Which cable standard is a standard for newer digital cable, satellite, and cable modem connections?

Answers

Answer 1

Answer:

Coaxial cable

Explanation:


Related Questions

What is the full form of 'Rom

Answers

Answer:

Read-only memory

Explanation:

Read-only memory is a type of non-volatile memory used in computers and other electronic devices. Data stored in ROM cannot be electronically modified after the manufacture of the memory device.

A signal has a wavelength of 1 11m in air. How far can the front of the wave travel during 1000 periods?

Answers

Answer:

A signal has a wavelength of 1 μm in air

Explanation:

looked it up

Write a program that will input miles traveled and hours spent in travel. The program will determine miles per hour. This calculation must be done in a function other than main; however, main will print the calculation. The function will thus have 3 parameters: miles, hours, and milesPerHour. Which parameter(s) are pass by value and which are passed by reference

Answers

def calculations(miles, hours):
milesPerHour = miles / hours
return milesPerHour

def main():
miles = input("Enter Miles driven: ")
hours = input("Enter Travel Hours: ")
print(calculations(miles, hours))

if __name__=='__main__':
main()

Suppose you design a banking application. The class CheckingAccount already exists and implements interface Account. Another class that implements the Account interface is CreditAccount. When the user calls creditAccount.withdraw(amount) it actually makes a loan from the bank. Now you have to write the class OverdraftCheckingAccount, that also implements Account and that provides overdraft protection, meaning that if overdraftCheckingAccount.withdraw(amount) brings the balance below 0, it will actually withdraw the difference from a CreditAccount linked to the OverdraftCheckingAccount object. What design pattern is appropriate in this case for implementing the OverdraftCheckingAccount class

Answers

Answer:

Strategy

Explanation:

The strategic design pattern is defined as the behavioral design pattern that enables the selecting of a algorithm for the runtime. Here the code receives a run-time instructions regarding the family of the algorithms to be used.

In the context, the strategic pattern is used for the application for implementing OverdraftCheckingAccount class. And the main aspect of this strategic pattern  is the reusability of the code. It is behavioral pattern.

Computer programming

Answers

Here is the answer for the question

By using your own data, search engines and other sites try to make your web experience more personalized. However, by doing this, certain information is being hidden from you. Which of the following terms is used to describe the virtual environment a person ends up in when sites choose to show them only certain, customized information?

A filter bubble

A clustered circle

A relational table

An indexed environment

Answers

I believe it is a filter bubble

Answer:

A filter bubble

Explanation:

An External Style Sheet uses the ________ file extension.

Answers

Answer:

css file extension

Explanation:

The question is straightforward and requires a direct answer.

In web design and development, style sheets are written in css.

This implies that they are saved in .css file extension.

Hence, fill in the gap with css

Select all the sets that are countably infinite. Question 3 options: the set of real numbers between 0.1 and 0.2 the set of all negative integers greater than negative 1 trillion the set of integers whose absolute values are greater than 1 billion the set of integers that are multiples of 27 the set of all java and C programs

Answers

Answer:

1.  the set of real numbers between 0.1 and 0.2

2. the set of all negative integers greater than negative 1 trillion

3.  the set of all java and C programs

Explanation:

A set is countable if it is either finite or has the same cardinality as the set of positive integers. The inverse of this set type is uncountable.

The set of real numbers between 0.1 and 0.2, all negative integers greater than negative 1 billion, and a set of java and C programs are all countable sets, so are considered countably infinite.

The sets that should be considered as the countably infinite.

1.  the set of real numbers between 0.1 and 0.2

2. the set of all negative integers greater than negative 1 trillion

3.  the set of all java and C programs

What is set?

The set should be considered as the countable in the case when it could be either finite or contain a similar kind of cardinality just like the positive integers set. The inverse of this type of set should be considered as the non-countable. The set of the real numbers should be lies between the 0.1 and 0.2, all negative integers should be more than negative 1 billion, the st of java and c program should be considered as the countable sets

Learn more about set here: https://brainly.com/question/17506968

Under which command group will you find the options to configure Outlook rules?
O Move
O New
O Quick Steps
O Respond

Answers

Answer:

Move

Explanation:

I hope that helps :)

Answer:

a). move

Explanation:

edge 2021 <3

Which of the following is step two of the Five-Step Worksheet Creation Process?

Answers

Answer:

Add Labels.

As far as i remember.

Explanation:

Hope i helped, brainliest would be appreciated.

