what was the pascaline used for?​

Answers

Answer 1

Answer:

Math like multiplication, addition, division, and subtraction


Related Questions

In the context of the data administration component of a database management system (DBMS), the acronym CRUD stands for _____.

Answers

CRUD is an acronym in database management system (DBMS) that stands for Create, Read, Update, and Delete.

CRUD is an acronym in database management system (DBMS) that stands for Create, Read, Update, and Delete. It is the four basic functions of persistent storage.

CRUD operations are foundation operations every database developer and administrator needs to understand.

Find out more on CRUD at: https://brainly.com/question/651396

Buddys machine shop has a kiosk computer located in the lobby for customers to use. The kiosk computer has recently been updated to Windows 10 from Windows 7 and is not part of a domain. The local computer policy created for Windows 7 has been applied to Windows 10. This policy severely restricts the use of the computer, so that customers can only use the web browser.
Occasionally, an administrator needs to sign in to the kiosk computer to perform maintenance and update software. However, this is awkward because the administrator needs to disable settings in local policy be performing any task. Then, when the tasks are complete, the administrator needs to re-enable the settings in the local policy. Explain how this system can be improved upon.

Answers

If your PC's are in an Active Directory domain, you can leverage Active Directory Group Policies to deploy the appropriate settings. Be sure to include the below settings in your Group Policy for the user accounts and workstations that will be running as a Kiosk. After creating this Group Policy, you can test by running gpupdate /force and then restarting the PC.

User Configuration
Administrative Templates
Start Menu and Taskbar
Change Start Menu power button (enabled) - set to "Lock" (I know this sounds weird, but Windows 7 won't completely disable Logoff if the Start Menu power button is defaulting to the Logoff action).
Remove Logoff on the Start Menu (enabled)
Remove and prevent access to the Shut Down, Restart, Sleep and Hibernate commands (enabled)
System
Ctrl+Alt+Del Options
Remove Lock Computer (enabled)
Remove Logoff (enabled)
Computer Configuration
Administrative Templates
System
Logon
Hide entry points for Fast User Switching (enabled)
For Windows PCs not in a Domain Environment

If your PC's are not in an Active Directory domain, then you'll need to make the below changes manually at each Kiosk PC. Note that you may be able to automate the changes via the use of operating system imaging tools and local mandatory user profiles - leave a comment below if you have interest in those steps.

Login at each Kiosk PC using a user account that will ultimately be used to run the Kiosk desktop applications.
Launch the Windows Registry Editor (REGEDIT.EXE) and make the following changes to the registry (note that you may need to temporarily grant local Administrative access to your Kiosk user account to do this if it is already in a very locked down state)
HKEY_CURRENT_USER
SOFTWARE
Microsoft
Windows
CurrentVersion
Policies
Explorer

Write a program that generates 100 random numbers and keeps a count of how many of those random numbers are even and how many of them are odd.

Answers

Answer:

import random

numbers = []

even = 0

odd = 0

for i in range(100):

   numbers.append(random.randint(1, 200))

for i in range(100):

   if numbers[i] % 2 == 0:

       even += 1

   else:

       odd += 1

print("Even:", even)

print("Odd:", odd)

Explanation:

Gg ez.

Write a description about this picture

Answers

Answer:

A cube which has holes in it, represented by circles and it has an oval/sphere on top of the figure

Explanation:

Answer: A Square with circular holes and a tall round circle/torus sticking out of the top circle hole in all there are 6 circular holes 1 square and 1 tall round circle/torus

Explanation:

Im sorry if this isnt what you meant if it isnt i can try again

Which of the following is NOT an arithmetic operator?

Answers

Considering the available options, the choice that is NOT an arithmetic operator is "]."

What is Arithmetic Operator?

Arithmetic Operator is the term used in computer science to describe the mathematical function that takes two operands while making calculations.

Arithmetic Operators are generally used for arithmetic and sequential calculation.

Major Arithmetic Operators

+ (addition), - (subtraction), * (multiplication), / (division), % (modulo).++ Autoincrement−− Autodecrement

Hence, in this case, it is concluded that the correct answer is "]."

The available options are:

a.+

b.-

c. *

d. ]

Learn more about Arithmetic Operator here: https://brainly.com/question/5973382

13) You notice that the row labels in your spreadsheet are 1, 2, 3, 8, 9.
Row labels 4 through 7 are missing. What could cause this?

