Shutter speed refers to the length of time the camera's shutter remains open, exposing the film or digital sensor to light. Option A is the correct answer.
It determines the amount of light that reaches the sensor and affects the overall exposure of the image. By controlling the duration of time the shutter is open, photographers can regulate the amount of light entering the camera and therefore control the brightness and clarity of the resulting photograph.
The concept of shutter speed is essential in photography as it plays a crucial role in capturing motion and controlling exposure. Faster shutter speeds freeze action and are ideal for capturing fast-moving subjects, while slower shutter speeds create motion blur, allowing for creative effects or capturing the impression of movement. Adjusting the shutter speed is one of the primary methods photographers use to control the exposure triangle, which includes shutter speed, aperture, and ISO settings, to achieve the desired image results.
Option A is the correct answer.
You can learn more about Shutter speed at
https://brainly.com/question/29763303
#SPJ11
The ___ function creates the frame that holds the drawing
Code: Python
Answer:
create_frame
Explanation:
the answer
The name of the function that is used to create frames that holds the drawing is called;
create_frame
In python, there are different terminologies such as range, frame, draw line, def function e.t.c.
Now, frame is simply defined as the container that is used to hold the graphics while range is defined as a built-in function that returns a list of given numbers,However, in this question, we are dealing with a function that creates the frame holding drawing. We know that def function is used to create functions but the function in this question is called create_frame function.
Thus, in conclusion the function has a name called create_frame function.
Read more at; https://brainly.com/question/20474643
Write a program to print sum on first 10 natural numbers.
#include
int main()
{
int i, sum;
for(i=1;i<=10;++i);
{
sum =sum + i;
}
printf("The sum is = %d",sum);
}
A program that prints the sum on the first 10 natural numbers is:
int sum=0;int i=1;for(i=1; i <= 10 ; i++) // the value of i will be from 1 to 10{sum=sum+i; //each number will get added to the variable ‘sum’}System.out.println(sum); //What is a program?A computer program in a programming language is a set of instructions and commands written in a language that a computer can execute or understand.
Using the For Loop program, the variables of the first 10 natural numbers can be written as:
int sum=0;int i=1;for(i=1; i <= 10 ; i++) // the value of i will be from 1 to 10{sum=sum+i; //each number will get added to the variable ‘sum’}System.out.println(sum); //Learn more about writing a program here:
https://brainly.com/question/23275071
place the steps in order to keep a graphic from spilling over into the next page and to include the text it is assciated with.
highlight the text.
open the paragraph dialogue box,
select keep with text.
select the line and page break, click OK.
Answer:
1.highlight text and the graphic
2.open the paragraph dialog box
3.select the line and page breaks tab
4.select keep with text
5.click ok
Explanation:
Answer:
Highlight the text and the graphic
Open the paragraph dialogue box
Select the line and page breaks tab
Select keep with test
Click ok
Explanation:
Which of these lights is NOT part of the standard three-point lighting setup?
key light
backlight
fill light
background light
Answer:
i believe background lighting
Write a program that takes a string as an input. If the string entered is equal to
“Chicken”, print “This is equal” to the screen. If the string entered is not equal to
“Chicken”, print “This is not equal” to the screen.
The program could be written using a python script.
Python script on string operationThe program takes a string as an input. First, declare a variable for the input:
var = str()
#The above code will ask for a string to be inputted
Next would be to condition the script in a particular direction using the 'if' statement. That is, a Boolean function.
if var ==('chicken'):
#The above code will compare the inputted string to the word 'chicken'.
print("This is equal")
#The screen will display 'This is equal' if the inputted stringis the same as 'chicken'.
else:
print("This is not equal")
#The screen will display "This is not equal" if the inputted string is not the same as 'chicken'.
In summary, the code goes thus:
var = str()
if var ==('chicken'):
print("This is equal")
else:
print("This is not equal")
More on python scripts can be found here: https://brainly.com/question/14378173
#SPJ1
Please help! ESSAY: TELESCOPES
Research the critical new developments in telescopes. Write a 200-word paper on the new developments.
OLEASE DONT EXPLAIN HOW TO DO IT, AND WRITE ME AND ACTUAL ORIGINAL ESSAY :)
Answer:
Telescopes have been used to observe space since the 1600s and have been continually improved and developed to give us a better understanding of the universe. Over the past few decades, there have been many critical new developments in telescopes that have allowed us to explore further and gain a deeper understanding of the universe.
