In Windows 7/Vista, an MMC is blank by default. What would you add to the MMC to populate it with programs?A. AppletsB. FilesC. DirectoriesD. Snap-ins

Answers

Answer 1

To populate an MMC with programs in Windows 7/Vista, you would add:
D. Snap-ins

Open the Microsoft Management Console (MMC) by clicking on the Start button, typing "mmc" in the search box, and pressing Enter.

In the MMC, click on "File" in the menu bar and then choose "Add/Remove Snap-in."
A list of available snap-ins will appear.

Select the desired snap-ins you want to add to the MMC.
Click "Add" and then "OK" to populate the MMC with the chosen snap-ins.

The snap-ins are now added to the MMC, and you can manage programs and system components using these tools.

Option D. Snap-ins is correct.

For similar question on Windows 7/Vista.

https://brainly.com/question/20713796

#SPJ11


Related Questions

The bus class simulates the activity of a bus. A bus moves back and forth along a single route, making stops along the way. The stops on the route are numbered consecutively starting from up to and including a number that is provided when the bus object is created. You may assume that the number of stops will always be greater than. The bus starts at the first stop and is initially heading toward the last stop. At each step of the simulation, the bus is at a particular stop and

Answers

The answer given below is  a possible implementation of the Bus class in Java.

What is bus?

A bus in computer and technology refers to a communication pathway or connection standard used to transfer data or information between different components or devices.

Here are a few examples:

System Bus

Expansion Bus

USB (Universal Serial Bus)

Data Bus

public class Bus {

   private int numStops;

   private int currentStop;

   private boolean headingTowardsLast;

   public Bus(int numStops) {

       this.numStops = numStops;

       this.currentStop = 1;

       this.headingTowardsLast = true;

   }

   public int getCurrentStop() {

       return currentStop;

   }

   public void move() {

       if (currentStop == 1) {

           headingTowardsLast = true;

       } else if (currentStop == numStops) {

           headingTowardsLast = false;

       }

       if (headingTowardsLast) {

           currentStop++;

       } else {

           currentStop--;

       }

   }

}

The Bus class has three instance variables: numStops, currentStop, and headingTowardsLast. numStops stores the total number of stops on the route, currentStop stores the index of the current stop that the bus is at, and headingTowardsLast indicates whether the bus is currently heading towards the last stop (i.e., true) or the first stop (i.e., false).

The constructor takes one argument, numStops, which is the number of stops on the route. It initializes currentStop to 1 and headingTowardsLast to true.

The getCurrentStop() method returns the index of the current stop.

The move() method updates the current stop and heading direction based on the current state of the bus. If the bus is at the first stop, it sets headingTowardsLast to true. If the bus is at the last stop, it sets headingTowardsLast to false. Then, depending on the current heading direction, it increments or decrements currentStop.

With this implementation, you can create instances of the Bus class and simulate their movement along the route by calling the move() method. You can retrieve the current stop index with the getCurrentStop() method. For example:

Bus bus1 = new Bus(3);

System.out.println(bus1.getCurrentStop()); // prints 1

bus1.move();

System.out.println(bus1.getCurrentStop()); // prints 2

bus1.move();

System.out.println(bus1.getCurrentStop()); // prints 3

bus1.move();

System.out.println(bus1.getCurrentStop()); // prints 2

bus1.move();

System.out.println(bus1.getCurrentStop()); // prints 1

This simulates a bus with a route that has 3 stops, moving back and forth along the route.

To know more about simulate visit:

https://brainly.com/question/28940547

#SPJ1

Hey can y’all help me with this thanks

Hey can yall help me with this thanks

Answers

Answer:The answer is 144

Explanation:First you subtract the two numbers which would be 8-2=6

Then you multiply the 6 by how many numbers there are: 6x2=12

then you multiply 12 by itself: 12x12=144

The __________ backup method is based on the philosophy that a full backup should occur at regular intervals, such as monthly or weekly

Answers

Answer:

full/incremental backup

Explanation:

I believe it's full/incremental backup.

When you execute this block in Scratch, your computer is actually doing several things: retrieving values from memory representing the direction and position of the sprite, performing an algorithm to update these values, and changing the display in the window to match the updated state of the program. All of these actions are represented by just one single block.

