make a list of activities for which a standard mobile phone would be more suitable than a smartphone

Answers

Answer 1

The list of activities for which a standard mobile phone would be more suitable than a smartphone are by the camera, cost, functions, and rate.

Why simple telephones are higher than smartphones?

They eschew the benefit of a tool that places the net of their pocket. For quite a few reasons — inclusive of decreased preliminary value, higher battery life, less expensive month-to-month plans, improved privacy, or a distraction-unfastened lifestyle — they pick out a in place of a tele cell smartphone.

CameraMany everyday cellular telephones are prepared with cameras, however now no longer of the fine discovered on smartphones.PurposeSmartphones provide customers a stage of on-the-move comfort now no longer matched through fashionable telephones, growing consumer efficiency.

Read more about the smartphone :

https://brainly.com/question/917245

#SPJ1


Related Questions

A group of two or more integrated hard drives is called a(n) _____.a.EIDEb.HDDc.SSDd.RAID

Answers

Answer:

A group of two or more integrated hard drives is called a RAID (Redundant Array of Independent Disks).

Explanation:

Why do people post about family problems?

Answers

Answer:

Some people go through things either traumatizing or painful to them emotionally/mentally past or future. They seek comfort or a feeling thatll make them feel safe for a moment and have comfort from the fear of what may be outside there door wherther its abuse mentally or physically.

2. Assume that x and y are boolean variables and have been properly initialized.
(x && y) && ! (x & & y)
The result of evaluating the expression above is best described as
Aalways true
(B) always false
(C) true only when x is true and y is true
(D) true only when x and y have the same value-
(E)true only when x and y have different values

2. Assume that x and y are boolean variables and have been properly initialized.(x && y) &&

Answers

Assume that x and y are boolean variables and have been properly initialized. The result of evaluating the expression above is best described as (B) always false.

What is the Boolean variables about?

The logical AND operator && returns true only when both operands are true. For example, true && true is true, true && false is false, and false && false is false.

The expression (x && y) is true only when both x and y are true, and the expression ! (x & & y) is the negation of this, which is true only when x and y are not both true.

Therefore, the overall expression is only true when x and y are both true and also not both true at the same time, which is not possible. As a result, the expression is always not true.

Learn more about Boolean from

https://brainly.com/question/13527907

#SPJ1

how might an advertiser judge the effectiveness of the internet compared to other media? click rates landing pages worms digital signatures trojans

Answers

Advertisers use various metrics to judge the effectiveness of internet advertisements, in comparison to other media.

Metrics that are commonly used to evaluate the effectiveness of internet advertising include click rates, landing pages, worms, trojans, and digital signatures. These are discussed below:

Click rates: An important measure of effectiveness is the number of clicks received by an advertisement. Click rates reflect the effectiveness of an advertisement in capturing the attention of viewers.Landing pages: Advertisers use landing pages to track the effectiveness of their campaigns. Landing pages allow advertisers to track clicks, page views, and other metrics that reflect the success of their campaigns.Worms: Worms are programs that are designed to spread quickly across the internet. Advertisers can use worms to promote their products by embedding advertisements in the worm's payload.Trojans: Trojans are programs that are designed to install malware on a user's computer. Advertisers can use trojans to deliver targeted advertisements to users who are interested in their products.Digital signatures: Advertisers use digital signatures to ensure the authenticity of their advertisements. Digital signatures are unique identifiers that are attached to an advertisement, allowing advertisers to track its distribution and performance across the internet.

Learn more about advertising at:

https://brainly.com/question/32366341

#SPJ11

Write a function called "getOdd" where it takes in any string input and prints out the characters in the sentence whose decimal ASCII values are odd.
So, for example, if the input was "ABCD", we would only print out "AC" since A is 65 and C is 67.

PLEASE ANSWER ASAP
FIRST PERSON GET BRAINEST AWARD!!!!

