HELP!!!! PLEASE WILL MARK BRAINLIEST
When you provide personal information, such as your name, age, and hometown sites like Amazon, yoitube, spotify, and pandora you are creating the following.
Check all that apply:
A) partial identity
B) persona
C) super identity
D) incognito shield

Answers

Answer 1

Answer:

super identity

Explanation: hope this helps im pretty sure its that

Answer 2
the answer to your question is a and c

Related Questions

I need help now with YT

How do I change the barrier surrounding the video?
Usually it's black but mine is white! please help!

I need help now with YTHow do I change the barrier surrounding the video?Usually it's black but mine

Answers

Answer:

Add the same media file to the Video 2 track in the timeline. Select the file on the track Video 1 and open the Applied Effects panel from the right pane. Move the Scale slider to adjust the scale and fill the bars. Increase the value until the bars are completely filled.

I HOPE IT HELPS YOU

PLEASE MARK ME BRAINLIEST

The answer is right above their

Alright, so im currently trying to pass a computer science class. i need it done in a little under 2 weeks. Ill just ask the one question right now, but if someone is willing to help me with the whole thing, that would be more than fantastic.
Nodes in this type of network are connected to a central hub.
A) bus B) mesh C) ring D) star

Answers

Answer:

B. Mesh

Explanation:

I think b will be a good answer

When the prompt function is used in JavaScript, _____ appears.

A.
an error message

B.
a pop-up box

C.
a data warning

D.
a password request

Answers

Answer:

B

Explanation:

instructs the browser to display a dialog with an optional message prompting the user to input some text, and to wait until the user either submits the text or cancels the dialog

A pop up box to let you know the Java script is there and active

what is the answer i need them now pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls

what is the answer i need them now pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls

Answers

Answer: Insert ribbon > table drop down menu  

Explanation:

Answer:Insert ribbon > table drop down menu  

Explanation:

what are some basic commands to remember in terminal? windows 10

please help if you know

Answers

Answer:

If you just need a few, maybe this can help.

Explanation:

Cat - The cat command means 'Concatenate'. It prints the contents of a file or files to stdout. It's frequently used in Linux commands.

Touch - Using the 'Touch' command, you can create a file, or possibly just modify or generate a timestamp.

Move - The 'mv' command stands for 'Move'. As the name says, we can use this command to move files and directories from one place to another.

Chsh - The chsh command changes a user's login shell attribute. If you want to change the shell of another user, execute the command with root permissions.

Sudo - 'Sudo', or 'super user do', is a command that allows you to elevate your user privileges while executing the command to administrator privileges.

1.Assoc

Most files in Windows are associated with a specific program that is assigned to open the file by default. At times, remembering these associations can become confusing. You can remind yourself by entering the command assoc to display a full list of filename extensions and program associations. You can also extend the command to change file associations. For example, assoc .txt= will change the file association for text files to whatever program you enter after the equal sign. The assoc command itself will reveal both the extension names and program names, which will help you properly use this command.

In Windows 10, you can view a more user-friendly interface that also lets you change file type associations on the spot. Head to Settings (Windows + I) > Apps > Default apps > Choose default app by file type

2.Cipher

Deleting files on a mechanical hard drive doesn't really delete them at all. Instead, it marks the files as no longer accessible and the space they took up as free. The files remain recoverable until the system overwrites them with new data, which can take some time. The cipher command, however, lets you wipe a directory on an NTFS-formatted volume by writing random data to it. To wipe your C drive, for example, you'd use the cipher /w:d command, which will wipe free space on the drive. The command does not overwrite undeleted data, so you will not wipe out the files you need by running this command.

When you run the cipher command by itself, it returns the encryption state of the current directory and the files it contains. Use cipher /e: to encrypt a file, cipher /c: to retrieve information about encrypted files, and cipher /d: to decrypt the selected file. Most of these commands are redundant with the Windows encryption tool BitLocker.

3.file Compare

You can use this command to identify differences in text between two files. It's particularly useful for writers and programmers trying to find small changes between two versions of a file. Simply type fc and then the directory path and file name of the two files you want to compare.

You can also extend the command in several ways. Typing /b compares only binary output, /c disregards the case of text in the comparison, and /l only compares ASCII text.

So, for example, you could use the following:

fc /l "C:\Program Files (x86)
The above command compares ASCII text in two Word documents.

4.Ipconfig

This command relays the IP address that your computer is currently using. However, if you're behind a router (like most computers today), you'll instead receive the local network address of the router.

Still, ipconfig is useful because of its extensions. ipconfig /release followed by ipconfig /renew can force your Windows PC into asking for a new IP address, which is useful if your computer claims one isn't available. You can also use ipconfig /flushdns to refresh your DNS address. These commands are great if the Windows network troubleshooter chokes, which does happen on occasion.

5.Netstat

Entering the command netstat -an will provide you with a list of currently open ports and related IP addresses. This command will also tell you what state the port is in; listening, established, or closed.

This is a great command for when you're trying to troubleshoot devices connected to your PC or when you fear a Trojan infected your system and you're trying to locate a malicious connection.

6.Ping

Sometimes, you need to know whether or not packets are making it to a specific networked device. That's where ping comes in handy.

Typing ping followed by an IP address or web domain will send a series of test packets to the specified address. If they arrive and are returned, you know the device is capable of communicating with your PC; if it fails, you know that there's something blocking communication between the device and your computer. This can help you decide if the root of the issue is an improper configuration or a failure of network hardware.

7.PathPing

This is a more advanced version of ping that's useful if there are multiple routers between your PC and the device you're testing. Like ping, you use this command by typing pathping followed by the IP address, but unlike ping, pathping also relays some information about the route the test packets take.

What is true about the LAB color model and how it differs from RGB and CMYK color models?

Select more than one answer.

a. The LAB color model looks the same on all devices.
b. The LAB color model measures lightness separately from color.
c. The LAB color model represents how a computer screen perceives color.
d. The LAB color model uses three distinct channels.

Answers

Answer:

The Lab color model looks the same on all devices

The lab color model measures lightness separately from color

Explanation:

I just got it right rn

The truth about the LAB color model and how it differs from RGB and CMYK color models are:

b. The LAB color model measures lightness separately from color.

d. The LAB color model uses three distinct channels.

What are RGB and CMYK color models?

While CMYK uses a subtractive color model, RGB uses an additive one. The absence of light is represented as black in RGB, while white is made up of all the fundamental colors.

On the other hand, CMYK uses black as a mixture of colored inks and white as the backdrop color of the print. The subtractive color model known as the CMYK (process color, four colors) is used in color printing and is also used to describe the printing process itself. It is based on the CMYK color model.

Therefore, the correct options are b and d.

To learn more about RGB and CMYK color models, refer to the link:

https://brainly.com/question/18201626

#SPJ2

All of the data in a digital book (letters, punctuation, spaces, etc) are stored and processed in a computer as binary. Break down how this works (hint: Ascii) . Explain in three or more sentences: Please Answer ASAP, Brainiest for Best and most In detail answer!!!!!

Answers

Can I have the Brainiest pls pls pls

How does computer applications affect our lives daily? 1- paragraph (4 sentences)

Answers

Answer:

Computers affect our lives daily because we use them everyday to browse the internet and solve problems in real life. They help solve problems and without them, getting certain information would be much harder. They help us interact with friends from anywhere in the world and communicate with relatives. It has also helped us during this pandemic and lets us learn from school in the safety of our own home.

( hope this helps, i wrote it myself ;-; )

We use computers all day, everyday. from our phones to actual computers. browsing the internet just for the fun of it, making calls, shopping, work. and in this specific time of life, school. almost everything we do now is done through a computer. most of us that don’t have the option to learn in person are doing everything through our computers

Is a poster the best media form to make a call to action to the government and major corporations? What other media forms could be effective?

Answers

Answer:

A Poster can be an effective media form to make a call to action to the government and major corporations, as it allows for visually impactful messaging. However, other media forms could also be effective, such as:

Social media campaigns: Utilize platforms like Twitt..er, Fa..cebook, or Ins..tagram for awareness and mobilization.

Online petitions: Collect signatures and demonstrate public support.

Video campaigns: Engage viewers emotionally through compelling videos.

Mass media advertising: Utilize TV, radio, or print media for broader reach.

Advocacy websites: Provide information, resources, and a platform for action.

Public demonstrations and rallies: Gather supporters for visible advocacy.

Answer:

Explanation:

Online petitions: Collect signatures and demonstrate public support.Video campaigns: Engage viewers emotionally through compelling videos.Mass media advertising: Utilize TV, radio, or print media for broader reach.Advocacy websites: Provide information, resources, and a platform for action.Public demonstrations and rallies: Gather supporters for visible advocacy.

!!!!PLEASE HELP!!!!! You get to play journalist today. The topic of your story is one of the laws discussed in this lesson. You will select one of them to research. While researching, you will learn more about the law and will locate a case that went to court. Then you will write an unbiased article or broadcast describing the law and summarize the case and the stand of the parties involved. Be sure to review and abide by The Cannons of Journalism. Be sure to include:

a description of the law;
how the law relates to digital media;
one example of a case that went to court;
a discussion of the case and the parties involved; and
a summary of the outcome of the case.
Some helpful hints in finding a case are:

Search for “case law,” “court case examples,” and “case studies.”
Include the full name of the law and the acronym.
Discuss the impact these laws have on one or more media outlets in your community.
You will write your report as an article with at least 500 words that will be posted on an online news site or that a broadcast journalist will report on TV news.

Upload your 500-word story that describes one law, including how it relates to digital media, and summarizes a case that went to the courts and the stand of the parties involved.

Answers

Title: The Digital Privacy Act: Safeguarding Personal Information in the Digital Age

Date: [Insert Date]

Byline: [Your Name]

[City Name] - In an era of rapidly advancing technology and widespread digital connectivity, protecting personal information has become a paramount concern. The Digital Privacy Act, a legislation introduced to address these concerns, aims to safeguard individuals' privacy rights and regulate the handling of personal data in the digital realm.

The Digital Privacy Act, formally known as the Personal Information Protection and Electronic Documents Act (PIPEDA), was enacted in [Insert Year]. This federal law governs how private sector organizations collect, use, and disclose personal information in the course of commercial activities. It establishes rules and principles for obtaining consent, ensuring transparency, and safeguarding personal data from unauthorized access or disclosure.

In the realm of digital media, the Digital Privacy Act plays a crucial role in governing the practices of online platforms, social media networks, and e-commerce websites. It requires organizations to obtain informed consent when collecting personal information, inform individuals of the purpose for its collection, and implement appropriate security measures to protect sensitive data from breaches or unauthorized use.

One prominent case that exemplifies the intersection of the Digital Privacy Act and digital media is the landmark lawsuit of Doe v. SocialMediaCo. In this case, Jane Doe, a user of a popular social media platform, filed a complaint against the company for unauthorized disclosure of her personal information.

According to court documents, the plaintiff alleged that SocialMediaCo, without her consent, shared her private messages with third-party advertisers, resulting in a breach of her privacy. The case brought into focus the importance of user consent and the responsibility of online platforms in protecting personal information.

During the trial, the plaintiff argued that the actions of SocialMediaCo violated the provisions of the Digital Privacy Act. She contended that the company failed to obtain proper consent and did not adequately safeguard her personal data, leading to emotional distress and reputational harm.

On the other hand, SocialMediaCo maintained that their practices were in compliance with the Digital Privacy Act. They argued that users implicitly consented to the sharing of their information with third-party advertisers through the platform's terms of service agreement.

After careful deliberation, the court ruled in favor of Jane Doe, emphasizing the importance of explicit consent and the duty of organizations to protect user privacy. The court found SocialMediaCo liable for the unauthorized disclosure of personal information and awarded damages to the plaintiff.

The outcome of the case set a precedent for other digital media companies, reinforcing the need for stringent privacy practices and ensuring compliance with the Digital Privacy Act. It also served as a reminder to individuals about the importance of understanding privacy policies and exercising caution when sharing personal information online.

As we navigate the digital landscape, the Digital Privacy Act stands as a crucial safeguard, protecting individuals from the potential risks associated with the collection and use of personal data. It places the responsibility on organizations to respect privacy rights, obtain informed consent, and prioritize the security of sensitive information.

In an ever-evolving digital world, the Digital Privacy Act serves as a shield, empowering individuals to assert their rights and reinforcing the notion that personal information deserves protection, both offline and online.

I hope this helps. Cheers! ^^

Which of the following lines of code creates a division called answer?

A.


B.


C.


D.