One major development has been the use of mirrors to reflect and focus light to achieve greater magnification and resolution. This has allowed telescopes to observe distant objects in greater detail and at greater distances. Another major advancement has been the use of segmented mirror designs that allow for larger apertures and thus larger fields of view. This has allowed for greater coverage of the night sky and for more accurate observations.
In addition, the introduction of adaptive optics has allowed for telescopes to adjust their focus in real-time to compensate for atmospheric turbulence, allowing for much sharper images. Another development has been the introduction of space telescopes, allowing us to observe the universe without the interference of the Earth's atmosphere. The Hubble Space Telescope and the James Webb Space Telescope are examples of this type of telescope.
Finally, the development of space-based observatories has allowed for greater accuracy in observation than ever before. These observatories use multiple telescopes to observe a single object, allowing for greater accuracy and detail.
All of these developments have allowed us to observe the universe in greater detail and to gain a deeper understanding of its many mysteries. Telescopes have become increasingly powerful and precise, and have allowed us to explore further and deeper than ever before.
What are some consequences of posting inappropriate material online? (Choose all that apply)
friends and loved ones might think less of you
you might land in legal trouble
your social media history will be erased from the internet
future employers may not want to hire you.
Answer:
I think all of them is a consequence of posting inappropriate material online
Write an LMC program as follows instructions:
A) User to input a number (n)
B) Already store a number 113
C) Output number 113 in n times such as n=2, show 113
113.
D) add a comment with a details exp
The LMC program takes an input number (n) from the user, stores the number 113 in memory, and then outputs the number 113 n times.
The LMC program can be written as follows:
sql
Copy code
INP
STA 113
INP
LDA 113
OUT
SUB ONE
BRP LOOP
HLT
ONE DAT 1
Explanation:
A) The "INP" instruction is used to take input from the user and store it in the accumulator.
B) The "STA" instruction is used to store the number 113 in memory location 113.
C) The "INP" instruction is used to take input from the user again.
D) The "LDA" instruction loads the value from memory location 113 into the accumulator.
E) The "OUT" instruction outputs the value in the accumulator.
F) The "SUB" instruction subtracts 1 from the value in the accumulator.
G) The "BRP" instruction branches back to the "LOOP" label if the result of the subtraction is positive or zero.
H) The "HLT" instruction halts the program.
I) The "ONE" instruction defines a data value of 1.
The LMC program takes an input number (n) from the user, stores the number 113 in memory, and then outputs the number 113 n times.
To know more about LMC program visit :
https://brainly.com/question/14532071
#SPJ11
Question 13(Multiple Choice Worth 5 points)
(03.01 LC)
What tab in Word Online should you choose to add a shape to your document?
Home
Insert
Layout
Review
Answer:
Option 2: Insert is the correct answer.
Explanation:
Word processing software provides with the options required to create and format documents. A document may consist of text, images, shapes, tables etc.
The insert tab is used to insert tables, images and shapes in the document.
Hence,
Option 2: Insert is the correct answer.
Answer:
#2. Insert
Explanation:
That's where it is =>
write a python program to input a list of no. and swap element at the even location with element at odd location
Answer:
I changed the title to describe the task the code accomplishes, this makes the contrnt more easily searchable and accessible.
Explanation:
Answer:
The content is more easily searchable and accessible.
Explanation:
Vectorize the midpoint rule for integration The midpoint rule for approximating an integral can be expressed as where h = Write a function midpointint( f,a,b,n to compute the midpoint rule using the numpy sum function. Please be careful in generating i , which should range from 1 to n inclusive. (You could, for instance, use a range and convert it to an array .) Your submission should include a function midpointint( f,a,b,n)
The implementation involves dividing the interval [a, b] into n subintervals of equal width h, then computing the midpoint of each subinterval.
Here is the implementation of the midpoint rule using numpy sum function:
python
Copy code
import numpy as np
def midpointint(f, a, b, n):
h = (b-a)/n
x = np.linspace(a+h/2, b-h/2, n)
return h * np.sum(f(x))
The function takes the function to integrate f, the lower bound of the integral a, the upper bound of the integral b, and the number of intervals n as input arguments. It returns the approximated value of the integral using the midpoint rule.
The function then evaluates the function f at these midpoints and computes the sum of the resulting function values multiplied by the width h. This sum is then returned as the approximation of the integral.
Learn more about midpoint here:
https://brainly.com/question/31339034
#SPJ11:
Which is an example of artificial intelligence in computers? A. multimedia software B. encryption software C. voice recognition software D. security software
Answer:
its option b encryption software
Explanation:
Artificial intelligence (AI) is intelligence demonstrated by machines, unlike the natural intelligence displayed by humans and animals, which involves consciousness and emotionality. The distinction between the former and the latter categories is often revealed by the acronym chosen. 'Strong' AI is usually labelled as AGI (Artificial General Intelligence) while attempts to emulate 'natural' intelligence have been called ABI (Artificial Biological Intelligence). Leading AI textbooks define the field as the study of "intelligent agents": any device that perceives its environment and takes actions that maximize its chance of successfully achieving its goals.[3] Colloquially, the term "artificial intelligence" is often used to describe machines (or computers) that mimic "cognitive" functions that humans associate with the human mind, such as "learning" and "problem solving".
where can you view detailed information about threats that have been detected on protected endpoints?
The Threats tab is a place where you can view detailed information about threats that have been detected on protected endpoints.
What is a threat tab?
The Threats tab on the Endpoint information screen allows you to view all security threats detected on a specific endpoint.
Threat detection refers to an IT organization's capacity to recognize threats to a network, its applications, or other assets with speed and accuracy. Understanding the hazards that exist in the cyber world is the first step in developing an efficient threat detection and response strategy.
Therefore, You can read comprehensive details regarding threats that have been found on protected endpoints under the Threats page.
To learn more about threat, refer to the link:
https://brainly.com/question/29941324
#SPJ1
DES exhibits the classic __________ block cipher structure, which consists of a number of identical rounds of processing
DES exhibits the classic "Feistel" block cipher structure, which consists of a number of identical rounds of processing. The Feistel structure is a key component in DES, ensuring that the encryption and decryption processes are secure and effective.
In a Feistel cipher, the plaintext is divided into two halves, and each half is processed independently through a series of rounds. Each round typically consists of four operations: expansion, substitution, permutation, and a bitwise XOR with a round key derived from the encryption key. The output of one half is then swapped with the other, and the process is repeated for a specified number of rounds. The Feistel structure provides a high degree of security while allowing for efficient encryption and decryption. DES uses 16 rounds of processing to encrypt 64-bit blocks of data.
To learn more about cipher; https://brainly.com/question/14754515
#SPJ11
A mechanic uses a screw driver to install a ¼-20 UNC bolt into a mechanical brace. What is the mechanical advantage of the system? What is the resistance force if the effort force is 5 lb.
Answer:
15.7 ; 78.5
Explanation:
Mechanical advantage of a screw = Circumference / pitch
Circumference = pi × d
Where :
pi = 3.142, D = diameter
Therefore ;
Circumference = 3.142 × (1/4) = 0.785 in
Pitch = 1/TPI
TPI (thread per inch) = 20
Pitch = 1/ 20 = 0.05
Mechanical advantage = 0.785 / 0.05 = 15.7
Resistance force if effort force is 5lb
Mechanical advantage = Fr / Fe
Fe = effort force, Fr = resistance force
15.7 = Fr / 5
Fr = 15.7 × 5 = 78.5 lbs
How might telecommuting be implemented as an alternative work
arrangement in a carribbean country?
The first step is to assess the existing infrastructure and technological capabilities to ensure reliable internet connectivity and communication channels. Secondly, policies and guidelines need to be developed to govern telecommuting, including eligibility criteria, expectations, and performance metrics.
Training and support programs should be provided to help employees adapt to remote work environments. Additionally, collaboration tools and platforms should be implemented to facilitate communication and project management. Finally, monitoring and evaluation mechanisms should be established to assess the effectiveness of telecommuting and make necessary adjustments.
To implement telecommuting in a Caribbean country, it is crucial to evaluate the country's technological infrastructure and ensure that reliable internet connectivity is available to support remote work. This may involve investing in improving internet infrastructure and expanding broadband coverage to remote areas.
Once the technological foundation is established, policies and guidelines need to be developed to govern telecommuting. These policies should define eligibility criteria for employees, specify expectations and deliverables, and establish performance metrics to measure productivity and accountability. Clear communication channels should be established to keep employees informed and connected.
