What is the minimum valid subscript value for array a?
#define MAX 50
int a[MAX], i, j, temp;
A. 0
B. 1
C. Any negative number
D. There is no minimum
E. None of the above

Answers

Answer 1

Answer:

The answer to this question is A. 0.

Explanation:

In this segment of code #define MAX 50 is used.It is a pre-processor directive and in pre processor directive it is a MACRO means whenever the compiler encounters the word MAX in the execution it replaces MAX with 50.

So the size of the array becomes 50 and the indexing starts from 0 and upto 49.


Related Questions

Define a graph. Draw a directed and undirected graph with 8 vertices and explain all the terminologies associated with that graph Note: Terminologies are cycles, path, directed and undirected graph, circuit, loop, adjacency, degrees, Euler circuit, Hamiltonian circuit

Answers

Answer:

A graph is a collection of set of edges E and vertices V, where each edge joins pair of vertices.

A graph is undirected when the edges has no direction.

A graph is directed when the edges has confined direction.

An edge is directed if it is defined to come out from one vertex and goes to another fixed vertex.

A loop is an edge from a vertex to itself.

A path from a vertex x to another vertex y is a sequence of distinct edges that joins sequence of distinct vertices:

                   (x,[tex]x_{1}[/tex])→([tex]x_{1}[/tex], [tex]x_{2}[/tex])→([tex]x_{2}[/tex], [tex]x_{i}[/tex])→ .... → ([tex]x_{j}[/tex],y)

A cycle is path that starts and ends at same vertex.

A circuit is a path that starts and ends at same vertex, but not necessarily contain distinct vertices.

An Euler circuit is circuit that traverse each edge of the graph exactly once and covers all vertices.

An Hamiltonian circuit is a simple circuit that traverse each vertex of the graph exactly once and covers all edges.

Degree of a vertex is the number of edges incident on it.

In case of undirected graph the number of edges incident on the vertex is it's degree.but in case of directed graph the number of edges coming out of the vertex is it's out-degree and the number of edges going to the vertex is it's in-degree.

Explanation:

what are the forms of Hornclause?

Answers

Answer:

Hornclause is defines as, it is a logical formula for particular rule which gives a useful parameters for a logical programming. Hornclause is a clause with one positive literals.

Different form of hornclause are:  

Null clause:  Null clause is that with 0 negative and 0 positive literals which appears at the end of a resolution proof. A fact or unit clause: Unit clause is defined as literals, which contain 1 positive literals and 0 negative literals. A negated goal: It is defined as negated goal is the negation of the statements to be proved with at least 1 negative and one positive literals.

The methods of the Character class that begin with ____ return a character that has been converted to the stated format.

a.
in

b.
to

c.
is

d.
for

Answers

Answer:

most probably the answer is 'to'

What will the following code display?

int number = 6
int x = 0;
x = --number;
cout << x << endl;




1. 7

2. 6

3. 5

4. 0

Answers

Answer:

5

Explanation:

The operator '--number', it is a pre decrement operator which decrement first and then assign. It decrement the value by 1.

initially the number is 6.

x is 0.

then, x = --number;

it decrement the number by 1 first and then assign to x.

so, x assign the value 5.

finally, print the value.

Therefore, the answer is 5.  

Write a program that gets a list of integers from input, and outputs the integers in ascending order (lowest to highest). The first integer indicates how many numbers are in the list. Assume that the list will always contain less than 20 integers. Ex: If the input is:

Answers

Answer:

integers=[]

while True:

      number=int(input())

      if number<0:

       break

      integers.append(number)  

print("",min(integers))

print("",max(integers))

Explanation:

Which of the following is the new linecharacter?\r\n\l\b

Answers

Answer:

\n

Explanation:

\n is called the new line character.It is used to go to the next line or the start of the new line.\n is used in Linux while in windows uses \r\n called carriage return.But generally \n is used in most of the programming languages also.

C++ programming true or false questions

1. We have a class called animalType. Answer the following questions about clas animalType.

a. Its constructors will be named animalType. (True or False)

b. Return type of its constructors will be void. (True or False)

Answers

Answer:

a. True

b. False

Explanation:

Constructor is used to initialize the object of the class.

Rules of constructor:

1. Constructor name must same as the class name. it means, if the class name is animalType, then constructor name must be animalType.

2. Constructor does not have any return type. it means, it does not return anythings.

Therefore, part (a) is true,  Constructor name must same as the class name.

and part (b) is false, because constructor does not have any return type.

In a circular linked list the last node points to the____ node.

a. first

b. last

c. middle

d. new

Answers

Answer: option A) First

In a circular linked list the last node points to the first node.

Explanation: As in a circular linked list, the node will point to its next node. Since the node next to last node is the first node hence last node will point to first node in a circular way. The elements points to each other in a circular path which forms a circular chain.

Given the IP address and subnet mask 192.168.10.0 and255.255.255.224

a) What is the maximum number of subnets in the network?

b) What is the number of hosts?

c) What are the valid subnets?
It is requested pls.give details how u have calculated?

Answers

Answer:

a) Maximum subnets=8

b) if there is no subnet , no. of hosts will be 32-2 = 30. If there are 8 subnets as above, then no. of hosts will b 4-2=2.

c)  Valid subnets are  6

                         192.168.10.32          

                         192.168.10.64                    

                         192.168.10.96

                         192.168.10.128

                         192.168.10.160

                         192.168.10.192

Explanation:

a) Maximum number of sub nets in the network

    For number of sub nets in a network , which class this ip address belongs to

         IP address  192.168.10.0

         subnet mask 255.255.255.224

192 in ip address means it is a class C address.

In class C address -

Network address-24 bits

Host address-8bits

For number of subnets we check last block of subnet mask.

224 -covert this into binary

                11100000

From binary form ,we can conclude that 3 bits are used for sub network as only 3 are 1.

  =2^n

  = 2^3 =8  

b)  Number of hosts

In a network,

     Number of hosts is (2^host no -2)

We have subtracted 2 because out of these hosts two are used in broadcasting and other purposes.  

Host number is equal to the 0's in the Subnet mask

                     255.255.255.224

convert this into binary number i.e

   11111111.11111111.11111111.11100000

So,5 0's are there

           Number of valid hosts= 2^5 -2

                                                = 32-2

                                                =  30

c) The Valid subnets are

For valid we have to perform Logical AND with IP Address and subnet    mask.

       IP address  192.168.10.0

       subnet mask 255.255.255.224

    Convert these in binary -

IP address  11000000.10101000.00001010.00000000

Subnet mask  11111111.11111111.11111111.11100000

after performing And operation- 11000000.10101000.00001010.00000000

                192.168.10.0

           this is the host address

                 192.168.10.224 this is the broadcast address

    These are the valid sub nets

                         192.168.10.32          

                         192.168.10.64                    

                         192.168.10.96

                         192.168.10.128

                         192.168.10.160

                         192.168.10.192

When mathematicians use a two-dimensional array, they often call it a ____.

a.
matrix

b.
grid

c.
net

d.
mesh

Answers

Answer:

matrix

Explanation:

The two dimensional array store the value similar to matrix.

Two dimensional array contain row and column similar to matrix.

For example:

int arr[3][3], it means 3 rows and 3 column

and [tex][A]_{3*3}=\left[\begin{array}{ccc}1&2&3\\4&5&6\\7&8&9\end{array}\right][/tex]

and if we want to retrieve the data from array arr[1][2], it means first row and second column.

so, 2 dimensional array is basically a matrix.

Give at least 5 indicators which help to identify systems andtables as potential de-normalizationcandidates.

Answers

Answer and Explanation:

The five indicators are

There is existence of repeating groups which needs to be processed in a single group not individuallymany reports exist which need to be processed onlinetables need to processed in different way by different users at the same time certain columns need very large time for the de normalization take 60% as the alarming numbermany calculations needs to be applied to columns  before queries can be answered

Methods used with object instantiations are called ____ methods.

a.
accessor

b.
instance

c.
internal

d.
static

Answers

Answer:

b. instance

Explanation:

Methods used with object instantiations are the instance methods. When a class is instantiated we get a reference to the object. Invoking a method on the object , executes the corresponding instance method.

For example:

String s = new String("test");

int len = s.length();

Here length() is an instance method of String object s.

with open source operating systems,both the executable code and source code are available:

true or false?

Answers

Answer:v True

Explanation: Open source operating system is the system that has source code that can be modified and enhance them . It can also be shared between the public as it is available in the open form . There are many examples of the open source operating system like Linux, Ubuntu etc. which has both executable code and source code as well. so therefore the given statement is true.

Which statement will call this module and pass 12 as the argument?

Module showValue (Integer quantity)

Answer
a) Call showValue( Integer)

b) Call showValue (12)



c) Call showValue( Integer 12)

d) Call showValue( Real)

Answers

Answer:

Call showValue (12)

Explanation:

The function is a block of the statement which performs the special task.

if you define the function, then you have to call that function.

Then, program control moves to the function and start to execute otherwise not execute the function.

the syntax for calling the function:

name(argument_1, argument_2,....);

we can put any number of arguments in the calling.

check the options one by one for finding the answer:

Call showValue( Integer): this is valid calling but it passes the variable, not the 12. this is not correct.

Call showValue( Integer 12): This is not valid calling, because it passes the data type as well which is incorrect.

Call showValue( Real): this is valid calling but it passes the variable, not the 12. this is not correct.

Call showValue (12): this valid calling and also pass the value 12.

Therefore, the correct answer is option b.

What is the

stored program concept?

Answers

Answer:

 The stored program concept is defined as, in the architecture of computer where computer acts as internal store instruction and it is important because has high flexibility and user does not required to execute the instruction again and again. It is basically works on the principle of Von neumann architecture, as in which the instruction and the data are both same logically and can be used to store in the memory.

In java, Write a while loop that prints userNum divided by 2 (integer division) until reaching 1. Follow each number by a space. Example output for userNum = 20:

Answers

Answer:

while(userNum > 1){

        userNum = userNum /2;

        System.out.print(userNum+" ");

     }

Explanation:

Probably don't need the print statement, but it doesn't cause an error.

This solution uses a while loop in Java to repeatedly divide a number by 2 and print the result until the number is less than 1. The example code and explanation illustrate the process clearly.

To solve this problem, you need to write a while loop in Java. This loop will continue dividing the given number by 2 until it reaches 1. Here's the step-by-step solution:

Example Code:

import java.util.Scanner;
public class Main {
   public static void main(String[] args) {
       Scanner scanner = new Scanner(System.in);
       int userNum = 20; // You can change this to any number.
       while (userNum >= 1) {
           System.out.print(userNum + " ");
           userNum = userNum / 2;
       }
   }
}

In this code:

We initialize userNum with a value (20 in this example).The while loop continues as long as userNum is greater than or equal to 1.In each iteration, we print userNum followed by a space and then divide it by 2 using integer division.

The output for userNum = 20 will be: 20 10 5 2 1 .

As it is a good practice that C# broughtback the concept of GOTO statement and Pointer? If your answer isyes then how C# control the worst effect of those features. Pleasebe brief?

Answers

Answer:

No for GOTO

Yes for Pointer

Explanation:

GOTO statement

This declaration is used to pass control to the program's marked declaration. The label is the valid identifier and is positioned just before the declaration from which the control is transmitted.

It becomes hard to trace a program's control flow, making it hard to comprehend the program logic. Any program in C language can be written without using a GOTO statement.

Pointers

A C # pointer is nothing but a variable holding another type of memory address. However, in C # pointer only the memory address of the value types and arrays can be declared.

C # supports pointers to a restricted extent. Unlike reference kinds, the default trash collection system does not track pointer kinds. Pointers are not allowed to point  to a type of structure containing a type of reference or a type of reference.

During the garbage collection process, the C #garbage collector can move objects in memory as they wish. The C #offers a unique fixed keyword for telling Garbage Collector not to move an item. This implies that the place of the value kinds referred to is fixed in memory. This is called pinning in C #.

The GOTO statement and pointers in C# can simplify some coding tasks but can also make the code harder to read and C# controls these downsides by offering structured programming constructs and by restricting pointer usage to unsafe contexts.

The introduction of the GOTO statement and pointers in C# can be seen both positively and negatively. While the GOTO statement allows for easier navigation and breaking out of control structures, it often results in code that is hard to read and maintain. To mitigate such issues, C# provides structured programming constructs like loops, conditional statements, and methods to manage control flow more effectively.

C# also manages the risks of pointers by requiring explicit permissions and special contexts for their usage, thus limiting their misuse.

Control Mechanisms in C#

Instead of GOTO, use loops (for, while) and conditionals (if, switch) for better readability.Pointers are only allowed in unsafe contexts to highlight potential risks.

An ____ is an object that produces each element of a container, such as a linked list, one element at a time.

A.
initiator

B.
iterator

C.
interpreter

Answers

Answer:

B. iterator

Explanation:

An iterator is an object that produces each element of a container, such as a linked list, one element at a time.

An iterator is an object that produces each element of a container, such as a linked list, one element at a time. Thus, the correct option for this question is B.

What is an element?

An element may be characterized as the constituent parts of a work of computer that is an essential characteristic of all works of programming and spoken narrative fiction. These elements include plot, theme, character, and tone.

According to the context of this question, an iterator is an object that significantly enables a programmer in order to transverse a container, particularly lists. The various types of iterators considerably provide numerous interfaces to the programmer in order to develop program.

Therefore, an iterator is an object that produces each element of a container, such as a linked list, one element at a time. Thus, the correct option for this question is B.

To learn more about Iterator, refer to the link:

https://brainly.com/question/29313296

#SPJ5

What happens when an exception is thrown, but the try statement does not have a catch clause that is capable of catching it?

Answers

Answer:

A checked exception indicates something beyond your control has gone wrong. ... If an exception does not have a matching catch clause, the current method terminates and throws the exception to the next higher level. If there is no matching catch clause at any higher level, then the program terminates with an error.

What are different types of inner classes ?

Answers

Answer:

Inner class in Java is basically a class in a class, i.e. a member of another class.

There are 4 types of inner classes in Java.

a)  Nested Inner class

b)  Method local Inner class

c)  Anonymous Inner class

d)  Static nested class

Do you think there are some disadvantages to "For Loop"? Or when using it is not good for its program?

Answers

Answer:

I think there are no disadvantages of for loop as far as i know.

Since for loop is entry controlled loop (i.e , the condition is checked for entering in the loop body).So when you want to execute the body first in the program for loops are not good fit for this type of conditions.You can use do while loop in these cases which is an exit controlled loop(body is executed first after the condition is checked) .

for example:-Iterating over and printing the circular linked list.

What to do: please remember to comment each line.
1 Initialize x to be zero

2 Prompt the user for the next operation (Addition or Subtraction)

3 Prompt the user for the next operand (y).

4 Perform the operation (x + y or x – y depends on the operation selected by
the user), and store back the result to x.

5 Output x in decimal.

6 Go back to step 2 until user input “q” as the next operation, then exit.

Answers

Answer:

#include <iostream>

using namespace std;

int main()

{

   //initialization

  float x=0.0;

  float y;

  char operation;

  //print the message

   cout<<"Please enter the operation (Addition or Subtraction): ";

   cin>>operation;

   //loop for enter th operand again until enter 'q'

  while(operation != 'q'){

       //print the message for operand x

      cout<<"\nPlease enter the operand x: ";

      cin>>x;

       //print the message for operand y

      cout<<"\nPlease enter the operand y: ";

      cin>>y;

   //check for condition for '+' and if true then add the operands

      if(operation == '+'){

          x=x+y;

      }else if(operation == '-'){  //if user enter '-' then subtract the operands

          x=x-y;

      }

      //print the output

      cout<<"\nThe output is: "<<x<<endl;

      cout<<"\nPlease enter the operation (Addition or Subtraction): ";

      cin>>operation;

  }

  return 0;

}

Explanation:

Create the main function and define the variable x equals zero and declare the variables y and operation.

print the message for the user to enter the operation ('+' or '-') by using the instruction cout.

Store the value in the variable by using the instruction cin.

Then, take the loop to repeat the statement again and again until the condition is true.

print the message inside the loop for asking about the operands from the user.

then, use condition statement for checking the operation and if condition match, then execute the particular operation.

The above operation executes until the user enters not enter the character 'q'.

when the user enters the 'q', the loop terminates and print the output.

Incomplete Configuration identification documents may resultin:

a) Defective Product

b) Higher Maintenance Costs

c) Schedule Product

d) Meet Software Quality

e) A,B,C

f) B,C,D

Answers

Answer: e) A,B,C

Explanation:

 Incomplete configuration identification documents may result in defective product, higher maintenance costs and schedule product as, inaccurate document decreased the quality of the product and cause damage. If the configuration documentation are not properly identified, then it is impossible to control the changes in the configuration items, to established accurate reports and records or validate the configuration.

.The process of capturing the requirements includes all ofthe following with the exception of:
A.verification B.elicitation C.analysis D.validation

Answers

Answer: A) Verification

Explanation: Capturing of the requirements is the process of which the project is taken up to test the scope that project. The capturing of requirement process is divided into certain parts to conduct the procedure as

ElicitationAnalysisValidationSpecification

Therefore there is no part of verification in the process so capturing of requirements process has a exception of verification.

write an algorithm that gets the price for item A plus the quantity purchased. The algorithm prints the total cost, including a 6% sales tax.

Answers

Answer:

Algorithm()

1. p = Enter the price of item A.

2. c = Enter the number of A’s purchased.

3. Now the price per item with tax is:

              t= p+(p*6/100)

4. The total cost of c items:  

             ct= t * c.

5. Print ct.

In this algorithm, we are taking the price per item and counting it’s cost including tax. Then we are multiplying the price per item with tax with the number of items we purchase, to find the overall cost with tax.

You may calculate the overall cost without tax as (p*c). Then you can find the overall cost with tax as ((p*c)+(p*c*6/100)), as in both way, we will get the same result.

Final answer:

To calculate the total cost of an item including a 6% sales tax, multiply the price of item A by the quantity purchased to get the total price before tax. Then calculate the sales tax by multiplying the total price by 0.06 and add this to the total price to get the total cost.

Explanation:

To write an algorithm that calculates the total cost of an item including sales tax, you need to first find the price of the item A and the quantity purchased. Then, to calculate the sales tax, you will convert the percent to a decimal and multiply it by the total price (price multiplied by quantity). Lastly, you will add this sales tax to the total price to get the total cost.

Algorithm:

Get the price of item A.Get the quantity of item A purchased.Calculate total price without tax: total_price = price_of_item_A * quantity_purchased.Calculate sales tax: sales_tax = total_price * 0.06.Calculate total cost including sales tax: total_cost = total_price + sales_tax.Print the total_cost.

For example, if the price of item A is $50 and the quantity purchased is 2, then the total cost before tax is $100. The sales tax at 6% would be $6. Therefore, the total cost including sales tax would be $106.

Why do cellular telephone systems only need seven sets of frequencies in metropolitan areas?

Answers

Answer: For frequency reuse, telephone systems use 7 sets of frequencies in metropolitan areas.

Explanation:

As the population is high in metropolitan cities it requires faster reuse of frequencies so that everyone within the network region is being able to use their cellular devices. It can be imagined in the form of a hexagon with 6 points and one at the center enabling faster reuse of free frequencies.

To speed up item insertion and deletion in a data set, use ____.

A.
arrays

B.
linked lists

C.
classes

Answers

To speed up item insertion and deletion in a data set, use B. linked lists.

Hope this helps!

Final answer:

To enhance the speed of insertion and deletion in a data set, linked lists are superior to arrays as they allow for quick updates of references without needing to shift elements. Thus, option B is correct.

Explanation:

To speed up item insertion and deletion in a data set, the best choice would be B. linked lists. Unlike arrays, which require shifting elements when inserting or deleting an item particularly if it's not at the end, linked lists can efficiently add or remove items because they only need to update the references (or pointers) to the neighboring elements.

When working with a sorted linked list, the structure will maintain items in a sorted order. When inserting a new item, it determines the correct location within the order to insert, based on comparison operators like <. In Python, this can be implemented using special methods such as __lt__() and __eq__(). This comparison flexibility allows for the linked list to handle various data types including integers, floats, and strings, facilitating the sorted order efficiently.

Why we need each section of prologprogram?

Answers

Answer:

Prolog program are used in the artificial intelligence and the web development in a systematic manner process. As, it is also sometimes known as declarative language which basically consist of some facts and list. Prolog program are divided into the sections that are:

Domain sectionsClauses sectionsPredicates sectionsGoal sections

We need each section of the prolog program because all the sections introduced the systematic program and performed there particular functions so by using all these processing steps an efficient function are formed.

A class diagram _____.
Answer

provides an overview of a class's data and methods

provides method implementation details

is never used by nonprogrammers because it is too technical

all of the above

Answers

Answer:

provides an overview of class's data and methods

Explanation:

Class Diagram is used in software engineering to represent:

- classes

- attributes

- methods

- relationship between classes

It provides a representation of the static layout of the application in object oriented design. It does not provide method implementation details. In fact code skeleton can be automatically generated from class diagram using appropriate UML tools.

