from textbooks on the pl/i and ada programming languages, look up the respective sets of built-in exceptions. do a comparative evaluation of the two, considering both completeness and flexibility.

Answers

Answer 1

The built-in exceptions in the PL/I and Ada programming languages.

PL/I has a smaller set of built-in exceptions, mainly including conditions like ERROR, FAILURE, and SEVERE. These exceptions are generated by the runtime system to signal various issues, such as division by zero, overflow, or subscript out of range. Ada, on the other hand, has a more comprehensive and flexible set of built-in exceptions. Some common ones include CONSTRAINT_ERROR, PROGRAM_ERROR, STORAGE_ERROR, and TASKING_ERROR.

Ada allows users to define their own exception types, providing more flexibility in handling errors specific to the application's requirements. Ada offers a more complete and flexible set of built-in exceptions compared to PL/I, allowing developers to better handle errors and manage exceptional conditions in their programs.

To know mor about programming visit:-

https://brainly.com/question/14368396

#SPJ11


Related Questions

URGENT What information is available in the Document Inspector Dialog Box? Check all that apply.

comments

document properties

privacy settings

presentation notes

embedded documents

digital IDs

Answers

comments and annotationsdocument properties and personal informationinvisible on-slide contentpresentation notes

What are the aspects of the document?

These are all aspects of the document that can be inspected by the document inspector. The document inspector is a tool that allows us to examine documents in order to remove or alter information.

This is a useful tool to employ before finishing and distributing a document. Other aspects that the inspector can check in Powerpoint are embedded documents, data models, content apps and off-slide content.

Therefore, comments and annotations

document properties and personal informationinvisible on-slide content

Learn more about document on:

https://brainly.com/question/17673965

#SPJ1

Answer:

A, B, D, E

Explanation:

right on edge22

state the part of the internet that contains website​

Answers

I think it would be the web browser is where it directly can be accessed and located using a url address .

Jane has been asked to investigate a method that would ensure email traffic gets priority on the corporate network. She would need to implement?TCPVOIPQOSCANS

Answers

To ensure email traffic gets priority on the corporate network, Jane can implement Quality of Service (QoS) policies.

QoS is a technique that allows network administrators to prioritize certain types of traffic over others, such as email traffic over web traffic. With QoS policies, Jane can assign specific bandwidth limits, packet prioritization, and traffic shaping rules to email traffic to ensure that it gets the priority it needs. By doing so, Jane can improve the performance of email services and reduce the chances of email delays or disruptions caused by network congestion. Additionally, QoS policies can help Jane ensure that other business-critical applications receive the necessary network resources they require.

To know more about E-mail visit:

https://brainly.com/question/30363901

#SPJ1

Identify the programming language released by
the Department of Defense in the 1980s.
Pascal
O
Ada
C++
BASIC

Answers

Answer:

the answer is ADA

Explanation:

got it right

ADA 83,  

(Context on ADA)

It was recognized as a powerful, modern programming language that addressed DOD's stated requirements for embedded systems.

Ashanti is using the PC version of Word, and she wants to create an interactive table of contents—pages that, when the user clicks on them, will take the user to that section of her document. Describe the exact process by which Ashanti could accomplish this task.

Answers

Answer:

Using some sort of link or hyperlink connected to the text would be a great way to do this, just highlight the text with your cursor and right click and click on hyperlink then set it up to go to the designated page.

Absolutely Brilliant if you to ask me!  

A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of:
a. phishing.
b. pharming.
c. spoofing.
d. evil twins.
e. click fraud.

Answers

The salesperson clicking repeatedly on the online ads of a competitor in order to drive their advertising costs up is an example of click fraud. Click fraud is a type of online fraud where a person or automated program repeatedly clicks on an online ad to artificially inflate the number of clicks and increase the advertising costs for the advertiser.

Click fraud is often used by competitors to sabotage each other's advertising efforts or by publishers to generate more revenue from ads. Click fraud can lead to wasted advertising budgets and decreased ROI for advertisers. Therefore, it is important for businesses to monitor their online advertising campaigns for click fraud and take necessary measures to prevent it. This can include setting up filters to detect invalid clicks, monitoring traffic patterns, and working with advertising platforms to investigate suspicious activity.

Overall, businesses must be vigilant when it comes to online advertising and take measures to protect themselves from click fraud.