Training and support programs should be provided to help employees adapt to remote work environments. This may include training on the use of remote collaboration tools, time management, and maintaining work-life balance. Support systems such as IT help desks should be available to address technical issues and provide assistance.
Collaboration tools and platforms should be implemented to enable effective communication and project management. This may involve adopting video conferencing tools, project management software, and cloud-based document sharing platforms. These tools facilitate virtual meetings, file sharing, and real-time collaboration among remote team members.
To ensure the success of telecommuting, regular monitoring and evaluation should be conducted. This involves assessing productivity levels, employee satisfaction, and the overall impact on organizational goals. Feedback mechanisms should be in place to gather insights from employees and make necessary adjustments to improve the telecommuting experience.
By following these steps, telecommuting can be effectively implemented as an alternative work arrangement in a Caribbean country, providing flexibility for employees and contributing to a more efficient and resilient workforce.
To learn more about technology click here: brainly.com/question/9171028
#SPJ11
The phrases below describe Unix commands used for adjusting a file's rights. Match the command with its description.
Question
Correct Match
Selected Match
Changes the rights granted to the owner, group, or rest of the world, for a file
B. chmod
B. chmod
Changes the identity of a file's owner
C. chown
C. chown
Changes the identity of the group associated with a file
A. chgrp
A. chgrp
Below is the correct match between the Unix commands and its description:Correct Match:Changes the identity of the group associated with a file - A. chgrpChanges the rights granted to the owner, group, or rest of the world, for a file - B.
chmodChanges the identity of a file's owner - C. chownUnix is a multitasking and multiuser computer operating system that is designed to offer good support for command-line interface environments. Unix commands are the set of instructions given to the Unix operating system. In Unix, it's essential to have good knowledge of Unix commands to perform various tasks, such as managing the system, editing files, etc. Among the Unix commands, chgrp, chmod, and chown are the commands used for adjusting a file's rights.
Read more about commands here;https://brainly.com/question/25808182
#SPJ11
true/false. assign welcomemessage with greetingstring, followed by a single space, and then username.
Answer:
TRUE.
In most programming languages, including Java, C++, Python, and JavaScript, you can concatenate strings using the + operator, which combines two or more strings into a single string.
Assuming welcomemessage and greetingstring are string variables, and username is a string or variable containing a string, you can concatenate them with a single space using the following code:
welcomemessage = greetingstring + " " + username;
This code assigns the value of greetingstring concatenated with a space and username to the variable welcomemessage.
For example, if greetingstring is "Hello" and username is "John", the value of welcomemessage would be "Hello John".
True. The statement assigns the variable welcomemessage with a greeting string, a single space, and the username. This can be achieved using concatenation in most programming languages.
In programming, concatenation is the process of joining two or more strings together. The statement in the question is asking to concatenate the greetingstring, a single space, and the username to form a welcome message. The resulting welcomemessage variable will hold the value of the concatenated string. This process is commonly used in programming when we need to construct messages that involve multiple strings or variables.
When you assign welcomemessage with greetingstring, followed by a single space, and then username, you are combining the two strings (greetingstring and username) with a space in between to form a single string called welcomemessage.
To know more about programming visit:-
https://brainly.com/question/11023419
#SPJ11
Injection moulding and extrustion are two commonly used thermoplastic processing techniques. Select the common stage for the two a. Plasticization b. Injection c. Packing d. Demoulding
The common stage for injection molding and extrusion is plasticization.
What is the common stage for injection molding and extrusion processes?Certainly! Here are the details of each stage in injection molding and extrusion processes:
Plasticization: In this stage, both in injection molding and extrusion, the thermoplastic material is subjected to heat and pressure to transform it from a solid state into a molten state. This is typically done by feeding the material into a heated barrel where it is melted, mixed, and homogenized. The plasticization stage ensures that the material becomes molten and ready for further processing.
Injection (specific to injection molding): After plasticization, in the injection molding process, the molten plastic is injected into a mold cavity under high pressure. The mold is designed to have the desired shape of the final product. The molten plastic fills the mold cavity, taking its shape and forming the product.