Have a great day!

   ~Aadi x

Add Labels is step two of the Five-Step Worksheet Creation Process. It helps in inserting the data and values in the worksheet.

What is label worksheet in Excel?

A label in a spreadsheet application like Microsoft Excel is text that offers information in the rows or columns around it. 3. Any writing placed above a part of a chart that provides extra details about the value of the chart is referred to as a label.

Thus, it is Add Labels

For more details about label worksheet in Excel, click here:

https://brainly.com/question/14719484

#SPJ2

. Suppose an instruction takes 1/2 microsecond to execute (on the average), and a page fault takes 250 microseconds of processor time to handle plus 10 milliseconds of disk time to read in the page. (a) How many pages a second can the disk transfer? (b) Suppose that 1/3 of the pages are dirty. It takes two page transfers to replace a dirty page. Compute the average number of instructions between page fault that would cause the system to saturate the disk with page traffic, that is, for the disk to be busy all the time doing page transfers.

Answers

Answer:

a. 100.

b. 31500.

Explanation:

So, we are given the following data which is going to help in solving this particular question.

The time required to execute (on the average) = 1/2 microsecond , a page fault takes of processor time to handle = 250 microseconds and the disk time to read in the page = 10 milliseconds.

Thus, the time taken by the processor to handle the page fault = 250 microseconds / 1000 = 0.25 milliseconds.

The execution time = [ 1/2 microseconds ]/ 1000 = 0.0005 milliseconds.

The number of Pages sent in a second by the disc = 1000/10 milliseconds = 100.

Assuming U = 1.

Hence, the disc transfer time = [2/3 × 1 } + [ 1/3 × 0.25 milliseconds + 15 ] × 2.

=0.667 + 15.083.

= 15.75 millisecond.

Average number of instruction = 15.75/0.0005 = 31500.

It should be noted that the number of pages in a second will be 100 pages.

From the information given, it was stated that the instruction takes 1/2 microsecond to execute and a page fault takes 250 microseconds of processor time to handle plus 10 milliseconds of disk time to read the page.

Therefore, the execution time will be:

= 0.5/1000

= 0.0005

Therefore, the number of pages will be:

= 1000/10

= 100

Also, the disc transfer time will be;

= (2/3 × 1) + (1/3 × 0.25 + 15) × 2

= 0.667 + 15.083

= 15.75

Therefore, the average number of instructions will be:

= 15.75/0.0005

= 31500

Learn more about time taken on:

https://brainly.com/question/4931057

__________ type of storage is very popular to store music, video and computer programs.
i am doing my homework plzz fast​

Answers

Answer:

Optical storage devices.

Explanation:

Optical storage device are those devices that read and store data using laser. To store data in optical storage devices low-power laser beams are used. It is a type of storage that stores data in an optical readability medium.

Examples of the optical storage device includes Compact disc (CD) and DVD.

The optical storage device is popular in storing data of music, videos, and computer program. Therefore, the optical storage device is the correct  answer.

write essay about pokhara​

Answers

Explanation:

Pokhara is the second most visited city in Nepal, as well as one of the most popular tourist destinations. It is famous for its tranquil atmosphere and the beautiful surrounding countryside. Pokhara lies on the shores of the Phewa Lake. From Pokhara you can see three out of the ten highest mountains in the world (Dhaulagiri, Annapurna, Manasalu). The Machhapuchre (“Fishtail”) has become the icon of the city, thanks to its pointed peak.

As the base for trekkers who make the popular Annapurna Circuit, Pokhara offers many sightseeing opportunities. Lakeside is the area of the town located on the shores of Phewa Lake, and it is full of shops and restaurants. On the south-end of town, visitors can catch a boat to the historic Barahi temple, which is located on an island in the Phewa Lake.

On a hill overlooking the southern end of Phewa Lake, you will find the World Peace Stupa. From here, you can see a spectacular view of the lake, of Pokhara and Annapurna Himalayas. Sarangkot is a hill on the southern side of the lake which offers a wonderful dawn panorama, with green valleys framed by the snow-capped Annapurnas. The Seti Gandaki River has created spectacular gorges in and around the city. At places it is only a few meters wide and runs so far below that it is not visible from the top

Pokhara is a beautiful city located in the western region of Nepal. It is the second largest city in Nepal and one of the most popular tourist destinations in the country. The city is situated at an altitude of 827 meters above sea level and is surrounded by stunning mountain ranges and beautiful lakes. Pokhara is known for its natural beauty, adventure activities, and cultural significance.

One of the most famous attractions in Pokhara is the Phewa Lake, which is the second largest lake in Nepal. It is a popular spot for boating, fishing, and swimming. The lake is surrounded by lush green hills and the Annapurna mountain range, which provides a stunning backdrop to the lake.

Another popular attraction in Pokhara is the World Peace Pagoda, which is a Buddhist stupa located on top of a hill. The stupa is a symbol of peace and was built by Japanese Buddhist monks. It provides a panoramic view of the city and the surrounding mountains.

The city is also known for its adventure activities, such as paragliding, zip-lining, and bungee jumping. These activities provide a unique and thrilling experience for tourists who are looking for an adrenaline rush.

In addition to its natural beauty and adventure activities, Pokhara is also significant for its cultural heritage. The city is home to many temples, such as the Bindhyabasini Temple, which is a Hindu temple dedicated to the goddess Bhagwati. The temple is located on a hill and provides a panoramic view of the city.

Overall, Pokhara is a city that has something to offer for everyone. It is a perfect destination for those who are looking for natural beauty, adventure activities, and cultural significance. The city is easily accessible by road and air, and is a must-visit destination for anyone who is planning to visit Nepal.

Define and use in your program the following functions to make your code more modular: convert_str_to_numeric_list - takes an input string, splits it into tokens, and returns the tokens stored in a list only if all tokens were numeric; otherwise, returns an empty list. get_avg - if the input list is not empty and stores only numerical values, returns the average value of the elements; otherwise, returns None. get_min - if the input list is not empty and stores only numerical values, returns the minimum value in the list; otherwise, returns None. get_max - if the input list is not empty and stores only numerical values, returns the maximum value in the list; otherwise, returns None.

Answers

Answer:

In Python:

def convert_str_to_numeric_list(teststr):

   nums = []

   res = teststr.split()

   for x in res:

       if x.isdecimal():

           nums.append(int(x))

       else:

           nums = []

           break;

   return nums

def get_avg(mylist):

   if not len(mylist) == 0:

       total = 0

       for i in mylist:

           total+=i

       ave = total/len(mylist)

   else:

       ave = "None"

   return ave

def get_min(mylist):

   if not len(mylist) == 0:

       minm = min(mylist)

   else:

       minm = "None"

   return minm

def get_max(mylist):

   if not len(mylist) == 0:

       maxm = max(mylist)

   else:

       maxm = "None"

   return maxm

mystr = input("Enter a string: ")

mylist = convert_str_to_numeric_list(mystr)

print("List: "+str(mylist))

print("Average: "+str(get_avg(mylist)))

print("Minimum: "+str(get_min(mylist)))

print("Maximum: "+str(get_max(mylist)))

Explanation:

See attachment for complete program where I use comment for line by line explanation

What techniques overcome resistance and improve the credibility of a product? Check all that apply.
Including performance tests, polls, or awards
Listing names of satisfied users
Sending unwanted merchandise
Using a celebrity name without authorization

Answers

Answer: Including performance tests, polls, or awards.

Listing names of satisfied users

Explanation:

For every business, it is important to build ones credibility as this is vital on keeping ones customers and clients. A credible organization is trusted and respected.

The techniques that can be used to overcome resistance and improve the credibility of a product include having performance tests, polls, or awards and also listing the names of satisfied users.

Sending unwanted merchandise and also using a celebrity name without authorization is bad for one's business as it will have a negative effect on the business credibility.

describe the major elements and issues with agile development​

Answers

Answer:

water

Explanation:

progresses through overtime

37) Which of the following statements is true
A) None of the above
B) Compilers translate high-level language programs into machine
programs Compilers translate high-level language programs inton
programs
C) Interpreter programs typically use machine language as input
D) Interpreted programs run faster than compiled programs​

Answers

Answer:

B

Explanation:

its b

Answer:

A C E

Explanation:

I got the question right.

Explain 2 ways in which data can be protected in a home computer??

Answers

Answer:

The cloud provides a viable backup option. ...

Anti-malware protection is a must. ...

Make your old computers' hard drives unreadable. ...

Install operating system updates. ...

At a coffee shop, a coffee costs $1. Each coffee you purchase, earns one star. Seven stars earns a free coffee. In turn, that free coffee earns another star. Ask the user how many dollars they will spend, then output the number of coffees that will be given and output the number of stars remaining. Hint: Use a loop

Answers

Answer:

Explanation:

The following is written in Python, no loop was needed and using native python code the function is simpler and more readable.

import math

 

def coffee():

   dollar_amount = int(input("How much money will you be using for your purchase?: "))

   free_coffees = math.floor(dollar_amount / 7)

   remaining_stars = dollar_amount % 7

   print("Dollar Amount: " + str(dollar_amount))

   print("Number of Coffees: " + str(dollar_amount + free_coffees))

   print("Remaining Stars: " + str(remaining_stars))

Consider the following:

calc = 3 * 5 + 4 ** 2 - 1
What is the base for the exponent?


8

4

5

3

Answers

Answer:

3 * 5 + 4 ** 2 - 1 = 5

Explanation:

3 * 5 = 15 + 4 ** 2 = 76 - 1 = 75

The exponent of a number shows how many times a base integer should be multiplied. It is represented as a tiny number in the top right corner of a base number, and the further calculation can be defined as follows:

Given:

[tex]\bold{calc = 3 * 5 + 4 ** 2 - 1}[/tex]

Calculation:

[tex]\bold{calc = 3 \times 5 + 4^2 - 1}\\\\\bold{calc = 15 + 16 - 1}\\\\\bold{calc = 15 + 15 }\\\\\bold{calc = 30 }\\\\[/tex]

The given code is a part of the python program, in which we use the power expression. It implies that one "*" symbol is used to multiply the value and "**" and two symbols are used for calculating the power value.

Therefore, the answer is "4".

Learn more:

brainly.com/question/9857728

Part 1 of 4 parts for this set of problems: Given an 4777 byte IP datagram (including IP header and IP data, no options) which is carrying a single TCP segment (which contains no options) and network with a Maximum Transfer Unit of 1333 bytes. How many IP datagrams result, how big are each of them, how much application data is in each one of them, what is the offset value in each. For the first of four datagrams: Segment

Answers

Answer:

Fragment 1: size (1332), offset value (0), flag (1)

Fragment 2: size (1332), offset value (164), flag (1)

Fragment 3: size (1332), offset value (328), flag (1)

Fragment 4: size (781), offset value (492), flag (1)

Explanation:

The maximum = 1333 B

the datagram contains a header of 20 bytes and a payload of 8 bits( that is 1 byte)

The data allowed = 1333 - 20 - 1 = 1312 B

The segment also has a header of 20 bytes

the data size = 4777 -20 = 4757 B

Therefore, the total datagram = 4757 / 1312 = 4

Write a SELECT statement that returns these columns from the Orders table: The CardNumber column The length of the CardNumber column The last four digits of the CardNumber columnWhen you get that working right, add the column that follows to the result set. This is more difficult because the column requires the use of functions within functions. A column that displays the last four digits of the CardNumber column in this format: XXXX-XXXX-XXXX-1234. In other words, use Xs for the first 12 digits of the card number and actual numbers for the last four digits of the number.selectCardNumber,len(CardNumber) as CardNumberLegnth,right(CardNumber, 4) as LastFourDigits,'XXXX-XXXX-XXXX-' + right(CardNumber, 4) as FormattedNumberfrom Orders

Answers

Answer:

SELECT

CardNumber,

len(CardNumber) as CardNumberLength,

right(CardNumber, 4) as LastFourDigits,

'XXXX-XXXX-XXXX-' + right(CardNumber, 4) as FormattedNumber

from Orders

Explanation:

The question you posted contains the answer (See answer section). So, I will only help in providing an explanation

Given

Table name: Orders

Records to select: CardNumber, length of CardNumber, last 4 digits of CardNumber

From the question, we understand that the last four digits should display the first 12 digits as X while the last 4 digits are displayed.

So, the solution is as follows:

SELECT ----> This implies that the query is to perform a select operation

CardNumber, ---> This represents a column to read

len(CardNumber) as CardNumberLength, -----> len(CardNumber) means that the length of card number is to be calculated.

as CardNumberLength implies that an CardNumberLength is used as an alias to represent the calculated length

right(CardNumber, 4) as LastFourDigits, --> This reads the 4 rightmost digit of column CardNumber

'XXXX-XXXX-XXXX-' + right(CardNumber, 4) as FormattedNumber --> This concatenates the prefix XXXX-XXXX-XXXX to the 4 rightmost digit of column CardNumber

as FormattedNumber implies that an FormattedNumber is used as an alias to represent record

from Orders --> This represents the table where the record is being read.

what does the
command do

Answers

Please specify your question.

