composition is the third and most important aspect of every shot.

Simply said, composition is the arrangement of the things in your shot. It includes your camera position, the connections between photo elements, and the things you accentuate, deemphasize, or altogether eliminate. Composition is the method through which you communicate your tale.

Learn more about photography:
https://brainly.com/question/30685203
#SPJ1

When might it be preferable to use a fixed-point representation of real numbers over floating-point? When might it be preferable to use a floating-point representation of real numbers over fixed point?

Answers

Fixed-point representation of real numbers may be preferable when precision is a priority, and the range of values is limited. Floating-point representation is preferred when a wider range of values and dynamic range is required, and precision can be sacrificed to some extent.

Fixed-point representation is suitable when precision is crucial and the range of values is relatively small. Fixed-point numbers have a fixed number of decimal places, allowing for precise calculations within a specific range. They are commonly used in applications where fractional values are not required or can be approximated. For example, in embedded systems with limited resources or when dealing with financial calculations, fixed-point representation can be more efficient in terms of memory usage and computational complexity.
On the other hand, floating-point representation is preferable when a wider range of values and dynamic range is necessary. Floating-point numbers allow for representation of both very small and very large numbers with varying levels of precision. They are commonly used in scientific computations, simulations, and graphics processing, where a wide range of values is encountered. Floating-point representation uses a sign bit, an exponent, and a fraction to represent numbers, providing flexibility in representing both large and small magnitudes.
In summary, fixed-point representation is advantageous when precision is paramount, and the range of values is limited, while floating-point representation is favored when a broader range of values and dynamic range is required, even at the expense of some precision.

learn more about Floating-point representation here

https://brainly.com/question/30591846



#SPJ11

what type of software is used to keep the core system running?

Answers

Depending on the particular operating system being used, several kinds of software are required to maintain the core system.

The kernel, for instance, is the central element in the Windows operating system that controls system resources and offers fundamental services to other software that is executing on the system. The kernel is a crucial part of the Linux operating system, but because it is open-source, users and developers can alter and expand it. The core system needs the kernel in addition to other crucial software parts including device drivers, system services, and system libraries. These parts offer vital features like managing hardware devices, interacting with other software, and offering security and authentication services. The core system that runs on a computer or device is ultimately made up of the kernel and these crucial software parts.

learn more about Operating system here:

brainly.com/question/24760752

#SPJ4

Does white space have visual weight? Yes or No

Answers

Answer:

no. (more info below)

Explanation:

white space appears to have no visual weight because it's seen as empty. Every body put in the room will appear to be heavier because of the volume surrounding it.

hope this helped!

Answer:

no

Explanation:

it's because it appears to be empty.

What is the importance of effectiveness in communication?
Minimum 2 paragraphs. Be very detailed and support your reasons.

Answers

Answer:

When communication is effective, it leaves all parties involved satisfied and feeling accomplished. By delivering messages clearly, there is no room for misunderstanding or alteration of messages, which decreases the potential for conflict.

Explanation:

what happens if an nfl game is cancelled due to weather

Answers

Answer:

the NFL generally plays through even the coldest and most precipitous of weather unless the weather makes the stadium unusable or it becomes unsafe for spectators to attend the match.

Explanation:

but if a game DOES get cancelled, it will most likely be scheduled for a later time.

what are some challenges that existing data centers face as they move toward supporting cloud computing? group of answer choices increased it labor costs to manager the cloud environment. greater energy consumption for the same load of applications.

Answers

As long as you have internet connectivity, cloud computing enables you to access resources, data, services, and applications from anywhere.

What is cloud computing?

Simply described, cloud computing is the distribution of computing services over the Internet ("the cloud"), including servers, storage, databases, networking, software, analytics, and intelligence, in order to provide speedier innovation, adaptable resources, and scale economies.

Here are the main challenges facing cloud computing, in brief:

concerns with cyber security.

cost containment and management.lacking in resources or knowledge.Governance/Control.Compliance.managing several clouds.Performance.creating a private cloud.

Here, there are a number of important difficulties that need to be addressed, including lengthy troubleshooting, application unavailability, migration agents, and cutover complexity.