Packing (specific to injection molding): Once the mold cavity is filled with molten plastic, the packing stage begins. In this stage, additional pressure is applied to ensure that the molten plastic completely fills all the details and cavities of the mold. The packing stage helps in reducing any voids or defects and improves the overall quality of the molded part.
Demoulding (specific to injection molding): After the molten plastic has solidified inside the mold cavity, the demolding stage takes place. The mold is opened, and the solidified part is ejected or removed from the mold. The demolding stage allows for the release of the final molded product.
In extrusion, there is no separate packing or demolding stage like in injection molding. The extrusion process primarily involves the continuous feeding of the molten plastic through a die to shape it into a specific profile or form. The extruded material is then cooled and cut into the desired lengths.
Overall, plasticization is a common stage in both injection molding and extrusion processes, while the specific stages such as injection, packing, and demolding are unique to injection molding.
Learn more about injection molding
brainly.com/question/33176905
#SPJ11
what is a type of system software that allows a user to perform maintenance type tasks
Answer:
Computer
Explanation:
The type of system software that allows a user to perform maintenance-type tasks is a computer.
A computer has many programs and operating systems.
Complete the car class by creating an attribute purchase_price (type int) and the method print_info() that outputs the car's information.
For instance, print info would be used if the input was: 2011 18000 2018 (where 2011 is the car's model year, 18000 is the purchase price, and 2018 is the current year) (). Outputs: Data about the vehicle: Model year: 2011. Purchase cost: $18,000 5770 as of right now.
What are attributes example?An attribute is a personality quality you possess, such as assurance or fortitude. Since they might improve your suitability for a position, many companies look for particular qualities. If you're good at negotiating, for instance, you might do well in sales.
What do characteristics mean?A quality, character, or characteristic attributed to someone or something is what Merriam-Webster defines as a "attribute."
To know more about attribute visit :-
https://brainly.com/question/28163865
#SPJ4
A field in one or more tables that stores the same data., Objects:The basic parts of a database; for example tables, forms, queries, and reports is called?
When LDAP traffic is made secure by using Secure Sockets Layer (SSL) or Transport Layer Security (TLS), what is this process called
Answer:
Authorization is granting permission for admittance. ACLs provide file system security for protecting files managed by the user. Rule-Based Access Control can be changed by users.
Explanation:
The process When LDAP traffic is made secure by using Secure Sockets Layer (SSL) or Transport Layer Security (TLS) is known as Lightweight Directory Access Protocol.
What is the Lightweight Directory Access Protocol?An open, supplier conditioning and reinforcement for providing distributed directories technology solutions over an IP network are called the Lightweight Directory Access Protocol.
By enabling the sharing of data about people, systems, networks, services, and applications throughout the network, directory services play a crucial role in the development of intranet and Internet applications.
LDAP is frequently used to offer a central location to store users and passwords. As a result, several software programs and services can connect to the LDAP server to verify users.
The interaction When LDAP traffic is made secure by utilizing a Secure Attachments Layer (SSL) or Transport Layer Security (TLS) is known as Lightweight Directory Access Protocol.
More about the Lightweight Directory Access Protocol link is given below.
https://brainly.com/question/28364755
#SPJ12
which view do you choose if you want to see a thumbnail of each slide in a presentation arranged in a grid?
The correct response is d. Slide Sorter. You may easily rearrange or divide your slides into sections by dragging and dropping them around the grid-like display of your slides thanks to the slide sorter.
You can see and sort the presentation slides in PowerPoint using the Slide Sorter view. Click the "Slide Sorter" button in the presentation view buttons in the Status Bar to enter the Slide Sorter view. The "Slide Sorter" button in the "Presentation Views" button group on the "View" tab of the Ribbon is another option. The presentation slides can be added to, removed from, and copied using the Slide Sorter view. The visual flow of the presentation is also displayed in PowerPoint's Slide Sorter view. Additionally, you may add and observe a slide transition animation here. All of the presentation slides in PowerPoint's Slide Sorter mode are displayed as thumbnails. The slide's content cannot be changed in this view. However, many of the functions available in PowerPoint's Slide Sorter view are also available in the Normal view's slide thumbnails pane. Click a slide thumbnail in the Slide Sorter window to choose a slide. Click and drag the slide thumbnails in this view, then release them where you want them to be. This will reorder the order of the slides in your presentation. The selected slide opens in Normal View, where you can edit its content, if you double-click a slide thumbnail in PowerPoint's Slide Sorter view or if you choose a slide thumbnail and then press the "Enter" key on your keyboard. In the Slide Sorter window, click the desired slide thumbnail to choose it for deletion. Then, use your keyboard's "Delete" key. Alternatively, you can erase the slide by doing a right-click. then from the pop-up menu, choose the "Delete Slide" option.