Answers

Answer:

Change this around however you'd like:

Explanation:

def getOdd(word) -> str:

wordArr = word.split()

wordArr = list(fliter(lambda x: ord(x) % 2 != 0, wordArr))

return "".join(wordArr)

(Sorry if formatting is a bit off, I'm on mobile)

Name the tools in plant propagation.
Q
18.
16.
17.
19.
20.
please po asap​

Name the tools in plant propagation.Q18.16.17.19.20.please po asap

Answers

16. Branch or tree cutter
17.paint tape
18. Knife
19. Pots
20. Waterer

1)Which tool can you use to find duplicates in Excel?
Select an answer:
a. Flash Fill
b. VLOOKUP
c. Conditional Formatting
d. Concatenation
2)What does Power Query use to change to what it determines is the appropriate data type?
Select an answer:
a.the headers
b. the first real row of data
c. data in the formula bar
3)Combining the definitions of three words describes a data analyst. What are the three words?
Select an answer:
a. analysis, analyze, and technology
b. data, programs, and analysis
c. analyze, data, and programs
d. data, analysis, and analyze

Answers

The tool that you can use to find duplicates in Excel is c. Conditional Formatting

b. the first real row of datac. analyze, data, and programs

What is Conditional Formatting?

Excel makes use of Conditional Formatting as a means to identify duplicate records. Users can utilize this feature to identify cells or ranges that satisfy specific criteria, like possessing repetitive values, by highlighting them.

Using conditional formatting rules makes it effortless to spot repeated values and set them apart visually from the other information. This function enables users to swiftly identify and handle identical records within their Excel worksheets, useful for activities like data examination and sanitation.

Read more about Conditional Formatting here:

https://brainly.com/question/30652094

#SPJ4

instead of creating a pivot table and then add to power query. can we convert the raw data to look like a pivot table in power query?

Answers

It is possible to convert raw data to look like a pivot table in Power Query. Pivot table is an essential tool to summarize data from a large table, but converting raw data into a pivot table is not possible in Power Query.

However, Power Query can transform raw data into a format similar to a pivot table by performing the following steps:Step 1: Load the raw data into Power Query by selecting the table and clicking on the "Data" tab and then on "From Table/Range."Step 2: In the Power Query Editor, select the columns to be summarized and click on the "Group By" button in the "Transform" tab.Step 3: In the "Group By" dialog box, specify the column to group by and the column to summarize by choosing the aggregation method. Click "OK" to apply the changes to the data.

Step 4: Add additional columns using the "Add Column" button, such as calculated columns or columns to filter the data.Step 5: Finally, load the transformed data into Excel by clicking on the "Close & Load" button or by selecting "Close & Load To" and choosing the desired location and format. Power Query has transformed the raw data into a summarized format that looks similar to a pivot table.

Learn more about  raw data: https://brainly.com/question/30557329

#SPJ11

Modify our in-place quick-sort implementation of Code Fragment 12. 6 to be a randomized version of the algorithm, as discussed in Section 12. 2. 1

Answers

The modified implementation adds random selection of pivot elements to reduce worst-case behavior in the in-place quic-ksort algorithm.The code is mentioned below.

Here is the modified in-place quicksort implementation that incorporates a random pivot:

/** Sort the subarray S[a..b) inclusive. */

private static <K> void randomizedQuickSortInPlace(K[ ] S, Comparator<K> comp, int a, int b) {

   if (a >= b) return; // subarray is trivially sorted

   int left = a;

   int right = b-1;

   // randomly select a pivot and swap it with the last element

   int pivotIndex = a + (int)(Math.random() * (b - a));

   K temp = S[pivotIndex];

   S[pivotIndex] = S[b];

   S[b] = temp;

   K pivot = S[b];

   while (left <= right) {

       // scan until reaching value equal or larger than pivot (or right marker)

       while (left <= right && comp.compare(S[left], pivot) < 0) left++;

       // scan until reaching value equal or smaller than pivot (or left marker)

       while (left <= right && comp.compare(S[right], pivot) > 0) right--;

       if (left <= right) { // indices did not strictly cross

           // so swap values and shrink range

           temp = S[left];

           S[left] = S[right];

           S[right] = temp;

           left++;

           right--;

       }

   }

   // put pivot into its final place (currently marked by left index)

   temp = S[left];

   S[left] = S[b];

   S[b] = temp;

   // make recursive calls

   randomizedQuickSortInPlace(S, comp, a, left-1);

   randomizedQuickSortInPlace(S, comp, left+1, b);

}

The main modification is the addition of a random pivot selection step at the beginning of each recursive call. The pivot index is chosen randomly between the range [a, b), and the pivot element is swapped with the last element S[b]. This ensures that the pivot is chosen randomly and reduces the likelihood of worst-case behavior in the sorting algorithm. The rest of the algorithm is the same as the original in-place quicksort implementation.

The original in-place quicksort algorithm uses the last element of the subarray as the pivot element. This approach can lead to worst-case behavior when the input array is already sorted or nearly sorted. This is because the algorithm will always choose the largest or smallest element as the pivot, causing each recursive call to only reduce the size of the subarray by one element. This results in an O(n^2) time complexity.

The randomized version of quic-ksort aims to reduce the likelihood of worst-case behavior by randomly selecting a pivot element. By doing so, the pivot is likely to be chosen from a more diverse set of elements, reducing the likelihood of the worst-case scenario.

Learn more about quick-sort here:

https://brainly.com/question/17143249

#SPJ4

The complete question is:

Change Code Fragment 12.6's in-place quick-sort implementation to a randomised version of the algorithm,

/** Sort the subarray S[a..b) inclusive. */ private static <K> void quickSortInPlace(K[ ] S, Comparator<K> comp, int a, int b) { if (a >= b) return; // subarray is trivially sorted int left = a; int right = b-1; K pivot = s[b]; K temp; // temp object used for swapping while (left <= right) { // scan until reaching value equal or larger than pivot (or right marker) while (left <= right && comp.compare(S[left), pivot) < 0) left++; // scan until reaching value equal or smaller than pivot (or left marker) while (left <= right && comp.compare(S[right], pivot) > 0) right--; if (left <= right) { // indices did not strictly cross // so swap values and shrink range temp = S(left); S[left] = s[right]; S[right] = temp; left++; right-- } } // put pivot into its final place (currently marked by left index) temp = S(left); S[left] = s[b]; S[b] = temp; // make recursive calls quickSortInPlace(S, comp, a, left 1); quickSortInPlace(S, comp, left + 1, b); }

A ____ reference is an adjusted cell reference in a copied and pasted formula. A. revised B. relative C. recycled D. retained

Answers

A B. Relative reference is an adjusted cell reference in a copied and pasted formula.

When a formula is copied and pasted to another cell, the cell references in the formula are automatically adjusted based on their position relative to the new cell. This means that the formula will still work correctly, but the cell references will refer to different cells than they did in the original formula. This is called a relative reference because it is based on the relative position of the original cell references to the new location of the formula.


Other types of references that can be used in formulas include absolute references, which refer to specific cells and do not change when the formula is copied, and mixed references, which combine aspects of both relative and absolute references. However, relative references are the default type of reference used in most formulas, as they are the most flexible and allow the formula to be easily copied and pasted to new locations without requiring manual adjustments to the cell references. Therefore, the correct answer is option B.

know more about Relative here:

https://brainly.com/question/31751698

#SPJ11

if you do not create a constructor for your class, c++ will synthesize a working constructor for you

Answers

In C++, if you do not define a constructor for your class, the compiler will generate a working constructor for you. This is known as a synthesized constructor.

The synthesized constructor is a default constructor that initializes each data member in the class to its default value.

A constructor is a special type of function that is used to initialize the object of a class. When an object is created, it is constructed and memory is allocated for it. The constructor is called automatically when the object is created.

The constructor's purpose is to initialize the object's data members to their default values.The following is an example of a class that has a default constructor:``` class MyClass { public: MyClass() { // Constructor } };```In the example above, the constructor has an empty body because it does not need to initialize any data members

Learn more about compiler at

https://brainly.com/question/33460459

#SPJ11

Gillette five knife fusion saving system has 70 patents protecting its products technology, making it more likely that ............ can be used successfully.

Answers

technology Innovation and advanced features can be used successfully with the Gillette Fusion shaving system due to its extensive patent protection.

The 70 patents protecting the Gillette Fusion shaving system's technology indicates that it is highly advanced and innovative. This level of protection helps to ensure that competitors cannot easily replicate the technology, giving Gillette a competitive advantage in the market. The patents also provide legal protection for the company, allowing them to take legal action against any potential infringement. This level of security makes it more likely that Gillette can continue to innovate and develop their products with advanced features that can be used successfully in the market.

learn more about device here:

https://brainly.com/question/20414679

#SPJ11

your company purchases several windows 10 computers. you plan to deploy the computers using a dynamic deployment method, specifically provision packages. which tool should you use to create provisioning packages?

Answers

To create provisioning packages for deploying Windows 10 computers using a dynamic deployment method, you should use the Windows Configuration Designer tool.