Answers

Possible reasons for missing out row 4 to 7 are as follows,

Chance of rows from 4 to 7 contain incorrect/ non formatted data.Chance of rows from 4 to 7 are in hidden state.Chance of rows from 4 to 7 are assigned to some other user which does not belongs to your current user.Chance of rows from 4 to 7 were deleted from the sheet.

These are all the possible reasons for missing of row 4 to 7.

Learn more:  https://brainly.com/question/24504878

What is it called when a unique letter is assigned to a shared drive

Answers

Answer:

Assigning a drive letter to a network drive is called mapping the drive, or linking the drive, by network nerds.

Explanation:

I have a D in one of my majors, I got a lot of 70s and I'm failing music. im in middle school. Will I be held back? Please answer this

Answers

Answer:

probably sorry it will be okay

Depends on where you’re from and what grading scale is used. I wouldn’t say you’re ruined if you push hard the rest of the year.

"""
Multiply.py - This program prints the numbers 0 through 10 along
with these values multiplied by 2 and by 10.
Input: None.
Output: Prints the numbers 0 through 10 along with their values multiplied by
2 and by 10.
"""
head1 = "Number: "
head2 = "Multiplied by 2: "
head3 = "Multiplied by 10: "
NUM_LOOPS = 10 # Constant used to control loop.
print("0 through 10 multiplied by 2 and by 10" + "\n")
# Initialize loop control variable.
# Write your counter controlled while loop here
# Multiply by 10.
# Multiply by 2.
print(head1 + str(numberCounter))
print(head2 + str(byTwo))
print(head3 + str(byTen))
# Next number.
Summary
In this lab, you use a counter-controlled while loop in a Python program. When completed, the program should print the numbers 0 through 10, along with their values multiplied by 2 and by 10. The data file contains the necessary variable declarations and output statements.
Instructions
Make sure the file Multiply.py is selected and opened.
Write a counter-controlled while loop that uses the loop control variable (numberCounter) to take on the values 0 through 10.
In the body of the loop, multiply the value of the loop control variable by 2 and by 10. Remember to change the value of the loop control variable in the body of the loop.
Execute the program by clicking the "Run Code" button at the bottom of the screen.

Answers


head1 = "Number: "
head2 = "Multiplied by 2: "
head3 = "Multiplied by 10: "
NUM_LOOPS = 10 # Constant used to control loop.

print("0 through 10 multiplied by 2 and by 10" + "\n")

# Initialize loop control variable.
# Write your counter controlled while loop here
# Multiply by 10.
# Multiply by 2.
x = 0
while(x<11):
print(head1 + str(x))
print(head2 + str(x*2))
print(head3 + str(x*10))
x += 1
# Next number.

what is office course
how to learn office course

Answers

Answer:

It includes Word, to create, polish, and share documents; Excel, to analyze and visualize data; PowerPoint, to create, collaborate, and effectively present ideas; OneNote, to organize ideas into a digital notebook; Outlook, to organize email, coordinate schedules, and stay up to date with contacts; Access, to create .

Hope this helps you XD ✌️

During boom times, which of the
following is true?
A. less tax revenue is being paid by businesses
B. less tax revenue is being paid by consumers
C. more tax revenue is being collected from businesses
and consumers
D. tax increases are causing unemployment and job
loss

Answers

During boom times, the option that was true is that less tax revenue is being paid by businesses.

How does the taxation system can boom a economy?

The use of taxation is one that affect incentives, as taxes can influence supply and demand factors.

Note that by lowering marginal tax rates on wages and salaries, can bring about the zeal for people to work more and earn more.

Therefore, During boom times, the option that was true is that less tax revenue is being paid by businesses.

Learn more about  boom times from

https://brainly.com/question/26020324

#SPJ2

Consider our authentication protocol 4.0, in which Alice authenticates herself to Bob, which we saw works well (i.e., we found no flaws in it.). Now suppose that at the same time that Alice authenticates herself to Bob, Bob must authenticate himself to Alice. Give a scenario by which Trudy, pretending to be Alice, can now authenticate herself to Bob as Alice.

Answers

According to protocol 4.0, the scenario can be defined in terms of Bob, Alice and Trudy as follows:

The communication is done between Bob and Alice only in whom they share a secret key KAB with each other. The Trudy is an intruder who wants to get the information that is being communicated between Alice and Bob. To do so, Trudy wants Bob to initiate the communication by authenticating herself her Alice. Thus, Trudy waits for the Bob to start in-order to make the Bob authenticate himself.

Here are the steps how the communication is done between the Bob and Trudy:

Step 1: Bob starts the communication by himself to other side and waits for the reply.

Step 2: Trudy starts to disguise as Alice herself and authenticate herself to Bob.

Step 3: After looking at the reply, Bob sends the nonce key to Trudy. At this step, still Trudy does not know the KAB(R) in-order to reply to Bob.

Step 4: At this point Trudy response to the step-1 while Bob still continuing to authentication. Trudy picks the nonce for the Bob to encrypt the message with the Bob sent nonce in the Step-3.

Step 5: Now Bob completes his own authentication to himself on the other side of encrypting the nonce he sent at step 4. Where, Trudy gets the nonce key KAB( R).

Step 6: Now, Trudy completes her authentication in responding to R that is sent by Bob in step 3. At this point, Trudy has responded properly, so Bob thinks that he is communicating with Alice(Trudy).

The actual scenario with respect to above steps, the communication is done as follows:

Bob: “I am Bob”

Trudy: “I am Alice”

Bob: “R”

Trudy: “R”

Bob: “KAB (R )” – Bob completes his authentication.

Trudy: Get the KAB (R ) – Trudy complete her authentication.

Thus, the communication is started between the Bob and Trudy instead of Bob and Alice according to protocol 4.0.

how many MB are there in 1000 KB?

Answers

Answer:

1 megabyte

Explanation:

Ok so there should be 1

What is important to know from a software development perspective about this topic and its relationship with traditional operating systems? How does developing the software for each platform differ? How is it similar?

Answers

What is important to know from a software development perspective about this topic and its relationship with traditional operating systems? How does ...

Yvonne is matting a series of photos as an anniversary gift for her parents. She hopes that they will cherish this gift for years to come but is concerned because she can’t afford the really nice mat board. What is Yvonne MOST LIKELY worried about?

A.
that the mat will turn black

B.
that the mat will take over the picture

C.
that the mat will disintegrate

D.
that the mat will discolor and deteriorate

Answers

Answer:

That the mat will discolor and deteriorate

Explanation:

D

Yvonne will most likely worry that the mat will discolor and deteriorate. The correct option is D.

What is matting in photos?

Matting is a decorative border that surrounds the artwork. It is typically built of mat board, a type of board designed specifically for this purpose. After cutting the mat board to size, one or more holes (entries) are cut in the mat board to act as windows for displaying art.

Matting is the technique of separating an image's foreground and background components. Typically, the photos are of a frame or a video file. It adds a decorative edge to the print and a mechanism for hanging the photo.

Matting involves using a front or window mat to separate the image from the frame's glass and to give an extra border around the photo.

Therefore, the correct option is D. that the mat will discolor and deteriorate.

To learn more about matting in photos, refer to the link:

https://brainly.com/question/28279935

#SPJ2


• R7.9 Write enhanced for loops for the following tasks.
a. Printing all elements of an array in a single row, separated by spaces.
b. Computing the maximum of all elements in an array.
2. Counting how many elements in an array are negative.

Answers

Answer:

a is the correct answer

Explanation:

correct me if I'm wrong hope it's help thanks

Alexis plans to stop trading once she lose 5% of her account balance, her account balance is $215.00. How much money is she willing to lose ?

Answers

Answer:

She's willing to lose $10.75.

Explanation:

$215.00 * .05 = answer

         or

$215.00 * .95 = x

$215.00 - x = answer

Write a program that simulates applying a "boost" to a spaceship in a spaceship race game.
A spaceship makes progress by getting a "boost" value between 0 and 10. The boost value
is determined from generating a random number between 0 and 10. Assuming the starting
distance of the spaceship is 0, the program will output the boost value and the total
distance travelled by the spaceship after applying the boost. (Note: Two newlines are output
after the final output of the program).
When a random seed value of 2 is used, the output of the program will look like:
Boost: 6
Distance travelled: 6

Answers

Programming languages can be used to simulate several scenarios; in this case, the "boost"

The simulating program in C++ where comments are used to explain each line is as follows:

#include<iostream>

#include<cstdlib>

#include<ctime>

using namespace std;

int main() {

 // This sets the seed to time(0)

 srand(time(0));

 // This generates a random number between 0 and 10, to represent the boost

 int boost = rand()%10;

 // This prints the required outputs

 cout << "Boost: " << boost;

 cout << "\nDistance travelled: " << boost;

 return 0;

}

Read more about similar programs at:

https://brainly.com/question/16240699

A hybrid data mart ________ data from a data warehouse as well as other data collection systems. It incorporates a top-down approach, end-user inputs, and enterprise-level integration. g

Answers

Answer:

Hybrid Data Marts

A hybrid data mart allows you to combine input from sources other than a data warehouse. This could be useful for many situations, especially when you need ad hoc integration, such as after a new group or product is added to the organization.

We can use a hybrid data mart to mix data from sources other than a data warehouse, and the further discussion can be defined as follows:

Hybrid Data Marts:

It could be useful in a variety of scenarios, particularly when informal integration is required, like when a new group or product is added to the organization.

We can use a hybrid data mart to combine data from various sources other than a data warehouse. It's a structure or access pattern that retrieves client-specific data in data warehouse environments. This data mart is a subset of a data warehouse that is typically focused on a particular business line or functional area.

Therefore, the final answer is "separates".

Find out more about the Hybrid Data Marts here:

brainly.com/question/13989635

What was the main limitation of computer networking that the invention of the Robert website of the 1990s

Answers

Answer:

The TCP/IP protocol could only be used in universities, governments, and businesses. People around the world could not send data to one another.

Filtering is a function of _____.

Answers

The answer is: switches.

Explanation:

Filtering is a function of switches.

state an application that would be better to write c++ than java and give a rationale for your answer

Answers

Microsoft Visual Studio is the best deal

write a code for a program in which the parent had to ask from user that how many child user wants to create and then it should fork that many Childs?

Answers

Answer:

//same program different code

#include<stdio.h>

#include<unistd.h>

#include<stdlib.h>

int main()

{

   int pid;

   pid=fork();

   if(pid<0)

   {

       printf("\n Error ");

       exit(1);

   }

   else if(pid==0)

   {

       printf("\n Hello I am the child process ");

       printf("\n My pid is %d ",getpid());

       exit(0);

   }

   else

   {

       printf("\n Hello I am the parent process ");

       printf("\n My actual pid is %d \n ",getpid());

       exit(1);

   }

}

Explanation:

Following are the program to the given question:

Program Explanation:

Include header file.Defining the main method.Defining an integer variable "n, i", after defining this use "n" to the input value.In the next step, a loop is declared that uses if block that checks fork value equal to 0, in which it calls the sleep method and prints its value.At the last, it calls the wait method.  

Program:

#include<stdio.h>//header file

#include<sys/types.h>

#include<sys/wait.h>

#include<unistd.h>

int main()//defining the main method

{

   int n,i;//defining an integer variable

   printf("Enter the number of child to be created:"); //print message

   scanf("%d", &n);//input value in n

   for(i=0;i<n;i++) // defining a loop that use if block with the frok method to print value  

   {

       if(fork() == 0)//use if that check fork method value equal to 0

       {

           sleep(3);//calling sleep method

           printf("[child] pid %d from [parent] pid %d\n",getpid(),getppid());//print message

       }

   }

   wait(NULL);//calling wait method

   return 0;

}

Output:

Please find the attached file.

Learn more:

brainly.com/question/17925458

Consider the following declaration:
String s = "cat";
Which of the following statements assigns the number of characters in s to k?

A. int k = s.length;
B. int k = s.length();
C. int k = s.size;
D. int k = s.size();

Consider the following declarations:
String s1 = "apple";
String s2 = "apple";
What is the result of s1.compareTo(s2)?

A. true
B. false
C. 0
D. 1

Consider the following declarations:
String s1 = "apple";
String s2 = "APPLE";
Which of the following expressions is true?

A. s1.equals(s2) && s1.equalsIgnoreCase(s2)
B. !s1.equals(s2) && s1.equalsIgnoreCase(s2)
C. s1.equals(s2) && !s1.equalsIgnoreCase(s2)
D. !s1.equals(s2) && !s1.equalsIgnoreCase(s2)

Answers

Answer:

B, C, B

Explanation:

According to my understanding of these questions, these are in Java.

For the first one, there is a built in function called .length() for a string, so it's answer B.

For the second one, this should come out as C, 0 since compareTo compares the ascii values of the characters.

The third one's answer should be B. s1.equals(s2) for characters that are caps and not caps comes out with false, so ! would negate it. s1.equalsIgnoreCase(s2) would come out as true, ignoring the cases of APPLE.