Chris recently received an array p as his birthday gift from Joseph, whose elements are either 0 or 1. He wants to use it to generate an infinite long superarray. Here is his strategy: each time, he inverts his array by bits, changing all 0 to 1 and all 1 to 0 to get another array, then concatenate the original array and the inverted array together. For example, if the original array is [0,1,1,0] then the inverted array will be [1,0,0,1] and the new array will be [0,1,1,0,1,0,0,1]. He wonders what the array will look like after he repeat this many many times.

He ask you to help him sort this out. Given the original array pp of length ????n and two indices a,b (????≪????≪????, means much less than) Design an algorithm to calculate the sum of elements between a and b of the generated infinite array p^, specifically, ∑????≤????≤????p????^. He also wants you to do it real fast, so make sure your algorithm runs less than O(b) time. Explain your algorithm and analyze its complexity.

Answers

Answer:

its c

Explanation:

Goal: The campus squirrels are throwing a party! Do not ask. They need you to write a method that will determine whether it will be successfull (returns true) or not (returns false). The decision will be based on int values of the two parameters "squirrels" and "walnuts" representing respectively the number of squirrels attending the party and the numbers of walnuts available to them. The rules for making that determination are detailed below. Variables declarations & initialization: Boolean variable named "result", initialized to false. Steps for the code: First, if less than 1 squirrel attends, then "result" is assigned false. Else, we consider the following conditions: If we have less than, or exactly, 10 squirrels attending: Then: If we have less than 15 walnuts, Then: "result" is set to false. Else: if we have less than, or exactly, 30 walnuts Then: "result" is set to true. Else: "result" is set to false. Else: If less than, or exactly, 30 squirrels are attending Then: If the number of walnuts is more or equal to twice the number of squirrels attending Then: "result" is set to true Else: "result" is set to false Else: If the number of walnuts is equal to 60 plus the number of squirrels attending minus 30 Then: "result" is set to true Else: "result" is set to false

Answers

Answer:

Following are the code to the given question:

#include<iostream>// header file

using namespace std;

int main()//main function

{

   int squirrels, walnuts;//defining integer variable

   bool result = false;  //defining a bool variable that holds a false value

   cout<<"Enter the number of squirrels"<<endl;//print message

   cin>>squirrels;   // input integer value

   cout<<"Enter the number of walnuts"<<endl;//print message

   cin>>walnuts;  // input integer value

   if(squirrels < 1)//use if variable that checks squirrels value less than 1

   {    

       result = false;//use result variable that holds false value

   }

   else//defining else block

   {

       if(squirrels <= 10)//use if variable that checks squirrels value less than equal to 10

       {

           if(walnuts < 15) //use if variable that checks walnuts value less than 15

               result = false;//use result variable that holds false value

           else if(walnuts <= 30)//use elseif block that checks walnuts less than equal to 30

               result = true; //use result variable that holds true value

           else //defining else block

           result = false;//use result variable that holds false value

       }

       else if(squirrels <= 30)//use elseif that checks squirrels value less than equal to 30

       {

           if(walnuts >= 2*squirrels) //use if block to check walnuts value greater than equal to 2 times of squirrels

               result = true; //use result variable that holds true value

           else//defining else block

               result = false;//use result variable that holds false value

       }

       else if(walnuts == 60 + squirrels - 30)//using elseif that checks walnuts value equal to squirrels

           result = true;//use result variable that holds true value

       else //defining else block

           result = false;//use result variable that holds false value

       }

       if(result)//use if to check result  

           cout<<"True";//print True as a message

       else  //defining else block

           cout<<"False";//print False as a message

       return 0;

}

Output:

Enter the number of squirrels

10

Enter the number of walnuts

30

True

Explanation:

In this code, two integer variable "squirrels and walnuts" and one bool variable "result" is declared, in which the integer variable use that input the value from the user-end, and inside this the multiple conditional statements is used that checks integer variable value and use the bool variable to assign value as per given condition and at the last, it uses if block to check the bool variable value and print its value.

what is the address of the first SFR (I/O Register)​

Answers

Answer:

The Special Function Register (SFR) is the upper area of addressable memory, from address 0x80 to 0xFF.

Explanation:

The Special Function Register (SFR) is the upper area of addressable memory, from address 0x80 to 0xFF.

Reason -

A Special Function Register (or Special Purpose Register, or simply Special Register) is a register within a microprocessor, which controls or monitors various aspects of the microprocessor's function.

How are BGP neighbor relationships formed
Automatically through BGP
Automatically through EIGRP
Automatically through OSPF
They are setup manually

Answers

Answer:

They are set up manually

Explanation:

BGP neighbor relationships formed "They are set up manually."

This is explained between when the BGP developed a close to a neighbor with other BGP routers, the BGP neighbor is then fully made manually with the help of TCP port 179 to connect and form the relationship between the BGP neighbor, this is then followed up through the interaction of any routing data between them.

For BGP neighbors relationship to become established it succeeds through various phases, which are:

1. Idle

2. Connect

3. Active

4. OpenSent

5. OpenConfirm

6. Established

Research: Using the Internet or a library, gather information about the Columbian Exchange. Takes notes about the specific goods and diseases that traveled back and forth across the Atlantic, as well the cultural and political changes that resulted. Pay special attention to the indigenous perspective, which will most likely be underrepresented in your research.

Answers

Answer:

Small pox, cacao, tobacco, tomatoes, potatoes, corn, peanuts, and pumpkins.

Explanation:

In the Columbian Exchange, transportation of plants, animals, diseases, technologies, and people from one continent to another held. Crops like cacao, tobacco, tomatoes, potatoes, corn, peanuts, and pumpkins were transported from the Americas to rest of the world. Due to this exchange, Native Americans were also infected with smallpox disease that killed about 90% of Native Americans because this is a new disease for them and they have no immunity against this disease. Due to this disease, the population of native Americans decreases and the population of English people increases due to more settlement.

what is a case in programming​

Answers

Answer:

A case in programming is some type of selection, that control mechanics used to execute programs :3

Explanation:

:3

discuss the term business information SYSTEMS ​

Answers

Answer:

Business information systems provide information that organizations use to manage themselves efficiently and effectively, typically using computer systems and technology. Primary components of business information systems include hardware, software, data, procedures (design, development, and documentation) and people.

Explanation:

Hope It Help you

Other Questions
This is worth 16 points if you show work you will get the Brainliest answer if your unable to show work type it for your explanation plz ( no links ) 100 points!!These passages reflect that in this society being a loony is...A religionA diseaseA professionA crime Which is the best example of a digital leader sharing information?Nina creates a budget spreadsheet and e-mails it to her boss before a meeting.Erick conducts a survey on a street corner and copies his notes for his boss. Rehana buys a newspaper ad and asks people to text ideas to her boss.Fernando draws a blueprint at a meeting and e-mails his boss about it.HELP! Evaluate.0.2 power of 4 = How is relative age different from absolute age Jessie spent a total of 14.00 to purchase a gift and have it gift-wrapped and mailed. The cost for the postage was $2.25, and she knows the gift itself cost $9.50. PLEASE HELP, QUICK. I would appreciate the help 1. Mitosis is a nuclear division that ?the chromosome number A car is 160 inches long. A truck is 10% longer than the car.How long is the truck? someone help, please this is due today, and its delta math if someone can help me Find the value for m-10 + 59 = 5m = 7 + 3m How does this picture use ethos Please help and how would I draw it ?What is the area of a circular region with a 20-ftdiameter?A)22571 in 2B)1007 ft2C) 4007 ft2D) 2251 ft2Please help and how would I draw it ? Which of the following statements gives the best explanation ofmovement in Earth's tectonic plates? (8.9B) Help me pleaseeeeeee how much is 14 pennies? Two triangles are similar. The corresponding sides have a ratio of 2:5. If the larger triangle has a side length of 55 centimeters, what is the measurement of the corresponding side of the smaller triangle?A.33 cmB. 22C.27D.19cm Rodell wants to find the favorite gaming app among the students at his school. He decides to poll the thirty students on his football team and the fifteen students on his basketball team to gather the data. What is wrong with Rodells method for collecting his data?Rodell only polled fellow athletes; this sample does not represent nonathletes at the school.Rodell needs a larger sample size than two sports teams to represent a whole school.Rodell polled everyone on his teams; he should have only polled every other student for it to be a true sample.Rodells polling method only included fall and winter sports; he should have also included a spring sport like baseball. Find the radius of a circle with a diameter of 16 Question 17 of 48intSection: MathQuestion:If a plane can climb at 2.400 feet per minute, how many minutes are needed to climb to 60,000 feet?