Shift registers are sequential logic circuits that shift the stored data bits either right or left, thus converting the data format and length while preserving the total data quantity.
The following are the two primary functions of shift registers:Data storage: Shift registers are capable of storing a large amount of data and can be easily transported from one location to another in a data stream form.Shift Register Counting: Shift registers can be used to create time-delay circuits that use an external clock to advance the internal state of the circuit.The shift register can be used as a counter, as a delay circuit, as an analog-to-digital converter (ADC), or as a digital-to-analog converter (DAC).(2.2) Draw a 4 bit serial in/ serial out shift register using D-bistables.D flip-flops are used in this 4-bit shift register. The 4-bit data is entered serially at the input, and then the data is shifted to the right with each clock pulse. When the final bit has been loaded, the four bits are transferred to the outputs as parallel data.
To construct a 4-bit serial in/serial out shift register using D flip-flops, follow these steps:Step 1: Provide the clock signal to all of the D flip-flops, ensuring that each flip-flop receives the same clock signal.Step 2: Connect the input line to the D pin of the first flip-flop.Step 3: Connect the output of the first flip-flop to the D input of the second flip-flop.Step 4: Repeat step 3 until the final flip-flop has been connected.Step 5: Connect each flip-flop's output to a LED.(2.3) Draw the logic and timing diagrams of a 10-bit ring counter using D-bistables. The timing sequence for the counter must show at least 10 clock pulses. Start with only the first (LSB) as a SET bit.A ring counter is a type of counter that consists of a circular shift register.
The output of each flip-flop serves as the input to the next. It counts up to 2^n, where n is the number of bits in the shift register, before repeating itself.A 10-bit ring counter can be built using D flip-flops, which are all triggered by the same clock signal. Because the final flip-flop's output is connected to the first flip-flop's input, the ten flip-flops are connected in a ring or loop.
The logic and timing diagrams are shown below:The term "synchronous" in a counter circuit refers to the fact that all flip-flops in the counter share the same clock signal. They all change state at the same time, ensuring that all of the outputs are consistent with one another.In contrast to asynchronous counters, which are triggered by their own internal clock, synchronous counters use external clock signals to ensure that all of the flip-flops are in the same state at the same time. Synchronous counters have the benefit of being less prone to errors than asynchronous counters.
Learn more about data :
https://brainly.com/question/31680501
#SPJ11
Which two technologies support the building of single-page applications?
Answer:
The technology which support the building of single- page applications are as follows
Explanation:
Front endHTMLPHPJavaScriptAngularJSa ____ is a rectangular area into which the user can type text.
A textbox is a rectangular area into which the user can type text.
A textbox is a graphical user interface element that provides an input field for users to enter and edit text. It is a rectangular area typically displayed on a screen or within a window or form. The textbox allows users to interact with the application or system by inputting alphanumeric characters, numbers, or other text-based information.
Textboxes are commonly used in various software applications, web forms, word processors, text editors, and other user interface components where text input is required. They can have various attributes, such as size, maximum length, default value, and input validation rules. Textboxes can also support additional functionalities like auto-complete, spell-checking, and formatting options.
Learn more about textbox here;
https://brainly.com/question/31977795
#SPJ11
Which category of elements is commonly used to make computer chips and solar cells due to their ability to conduct electricity only under certain conditions?.
The category of elements used to make computer chips and solar cells due to their ability to conduct electricity is metalloids
What are metalloids?
With no standard definitaion and concrete agreement on which element a metalloid is, metalloids are said to be a type of chemical which has a preponderance of properties in between, or that are a mixture of, those of metals and nonmetals.
Metalloids are widely used as alloys, biological agents, catalysts, glasses and optical storage media. Metalloids are also known to have applications in optoelectronics, semiconductors, pyrotechnics, and electronics etc.
Learn more on metalloids from:
https://brainly.com/question/6422662?referrer=searchResults
#SPJ4
Check My Work
Compared with the traditional licensing model in which users purchase and install software, SaaS _____.
a. provides more reliable access in areas with no Internet service
b. offers less expensive upgrades and new releases
c. can be accessed from fewer devices per license
d. requires more maintenance on the part of customers
B. offers less expensive upgrades and new releases: In the traditional licensing model, users must pay for each upgrade and new release of the software.
What is upgrades?Upgrades are changes or improvements to existing products, services, or systems. These upgrades can be hardware-based, software-based, or a combination of both. They may involve adding new features or functionality, improving existing features, or fixing bugs and security issues. Upgrades are often released by the manufacturer of the product or service, but they can also be provided by third-party vendors. Upgrades can help make a product or service more efficient, secure, and user-friendly.
With SaaS, users can access the new releases and upgrades without having to purchase them. This makes SaaS a more cost-effective option for those who need to stay current with the latest software.
To learn more about upgrades
https://brainly.com/question/28388040
#SPJ4
the term 'beta version' software generally refers to: group of answer choices software that has not yet been tested in its entirety by the developers software that still requires further integration and unit testing software that is feature complete but still requires end-user testing with real data a completely finished system ready for production
Beta Version: This is the software that has been made available to the general public but still has many unfinished features.
What is a software beta version?An incomplete early version of a computer software or application that has the majority of the key elements. For testing and feedback, these versions are occasionally exclusively made available to a small group of people or to the broader public.
A web browser application is what?A web browser is a piece of software that enables access to the World Wide Web. It is also known as an internet browser or just a browser. With only one click, you have access to all of human knowledge and can look up any question you have.
To know more about 'beta version' software visit:-
https://brainly.com/question/23465069
#SPJ4
JAVA
Write a program to find the sum of the given series:
S = 1 + (1*2) + (1*2*3) + --------- to 10 terms.
plz help....
public class MyClass {
public static void main(String args[]) {
int x = 1;
int total = 0;
for (int i = 1; i <= 10; i++){
x *= i;
total += x;
}
System.out.println(total);
}
}
This program finds the sum of that series to the tenth term, the sum is: 4037913. I hope this helps.
How are PivotCharts different from regular charts?
They are interactive.
They contain images.
They have more color options.
They contain styles.
Answer:
A) They are interactive
Explanation:
A security hole is a(n): Group of answer choices packet-level firewall small peep-hole in a door or wall to allow a security guard to examine an individual before allowing that individual access to a secure area or location malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users missing or absent protected mode addressing restrictions on user programs during multitasking or multithreaded program execution ANI system
Answer: malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users.
Explanation:
A security hole is the malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users.
A security hole is regarded as a software flaw that allows someone who isn't authorized to have access to the system. This vulnerability can be taken advantage of by a hacker or other threat factors.
IM in high school (freshmen) and I started using brainly when I was in middle school, haven't made much friends but im ok with who I have! Anyways question is abt career management!
In Stage 2, the Thinking stage, John would probably:
Research ways to quit smoking.
Switch over to nicotine gum or e-cigs.
Blame it on pollution in the air
Admit he has a problem, but put off doing anything.
Answer:
My Spring 2018 Sabbatical Project was to study techniques and ideas of classroom management. The result was a set of documents and resources that I am placing here in blog format to easily share with my colleagues and any other interested party.
Comments and questions are welcome, and I will respond as time allows. Feel free to share these posts.
Sincerely,
Tracy Johnston
Palomar College Mathematics Department
Answer:
The more sane thing that he should do is to research ways to quit smoking.
Explanation:
Smoking is not good for you, nor are e-cigs
Nicotine gum is just as addictive and is quite expensive
There really isn't much pollution in the air, mostly allergens
You gotta do something, you'll die if you keep smoking/vaping or whatever he is doing
- What is the function of these 3 types of application software
Word Processing
Spreadsheet
Database
A word processor is a computer application used to write and edit documents, arrange the text's layout, and preview the printed version on a computer screen.
What purpose does spreadsheet software serve?A spreadsheet is a piece of software that you can use to quickly execute mathematical operations on statistical data, add up many columns of numbers, or calculate averages and percentages.
What use does database software serve?Users of database software can centrally manage, store, access, and save data. Additionally, it makes it simple for users to control who has access to the database and what permissions they have, protecting the data.
To learn more about software visit:
brainly.com/question/985406
#SPJ1
There are dash types of symbols
Answer:
logo , pictogram, ideogram, icon, rebus, phonogram and typogram
Explanation:
they are forty symbols
What is the significance of a motherboard specification that states the following: 1 PCIe x 16 (x8 mode) slot?a. The slot accepts x8 or x16 cards.b. The slot can transmit traffic using 8 or 16 lanes.c. The slot can transmit in bursts of 8 or 16 bytes at a time.d. The slot accepts x16 cards but uses only 8 lanes.
A motherboard specification that states the following: 1 PCIe x16 (x8 mode) slot has several significances.
These include:1. The slot accepts x8 or x16 cards.2. The slot can transmit traffic using 8 or 16 lanes.3. The slot accepts x16 cards but uses only 8 lanes.A peripheral component interconnect express (PCIe) slot is an advanced expansion card that connects a peripheral device to a computer's motherboard. It includes several serial lanes of data transmission and has the capability of transmitting high-bandwidth signals. The significance of a motherboard specification that states 1 PCIe x16 (x8 mode) slot is that the slot can accept either x8 or x16 cards.
Moreover, the slot can transmit traffic using eight or 16 lanes, meaning that it can use half of the maximum bandwidth available in an x16 slot.The slot can also accept x16 cards but use only eight lanes. In this case, the maximum bandwidth is halved compared to the x16 mode slot. Thus, the motherboard can handle an x16 card, but it will not use the full potential of the card.
To know more about significances visit :
https://brainly.com/question/33083834
#SPJ11
If you quote an author from a website in a paper, it will be important to create a _____ in your writing to give them credit for their work.
caption
citation
macro
merge
Answer:
citation
Explanation
you are supposed to cite the author, so it would be citation
Are there any incremented values from one loop to the next?
What variables may be used to track each loop in the program?
Answer:
You can place any expression you'd like in the final expression of the for loop, but it is typically used to update the counter variable.
counter variable is used throughout those parts. That variable keeps track of the current repetition, and is typically named i . The initialization part initializes the counter variable to a starting value.
Explanation:
Name two sensors which would be used in a burglar alarm system
1. Passive Infrared Sensor
This sensors type is passive in a way that it doesn't radiate its own energy. Instead, it detects the infrared light radiating from objects. This way, it can detect whenever there's a human or another living being in its field of view.
2. Photoelectric Beams
This is also another type of motion detector, but it doesn't work similarly to the others. For one, it doesn't have a coverage area. It only forms a fence, which triggers the alarm if broken.
It consists of two separate parts that form a sort of a fence made of IR beams. When someone steps into the beams, between the two parts, they trigger the alarm.
a computer with 32-bit byte-addressed memory has a direct-mapped cache with 512 sets and 18-bit tags. how many bytes are there in each cache block?
Given, A computer with 32-bit byte-addressed memory has a direct-mapped cache with 512 sets and 18-bit tags.The number of bytes present in each cache block needs to be determined.The number of bits required to represent the offset within a block is calculated using the given size of the block.
Offset bits = log2(block size)The offset is 32 - (tag bits + index bits) - offset bitsIndex bits = log2(number of sets)tag bits = 18Total number of bits = 32Given, number of sets = 512tag bits = 18Index bits = log2(512) = 9Offset bits = 32 - (18 + 9) = 5Offset bits = log2(block size)5 = log2(block size)block size = 25 bytesAns: There are 32 bytes in each cache block. LONG ANSWER:Given, A computer with 32-bit byte-addressed memory has a direct-mapped cache with 512 sets and 18-bit tags. The number of bytes present in each cache block needs to be determined.Let's consider the following figure, which shows the structure of a cache memory block.
Where,Tag bitsIndex bitsOffset bitsThe number of bits required to represent the offset within a block is calculated using the given size of the block.Offset bits = log2(block size)The offset is 32 - (tag bits + index bits) - offset bitsIndex bits = log2(number of sets)tag bits = 18Total number of bits = 32Given, number of sets = 512tag bits = 18Index bits = log2(512) = 9Offset bits = 32 - (18 + 9) = 5Offset bits = log2(block size)5 = log2(block size)block size = 25 bytesTherefore, there are 32 bytes in each cache block. Answer: 32 bytes.
To know more about computer visit :
https://brainly.com/question/32297640
#SPJ11
what two characteristics give a dvd more storage capacity than a cd
Combining the higher data density and the dual-layer configuration, DVDs typically have a much larger storage capacity than CDs. DVDs commonly come in different formats such as DVD-5, DVD-9, DVD-10 , and DVD-18.