Provide your own examples of the following using Python lists. Create your own examples. Do not copy them from another source. Nested lists The “*” operator List slices The “+=” operator A list filter A list operation that is legal but does the "wrong" thing, not what the programmer expects Provide the Python code and output for your program and all your examples.

Answers

Lists are used in Python to hold multiple values in one variable

(a) Nested list

A nested list is simply a list of list; i.e. a list that contains another list.

It is also called a 2 dimensional list.

An example is:

nested_list = [[ 1, 2, 3, 4]  , [ 5, 6, 7]]

(b) The “*” operator

The "*" operator is used to calculate the product of numerical values.

An example is:

num1 = num2 * num3

List slices

This is used to get some parts of a list; it is done using the ":" sign

Take for instance, you want to get the elements from the 3rd to the 5th index of a list

An example is:

firstList = [1, 2 ,3, 4, 5, 6, 7]

secondList = firstList[2:5]

The “+=” operator

This is used to add and assign values to variables

An example is:

num1 = 5

num2 = 3

num2 += num1

A list filter

This is used to return some elements of a list based on certain condition called filter.

An example that prints the even elements of a list is:

firstList = [1, 2 ,3, 4, 5, 6, 7]

print(list(filter(lambda x: x % 2 == 0, firstList)))

A valid but wrong list operation

The following operation is to return a single list, but instead it returns as many lists as possible

def oneList(x, myList=[]):

   myList.append(x)

   print(myList)

oneList(3)

oneList(4)

Read more about Python lists at:

https://brainly.com/question/16397886

A user is following the instructions of a help desk technician and is attempting to launch System File Checker from the command-line interface. Each time the user types sfc /scannow and presses Enter, the utility fails to run, and an error appears stating the command must be run using an elevated command prompt.

Answers

The user must open the command-line interface using Run as administrator.

List the four types of computer cases

Answers

Answer:

full-tower, mid-tower, mini-tower, and SFF(Small Factor Form).

I hope it helps.

This is the answer. Hope it’s helpful

how to count binary ? Help Better understand this question

Answers

Explanation:

For each row in the picture, you have to switch on some of the bits to create the number on the left.

Each bit has a value, a "weight" so to speak. By switching on the bit, you add that weight to the sum.

These "weights" are shown at the top row.

So to create 4, it's easy, you just switch on the '4' bit.

Same for 128, only one bit has to be switched on.

40 is a bit more involved, now you have to switch on 32 and 8, since 32+8 is 40.

For every number, there is exactly one combination of switched on bits to create that number. In the case of 40, the binary representation is:

00101000.

You have just purchased a brand new Windows 8 computer. What should you do right away with the Administrator account?

Answers

The correct answer is:

Enable EFS for the account

write a short paragraph (three to four sentences) that explains how it works for computers and internet communications in relation to cybersecurity.

Answers

Answer:

Public and private keys form the basis for public key cryptography, also known as asymmetric cryptography. In public key cryptography, every public key corresponds to only one private key. Together, they are used to encrypt and decrypt messages. If you encode a message using a person’s public key, they can decode it using their matching private key.

Explanation:

Change up the wording.

