What does the term ethical mean?

Answers

Answer 1

Answer:

relating to moral principles or the branch of knowledge dealing with these.

Ex: ethical issues in nursing or

For someone who is honest and follows good moral standards, use the adjective ethical. Ethical comes from the Greek ethos "moral character" and describes a person or behavior as right in the moral sense - truthful, fair, and honest


Related Questions

what is the chrmical bond of water​

Answers

hydrogen 2 oxygen 1 (h2O)
the answer is H2o :)

Luke has been working with a file that has untouched pixel data. Which type of file is it?
RAW
DSL
SLR
JPEG

Answers

Answer:

JPEG

Explanation:

This file ending is the safest file ever.

Hope this helps.

to prove that error converting from mathml to accessible text. by we have to show that of the implication implies a statement that is always

Answers

In order to establish an error in the conversion process from MathML to accessible text, it is necessary to show that the claim "converting from MathML to accessible text results in a statement that is consistently accurate" is incorrect.

How can we best identify this error?

Put differently, we must identify a situation in which the conversion procedure is unable to consistently generate precise and readily accessible text.

Therefore, it can be seen that If we can provide a counterexample or a scenario where the conversion fails, we can confirm that there is a flaw in the process.

Read more about text conversion here:

https://brainly.com/question/28000115

#SPJ1

Where does most of the work in creating a presentation take place?

Formatting toolbar
Normal (Slide) view
Slide Sorter
Task pane

Answers

Answer: Normal (Slide) view

Answer:

Normal Slide View

Explanation:

the top slide in a hierarchy of slides based on the master

Answers

In a hierarchy of slides based on the master, the top slide is usually referred to as the "Master Slide" or "Slide Master." The Slide Master is a template or design that defines the overall layout and formatting of the presentation.

Slide Master acts as a parent or base slide for all other slides in the presentation. When you create a new slide in a presentation software, such as Microsoft PowerPoint, it inherits the layout and formatting from the Slide Master.

Any changes made to the Slide Master, such as modifying the background, font styles, or placeholders, will be reflected in all slides that are based on it. The Slide Master allows for consistent design and formatting across multiple slides, making it easier to maintain a cohesive look throughout the presentation.

It serves as the foundation for the entire slide deck and is considered the top slide in the hierarchy.

To learn more about slides: https://brainly.com/question/31332623

#SPJ11

Which BEST describes a quantitative risk analysis?

A scenario-based analysis to research different security threats

A method that is based on gut feelings and opinions

A method that assigns monetary values to components in the risk assessment

A method used to apply severity levels to potential loss, probability of loss, and risks

Answers

A method used to apply severity levels to potential loss, probability of loss, and risks.

A quantitative risk analysis is a method used to assess and quantify risks by assigning numerical values to various components in the risk assessment. It involves applying severity levels to potential loss, probability of loss, and risks to evaluate their impact and likelihood.

Unlike a scenario-based analysis that focuses on researching different security threats, a quantitative risk analysis relies on data-driven calculations and measurements to provide a more objective assessment. It involves gathering relevant data, using statistical techniques, and employing mathematical models to quantify risks and make informed decisions.

By assigning monetary values to components in the risk assessment, such as potential loss or expected impact, organizations can prioritize risks and allocate resources effectively. This method provides a more systematic and structured approach to risk analysis, enabling organizations to identify, measure, and manage risks in a quantitative manner.

To learn more about “probability” refer to the https://brainly.com/question/13604758

#SPJ11

write a program to print. *
**
***
****
*****​

Answers

Program:-

\(\tt for\:i \:in\: range(2,6):\)

\(\tt\quad for\: j\: in \:range(1,i+1):\)

\(\tt\quad\quad print("*",end='')\)

\(\tt\quad print()\)

Output:-

\(\tt **\)

\(\tt ***\)

\(\tt ****\)

\(\tt *****\)

Explain the goal of information security in relation to mobile devices.

Answers

Information security in mobile phones is as important as appointing a health checkup for yourself, the goal is to stay away from viruses that are designed to steal the data on the device, privacy issues are also there, and

It is very unfair that some random is just keeping an eye on your data, which can be anything your photos, chats, contacts, and emails just for fun. and the risk is getting higher and higher as we are exploring more and more websites, which install trackers,

therefore it is advised t use a VPN to be safe from them. you can have a financial loss due to information stealing, so it's important to take precautions for that and get aware of this because your data is as much important as your own self.

know more about 'VPN' here:

brainly.com/question/29428511

what is the primary way to access applications in windows8?

Answers

Answer:

Click the app icon on the taskbar. Double-click the app shortcut on the Desktop. Click the app tile in the Start screen.

Explanation:

Answer:

Press the Windows key. Much like Windows 10.x

Explanation:

If you press the Windows key, you will see a list of the apps. You can also search for them there.

8. Cloud Storage is
a) Computer technology to control the weather.
b) Computer technology to make computers faster.
c) Computer technology to make computers slower.
d) Computer technology to store files on the Internet,

Answers

Answer:

The correct option;

Computer technology to store files on the internet

Explanation:

Cloud Storage provides a means where data files originally locally stored on a computer are stored in remote or off-site locations which are then accessible through a public internet source or through a private network

The provider of the cloud services takes responsibility for data which are stored in the site

A cloud storage consists of a data server that is connected to the internet to which files are transferred to by a user manually or by automation. The data server then sends the data further to other server. The user can then access the stored data through the cloud storage provider's users web interface.

Answer:

D

Explanation:

d) Computer technology to store files on the Internet,

At this price of $128, will there be a shortage or a surplus of digital cameras?

Answers

At the price of $128, there will likely be a surplus of digital cameras.

To determine whether there will be a shortage or a surplus of digital cameras at a price of $128, we need to compare it to the equilibrium price in the market. The equilibrium price is the price at which the quantity demanded by consumers equals the quantity supplied by producers.

If the price of $128 is below the equilibrium price, it suggests that the price is lower than what the market equilibrium would dictate. At this lower price, consumers are more willing to purchase digital cameras, resulting in increased demand. However, suppliers may not be willing to produce and supply as many cameras at this price since it may not be as profitable for them.

As a result, there will likely be excess demand or a shortage of digital cameras in the market. Consumers will want to purchase more cameras at the lower price, but there won't be enough supply to meet that demand. This shortage indicates that the quantity demanded exceeds the quantity supplied at the given price.

It's important to note that without specific information on the equilibrium price and corresponding quantities, we can't determine the exact magnitude of the surplus or shortage. However, based on the price of $128 being below equilibrium, it is reasonable to expect a surplus of digital cameras.

Learn more about digital cameras here:-

https://brainly.com/question/12123357

#SPJ11

Create a formula using the name ranges that adds the amount of days worked for each staff person given their hire date. Excel

Answers

The answer is  C2, enter =A2+B2

To calculate the length of service from the hire date and a specific date, the YEARFRAC function can help you. Please enter or copy the following formula into a blank cell: =INT (YEARFRAC (B2,C2)) Note: In the above formula, B2 is the hire date cell and C2 is the end date cell.

How to perform  calculations in Excel?

Excel has two primary methods for performing calculations: formulas and functions. first formulas A formula in Excel is an expression that manipulates values in a cell or a range of cells. Consider the formula =A1+A2+A3, which calculates the sum of the values in cells A1 through A3. 2. Features In Excel, functions are predefined formulas.

Method 1

if we  have 4 columns labeled Name,Position, Hire Date, Salary.  highlight the rows for the staff people and given it the named range of Staff_Salaries.

If  you type "=DAYS(TODAY(),C6)" into column E of one of the staff employees to get the right date

Method 2

Enter your due dates in column A.Enter the number of days to add or subtract in column B. You can enter a negative number to subtract days from your start date, and a positive number to add to your date.In cell C2, enter =A2+B2, and copy down as needed.

To know more about Formulas in Excel refer to :

https://brainly.com/question/26969797

#SPJ4

True/False: the original development goals for unix were twofold: to develop an operating system that would support software development, and to keep its algorithms as simple as possible.

Answers

False. The original development goals for Unix were not twofold but rather threefold:

To provide a convenient and efficient operating system for software development.To allow easy portability of the operating system across different hardware platforms.To keep the design and implementation of the system as simple and elegant as possible.The simplicity and elegance of Unix's design were seen as important goals by its creators, Ken Thompson and Dennis Ritchie. They aimed to create a modular and flexible operating system that could be easily understood, extended, and maintained. This emphasis on simplicity contributed to Unix's success and its influence on subsequent operating systems.



learn more about development  here :


nly.com/question/28011228



#SPJ11

Which of the following best describes today’s average gamer?

The average age is eighteen, and many more males play than females.
The average age is thirty, and only slightly more males play than females.
The average age is thirty, and many more males play than females.
The average age is eighteen, and only slightly more males play than females.

Answers

The correct answer is A

In operant conditioning, the reduced frequency of behavior when it is no longer reinforced is known as:_______

Answers

In operant conditioning, the reduced frequency of a person's behavior when it's no longer reinforced is referred to as extinction.

The types of reinforcement.

In operant conditioning, there are four (4) main types of reinforcement and these include the following:

PunishmentNegative reinforcementPositive reinforcementExtinction

In operant conditioning, extinction refers to the reduced frequency of a person's behavior when it's no longer reinforced.

Read more on reinforcement here: https://brainly.com/question/10579224

#SPJ1

Give three examples of the following types of data?
Give three examples for each category in the software domain ?

CCDI :)??

Give three examples of the following types of data?Give three examples for each category in the software
Give three examples of the following types of data?Give three examples for each category in the software

Answers

An example of transactional data are:

Sales ordersPurchase ordersShipping documents

Its software domain are: Personal  meeting, a telephone call, and a Video call

An example of  financial data are: assets, liabilities, and equity. The software are: CORE Banking, Retail Banking, and Private banking

An example of intellectual property data are: books, music, inventions. The software domain are Patents, trademarks, and copyrights

What types of software are used in the financial industry?

Through sales and marketing tools, data-driven contact management, and workflow automation, customer relationship management (CRM) software assists financial services organizations in fostering new relationships and maximizing the value of existing customers.

You can see how your consumers are utilizing your website to complete a transaction by using transaction management software. It may demonstrate both how each website element functions on its own and as a part of the overall technological infrastructure.

Note that Information that is gathered from transactions is referred to as transactional data. It keeps track of the date and location of the transaction, the time it took place, the price ranges of the goods purchased, the mode of payment used, any discounts applied, and other quantities and characteristics related to the transaction.

Learn more about transactional data  from

https://brainly.com/question/28081430
#SPJ1

Collaboration software is designed to increase collaboration and productivity primarily by enabling team members to?

Answers

Collaboration software is designed to increase collaboration and productivity primarily by enabling team members to: view, edit and add shared information in real time from anywhere.

What is a software?

A software can be defined as a set of executable instructions that is typically used to instruct a computer system on how to perform a specific task (function) and proffer solutions to a particular problem.

What is a collaboration software?

A collaboration software can be defined as a type of software that is typically designed and developed to avail all authorized team members an opportunity and ability to remotely view, edit, share, and add shared information in real-time.

Read more on collaboration software here: https://brainly.com/question/28112823

#SPJ1

Complete Question:

Collaboration software is designed to increase collaboration and productivity primarily by enabling team members to?

Multiple Choice

be given access to each other's workspaces and files, for micro-management.

complete their work using personal devices such as smartphones or tablets.

view, edit and add shared information in real time from anywhere.

hold virtual meetings online via teleconferencing or video conferencing features

An encoding scheme is used _______. Group of answer choices in digital transmission to map binary digits to signal elements in analog transmission to clean up the quality of the transmission to help minimize errors all of the above

Answers

An encoding scheme is used in all of the above scenarios in digital transmission to map binary digits to signal elements, in analog transmission to clean up the quality of the transmission, and to help minimize errors.

An encoding scheme is a method of transforming data or information into a particular format that can be transmitted over a communication network. This transformation is necessary since data is typically stored in binary form, which is not suitable for transmission over a network.Encoding schemes assist in the digital transmission of data by mapping binary digits to signal elements. The analog transmission quality is enhanced by the encoding scheme. When data is transmitted over a network, errors can occur due to a variety of reasons.

The encoding scheme helps to minimize errors by encoding data in a way that allows for error correction and detection.The encoding scheme used in digital transmission includes both the sender and the receiver.

The encoding scheme can be as easy as mapping each binary digit to a signal element or as complicated as Huffman coding or LZW compression. Data transmission can be greatly improved using an encoding scheme.

Learn more about encoding here,

https://brainly.com/question/3926211

#SPJ11

What color object would reflect more light?
O Red
O Black
O Blue
o White

Answers

Answer:

White

Explanation:

Red absorbs all light except red light, which it reflects

Black absorbs all light

Blue absorbs all light except blue light, which it reflects

White reflects all light because it has all colors except black.

Hope you do well!

Discuss about theResult of Risk response factors for the Project.

Answers

Risk response factors for a project are the steps taken by a project manager to deal with the identified risks in the project plan.

It is the project manager's responsibility to manage the risks and take action against them to avoid failure. In this case, we shall be discussing the results of risk response factors for the project.Risk response factors are categorized into four groups, which are acceptance, mitigation, transfer, and avoidance. The results of these risk response factors for a project are as follows:Acceptance: This is the risk response factor that accepts the potential impact of risks on the project and decides to leave it unhandled. The results of acceptance are the continued existence of risks in the project, which may lead to a negative impact on the project.Mitigation: This risk response factor involves taking actions to reduce the probability of the risks' occurrence and/or minimize the impact of the risks. The result of mitigation is the reduction of the probability and impact of the risks.Transfer: This is the risk response factor that transfers the risks to a third party. The result of transfer is the shift of liability and responsibility for the risks from the project manager to the third party.Avoidance: This is the risk response factor that involves taking action to avoid the occurrence of the risks. The result of avoidance is the complete elimination of risks from the project plan.Conclusively, the result of risk response factors for a project depends on the strategy and plan taken by the project manager to handle the identified risks. The success of the project depends on the project manager's ability to choose the right risk response factor that matches the identified risks.

Learn more about mitigation :

https://brainly.com/question/31880500

#SPJ11

an exception's default error message can be retrieved by using the ________ method.

Answers

The default error message of an exception can be retrieved by using the getMessage() method.

In many programming languages, including Java, exceptions provide a means to handle errors and unexpected situations in code. When an exception occurs, it typically includes an error message that describes the cause of the exception.

To access this default error message, you can use the getMessage() method provided by the exception object. By invoking this method, you can retrieve the error message as a string and use it for logging, displaying to the user, or further error handling.

The getMessage() method is a common feature of exception classes and is available in various programming languages, allowing developers to easily access and utilize the default error messages associated with exceptions.

Learn more about getMessage() method here:

https://brainly.com/question/14903436

#SPJ11

Which of the following is NOT an example of soft skill?
A- leadership
B- Creativity
C- Computer programming skills
D- Time management

Which of the following is NOT an example of soft skill?A- leadership B- Creativity C- Computer programming

Answers

Leadership because if you wanna be a leader you have to be soft so you can teacher and lease better

You have a notebook system running Windows. The laptop has built-in wired and wireless network cards. Recently, the wireless card stopped working, so you connected an external USB wireless adapter to the system. After you install the wireless adapter, it is not displayed in the list of available network adapters in the Network and Sharing Center. What should you do to troubleshoot the problem

Answers

Answer: reboot

Explanation:

literally most if not all driver errors are solved by a reboot, and if that doesnt work then you reinstall the driver by going to the manufacturers website

You’ve been given a new cell phone with a 2 gigabyte data plan. You plan to use your phone for text messages, images, video, and music. Which of these categories are best compressed using lossless compression? Which of these categories are best compressed using lossy compression? Why?

a. Video should use lossy compression because it usually has a large file size which we need to reduce.
b. Text should use lossy compression because it always has a large file size which we need to reduce.
c. Audio should use lossy compression to save data and transmit quickly.

Answers

Answer: I think that it should all use lossless compression.

Explanation: it will reduce the space it take up in the files and it was be able to save data and help with transmission.

A Lossy compression should be applied to text messages and music while lossless compression should be applied to images and videos

What is Lossy compression?

A lossy compression of a file implies that the quality of the file is reduced in order to get the file compressed.

The type of compression can be applied to text messages and music because a reduction in the size and quality will only reduce few details about the text messages and music file.

Since lossless compression is such that even after the file size is reduced, the quality remains unchanged. There are type of compression can be applied to video and pictures because even if the size is reduced, the quality of the files are not expected to change.

Hence, Lossy compression should be applied to text messages and music. Lossless compression should be applied to images and videos.

Read more about file compressions at:

brainly.com/question/13663721

#SPJ2

The rectangular shaped area on a worksheet that is created by the intersection of columns and rows. Question 1 options: rows columns cell labels.

Answers

The rectangular shaped area on the worksheet which is created by the intersection of columns and rows is called the cell.

What is worksheet?

Worksheet is the grid formed by combined rows and column, which is used to present the data in tabular form.

Let's check all the options-

Rows-Rows are the horizontal lines, used to for the worksheet with different cell.Columns-Columns are spread vertically, in the grid layout of the worksheet.Cell- Cell is the rectangular shaped area on a worksheet that is created by the intersection of columns and rows.Labels- Labels is the text, which is used to express the data in the worksheet.

Form all the option, option C is the best option for the given problem.

Thus, the rectangular shaped area on the worksheet which is created by the intersection of columns and rows is called the cell.

Learn more about the worksheet here;

https://brainly.com/question/14390944

have you gone/done into things that you forget to close/settle?​​

Answers

Answer: AT SOME CIRCUMSTANCES YES

Explanation: WELL ONE EXAMPLE WAS OUR GAMING GROUP WHICH WAS MADE OF ABOUT 2 YEARS AGO AND THERE ARE STILL TO PEOPLE IN THE GROUP WHEN WE DON'T EVEN USE ANYMORE , CAN YOU BELIEVE IT ?

which step of the er-to-relational mapping algorithm has the foreign key approach and the cross-reference or relationship relation approach?

Answers

The step of the ER-to-relational mapping algorithm that involves the foreign key approach and the cross-reference or relationship relation approach is the "Mapping Regular Entity Types" step.

In this step, regular entity types in the ER diagram are mapped to relational tables. The foreign key approach is used to represent relationships between entities by including foreign keys in the tables that refer to the primary keys of related entities. This approach establishes referential integrity and maintains the relationships between entities in the relational database. Additionally, the cross-reference or relationship relation approach may be used to represent complex relationships between entities. In this approach, a separate table is created to capture the relationships between entities. This table contains foreign keys referencing the primary keys of the related entities and additional attributes to capture any relationship-specific information.

Learn more about the ER-to-relational mapping algorithm here:

https://brainly.com/question/28258035

#SPJ11

write HTML code to create a web page which will contain a title my favourite book as a centralised heading feluda somogro and body will contain the name of the author satyajit ray ​

Answers

Answer:

Satyajit Ray (1921–1992), a Bengali film director from India, is well known for his contributions to Bengali literature. He created two of the most famous characters in Feluda the sleuth, and Professor Shonku the scientist. He wrote several short novels and stories in addition to those based on these two characters. His fiction was targeted mainly at younger readers (mostly teenagers) , though it became popular among children and adults alike.

Ray during recording of his film Pather Panchali

Most of his novels and stories in Bengali have been published by Ananda Publishers, Kolkata; and most of his screenplays have been published in Bengali in the literary journal Ekshan, edited by his close friend Nirmalya Acharya. During the mid-1990s, Ray's film essays and an anthology of short stories were also published in the West. Many of the stories have been translated into English and published.

A combination of the three main services in cloud computing

Answers

Answer:

: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS).

Explanation:

Cloud computing can be broken up into three main services: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). These three services make up what Rackspace calls the Cloud Computing Stack, with SaaS on top, PaaS in the middle, and IaaS on the bottom.

determine one possible reason to autogenerate a negative review

Answers

One possible reason to autogenerate a negative review is by:

To express dissatisfaction with a product or service: If someone has had a negative experience with a product or service, they may want to share their frustration with others through a negative review.

What are other ways to get negative review?

There are several potential reasons why someone might want to autogenerate a negative review:

To hurt the reputation of a business: Some people may try to harm the reputation of a business by posting fake negative reviews in order to drive customers away.

To gain attention or recognition: Some individuals may want to attract attention to themselves by posting controversial or inflammatory content, including negative reviews.

To vent frustration: Some people may use negative reviews as a way to vent their frustration or anger, even if their experience with the product or service was not necessarily negative.

Therefore, To spread misinformation or propaganda: In some cases, negative reviews may be generated as part of a campaign to spread misinformation or propaganda about a particular product, service, or company.

Learn more about review from

https://brainly.com/question/27991472

#SPJ1

Other Questions
a. HVs P&L was created using accrual accounting. If HV used cash accounting, and their accounts payable increased by $10,000 and their accounts receivable increased by $20,000, what would their cash profit be? [Hint: recall that in cash accounting, expenses arent counted until you write the check for them, and sales arent counted until the customer pays for them. How does this change HVs income and expenses?] b. Another way of looking at profitability for a company is to calculate their NOPAT: net operating profit after taxes. Since we know what "operating profit" is, we should be able to calculate NOPAT for HV. What is HVs NOPAT for 2017? Based on what is left out of the NOPAT calculation (interest expenses), what does NOPAT tell us and why would we be interested in it? A newspaper article reported that 340 people in one state were surveyed and 70% were opposed to a recent court decision. The same article reported that a similar survey of 530 people in another state indicated opposition by only 20%. Construct a 95% confidence interval of the difference in population proportions based on the data. The 95% confidence interval of the difference in population proportions is (Round to four decimal places as needed.) which two lines from John milton's paradise lost provide clues to his purpose in writing the epic poem Read the passage.A noted [Tory], who kept a tavern at Amboy, was standing at his door, with as pretty a child in his hand, about eight or nine years old, as most I ever saw, and after speaking his mind as freely as he thought was prudent, finished with this unfatherly expression, Well! Give me peace in my day. Not a man lives on the Continent but fully believes that a separation must some time or other finally take place, and a generous parent would have said, If there must be trouble, let it be in my day, that my child may have peace; and this single reflection, well applied, is sufficient to awaken every man to duty.What point was Thomas Paine trying to make by relating this anecdote?America will break with Britain eventually, so now is the time to act.Peace is an expensive commodity, so it should always be sought first.War is very difficult on children and should not be entered into lightly. Question 19 2 ptsWe select a random sample of (36) observations from a population with mean (81) and standard deviation (6), the probability that the sample mean is more (82) isO 0.0668O 0.8413O 0.9332O 0.1587 select all that apply which of the following directly plays a part in translation initiation? multiple select question. small ribosomal subunit template dna strand initiator trna messenger rna large ribosomal subunit the timeline of an investment is shown above. if the cost of capital is 8%, what is the profitability index of this investment? Linkcomn expects an Earnings after Taxes of 75000$ every year. The firm currently has 100% Equity and cost of raising equity is 10% If the company can borrow debt with an interest of 10%. What wit be the value of the company if the company takes on a debt equal to 50% of its unlevered value? What will be the value of the company if the company takes on a debt equal to 60% of its levered value? Assume the company's tax rate is 30% (Must show the steps of calculation) what official position did rome install to govern judea during the decades following ad 6 (i.e., during the life and ministry of jesus)? 1. Demonstrate understanding of the human interface guidelines and implement them in an application design to provide better HCI experience 2. Identify the best practices building HCI applications 3. Implement the best practices in an HCI application 4. Implement the best practices for design cycle including a brainstorming idea, listing core features, identifying targeted audience, and collecting feedback. 5. Plan an approach to start a new project from scratch including all HCI elements 6. Execute the project based on the planning design cycle and the prototype planning 64 = 4(p + 2) + 24 please solve step by step What is the Equation of the line? slope: undefined; (7,-9) How did the 100 year war affect society? could somebody help me! I will award the points to theperson who summarizes this poem "the question of loyalty," bymitsuye yamada. The Fabricating Department started the current month with a beginning Work in Process inventory of $10,000. During the month, it was assigned the following costs: direct materials, $76,000; direct labor, $24,000; and factory overhead, 50% of direct labor cost. Also, inventory with a cost of $109,000 was transferred out of the department to the next phase in the process. The ending balance of the Work in Process Inventory account for the Fabricating Department is: what change should the student have made to the writing process? The research plan and schedule should have been written after the research questions. Analyzing the prompt should have happened after the research plan had been created. Organizing the draft should have happened after editing for grammar and structure. Finding sources and researching should have been done before writing the research question. Simplify y + (15 + y) (AddingRetinal Numbers)15.9+(-6.6) Which of the following coordinate planes shows the graph of the function y-3=-2(x+2)? Find the area and perimeter of the triangle. See picture for problem. Please and thank you so very much!(: