Software built and delivered in pieces is known as

Answers

Answer 1

Answer:

Incremental technique is the way in which software is built and delivered in pieces. The concept is to keep the client and developer on same page and the client is known as a non tech person, so he should be given software in piece by piece to avoid any confusion and sudden change.

Agile method is the best example of this technique in which steps are defined on contract basis and the software is delivered and build by pieces to keep client and developer on same page.

Answer 2

Software delivered in pieces is associated with the Agile Method and iterative development, allowing for a product to be enhanced over time with new features and updates.

Software built and delivered in pieces is commonly known as iterative development or incremental delivery, which is a core principle of the Agile Method. This approach contrasts with traditional software delivery, where a complete and final version is provided to the user. With Agile, developers can release a basic version of an application, such as a game or app, and then continuously add features and updates over time. The idea is to deliver a product step by step, enhancing its functionalities based on user feedback and changing requirements.

Iterative development is possible through the Agile Method, which emphasizes the quick delivery of small, workable pieces of software rather than waiting to deliver a complete and potentially outdated product. New features can be added, and changes can be made dynamically, which is highly beneficial in an environment where customer needs are constantly evolving. This method embraces flexibility and focuses on rapid delivery of high-quality, usable chunks of functionality.


Related Questions

"A Windows laptop is being used by a teacher in an outdoor (but protected by an overhang) setting. What setting would ensure that the laptop will not go into hibernate mode during the presentation?"

Answers

1.Click the battery btn and go into power option.

2.Go into "When to turn off display" from left side bar menu.

3.And select for brightness drop down as never dims the display.

This will make the display turn on, no matter if the PC keyboard btn or mouse hower is clicked or not.

Who needs to approve a change before it is initiated? (Select TWO.)


-Change board


-Client or end user


-CEO


-Personnel manager


-Project manager

Answers

Final answer:

Changes must typically be approved by the Change board and the Project manager before being initiated. Input from stakeholders such as clients or end users is also valuable for buy-in, but formal approval is usually from specific governing entities.

Explanation:

The individuals or groups that need to approve a change before it is initiated typically include the Change board and the Project manager. The Change board, also known as a change advisory board (CAB), is responsible for assessing and approving significant changes to ensure they align with the project's goals and the organization's strategic direction. The Project manager is accountable for the successful execution of the project and must ensure that any changes fit within the project's scope, budget, and timeline.

The involvement of other stakeholders such as the Client or end user may be required depending on the nature of the project and the organizational structure. The Client or end user is crucial for providing buy-in, as their feedback validates the relevance and potential impact of the change on the final deliverables. Input from stakeholders at all levels is essential, yet the formal approval typically rests with specific entities tasked with governance.

Each organization has different protocols, and depending on the size and type of organization, other roles such as the CEO or Personnel manager can be involved; however, typically their approval is not required for initiating changes unless stipulated by the organizational policies.

Invalid length parameter passed to the LEFT or SUBSTRING function (below)".
How can this be handled?

LEFT(U.FULLNAME,charindex(',', U.FULLNAME)- 1) AA, CHARINDEX(LEFT(U.FULLNAME,charindex(',', U.FULLNAME)- 1), P.Project_Name) CCOUNT

Answers

This error occurs when the number of arguments sent to the function are not equal ( greater or less ) to the parameters of the function.

For example:

// if the function is

void a_function(int a, int b){

// does some computations

}

// Now when i will call it as

a_function(3);

// Same error as you are getting will occur because the function expects 2 //argements and i am passing one.

Same will happen if i will call it as:

a_function (1,2,3);

Here i am passing one extra argument.

So, i will suggest to count the left function parameters and the arguments you are passing here in this function and you will find the mistake.

Write the definition of a class PlayListEntry containing: An instance variable title of type String, initialized to the empty String. An instance variable artist of type String, initialized to the empty String. An instance variable playCount of type int, initialized to 0.

Answers

// Making c++ class

class PlayListEntry{

string title;

// We cannot initialize it here in C++, ...or in many other languages as wellas i //am writing c++ class

// so i will initialize them in constructor.

string artist;

int playCount;

PlayListEntry(){

// we will initialize the variable in constructor so that they will have the desired //value when you will instantiate the class

title = ' ';

artist = ' ';

playCount = 0;

}

};

The definition of a class PlayListEntry containing: An instance variable title of type String, initialized to the empty String  

The Program

private String artist = "";

   private int playCount = 0;

}

The class PlayListEntry has three instance variables: title of type String, artist of type String, and playCount of type int. These variables are initialized to empty strings ("") for title and artist, and 0 for playCount.

The class provides a blueprint for creating objects that represent entries in a playlist, with each entry containing information about the title, artist, and the number of times it has been played.

Read more about programs here:

https://brainly.com/question/30783869

#SPJ6

An array of int named a that contains exactly five elements has already been declared and initialized. In addition, an int variable j has also been declared and initialized to a value somewhere between 0 and 3. assign the programming symbols

Answers

Answer:

Hi, according to your description you need the code that represents the statement I will use C++ language to describe the code.

// Example program

#include <iostream>

int main()

{

int a [5] = [1,2,3,4,5];

int j = 0;

  return 0;

}

Explanation:

In this language you must have to declare in the header the libraries that you include in your main program, after that a function main where your put your logical algorithm in fact, you declare the algorithm that you need. In this case declare a variable and assign an array of 5 positions and a j variable and assign a number between 0 and 3.

I hope it's help you.

What computer company was founded in 1975?

Answers

Microsoft company was founded in 1975

Many commercial encryption programs use a technology called ____, which is designed to recover encrypted data if users forget their passphrases or if the user key is corrupted after a system failure

Answers

Answer: key escrow

Explanation:

using key escrow technique users can recover encrypted data if users forget their passphrase or if the user key is corrupted. The concept here is that those keys are held in an escrow meaning a bond or a document so that it could be accessed via a third party in case of system failure.

Answer:

key escrow

Explanation:

Which sentence(s) below are true?a. IP stands for Internet Protocol.b. In most home networks IP addresses are assigned by the Internet Service Provider. c. If two laptops are connected to the same home network and surfing the web simultaneously, each laptop must have its own IP address. d. If two laptops are connected to the same home network and surfing the web simultaneously, they share the same IP address.

Answers

Option A is true because IP is short form of Internet protocol.

Option B is true because when every device is connected to the servers by using internet, Internet Service providers assign them unique IP address to define their identity on internet and monitor their activities.

Option C is false because no matter how many laptops or devices are connected to a same router through a network Internet Service Providers assign them a same IP address.

Option D is true because every laptop or device connected to the internet by a network is given the same public IP or external IP.

IP does stand for Internet Protocol, and in a home network, IP addresses are assigned by the ISP. Each device on a local network has its own IP address, but all share the same external IP address when accessing the Internet.

IP stands for Internet Protocol, which is a set of rules governing the format of data sent over the Internet or other networks. Let's address the student's questions one by one:

a. True. IP does indeed stand for Internet Protocol.b. True. In most home networks, IP addresses are usually assigned dynamically by the Internet Service Provider (ISP).c. True. If two laptops are connected to the same home network and are surfing the web simultaneously, each laptop must have its own IP address internally, within the local network, often provided by the router.d. False. While each device on the home network has its own internal IP address, all devices share the same external IP address assigned by the ISP when connecting to sites and services on the Internet.

Each device on a network communicates with other parts of the network (and the Internet) using an IP address, which serves as a unique identifier. In the context of a home network, the router typically assigns an internal IP address to each device, while the ISP assigns one external IP address to the entire network.

max is a method that accepts two int arguments and returns the value of the larger one. Four int variables, population1, population2, population3 and population4 have already been declared and initialized. Write an expression (not a statement !) whose value is the largest of population1, population2, population3 and population4 by calling max. Assume that max is defined in the same class that calls it.