As long as you have internet connectivity, cloud computing enables you to access resources, data, services, and applications from anywhere. Some tools and strategies will enable you to access information even if you are not connected to the internet.

To learn more about cloud computing refer to:

https://brainly.com/question/19057393

#SPJ4

What type of reaction most likely occurs to form polymers when monomers contain carbon-carbon double or triple bonds?oxidation-reductioncondensationdehydrationaddition

Answers

When monomers contain carbon-carbon double or triple bonds, the most likely reaction to occur to form polymers is the addition reaction. This is because in an addition reaction, the monomers are added to each other in a way that allows the carbon-carbon double or triple bonds to break and form new single bonds.

This results in the formation of a polymer, which is a large molecule made up of repeating units of monomers.The addition reaction is also known as a polymerization reaction. In this type of reaction, the monomers are activated in the presence of a catalyst or heat, which allows them to undergo a reaction with each other. The result is the formation of a polymer chain that is made up of repeating units of monomers.

Polymers are widely used in many different applications, from plastics and synthetic fibers to adhesives and coatings. The properties of a polymer depend on the type of monomers used, as well as the conditions under which the polymerization reaction occurs. By controlling these factors, scientists can create polymers with a wide range of properties, such as strength, flexibility, and resistance to heat and chemicals.

In conclusion, when monomers contain carbon-carbon double or triple bonds, the most likely reaction to occur to form polymers is the addition reaction. This type of reaction allows the monomers to add to each other and form a polymer chain, which is a large molecule made up of repeating units of monomers. Polymers have many important applications and can be tailored to have a wide range of properties by controlling the conditions of the polymerization reaction.

Learn more about monomers here:

https://brainly.com/question/17956024

#SPJ11

what is the first step an original classification authority (oca) must take when originally classifying information?

Answers

The first step that an Original Classification Authority (OCA) must take when originally classifying information is to determine whether the information meets the criteria for classification as specified in Executive Order 13526.

The OCA must ensure that the information falls within one or more of the categories of information that are eligible for classification, such as national security, foreign relations, or intelligence activities. They must also determine the level of classification that is appropriate for the information, based on the potential damage to national security that could result from its unauthorized disclosure.

Once these determinations have been made, the OCA can apply the appropriate classification markings to the information and control its dissemination accordingly.

Learn more about OCA here:

https://brainly.com/question/31274721

#SPJ11

Write a program that has a function prototype before main and an implementation of the function after main. The function to be implemented is a coin toss simulation using the random number generator. The function should return 1 or true 50% of the time and 0 or false 50% of the time. Use srand and the system time to make the program run differently each time. (srand(time(NULL));). Keep track of the number of head and tails for 10, 100, 1000, 10,000, 100,000 and 1,000,000 trials. Output the number of heads and tails and number of each as a percentage of the total.

Answers

The program includes a coin toss simulation function with a 50% probability of returning 1 or true and 0 or false, and it tracks the number of heads and tails for different trial sizes, outputting the counts and percentages.

How does the program simulate a coin toss and track the number of heads and tails for different trial sizes?

The program begins by declaring a function prototype before the main function. This prototype provides information about the function's name, return type, and parameters. In this case, the function prototype specifies that the coin toss simulation function will return a boolean value.

After the main function, the coin toss simulation function is implemented. It utilizes the random number generator to simulate a coin toss. By using the srand function along with the system time, the program ensures that each run produces different random numbers. This adds an element of unpredictability to the simulation.

The coin toss simulation function returns 1 or true with a 50% probability, indicating a "head," and returns 0 or false with a 50% probability, representing a "tail."

The program then proceeds to keep track of the number of heads and tails for various trial sizes: 10, 100, 1000, 10,000, 100,000, and 1,000,000 trials. It calculates the count and percentage of heads and tails for each trial size and outputs the results.

By running the program multiple times, different outcomes are generated due to the random nature of the coin toss simulation. This allows for a statistical analysis of the distribution of heads and tails in each trial size.

Learn more about program

brainly.com/question/29491302

#SPJ11

smart tv has _____ intergrated with it

Answers

Answer:

an operating system

Explanation:

Other Questions
U.S. HISTORY help please :) the recipients of 1-2 chronicles were living under ________ domination and were without a davidic king. Describe one cause of the Crimean War (18531856). Find the Sine of angle A8/178/1515/815/17 identify the global societal issue you have chosen to research for your final paper, an argumentative essay, and explain why further research on this topic is important. provide a clear and concise thesis statement that includes a solution to the global societal issue (see writing a thesis statement (links to an external site.) for assistance). explain how this global societal issue impacts a specific population. locate a peer-reviewed scholarly source and provide statistical data that you found surprising on the topic. PLEASE HELP!! In the space provided below, please respond to the following: Create a list of business risks and ways to deal with them.This project will focus on writing about a current event in business risks. The task is to first find an article that deals with business risks and write a summary of the article. In your summary, you should discuss what the risk is and what steps the business is taking to deal with it. During this project, you'll accomplish the following:ObjectivesFind an article that deals with business risks and write a summary of the article.Current EventUse the Internet to find an article that deals with business risks. Once you have found and read your article, record your summary and upload it. Use the following format.Paragraph #1 - Summary of article including the linkParagraph #2 - How it relates to entrepreneurshipParagraph #3 - Your opinion of whether or not you think the appropriate steps are being taken to deal with the risk If f(x) = x^2 and g(x)=3x+1 which expression represents f(g(x))? HELP ASAP, HAVING A UNIT TEST BEING TIMEDRead the passage from Chief Joseph.For a short time we lived quietly. But this could not last. White men had found gold in the mountains . . . . They stole a great many horses from us . . . . The white men told lies for each other. They drove off a great many of our cattle. Some white men branded our young cattle so they could claim them. We had no friends who would plead our cause before the law councils. . . . I labored hard to avoid trouble and bloodshed. We gave up some of our country to the white men, thinking that then we could have peace. We were mistaken.Chief Joseph,Nez PerceWhich statement best sums up Chief Josephs point of view?OThe arrival of settlers meant his people could live in peace.OIt is wrong to steal horses or to brand cattle that are young.OThe Nez Perces learned a great deal from the newcomers.OIt was a mistake to welcome the Americans to Nez Perce land. I WILL MARK BRAINLIEST J PLS ANSWERIan is an airline attendant. Last week, he worked on flights on 5 small jets and 4 large jets, which could seat a total of 550 passengers. The week before, he was assigned to flights on 4 small jets and 2 large jets, which could seat a total of 326 passengers. How many seats were on each type of flight?The flights on small jets each had (blank ) seats, and the flights on large jets each had (blank ) seats. Which type of AI technology is used to program self-driving cars? In the final stage of the control process, managers can choose between three possible courses of action: do nothing, correct actual performance, or revise the standard.truefalse Find the gradient of the line segment between the points (4,-6) and (-6,-16). Which of the following statement(s) correctly describes aggregate planning?A. Aggregate planning seeks to meet short-term customer demand by hiring andfiring workers as needed. a team member suggests the use of a task board for keeping track of progress. the project manager agrees and implements which components to track work? Which formula would be used to find the measure of angle 1? one-half(a b). one-half(a "" c). one-half(b c). one-half(a "" b). Analyze the photo below and answer the question that follows. A coastline with mountains covered with green foliage. Image by Chuck Andolino This photo above shows a type of coastal climate zone. This zone, a __________ zone, experiences mild winters and dry, sunny summers. A. tundra B. tropical savanna C. steppe D. Mediterranean antispasmodics decrease urinary incontinence related to an overactive (neurogenic) bladder by what mechanism of action? This graph shows fuel consumption for a car during a test run three of the statements are true which is not thank you Which of the principles listed below for constructing effective sentences does the following passage violate? The site marks the beginning of a first-year riparian forest buffer. Monitoring equipment was located essentially where this stream joined Cook Creek at the end of the forest riparian buffer. Monitoring data indicated improved water quality within the tributary. It is our opinion that this could be the result of the riparian forest buffer being created. Avoid euphemisms. Avoid unnecessarily fancy words. Avoid wordy phrases and filler. Avoid sexist language. What is the smallest country in the world? How small is it? Where is it located? Whats the population? Whats the capital? What their religion? Whats their currency? Whats their language?