Which of the following terms names the phenomenon which is best described by this statement?

a) Iteration
b) Sequencing
c) Compilation
d) Abstraction

Answers

Sequencing is the term that names the phenomenon which is best described by the given statement.

Sequencing refers to the order of logical arrangement whereby an instruction is executed in the proper order. This means that one process must be completed before the next command becomes valid and executes.

From the given statement, the computer is performing various operations in sequence which are:

Retrieving values from memoryPerforming algorithmChanging the display

These functions are done by order, using a single block.

Read more here:

https://brainly.com/question/18744767

For ul elements nested within the nav element, set the list-style-type to none and set the line-height to 2em.

For all hypertext links in the document, set the font-color to ivory and set the text-decoration to none.
(CSS)

Answers

Using the knowledge in computational language in html it is possible to write a code that For ul elements nested within the nav element, set the list-style-type to none and set the line-height to 2em.

Writting the code:

<!doctype html>

<html lang="en">

<head>

  <!--

  <meta charset="utf-8">

  <title>Coding Challenge 2-2</title>

</head>

<body>

  <header>

     <h1>Sports Talk</h1>

  </header>

  <nav>

     <h1>Top Ten Sports Websites</h1>

     <ul>

   

     </ul>

  </nav>

  <article>

     <h1>Jenkins on Ice</h1>

     <p>Retired NBA star Dennis Jenkins announced today that he has signed

        a contract with Long Sleep to have his body frozen before death, to

        be revived only when medical science has discovered a cure to the

        aging process.</p>

        always-entertaining Jenkins, 'I just want to return once they can give

        me back my eternal youth.' [sic] Perhaps Jenkins is also hoping medical

        science can cure his free-throw shooting - 47% and falling during his

        last year in the league.</p>

     <p>A reader tells us that Jenkins may not be aware that part of the

        least-valuable asset.</p>

  </article>

</body>

</html>

See more about html at brainly.com/question/15093505

#SPJ1

For ul elements nested within the nav element, set the list-style-type to none and set the line-height
For ul elements nested within the nav element, set the list-style-type to none and set the line-height

What are characteristics of fluent readers? Check all that apply. reading known words automatically pronouncing words correctly reading words as quickly as possible understanding the meanings of the words being read O looking up all unknown words in the text being read

it's A,B,D​

Answers

Answer:

D,A,B hope this is it!!!!!

Answer:

The person above me is correct

Explanation: credit to him

you receive many calls from customers stating that your web site seems to be slow in responding. you analyze the traffic and notice that you are receiving a number of malformed requests on that web server at a high rate. what type of attack is occurring?

Answers

In the given scenario, the type of attack occurring is known as the Denial of Service (DoS) attack. A Denial of Service attack is a cyber attack where a network resource or server is rendered inaccessible to its intended users by overloading the server with a flood of traffic.

The aim of this attack is to crash the system by flooding it with traffic such that it cannot handle the traffic and users cannot access it.During the attack, the attacker tries to make the system unavailable to users who need it. They target computers, networks, or websites by overwhelming them with data from multiple sources such that the victim’s server can’t process it and cannot respond to any requests to the server. To carry out a DoS attack, attackers use multiple sources of traffic to send a high volume of requests to the victim’s server which overwhelms it, leading to the target server becoming unresponsive to all requests.The term "malformed requests" refers to a request message that violates the syntax or structure of the expected message. They are known as malformed requests because they don't adhere to the format of the HTTP request message format, and as such, the server cannot respond to them in the right manner. These malformed requests are often generated by bots or scripts that have been programmed to launch DoS attacks on target websites.

To know more about Denial of Service visit :

https://brainly.com/question/30167850

#SPJ11

Joe always misspells the word calendar. He types the word as calender but the correct spelling appears on the document. Which feature of the word processor corrects this word?

Answers

Answer:

Auto correct feature

Explanation:

It corrects word written wrongly automatically

How do you print black and white on the ink Canon Pixma/TS3122?

How do you print black and white on the ink Canon Pixma/TS3122?

Answers

Answer:

If this printer can connect to a device wirelessly, then you can configure it through our mobile device. If not , try to click either the button above the yellow lights or below and see if that works.

How do you print a number in a for loop?

Answers

When something continues to run constantly and is on a loop, the same actions are done repeatedly: The same tunes were played continuously on loop by the tape.

