The Find and Replace dialog box cannot find background color formatting in tables that were applied using table style or formatting that is applied based on conditional formatting.
The Find and Replace a dialog box is a powerful tool for quickly searching and replacing multiple words or phrases in a document. However, it cannot find background color formatting that has been applied to tables using table style or formatting based on conditional formatting.
This is because the Find and Replace dialog box only searches for text and not formatting. To find and replace background color formatting applied to tables, you will need to use the Formatting pane, which allows you to search for all formatting, including the background color.
For more questions like Conditional formatting click the link below:
https://brainly.com/question/16014701
#SPJ4
How technology works?
First of all, technology refers to the use of technical and scientific knowledge to create, monitor, and design machinery. Also, technology helps in making other goods.
What are the global, international or cultural implications for a Network Architect?
What skills will you need or how might you interact daily with people from other countries?
As a network architect, one of the main global, international, or cultural implications is the need to understand and work with a variety of different technologies and protocols that may be used in different regions of the world
What skills are needed?In order to be successful in this role, you will likely need to have strong communication skills, as well as the ability to work effectively with people from different cultures.
You may also need to have a strong understanding of different languages or be able to work with translation tools and services.
Additionally, you may need to be comfortable with traveling and working in different countries, and be able to adapt to different working environments and cultures
Read more about Network Architect here:
https://brainly.com/question/2879305
#SPJ1
If the cell B2 is 68, what will this IF function
a result ?
as
give you
= IF (B2760, "PASS", "FAIL")
If the cell B2 is 68, this IF function "=IF (B2>60, 'pass', 'fail')" will give pass as a result because 68 is greater than 60.
What is Microsoft Excel?Microsoft Excel can be defined as a software application that is designed and developed by Microsoft Inc., for analyzing and displaying spreadsheet documents by using rows and columns in a tabulated format.
The types of function in MS Excel.In Microsoft Excel, there are different types of functions that are called predefined formulas and these include the following:
Average functionMinimum functionSum functionMaximum functionCount functionIF functionIf the cell B2 is 68, this IF function "=IF (B2>60, 'pass', 'fail')" will give pass as a result because 68 is greater than 60.
Read more on Excel formula here: brainly.com/question/26053797
#SPJ1
Complete Question:
If the cell B2 is 68, what will this IF function give you as a result? =IF (B2>60, 'pass', 'fail')
Make sure your animal_list.py program prints the following things, in this order:
The list of animals 1.0
The number of animals in the list 1.0
The number of dogs in the list 1.0
The list reversed 1.0
The list sorted alphabetically 1.0
The list of animals with “bear” added to the end 1.0
The list of animals with “lion” added at the beginning 1.0
The list of animals after “elephant” is removed 1.0
The bear being removed, and the list of animals with "bear" removed 1.0
The lion being removed, and the list of animals with "lion" removed
Need the code promise brainliest plus 100 points
Answer:#Animal List animals = ["monkey","dog","cat","elephant","armadillo"]print("These are the animals in the:\n",animals)print("The number of animals in the list:\n", len(animals))print("The number of dogs in the list:\n",animals.count("dog"))animals.reverse()print("The list reversed:\n",animals)animals.sort()print("Here's the list sorted alphabetically:\n",animals)animals.append("bear")print("The new list of animals:\n",animals)
Explanation:
Which of the following statements about markup languages is true?
• Markup languages are used to write algorithms.
Markup languages are used to structure content for computers to interpret
JavaScript is an example of a markup language.
Markup languages are a type of programming language.
The most widely used markup languages are SGML (Standard Generalized Markup Language), HTML (Hypertext Markup Language), and XML (Extensible Markup Language).
B .Markup languages are used to structure content for computers to interpret is true.
What is a markup language in programming?A markup language is a type of language used to annotate text and embed tags in accurately styled electronic documents, irrespective of computer platform, operating system, application or program.
What does a markup language used to identify content?Hypertext markup language is used to aid in the publication of web pages by providing a structure that defines elements like tables, forms, lists and headings, and identifies where different portions of our content begin and end.
To learn more about A markup language, refer
https://brainly.com/question/12972350
#SPJ2
C++
Write a program and use a for loop to output the
following table formatted correctly. Use the fact that the
numbers in the columns are multiplied by 2 to get the
next number. You can use program 5.10 as a guide.
Flowers
2
4
8
16
Grass
4
8
16
32
Trees
8
16
32
64
based on the above, we can write the C++ code as follows..
#include <iostream>
#include <iomanip>
using namespace std;
int main() {
// Output table headers
cout << setw(10) << "Flowers" << setw(10) << "Grass" << setw(10) << "Trees" << endl;
// Output table rows
for (int i = 1; i <= 4; i++) {
cout << setw(10) << (1 << (i-1)) * 2 << setw(10) << (1 << i) * 2 << setw(10) << (1 << (i+2)) * 2 << endl;
}
return 0;
}
How does this work ?Using the iomanip library's setw function, we ensure that the output of this program is properly formatted and aligned in columns. To calculate the values in each column, we iterate through every row of the table via a for loop and rely on bit shifting and multiplication.
As our code outputs these values to the console using << operators, we use endl to create new lines separating each row. The return 0; statement at the very end serves as an indication of successful completion.
Learn more about C++:
https://brainly.com/question/30905580
#SPJ1
What element is not a selection in the Interface preferences? UI Character Presets UI Font Size UI Language UI Scaling
Answer:
The element is not a selection in the Interface preferences is:
UI Character Presets
Explanation:
The interface preferences is a section of the Set Preferences dialog, which contains settings related to the user interface for the display and configuration of certain features and dialogs, in accordance with the user's preferences. They include the UI Font Size, UI Language, and UI Scaling, with the exception of the the UI Character Presets. The UI Scale is the frontend extension of the actual screen resolution to the user. The UI Language configures the user's preferred language, just as the UI Font Size allows the user to choose a preferred font size for display on the screen.
The element that is not a selection in the interface preference is UI Character Presets.
The user interface in Photoshop is a graphical interface that serves as a point of interaction between the user (i.e. people) and the Photoshop application.
The interface preferences are several options that are considered in improving user experience when running the application.
The preferences in Photoshop (as stated in the options) and their uses are:
UI scaling: allows the user to resize or scale the user interface in relation to the computer resolutionUI language: allows the user to set the languageUI font size: allows the user to set font face and size of the application.UI Character Presets is not a selection in interface preferences in Photoshop applications.
Read more about user interface at:
https://brainly.com/question/20380753
Nicole is in a study group to prepare for a test on plant biology, a subject she knows a lot about. During their meetings, she always comes prepared, helps other students, does most of the talking, and handles all of the tasks. What does Nicole need to do to make the study group more effective?
Answer:
B
Explanation:
She did all of the work so the other students wherent able to do anything
The thing that Nicole needs to do to improve the study group is to involve others and give them tasks.
What is a Study Group?This refers to the collection of persons that forms a group with the aim of learning and revising together.
Hence, we can see that because Nicole does most of the tasks in the study group for the test on plant biology, she would have to involve the other students so they would handle some of the work.
Read more about study groups here:
https://brainly.com/question/23779014
#SPj2
Which of the following network topology is most expensive
to implement and maintain?
The option of the network topology that is known to be the most expensive to implement and maintain is known to be called option (b) Mesh.
What is Network topology?Network topology is known to be a term that connote the setting of the elements that pertains to a communication network.
Note that Network topology can be one that is used to state or describe the pattern of arrangement of a lot of different types of telecommunication networks.
Therefore, The option of the network topology that is known to be the most expensive to implement and maintain is known to be called option (b) Mesh.
Learn more about network topology from
https://brainly.com/question/17036446
#SPJ1
Which of the following is the most expensive network topology?
(a) Star
(b) Mesh
(c) Bus
fill in the blanks
a:………was the main component in the first generation computer
Answer:
vaccum tubeExplanation:
mark me brainlist!!1. Write a statement that opens the file Customers.dat as a random access file for both reading and writing.
Answer:
Explanation:
In Python you need to give access to a file by opening it. You can do it by using the open() function. Open returns a file object, which has methods and attributes for getting information about and manipulating the opened file.
https://eecs.wsu.edu/~cs150/tutorial/file/code11_3.html
Look at this link it may help.
Suppose the program counter is currently equal to 1700 and instr represents the instruction memory. What will be the access of the next instruction if:
instr[PC] = add $t0, $t1, $t2
Answer:
C
Explanation:
omputer chip
sorry btw
employees in the sales department need to be able to access the sales share on the file server. they will need to have the ability to create files, read them, and make corrections or additions. which of the following share permissions should the group be given?
A: 'change' is the share permission that the group should be given.
The 'change' is the type of share permission that enables users to create and read files, as well as add, edit and delete files and folders. Change permissions are not assigned by default; rather they are provided by the administration.
Based on the given scenario where in the sales department employees need to be allowed access to the sales being shared on the file server. In order to meet the goal, the employees require the ability to create and read files, as well as make corrections or additions. Thus, the employees should be given the share permission of 'change'.
"
Complete question is:
employees in the sales department need to be able to access the sales share on the file server. they will need to have the ability to create files, read them, and make corrections or additions. which of the following share permissions should the group be given?
a. change
b. read
c. modify
d. full control
"
You can learn more about permission at
https://brainly.com/question/13244431
#SPJ4
With software prefetching, it is important to be careful to have the prefetches occur in time for use but also to minimize the number of outstanding prefetches to live within the capabilities of the microarchitecture and minimize cache pollution. This is complicated by the fact that different processors have different capabilities and limitations. a. [15] <2.3> Create a blocked version of the matrix transpose with software prefetching. b. [20] <2.3> Estimate and compare the performance of the blocked and unblocked transpose codes both with and without software prefetch
what are the operations supported by odata adapter in cpi?
Answer:
The OData adapter in CPI (Cloud Platform Integration) supports various OData operations, including:
1. Querying: The adapter allows you to query data from an OData service using the OData Query Language. You can filter, sort, and page through large datasets using this operation.
2. Create: The adapter supports creating new records in an OData service using the POST method. You can specify the entity set and properties of the new record in the request body.
3. Update: The adapter allows you to update existing records in an OData service using the PATCH or PUT method. You can specify the entity set, key, and updated properties in the request body.
4. Delete: The adapter supports deleting records from an OData service using the DELETE method. You can specify the entity set and key of the record to be deleted in the request URL.
5. Batch: The adapter also provides support for batch requests, which allow you to perform multiple OData operations in a single HTTP request. This can improve performance and reduce network overhead.
Overall, the OData adapter in CPI provides comprehensive support for working with OData services, allowing you to easily integrate with a wide range of applications and services.
what is the name of the program or service that lets you view e -mail messeges?
The program or service that allows you to view email messages is called an email client.
What is the name of the program?An email client is a software program or service that enables users to access, manage and view their email messages. It provides user-friendly interface for reading, composing and organizing emails.
Popular examples of email clients include Micro/soft Outlook, Gm/ail, Mo/zilla Thunderbird and Ap/ple Mail. These clients allow users to connect to their email accounts, retrieve messages from email servers and display them in an organized manner for easy viewing and interaction.
Read more about email client
brainly.com/question/24688558
#SPJ1
You may review Chapter 2, pages 67-71 of the textbook or communication skills.
Now please answer the following questions:
• What communication systems do you believe are best to be used at a help desk?
• What may be a couple of reasons for the satisfaction disparity?
• How can you ensure that all employees are satisfied with the help desk's services regardless of how
Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 50-100-w
found to be compelling and enlightening. To help you with your discussion, please consider the following
• What differences or similarities do you see between your posting and other classmates' postings?
**what communication system do you believe are best to be used at a help desk?
The communication systems that are said to be used at help desks are:
Phone as well as Call Center SystemThe use of Email SystemThe use of Ticketing SystemWhat is the communication systems?In terms of Phone as well as Call Center System: This is seen as a form of a traditional system of communication that is often used as help desks.
It is one that gives room for a lot of users to be able ot call as well as speak directly with the person who is a help desk agents for any form of assistance.
Hence the choice of communication the the person who is help desk wants to use can depend on a lot of factors.
Learn more about communication systems from
https://brainly.com/question/30023643
#SPJ1
which of the following is a personal benifit of earning a college degree?
A) you have more friends
B) you are more likely to exercise
C) you are more likely to vote for the right candidate.
D) you have a longer life expectancy
Answer:
you have a longer life expectancy
Explanation:
How to use the screen mirroring Samsung TV app
If you want to show what's on your phone or computer screen on a Samsung TV, you can do it by these steps:
Make sure both your Samsung TV and the thing you want to copy are using the same Wi-Fi.
What is screen mirroringThe step also includes: To get to the main menu on your Samsung TV, just press the "Home" button on your remote.
The screen mirroring is Copying or making a duplicate of something. They are repeating each other's words to try to fix the problem between them. This is the way to show what is on your computer or phone screen on another screen by using wireless connection.
Learn more about screen mirroring from
https://brainly.com/question/31663009
#SPJ1
1.convert the following binary numbers to decimal
1.AB2 base in 16
2.123 in base 16
3.ABB base 16
4.35E.E base 16
2.convert binary numbers to decimals
1.237 in base 8
2.2731 in base 8
3.617.7 in base 8
4.22.11 in base 8
3.Find the two's complement representation of the following numbers using 8bit
a) -17
b) -11
c) -46
d) -78
a) The converted binary numbers are:
1.AB2 base in 16 = 2738
2.123 in base 16 = 291
3.ABB base 16 = 43787
4.35E.E base 16 = 3.3671875
b) converted binary numbers to decimals are:
237 in base 8 = 159
2731 in base 8 = 1497
617.7 in base 8 = 7.234375
22.11 in base 8 = 0.15625
c) The two's complement representations of the following numbers using 8bit are:
-17 = 11101111.
-11 = 11110101.
-46 = 11010010.
-78 = 10110010.
What is the explanation for the above?1) Converting binary numbers to decimal:
AB2 base in 16:
The first digit from the right is 2, which represents 2 in decimal.
The second digit from the right is B, which represents 11 in decimal.
The third digit from the right is A, which represents 10 in decimal.
Therefore, AB2 base 16 in decimal is: 2 + 11x16 + 10x16^2 = 2 + 176 + 2560 = 2738
2) 123 in base 16:
The first digit from the right is 3, which represents 3 in decimal.
The second digit from the right is 2, which represents 2 in decimal.
The third digit from the right is 1, which represents 1 in decimal.
Therefore, 123 base 16 in decimal is: 3 + 2x16 + 1x16^2 = 3 + 32 + 256 = 291
3) ABB base 16:
The first digit from the right is B, which represents 11 in decimal.
The second digit from the right is B, which represents 11 in decimal.
The third digit from the right is A, which represents 10 in decimal.
Therefore, ABB base 16 in decimal is: 11 + 11x16 + 10x16^2 = 11 + 2816 + 40960 = 43787
4) 35E.E base 16:
The first digit from the right is E, which represents 14 in decimal.
The second digit from the right is ., which separates the integer and fraction parts.
The third digit from the right is 5, which represents 5 in decimal.
The fourth digit from the right is 3, which represents 3 in decimal.
The fifth digit from the right is E, which represents 14 in decimal.
Therefore, 35E.E base 16 in decimal is: 14/16 + 3x16^-1 + 5x16^-2 + 14x16^-3 = 14/16 + 3/16 + 5/256 + 14/4096 = 3.3671875
Converting binary numbers to decimal:
1) 237 in base 8:
The first digit from the right is 7, which represents 7 in decimal.
The second digit from the right is 3, which represents 3 in decimal.
The third digit from the right is 2, which represents 2 in decimal.
Therefore, 237 base 8 in decimal is: 7 + 3x8 + 2x8^2 = 7 + 24 + 128 = 159
2) 2731 in base 8:
The first digit from the right is 1, which represents 1 in decimal.
The second digit from the right is 3, which represents 3 in decimal.
The third digit from the right is 7, which represents 7 in decimal.
The fourth digit from the right is 2, which represents 2 in decimal.
Therefore, 2731 base 8 in decimal is: 1 + 3x8 + 7x8^2 + 2x8^3 = 1 + 24 + 448 + 1024 = 1497
3) 617.7 in base 8:
The first digit from the right is 7, which represents 7 in decimal.
- The second digit from the right is ., which separates the integer and fraction parts.
- The third digit from the right is 1, which represents 1 in decimal.
- The fourth digit from the right is 6, which represents 6 in decimal.
- Therefore, 617.7 base 8 in decimal is: 7/8 + 1x8^-1 + 6x8^-2 + 0x8^-3 + 0x8^-4 + 0x8^-5 + 0x8^-6 + 0x8^-7 = 7/8 + 1/8 + 6/64 = 7.234375
4) 22.11 in base 8:
The first digit from the right is 1, which represents 1 in decimal.
The second digit from the right is 1, which represents 1 in decimal.
The third digit from the right is ., which separates the integer and fraction parts.
The fourth digit from the right is 2, which represents 2 in decimal.
Therefore, 22.11 base 8 in decimal is: 1x8^-1 + 1x8^-2 + 2x8^-3 + 0x8^-4 = 0.140625 + 0.015625 = 0.15625
Finding the two's complement representation of the following numbers using 8-bit:
To find the two's complement of a negative number, we first need to represent the number in binary form, invert all the bits, and then add 1 to the result.
a) -17:
- The binary representation of 17 is 00010001.
- Inverting all the bits gives 11101110.
- Adding 1 to 11101110 gives 11101111.
- Therefore, the two's complement representation of -17 in 8-bit is 11101111.
b) -11:
- The binary representation of 11 is 00001011.
- Inverting all the bits gives 11110100.
- Adding 1 to 11110100 gives 11110101.
- Therefore, the two's complement representation of -11 in 8-bit is 11110101.
c) -46:
- The binary representation of 46 is 00101110.
- Inverting all the bits gives 11010001.
- Adding 1 to 11010001 gives 11010010.
- Therefore, the two's complement representation of -46 in 8-bit is 11010010.
d) -78:
- The binary representation of 78 is 01001110.
- Inverting all the bits gives 10110001.
- Adding 1 to 10110001 gives 10110010.
- Therefore, the two's complement representation of -78 in 8-bit is 10110010.
Learn more about binary numbers at:
https://brainly.com/question/28222245
#SPJ1
5.19 LAB: Countdown until matching digits
PYTHON: Write a program that takes in an integer in the range 11-100 as input. The output is a countdown starting from the integer, and stopping when both output digits are identical.
Using the knowledge of computational language in python it is possible to write a code that write a program that takes in an integer in the range 11-100 as input. The output is a countdown starting from the integer, and stopping when both output digits are identical.
Writting the code:n = int(input())
if 20 <= n <= 98:
while n % 11 != 0:
print(n)
n -= 1
print(n)
else:
print("Input must be 20-98")
See more about python at brainly.com/question/18502436
#SPJ1
when your enterprise's collected data information life cycle ended, you were asked to destroy the data stored on magnetic storage devices. Which of the following techniques should you use to destroy the data? O Delete the data O Pulverize the data O Shred the data O Degauss the data
The best way to get rid of data contained on magnetic storage devices is to pulverise it.
Different definitions of data deletion have been offered by technical publications and business authorities. It might be challenging to distinguish between the terms "data sanitization" and "data deletion" because they are frequently used interchangeably.
Data destruction, according to TechTarget, is the act of erasing data from tapes, hard drives, and other electronic devices in order to render it fully unreadable and prevent access or usage for illegal purposes.
However, more is required to certify that the data has genuinely vanished and to meet the majority of data protection laws. Data sanitization and data erasure (a kind of data sanitization) are used in this situation.
Learn more about Data here:
https://brainly.com/question/11941925
#SPJ4
Many real world problems that we encounter including Information Systems problems are wicked in nature. The following statements are TRUE of the wickedness of these problems EXCEPT….
They have clear avenues for solutions that are simple to identify. Wicked problems lack precise problem descriptions, making them ambiguous, complex, and challenging to resolve.
What are some instances of wicked dilemmas in real life?Some of the most difficult and intricate problems of our time—many of which endanger human health—are referred to as "wicked." Examples of such wicked challenges include climate change, biodiversity loss, persistent poverty, the growing obesity pandemic, and food insecurity.
What constitutes a wicked example?adjective a cruel and evil deed In the play, she took on the role of the evil stepmother. After winning, she grinned viciously. Her caustic sense of humour is well recognised. She was a bad case.
To know more about Wicked problems visit:-
https://brainly.com/question/29854616
#SPJ1
Question:
Many real-world problems that we encounter, including Information Systems problems, are wicked in nature. The following statements are TRUE of the wickedness of these problems EXCEPT:
a) They have unclear problem definitions and no definitive solutions.
b) They have multiple and changing constraints.
c) They have well-defined solution paths that can be easily determined.
d) They require a unique approach to every problem instance.
Should you let your computer scan email attachments before opening them? Why?
no you shouldn't
Explanation:
you should just block them and report them
When choosing a new computer to buy, you need to be aware of what operating it uses.
Answer: Size & Form-Factor, Screen Quality,Keyboard quality,CPU, RAM, Storage,Battery Life, USB 3.0, Biometric Security,Build quality.
Explanation:
1 - 7 are the most important for laptops and for desktops 1,3,4,5and 6.
Hope this helped!
Write a program that prints the square of the product. Prompt for and read three integer values and print the square of the product of all the three integers.
Answer:
ok
Explanation:
aprogram that prints the square of the product. Prompt for and read three integer values and print the square of the product of all the three integers. is written below
a program that prints the square of the product. Prompt for and read three integer values and print the square of the product of all the three integers.
When first defining the cloud, NIST gave three service models, which can be viewed as nested service alternatives: software as a service, platform as a service, and _________ as a service.
Answer:
Infrastructure.
Explanation:
In Computer science, Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives. It offers individuals and businesses a fast, effective and efficient way of providing services.
Simply stated, Cloud computing are services or programs located on the Internet, they are usually remote resources making use of cloud storage.
When first defining the cloud, National Institute of Standards and Technology (NIST) gave three (3) service models, which can be viewed as nested service alternatives;
1. Software as a Service (SaaS).
2. Platform as a Service (PaaS)
3. Infrastructure as a Service (IaaS).
According to NIST, the five (5) characteristics of a cloud computing service are;
1. On-demand self-service .
2. Broad network access .
3. Resource pooling .
4. Rapid elasticity .
5. Measured service.
Additionally, the cloud service can either be deployed as private, public, hybrid or community service.
Describe how a computer checks whether the image just taken by the camera matches the scanned photograph.
Answer:
by it scan properly like you use Camara
when we use camara and it have record time like that it also have that type of scan data so that the computer use
sorry I don't no other thing and I an sorry for the very short answer
Implement the ArrayMethod application containing an array that stores eight integers. The application should call the following five methods: 1. display - should display all the integers 2. displayReverse - should display all the integers in reverse order 3. displaySum - should display the sum of the integers 4. displayLessThan - should display all values less than a limiting argument 5. displayHigherThanAverage - should display all values that are higher than the calculated average value.
Answer:
public static void display(int [] arr){
System.out.print("Arrays: ");
for(int i =0;i<arr.length;i++){
System.out.print(arr[i]+" ");
}
System.out.println();
}
public static void displayReverse (int [] arr){
System.out.print("Arrays in reverse order: ");
for(int i=arr.length-1;i>=0;i--){
System.out.print(arr[i]+" ");
}
System.out.println();
}
public static int displaySum (int [] arr){
System.out.print("Sum: ");
int sum = 0;
for(int i =0;i<arr.length;i++){
sum+=arr[i];
}
return sum;
}
public static void displayLessThan (int [] arr, int num){
System.out.print("Less than "+num+": ");
for(int i =0;i<arr.length;i++){
if(arr[i]<num){
System.out.print(arr[i]+" ");
}
}
System.out.println();
}
public static void displayHigherThanAverage (int [] arr){
System.out.print("Higher than average: ");
int sum = 0;
for(int i =0;i<arr.length;i++){
sum+=arr[i];
}
float average = sum/arr.length;
for(int i =0;i<arr.length;i++){
if(arr[i]>average){
System.out.print(arr[i]+" ");
}
}
System.out.println();
}
Explanation:
The methods were written in Java. See attachment for explanation where I used comments to explain each lines.
Note that lines that begin with double slash (//) are comments
Write a similar description of what happens when you print a document.
Full-color printing is achieved by using just four ink colors – Cyan, Magenta, Yellow, and Black or CMYK (see box story below on what the K stands for).
These are called process colors and full-color printing is also called 4-color process printing.
What does it mean to print a document?Printing is the process of printing text and images in large quantities using a master form or template.
It it to be noted that cylinder seals and items such as the Cyrus Cylinder and the Cylinders of Nabonidus are among the oldest non-paper creations using printing.
Learn more about printing:
https://brainly.com/question/21090861
#SPJ1