Which of these are tools used to diagnose and test code? Check all of the boxes that apply.
debugging software
creating data sets
compiler software
error messages

Answers

Answer 1

Answer:

A C D

Explanation:

Answer 2

Answer:

Correct

Explanation:


Related Questions

WHY THE HECK IS BRAINLY SHOWING UNSKIPPABLE ADS!?

I was looking for an answer on brainly and it told me to see an ad. When I clicked on it and waited for the ad to end, it didn't let me skip to the answer. In fact, I doesn't let me through AT ALL. Please fix this.

Answers

I don’t know why you have that

Which of the following is not one of the goals of technical recovery team members during the recovery phase of a BCP? Normalize operations. Restore temporary operations to critical systems. Repair damage done to original systems. Recover damage to original systems.

Answers

Answer:

Repair damage done to original systems

Explanation:

It is imperative that businesses brace up for moments or period of challenges whereby normal operation is impeded due to disruption in standard system condition. The ability of businesses to thrive and continue to deliver in these circumstances is catered for by the business continuity plan. The recovery team ensures that important processes critical to the business are restored in other to ensure that business operation isn't crippled. Once normalcy ahs been restored, the team ensures recoverabke day in the original system are taken care of. The repair of damage done is not a goal of the recovery ohase in the business continuity plan as repairsvare catered for after recovery event has been finalized.

With the addition of electric cars, we have a need to create a subclass of our Car class. In this exercise, we are going to create the Electric Car subclass so that we can override the miles per gallon calculation since electric cars don’t use gallons of gas.
The Car class is complete, but you need to complete the ElectricCar class as outlined in the starter code with comments.
Once complete, use the CarTester to create both a Car and ElectricCar object and test these per the instructions in the CarTester class.
Classes
public class CarTester
{
public static void main(String[] args)
{
// Create a Car object
// Print out the model
// Print out the MPG
// Print the object
// Create an ElectricCar object
// Print out the model
// Print out the MPG
// Print the object
}
}
////////////////////////////
public class ElectricCar extends Car {
// Complete the constructor
public ElectricCar(String model){
}
// Override the getMPG here.
// It should return: "Electric cars do not calculate MPG.
// Override the toString() here.
// (model) is an electric car.
}
//////////////////////////////////
public class Car {
//This code is complete
private String model;
private String mpg;
public Car(String model, String mpg){
this.model = model;
this.mpg = mpg;
}
public String getModel(){
return model;
}
public String getMPG(){
return mpg;
}
public String toString(){
return model + " gets " + mpg + " mpg.";
}
}

Answers


Hey will you please help me with my essay and I’ll get back to yours please ASAP//

When adding several user accounts, you might want to use the newusers utility, which can process a text file full of entries to add user accounts. Use the man or info page to find out how to use this utility, and use it to add three users. When finished, view the /etc/passwd, /etc/shadow, and /etc/group files to verify that the users were added successfully.

Answers

Explanation:

Given - When adding several user accounts, you might want to use the new users utility, which can process a text file full of entries to add user accounts.

To find - Use the man or info page to find out how to use this utility, and use it to add three users.

Proof -

New Users Utility:

It is an utility which reads the file full of usernames and clear text passwords.

It then uses this information to update a group of the existing users to create new users.The format of the file consists of specified things like:

pw - passwd

pw - age

pw - gid

pw - dir

Use of the Utility:

The command is new users filename

The file should look like -

(Username : Password : UID : GID : User Information : Home Directory : Default Shell)

where ,

UID = User Identifier

GID = Group Identifier

Testing the Users:

Creating users from the file given above test User 1, directory Of File

Executing the create user new users directory Of File

Repeat this step to undergo all the users that are been noted down in the file to make them a user in the noted group policy.

Hence,

These are the steps of using the new Users utility.

how do you record your own video game Music and post Them on yt

Answers

Answer:I would try downloading a beat app and making a song,then posting

Explanation:

You should use another electronic and record it from their

b) Set of strings of 0s and 1s whose 5th symbol from left is 1.

Answers

Answer:

...?

Explanation:

Which statement about parallax scrolling is true?

A.
Parallax scrolling distorts the position of the player character when playing the game.
B.
Parallax scrolling involves segmenting the playing area into background layers that move slower than the foreground layers.
C.
Parallax scrolling involves unifying the playing area into a single environment.
D.
Parallax scrolling involves segmenting the playing area into background layers that move faster than the foreground layers.
E.
Parallax scrolling involves segmenting the playing area into background layers and foreground layers that move at the same speed.