Learn more about online  here:

https://brainly.com/question/31531205

#SPJ11

driswers.
In what two ways is the plain text form of markup languages an advantage?
Developers don't need a special program to view or edit it.
Developers can use it to make web pages more dynamic.
It is secure because developers can view it only in a text editor.
It is human-readable, but machines cannot read or change it.
It makes markup languages independent of hardware and software.

driswers.In what two ways is the plain text form of markup languages an advantage?Developers don't need

Answers

Answer:

Developers don't need a special program to view or edit it.

It makes markup languages independent of hardware and software

Explanation:

Markup just means that it's easily readable by humans. However, you'll often need specific software to be able to edit it, as opposed to plaintext, which could be edited in notepad.

Use the drop-down menus to complete the statements about creating and using signatures in Outlook messages.
The Signature feature is found under Outlook Mail
When creating a new signature, be sure to choose
When you create a signature and click New Email, the
Signatures can only be set up within the Outlook client on the
messages."
V
will appear in the email body.
not on a server.

Answers

The Signature feature is found under "File" > "Options" > "Mail" in Outlook.

When creating a new signature, be sure to choose the appropriate font, formatting, and layout that you want to use.

When you create a signature and click "New Email", the signature will automatically appear in the email body.

Signatures can only be set up within the Outlook client on the computer, not on a server.

What is Outlook Mail?

Note that Microsoft Outlook is the preferred email client used to send and receive emails by accessing Microsoft Exchange Server email. Outlook also provides access contact, email calendar and task management features.

Microsoft Outlook may be used as a standalone application, but it is also part of the Microsoft Office suite and Office 365, which includes Microsoft Excel and PowerPoint.

Learn more about Outlook Mail:
https://brainly.com/question/29576990
#SPJ1

In which directory would a system administrator store scripts that should be run monthly by the cron daemon?

Answers

Answer: /etc/cron.monthly

Explanation:

What is the minimum number of connections that must be broken or removed in the network before computer E can no longer communicate with computer F

Answers

Answer:

To reach best results:

Break down all connections.

the input that causes insertion sort to take the most number of steps is...

Answers

The most number of steps insertion sort can take is 4n+2. The time spent running the algorithm is n-linear.The running time of insertion sort is therefore (n)Theta, left parenthesis, n, right parenthesis, if each element is greater than or equal to each element to its left.

The straightforward sorting algorithm known as insertion sort functions similarly to how you would arrange playing cards in your hands. In a sense, the array is divided into sorted and unsorted parts.

Values are chosen and assigned to the appropriate positions in the sorted part of the data from the unsorted part.

One of the simplest algorithms, with straightforward implementation, is this one. For modest data values, insertion sort is generally effective. Insertion sort is adaptive in nature, hence it is suitable for data sets that have already undergone some degree of sorting.

To know more about Insertion sort:

brainly.com/question/13326461

#SPJ4

Give an example of computing circumstances that would favor first-fit allocation over best-fit. Explain your answer.

Answers

In computing, many processes may need to use the CPU and the CPU would have to make the decision on which process it would allocate its resources to.

First ft memory allocation is a method where the CPU allocates its resources to a process first to a memory location that has free space that is equal to or more than its size

Best ft memory allocation is a method where the CPU allocates its resources to the best available process with space with the smallest free partition that is considered adequate and it is slower than first fit.

One example of computing circumstances that would favor first-fit allocation over best-fit is when a memory partition is allocated to a process that has similar memory space.

Read more here:

https://brainly.com/question/14120703

A period in which unemployment is low, business produces many goods and services, and wages are good is called ______.

A. prosperity
B. productivity
C. personal income
D. business cycle

Answers

Answer:

A

Explanation:

What are the parts and function of computer windows​?

Answers

A title bar, menu bar, windows menu, minimise, maximise, restore, close, sizing border, client area, horizontal scroll bar, and vertical scroll bar are some of the components found in an application window.

The main window, which is always created by a graphical Windows-based application, acts as the main point of contact between the user and the programme. To complete activities connected to the primary window, most apps also produce other windows, either directly or indirectly. Each window participates in the output display and user input processes.

The system also creates a taskbar button for each application when you launch it. The application icon and title are located on the taskbar button. The taskbar button for the programme is seen pressed when it is running.

All of these elements are normally seen in the main window of an application. These elements are depicted in a typical main window in the figure that follows.

Learn more about Windows here:

https://brainly.com/question/29976015

#SPJ4

Which type of shape allows you to add text that can be moved around.

Answers

Answer:

Move a text box, WordArt, or shape forward or backward in a stack. Click the WordArt, shape, or text box that you want to move up or down in the stack. On the Drawing Tools Format tab, click either Bring Forward or Send Backward.

includes both enlarging and reducing the size of a graphic is called____.

Answers

The process of both enlarging and reducing the size of a graphic is known as "scaling." Scaling allows for the adjustment of a graphic's dimensions while maintaining its proportions and overall visual integrity. It is a fundamental technique used in various fields, including graphic design, computer graphics, and image processing.

   Scaling refers to the transformation of a graphic's size without distorting its proportions. It involves resizing an image or graphic to make it larger or smaller while preserving its original aspect ratio. The aspect ratio defines the relationship between the width and height of an image and ensures that objects in the graphic maintain their relative sizes.

When scaling up, the dimensions of the graphic are increased, resulting in a larger representation of the original image. Conversely, when scaling down, the graphic's size is reduced while retaining the same proportions as the original. This process involves adjusting the pixel dimensions or physical measurements of the image.

Scaling is a crucial technique employed in various applications. In graphic design, scaling allows designers to adapt graphics to different sizes and mediums, ensuring consistent visual appeal across various platforms. In computer graphics and image processing, scaling is used to enhance or reduce the size of images while minimizing quality degradation. It plays a vital role in fields such as printing, web design, video editing, and multimedia production.

Overall, scaling serves as a versatile tool for manipulating the size of graphics. Whether it's enlarging or reducing an image, maintaining proportionality is essential to ensure that the graphic retains its intended appearance and legibility.

To learn more about computer graphics click here : brainly.com/question/18068928

#SPJ11

Help! Diesel mechanics___________while diesel electronics_________

Help! Diesel mechanics___________while diesel electronics_________

Answers

Answer:

Diesel mechanics inspect, repair, and maintain the engine and mechanic parts of locomotives; diagnose and assess the nature of electrical problems and identify repairs needed while diesel electronics diagnose and asses the nature of electrical problems and identify repairs needed; inspect, repair, and maintain the engine and mechanic parts of locomotives.

how to set preferences so Premiere opens last project by default upon program start up

Answers

Setting preferences in Adobe Premiere to open the last project by default upon program start up can save you a lot of time and hassle.

The steps to set preferences so Premiere opens last project

To do so, first, open the program and click on the "Premiere Pro" menu on a Mac or "Edit" menu on a Windows machine.

Next, select "Preferences" and then "General."

In the General Preferences window, locate the "Project Auto-Save" section and check the box next to "Automatically Save Projects."

After that, go to the "Save In" option and choose where you want to save your project. Finally, click on "OK" to save the settings.

From now on, Premiere will automatically open the last project you were working on when you launch the program. This feature is very convenient and helps you to pick up right where you left off.

Learn more about Adobe Premiere at

https://brainly.com/question/28335360

#SPJ11

you have partitioned and formatted a new hard drive, sdc. you want to mount the first partition on sdc to directory /mnt/newdisk. which command will perform the mount correctly? answer mount /dev/sdc1 /mnt/newdisk mount /dsk/sdc first /mnt/newdisk mount /sdc1 /mnt/newdisk mount /mnt/newdisk /dev/sdc1 mount /dev/sdc /mnt/newdisk

Answers

Support is provided by the home partition by the extended partition. Four primary partitions is the most that can be present on a hard drive.

What is extended partition?You can install an operating system on a partition that is designated as a major partition. When the machine turns on, the OS is loaded from a primary partition that has an operating system already installed. On early versions of Windows and DOS operating systems, the primary partition had to be installed first, even though it can exist without an operating system. Up to four primary partitions—or three primary and one extended partition—can exist on a single drive in modern versions of Windows.A partition that can be split up into more logical drives is an extended partition. You do not need to give it a drive letter or install a file system, in contrast to a primary partition. The operating system can be used to extend the partition by adding a number of logical discs. The appearance of each logical drive as a separate drive is determined by its unique drive letter. The amount of free space on the expanded partition and the number of drive letters still accessible on your system are the only restrictions on the number of logical drives you can create.

To Learn more About extended partition refer to;

https://brainly.com/question/14046091

#SPJ4

I WILL GIVE BRANLIEST
Create a newsletter using word processing software.
Directions
In this assignment, you'll use a word processor to create a newsletter.

Choose from one of the following topics for your newsletter:

Science project
Science report
State report
Country report
Biography
Your newsletter should meet these requirements:

Fill one page.
Include the following:
two or three columns
a title
at least three graphics, but not more than six
When you've finished creating your newsletter, remember to spell check and proofread. Then save your newsletter and upload it.

Question # 1
File Upload
Submit your newsletter that includes the following:

two or three columns
a title
at least three graphics, but not more than six

Answers

The newsletter consists of a topic from the Microsoft foundation. It typically makes charitable contributions to nonprofit organizations directly.

What is Newsletter?

A newsletter may be defined as a small or brief publication that significantly contains news of interest chiefly to a special group. The purpose of a newsletter is to promote a product or service and create an individual touchpoint with your email subscribers.

The support of the Microsoft foundation is given on a national and international basis in areas of company operations, with emphasis on the Puget Sound, Washington, area.

Therefore, In developing countries, it focuses on improving people's health and giving them the chance to lift themselves out of hunger and extreme poverty.

To learn more about Newsletter, refer to the link:

brainly.com/question/28424369

#SPJ1

What actions can you take to ensure the physical security of network devices?

Answers

use vpns, use long hard to figure out passwords, and keep ur devices in sight or reach of you

Answer:

Here are some steps you can take to make sure your network is secure:

Take physical precautions. ...

Make sure all of your server's security features are enabled. ...

Use both hardware and software firewalls. ...

Install the latest version of your server's software. ...

Guard passwords. ...

Be Wi-Fi savvy.

Explanation:

PLEASE MARK ME AS BRAINLIEST

What is one example of a servant leader behavior pattern?
- Understands and empathizes with others
- Focuses on individual task metrics
- Thinks about the day-to-day activities
- Uses authority rather than persuasion when necessary

Answers

One example of a servant leader behavior pattern is the ability to A. understand and empathize with others.

Servant leaders prioritize understanding and empathizing with others. They actively listen to their team members, seek to understand their needs, challenges, and aspirations, and show genuine empathy toward them.

They put themselves in others' shoes to gain insight into their perspectives, emotions, and experiences. This understanding and empathy enable servant leaders to support their team members effectively, address their concerns, and provide the necessary guidance and resources for their success.

By focusing on understanding and empathizing with others, servant leaders foster a supportive and collaborative work environment that promotes individual growth and collective achievement.

Learn more about  servant leader behavior pattern: https://brainly.com/question/15576767

#SPJ11

Which will have "5" as an output?
>>> from gcd import math
>>> gcd(15,20)
>>> from random import GCD
>>> GCD(15,20)
>>> from math import god
>>> gcd(15,20)
>>> from random import GCD
>>> GCD(15.20)
answer ?

Answers

The code that will have "5" as an output is as follows;

from math import gcd

gcd(15, 20)

Code explanation

The code is written in python.

GCD is the largest common divisor that divides the numbers without a remainder.

gcd is a function in python that accepts two required integers and it finds the HCF.

Base on the code,

We imported gcd from the math module in python.Then, we inputted the integers in the gcd function.

learn more on python here: https://brainly.com/question/25550841

What are characteristics of the Advanced Calendar options in Outlook? Check all that apply.

Meeting responses can be tracked.
Free/busy settings can be enabled.
Multiple calendars can be managed.
One extra time zone can be created.
Display and theme settings can be changed.
Options are accessed through the Backstage view.

Answers

Answer:

b,d,e,f

Explanation:

The characteristics of the Advanced Calendar options in Microsoft Outlook are:

B. Free/busy settings can be enabled.

D. One extra time zone can be created.

E. Display and theme settings can be changed.

F. Options are accessed through the Backstage view.

What is Microsoft Outlook?

Microsoft Outlook can be defined as a personal information (e-mail) manager and task management software application that is designed and developed by Microsoft Inc.

Functions of Microsoft Outlook

Some of the functions of Microsoft Outlook include the following:

e-mail clientTask managementContact management Taking of notes Journal loggingWeb browsingCalendaring

The calendar is a scheduling and time management component of Microsoft Outlook which is fully integrated and can be synchronized with contacts, e-mail, and other Outlook features.

Read more on Microsoft Outlook here: https://brainly.com/question/24266817

What is this ethernet port called??? Pls help soon!!!

What is this ethernet port called??? Pls help soon!!!

Answers

An Ethernet port is a connection point for Ethernet cables. It's a socket that enables a device to connect to a wired network. A network adapter or network interface card (NIC) is used to connect the device to the Ethernet port. This is the port that allows communication between the device and the network.

There are several types of Ethernet ports available, each with its own set of features and capabilities. One type is a 10/100 Ethernet port, which supports data transfer speeds of up to 100 Mbps. This type of Ethernet port is commonly found on older computers and routers.

A Gigabit Ethernet port, also known as 10/100/1000 Ethernet, supports data transfer speeds of up to 1 Gbps (gigabit per second). This type of Ethernet port is more common on newer devices and routers.Finally, there are also Multi-Gigabit Ethernet ports, which support data transfer speeds of up to 10 Gbps.

This type of Ethernet port is used in high-end applications such as servers and data centers.In conclusion, an Ethernet port is a crucial component of a wired network that allows devices to communicate with each other and the network as a whole.

For more question on network adapter

https://brainly.com/question/29975680

#SPJ8

In a typical office, biometric authentication might be used to control access to employees and registered visitors only. We know the system will have some false negatives, some employees falsely denied access, so we need a human override, someone who can examine the employee and allow access in spite of the failed authentication. Thus, we need a human guard at the door to handle problems as well as the authentication device; without biometrics, we would have had just the guard. Consequently, we have the same number of personnel with or without biometrics, plus we have the added cost to acquire and maintain the biometrics system. Explain the security advantage in this situation that justifies the extra expense.

Answers

The security advantage in this situation that justifies the extra expense is that these Biometric devices is one that separates the handling of issues regarding biometric information from the system operating system.

It is one that render it impossible for hackers to alter the authentication process.

What is the aim of biometric authentication?

An biometric authentication is known to be a device that is used to handle access in regards to physical and digital resources, e.g. buildings, rooms and other forms of computing devices.

Note that the security advantage in this situation that justifies the extra expense is that these Biometric devices is one that separates the handling of issues regarding biometric information from the system operating system.

It is one that render it impossible for hackers to alter the authentication process.

Learn more about Biometric devices from

https://brainly.com/question/19096951

#SPJ1

Design an experimental method of your choice. 1. Choose a research question 2. Turn it into a hypothesis 3. Identify your dependent and independent variables 4. Name your population 5. Explain how you would choose your sample 6. Describe how you would use an experimental and a control group

Answers

The designed experiment is given below:

Research question: Does drinking green tea improve memory?Hypothesis: Drinking green tea improves memory performance.Independent variable: Drinking green teaDependent variable: Memory performancePopulation: Adults aged 18-65Sample: A random sample of 100 adults aged 18-65 would be selected from the population.What is the rationale for the above response?

Experimental and control groups: Participants would be randomly assigned to either the experimental group or the control group. The experimental group would drink three cups of green tea daily for 4 weeks, while the control group would drink a placebo tea with no active ingredients.

Both groups would take a memory test before and after the 4-week period. The memory test would consist of recalling a list of 20 words after 10 minutes. The mean number of words recalled by each group would be compared using a t-test to determine if there is a significant difference in memory performance between the two groups.

Learn more about experiments at:

https://brainly.com/question/30055326

#SPJ1

100 POINTS LEGIT ANSWERS ONLY. I DON'T MIND REPOSTING. WILL REPORT BAD ANSWERS. [WILL GIVE BRAINLIEST TO THOSE WHO GIVE GOOD ANSWERS.]
What does a Python library contain?

Binary codes for machine use.
A collection of modules or files.
Documentation for Python functions.
Text files of software documentation.

Answers

Answer:  The correct answer is A collection of modules or files

Explanation:   Python’s standard library is very extensive, offering a wide range of facilities as indicated by the long table of contents listed below. The library contains built-in modules (written in C) that provide access to system functionality such as file I/O that would otherwise be inaccessible to Python programmers, as well as modules written in Python that provide standardized solutions for many problems that occur in everyday programming. Some of these modules are explicitly designed to encourage and enhance the portability of Python programs by abstracting away platform-specifics into platform-neutral APIs.

You can trust this answer, I have extensive knowledge in all facets and areas of technology!   :)

_____ accounts for there being no natural connection between a word and its meaning

Answers

The phenomenon that accounts for there being no natural connection between a word and its meaning is known as Arbitrariness.

Arbitrariness refers to the absence of any inherent or logical relationship between the form (sound or written symbol) of a word and its meaning.

In other words, the meanings of words are not determined by their sounds or written representations.

For example, there is no inherent reason why the word "dog" should represent the animal it signifies.

The connection between the word "dog" and the actual four-legged creature is arbitrary and based on convention and cultural agreement. Different languages may use completely different words to refer to the same object or concept, highlighting the lack of natural connection.

Arbitrariness is a fundamental characteristic of human language systems, allowing for flexibility and creativity in forming new words and expressing abstract concepts.

While some words may have historical or etymological connections to their meanings, the overall principle of arbitrariness holds true in most cases.

Hence the answer is Arbitrariness.

Learn more about Arbitrariness click;

https://brainly.com/question/2500029

#SPJ4

one artist mentioned having a separate sundial for each set of three months or each season

Answers

Answer:

each season i think so i am not sure

Other Questions
Refer to your Expeditions in Reading book for a complete version of this text. The article NASA Langleys Modern Figures Reflect on Changing Times, Hidden Figures makes the point that Amer, Martinez, and Williams-Byrd want to give other women the chance to succeed in science and technology jobs? What evidence from the text supports this point? A) Amer, Martinez and Williams-Byrd, all engineers, have known each other for 25 years." B) I didnt even answer the email for a couple of days, C) she said. "'I think all three of us can tell you, we dont take it lightly, Williams-Byrd said. We are prepared and we try to bring it wherever we go.'" D)The most important thing is providing the opportunity, she said. If you dont have the opportunity to do good work and get in the right project, you will never shine. when considering the costs and benefits of a policy, it is important to remember it is usually the ____________ that most affects politics. Decimal for one half 16. What are the carbon emissions (or CO2 equivalents) from air travel by the Banks employees?17. Although the case doesnt mention this, First Class and Business Class passengers are assigned more CO2 emissions than Economy Class passengers. Does that make sense?18. What are the carbon emissions (or CO2 equivalents) from the Banks water consumption? Why does tap water generate any carbon emissions?19. What are the carbon emissions (or CO2 equivalents) from the solid waste that the Bank sends to landfills? Olivia scored 82 points on the first math test of the year. On the second math test, she scored 78 points. A large restaurant/catering establishment has 317 employees. last year 63 separate employees were injured on the job. what percentage of employees were injured last year? Hello help hhhhhhhhhhhhhhhhweeeeeeeeeeeelllllllllllllllppppppppppp What is the total surface area of the triangle prism shown Explain different Tort laws Tort law and Types of contract andBuyer's breach and Sellers breach why do you think bank managers are not always willing to pursue strategies to reduce the fragility of their institutions? banks usually pay relatively (click to select) interest rates on demand deposits and earn relatively (click to select) interest rates on more liquid assets. strategies to reduce fragility are likely to (click to select) profit margins. If an electron's speed is doubled from 0.2c to 0.4c, by what ratios are the momentum, total energy and kinetic energy changed? Repeat this for an electron whose speed is doubled from 0.4c to 0.8c. 3. At what speed does the kinetic energy of a particle equal its rest energy? 4. Find the momentum of an electron (in MeV/c ) whose speed is 0.75c. 5. Find the momentum of a proton whose kinetic energy equals its rest energy. 6. A particle of rest mass 5.00 g moves with speed u=0.70c relative to an observer. Compare its kinetic energy with the classical calculation. 7. The total energy of a proton is 4.50GeV. Find its momentum. How did colonialism, especially with countries such as Britain and France, create a wider war than just within Europe? Keyboard style puts 3 notes in the right hand andnote in the bass. Why did the United States join World War I? If one pound of force acts through a distance of two feet, one foot-pound of work is done. True False Urination is one of the key mechanisms for losing fluid from the human body. please select the best answer from the choices provided. truefalase A function is represented by the graph.Complete the statement by selecting from the drop-down menu.The y-intercept of the function y = 3x + 2 is Choose... the y-intercept of the function represented in the graph.A graph with a line through point (0, 2) and point (2, 6) No questions just need a friend! Chord symbols are written sometimes in Roman numerals and sometimes in Arabic numerals.O TrueO False Find the symmetric equation of the line that passes through the points P (1,3,4) and Q(2,4,6)