What is loop?When something continues to run constantly and is on a loop, the same actions are done repeatedly: The same tunes were played continuously on loop by the tape. SMART Words and phrases from the same vocabulary. The loop is used to execute the code block several times based on the condition stated in the loop. It entails repeating the same code execution, which helps to save code and navigate through an array's contents. to tell a person of what is going on. If something changes, just let me know.Words that are related and synonyms. giving information or telling someone something.

Pictorial Presentation:

Sample Solution:

C Code: #include <stdio.h> void main() { int i; printf("The first 10 natural numbers are:\n"); for (i=1;i<=10;i++) { printf("%d ",i); } printf("\n"); } ...

Flowchart: ...

C Programming Code Editor:

To learn more about loop refer to:

https://brainly.com/question/26098908

#SPJ4

there are methods that help measure application blank information by the degree to which the information differentiates between high- and low-performing individuals. this scoring methodology is called a(n

Answers

Answer: Weighted application blank

Explanation:

write a detail note on the topic of Impact of robots on human
employment

Answers

The effect of robots on human employment is a subject that has sparked a lot of discussion and debate.

Robots and automation technologies have the ability to increase productivity, improve efficiency, and streamline operations, but they also spark worries about the future of work and job displacement.

Here are some important things to think about:

Displacement of jobs.Variations in Skill Requirements.Creating jobs.Productivity gains.

The effect of robots on human employment is multifaceted and context-specific, it is crucial to emphasise.

Thus, different industries, geographical areas, and particular vocations may see different levels of job displacement, job creation, and overall workforce impact.

For more details regarding employment, visit:

https://brainly.com/question/32556383

#SPJ4

coding practice 1.9 project stem

Answers

The coding practice is an illustration of file manipulation

What are file manipulations?

File manipulations are program statements used to read, write and append to files

The program in Python

The program written in Python, where comments are used to explain each line is as follows

# This opens the file in read mode

text = open("myFile.txt", "r")

# This reads each line of the file

eachLine = text.readLine()

#This iterates through the lines

while(eachLine):

# This prints the text on each line

print(eachLine)

# This reads the next line

eachLine = text.readLine()

#This closes the file

text.close()

Read more about file manipulation at:

https://brainly.com/question/16397886

Designers can change the unit of measurement on the ruler by _________it.

Answers

Designers can change the unit of measurement on the ruler by: right-clicking it.

How can Designers Change Unit of Measurement on the Ruler?

In Adobe InDesign, a faster way a designer can change the unit of measurement is by right-clicking where the horizontal and vertical rulers intersect.

After you right-click, the units of measurement for both rulers will change at the same time.

Therefore, designers can change the unit of measurement on the ruler by: right-clicking it.

Learn more about changing unit of measurement on:

https://brainly.com/question/5561341

Definenation monitor​

Answers

Answer:

A computer monitor is an output device that displays information in pictorial form. A monitor usually comprises the visual display, circuitry, casing, and power supply. .

name two different colors used in the python program file window.name the type of program content that has each color ......

whoever answer this correct i will rate them 5 stars and a like .....
please urgent ​

Answers

In the Python program window, black is used for code and syntax, while white is used as the background.

How is this so?

1. Black  -  The color black is typically used for the program's code and syntax. It represents the actual Python code and includes keywords, functions, variables, and other programming constructs.

2. White  -  The color white is commonly used as the background color in the program window. It provides a clean and neutral backdrop for the code and makes it easier to read and understand.

Learn more about python program at:

https://brainly.com/question/26497128

#SPJ1

match each artificial intelligence (ai) technique with its definition. - represent the knowledge of experts as a set of rules that can be programmed so that a computer can assist human decision makers. - software that can identify patterns in very large databases without explicit programming although with significant human training. - loosely based on human neurons, algorithms that can be trained to classify objects into known categories based on data inputs. - algorithms based loosely on evolutionary natural selection and mutation, commonly used to generate high-quality solutions to optimization and search problems. - algorithms that make it possible for a computer to understand and analyze natural human language. - systems that can view and extract information from real-world images. - use of machines that can substitute for human movements as well as computer systems for their control and information processing. - software agents that use built-in or learned knowledge to perform specific tasks or services for an individual. a. robotics b. computer vision systems c. neural networks d. genetic algorithms e. natural language processing f. machine learning g. intelligent agents h. expert systems

Answers

The top AI methods—heuristics, natural language processing, artificial neural networks, machine learning, support vector machines, and markov decision processes—will be covered in this essay.

How does artificial intelligence work?

The replication of human intelligence functions by machines, particularly computer systems, is known as artificial intelligence. Expert systems, natural language processing, speech recognition, and machine vision are some examples of specific AI applications.

What fundamental principle underpins artificial intelligence?

Artificial intelligence is founded on the idea that human intelligence can be described in a way that makes it simple for a computer to duplicate it and carry out activities of any complexity. Artificial intelligence aims to emulate cognitive processes in humans.

To know more about Artificial intelligence visit;

https://brainly.com/question/23824028

#SPJ4

Arman takes a picture with his smartphone which he subsequently posts online. Beatrice finds the picture online and posts a copy of it on her website with an attached Creative Commons license. Which of the following best describes who owns the photo?

Beatrice owns the photo because only holders of a Creative Commons license can own works online.

Arman owns the photo because he was the original creator and did not license the work.

Arman owns the photo because it was granted a Creative Commons license by another person online.

Both own the photo because creating a copy makes it her intellectual property.

Answers

Answer:

Arman owns the photo because he was the original creator and did not license the work.

Explanation:

does anyone have a pdf of the greatest by eddie van der meer????

Answers

Answer

aight' so im finding it but i have to asnwer before someone else so look in the comments for it.

Explanation:

Just wait i getting it rn

James entered into a public cloud computing arrangement without reviewing the standard contract carefully. What problem is he most likely to face as a result?
a) Unexpected cloud downtime
b) Insufficient storage capacity
c) Inadequate data security
d) Inflexible pricing structure

Answers

Unexpected cloud downtime  is the most likely to face as a result.

Thus, A disruption in cloud-based services is known as cloud downtime. The migration of more businesses to the cloud means that any disruption in cloud services might be expensive.

According to Gartner, the average cost of cloud downtime is $300,000 per hour. Major cloud service companies appear to routinely report disruptions. These interruptions can endure for a few hours or several days. Three outages affected AWS in a single month in 2021.

An outage of any length can have a negative impact on the bottom line for businesses that are still working to incorporate cloud technology into their business strategy.

Thus, Unexpected cloud downtime  is the most likely to face as a result.

Learn more about Downtime, refer to the link:

https://brainly.com/question/28334501

#SPJ4

In Python, which relational operator means "greater than or equal to"? (5 points)

V
>=
==
!=

Answers

Answer:

x >= y

Explanation:

which World tool will allow you to quickly count number of words in your document
A) Thesaurus
B) Show and hide
C) word count
D) line spacing ​

Answers

I think the answer will be B

If a user has had an app for a long time and it only recently started acting up what might be the reason?

Answers

There could be several reasons why an app that a user has had for a long time has only recently started acting up. Some possible reasons include:

1. Software updates: The app might have received a recent update which introduced new bugs or compatibility issues.

2. Device updates: The user's device may have received a system update that affected the app's performance or compatibility.

3. Corrupted app data: The app's data may have become corrupted over time, causing unexpected behavior.

4. Limited storage: The user's device could be running low on storage, affecting the app's performance.

5. Conflicting apps: Another app installed on the device might be causing conflicts with the problematic app.

To resolve the issue, the user can try the following steps:

1. Check for app updates: Ensure the app is up-to-date by checking for updates in the app store.

2. Clear app data and cache: Clearing the app's data and cache might fix any corruption issues.

3. Reinstall the app: Uninstall and then reinstall the app to get a fresh start.

4. Check for device updates: Make sure the device's operating system is up-to-date to ensure compatibility.

5. Free up storage: Delete unnecessary files or apps to improve the device's performance.

6. Identify conflicting apps: Investigate if other apps are causing conflicts by temporarily uninstalling them and observing the app's behavior.

Learn more about App Acting Up from : brainly.com/question/29159531

#SPJ11

Font-size property changes
O Color
O Alignment
O Font
Size of font

Answers

O font or Size of the font

Why are salaried employees often excluded from overtime pay

Answers

The reason why salaried employees often excluded from overtime pay because  if they are able to make a given amount or carry out a specific duties that are not recognized, they are said to be not eligible for overtime pay.

Do salaried employees get paid overtime?

A salaried employee is one that gets paid due to different kinds of work. They can be paid overtime unless there is a reason that they do not meet the test for exempt status as stated in the  federal and state laws.

Note that they are not eligible if they are specifically exempted from any form of overtime by the provisions that were given in the California Labor Code or the Industrial Welfare Commission Wage Orders that is known to be regulating wages, hours as well as working time.

Hence, The reason why salaried employees often excluded from overtime pay because  if they are able to make a given amount or carry out a specific duties that are not recognized, they are said to be not eligible for overtime pay.

Learn more about overtime pay from

https://brainly.com/question/19022439

#SPJ1

, , ,g d,t ,dt m,dt ymtd

Answers

Answer:ummm me confused

Explanation:

You are interested in receiving more information about a special topic, including emails, announcements and advertising. What can you do? Group of answer choices Bookmark Websites about the topic on your favorite browser. Join a newsgroup about the topic. Subscribe to a listserve group about the topic. Set your browser's home page to a topical Website.

Answers

Answer:

The answer is "Subscribe to a listserve group about the topic".

Explanation:

A Listserv would be a software suite that is used to run a discussion list through community e-mail. Even so, LISTSERV is indeed a trademark of L-Soft Global who created some of the first and most famous mailing list programs.

It is a way to communicate by e-mail to a community of people. They send an e-mail to "reflecting" and the software gives an e-mail to all subscribers of both the Group.

what are different features of ms access​

Answers

1. Tables: Access allows users to create tables to store and organize data. Tables have rows and columns, and provide a structured structure for storing data.

2. Forms: Access provides a form builder that simplifies data entry and improves the user interface. Forms allow users to enter data into tables in a simple and structured way.

3. Reports: Access enables users to create professional-looking reports based on data stored in tables. Reports can include charts, graphs, summaries, and other visual elements to present data in a meaningful way.

4. Queries: Access provides a query building tool that allows users to extract specific information from tables. Queries help retrieve data, perform calculations, and create new tables or views based on specified criteria.

5. Relationships: Access methods allow users to establish relationships between tables. This ensures data consistency and allows data recovery and maintenance across multiple tables.

6. Macros and Visual Basic for Applications (VBA): Access supports automation through macros and VBA. Macros provide a way to automate common tasks, while allowing for advanced flexibility and programming capabilities in VBA Access.

7. Security: Access provides security features to protect databases and control user access. Users can set permissions, passwords and encryption to ensure data privacy and integrity.

8. Integration with other Microsoft Office applications: Access seamlessly integrates with other Microsoft Office applications such as Excel, Word, and Outlook to share, import, and export data

These are just some of the features that make Microsoft Access a powerful tool for database management and data analysis.

tom is a web developer who also runs an online store. he uses ads. he wants to integrate conversion tracking on his site with the updated ads conversion tracking tag (gtag.js). what must he do in order integrate conversion tracking?

Answers

With the help of this simple, step-by-step tutorial, you can configure conversion tracking and increase your ROI.

What actions must he take to incorporate conversion tracking?

Put the tag code between each web page's tags. The section of your HTML pages containing the global site tag snippet should be added to each page of your website. Because of this, he needed to integrate the latest conversion tracking tag (gtag) on his website.

Where should the code for conversion tracking be placed?

Put your conversion tracking code between the page's head tags (): your tag comes first, followed by any event snippets that relate to the page. (If you haven't already, follow these instructions to create your tag.) Save the changes to your webpage.

To know more about  conversion tracking visit:-

https://brainly.com/question/13955537

#SPJ4

Select the attributes shared by lossy and lossless compression.
a. use a computer program
b. make files smaller
c.compress digital data

Answers

Both lossy and lossless compression techniques are used to compress digital data and make files smaller. However, the explanation part is that they differ in how they achieve this goal. Lossless compression preserves all the original data and can reconstruct it perfectly after decompression, while lossy compression sacrifices some data to achieve a higher compression ratio.


Both techniques use a computer program and compress digital data, but lossy compression also involves sacrificing some data. Both lossy and lossless compression methods involve the use of a computer program to reduce the file size, making it smaller for easier storage and transmission. Additionally, they both focus on compressing digital data, such as images, audio, and video files. The key difference between them is the retention of data quality; lossless compression preserves the original quality, while lossy compression sacrifices some quality for further reduction in file size.

To know more about  Computer program to visit:

brainly.com/question/3397678

#SPJ11

Other Questions
The total cost of interest on a home purchased for $200,000 with 30% down at 7% for 35 years is $235,732. Group startsTrue or FalseTrue, unselectedFalse, unselected y-7 = (12-x)2 in vertex form Comparisons of tooth wear in living apes and extinct Miocene apes suggest that some extinct species of apes ate Group of answer choices leaves, grass, and bark. nuts, fruits, and small animals. leaves, nuts, and fruits. insects, fruit, and leaves. a plane traveled 1hr and 20 min why coming back it use 80 min why?this is a challenge guys let's do it Question 1 1 pts After successfully clearing the bar during the pole vault, the vaulter falls to the landing cushion while trying to calculate the impending impulse which will break his fall. If his momentum is -980 kg.m/s and he has a velocity of -12.5 m/s just prior to landing, what is the mass of the vaulter? 98.1 ks 980.0 kg 78.4 kg BOOK After successfully clearing the bar during the pole vault, the vaulter falls to the landing cushion while trying to calculate the impending Impulse which will break his fall. If his momentum is -980 kg.m/s and he has a velocity of -12.5 m/s just prior to landing, what is the mass of the vaulter? 98.1 ks 980.0 kg 0 78.4 kg 80.0 Which of the following, with regard to the entire database, should be made on a regular basis?a. backupb. baselinec. after imaged. retread 2. "Un pequeo paso para el hombre, pero un granpaso para la humanidad (Neil Amstrong). Seale lafigura literaria de esta fraseA. Hiprbole-retrucanoB. Antitesis-hiprboleC. Prosopopeya-cronografaD. Sinestesia-oxmoron A firm's cost of debt can be Blank______. Multiple select question. obtained by talking to investment bankers estimated more easily than its cost of equity obtained by checking yields on publicly traded bonds taking the present value of the tax shields from fixed assets Perceptual map and brand positioningSelect Answer(s)are not related: perceptual maps can be drawn by marketers without consumer input.are related: axes on the map show attributes by which brands are positioned.are related: brands are graphically shown on the perceptual map. In the figure below, the segments AB and AC are tangent to the circle centered at O. Given that AC=9 and OA= 10.6, find OB. suppose that a perfectly competitive industry is in long-run equilibrium. the price of a complement good decreases. what will happen? multiple choice next period a typical firm will increase output. next period a typical firm will earn positive economic profit. some firms will be forced to exit the industry. both "next period a typical firm will increase output" and "next period a typical firm will earn positive economic profit". all of the choices are correct. Write the integersthat are closest to the number inthe middle to complete the statement.___< y/41 < ___ 1. Who was the French military leader in North America during the French and Indian War? General Edward Braddock General Louis de Montcalm Colonel George Washington a highly respected Iroquois tribal chief [tex](16^3/2)^1/2[/tex] think of an organization you have worked for or one with which you are very familiar. diagnose the need for change and present a plan to transform the organization, utilizing kotters 8-step approach. you will need to research the kotter 8 step change model extensively. you are encouraged to first review the kotters eight step leading change model (links to an external site.) article. you may select any organization or department where you work or where you have previously worked; however, you are strongly encouraged to diagnose one problem area in the company. attempting to diagnose an entire company is not feasible, and you will become bogged down. Consider a system with two components We observe the state of the system every hour: A given component operating at time n has probability p of failing before the next observation at time n LA component that was in failed condition at time n has a probability r of being repaired by time n + 1, independent of how long the component has been in a failed state. The component failures and repairs are mutually independent events Let Xj be the number of components in operation at time n. The process {Xn n = 0,1,-} is a discrete time homogeneous Markov chain with state space I= 0,1,2 a) Determine its transition probability matrix, and draw the state diagram. b) Obtain the steady state probability vector, if it exists. . Dylan is saving up $2.50 each week. The total amount of his savings, s, in dollars, depends on how many weeks, w, he has saved. In the table below, select the phrase that represents the independent variable, the phrase that represents the dependent variable, and the equation that represents the graph. can someone help? ill give brainist if correct what is considered a high-priority health issue in the united states? responses anorexia anorexia immunizations immunizations autism autism dental health Slip N' SlideWater BalloonsSponge TossWater TagWater LimboLength5 1/2 yards1 3/4 yards5 yards6 1/2 yards3 1/2 yardsWidth4 yards5/6 yards5 2/7 yards4 2/5 yards3 2/4 yardsPerimeterArea