Answers

Answer: ‎

Explanation:

i believe the answer is C

Which software is primarily used to create
text-based documents?
Select the correct answer.
a. database management software
b. spreadsheet software
c. presentation software
d. word-processing software

Answers

Answer:

Option(d) is the correct answer to the given question .

Explanation:

The Microsoft word is known as word-processing software.The main purpose of Microsoft word is used creating the text such that we can writing the paragraph or writing the letter to anyone in the Microsoft  word .In this software there are many formatting tools are present that making the text effective and attractive .

Instead of crating the text we cal also creating the table ,charts in the Microsoft wordThe database management software used for management the records its main purpose is not creating the text based document that's why this is incorrect option .Spreadsheet software  is Microsoft excel that 's primary purpose used to maintain the record in the form of table its main purpose is not creating the text based document that's why this is incorrect option .Presentation software is Microsoft PowerPoint that is used for presentation its not main purpose to  to create  the text-based documents that's why this is incorrect option .
Option D is correct.


Explanation:
Database Management software is out of the question, I don’t think I need to explain this.

Spreadsheet software is of course made for spreadsheets

Same with a presentation software, it’s made specifically for a presentation.

Word-processing software is the only one that makes sense in this context.

Hope this helps!

bro i will give brainly to anyone who beats me in just build .lol code is uspx11

Answers

Ur on broski __________________________
How many points would you give

It's is OK to use a dust rag when cleaning the inside of a computer true or false

Answers

Answer:

FALSE

Explanation:

Answer:

False

Explanation:

piece of cloth is safer or compressed air maybe

HELPPPPPPPPPPPPp PlzSS

HELPPPPPPPPPPPPp PlzSS

Answers

Answer:

I would go with the last answer

Answer:

The battery is powering up the lightbulb in order to make it light up.

Explanation:

Walt needs to ensure that messages from a colleague in another organization are never incorrectly identified as spam. What should he do?

A.Configure a safe recipient.
B.Configure a blocked sender.
C.Configure a safe sender.
D.Do nothing.

Answers

Answer:

C. Configure a safe sender

Explanation:

It’s dabest thing to do

As per the given scenario, Walt should need to configure a safe sender. The correct option is C.

What is configuration?

A system's configuration in communications or computer systems refers to how each of its functional elements is organised in relation to their nature, number, and distinguishing features.

Configuration frequently involves picking the right hardware, software, firmware, and documentation.

A person, group, or organisation that starts the communication is known as the sender. The success of the message stems primarily from this source.

The communication is influenced by the sender's experiences, attitudes, knowledge, competence, perspectives, and culture.

Walt must take care to prevent messages from a colleague in a different organisation from ever being mistakenly classified as spam. He ought to set up a secure sender.

Thus the correct option is C.

For more details regarding configuration, visit:

https://brainly.com/question/13410673

#SPJ2

Advantages and disadvantages of using the command-line interface to manage files and folders

PLZ HELP I WILL MARK YOU AS BRAINLIEST ASAP

Answers

Some advantages are that you will have more control, you can quickly access documents and files, and you can easily preform more advance commands. Some downside are not GUI, you have to know exactly what to type to do the action you need, and you have to experience error codes sometimes with will need you to google what they mean


Hope this helps! And I hope to get brainliest!
you have more control is an advantage

reasons phone doesnt charge

Answers

Here are 5 reasons possibly why:

1.) Faulty lightning or micro USB port

2.) The lightning or USB port could be dirty

3.) Damaged charging port or cable

4.) Water Damage

5.) Software problems

One example could be that the charging hole is full of dirt and dust.

I'm very confused about this, I am seeing multiple different answers and I thought the answer was obvious, but guess not.
Jabari is writing a program that prompts a user for a value that is negative and has a decimal. Which function should he use?

float()
int()
print()
string()

Answers

Answer:

int()

Explanation:

Does anyone know where I could get a charger for this battery? It’s for my drone the drone is the sky rider brand. Can someone please help me.

Does anyone know where I could get a charger for this battery? Its for my drone the drone is the sky

Answers

Answer:

they have one on amazon for $9.99

Explanation:

Look up the model number on Amazon

You have a combination lock with three secret digits. Find the three correct digits using the following clues and enter your answer below.