Answers

Answer:

The answer is B

Explanation:

I wrote down every slide of this lesson by hand lol. Good luck on the final <3

Write function d2x() that takes as input a nonnegative integer n (in the standard decimal representation) and an integer x between 2 and 9 and returns a string of digits that represents the base-x representation of n.

Answers

Answer:

The function in Python is as follows:

def d2x(d, x):

   if d > 1 and x>1 and x<=9:

       output = ""

       while (d > 0):

           output+= str(d % x)

           d = int(d / x)

       output = output[::-1]

       return output

   else:

       return "Number/Base is out of range"

Explanation:

This defines the function

def d2x(d, x):

This checks if base and range are within range i.e. d must be positive and x between 2 and 9 (inclusive)

   if d >= 1 and x>1 and x<=9:

This initializes the output string

       output = ""

This loop is repeated until d is 0

       while (d > 0):

This gets the remainder of d/x and saves the result in output

           output+= str(d % x)

This gets the quotient of d/x

           d = int(d / x) ----- The loop ends here

This reverses the output string

       output = output[::-1]

This returns the output string

       return output

The else statement if d or x is out of range

   else:

       return "Number/Base is out of range"

Blockquote
The page contains a review within a block quote. Go to the Blockquote Styles section and create a style rule for theblockquote element that sets the background color to rgb(173, 189, 227) and the text color to the rgb(255, 255, 255) with an opacity of 0.65.
For every paragraph within the blockquote element create a style rule that sets the top/bottom padding space to 2.5 pixels and the left/right padding space to 10 pixels.
My Code
/* Blockquote Styles */
blockquote {
background-color:rgb(173,189,227);
color:rgb(255,255,255);
opacity:0.65;
}
blockquote > p {
padding: (2.5, 10, 2.5, 10);
}

Answers

Answer:

I don't knowthe answer

Explanation:

I really don't know the answer

An ISA specifies a word size of 8 bytes, byte addressability, and an address space of 256 K; it uses single-word instructions (i.e. each instruction is a single 8 byte word). What is the size of the MAR

Answers

Answer:

2 bytes

Explanation:

Size of the MAR ( memory address register )  = 18 bits = 2 bytes

Given that

address space = 256 K  = 2^8

number of address location= 2^8  * 2^10       ( where 1K = 2^10 )  

                                              = 2^18

Given the number of address location = 2^18 ;

Hence  18 bits are required to store the address of the instruction

An OpenCL Device is composed of: Group of answer choices Command Queues Platforms Processing Elements Compute Units

Answers

Answer:

Compute Units

Explanation:

A platform can be defined as a computing environment for building and executing sets of code in a software application or program such as an application programming interface (API).

The two parts of the platform used to run an application software are both hardware and software (operating system).

Machine and assembly are referred to as a low level programming language used in writing software programs or applications with respect to computer hardware and architecture. Machine language is generally written in 0s and 1s, and as such are cryptic in nature, making them unreadable by humans but understandable to computers.

OpenCl is an abbreviation for open computing language that runs on CUDA-powered graphics processing units (GPUs). An OpenCL Device is composed of compute units and an OpenCl compute unit typically comprises of processing elements.

Write a function called csv_sum that takes a filename and returns the sum of all of the numbers in the file. The numbers are in csv format. For instance, if the contents of the file are: 12,3,2 -5 10,20,-10,8.3 Then the function should return 40.3.

Answers

Answer:

Explanation:

def csv_sum(filename):

   total = 0

   try:

       f = open(filename)

       for line in f:

           words = line.strip().split(",")

           for word in words:

               total += float(word)

       f.close()

   except FileNotFoundError:

       pass

   return total

Which of these statements regarding mobile games is true?

A.
They are typically played indoors.
B.
They have detailed environments.
C.
Their levels can be completed quickly.
D.
They are typically played for several hours at a time.
E.
They are played on large screens.

Answers

i have a feelings it’s the one that’s about playing for long lengths of time

Answer:

C. The levels can be completed quickly

#PlatoLivesMatter

Explanation:

what is internet? explain help pliz​

Answers

The Internet, sometimes called simply "the Net," is a worldwide system of computer networks -- a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers).