Answers

Answer:

Hello, I imagine that you use Java as the programming language since you refer to classes, so I will make a small code that simulates a Java program with the descriptions you need.

public class Example {

 

 

 public int Max(int population1, int population2, int population3, int population4) {

   int max = 0;

   if(population1 > population2 && population1 > population3 && population1 && population4){

       max = population1;

   }

   else if(population2 > population1 && population2 > population3 && population2 && population4){

       max = population2;

   }

   else if(population3 > population2 && population3 > population1 && population3 && population4){

       max = population3;

   }

   else {

       max = population4;

   }

   return max;

 }

 

 public static void main(String[] populations) {

   Example myObject = new Example();

   int population1 = 1;

   int population2 = 2;

   int population3 = 3;

   int population4 = 4;

   int max = myObject.Max(population1,population2,population3,population4);

   System.out.println(max); // 4

 }

}

Final answer:

The expression to find the largest value among four integer variables using the max method would be max(max(max(population1, population2), population3), population4).

Explanation:

To find the largest value of population1, population2, population3, and population4 by calling the max method, you would use a nested call to the max method. You would call the max method with two of the populations, and then use the result along with the next population in another call to max, and repeat this until all populations have been considered. This results in an expression (not a statement) that looks like this:

max(max(max(population1, population2), population3), population4)

This expression uses the max method to first compare population1 and population2, then compare the result of that with population3, and finally compare the result of the previous comparisons with population4 to find the largest of the four values.

Class members are accessed via the ____(1)_____ operator in conjunction with the name of an object of the class, or via the ___(2)_____ operator in conjunction with a pointer to an object of the class.

Answers

Answer:

1.ClassName and . operator

2. ClassName and [] operator

Explanation:

There are two ways to get the members of a class first one is by using dot(.) operator.

Example : with assumption that person is a class object and age is the member in it we can use it as:

person.age

Second way is to use [] operator with member as a string in it which is used by the compiler as key to get its value.

Example : person["age"]

Final answer:

Class members are accessed via the dot (.) operator with an object name, or the arrow (->) operator with a pointer. This is part of object-oriented programming which involves classes and objects that encapsulate data and methods.

Explanation:

Class members are accessed via the dot (.) operator in conjunction with the name of an object of the class, or via the arrow (->) operator in conjunction with a pointer to an object of the class.

In the context of object-oriented programming, when we work with classes and objects, we deal with functions called methods and variables referred to as instance variables. Methods are used to define the behavior of objects while instance variables store data for each object.

An object, quite simply, can be seen as a segment of memory that includes instance variables representing data, and methods to work with that data. A class serves as the blueprint which outlines the methods by which objects can interact with their data.

Write the definition of a function named maxmin that is passed four int arguments. The function returns nothing but stores the larger of the first two arguments in the third argument it receives and the the smaller of the first two arguments in its fourth argument. So, if you invoke maxmin(3,7,x,y), upon return x will have the value 7 and y will have the value 3.

Answers

Answer:

To get the values in x and y, we should use the pass -by -reference method. Where a reference to the actual variable is created in the called function. When we update the value inside the called function, it reflects in the calling function.

C++ code:

#include<iostream>

using namespace std;

void maxmin(int p, int q, int &r, int &s);

int main()

{

int k,l,x,y;

 

cout<<"Enter two integers for k and l: ";

cin>>k>>l;

 

maxmin(k, l, x, y);

 

cout<<"The maximum of two numbers is: "<<x<<endl;

cout<<"The minimum of two numbers is: "<<y<<endl;

}

void maxmin(int p, int q, int &r, int &s)

{   //r and s holding the address of x and y respectively.

if(p>q)

{

 r=p;

 s=q;

}

else

{

 r=q;

 s=p;

}

}

Explanation:

The program shows how the method is working and the output is

What is a digital certificate? Select one: a. It is a means of establishing the validity of an offer from a person, entity, web site, or email. b. It is a centralized directory wherein registered keys are created and stored. c. It is a means of establishing your credentials electronically when doing business or other transactions on the Web. d. It is an entity that generates electronic credentials and distributes them upon proving their identity sufficiently.

Answers

Option D is the answer because Digital Certificate is an entity that generates electronic and distributes them upon proving their identity sufficiently. In early days there was issues with people using the certificates that were not even issued by the organizations. Today it's a cryptographic technique which uses digital signatures and gives users a digital certificate that can be authenticated anytime online by any organization and is unique for every user having it.

