Assume an int array, candy, stores the number of candy bars sold by a group of children where candy[j] is the number of candy bars sold by child j. Assume there are 12 children in all ,which of the following code could be used to compute the total number of bars sold by the children?

Scanner scan = Scanner.create(System.in); int value1 = scan.nextInt( ); int value2 = scan.nextInt( ); bars[value1] += value2;

1. adds value1 to the number of bars sold by child value2
2. adds 1 to the number of bars sold by child value1 and child value2
3. adds 1 to the number of bars sold by child value1
4. inputs a new value for the number of bars sold by both child value1 and child value2
5. adds value2 to the number of bars sold by child value1

Answers

Answer 1

Answer:

5. adds value2 to the number of bars sold by child value1

Explanation:

First, the code snippet create a Scanner object called scan.

Then it receive user input as value1. It then also receives another user input as value2.

From the question, we are told that candy[j] is the number of candy bars sold by child j. So, value1 represent number of candy bars by child 1 and value2 represent number of candy bars by child 2.

Therefore;

bars[value1] += value2;

adds value2 to the number of bars sold by child value1


Related Questions

A multistep protocol used to identify and control potential threats to food-safety is the

Answers

Answer:

The correct answer to the following question will be "Hazard Analysis Critical Control Point system".

Explanation:

HACCP seems to be a monitoring system or tool that addresses food security via the study or monitoring of chemical and functional dangers from either the processing, acquisition as well as storing of raw materials, to the manufacture, sale of the final item.

Sensitive control points or rewards at the same stage where threats could be avoided, removed, or increasing to appropriate levels.It is indeed a multi-stage protocol or method used only to recognize as well as monitor possible food-safety risks.

The correct answer is Hazard Analysis Critical Control Points (HACCP). It's a systematic approach to identifying, evaluating, and controlling food safety hazards that could potentially cause harm to consumers.

To calculate HACCP, follow these steps:

1. Hazard Identification: Identify potential hazards in the food production process. These can include biological hazards (such as bacteria or viruses), chemical hazards (like pesticides or cleaning agents), and physical hazards (such as glass or metal fragments).

2. Determine Critical Control Points (CCPs): CCPs are specific points in the production process where control can be applied to prevent, eliminate, or reduce identified hazards to safe levels. For example, CCPs could be cooking temperatures, cooling times, or storage conditions.

3. Establish Critical Limits: Define the maximum and minimum values for each CCP that must be met to ensure food safety. These limits are often based on regulatory standards or scientific research.

4. Monitor CCPs: Implement monitoring procedures to regularly check CCPs and ensure they are operating within critical limits. Monitoring can involve physical measurements, visual inspections, or testing methods.

5. Establish Corrective Actions: Develop procedures to take corrective action when a CCP deviates from its critical limit. This may involve adjusting processes, disposing of contaminated food, or conducting additional testing.

6. Establish Verification Procedures: Set up verification procedures to confirm that the HACCP system is working effectively. This can include reviewing records, conducting audits, or testing samples.

7. Establish Record-Keeping and Documentation: Maintain detailed records of the HACCP plan, including hazard analyses, CCPs, monitoring results, corrective actions, and verification activities. Documentation is essential for demonstrating compliance with food safety regulations.

By following these steps, food manufacturers can systematically identify and control potential hazards, ensuring the safety of their products for consumers.

Complete Question:

A multistep protocol used to identify and control potential threats to food-safety is the_______

A utility program that makes a copy of all files or selected files that are in the libraries, contacts, and favorites and on the desktop. a. Disk Cleanup b. File History c. Disk Defragmenter d. VirusScan

Answers

Answer:

File History

Explanation:

File History will always, by default, on an hourly basis, perform a regular backup of all selected files or the entire files in your desktop, document, videos, libraries, contacts, music, and favorites. It is similar to back up and restore which also allows you to perform a backup of your system, drives, and files in the folders.

One of the graphics Emily wants to include in her mailings is an illustration, a line drawing whose size she can increase as much as she wants without affecting its overall quality. Which of the following is the most likely format for this illustration?
A) .gif
B) " · png "
C) .wmf
D) .tiff

Answers

Answer:

C) .wmf

Explanation:

Based on the scenario being described within the question it can be said that the most likely format for this illustration would be a .wmf file. This file extension refers to a Windows MetaFile, which is a file format that usually holds vector images to be used in different microsoft software, and is known for being able to resize the image without affecting it's overall quality.