Describe a cellular network, its principle
components and how it works.

Answers

A cellular network is a contact network with a wireless last connection. The network is divided into cells, which are served by at least one fixed-location transceiver station each. These base stations provide network coverage to the cell, which can be used to send voice, data, and other types of information. It's often referred to as a mobile network.

The principal components of the cellular network will be explained below as follows-

BTS (Base Transceiver Station) - It is the most important part of a cell since it links subscribers to the cellular network for data transmission and reception. It employs a network of antennas that are dispersed across the cell.

BSC (Basic Station Controller) - It is a portion that interfaces between Basic Station Controllers and is connected to Basic Station Controllers via cable or microwave links, as well as routing calls between Basic Station Controllers and the MSC (Mobile Switching Center).

MSC (Mobile Switching Center) - The supervisor of a cellular network is linked to several Basic Station Controllers and routes cells between them. It also connects the cellular network to other networks such as the PSTN through fiber optics, microwave, or copper cable.

A cellular network works when the SIM card is organized into geographical cells, each of which has an antenna that transmits to all mobile phones in the city, cellular networks operate by knowing the exact location, which comes from the SIM card. A transmitter generates an electrical signal, which is converted by the transmit antenna into an electromagnetic wave, which is then radiated, and the RF wave is then converted back into an electrical signal. In cellular network networks, four multiple access schemes are used, ranging from the first analog cellular technologies to the most modern cellular technologies.

uses of electric bulbs
in points please​

Answers

Answer:

-in electric circuits

- to produce light

- for heat

- to direct traffic

- in cars

- in houses

thenks and mark me brainliestt pls :))

What is the value of 8n when n= = 2?​

Answers

Answer:

The value of 8n would be 16

8n

8(2)= 16

(uhh this is a math question right? Sorry if it has to deal with tech)

2. What is software conflict?

Answers

Answer:

A problem that occurs when two programs cannot run in the same computer at the same time. It is generally due to a programming bug and typically manifests when two programs compete for the same resource (memory, peripheral device, register, etc.).

Hope it helps out!

Explanation:

The Fibonacci sequence begins with 0 and then 1 follows. All subsequent values are the sumof the previous two, for example: 0, 1, 1, 2, 3, 5, 8, 13. Complete the bonacci() method, whichtakes in an index, n, and returns the nth value in the sequence. Any negative index valuesshould return -1.

Answers

0437818437848484919464689

The first 14 numbers in the Fibonacci sequence are: 0, 1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89, 144, 233. As an illustration, the numbers 3 and 5 that come before the seventh number, 8, sum up to 8.

What is the role of Fibonacci sequence?

Each number in the Fibonacci sequence is equal to the sum of the two numbers before it. The numbers increase slowly. The Fibonacci sequence is the source of the golden ratio of 1.618. The golden ratio of 1.618 is a dimension that is found in many objects in nature.

Many artists believe that this is the ideal canvas proportion. As you pick greater and larger Fibonacci numbers, the fraction that results when you divide each number in the sequence by the one before it (for example, 5/3) approaches the golden ratio.

It is possible to calculate the Fibonacci numbers without needing to calculate all the preceding numbers using a formula employing the golden ratio.

Learn more about Fibonacci sequence here:

https://brainly.com/question/26507758

#SPJ5

What type of software is used to create letters and papers? ​

Answers

Answer:a paper that haven’t been use

Explanation:

help me guys plssssss​

Answers

Answer     The answer is

                                   

                           So hope this was helpful

Explanation:

How can you refer to additional information while giving a presentation? will help you emphasize key points on a specific slide. The Notes section is only to you in the Slide view and not in the main Slide Show view.

Answers

Explanation:

1. welcome your audience and introduce yourself.

2. capture their attention

3. identify your number one goal or topic of presentation.

4. give a quick shout out line of your presentation.

5.

candidates should identify at least three different types of information in any one presentation from text, drawing, images, tables, video ,audio .

What is the default join type? inner self join left outer right outer

Answers

Answer: inner

Explanation: on edg

Answer:

inner

Explanation:

just did it on Edg

hardware and costs of adding two levels of hardware RAID. Compare their features as well. Determine which current operating systems support which RAID levels. Create a chart that lists the features, costs, and operating systems supported.