Option A cannot be the answer because it has nothing to do with the identity of person but rather it is for specific fields.

Option B is not answer because it has no key and score matter to do with it.

Option C Web transactions has nothing to do with the certificates.

Given that two int variables, total and amount, have been declared, write a loop that reads integers into amount and adds all the non-negative values into total. The loop terminates when a value less than 0 is read into amount. Don't forget to initialize total to 0

Answers

Answer:

total=0;

do{

cin >> amount;

if (amount>0)

total += amount;

}

while (amount >=0);

Explanation:

A loop that reads integers into amount and adds all the non-negative values into total is shown below.

Now, Here's a code snippet that should do what you're asking for:

int total = 0;

int amount = 0;

while (amount >= 0) {

   // read integer input from user

   scanf("%d", &amount);

   

   // add input to total if non-negative

   if (amount >= 0) {

       total += amount;

   }

}

Here's how this code works:

First, we initialize total to 0 and amount to 0.

Then we enter a while loop that will continue as long as amount is non-negative.

Within the loop, we read an integer input from the user using the scanf function.

We then check if the input is non-negative using an if statement.

If the input is non-negative, we add it to the total variable.

If the input is negative, we skip the if statement and proceed to the end of the loop, at which point the loop terminates.

Finally, once the loop terminates, we have added up all the non-negative input values, and total contains their sum.

To learn more about code snippet refer here

brainly.com/question/30467825#

#SPJ6

you are configuring a firewall to all access to a server hosted in the demilitarized zone of your network. You open IP ports 80, 25, 110, and 143. Assuming that no other ports on the firewall need to configured to provide access, which applications are most likely to be hosted on the server

Answers

These days and for the current scenario NODE JS is the best application because:

1. Its really fast to get the other 3rd party data.

2. Asyn nature of Node makes it reliable and very efficient when there is high traffic on the server.

3. The 3rd party tools support for Node JS is very high.

4. It is highly flexible.

Write a statement that reads an integer value from standard input into val. Assume that val has already been declared as an int variable. Assume also that stdin is a variable that references a Scanner object associated with standard input.

Answers

// Declaring the Scanner built in class object to get input

Scanner stdin =  new Scanner(System.in);

// this will flag the compiler that stdin is the variable that is used to get input

// through utility functions provided by the Scanner class

val = stdin.nextint();

// nextint() is the utility method of scanner class used to get input

Write a full class definition for a class named Player, and containing the following members:

A data member name of type string.
A data member score of type int.
A member function called setName that accepts a parameter and assigns it to name.
The function returns no value.
A member function called setScore that accepts a parameter and assigns it to score.
The function returns no value.
A member function called getName that accepts no parameters and returns the value of name.
A member function called getScore that accepts no parameters and returns the value of score.

Answers

// making class

class Player {

// Data members

string name;

int score;

// Name setter

void setName(string str){

this.name = str;

}

// Score setter

void setScore(int num){

this.score = num;

}

// Score getter

int getScore(){

return score;

}

// Name getter

string getName(){

return name;

}

};

___________ consists of evaluating the relevant factors in a client’s life to identify themes for further exploration. a. Differential diagnosis b. Assessment c. Psychological diagnosis d. Psychometric testing

Answers

Answer:

D

Explanation:

what examples of the influence of the media on current events. Are there, or should there be, limits on the power of the media? Should there be extra restrictions on the events and individuals that the media is allowed to report?

Answers

I believe that there should be limits to the use of social media, regarding using it for absurd pointless things as taking constant selfies of oneself, and who you message. I do think that taking pictures is okay, as long as it regards taking pictures of sceneries and of people we treasure, but taking endless pictures of oneself over and over again is pointless. We should also limit the use of social media because people become easily addicted, especially for people's in their teens,  spending hours either talking to people they dont know or talking to people they do know, which either way, they are spending too much time doing; they aren't getting any exercise done and are increasing there chance of contracting a headache and becoming blind/having lower vision. I believe that social media should only be used for contacting people when we need to, not just to talk each other's ears of all day, and sharing important information to people that need to be aware of things. So in conclusion, yes, there should be restrictions on the events and individuals that the media is allowed to report because a majority of people will spend 50% of there time to useless things, when they aren't living there life to their fullest potential.

Explain one way world war ii?-era advances in computers

Answers

Answer: It forced almost the whole world to advance in computers and other technology.    

Explanation: When WWII started everyone had there older computers but when country's got destroyed, along with millions killed. It sparked a revolution, which lead to many new inventions such as the ATM, but also a huge advance in computers and technology.

Write a program that prompts the user to input a positive integer. It should then output a message indicating whether the number is a prime number. (Note: An even number is prime if it is 2. An odd integer is prime if it is not divisible by any odd integer less than or equal to the square root of the number.)

Answers

// Writing a c++ program

// Making a variable to take input

int input=0;

cout<<"Enter the number ";

cin>>input;

// checking if the entered number is positive and not 0

if(input>0){

// if the mode of number with 2 is 0 then it is Even

 if(input%2==0)

      cout<<"The number is prime.";

// if mode is 1 then its ODD

 else if(input%2==1)

        cout<<"The number is ODD.";

}

As a good security practice in a corporate environment, what is the type of ruleset that would be applied to the end of an access control list (acl) on the inbound and outbound border firewall(s)?

Answers

I don't know Search on Google

I don't know Search on Google

What is the purpose of an exhaust emission system

Answers

Exhaust Harmful Gasses : It is very useful in keeping harmful gasses produced by the vehicle away from driver and passengers.

Keep Environment clean : It is used to convert the gasses being produced in vehicles to convert them into the form which is least harmful for the environment.

Noise : It significantly reduces the noise produced. It keeps the car surrounding pleasant by removing the noise.

Which combination of options is the keyboard shortcut to access the Find dialog box and search a worksheet for particular values? Ctrl+H Ctrl+R Ctrl+F Ctrl+E

Answers

Answer:

[tex]\boxed{Ctrl}+\boxed{F}[/tex]

Explanation:

To remember this, remember that the F in Ctrl+F stands for “Find”.

Ctrl+H is a similar function called Find and Replace, which allows you to search for a value then replace all instances of it with a new value.

Ctrl+R fills from the selected cell(s) and to the right.

Ctrl+E activates the Flash Fil feature, which recognizes a pattern and fills in remaining cells automatically.

Answer:

ctrl+F

Explanation:

edginuity 2020

How to solve "You cannot call a method on a null-valued expression" error

Answers

You have an object declared in the function which has a undeclared value.

Explanation:

if you will make a variable of class or object in JAVA or other reference typed languages and will not assign the value to it this error occurs.

For example :

obj object;   // this line declares a object named variable of type obj class

Here it will cause same error iff i will do it like :

obj = object = new obj();

How do i add the sum of a column in excel?

Answers

Excel has a built in sum function to calculate the sum of elements. The syntax of this function is:

=sum(argument)

This formula is written in the destination cell where we need our sum to show up.

The argument is the cells , columns or range of cells and columns for which we need to find the sum. If we need to find the sum of elements in a column, the formula will be like:

= sum(A:A)

This formula will find the sum of all elements that are present in the column A. The argument in the above formula is A:A which represents that entire column A is selected.

This formula can be modified according to the needs. For example, if we need to find the sum of two columns A and B, the formula will be:

=sum(A:B)

This formula calculates the sum of all elements in columns A and B.

What will be the output of the following code snippet? token = False while token : print("Hello")
A) "Hello" will continue to be displayed until the user stops the program.
B) No output because of compilation error.
C) No output after successful compilation.
D) "Hello" will be displayed only once.

Answers

Answer:

Hi!

The correct answer is B.

Explanation:

The code snippet doesn't follow the correct form of writing a while loop, so it will crash when compiles.

One correct form to write the code is:

token = false;

while (token){ // Evaluate token, if true prints else terminates the loop. In this case, token is false so, no output and finish the program.

     print("Hello");

   };

What is a public key infrastructure? Select one: a. A structure that enables parties to use communications such as email b. A structure that provides all of the components needed for entities to communicate securely and in a predictable manner c. A structure that enables secure communications in chat rooms, instant messaging, and text messaging d. Is A method of securing communications through the use of a single shared key

Answers

Answer:

B. A public key infrastructure (PKI) allows users of the Internet and other public networks to engage in secure communication, data exchange and money exchange. This is done through public and private cryptographic key pairs provided by a certificate authority.

Write an if/else statement that compares the variable age with 65, adds 1 to the variable seniorCitizens if age is greater than or equal to 65, and adds 1 to the variable nonSeniors otherwise show the age of seniorCitizens.

Answers

Answer:

Hi!

Explanation in Javascript:

int age;

int seniorCitizens = 0;

int nonSeniors = 0;

while(true) { //infinite loop, always true.

age = getAge(); // gets the age.

if (age >= 65) { // if age is greater or equal to 65 adds 1 to seniorCitizens and show the age.

o

seniorCitizens = seniorCitizens + 1;

print (age);

}

else { // otherwise adds 1 to nonSeniors.

nonSeniors = nonSeniors + 1; //

}

HTTP is the protocol that governs communications between web servers and web clients (i.e. browsers). Part of the protocol includes a status code returned by the server to tell the browser the status of its most recent page request. Some of the codes and their meanings are listed below: 200, OK (fulfilled) 403, forbidden 404, not found 500, server error Given an int variable status, write a switch statement that prints out, on a line by itself, the appropriate label from the above list based on status.

Answers

// Making a function that will take a integer as argument and return  print the code

void Print(int statuscode){

// starting the switch statement on the interger sent

switch(statuscode)

  case 200: // for case 200

              cout << "Ok,Fullfilled"<< endl;

  case 403: // for case 403

             cout << "Forbidden" << endl;

   case 404: // for case 404

             cout << "Not Found" <<endl;

   case 500: // for case 500

             cout << "Server Error "<< endl;

    default: // default case

              cout << " Wrong code"<<endl;

}

AT&T reacted to the popularity of the cellular phone by adding several cellular models to its line of regular phones. Availability and popularity of cellular phones is most likely due to changes in the __________________________ environments.

Answers

Answer:

Social Technological environment

Explanation:

The trend of people towards a technology is the main reason for that technology to take exponential growth and keep the status. As out societies are getting many earning facilities and business facilities and many knowledge areas are made theses days due to cellular phones, so the social environment is taking major part in popularity of them. And as they become popular, society tends to provide them as soon as possible in cheap ways and in best quality.

Other Questions
Find the domain the function graphed below. Express in interval notation.Domain: PLEASE HELP 30 POINTS!! AND BRAINLIEST ASAPWhat is an equation of the line that is perpendicular to 3x+y=5 and passes through the point (3, 7) ?Enter your equation in the box. Tooth and gum deterioration are signs of:Cognitive impairmentA psychiatric disorderPhysical changes due to agingSociological issues A period of sustained skeletal muscle contraction in which individual twitches cannot be detected is called Twenty-seven less than twice a number is -1 Mika, who is 85 years old, believes that his future time is limited. He has started to spend more time thinking about the meaning of life and how to show his family and friends that he truly appreciates them. Mika is demonstrating the _____ theory. You are Priyanka Chopra, resident of 20, Paradise Colony, Mayur Vihar, Panchkula. There has been an alarming rise in accidents in your neighbourhood, especially on National Highway. More than 11 deaths have been reported in the previous month alone, yet the number is on the rise. Write a letter to the Editor, The Tribune, Chandigarh, expressing your concern and suggestion Milly Adams, the marketing manager for Nuance Cosmetics believes that in order for the company to succeed in international markets, it has to address the choices that is has about product attributes, distribution strategy, communication strategy, and pricing strategy in its targeted markets. What is mill adams referring to? It's time for another financial calculator problem. A UCF student (who has not taken FIN 2100) decides that he really needs a large screen HD TV for football season. The student goes to a "rent to own" center and agrees to rent a TV for $60 per month (end of month). After 36 months, the student will own the TV. Assuming that the student could buy the same TV today for $1,000, what is the interest rate (APR) of renting the TV? An atom of boron has an atomic number of 5 and an atomic mass of 11. The atom contains 5 protons, 6 electrons, and 5 neutrons.11 protons, 11 electrons, and 5 neutrons.5 protons, 5 electrons, and 6 neutrons.11 protons, 6 electrons, and 6 neutrons. Hillary starts her own business. She quits her $50,000 a year job, rents an office for $15,000 a year, pays wages and salaries of $50,000 a year, utilities of $4,000 a year, and materials of $20,000. She uses her own car for sales work rather than leasing an equivalent car for $6000 a year. If revenues are $140,000, her accounting profit and economic profit are respectively ______ and _____ . So in my school, we have to write a description of details and the purpose is to show not tell. One of the prompts is a description of a person who is driving to a grocery store, but with the added element of anger. How could I show anger without saying the person was directly angry? Thanks! I'm confused as to what actions of driving could show that as a description. I know this is definitely a weird prompt! A large map of the United States uses a scale of $2 \text{ cm} = 2.5\text{ km}$. On the map, the distance between two cities is 1 meter. What is the actual distance between the two cities (in kilometers)? PLZ ANSWER NOW CORRECTLY FAST ILL GIVE 40 POINTSS!!!!!!! PLZZZZZZZZZZZZZZZZZZZZZ 1. _ y el queso son del grupo cuatro. Why was Samuel Slater known as the Father of the American Industrialization Revolution?A. He was wealthy enough to build the first American industrial factory, sparking industrialization.B. He realized that waterways could be used to power factories, which boosted industrialization.C. He invented a machine called a water frame, which revolutionized the spinning of cotton fiber.D. He brought knowledge of the British industrial techniques to the United States, starting industrialization.Reset Next Given the coordinate points of the preimage, use the transformation given to provide the points of the image. W(3,3) V(3,4) U(5,4) Rotation: 90 counterclockwise about the origin. W( , ) V( , ) U( , ) Circle the authority by which Lincoln makes the January 1, 1863, proclamation 2. Write and solve an equation to find the value of x.3.8, 4.2, 5.3, x; mean 4.8 Which of the following is true of an ellipsis? (5 points) It shows a change in who is speaking in a narrative. It shows something is intentionally missing. It shows something has significantly changed. It shows when a character is speaking. *pls help*Which of the following is an example of improper form when walking at a fast pace? Focusing straight ahead Keeping the chin up Stepping with a wide stride Tucking the hipsJocelyn has a part-time job, and the hours vary week to week. She also has basketball practice four times a week and monthly club meetings. Lately, she has felt stressed, and it is interfering with her ability to sleep well. Which of the following could most effectively help Jocelyn manage her stress? She could call in sick to work, skip basketball practice to catch up on her sleep, and then go mountain biking. She could talk to her boss about the demands of juggling a job, school, and extracurricular activities. She could use a planner to organize her schedule and build in short nature walks on the weekends. She could quit her job, drop out of clubs, and take up horseback riding to get away from everything.Talia plays beach volleyball on the weekends. If she continues to participate in this activity, she can expect gains in agility and cardiovascular health improvements in balance and rhythm increases in flexibility and stamina advances in strength and stabilityTo play lacrosse, each player needs a ________. bathing suit mouthpiece snowboard tennis racketWhich of the following demonstrates proper form for performing a curl? Chest is high. Head is back. Knees are straight. Shoulders are forward.Lorna is looking to buy a low-cost piece of exercise equipment for full-body strength training that will allow her to adjust intensity by changing the number of sets and reps she completes. Which of the following should she buy? Elliptical trainer Exercise tubing Jump rope TreadmillTo follow appropriate safety procedures, what kind of shoes should hikers wear? Boots with grippers or "teeth" Flip flops with rubber soles Sneakers with flexible uppers Tennis shoes with breathable mesh_______ and ________ use similar movements and skills. Baseball; slow-pitch softball Cross-country skiing; tennis Golf; surfing Mountain biking; volleyball