6. In cell K4, create a formula using the IF function to calculate the interest paid on the mortgage (or the difference between the total payments made each year and the total amount of mortgage principal paid each year). a. The formula should first check if the value in cell H4 (the balance remaining on the loan each year) is greater than 0. b. If the value in cell H4 is greater than 0, the formula should return the value in J4 subtracted from the value in cell D5 multiplied by 12. Use a relative cell reference to cell J4 and an absolute cell reference to cell D5. (Hint: Use 12*$D$5-J4 as the is_true argument value in the formula.) c. If the value in cell H4 is not greater than 0, the formula should return a value of 0.

Answers

Answer: IF(H4>0,12*$D$5-J4,0)

From the question, we are used to create a formula to calculate an interest paid on mortgage using the IF function.

We will start by giving a brief analysis on how to go about this for better understanding. This should help us get to our desired result.

If( H4>0 is the logical test,

then

12*$D$5-J4 is [value_if_true]

0 is [value_if_false]  

so we have : IF(H4>0,12*$D$5-J4,0)

Using this above formula and typing it into cell K4;

we are able to first check if the value in H4 is greater than 0.if is greater,it returns a value in J4  subtracted from the value in cell D5 multiplied by 12but if it is not, it returns a value of 0

[Note] :Absolute referencing of cell D5 means that this will not change while extending this formula to the entire column. Whereas, since cell H4 and J4 have relative cell referencing, these will change relatively as we extend the formula to the entire column.

cheers i hope this helps

a student writes a prgroma to find the factorial of a number. the factorial for a number n is defined as the product of all whole numbers between 1 and n, inclusive. while attempting to find the factorial for 120, the program's output is not what the student expectec. assuming that the program has been corectly written, what is a possible explanation for the incorrect output?

Answers

Answer:

B. Integers may be constrained in the maximum and minimum values that can be represented in a program because of storage limitations.

Explanation:

Since the program has been written correctly by the student and yet the output of the program is not what was expected, then the next possibility is that because of the limitations in storage, the integers may be constrained in the minimum and maximum values capable of being represented when writing a program.

A family preservation program director helps design a study that evaluates the effectiveness of her program to keep children living with their abusive parents by providing the families with daily home visits by social workers. She expects the evaluation to show a dramatic reduction in reported child abuse incidents. Instead, the results show an increase in reported child abuse incidents. The director then concludes that the program was undoubtedly effective, reasoning that there really could not possibly have been an increase in actual abuse due to her program, just an increase in reportage of abuse due to closer monitoring in the daily home visits. The director is committing the error of Group of answer choices illogical reasoning ex post facto hypothesizing selective observation. premature closure of inquiry.

Answers

Answer:

Ex post facto hypothesizing

Explanation:

ex post facto hypothesizing Is invalid in science. It involves making hypothesis after noticing some form of relationship which has been noticed.

The director concluded that the program was undoubtedly effective, and noticed that there really could not possibly have been an increase in actual abuse due to her program. He noticed it was due to an increase in reportage of abuse due to closer monitoring in the daily home visits. This hypothesis validates ex post facto hypothesizing.

While a vector graphic can be scaled larger or smaller with no change in quality, bitmap graphics display optimally only at their original, or ____, length and width. a. native b. natural c. intended d. final

Answers

Answer:

a. native

Explanation:

While a vector graphic can be scaled larger or smaller with no change in quality, bitmap graphics display optimally only at their original, or native, length and width.

Mary wants to run a text ad on the Google Search Network. She's new to text ads and needs to start with the basics. What are the three components of a text ad on the Google Search Network that Mary will need to know?

Answers

Answer:

1. Headline

2. URL

3. Description

Explanation:

The three components of a text ad on the Google Search Network that Mary will need to know are;

1. Headline

2. URL

3. Description

The headline component on Search Network Text Ad provides up to three fields of 30 characters each.

The Uniform Resource Locator (URL) has the domain name and the web resource for addressing documents accessible over the internet.

Given the SQL statement:

CREATE TABLE SALESREP ( SalesRepNo int NOT NULL, RepName char(35) NOT NULL, HireDate date NOT NULL, CONSTRAINT SalesRepPK PRIMARY KEY (SalesRepNo), CONSTRAINT SalesRepAK1 UNIQUE (RepName)
);

we know that _____.