Other Questions
Which model best shows the movement of oxygen during photosynthesis?Plant A. AtmosphereO B. Soil - PlantC. Plant - SoilD. Plant - Atmosphere AYUDA DOY CORONA, DEBO ENTREGARLA HOY A LAS 6:00 P.MNecesito descomponer este prrafoUn presente se olvid del pasadoPero pronto Cali empez a verse como un gigante que expanda sus tentculos sin control, se vio henchido y sometido por sus propias fuerzas. En un abrir y cerrar de ojos, entre 1933 y 1958, aument cinco veces su poblacin. Los defensores de la ciudad de hierro no previeron la marea de inmigrantes que llegaron a recorrer las calles y a trabajar en las fbricas. La ciudad en expansin se sali de las manos de sus administradores. Aqu y all se extendan invasiones, barrios piratas y barrios clandestinos. Algunos bordearon la zona del ro y en pocas de invierno sufrieron inundaciones.Urbanizaciones piratas vendieron lotes en tierras inestables sin suministro de agua ni alcantarillado. El crecimiento desmedido de la ciudad de hierro desbord la capacidad de la vieja Cali. El precio del suelo se elev y quienes no podan comprar tierra se fueron a vivir a las altas pendientes del occidente, cerca a las minas de carbn que explotaban para alimentar el ferrocarril. En 1953, la ciudad, constreida y rebasada, empez a buscar maneras de tomar las aguas del ro Cauca y explotar sus tierras aledaas. Para contener las inundaciones construyeron un jarilln en el oriente de la ciudad, crearon canales para la recoleccin de aguas lluvias y estaciones de bombeo.En los aos siguientes Cali continu su expansin desbordada. Miles de inmigrantes llegaban en busca de empleo, otros terminaron desplazados por la violencia en el campo y se asentaron a pelear un espacio en la gran urbe. Muchas comunidades negras llegaban desde los asentamientos del pacfico y el norte del Cauca, mientras comunidades campesinas venan desde parcelas precarias saqueadas por la violencia.Pronto las empresas debieron extender nuevas redes de acueducto y alcantarillado. Al ro Cauca empez a llegar el 70% de las aguas sucias de Cali. Todos los residuos fecales, industriales y hospitalarios vertidos a las alcantarillas desembocaban en las aguas del ro Cauca. Para mitigar el dao y explotar las tierras inundables que bordeaban el cauce, la CVC, la entidad protectora de las aguas y la contaminacin ambiental de la regin, construy un extenso canal que interceptaba los ros Lili, Melndez y Caaveralejo. Estos a su vez ya haban sido interceptados por nuevos sectores de la ciudad y usados como depsitos de desperdicios. Buscaban que los ros desembocaran sobre el canal y que en l se produjera una corriente de agua menor a la corriente natural para que los contaminantes se dispersaran tras su llegada al ro Cauca.Tambin los administradores de los servicios pblicos buscaron un lugar para arrojar las toneladas de basura que, a diario, produca la nueva ciudad de hierro. En 1967 escogieron el suroriente y sobre un antiguo cauce del ro, en una zona de humedal, dispusieron doce mil metros cuadrados, con una profundidad de veinte metros bajo el nivel del mar, para arrojar todos los desechos de la ciudad. Le llamaron el basuro de Navarro, un gigante colector de descomposicin. Complete the sentences with although/in spite of/because/because of 1.She wasn't wearing a coat.It was quite cold A depreciation adjustment would include a debit to _____________________ and __________________________ to _______________ A factory produces wrenches. The factory wants all of itswrenches to weigh the same, but will accept a certain level of er-ror. The inequality below describes the error they are willing toaccept, in pounds: At a local company, 15% of the employees are women. every day, 9% of them bring their lunch to work, while only 3% of the men bring lunch. Find the probability that a randomly selected employee a. is a woman goven that the person brings their lunch to work.b. brings their lunch to work given that person is a woman.c. is a woman given that the person brings their lunch to work. how do Christians play the role of John the Baptist Two kids, Albert and Bhara, are 20.0 m apart. Albert sees a soccer ball 25.0 m away. If the angle between the line formed by Albert and Bhara and the line from Albert to the soccer ball is 25 degrees, how far is Bhara from the soccer ball? Correctly round your answer to the nearest tenth of a meter. nentWhich expressions are equivalent to 7-2.76?Choose 2 answers:W13 minA727-2icalsB 767-27-12z 25D(72)2molitvin the perimeter of a square is less than or equal to 50 find the range of the value of the length of the square What is the exact value of the trigonometric expression? tan (7/4)a) -2/2b)1c)-1d)2/2 Is it illegal in california to eat raw oranges in bathroom? WHERE ARE THE EXPERTS AND ACE!!!!!!! I NEED HELP PLS SHARE YO SMARTNESS!!!!! WILL GIVE BRAINLIEST AND RATE AND VOTE!!! what is the role of reward and punishmet in learning? Can someone help me with these question book is Piketty fever bigger than Marx No files Due in 10 mins match the work of art with their characteristic Which is a true statement about air quality?Good air quality is shown by high levels of smog.Bacteria is a major cause of poor air quality.Water treatment plants measure the air quality.The EPA measures air pollution levels daily. Which of the following numbers creates a Pythagorean Triple? (12,16, ___ ) ? Do you think that an abusive person can change ? How ? U looking for BRAINLIEST? I'll give it to the first person to get it rightWhat is the shape of the distribution shown below?A: The distribution is skewed to the left.B: The distribution is approximately symmetrical.C: The distribution is skewed to the right.