Windows Configuration Designer (formerly known as Windows Imaging and Configuration Designer or Windows ICD) is a powerful graphical tool provided by Microsoft to create provisioning packages. It allows you to customize and configure various settings, policies, and applications to be applied during the deployment process.

Using Windows Configuration Designer, you can create provisioning packages that define the desired configurations for Windows 10 computers. These packages can include settings such as network configurations, security settings, regional preferences, installed applications, and more.

The tool provides an intuitive interface that guides you through the process of creating the provisioning package. You can select the desired configuration options, customize settings, and preview the changes before generating the package.

Once the provisioning package is created using Windows Configuration Designer, it can be applied during the deployment process to configure multiple Windows 10 computers with consistent settings and configurations. The provisioning package can be installed manually or through automated deployment methods like Windows Autopilot or System Center Configuration Manager (SCCM).

In summary, to create provisioning packages for deploying Windows 10 computers using a dynamic deployment method, you should use the Windows Configuration Designer tool. It enables you to customize settings and configurations, which can be applied during the deployment process to ensure consistent and efficient provisioning of Windows 10 computers.

Learn more about Designer here

https://brainly.com/question/32503684

#SPJ11

REOLVER EL SIGUIENTE PROBLEMA: R1=1.7K, R2=33K R3=4.7K R4=5.9K R5=17K IT=20mA CALCULAR: VT, I1, I2, I3, I4, I5 Y RT

Answers

Answer :

Ok

Step-by-Step Explanation:

After the Afton family dies what animatronics do their souls posses. Michael Afton dose not posses an animatronic but what dose Michael become and what is his animatronic "friend". UwU

Answers

Answer:

Michael becomes Golden Freddy.

Explanation:

I hate I know this and I know it's a joke but here we go

In theory, they all become -

Mrs. Afton - Ballora

Elizabeth - Circus Baby

William Afton - Doesn't really become anyone but he is inside Springtrap

The Crying Child - Theorised to be Golden Freddy

Michael Afton - Doesn't become anyone at all, but does have robot spaghetti of all the Sister Location animatronics// his friend is Eggs Benedict but no one knows for sure.

x = 100
if x > 0:
x -= 1
print(x)

Answers

Answer:

Explanation:

Program  and Reault:

x = 100if x &gt; 0: x -= 1print(x)

Network Segmentation comes in handy for organizations that seek to prevent lateral network attacks across and within their network. Explain the concept of network segmentation and present at least two (2) practical ways by which this can be implemented. [10 marks] (b) Define the phrase 'access control'. Explain identification, authentication, authorization, and accountability as the four mechanisms underpinning all access controls approaches.

Answers

Network Segmentation is the process of dividing a computer network into smaller subnetworks, each of which operates as a separate network segment.

Network segmentation is essential for organizations that want to prevent lateral network attacks both across and within their network. Network segmentation can be implemented in several ways, and two practical methods are listed below.1. VLAN (Virtual Local Area Network): The simplest way to segment a network is to use VLANs.

It can be done using a switch and is used to divide traffic based on logical grouping. With VLAN, you can divide the network into different sections, each of which can only communicate with devices within that VLAN.2. Subnetting: Another way to segment the network is through subnetting. Subnetting is the process of dividing a network into smaller subnets or sub-networks.  

To know more about networks visit:

https://brainly.com/question/33635630

#SPJ11

"Documentation of the visit should consist of ______

Answers

The documentation of the visit should include a detailed report, photographs, relevant receipts, signed agreements, and any other relevant materials, which provide a comprehensive record of the visit's activities, expenses, and outcomes.

When documenting a visit, it is important to include essential elements such as the purpose of the visit, date and time of the visit, location or site visited, individuals present or involved, observations made, discussions held, any actions or decisions taken, and any other pertinent information. Additionally, any supporting documents, photographs, or evidence related to the visit should be included as part of the documentation. The purpose of documenting the visit is to create a comprehensive and reliable record that can be referred to in the future for various purposes, such as reference, analysis, reporting, or legal documentation. The documentation should be clear, organized.

Learn more about documentation here:

https://brainly.com/question/27396650

#SPJ11

Stacy often accesses business directories on websites to search for vendors. However, while browsing other websites, she notices advertisements related to her preferences. What must Stacy do to prevent her browser from tracking her online preferences? A. delete cookies B. download software C. click an advertisement D. avoid shopping online

Answers

Delete cookies are small files that contain information about a user's browsing habits, and can be used to track online preferences.