A. None of these statements are true
B. RepName is the primary key
C. RepName is an alternate candidate key
D. RepName is a surrogate key
E. RepName is a foreign key

Answers

Answer:  

C. RepName is an alternate candidate key

Explanation:

The explanation is attached in a document.

Louis is using the Web interface to configure his SOHO home router/access point. At this exact moment, none of his computers are on the wireless network. He goes into a screen called "active clients" only to see that a computer he doesn't recognize is on his network. What should he do?

Answers

Answer:

reassess and add better security to his wireless network

Explanation:

Based on the scenario being described within the question it can be said that Louis should reassess and add better security to his wireless network. This is because this unrecognized client is someone who has entered his home network without authorization. Most likely due to Louis not having the correct or any security on his wireless network.

Which of the following are true?
a. Local variables are created by adding a positive value to the stack pointer
b. A subroutine's stack frame always contains the caller's return address ad the subroutine's local variables
c. A subroutine's prologue code always pushes
d. EBP on the stack Arrays are passed by value to avoid copying them onto the stack

Answers

Answer: False

Explanation:

After saving her presentation initially, Leah realizes she needs to add another content slide. She adds the slide and is ready to save her presentation again. How can she accomplish this task? Check all that apply.
She can press the keys Ctrl+S.
She can press the function key F12.
She can open the File tab and click Save.
She can go to the Backstage view and click Save As.
She can click the Save option in the Quick Access tool bar.

Answers

Answer:

a, c, & e

Explanation:

Answer:

1st, 3rd, and 5th

Explanation:

Chris is a project manager. He would like to schedule a status meeting for the next week. Several of the group members work at another site. What should Chris do?

Answers

Answer:

chris should make a website for everyone

Answer:

set up a meeting and conference call and send the phone number and pass code to the attendees

Explanation:

edge 2021 , have a great day!

There are four ages which drove the advancement of Information Technology: Premechanical; Mechanical; Electromechanical; and "BLANK"
A. Electronic
B. NASA space shuttles

Answers

Answer:

A. Electronics

Explanation:

Because im smart like that

For off campus work study positions, students should contact the

Answers

Answer:

The answer is "financial aid office".

Explanation:

The work studies are a good way for people to raise funds in component-time on-campus jobs for payment for tuition. In off-campus study, it uses financial aid office, that provides learners to chance to gain useful job experiences when they study at university.

It usually works with you even if you have received an admission invitation. In off-campus study work, it uses the department of Financial Aid, in which it is used to find the financial aid office of your school. It can scan the sorted alphabetically lists below.

my old Brainly account stopped working so i made a new one i made it as close as possible to the one i had

Answers

Answer:

congrats

Explanation:

!

Answer:

Kmiller have you contacted brainly support?

Explanation:

What is the purpose of the Excel Function Reference?

Answers

Answer:

Step-by-step explanation:

Answer:

To look up functions and their purposes

Explanation:

Edg

Jonas is an experienced information security professional with a specialized focus on evaluating computers for evidence of criminal or malicious activity and recovering data. Which GIAC certification would be most appropriate for Jonas to demonstrate his abilities?

Answers

Answer:

The answer is "GIAC Certified Forensic Examiner (GCFE)".

Explanation:

The GIAC Accredited Professional Analyst qualification confirms to the expertise of a professional security analysis, via a focus on smaller skills required to obtain and interpret data from computer systems. The GCFE offers a way for experts, which shows the skills, information, and ability to conduct typical event operations like e-discovery, forensics evaluation, and documentation, and web forensic science, and Platforms application monitoring and client behavior.

What is syntax?

rules for using tags correctly in HTML
text containing hyperlinks that can go to other hypertext pages
information about how an element should be used by a web browser
text used to mark text or images on a web page

Answers

Answer: Rules for using tags correctly in HTML.

Explanation:

The syntax is a set of rules for using the tags correctly on the HTML page. Thus option A is correct.

What is the syntax?

The syntax is an arrangement of the words that in phases are sued to create well-formed sentences. The system is an analysis of the language. It shows how the words come with larger units.

In computer the Syntex refers to the programming language and is the set of rule that defines the combination of those symbols that are correctly structured.

Find out more information about the syntax.

brainly.com/question/831003

Your Salesforce organization's Login Hours are set from 7 AM to 7 PM. A user logs in at 6:57 PM and is viewing a record when the clock passes 7 PM. Which of the following scenarios happens once a logged in user is outside of the specified Login Hours for an organization?a.The user can continue to view the page they are currently on, but if they navigate away from the page, they will be logged out.b.The user can continue to edit records, until they manually log out of the systemc.A warning message displays and the user is logged out immediatelyd.The user can continue to work indefinitely, but new users will be unable to log in

Answers

Answer:

The user can continue to view the page they are currently on, but if they navigate away from the page, they will be logged out.

Explanation:

At 7 PM, the user will be effectively logged out of the system but the user will still have access to his current page. Having being logged out of the system, the have the access to perform any DML, read write, execute operation and at the same time the user won't be able to open any new page; navigating away from this page, the user will be notified that they're logged out.

This is possible because the moment the user sends a new request to the server to execute some DMLs or to navigate, the system logs out the user immediately signaling a session expiry .

Conclusively, already logged in users will only have Read-Only access once mode once the Login Hours has elapsed for the organization. No consequent saves or edits can be made to the database, at this point.

What is an IP address and where I can find the IP address for my computer?
a) An IP address is a unique number identification assigned to each computer, server, or device connected to the Internet.
b) To find your IP address, go to Google and type "what is my IP". An IP address is an encrypted name assigned to each computer, server, or device connected to the Internet for identification.
c) To find your IP address you have to type ipaddress in the command prompt window.
d) An IP address is a hexadecimal code identification assigned to each computer, server, or device connected to the Internet.
e) To find your IP address, you have to contact your ISP.
f) An IP address is a series of packets assigned to each computer, server, or device connected to the Internet.
To find your IP address, check the classless interdomain routing.

Answers

Answer:

a) and b) are correct.

Explanation:

You can also type ipconfig on windows terminal to see your ip address - or ifconfig if you are running linux / macos terminal.

If we have a priority queue storing approximately million numbers, and the bottom level is "full", which of the following statements is false? (lower numbers have higher priority) A) The height of the structure is approximately 20. B) The width of the lowest level of the structure is approximately 500,000. C) Nearly half of the 1000 largest values must be in the bottom level of the structure. D) Nearly half of the 1000 smallest values must be in the top half of the tree (if there are k levels in the tree, the "top half" is the top k/2 levels). E) Nearly half of the 1000 smallest values may be in the bottom level of the structure.

Answers

Answer:

The width of the lowest level of the structure is approximately 500,000 is a false statement.

A typical broadcast live events and use streaming technology in which audio and video files are continuously downloaded to your computer while you are listening to and/or viewing the content. G
a. Webcasts
b. Blogs
c. Microblogs
d. Twitter

Answers

Answer:

Webcasts

Explanation:

The rest of the options don't need to be streamed as there isn't a continuous flow of information.

Match the term with its definition and characteristics.
A subset of Machine Learnign that referst to artificial neural networks that are composed of many layers.
Mimic evolutionary precesses to generate increasingly better solutions to a problem. Mutation within a genetic algorithm involve randomly trying combinations and evaluating success (or failure) in order to learn to optimize outcomes.
analyze large quantitied of information to establish patterns and charceristicwd when the logic or rules are unknown.
Include a knowledge based with accumulated experience and a set of rules for aplying the knowledge base to each particular situation.
A subset of Artificial Intelligence that users algorithms to learn iteratively from data and can find insigths without explicit programming.

Answers

Answer:

1. Deep Learning

2. Genetic algorithm

3. Neural network

4. Expert systems

5. Machine Learning

Explanation:

Deep Learning is a subset of Machine Learning that refers to artificial neural networks that are composed of many layers.

Genetic algorithm mimic evolutionary processes to generate increasingly better solutions to a problem. Mutation within a genetic algorithm involve randomly trying combinations and evaluating success (or failure) in order to learn to optimize outcomes.

Neural network analyze large quantities of information to establish patterns and characteristic when the logic or rules are unknown.

Expert systems includes a knowledge base with accumulated experience and a set of rules for applying the knowledge base to each particular situation.

Machine Learning is a subset of Artificial Intelligence that uses algorithms to learn iteratively from data and can find insight without explicit programming.

Linear programming problems have:______.
a. non-linear objective functions, linear constraints.
b. non-linear objective functions, non-linear constraints.
c. linear objective functions, non-linear constraints.
d. linear objective functions, linear constraints.

Answers

Answer:

The correct answer to the following question will be Option D(linear objective functions, linear constraints).

Explanation:

We've already perused that somehow the linear programming issues have become the people that aim to optimize an amount that would be linearly defined in aspects of several judgment parameters.

Even though the title indicates in and of itself, these problems include maximizing the consumption of some of these kinds of nutrient-rich foods that could support one adopt a specific diet. The purpose of a diet issue would be to have a range of foods at a minimal cost that will fulfill a range of regular nutritional requirements.

Constraints: The essential micro-nutrients stated, that may be a minimum consumption of calories or the number of calories including cholesterol throughout the meal.Objective function: The expense of bringing in the meal.

The other three options are not related to the problems of linear programming. So Option D is the right answer.

You've been asked to set up a temporary Internet cafe for a conference your company is hosting. You have ten laptops to use in your cafe and need to keep them from "wandering off" once you have them set up and running. What should you use to help physically secure these laptops?

Answers

Answer: Cable Locks

Explanation:

The cable locks is one of the type of secure device that helps in physically secure the various types of laptops and computer system. The cable lock helps the devices and the confidential information to prevent from theft and it is also known as the versatile security system.   The cable lock is basically warp up in the form of metal cable and we usually insert the this cable lock into the laptop device slot in the system.  

  According to the given question, The cable lock is typically used in the laptop devices that protect and physically secure from the hacking purpose and it is used in the various types of deices such as printers, electronic devices and the laptops.  

In Language C please.When analyzing data sets, such as data for human heights or for human weights, a common step is to adjust the data. This can be done by normalizing to values between 0 and 1, or throwing away outliers.For this program, adjust the values by subtracting the smallest value from all the values. The input begins with an integer indicating the number of integers that follow. Assume that the list will always contain less than 20 integers.Ex: If the input is:5 30 50 10 70 65the output is:20 40 0 60 55The 5 indicates that there are five values in the list, namely 30, 50, 10, 70, and 65. 10 is the smallest value in the list, so is subtracted from each value in the list.For coding simplicity, follow every output value by a space, including the last one.

Answers

Answer:

THE ANSWER IS EASY

Explanation:

Technician A says that if the coefficient of friction is too low, the brakes will grab.


Technician B says that the coefficient of friction is influenced by the materials in contact.


Who is right?

Answers

Answer:

Only Technician B is right

Explanation:

Technician A is wrong because the brakes will grab and cause the wheel to lock up and slide only if the coefficient of friction is too high. If the coefficient of friction is too low, excessive pressure on the brake pedal will be required to stop the vehicle.

Technician B is right the materials in contact is a factor that influences the coefficient of friction. For example, when ice slides on steel, the two materials slide past each other easily, this means that icehas a low coefficient of friction. On the other hand, rubber on pavement has a high coefficient of friction as the materials do not slide past each other easily.

Therefore, only Technician B is right.

Scatterplots are useful when applied behavior analysts are interested in finding out the ________ distribution of the target behavior. In other words, a scatterplot illustrates whether the behavior's occurrence is typically associated with certain time periods.
A. Temporal
B. Amount of
C. Standard
D. Simple

Answers

Answer:

The answer is "Option A".

Explanation:

Scatterplots are kinds of graphs or mathematical plots, that display variables using Algebraic, coordinates for usually dual variables for a set of data. It is an application, that targets an activity, a diffusion graph shows the event, which is normally linked to specific periods, and wrong choices can be described as follows:

In option B, It is incorrect because it is used in shareholders. In option D, It is used in a normal random variable, that's why it is incorrect. In option C, It is incorrect because it is used in the frequency distribution.

Final answer:

The correct answer to the question is A. Temporal, indicating that scatterplots are used in behavior analysis to reveal the temporal distribution of a target behavior and identify patterns associated with different time periods.

Explanation:

Scatterplots are instrumental in behavior analysis because they can reveal the temporal distribution of a target behavior, which suggests when during a certain period the behavior is most likely to occur. The correct answer to this question is A. Temporal. Specifically, a scatterplot allows analysts to see if there's any association between the time of day, week, or month and the frequency of the behavior.

In applied settings such as behavior analysis, scatterplots can indicate if problem behaviors are more prevalent during specific periods, helping to identify potential environmental triggers or showing if interventions are having the desired effect over time. Data visualization through scatterplots also assists in determining the correlation between variables, aiding in data analysis by revealing patterns or trends that might not be obvious from raw data.

As an administrator for the Contoso Corporation, your primary office is in Sacramento and your data recovery site in Las Vegas. You want to install a DHCP server at both locations to provide high availability. Which configuration should be used?

Answers

Answer:

Hot Standby mode failover partner

Explanation:

The configuration you should use as an administrator is the Hot Standby mode failover partner.

Under the Hot standby mode, the partner server is in a standby role, in order to lease IP addresses to DHCP clients if only the active isn't available.

Hence, when the active server is unavailable, the failover partner will be used temporarily.

Other Questions
Norris Co. has developed an improved version of its most popular product. To get this improvement to the market will cost $48 million but the project will return an additional $13.5 million for 5 years in net cash flows. The firm's debt-equity ratio is .25, the cost of equity is 13 percent, the pretax cost of debt is 9 percent, and the tax rate is 21 percent. All interest is tax deductible. What is the net present value of this proposed project An envelope is 3 inches wide, and it measures 7 inches along the diagonal. What is the envelopes length? If necessary, round to the nearest tenth. Find the vertex and the axis of symmetry of the graph f(x) = 3(x + 1)2. What must be included when describing the displacement of an object? points and brainliest! is this a function?true or false a sample of nitrogen gas is at a temperature of 50.0 *C and at a pressure of 2.00 atm. if the volume of the sample remains constant and the pressure increases to 3.20 atm, what is the new temperature of the nitrogen gas? Could there be a food chain without herbivores and carnivores? explain your reasoning. What is the volume of this cylinder?Use n = 3.14 and round your answer to the nearest hundredth. The lifetime of a battery has the exponential distribution with mean 6.9 months. If it fails, I immediately replace it with another if I have one. I need a years supply of the battery. In addition to the one in the flashlight, how many extra should I bring with me? 1, 2, or 3? Harry, Hermione, and Ron formed an S corporation called Dumbledore. Harry and Hermione both contributed cash of $25,000 to get things started. Ron was a bit short on cash but had a parcel of land valued at $60,000 (basis of $50,000) that he decided to contribute. The land was encumbered by a $35,000 mortgage. What tax bases will each of the three have in his or her or his stock of Bumblebee this uses pythagorean theorem A manufacturer of lawn care equipment has introduced a new product. The anticipated demand is normally distributed with a mean of = 100 and a standard deviation of = 50. Each unit costs $75 to manufacture and the introductory price is to be $125 to achieve this level of sales. Any unsold units at the end of the season are unlikely to be very valuable and will be disposed of in a fire sale for $25 each. It costs $10 to hold a unit in inventory for the entire season.A.) What is the cost of overstocking (Co)?B.)What is the cost of understocking (Cu)?C.)What is the optimal cycle service level?D.) How many units should be manufactured for sale? Prepare a 0.50 L of a 1.0 M solution of potassium sulfate. Determine the amount of potassium sulfate needed in correct significant figures.A)68 gB)87 gC)270 gD)349 gI can't figure out the answer. Dr. Thompson researches gang-related crime in a large city. She notices more graffiti appears when there are more ice cream trucks in town. She does a study that measures the frequency of new graffiti being reported and ice cream truck sales for each week over a year. She finds a positive association between ice cream truck sales and graffiti and concludes the ice cream trucks are encouraging graffiti. Her colleague, Dr. Richardson, points out that both ice cream sales and graffiti might be influenced by rising temperatures during the summer. Which kind of problem has Dr. Richardson identified? Choose all that apply. The main organs of the female reproductive system include:uterusVas Deferensovariesfallopian tubesseminiferous tubules What was one way that the Constitution addressed the problem of slavery? A. Congress would pass a law banning slavery in the United States in 1820. B. Slavery issues would be decided for the whole country by popular vote. C. Slavery would not be allowed in any new states that wanted to join the Union. D. Congress was not allowed to pass any laws banning the slave trade before 1808. Imagine living for years without being able to see or hear. Imagine not even knowing what you're unable to do these things because you've never been able to communicate. It's hard for us to imagine the challenges Keller faced. What do you think might be just as difficult as being unable to see or hear? How do I solve this The __________________ asks a simple question: does an agency's function continue to be needed by the state? For each state agency, the legislature sets a date for its abolishment on a twelve-year calendar. The agency is set to be abolished unless legislation is passed to allow that agency to continue to function. GEOMETRY! PLEASE SHOW YOUR WORK.