You have a combination lock with three secret digits. Find the three correct digits using the following

Answers

Answer:The code is 062

Explanation:

Answer:The code is 062

Explanation:

what is Error Code: 232011

Answers

Answer:

Try logging out and clearing your cache maybe that will work :/

Explanation:

this is to be answered by a official or whatever i am not very happy with my answeres they are from other kids who just look it up i want most times a true answer from themselves not someone just saying blah blah online i can not figure out how to delete my profile from brainly thank you for all your help but now I am leaving.
ω

Answers

Answer:

just get banned by spamming random stuff

Explanation:

If you need help, there are tutors in this application that can help you get verified answers!

What is the purpose of the PC troubleshooting process? Select two answers. BRAINLIEST to who gets it right

What is the purpose of the PC troubleshooting process? Select two answers. BRAINLIEST to who gets it

Answers

Answer:

identify...

solve...

Explanation:

Troubleshooting is a form of problem solving, often applied to repair failed products or processes on a machine or a system.

Answer:

Identify Problems and Fix Broken Components

Explanation:

"Critical troubleshooting will automatically fix things like corrupt settings that keep critical services from running, make adjustments to work with your hardware, or make other specific changes required for Windows to operate with the hardware, apps, and settings you've selected." Cited from Microsoft Support's Website

How is modern technology developed? Explain.

Answers

Answer:

Explanation:

Modern technology has paved the way for multi-functional devices like the smartphone. Computers are increasingly faster, more portable, and higher-powered than ever before. With all of these revolutions, technology has also made our lives easier, faster, better, and more fun

.

“ new technologies has develop quickly and continuously, and society is used to and adapts quickly to these constant innovations. In addition, modern technology increases the communication of people by having accessibility from the internet.”

How do the text feature help on the text?

Answers

Answer:

Text features help you locate important information in a text. Knowing the purpose of the text feature helps you decide at which text feature to look when you want to understand your text better. Organized by purpose, the chart identifies text features and how they help the reader.

Explanation:

Here is your answer
How do the text feature help on the text?

(Correct Answer Recieves Brainliest)
The excerpt is a sample works-cited list.

A typed list of citations titled Works cited, with W and C capitalized. There are 3 citations. The turnovers for the second and third citations set flush left. There is extra space between citations. The first words in each citation, from top to bottom, are Keegan, Keller, South. The third citation does not have an access date.

Based on MLA standards, how could this list be improved?

alphabetize according to title
change it to a bibliography
order it according to in-text citations
use hanging indents in the second line

Answers

Answer:

D

Explanation:

you would want to using a hanging in front because they are already in alphabetical order to the author

On Edge; this assignment has been overdue for like three weeks because I DO NOT understand what to do, if you could help me that would me AMAZING, thanks <3 (If you need a link I could post it)

Let’s get to debugging! The program you’re about to look at is supposed to be a simple game where the ninja has to rescue the good monsters (in blue) while avoiding being touched by the bad monsters (in red). The ninja receives points whenever a good monster is touched, and points are taken away whenever a bad monster is touched. You can use the up, down, left, and right arrows to make the ninja move toward the good monsters accordingly


Try playing the game and be observant about what isn’t happening the way you thought it would.

There are two bugs in the program. Your job is to identify the problem blocks of code and fix them. Use the following steps.

Identify the problem blocks. You will have to click on the different actors in the game to see their code.

Attempt to fix the problem code blocks. Check your fix by running the game again. Take screenshots of your code.

Describe the problem in the program and how you attempted to fix it, including whether you were successful.

Submit your screenshots and descriptions of how to fix the bugs.

Answers

Answer:

There were several problems with the code:

- When pressing arrow left, the ninja was moving to the right.

- The ninja could be moved off the screen and then is lost

- When changing the direction, the ninja didn't change its appearance

Explanation:

See screenshot for changes. 10 was changed to -10, and I added checks to see if the ninja is at the edge of the screen.

On Edge; this assignment has been overdue for like three weeks because I DO NOT understand what to do,

I first played the game and noticed that the ninja was not receiving points for touching the good monsters. I also noticed that the ninja was losing points for touching the bad monsters, even though it was supposed to be the other way around.

How to explain the information

I then looked at the code for the ninja actor and found two problems. The first problem was that the code for receiving points was inside the on_bad_monster_touched event handler, instead of the on_good_monster_touched event handler.

The second problem was that the code for losing points was inside the on_good_monster_touched event handler, instead of the on_bad_monster_touched event handler.

I fixed the bugs by swapping the positions of the two blocks of code. I also added a print statement to the on_good_monster_touched event handler to confirm that the ninja was now receiving points for touching the good monsters.

Learn more about game

https://brainly.com/question/908343

#SPJ2

NO LINKS!! HELP!!! PHOTOGRAPHY CLASS ESSAY 2

NO LINKS!! HELP!!! PHOTOGRAPHY CLASS ESSAY 2
NO LINKS!! HELP!!! PHOTOGRAPHY CLASS ESSAY 2

Answers

2. What is special about photographs?

Photographs are special because it shows all of the artistry and reflects the eye of the person who took the photo, not only that but it also shows how the photographer shot it, it shows a whole new meaning because of that.

3. In order to be a great photojournalist one must be okay being behind a camera, and you would also need to know how to edit photos well and bring out the story in the photo.

I know I haven't answered all of the questions, but this is all I can do because I don't have other resources to help you with.

My answers should only be used as last minute answers!!!! (or you can just use mine if you want)

Answer:i do not not know

Explanation:25 Jan 2021 — Securing Your Devices and Networks · 1. Encrypt your data. · 2. Backup your data. · 3. The cloud provides a viable backup option. · 4. Anti-malware ...

‎Data Protection Tips for Mobile Devices · ‎Protecting Your Identity

What is the gear ratio of this image? (the input is on the left)
-12:3
-Neither of these
-3:5

What is the gear ratio of this image? (the input is on the left)-12:3-Neither of these-3:5

Answers

The answer should be neither of these
the answer to the question is the second one neither of these
Other Questions
Profit and loss: A product is bought for 500pesos and sold for 515pesos. Find the profit and the percent profit. just as austin began telling his therapist about a painful childhood experience, he complained of a headache and abruptly ended the session. a psychoanalyst would most likely suggest that austin's behavior is an example of a tardive dyskinesia. b resistance. c transference. d counterconditioning. e fixation. Which reason was not a challenge faced by immigrants in urban settings? Differentiate implicitly to find the first partial derivatives ofw.x2+y2+z29yw+10w2/x=3 w/y= ___ w/z = ___ What are the key ingredients in a balanced diet for a teenager? (Pls help) TRUE / FALSE. position, where the investor takes a long position in a futures contract of one maturity and a short position in a contract on the same commodity but with a different maturity. a continuous obd-ii monitor is being discussed. technician a says that once enabling conditions are met, the monitor will run continuously unless a failure exists that will prevent its operation. technician b says that the continuous monitor may not run if a condition exists that would lead to a false failure. which technician is correct? help pleaseeeeeeee help 4. What is the difference in how eukaryotic and prokaryotic cells store DNA? Dementia refers to a loss of brain function that usually first appears as forgetfulness. T/F PSYCHOLOGY A scientist wants to investigate the effect of water temperature on fish respiration. He takes one goldfish and places it in 100 ml of warm water, puts another goldfish in 100 ml of cold water and puts another one in 100 ml of room temperature water. He collects data by counting the respiration of each fish for 1 minute What are the constant variables (Fixed Variables)? click on all of the carbons to which the unpaired electron is distributed by resonance (in addition to the one shown.) A relatively large percentage change in quantity demanded divided by a relatively smaller change in price yields relatively price _____________ demand. The length of a rectangle is 11 centimeters less than five times its width. Its area is 12 square centimeters. Find the dimensions of the rectangle. what are the six main reasons that an organization may submit an it systems request? select all that apply. question 1 options: less information more support more information improved service stronger controls better performance reduced cost increased cost What would this be??? C++ languageWrite a program using vectors that simulates the rolling of a single die a hundred times. The program should store 100 rolls of the die. After the program rolls the die, the program then goes through the 100 elements in the vector and tallies up the number of 1 rolls, the number of 2 rolls, the number of 3 rolls, the number of 4 rolls, the number of 5 rolls, and the number of 6 rolls. The program then displays the number of the respective rolls to the user. HELP PLEASE THANK YOU What are the 4 principle of causality? Suppose pollution is initially unregulated. If the City Council imposes a tax of $91 per day on each ton of smoke emitted, then total emissions will fall to ______ tons of smoke per day.