What is information?

Information is data that has been processed, organized, or structured in a meaningful way. It can refer to the facts and details that are used to describe a situation, as well as knowledge that is acquired through experience or education. Information is typically stored and retrieved from a computer system or other type of storage device.

To prevent her browser from tracking her online preferences, Stacy must delete her cookies. This can be done by accessing her browser's privacy settings and deleting any stored cookies.

To learn more about information

https://brainly.com/question/14583494

#SPJ1

The four main parts of a computer system are the Input, output, processor, and:
O A core.
OB. hardware.
OC. software.
OD. storage.

Answers

Answer:D) Storage

Explanation:

Most hard drives are divided into sectors of 512 bytes each. Our disk has a size of 16 GB. Fill in the blank to calculate how many sectors the disk has. Note: Your result should be in the format of just a number, not a sentence.
disk_size = 16*1024*1024*1024
sector_size = 512
sector_amount =
print(sector_amount)

Answers

The answer is pretty simple to achieve for this question. Multiply the disk size and then divide by the sector size - this will result in the total number of sectors. The reason the disk size shows “16*1024*1024*1024” is because there are 1024 bytes (B) in one kilobyte (1KB), and 1024KB in one megabyte (1MB), and 1024MB in one gigabyte (1GB). So, once you find out how many total bytes you have and then divide the total number of bytes by sector size (512), you will arrive at the answer.

You would like your presentation to toggle to the Internet to play a news clip. Which feature will accomplish this?
a)broadcast
b)create a video
c)video from file
d)video from website ​

Answers

Answer:

Video from website

Explanation:

Answer:

D is correct.

Explanation:

On Edge.

The memory address that is saved by the system when a method is called and is the location to which the system should return after a method ends is known as the ________.

Answers

Answer:

Return point

Explanation:

larry wants to upgrade to windows 10. he will use his computer both at home and at work and will need to connect to his company's wi-fi peer-to-peer network to share files over the network. which version of windows 10 would you recommend to larry?

Answers

Recommended Windows 10 Pro, as this version of Windows 10 includes features such as Domain Join, Group Policy Management, and the ability to connect to a company's Wi-Fi peer-to-peer network for file sharing.

What is network ?

A group of computers exchanging resources that are available on or offered by network nodes is known as a computer network. Over digital links, the computers communicate with each other using standard communication protocols. These links are made up of telecommunication communication networks, which are based on physically wired, optic, and wireless transmission ways and may be set up in a number of different network topologies.

To know more about network
https://brainly.com/question/29350844
#SPJ1

what is the difference between EPROM and EEPROM, explain why​

Answers

Answer:

The main difference between EPROM and EEPROM is that, the content of EPROM is erased by using UV rays. On the other hand, the content of EEPROM is erased by using electric signals. In EPROM, UV light is used to erase the EPROM's content. In EEPROM, electric signal is used to erase the EEPROM's contents :)

Explanation:

HOPE THIS HELPS <333

what is thesaurus?what do you mean by spell chek feature

Answers

Answer:

Thesaurous is a book that lists words in groups of synonyms and related concepts.

A Spell Checker (or spell check) is a Software feature that checks for misspellings in a text. Spell-checking features are often embaded in software or services, such as word processor, email client, electronic dictionary, or search engine.

Pls help!!!!!!!!!!!!

Pls help!!!!!!!!!!!!

Answers

Answer:

i am 100% sure it is (B)

Explanation:

To delete offensive or irrelevant posts  

Good HTML skills will be required in order to prevent what from happening in the design of a web page?

Answers

Answer:

to properly use the tags in the web page

Explanation:

The full form HTML is Hyper Text Mark up Language. HTML is used in designing a good web page in the computer. It is used to design the document that are displayed in the web browser.

Instead of using a programming language to do the functions of a web page, the markup language uses the tags to identify the different types of the contents and purposes that they serve in the web page. A good HTML skills are required to prevent the web page from any improper designing of the contents in the web page.

lewis must create a code for his locker. it must be 3 characters long. for each character, he may choose from all ten digits (0-9), and he may not repeat digits. how many different codes can he create?

Answers

, Lewis can create 720 different codes for his locker.

To calculate the number of different codes Lewis can create for his locker, we can use the concept of permutations. Since he has 10 digits to choose from (0-9) for each of the three characters, and he cannot repeat digits, the number of different codes can be calculated as follows:
For the first character, he can choose from 10 digits (0-9).
For the second character, since he cannot repeat digits, he can choose from 9 remaining digits.
For the third character, he can choose from 8 remaining digits.
To calculate the total number of different codes, we multiply these choices together:
10 (choices for the first character) * 9 (choices for the second character) * 8 (choices for the third character) = 720.

To know more about codes visit:

brainly.com/question/29405280

#SPJ11

the speed of processor is being limited by system firmware. T/F

Answers

True. The speed of a processor can be limited by system firmware, which is responsible for managing the hardware and software components of a computer system. The firmware controls the communication between the hardware and software and sets the limits on how fast the processor can run.

This is often done to prevent the system from overheating or causing damage to the hardware components. System firmware is updated periodically to optimize system performance and ensure that the processor runs at its maximum capacity without causing any damage or issues. Therefore, if you are experiencing slow processing speed, it could be due to the limitations set by the system firmware.

To learn more about firmware click here: brainly.com/question/28945238

#SPJ11

Other Questions
if an atom has 4 protons, 5 neutrons, and 4 electrons, what would its atomic mass be? what is biology?? thats all ig. 1.Find the first positive solution of the equation:2cos(3x) = -1 the major chemical constituent of a cell, by weight, is 6. (a) In the box draw the structure of D-Cysteine-L-Glutamic acid (i.e., a dipeptide; D-Cys-L-Glu) at pH 8.0 (see Table 1); (b) Indicate on the structure whether the two chiral centers are R or S, in what does ""connotations of privilege and sophistication"" mean? The scream of the fire alarm sliced through the air. The instructor summoned me to the front of the classroom to give my oral presentation.Which sentence most effectively combines the two sentences?The scream of the fire alarm sliced through the air, immediately after the instructor summoned me to the front of the classroom to give my oral presentation.The air was sliced by the scream of the fire alarm, and immediately the instructor summoned me to the front of the classroom to give my oral presentation.Immediately after the instructor summoned me to the front of the classroom to give my oral presentation, the air was sliced by the scream of the fire alarm.Immediately after the instructor summoned me to the front of the classroom to give my oral presentation, the scream of the fire alarm sliced through the air. When the focus audience of a piece of literature is the writer, the purpose of the piece is informative persuasive entertaining expressive It is estimated that only around 200,000 Americans have central heterochromia (two different eye colors in the same eye). If the population of the United Stateswas 327,750,000 people at the time of this report, what percent of Americans had central heterochromia?0.0061%0.00061%0.61%0.061% When is e-mail inappropriate? 1. When adding two integers, what will the sign of the sum be if: c. one integer is positive and one integer is negative? who is correct ? fatima or shahad What is the value of: |3| Plz help! Due tonight!How did the Holocaust affect Jews and other targeted groups living in territories controlled by Nazis? Which themes are presented in the poem "The Prediction"?It is hard to judge people's impressions, and it is challenging to exceed your own expectations.It is hard to try new things, and it is challenging to share personal information with strangers.O It is hard to decide the right thing to wear in public, and it is challenging to say no to temptation.It is hard to leave your friends behind, and it is challenging to forget the mistakes you have made. which of the following options affects a plants rate of photosynthesisA. amount of wind B. day of the week C. size of the flower petals D. strength of the light Daisy low grows the Girl Scouts: part b which detail from the text best supports the answer to part a What is one of the best ways to look for context clues in order to understand the meaning of a passage?Find the root word in a dictionary and then try to figure it out from there.Find the meaning of a the word in a dictionary.Infer meaning by reading between the lines and thinking about the connotation of words.Read the sentence immediately following the sentence that has the word in it. A new waste truck is needed for a portion of the city. Compare the asset with the Benefit-Cost method? The interest rate is 8% Present value = $55,000 Annual cost $11,500 Annual savings $28,500 Salvage value = $6,800 Life in years = 10 O a. B/C=1.40 O b. B/C = 1.88 O c. B/C = 0.72 d.B/C=1.47 An ice cream store recorded the flavors of its recent cone sales.chocolate 10cookie dough 6mocha 20vanilla 8Considering this data, how many of the next 99 cones sold would you expect to have mocha ice cream?