Answers

Explanation:

1. Redundant batch of Inexpensive Drives (or Disks) (RAID) is a term for data storage schemes that divide and/or replicate data amid multiple hard drives.

2. RAID can be designed to provide increased data accuracy or increased Input/Output performance

Hardware RAID exists as a customized processing system, utilizing various controllers or RAID cards to control the RAID design independently from the OS. Software RAID utilizes the processing capacity of that computer's operating system in which the RAID disks exists installed.

What are the two types of RAID?

We have two kinds of RAID implementation through. Hardware and Software. Both these implementation contains its own benefits and drawbacks.

Software RAID does not count any cost for a RAID controller and exists fairly effortless to estimate the cost of as you exist only buying additional drives. All of our usual dedicated servers come with at least two drives, indicating there exists NO cost for software RAID 1, and stands positively suggested.  It exists positively suggested that drives in a RAID array be of the exact type and size. With RAID 0 or RAID 1, you'd require at least two drives, so you would require to buy one additional drive in most cases. With RAID 5 you'll require at least three drives, so two additional drives, and with RAID 6 or 10 you'd require at least four total drives. To earn additional implementation, redundancy, or disk space, you can count more disks to the collections as well.

To learn more about two types of RAID

https://brainly.com/question/19340038

#SPJ2

Develop a sorting algorithm. Your sorting algorithm may only be an implementation of a the shellsort, mergesort, or quicksort. Your algorithm must use an array of integers of at least 20 different items.

Answers

Answer:

Explanation:

The following function is created in Python and uses a mergesort algorithm implementation in order to sort a given array of integers which is passed as an argument. Once complete it returns the sorted array. This can then be printed in the main method as seen in the attached picture below.

def BrainlySort(arr):

   if len(arr) > 1:

       mid = len(arr) // 2 #First find the middle of the array

       # Divide the array into two sections

       left = arr[:mid]

       right = arr[mid:]

       #Sort each section seperately

       BrainlySort(left)

       BrainlySort(right)

       i = j = k = 0

       # Copy data to temp arrays left[] and right[]

       while i < len(left) and j < len(right):

           if left[i] < right[j]:

               arr[k] = left[i]

               i += 1

           else:

               arr[k] = right[j]

               j += 1

           k += 1

       #Make sure no elements are left in the array

       while i < len(left):

           arr[k] = left[i]

           i += 1

           k += 1

       while j < len(right):

           arr[k] = right[j]

           j += 1

           k += 1

Write an assembly code to implement the y=(x1+x2)*(x3+x4) expression on 2-address machine, and then display the value of y on the screen. Assume that the values of the variables are known. Hence, do not worry about their values in your code.
The assembly instructions that are available in this machine are the following:
Load b, a Load the value of a to b
Add b, a Add the value of a to the value of b and place the result in b
Subt b, a Subtract the value of a from the value of b and place the result in b
Mult b, a Multiply the values found in a and b and place the result in b
Store b, a Store the value of a in b.
Output a Display the value of a on the screen
Halt Stop the program
Note that a or b could be either a register or a variable. Moreover, you can use the temporary registers R1 & R2 in your instructions to prevent changing the values of the variables (x1,x2,x3,x4) in the expression.
In accordance with programming language practice, computing the expression should not change the values of its operand.

Answers

mbly code to implement the y=(x1+x2)*(x3+x4) expression on 2-address machine, and then display the value of y on the screen. Assume that the values of the variables are known. Hence, do not worry about their values in your code.

The assembly instructions that are available in this machine are the following:

Load b, a Load the value of a to b

Add b, a Add the value of a to the value of b and pla

Consider a collection C of subsets of a nite set V . (V; C) is called a hypergraph. A hypergraph (V; C) is 3-regular if every subset in C contains exactly three elements. A subcollection M of C is matching if all subsets in M are disjoint. Show that there exists a polynomial-time 3-approximation for the maximum matching problem in 3-regular hypergraphs as follows: Given a 3-regular hypergraph, find a matching with maximum cardinality.

Answers

Explanation:

polynomial-time 3-approximation for the maximum matching problem in 3-regular hypergraphs as follows: Given a 3-regular hypergraph, find a matching with maximum cardinality.

What is the technology in community​

Answers

Answer:

Community technology is the practice of synergizing the efforts of individuals, community technology centers and national organizations with federal policy initiatives around broadband, information access, education, and economic development. National organizations efforts include: Developing effective language.