1. Higher Data Density: DVDs have a higher data density compared to CDs. This means that the information on a DVD is stored more tightly, allowing more data to be packed into the same physical space. DVDs achieve higher data density by using smaller pits and narrower tracks on the disc surface, which enables them to store more information.
2. Dual-Layer Configuration: DVDs often employ a dual-layer configuration, which means they have two separate layers of data on a single disc. Each layer can store data independently, effectively doubling the storage capacity. By having two layers, DVDs can store significantly more information compared to the single-layer structure of CDs.
Learn more about dvd https://brainly.com/question/28939774
#SPJ11
Write a program to find the Perimeter and Semi- perimeter of a traingle.(Python)
This Python program takes user input of the sides of a triangle, calculates its perimeter and semi-perimeter, and displays the results. The code is mentioned below.
Here is a Python program to find the perimeter and semi-perimeter of a triangle:
# input the sides of the triangle
triangleSide1 = float(input("Put the first side's length: "))
triangleSide2 = float(input("Put the second side's length: "))
triangleSide3 = float(input("Put the third side's length: "))
# calculate the perimeter
perimeter = triangleSide1 + triangleSide2 + triangleSide3
# calculate the semi-perimeter
s = perimeter / 2
# print the results
print("Perimeter of the triangle = ", perimeter)
print("Semi-perimeter of the triangle = ", s)
In this program, we first take input from the user for the lengths of the sides of the triangle. We then calculate the perimeter by adding the lengths of all three sides. The semi-perimeter is then calculated by dividing the perimeter by 2.
Finally, the program prints the values of the perimeter and semi-perimeter.
This program prompts the user to enter the length of the three sides of a triangle, stores them as triangleSide1, triangleSide2, and triangleSide3, respectively. It then calculates the perimeter of the triangle by adding the lengths of all three sides, and stores the result in the variable perimeter.
The semi-perimeter of a triangle is half of its perimeter, so we calculate it by dividing the perimeter variable by 2 and storing the result in the variable s. Finally, the program prints out the values of the perimeter and s variables to display the results to the user.
Learn more about Python program here:
https://brainly.com/question/19792191
#SPJ4
Which classes dont have constructors in java.
Answer:
Super class (not sure about this answer)
during which phase of the sdlc is hardware purchased, while software is purchased, customized, or developed?
The range of Minimum frame size is 160 bits and stop-and-wait give an efficiency of at least 50%.
What is SDLC?A organized procedure known as the Software Development Life Cycle (SDLC) provides the fastest possible production of high-quality, low-cost software. Producing top-notch software that meets and surpasses all client expectations and needs is the aim of the SDLC. The SDLC develops and specifies a comprehensive plan with stages, or phases, each of which includes its own procedure and outputs. Following the SDLC reduces project risks and costs and speeds up development while increasing the efficiency of production.It offers a uniform framework that specifies tasks and outputs.It helps with project estimating, planning, and scheduling.It facilitates project management and control.It makes all parties engaged in the development process more aware of every stage of the life cycle.It accelerates development and enhances client relationships.Project hazards are decreased.It lowers production costs overall and project management costs.know more about sldc click here:
https://brainly.com/question/15696694
#SPJ4
write an assembly language program to simulate a simple guessing game. the program has stored the value 3. the program will continually ask the user to guess a number between 0 and 9 (see sample program inputoutput below.). if your program encounters any non-digit character, the program should output invalid input. invalid input should still count as a guess. user enters input. you can use \n in your strings (.stringz) to make the prompt start on a newline. name your file guess.asm. assume that the user gets it right within 9 guesses.
The program simulates a simple guessing game, with the stored value of 3.
It prompts the user to guess a number between 0 and 9 and provides feedback on whether the guess was too high, too low, or correct. The program checks for invalid input and outputs an error message if non-digit characters are entered. The program terminates after 9 guesses or when the correct number is guessed.
The program starts by storing the answer, 3, in a register. It then enters a loop that prompts the user to enter a guess using the "Enter a number between 0 and 9:" message. The program takes the user's input and checks if it is a digit using the ASCII codes. If not, it jumps to the error message. If it is a digit, it compares the input to the stored value using subtraction. If the input is less than 3, the program outputs "Too low" using syscalls. If it is greater than 3, the program outputs "Too high." If the input equals 3, the program outputs "Correct!" and exits the loop using a jump instruction.
