ODD-EVEN. Write a snippet code to solve the following. Assume that you have an array of positive integers arr. The array is already full and properly populated with positive int numbers. The array arr is of size SIZE. ( no need to declare it or fill it up, assume it is already there). You will copy all the even numbers into an array of size SIZE called even

and

You will copy all the odd numbers into an array of size SIZE called odd

You will print the total numbers on each array

Answers

Answer 1

Note that the code that executes the above is given as follows;

// initialize arrays

int[] arr = {2, 5, 7, 8, 10, 11, 14, 16};

int[] even = new int[arr.length];

int[] odd = new int[arr.length];

int evenCount = 0;

int oddCount = 0;

// copy even and odd numbers into respective arrays

for (int i = 0; i < arr.length; i++) {

   if (arr[i] % 2 == 0) {

       even[evenCount] = arr[i];

       evenCount++;

   } else {

       odd[oddCount] = arr[i];

       oddCount++;

   }

}

// print total numbers in each array

System.out.println("Even numbers:");

for (int i = 0; i < evenCount; i++) {

   System.out.print(even[i] + " ");

}

System.out.println("\nTotal: " + evenCount);

System.out.println("\nOdd numbers:");

for (int i = 0; i < oddCount; i++) {

   System.out.print(odd[i] + " ");

}

System.out.println("\nTotal: " + oddCount);


What is the rationale for the above response?

This code initializes an array arr with some values and creates two new arrays even and odd of the same size as arr.

It then loops through each element of arr and checks if it's even or odd, and copies it into the appropriate array. It also keeps track of how many even and odd numbers there are using evenCount and oddCount.

Finally, it prints out the values in each array and the total number of elements in each array.

Learn more about Codes at:

https://brainly.com/question/29099843

#SPJ1


Related Questions

Type the correct answer in the box. Spell all words correctly. Define the term semiconductor. A semiconductor is a material that can carry an electric current between a ______and an insulator.

Answers

The correct answer to complete the sentence is conductor.

A semiconductor is a material that can carry an electric current between a conductor and an insulator.

What is a conductor?

A conductor is a material which allows the easy passage or flow of electricity through it.

What is an insulator?

Insulators are materials that do not allow the passage of electricity to pass through it.

Learn more about conductors and insulator:

https://brainly.com/question/11845176

The Spanning Tree Protocol operates at the Network layer of the OSI model. T/F.

Answers

False, the Spanning Tree Protocol operates at the Data Link layer of the OSI model.

What is the Spanning Tree Protocol? The Spanning Tree Protocol (STP) is a network protocol used to determine the best logical path for data transmission over a network that has a mesh or mesh-like topology, and it's designed to avoid broadcast storms and switching loops. Switches and bridges that connect multiple network segments employ STP to build a loop-free redundant topology.

What is the OSI model? The Open Systems Interconnection model (OSI) is a seven-layer model that defines a structure for data communications. Each layer in the model represents a level of data communication. The layers are Physical, Data Link, Network, Transport, Session, Presentation, and Application.

To know more about data link layer visit:

brainly.com/question/13025472

#SPJ11

sheryl is explaining the osi model to new technicians at her company. she is trying to explain what protocols operate at the various layers of the osi model. at what layer of the osi model does tcp operate?

Answers

The Transport layer of the OSI model operates the TCP protocol. Correct answer: letter A.

The Transport layer of the OSI model is responsible for providing reliable end-to-end communication between two hosts. So, it is responsible for ensuring delivery, data sequencing and error control.

What does the OSI model consist of?

The OSI model consists of seven layers:

Physical Layer: Responsible for transmitting raw data bits over physical medium such as cables, radio waves, etc.Data Link Layer: Responsible for formatting and transmitting data frames, which are packets of data that have an address header and trailer attached.Network Layer: Responsible for managing and routing data packets from one network to another.Transport Layer: Responsible for reliable end-to-end delivery of data packets.Session Layer: Responsible for establishing, managing, and terminating communication sessions between two or more computers.Presentation Layer: Responsible for translating, encrypting, and compressing data so that it can be sent across the network.Application Layer: Responsible for providing services to end users, such as web browsing and file transfer.

Sheryl is explaining the OSI model to new technicians at her company. She is trying to explain what protocols operate at the various layers of the OSI model. At what layer of the OSI model does TCP operate?

A. Transport

B. Application

C. Network

D. Data link

Learn more about the OSI model:

https://brainly.com/question/15901869

#SPJ4

A file that data is written to is known as a(n)a. input file.b. output file.c. sequential access file.d. binary file.

Answers

A file that data is written to is known as a B. output file.

An output file is a computer file that is created or generated by a program or process, and it contains the output or results of that program or process. This file is created to store information that is generated during a program's execution. Output files can be created in different formats such as text, binary, or other specific formats depending on the requirements of the program.

Output files are different from input files, which are used to provide data or information to a program. Output files are written to by the program, while input files are read from by the program. Output files are also different from sequential access files and binary files. Sequential access files are files where data is written or read in a sequential manner, while binary files are files where data is written or read in a binary format.

In summary, an output file is a file that is created by a program to store the results of its execution. It is used to record data that is generated by the program and is written in order to store that data for future use. Therefore, option B is Correct.

Know more about Output file here :

https://brainly.com/question/30760659

#SPJ11

Which of the following is a means of securing documents in the other party's possession that are relevant to the issues of the case?
a. interrogatory
b. request for admission
c. subpoena
d. production request

Answers

The means of securing documents in the other party's possession that are relevant to the issues of the case is through a subpoena.

A subpoena is a legal document that compels the other party to provide the requested documents or testify in court. An interrogatory is a written set of questions that the other party must answer under oath, but it does not require the production of documents. A request for admission is a legal document asking the other party to admit or deny certain facts, but it also does not require the production of documents. A production request is a document requesting the other party to produce documents, but it is not a legal document and does not have the same legal weight as a subpoena.

learn more about securing documents here:

https://brainly.com/question/23167670

#SPJ11

using a particular software program at an expert level, compilation of an accounting statement, and writing advertising copy are all examples of which type of skill?

Answers

Using a particular software program at an expert level, compilation of an accounting statement, and writing advertising copy are all examples of a technical skill.

What are technical skills?

Technical skills can be defined as a series of specialized knowledge, professionalism, and expertise that are required to perform or accomplish a specific kind of task and work, including the use specific tools and software applications in real world situations.

This ultimately implies that technical skills would help an employer or a manager with the skills which are required to accomplish a specific kind of work.

In this context, we can reasonably infer and logically deduce that the ability to make use of a specific software program at an expert level, compiling an accounting or financial statement, and writing advertising copy for one's business organization are all examples of a technical skill.

Read more on technical skills here: brainly.com/question/24304660

#SPJ1

The prototype approach to categorization states that a standard representation of a category is based on?.

Answers

The approach to categorization states that a standard representation of a category is based on category members that have been encountered in the past. The correct option is a.

What is a prototype?

A prototype is a type of basic drawing or design of something that will be highly executive, then to the next level. Prototypes are made of anything like building blocks and craft paper. It gives rough ideas of the main item, and it describes the main item and the basic idea behind the term.

Therefore, the correct option is a. category members that have been encountered in the past.

To learn more about prototypes, refer to the link:

https://brainly.com/question/9558609

#SPJ1

The question is incomplete. Your most probably complete question is given below:

a. category members that have been encountered in the past.

b. a universal set of category members.

c. a defined set of category members.

d. the definition of the category.

Practice working with tables using this document. Use your experience to complete each question. There are cells in the table made at the end of Step 1. The new table made in Step 12 is with a blank row on the . In Step 19, the word is in the cell of the table. A 2x2 table is created in .

Answers

The answers to the questions are:

four2X3bottom bottom leftStep 17

What is a Excel spreadsheet?

Microsoft Excel is known to be  a popular and common example of a spreadsheet that is said to be created  by Microsoft for Windows, macOS, Android and others.

Note that  It features is made up of calculation or any form of computation capabilities, graphing tools, and others.

Hence, The answers to the questions are:

four2X3bottom bottom leftStep 17

Learn more about excel sheet from

https://brainly.com/question/9799650

#SPJ1

See full question below

Use your experience to complete each question.

There are cells in the table made at the end of Step 1.

The new table made in Step 12 is with a blank row on the .

In Step 19, the word is in the cell of the table.

A 2x2 table is created in.

Which of these is a URL shortening service? O A. Twitter O B. TXTMob OC. TinyURL OD Tumblr​

Answers

TinyURL is a url shortener

Answer:

tiny  url

Explanation:

Which blue line indicates that the library panel will be added to the adjustments panel group?
BRAIN OO
BRAIN

Answers

there is no image here

Isabela wants to add an image to her presentation. Which tab should she use?

Design
File
Home
Insert

Answers

Answer:

I believe its insert

Explanation:

because when u insert an image ur adding it

Answer:

d

Explanation:

Which line indicates that robots plan?

Phil, an AI scientist, loves to collect as well as create robots that make his life easier. When introduced to a new place, one of his robots calculates the area of that location before beginning its tasks. His robot vacuum cleaner moves toward dusty places and cleans them up. The air conditioner in his house adjusts the cooling according to the change in temperature. Another robot clears the table after Phil has breakfast.


Will mark brainliest for correct answer, if answered 10-30 minutes after post.

Answers

Note that the line that indicates that robots plan is ""One of his robots calculates the area of that location before beginning its tasks"

Why are robots important?

Because robots can operate in hazardous areas, they eliminate risky employment for people. They are capable of lifting big loads, handling dangerous chemicals, and doing repeated jobs. This has assisted businesses in preventing many mishaps while also saving time and money.

Because of robots' automation potential, many workers are expected to be displaced by AI and robotics technology. Indeed, machines are anticipated to displace 85 million jobs by 2025, as workforces become more human-machine hybrid.

Learn more about robots at:

https://brainly.com/question/28484379

#SPJ1

What are the characteristics of:
Master file
Transaction file
Reference file

Answers

Master File :-Master files contain descriptive data, such as name and address, as well as summary information, such as amount due and year-to-date sales.

Transaction File :-Fast performance with a rapid response is critical. Organisations rely heavily on their TPS with failure possibly stopping business.

Reference File :-Information in one drawing can be overlaid on a different drawing, eliminating the need to redraw information. Proper use of reference files will result in significant time savings and greater coordination of drawings.

Explanation:

Hope it helps you!

difference bitween input and output devices​

Answers

Answer:

Input devices give the computer information that is needed for it to know what task you want it to do as well as what it needs to complete said task. Some examples could be a mouse or keyboard. Output devices allow you to see what the computer is doing. Some examples would be a screen/monitor or speakers.

Which of the following statements throws a valid exception in C++? a. throw.function(); b. throw 2; c. throws str; d. 4 throw

Answers

The statement "throw 2;" is a valid exception in C++. It throws an exception with the value of 2.

In C++, exceptions can be thrown using the "throw" keyword, followed by an expression or a value. The expression or value provided becomes the exception object.

Among the given options, "throw 2;" is the valid statement that throws an exception with the value of 2.

This means that when this statement is encountered during the execution of a program, it will generate an exception object with the value of 2.

This exception can be caught and handled by an appropriate exception handler to perform error handling or take necessary actions based on the exception type and value.

Learn more about expression here: brainly.com/question/28170201

#SPJ11

A _____ is a large group of infected computers, controlled without the user's knowledge, to perform tasks such as sending spam.

Answers

A large group of infected computers, controlled without the user's knowledge, to perform tasks such as sending spam is called; botnet

To answer this question, we need to first define an internet bot. An Internet bot is simply defined as a software application that runs tasks in an automated manner over the Internet.

Now, a number of connected internet devices that run one or more bots is referred to as a botnet and this botnet tends to control tasks on the infected computers without the user's knowledge.

Read more on botnets at; https://brainly.com/question/13624552

HELPPP ME PLEASEEE!!

HELPPP ME PLEASEEE!!

Answers

It’s the last one! The key to an effective persuasion is to know what you want and be clear about your response.

Melanie needs to ensure that readers are able to locate specific sections within a document easily. What should she include in
the document?
concordance
index
table of contents
bibliography

Answers

Answer:

according to me,she should include an index

Answer:

index

Explanation:

g write the code that would support overload for the * operator that will allow scalar multiplication, i.e. a double times a point.

Answers

Answer:

Here is one possible way to implement overload for the * operator that will allow scalar multiplication:

struct Vec3 {

 float x, y, z;

 Vec3 operator*(float scalar) const {

   return Vec3{x * scalar, y * scalar, z * scalar};

 }

};

This code defines a Vec3 struct that represents a three-dimensional vector, and it overloads the * operator to perform scalar multiplication. The * operator takes a float value as its right-hand operand and returns a new Vec3 object that is the result of scaling the original vector by the given scalar value.

a cell in excel is being formatted with percentage style. you enter 10/50 in the cell. what is the displayed value and the actual value stored in the cell ?

Answers

DV - 20% AV - 0.2 is the displayed value and the actual value stored in the cell .

In an Excel workbook, how would you refer to a cell that is located on worksheet sheet 3 in the second column third row?

Put the worksheet name followed by an exclamation point (!) before the cell address to refer to a cell or range of cells in another worksheet in the same workbook. For instance, you would type Sheet2! A1 to refer to cell A1 in Sheet2.

What Excel function adds the specified amount of decimal places to the value?

Excel's ROUND function will return a value that has been rounded to a certain number of digits. A number can be rounded to the left or right of the decimal point. Therefore, the ROUND command will round to the nearest hundredth whether you wish to round to a certain number of decimals.

Learn more about ROUND Command:

brainly.com/question/15077869

#SPJ4

Complete question is here:

Displayed value -

A.)  20% Actual Value - 20%

B.) DV - 20% AV - 0.2

C.) DV - 0.2 AV - 0.2

D.) DV - 0.2 AV - 20%

There are advantages and disadvantages to using digital media in marketing and advertising. Briefly explain two advantages and one disadvantage.

Answers

Answer:In today’s digital business landscape with the ability to be social across multiple digital platforms, country borders and language barriers, social media has introduced a new method to marketing.

Social media marketing is one of the fastest changing areas of marketing the world has ever seen. The methods used and developed within social media marketing have come a very long way in the past few years. It’s also created serious opportunities for businesses around the world, but there are certain aspects you have to be aware of when you make use of social media marketing for business.

Social media is the fastest (real-time) advertising and tracking marketing mediums there is available. Just as there are advantages for marketing on this medium, there are disadvantages that you as the business owner and you as the marketer (or maybe you are running a small business and are both) should be aware of and not only take notice, but know and understand how it can influence your business in all aspects positively and or negatively.

The analysis

One of the problems with writing and or explaining some of the overall or general advantages and disadvantages of social media marketing is that most of it is different dependent on your business. Some of the key differentials you need to be aware of that will influence the advantages and the disadvantages are:

Your type of business and or service,

Your marketing niche and specialization,

The social media channels used for your marketing and engagement,

Your target market – type, age, demographic, etc.

Demographic and economic in differences in consumers

Explanation:

Why is it a good idea not to change the subject line when replying to a message?
O so that the reply is sent to the original sender
O so that the reply does not bounce back as undeliverable
O so that the reply matches with the sender's original message
O so that the reply does not inadvertently include unintended recipients

Answers

Answer:

C. so that the reply matches with the sender's original message.

Explanation:

The Sender Message Channel Receiver (SMCR) model of communication was developed and created by David Berlo in 1960. SCMR was developed from the Shannon-Weaver model of communication of 1949.

The SCMR model of communication comprises of four (4) main components and these are;

1. Sender (S): this is typically the source of information (message) or the originator of a message that is being sent to a receiver. Thus, they are simply the producer of a message.

2. Channel (C): this is the medium used by the sender for the dissemination or transmission of the message to the recipient. For example, telephone, television, radio, newspapers, billboards etc.

3. Message (M): this is the information or data that is being sent to a recipient by a sender. It could be in the form of a video, audio, text message etc.

4. Receiver (R): this is typically the destination of information (message) or the recipient of a message that is being sent from a sender. Thus, the receiver is any individual who is able to read, hear or see and process the message being sent or communicated in the communication process.  

Basically, the communication channel used in SCMR must connect the sender with the desired recipients.

Hence, it is a good idea not to change the subject line when replying to a message, so that the reply matches with the sender's original message.

Answer:

Explanation:

Its C not B

Which media vehicle uses the Dreamweaver software for its design? A(n) "blank" uses the Dreamweaver software for its design.

Answers

Answer: Websites

Explanation: Adobe Dreamweaver CC is a web design and an Integrated Development Environment (IDE) application that is used to develop and design websites.

The media vehicle that uses the Dreamweaver software for its design is a website.

What is Dreamweaver software used for?

Adobe Dreamweaver is known to be a kind of a website creation software that is made to help one to create and publish web pages in anywhere when one has the software that aids HTML, CSS, etc.

Therefore, The media vehicle that uses the Dreamweaver software for its design is a website is the correct choice.

Learn more about website from

https://brainly.com/question/13171394

#SPJ2

destiny is concerned that readers won't realize the importance of the facts I her investigative report.what can she do to make the heading more informative?

destiny is concerned that readers won't realize the importance of the facts I her investigative report.what

Answers

The correct answer is D. Use action verbs and refer to benefits

Explanation:

One of the most effective ways to emphasize information is to use action verbs; these are words that express actions rather than states. In the case of a report action verbs such as prove, show or research can be used to explain facts or results because these emphasize information and make readers understand the importance of information rather than words such as seem. Moreover, in a research report writers might want to refer to the benefits because this catches the readers' attention as they will be interested in knowing how the information in the report contributes to their life or the world.

Answer: Use action verbs and refer to benefits

Explanation: Ape x

2.6.6: Reflection: Top Down Design
Top down design is a way of designing your program by starting with the biggest problem and breaking it down into smaller and smaller pieces that are easier to solve.


Answers

Top-down design is a problem-solving approach that involves breaking down a complex problem into smaller, more manageable sub-problems.

Top-down design is a structured approach to programming where the solution to a problem is broken down into smaller parts that can be easily understood and solved. It involves starting with the big picture and then working downwards to the details.

In the given code example, the problem of building towers is broken down into smaller tasks such as moving and turning. The makeTower() function is used to build a tower and is called within the larger program.

This approach makes it easier to manage complex problems and helps in identifying and resolving issues early in the development process. Additionally, it helps in reusing code as functions can be called multiple times.

Overall, top-down design is an effective way to approach programming problems and is widely used in software development.

For more questions like Program click the link below:

https://brainly.com/question/3224396

#SPJ11

Discuss briefly four types of websites and the criteria you will use to evaluate the content of a website

Answers

Answer: I would look at who made it, what date it was published, what it is about and if it says .gov, .com or etc.

Explanation:

____________________ has a goal of overloading the memory space provided to the variable. This might either allow the attacker to crash the computer or break into it.

Answers

Buffer overflow has a goal of overloading the memory space provided to the variable. This might either allow the attacker to crash the computer or break into it.

In a buffer overflow attack, the attacker deliberately sends more data to a buffer or memory space than it can handle, causing the excess data to overflow into adjacent memory areas. This can lead to various security vulnerabilities, including overwriting critical data, executing malicious code, or gaining unauthorized access to the system. By exploiting this vulnerability, an attacker can disrupt the normal functioning of a program, compromise system integrity, or even take control of the targeted system. To prevent buffer overflow attacks, secure coding practices and proper input validation techniques should be implemented.

Know more about Buffer overflow here:

https://brainly.com/question/31181638

#SPJ11

Which group often works as part of a team to secure an organization's computers and networks?

Answers

Network administrators are group often works as part of a team to secure an organization's computers and networks.

What is a network administrator do?

Network and computer systems administrators are known to be people that are said to be responsible for the daily  running of the  operation of these networks.

Hence, Network administrators are group often works as part of a team to secure an organization's computers and networks.

Learn more about Network administrators from

https://brainly.com/question/5860806

#SPJ1

​A(n) ________ is an excellent tool for representing a​ system's component processes and the flow of data among them.

Answers

A(n) DFD is an excellent tool for representing a system's component processes and the flow of data among them.

programs and policies based on developmental theory typically feature _____ treatment efforts.

Answers

Programs and policies based on developmental theory typically feature proactive and preventative treatment efforts. This means that interventions are designed to address potential issues before they become more serious problems.

Developmental theory recognizes that early intervention and prevention are crucial for promoting healthy development and addressing potential challenges or risks before they become more severe or entrenched.

Therefore, programs and policies informed by developmental theory often emphasize proactive measures, such as early childhood interventions, education and support programs, parenting programs, and community-based initiatives that focus on prevention and promoting positive outcomes.

By addressing potential issues early on and providing support and resources, these efforts aim to minimize negative developmental outcomes and promote overall well-being.

To learn more about policies: https://brainly.com/question/29619038

#SPJ11

Other Questions
Classical China contributed some of the most useful and impressive inventions in science and technology. Give at least two examples of these inventions and explain how they improved life in classical China. Then give one example of a modern form of technology that has improved your life in some way. Write your answer in three brief paragraphs. HELP ASAP PLEASE NOW!!!!!!!!!!Wow! You now know so much about Germany! Your friend Jordan, however, knows nothing about it. In a few months, his family is going on a tour of German-speaking countries, including Germany and other European countries. He has asked you to help him learn more about those places before his trip. His first trip is to Germany.Write Jordan a three-paragraph letter in English, and compare German culture and American culture, especially in terms of foods, sports, transportation, population, and demographics. How is your culture similar to German culture? How is it different? Use a lot of details to help Jordan prepare for the trip, and have fun! You can use the CultureGrams link at the bottom of this page to get ideas and information. (5 points per paragraph) Now, here is a guide for your letter. You don't have to follow this pattern exactly, but feel free to use it if it's helpful.Hey Jordan,It's cool that you get to visit Germany. Here are some interesting things about Germany. (Now describe some of these things.)Some things in Germany are very different from the United States. For example, (describe a few differences)Some things in Germany are a lot like the United States. For example, (describe a few similarities)Have a great trip! Bring me back a souvenir!(Sign your name)WILL AWARD BRAINLIEST! JUST PLEASE HELP!!!!!!!!!!!!!!! Lactase helps break down organic molecules and therefore acts as a(n):sugar.enzyme.lipid.carbohydrate. Two blocks are placed at the ends of a horizontal massless board, as in the drawing. The board is kept from rotating and rests on a support that serves as an axis of rotation. The block on the right has a mass of 5.8 kg. Determine the magnitude of the angular acceleration when the system is allowed to rotate. Mal has completed 14 deliveries so far this week. She needs to make 35 deliveries for the week. What percentage of her deliveries has mal completed? Harry tosses a nickel 4 times. The probability that he gets at least as many heads as tails is. Lucy can type 300 words in 5 minutes. How many words can Lucy type in 32 minutes? what was the presentation of people living in village and divering their livelyhood from agriculture during british period in india 5. Why is 2,3,5-triphenyltetrazolium chloride (TC) added to the motility medium? What does it do? Find the volume of the cylinder.r = 5 cmh = 9 cm Which phrase completes the following question? Comment ___________ vous aider? A. je peux B. peux-je C. puis-je D. je puis A vacuum gage indicates that the pressure of carbon dioxide in a closed tank is 10 kPa. A mercury barometer gives the local atmospheric pressure as 750 mmHg. Determine the absolute pressure of the carbon dioxide, in kPa. The density of mercury is 13.59 g/cm3 and g is 9.81 m/s2. Fill in the following blanks.The Grand Staircase in the desert of the Southwest United States includes the Grand Canyon. The ___________ of the Grand Canyon is the __________ of Zion National Park. The _________ of Zion is the __________ of Bryce National Park. ________ occurs when a retail firm invests in and owns a retail operation in a foreign country.A) Inventory investmentB) Portfolio investmentC) Direct investmentD) Philatelic investmentE) Alternative investment The size of granules in a sample is 5 micrometers, andthe density is 2 g/mL. Assuming all the granules to be sphericaland the same size, what will be the specific surface area per mLand per gram. I 5. Mary s hair was 8 inches long. In three months, it grew another inch at a steady rate. Assume that her hair growth continues at the same rate.A. Make a table that shows Marys hair length for each of the three months and for the next three months.B. Draw a graph showing the relationship between Marys hair length and time in months What is the quotient of the synthetic division problem below, written inpolynomial form?-3)1 -13 - 48 A. x-16 B. -x-16C C. -x-10 D. x-10 Write the purpose for the investigation. What sort of a graph would best show these results? Project: Truth and PropagandaNot all propaganda is bad. Propaganda gets a negative representation. Remember, though, the reason propaganda gets its own category of persuasion. It's because propaganda is meant to further the cause of the person or group using it. In a lot of cases, that can be negative. Sometimes, it's positive or doesn't matter either way.You have to evaluate every piece of propaganda and ask questions about it before you can determine if it's bad or good. Ask yourself, even if this is propaganda, is it true? The answer is not always clear-cut, so you have to do your best to evaluate each message! In this project, you'll practice doing just that.ObjectivesAssess the relationship between propaganda techniques and the truthfulness of a message.Instructions:Follow the directions for the activity below. It will help you to explore the relationship between truth, propaganda, and people's opinions.Step 1:Ask 10 people the following questions:Do you believe in large apelike animals such as Bigfoot?Why or why not?If you answered that you do not believed in Bigfoot, what would make you believe that Bigfoot exists?Step 2: Record their answers.Step 3: Organize your data.Step 4: Write a paper of at least 250 words about people's willingness to believe in sensational subjects. Did people who believed in Bigfoot more willing to answer your questions? Or was it the opposite? Explain the reasons why people believe or did not believe in Bigfoot.Step 5: Spell check and proofread before submitting. Find the measure of the missing angle