Learn more about Slide Sorter here
https://brainly.com/question/16910023
#SPJ4
Which view do you choose if you want to see a thumbnail of each slide in a presentation arranged in a grid?
a. Normal
b. Outline
c. Slide Show
d. Slide Sorter
Computer hardware without computer software is useless while computer software without computer hardware is meaningless. Discuss!
Answer:
I agree
Explanation:
Without ant software you'd have no use for a computer making it useless and a paper weight basically but a software without compute hardware is meaningless because it has no one to use it it becomes dead
A period in which unemployment is low, business produces many goods and services, and wages are good is called ______.
A. prosperity
B. productivity
C. personal income
D. business cycle
Answer:
A
Explanation:
Which two organizations are examples of a threat intelligence service that serves the wider security community?
(Choose two.)
a) NIST
b) Cyber Threat Alliance
c) FortiGuard Labs
d) Malware-as-a-Service
The two organizations that serve the wider security community and are examples of threat intelligence services are Cyber Threat Alliance (CTA) and FortiGuard Labs.
Below is a brief description of each: Cyber Threat Alliance (CTA) is a non-profit cybersecurity membership organization founded in 2014, dedicated to enhancing the security of the global digital ecosystem. The organization shares threat intelligence among its members and has developed a platform for automated threat intelligence sharing, which allows members to respond to cyberattacks and threats with greater speed and effectiveness.FortiGuard Labs, on the other hand, is a security research organization run by Fortinet, a global provider of network security appliances and solutions. The Labs analyze the latest threats and vulnerabilities to create threat intelligence that is shared across Fortinet products.
FortiGuard Labs also shares threat intelligence with the wider security community, providing alerts, advisories, and threat reports. Fortinet's FortiGuard Threat Intelligence Service is a part of FortiGuard Labs and is a subscription-based service that provides real-time updates and comprehensive protection against the latest cyber threats. Answer in 200 words:Therefore, Cyber Threat Alliance (CTA) and FortiGuard Labs are two organizations that serve the wider security community and are examples of threat intelligence services. Both organizations are committed to providing real-time threat intelligence to their members, clients, and the wider security community.
The information they share is critical in combating cybercrime and reducing the impact of cyber threats. The collaboration between these organizations allows for the development of a more comprehensive understanding of cyber threats and increased protection against them. They facilitate the sharing of threat intelligence between their members and help create a unified response to cyberattacks and threats. By providing alerts, advisories, and threat reports, they help organizations prepare and respond to the latest cyber threats. In conclusion, Cyber Threat Alliance (CTA) and FortiGuard Labs are excellent examples of organizations that serve the wider security community and are crucial in the fight against cybercrime.
Learn more about network :
https://brainly.com/question/31228211
#SPJ11
In a day, a car passes n
kilometers. How many days does it take to travel a route of length m
kilometers?
The program receives as input in the first line a natural number n
and in the second line a non-negative integer m
. Python code
#Calculate days.
def calculateDay(m, n):
assert isinstance(m, int) and m >= 0, "m should be a natural number."
assert isinstance(n, int) and n > 0, "n shouldn't be negative."
return m/n
#Main function
def Main():
m, n = input().split()
print(f'Result: {calculateDay(int(m),int(n)):.2f} days.')
#Point.
if(__name__ == "__main__"):
Main()
How many free answers does students get?
PLEASE HELP IM GIVING BRAINLIEST!!
Create properly formatted works cited page for a research paper about the dangers of cell phone use on the road. Follow the MLA citation format, and make sure to correctly italicize each citation. For the purpose of this activity, it is not necessary to observe the MLA rules for indentation. Use the six sources provided to support the research paper.
Answer:
Cell phone use causes traffic crashes because a driver's cognitive performance significantly decreases when they are using a cell phone. Texting is also dangerous because the driver is taking their eyes away from the road and their hands away from the wheel. Driving demands a high level of concentration and attention.
Explanation:
PLz brainlyest