Community technology is a principled approach to technology that is grounded in the struggle for a more just digital ecosystem, placing value on equity, participation, common ownership and sustainability. In these activities, participants will use social analysis to understand technologies we use. Hope this helped!

Arrays of structures ________. Group of answer choices None of the above. are automatically passed by reference cannot be passed by reference are automatically passed by value

Answers

Answer:

are automatically passed by reference.

Explanation:

A parameter can be defined as a value that can be passed to a function. Thus, a parameter refers to a value that must be passed into a function, subroutine or procedure when it is called.

This value can be passed to a function either by reference or by value.

This ultimately implies that, parameter variable stores information which is passed from the location of the method call directly to the method that is called by the program.

Basically, parameters can serve as a model for a function; when used as an input, such as for passing a value to a function and when used as an output, such as for retrieving a value from the same function.

In Computer programming, an array can be defined as data structure which comprises of a fixed-size collection of variables each typically holding a piece of data and belonging to the same data type such as strings or integers.

This ultimately implies that, when a programmer wishes to store a group of related data (elements) of the same type, he or she should use an array.

A character positions in arrays start counting with the number 0 not 1.

Hence, an array uses a zero-based indexing and as such the numbering or position of the characters (elements) starts from number 0. Thus, the first character (element) in an array occupies position zero (0), the second number one (1), the third number two (2) and so on.

Generally, arrays of structures are automatically passed by reference through the use of a REPLICATE function.

Evaluation of your strengths and weaknesses
a. Self Assessment b. Employee
c. Entrepreneurship d. Entrepreneur

Answers

いt  背lfまyべラテぇrべit is a lolololol idek ima just stop

Other Questions
Thoreau argues that the best type of government is one that is subordinate to the people. He supports this idea by saying, "Let every man make known what kind of government would command his respect, and that will be one step toward obtaining it." What is the primary weakness of this passage? A. The chosen quote does not directly support the claim. B. The quote is incorrectly incorporated into the passage. C. The idea in the quote conflicts with the claim. D. The claim is too subjective. 11. The kidneys retain water if blood pressure is too low. The kidneys act as what aspect of the blood pressure feedback loop?O A. EffectorO B. HormoneO C. ControllerO D. Sensor A = {prime numbers between 4 and 25} B = {odd numbers less than 16} List the outcomes of A, B and explain? List the outcomes of A, B and explain? The image below better explains it. Thank you. Why did Spain control the economy of its American Empire In 1942 On January 1, 2021, Summer Fashions Corp. awarded restricted stock units (RSUs) representing 5 million of its $1 par common shares to key personnel, subject to forfeiture if employment is terminated within three years. After the recipients of the RSUs satisfy the vesting requirement, the company will distribute the shares. On the grant date, the shares had a market price of $9.00 per share. The journal entry to record the lifting of restrictions on the RSUs and issuing shares at December 31, 2023, would include a: Answer pleasseee, and explain how you got it. If two connected points objects pass through the same set of three points, the shapes created by each will be identical, regardless of the order in which each object was plotted. True False Hey,Jane. Where_____you yesterday? ou own a portfolio that has $2,700 invested in Stock A and $3,800 invested in Stock B. Assume the expected returns on these stocks are 12 percent and 18 percent, respectively. What is the expected return on the portfolio A particle moves along the x-axis with the given acceleration function a(t) = 8t - 6, initial position s(0) = 2, and initial velocity v(0). Find the position function. the auto parts department of an automotive dealership sends out a mean of 66 special orders daily. what is the probability that, for any day, the number of special orders sent out will be no more than 33 PLS help asap, brainliest goes to whoever properly explains their answer! (i know the answer is x=3 but i don't know how to get there)Wendell is looking over some data regarding the strength, measured in Pascals (Pa), of some building materials and how the strength relates to the length. The data are represented by the exponential function f(x) = 2x, where x is the length. Explain how he can convert this equation to a logarithmic function when strength is 8 Pascals. PLEASE I NEED HELP!!! NO LINKS!! During the Korean War, who joined in the fight against the UN forcesmaking an Allied victory impossible? Which of the following is an example of biodiversity?an undersea foresta single thriving populationmany different species living togethera population on the verge of extinction What is the slope of the line passing through the points (1 5/7) and (2 2/7) please help me pleaseeee The Persistent GardenerIt was Jilly's last day in the green house. Summer was coming to an end and so was the growing season. School would be starting next week and the fall plants were well enough along to allow Mrs. T. to manage the greenhouses herself. As Jilly worked the plants for the last time, she tried to focus on the new school year instead of the details of the greenhouse. It had been a hard, hot summer, but Jilly was not ready for it to be over.Jilly moved down the tables, tucking a stray hair behind her ear with a gloved and already dirty hand. She'd repotted the last of the rosemary plants and mixed a new batch of potting soil already. Mrs. T. now had enough potting soil to last her through September. Jilly looked at a couple of maiden-hair ferns that were beginning to yellow in their small pots. She loved their lacey fronds and had grown concerned over the last few days that they needed repotting or a boost of fertilizer. She had also worried that she would continue to find chores that needed doing, plants that needed help, right up until the minute she left today. She hated unfinished things. She hated details not being tended to.The sun had been above the trees and blasting the greenhouse for a good hour now. Jilly listened for the familiar whirr of the automatic vents opening. When the greenhouse reached a certain temperature, the vents would open automatically. The vents would have a cooling effect for an hour or so, and then no amount of breeze would put a dent in the heat. Mrs. T. often claimed Jilly must be part reptile as she was able to work longer in the greenhouse than anyone else. The heat just didn't bother her. In fact, Jilly often looked forward to the warmth of the greenhouse and feeling the heat seep into her bones. It felt good to her, but she understood others who found it hard to breathe in 100 degree temperatures.Jilly heard the greenhouse door bang, and looked up from her ferns to see Mrs. T. walking down the aisle with a tray of young plants. Mums, Jilly supposed, the flowers everyone wants for fall. She had helped Mrs. T. take cuttings and plant the small stems in new pots. They were doing nicely from the look of things."We will keep these in here for now," said Mrs. T. "They are getting too much rain outside."It had been a rainy couple of days. Jilly knew, as well as anyone, that overwatering could kill potted plants quickly."Do you remember when I overwatered those mint plants?" Jilly asked Mrs. T."I used to think no one could kill a mint plant," Mrs. T. said, laughing."Well I am full of surprises, apparently," Jilly replied. Jilly remembered the sad green plants that just kept looking more and more wilted no matter how much water she gave them. It was a beginner's mistake, and Jilly had been so embarrassed for making it."That you are," replied Mrs. T. "But I know you learned a lesson you won't ever forget.""Of course. Herbs like their roots damp, not flooded," Jilly answered."Well that is not the lesson I was thinking of," Mrs. T. said.Jilly wondered for a minute what the lesson could be. She straightened the rows of geraniums in front of her, picking up one or two to check for aphids under the leaves. It had been a summer full of lessons, some especially hard for a girl who thought she knew a lot about plants. She breathed deeply the warm, humid air. She hated the cooped up feeling of air conditioned air, the feeling of being cut off from the sun. She knew school and the library would offer only these uncomfortable feelings and little time to spend in the sun or with plants. She had come to understand this over the summerher need to be around growing things was huge."I'm not sure, Mrs. T." she said, "I've learned so much this summer. I couldn't possibly say what you are thinking.""You did learn many lessons, Jilly. You knew so much when you started. You've gone farther than any other assistants I've had. I will miss you.""And I will miss you," Jilly replied. "Thank you for the opportunity and the job." Jilly watched Mrs. T. put the tray of mums down on the center row of tables. Wearing her familiar brown apron, Mrs. T. looked just as she had on Jilly's first day."My pleasure, of course, dear," Mrs. T. replied. "My hope for you, as for all my assistants over the years, is that you will learn as much about yourself as you do about growing plants."Recalling her thoughts all morning, about what she enjoyed about her summer job, Jilly realized she knew much more than just how to not drown the mint.Which line from the text best explains the lesson Jilly has learned over the summer? Jilly had been so embarrassed for making it. She straightened the rows of geraniums in front of her. Her need to be around growing things was huge. She loved their lacey fronds. NO LINKSWhat is the surface area of a cylinder with a height of 20 meters and a diameter of 10 meters? O A) 1884 m2 OB) 863 m2 OC) 353.25 m2 OD) 785 m2 23. If 7th graders dont _______________responsibility for their own learning, they will not pass. Nobodyknows ______________ it will rain today.