Please explain external hashing, B-trees, and traversals. 3-5 sentences per

Answers

Answer: In external hashing the hash table is in disk where each slot of the page table holds multiple entries which refers to pages on the disk organised in the form of buckets.

B-trees are self balancing trees which contains sorted data and allows insertion, deletion, traversals

Traversal is the process of visiting the nodes of the tree data structure.

Explanation:

External hashing is different from internal hashing and it refers to concepts in database management systems. Internal hashing stores only single record maintained in page table format, whereas external hashing holds multiple entries.

B-trees are generalisation of binary trees where it can have more than 2 children.

Traversal of trees helps in insertion, deletion, modification of nodes in tree data structure

Other Questions
What is epistemology? Why is it important to critical thinking? According to the online article about Algeria, rai is a __________.A.religious holidayB.gameC.type of musicD.type of food Which is the part of an experiment that serves as the point of comparison for the results?hypothesisindependent variableconstantcontrol Given that a fluid at 260F has a kinematic viscosity of 145 mm^2/s, determine its kinematic viscosity in SUS at 260F. A 12-year-old child at a soccer game grabs their chest and begins to make wheezing noises. After you obtain consent to provide care, the childs parent informs you that the child has a history of asthma, but does not have an inhaler nearby. What care should you provide? (A) Give 5 back blows(B) Summon more advanced medical personnel and place the victim into a position that helps breathing.(C) tell the victim to use an inhaller borrowed from bystander(D) wait 20 minutes to see if the breathing difficulty goes away The resistivity of gold is 2.4410-8 m at room temperature. A gold wire that is 1.8 mm in diameter and 40 cm long carries a current of 860 mA. What is the electric field in the wire? Imagine that a seven-year-old girl develops a hormone-secreting ovarian tumor derived from granulosa cells. What signs of the disease would you expect? What term do you use to describe the amount of three-dimensional spaceinside a solid?A. VolumeB. PerimeterC. Surface areaD. Lateral area What is an electrochemical cell?A. Two electrodes separated by an electrolyte that can generate an electrical current.B. A chemical that, when an electrical current is passed through it, releases a large amount of energy.C. A biological cell, such as a bacterium, that can generate an electrical current.D. An electrical circuit formed from chemicals in a solid state rather than metals or metalloids. Nitric oxide reacts with chlorine gas according to the reaction: 2 NO( g) + Cl2( g) 2 NOCl( g) Kp = 0.27 at 700 K A reaction mixture initially contains equal partial pressures of NO and Cl2. At equilibrium, the partial pressure of NOCl is 115 torr. What were the initial partial pressures of NO and Cl2 ? where are the first repost of new scientific discoveries published A.) Internet Sites B.) Magazines C.) encyclopedias D.) Scientific journals According to a report, 67.5% of murders are committed with a firearm. (a) If 200 murders are randomly selected, how many would we expect to be committed with a firearm? (b) Would it be unusual to observe 153 murders by firearm in a random sample of 200 murders? Why? Which black inventor patented fifty different devices, most of them dealing with the lubrication of machines, and successfully contested claims against the genuineness of his designs? Which value is needed in the expression below to create a perfect square trinomial?x2+8x+______481664 capital expenditure proposal for a new program: A. is sometimes allowed to disregard start-up costs. B. will be comparatively easier to prepare. C. will typically be shorter than a proposal to replace equipment D. None of these is correct. which of the following describes a similarity between Eastern and Western Europe following World War 2? A. Each region fiercely resisted the creation of the Truman Doctrine. B. Each region fell under the influence of a foreign superpower. C. Each region promoted the spread of international communisms. D. Each region established its own "iron curtain" to protect its interests. Solve the system of equations.y= 6x-27y= 4x - 17a. (-5, 3)b. (-3, -5)C. (5, 3)d. No solution Why would people be willing to risk their lives for democracy Using social media to support activities such as producing maps and incident visualizations is an example of which communication standard An aerial camera is suspended from a blimp and positioned at D. The camera needs to cover 125 meters of ground distance. If the camera hangs 10 meters below the blimp and the blimp attachment is 20 meters in length, at what altitude from D to B should the camera be flown?A blimp over triangle EDF with height of 10 meters and FE equals 20 meters and triangle ADC with height BD and AC equals 125 meters. Triangles share point D.A. 31.25 mB. 62.5 mC. 150 mD. 250 m