The loop executes for up to 9 guesses, after which the program outputs "Game over." The user can play again by restarting the program. This program demonstrates the use of ASCII codes, comparison operators, and jumps in assembly language. It also provides an example of simple input/output using syscalls.
To learn more about assembly language click brainly.com/question/11207987
#SPJ11
Canada has an absolute and a comparative advantage over scotland in producing natural gas and an absolute advantage over scotland in salmon production. scotland can produce both products, but only has a comparative advantage in producing salmon. because canada has a comparative advantage in natural gas production, it should
In international trade, countries can specialize in the production of goods and services in which they have a comparative advantage. This means that a country can produce a particular product at a lower opportunity cost than another country.
In the given scenario, Canada has an absolute advantage over Scotland in producing natural gas and salmon. However, Scotland can also produce both products, but it only has a comparative advantage in producing salmon. This means that Scotland can produce salmon at a lower opportunity cost compared to natural gas production. Canada, on the other hand, has a comparative advantage in natural gas production, meaning it can produce natural gas at a lower opportunity cost compared to salmon production. Therefore, Canada should focus more on producing natural gas and trade it with Scotland for salmon, as it would be beneficial for both countries. This is because Canada can produce natural gas more efficiently, and Scotland can produce salmon more efficiently. In conclusion, international trade allows countries to specialize in the production of goods and services in which they have a comparative advantage, resulting in efficient allocation of resources and increased economic growth. In the given scenario, Canada should focus on producing natural gas, while Scotland should focus on producing salmon, and both countries should trade with each other to maximize their benefits.
To learn more about international trade, visit:
https://brainly.com/question/15823129
#SPJ11
java the wordlocation should contain multiples of that line number (e.g., if the word "dog" appears on line 4 two times, then dog should map to [4,4,...]). i include one test
To write a Java code that reads a text file and keeps track of the line number of each occurrence of a particular word, and maps each word to a list of line numbers in which it appears (with duplicates), you can follow the steps given below:
1. Create a HashMap named "wordMap" that will map each word to a list of line numbers.
2. Read the text file line by line. For each line, perform the following steps:a. Use the String method "split" to split the line into words. For example, you can split the line using the regex "\\W+" which will match one or more non-word characters (such as whitespace, punctuation, etc.).b. For each word in the line, check if it already exists in the wordMap. If it does, then get the list of line numbers associated with the word and add the current line number to the list. If it doesn't, then create a new list containing the current line number and add it to the wordMap.c. Repeat this process for each word in the line.
3. After reading the entire file, the wordMap will contain the mapping of each word to a list of line numbers. To print the results, you can iterate over the entries in the wordMap and print each word followed by its list of line numbers. For example, you can use the following code:HashMap> wordMap = new HashMap>();Scanner scanner = new Scanner(new File("filename.txt"));int lineNumber = 0;while (scanner.hasNextLine()) {lineNumber++;String line = scanner.nextLine();String[] words = line.split("\\W+");for (String word : words) {List lineNumbers = wordMap.get(word);if (lineNumbers == null) {lineNumbers=newArrayList();wordMap.put(word,lineNumbers);lineNumbers.add(lineNumber); System.out.println(word + ": " + lineNumbers);scanner.close();Here's an example test case:Input file "filename.txt":The quick brown fox jumps over the lazy dog.The dog sees the fox and starts to bark.The fox runs away from the dog.The dog chases the fox but can't catch it.Java code output:dog: [1, 1, 2, 4]quick: [1]brown: [1]fox: [1, 2, 3, 4]jumps: [1]over: [1]the: [1, 2, 3, 4]lazy: [1]sees: [2]and: [2]starts: [2]to: [2]bark: [2]runs: [3]away: [3]from: [3]chases: [4]but: [4]can: [4]t: [4]catch: [4]it: [4]
Know more about Java here:
https://brainly.com/question/31561197
#SPJ11
To attain the intended operation, one can make use of a data structure called Map<String, List<Integer>> to hold the mapping of words to their respective locations.
The Programimport java.util.*;
public class WordLocation {
public static Map<String, List<Integer>> countWordOccurrences(List<String> lines) {
Map<String, List<Integer>> wordLocations = new HashMap<>();
for (int i = 0; i < lines.size(); i++) {
String line = lines.get(i);
String[] words = line.split("\\s+"); // Split the line into words
for (String word : words) {
wordLocations.computeIfAbsent(word, k -> new ArrayList<>()).add(i + 1);
// Add the line number (i + 1) to the word's list of occurrences
}
}
return wordLocations;
}
public static void main(String[] args) {
List<String> lines = Arrays.asList(
"The quick brown fox",
"jumps over the lazy dog",
"The dog is friendly"
);
Map<String, List<Integer>> wordLocations = countWordOccurrences(lines);
// Print the word-location mapping
for (Map.Entry<String, List<Integer>> entry : wordLocations.entrySet()) {
String word = entry.getKey();
List<Integer> locations = entry.getValue();
System.out.println(word + ": " + locations);
}
}
}
This script functions by accepting a collection of sentences in the form of List<String> lines, and producing a Map that correlates each term with a list of line numbers where it appears.
The countWordOccurrences function goes through every line, divides it into individual words, and includes the line number in the Map's records of the word's occurrences. Ultimately, the primary approach exhibits a practical application by displaying the correlation between words and their respective positions within the provided sentences.
Read more about Java programs here:
https://brainly.com/question/25458754
#SPJ4
what method of the string object searches the string for an occurrence of the specified search string?
The method of the string object to search an occurrence of the specified string is search().
There are many method of the string object to search a value. These is example for that method,
indexOf() to give index for specified value for the first time they occurlastIndexOf() to give index for specified value for the last time they occurmatch() to give all specified value as an Array.search() to search specified value and return the position of the match.Since, the question is want to return the specified string so we can use search() method.
Learn more about indexOf() here:
brainly.com/question/20461017
#SPJ4
Brainiest
What do you think should be done for the people whose jobs become automated?
I think those peoples who's jobs are being replaced should be given a new job at the same company, and the new job they get will not be able to be done by a robot.
What is the benefit of hosting a website on a personali
O A.
lesser cost of buying hardware
B. good Internet speed
o c.
better cooling of web server machines
D.
easier backups
why do we measure time complexity in terms of the number of operations required instead of actual computer time? (select all that apply.)
The reason one measure time complexity in terms of the number of operations required instead of actual computer time is all of the below options.
What is time complexityComputers are getting faster and better, which can affect how long it takes to run a program. We figure out how fast an algorithm is by counting the number of steps it takes, rather than looking at the specific computer it's running on.
So, this helps us see how efficient the algorithm really is. We can study and compare different ways of doing things (algorithms) without computer technology affecting our analysis.
Read more about time complexity here:
https://brainly.com/question/30186341
#SPJ4
Why do we measure time complexity in terms of the number of operations required instead of actual computer time?
-Computer processing speeds have been increasing as time passes. (The results of complexity analysis must not be affected by new developments in computing)
-Different computers take different amounts of time to perform the same basic operations. (we need the results of complexity analysis to be independent of the machine on which the algorithm runs.
-There are many reasons why the same instance of an algorithm on different occasions may take different amounts of time to execute. (For instance, a computer could be running different processes at different times.
Manuel owns a small business. He needs to calculate the amount each employee owes in Federal taxes. Manuel should
use an)
O e-mail
O printer
O database
O spreadsheet
Answer:
The answer is spreadsheet
Explanation:
I just took the test too
what kind of drainage network is likely to form in a landscape with a uniform substrate and a constant and gentle slope at the surface
In a landscape with a uniform substrate and a constant and gentle slope, the most likely drainage network to form is a dendritic drainage pattern.
This pattern is characterized by a branching network of tributaries that resemble the veins on a leaf or the branches of a tree. The dendritic pattern is common in areas where the underlying rock or soil is homogeneous and the slope is consistent. The network forms as the water follows the path of least resistance, which is typically downhill and along the same path as the slope. The tributaries will flow into larger and larger streams, eventually forming a main river channel. This type of drainage system is efficient at carrying water away from the landscape and minimizing erosion, making it a common feature in many regions around the world.
To know more about network visit:
https://brainly.com/question/15332165
#SPJ11
Which of the following would be considered a central idea for a mind map?
moons
solar system
planets
stars
Answer:
solar syetem
Explanation:
Answer:
B
Explanation: