I really do need help asap

I Really Do Need Help Asap
I Really Do Need Help Asap

Answers

Answer 1

The third one.

Explanation:

The first answer is missing colons after the "if-else" clauses.

The second answer is missing quotes inside the print statements.

The fourth answer is missing indentation (which results in a syntax error in Python).


Related Questions

Copyright protection begins as soon as the work is created. group of answer choices
a. true
b. false

Answers

Copyright protection begins as soon as the work is created. group of answer choices is a true statement.

What is Copyright protection?

Copyright is known to be one that do not need to be registered to be able to have its protection but, the body that it is under is one that provides owners of copyrights the ability to be able to deposit a copy of their works and they will be able to have a certificate that tend to serves as a kind of a  notification of the presence of the work to all of the  general public.

Therefore, Copyright protection begins as soon as the work is created. group of answer choices is a true statement.

Learn more about Copyright protection from

https://brainly.com/question/20225852

#SPJ1

In balloon framing, the second floor joist sits on a horizontal framing member called a _____.

Answers

The joist extend to the sidewall and is fastened to the full height studs. Alternately, a rim member can be installed to make the joist height easier to align

Software engineering must include the code and regulations that its members must uphold to be judged as a(n):_____.

Answers

Software engineering must include the code and regulations that its members must uphold to be judged as a professional engineering practice option (c) is correct.

What is execution?

The process by which a computer or virtual machine reads and responds to a computer program's instructions is known as execution in computer and software engineering.

It is given that:

The statement:

Software engineering must include the code and regulations that its members must uphold to be judged as a(n):

Software engineering must adhere to the rules and codes that all engineers must follow in order to be considered professional practice.

Thus, software engineering must include the code and regulations that its members must uphold to be judged as a professional engineering practice option (c) is correct.

Software engineering must include the code and regulations that its members must uphold to be judged as a(n):

a. engineer.b. certified professional engineer.c. professional engineering practice.d. All of these are

Learn more about the execution here:

brainly.com/question/20493746

#SPJ1

Given the variables x, y, and z, each associated with an int, write a fragment of code that assigns the smallest of these to min.

Answers

Given the variables x, y, and z, each associated with an int, a fragment of code that assigns the smallest of these to min. is given below:

if x<=y and x<=z:

   min=x

if y<=x and y<=z:

   min=y

if z<=x and z<=y:

   min=z

What is Programming?

This refers to the sequence of steps that are used to give commands to a computer system to execute a task.

Hence, we can see that Given the variables x, y, and z, each associated with an int, a fragment of code that assigns the smallest of these to min. is given below:

if x<=y and x<=z:

   min=x

if y<=x and y<=z:

   min=y

if z<=x and z<=y:

   min=z

Read more about fragment codes here:

https://brainly.com/question/15776278

#SPJ1

How do you change the desktop background in the macos mojave operating system?

Answers

Answer: Click the System Preferences icon on the dock. In the first row, click Desktop & Screen Saver.

Explanation: When it comes to macOS versions, Mojave and High Sierra are very comparable. The two have a lot in common, unlike Mojave and the more recent Catalina.

What is the first question john says we must ask ourselves about things we see online?.

Answers

Answer:

"who made this and why?"

Explanation:

Scientific management uses: _________
a) standardized work methods.
b) linear programming.
c) digital computers.
d) motivation theory.

Answers

Scientific management uses: a) standardized work methods.

What is SCM?

SCM is an abbreviation for supply chain management and it can be defined as the effective and efficient management of the flow (transmission) of goods and services, as well as all of the production processes that are involved in the transformation of raw materials into finished products, in order to meet the insatiable want and need of the consumers on a timely basis.

This ultimately implies that, the supply chain management (SCM) is a strategic process which involves all the activities that are associated with planning, execution and supply of finished goods and services to the consumers on a timely basis.

In the supply chain management (SCM), scientific management is typically focused on the use of standardized work methods to meet the insatiable want and need of the consumers on a timely basis through efficient and effective supply of finished goods and services.

Read more on supply chain management here: brainly.com/question/24192635

#SPJ1

Formatting codes can be added to documents using a(n)_____, such as slashes // and angle brackets < >.

Answers

Using a delimiter like slashes or angle brackets, formatting codes can be applied to documents.

What are boundaries and shading mean?

Word documents often utilize borders and shading to highlight specific passages of text and make them the reader's initial impression.

We can use Borders and Shading in MS Word to make written text, paragraphs, and other elements appear lovely and attractive.

Formatting codes can be used to apply formatting to documents using a delimiter like slashes or angle brackets.

In order to add formatting codes to documents, a delimiter like slashes or angle brackets can be used.

The complete question is:

Formatting codes can be added to documents using a ___ such as slashes and angle brackets

Learn more about the borders and Shading here:

https://brainly.com/question/1553849?

#SPJ1

________ technologies are technologies that enable the incremental improvement of products and services.

Answers

Sustaining technologies are technologies that enable the incremental improvement of products and services.

Sustainability in technology can be defined in several ways:

Substitution. This technology is driving the shift from non-biodegradable to biodegradable materials in their production. This technology also replaces non-renewable resources with renewable ones.

Prevention. Sustainable technologies can prevent damage, contamination and other negative environmental impacts through their use or production.

Efficiency. This technology is efficient in terms of energy and resource use.

Sustainability in technology has been recognized by many industries and has become a public use and innovation. Common examples of sustainable technology and innovation include:

Public transportation and electricityLED light technologySolarCarbon capture and storage technologySelf-contained and LEED . buildings and construction methods

You can learn more about sustaining technologies here https://brainly.com/question/28222725

#SPJ4

Sustaining technologies are technologies that enable the incremental improvement of products and services.

Sustaining technology refers to the constant improvement of industrial activities which includes cost efficiency, product quality, and time.

Sustaining technology differs from disruptive technology in that disruptive technology identifies new opportunities and creates new products and services that the customers don't know about while sustaining technology enables the companies to compete with other associations by improving the products and services that the consumers already know about.

Sustaining technology works by identifying the needs and demands of the consumers and customers and can sometimes be a slow method.

Sustaining technologies enable companies to maintain their existing customer base and at the same time improve their existing products.

To learn more about sustaining technologies, click here:

https://brainly.com/question/14838154

#SPJ4

According to murray, __________ are internal motivations and the power of the situation is called __________.

Answers

Answer:

According to murray, needs are internal motivations and the power of the situation is called press.

Explanation:

where do i click next to get to the following window? ​ a. change settings b. system protection c. advanced system settings d. device manager

Answers

The option to click to get to the next window is option c. advanced system settings.

What is the aim  of System settings?

System is known to be the first, as well as one  one of the most vital , areas that is found inside of the Settings app.

Note that it is said to be  the place where a person can be able to find the most basic form of settings to be able to customize your computer, such as display, notifications, apps, and others.

Therefore, The option to click to get to the next window is option c. advanced system settings.

Learn more about advanced system  from

https://brainly.com/question/24260354

#SPJ1

The use of plain english in radio communications transmissions and avoidance of 10-codes is known as using:_________

Answers

The use of plain English in radio communications transmissions and avoidance of 10-codes is known as using  clear text.

What is plain English?

The term known as Plain language is known to be a word that can be referred to as  plain writing or plain English.

This is seen as a kind of a communication system where a said audience can be able to understand the first attempt made to  read or hear information that is presented to them.

Based on the above, one can say that The use of plain English in radio communications transmissions and avoidance of 10-codes is known as using  clear text.

Learn more about communications  from

https://brainly.com/question/27799808

#SPJ1

Without middleware, different bi programs cannot easily connect to the data warehouse. group of answer choices
a. true
b. false

Answers

Without middleware, different BI programs cannot easily connect to the data warehouse: True.

What is a data warehouse?

A data warehouse can be defined as a logical collection of information that are gathered or obtained from many different operational databases, in order to both support and enhance day-to-day business analysis activities and decision-making tasks of various employees who are working in a business organization.

This ultimately implies that the primary purpose of a data warehouse is to logically aggregate a collection of information from all the departments in a business organization into a single repository.

However, we can infer and logically deduce that without middleware such as application server, different Business intelligence (BI) programs won't easily connect to the data warehouse.

Read more on data warehouse here: brainly.com/question/18565560

#SPJ1

________ is an application program function that deals with storing and retrieving data. data storage data access logic application logic presentation logic application access storage

Answers

Data storage is a function of application programs that manages storing and retrieving of data. The correct option is a i.e data storage.

One of the general functions of all application programs is data storage that handles storing and retrieving large amounts of data. Some examples of data storage provided by various application programs are:

MS E-xcel handles datasheets by storing data for the purpose of analysisWhats-App is used for communication purposes dealing with storing and retrieving data such as messages, media, and documentsDatabase management systems deal with storing, analyzing and retrieving large amount of dataWord processors allow to input, modify, format, and output data, thus, help in data storing and retrieving.

Options (b) data access logic, (c) application logic and (d) presentation logic are also functionalities of application programs but they do not offer data storage facilities. They serve their own purposes such as:

Data access logic creates a logic to store and fetch the data in databases.Application logic sends the data to the front-end to serve users. Presentation logic provides a graphical user interface, also called front-end, in order to make application programs usable.

Whereas, option application access storage (e) is the functionality of system software such as operating system, not the application software, that provides storage so that application programs can organize their data file.

You can learn more about data storage at

https://brainly.com/question/24227720

#SPJ4

A _____ is an example of a systems program.
a. command interpreter
b. web browser
c. database system
d. programming ide

Answers

Command interpreter is an example of system porgram. In this question the correct option is a i.e Command interpreter

A software that is part of operating systems is known as a system program. System programs provide a platform to other programs or software. Command interpreter is one such example of system programs. Unlike graphical user interface (GUI) based programs, command interpreter handles and processes text commands entered by users or other programs.

Command interpreter provides an interface between users and computers. MS-DOS is an example of a command interpreter. Experienced and advanced users prefer to use command interpreters as they give fast and direct access to operating systems.

Why other options (b, c, and d) are not correct is explained briefly below:

Web browser: It is an application software to access the World Wide Web.Database system: It is a system software used to store, organize and retrieve data through queries.Programming ide: It is a software application that facilitates the programmers to develop software.

You can learn more about command interpreter at

https://brainly.com/question/14725990

#SPJ4

What uses upward- and downward-pointing arrows that let you move through a set of values by clicking?

Answers

Spin box uses upward- and downward-pointing arrows that let you move through a set of values by clicking

There are many different types of input devices that can be used to enter data into a computer, but one of the most common is the spin box. A spin box uses upward- and downward-pointing arrows that let you move through a set of values by clicking.

Spin boxes are often used for numerical data, but they can also be used for other types of data, such as dates or names. When you click on the up arrow, the value in the spin box increases by one, and when you click on the down arrow, the value decreases by one.

If you click and hold on the up or down arrow, the values will change more quickly. This can be helpful if you know you want to increase or decrease the value by more than one.

Spin boxes are found in many different types of software, including word processors, spreadsheets, and image editing programs. They can be very helpful when you need to enter precise data into a program.

Learn more on Spin here:

https://brainly.com/question/28053654

#SPJ4

Computer programs typically perform three steps: input is received, some process is performed on the input, and output is produced. true/ false

Answers

True. Most basic programs follow this structure.

The given statement input is received, some process is performed on the input, and output is produced about computer programs is true.

What are the basic steps computer programs typically perform?

Any computer program to perform it follows three basic steps, which make the program better to run:

Generally, a computer program receives a kind of data that is an input, this data may be a file or something provided by the user.This data is altered by the program in some specific way.The altered data is provided as output.

There is some basic software also that can run on computer system software, utility software and application software. These programs are running on the information. and provides output.

Therefore, the steps given in the question are true.

Learn more about computers, here:

https://brainly.com/question/3397678

#SPJ2

1-assume a color display using 8 bits for each of the primary colors (red, green, blue) per pixel and a frame size of 1024 × 1024. a. what is the minimum size in bits of the frame buffer to store a frame?

Answers

Answer:

Hope this helps: 3145728

Explanation:

1024 x 1024 pixels = 1048576 pixel

1048576 x 3 = 3145728 bytes/frame

When you load a program in windows, the pc copies the program from the mass storage device to _______________ and then runs it.

Answers

When you load a program in windows, the pc copies the program from the mass storage device to RAM and then runs it.

RAM is an abbreviation for random access memory. RAM is used to store programs and data that can be read and altered in any order. RAM has the advantage over hard disk drives as it is more convenient and faster to read and write from.

One of the disadvantages of this type of memory is that it cannot store data permanently as the data is lost when the computer is shut off.

RAM is stored in microchips of the pc and can bear only a small amount of data.

Dynamic random access memory and static random access memory are the two main types of RAM that differ in that the static random access memory the data does not need to be constantly refreshed.

To know more about RAM, click here:

https://brainly.com/question/3157583

#SPJ4

Which example best describes an ethical issue raised by computers?
OA. Millions of businesses using their knowledge and skills to sell
products and services online
OB. Causing others harm by posting unkind words or embarrassing
pictures of them on social media
OC. Organizations posting job openings online and job seekers
filtering searches to find a job
OD. Messages or images a person shares with friends being saved for
an unlimited amount of time

Answers

The option that is the example best describes an ethical issue raised by computers is Causing others harm by posting unkind words or embarrassing pictures of them on social media.

What are some of ethical issues concerning the use of computers?

To start with, there is known to be a lot of issues in regards to computer ethics.

It is one that covers:

(1) Computer crime

(2) The  responsibility for computer failure

(3) The protection of computer property, records and software

(4) privacy of the company, workers and customers

Note that Computer ethics is seen as the use of moral principles to the use of any kind of computers as well as the use of the Internet.

Therefore, The option that is the example best describes an ethical issue raised by computers is Causing others harm by posting unkind words or embarrassing pictures of them on social media.

Learn more about ethical issue from

https://brainly.com/question/13514672

#SPJ1

The address o:3/7 would be found on terminal ____ of an output module residing in slot ___ of the plc chassis.

Answers

The address O:3/7 would be found on terminal 7 of an output module residing in slot 3 of the PLC chassis.

The PLC chassis is the heart of any industrial control system. It houses the various modules that make up the system, including the input/output (I/O) modules. Each I/O module has a unique address that identifies its location within the chassis.

For example, the address O:3/7 would be found on terminal 7 of an output module residing in slot 3 of the PLC chassis. This address is used to identify the module when configuring the system.

Knowing the addresses of the various modules is essential for troubleshooting and maintaining the system. If a problem arises, the technician can quickly identify the location of the module and take the necessary actions to correct the issue.

Learn more here:

https://brainly.com/question/14786619

#SPJ4

Companies use ________ as marketing communication channels discussing everything from corporate strategies to detailed product overviews. multiple choice
a. podcasting
b. web
c. browsing
d. iming
e. email

Answers

Companies use podcasting as marketing communication channels discussing everything from corporate strategies to detailed product overviews.

What is podcasting?

Podcasting can be defined as a digital communication process that typically involves converting an audio broadcast to audio files which are then integrated into digital music player.

In Business management, an effective and efficient use of podcast would generally help a business organization to increase its marketing research and build loyalty among its customers.

In this context, we can reasonably infer and logically deduce that different business organizations can use podcasting as marketing communication channels to discussing everything about their business.

Read more on podcasting here: https://brainly.com/question/14365807

#SPJ1

A key characteristic of teams is that all members are responsible for achieving common goals. which term describes this concept?

Answers

A key characteristic of teams is that all members are responsible for achieving common goals, a terminology which describes this concept is: d) shared accountability.

What is a project team?

A project team can be defined as a group of people with common aims, goals and objectives that are assembled by a project manager, in order to execute and implement a project successfully.

This ultimately implies that, project management is focused on team building and the execution of a project by the team members.

What is shared accountability?

Shared accountability can be defined as a concept which ensures that all team members are responsible for achieving team outcomes, while operating under common aims, goals, and standards of performance, in order to foster appreciation and satisfaction among team members.

Read more on shared accountability here: https://brainly.com/question/15094531

#SPJ1

Complete Question:

A key characteristic of teams is that all members are responsible for achieving common goals. Which term describes this concept?

a) cohesiveness

b) consensus

c) stability

d) shared accountability

An email message that is encrypted, uses a digital signature and carries a hash value would address which aspects of the cia triad?

Answers

An email message that is encrypted, uses a digital signature and carries a hash value would address this aspects of the CIA Triad: A. Confidentiality and integrity.

What is the C-I-A security triad?

The C-I-A security triad is an abbreviation for confidentiality, integrity and availability. Also, it can be defined as a cybersecurity model that is designed and developed to guide security policies for information security in a business firm, in order to effectively and efficiently protect and make their data available to all authorized end users.

This ultimately implies that, an encrypted e-mail message that uses a digital signature and carries a hash value is a process which is typically responsible for the confidentiality and integrity at all times.

Read more on C-I-A security triad here: https://brainly.com/question/13384270

#SPJ1

Complete Question:

An email message that is encrypted, uses a digital signature and carries a hash value would address which aspects of the CIA Triad?

A. Confidentiality and integrity

B. Confidentiality and availability

C, Integrity and availability

D. Confidentiality, Integrity and availability

Question 6 of 20:
Select the best answer for the question.
6. Which of the following can prevent access to technology and the Internet?
O A. Geography
O B. Digital literacy
OC. A high salary
OD. A good education
Mark for review (Will be highlighted on the review page)
<< Previous Question
Next Question >>

Answers

Answer:

A.geograpy

Explanation:

cuz if there is no Geography internet will not be able to get to de person who needs it

Geography can prevent access to technology and the Internet.

What is Technology and Internet?

The electrical engine was the main driver of technological advancement during the Industrial Era, the Internet is the key technology of the Information Age.

This vast worldwide network of computer networks, which is currently mostly built on wireless communication platforms, offers omnipresent capability of multimodal, interactive communication in selected time, transcending space.

The Arpanet, the forerunner of the Internet, was introduced in 1969, thus it's not really a new invention.

The Internet is the key technology of the Information Age, much like how the electrical engine drove technological advancement during the Industrial Age.

Therefore, Geography can prevent access to technology and the Internet.

To learn more about Internet, refer to the link:

https://brainly.com/question/13308791

#SPJ2

A palindrome is a string whose reversal is identical to the string. how many bit string of length 20 are palindromes and do not contain 11 as a substring?

Answers

A palindromic number, often known as a numeric or numeral palindrome, is one whose value remains the same when its digits are reversed, such as 16461. There are 2n possible bit strings for any n. Both forward and backward reading are done in the same manner.

What makes something a palindrome?Both forward and backward reading are done in the same manner.

A word, phrase, or sentence that reads the same both forward and backward is known as a palindrome.

The Greek words for "again" (Palin) and "to run" are combined to form the word palindrome (drom).

A palindromic number, often known as a numeric or numeral palindrome, is one whose value remains the same when its digits are reversed, such as 16461.

February 20, 2022, is the only palindrome date in the M/DD/YYYY date format for the year 2022. (2-20-2022). There are 2n possible bit strings for any n.

The characters read the same backward as forward. Some examples of palindromic words are redivider, deified, civic, radar, level, rotor, kayak, reviver, racecar, madam, and refer.

There are 2n possible bit strings for any n. Both forward and backward reading are done in the same manner.

To learn more about palindrome, refer to:

https://brainly.com/question/28279486

#SPJ4

According+to+gartner+research,+by+2020,+_____+will+be+the+greatest+source+of+competitive+advantage+for+30%+of+organizations.

Answers

According to Gartner Research, by 2020, digital dexterity will be the greatest source of competitive advantage for 30% of organizations.

Organizations are under increasing pressure to keep up with the ever-changing digital landscape. To stay ahead of the competition, many are turning to digital dexterity as a source of competitive advantage.

Gartner Research predicts that by 2020, digital dexterity will be the greatest source of competitive advantage for 30% of organizations. To achieve digital dexterity, organizations need to be able to rapidly adapt to changing market conditions and technologies.

To stay ahead of the competition, organizations need to invest in training and development programs that will help employees stay up-to-date with the latest digital trends. Additionally, organizations need to create a culture of innovation that encourages employees to experiment with new technologies and ideas.

By 2020, digital dexterity will be a critical source of competitive advantage. Organizations that are able to effectively harness the power of digital technology will be well-positioned to succeed in the future.

Learn more here:

https://brainly.com/question/17178886

#SPJ4

The query window displays when you click the _____ option and then click the finish button.

Answers

The query window displays when you click the Open the query to view information option and then click the finish button.

Why is a query used?

A query is known to be an element or a tool that helps to give you an answer to any form of simple question, carry out calculations, put data together from multiple tables, add, alter, as well as delete data from a given database.

Note that the use of queries is one that is seen to be very  versatile, as there are found to be a lot of types of queries and a person can be able to create a type of query through  the way the task has been given or made.

Therefore, based on the above, The query window displays when you click the Open the query to view information option and then click the finish button.

Learn more about query window from

https://brainly.com/question/17280632

#SPJ1

A _____, which employs the first-in-first-out (fifo) principle in which the first item added to the data list is the first removed, is similar to a stack.

Answers

Queue is the data structure employs first-in-first-out (FIFO). Queue employee FIFO principle in which the first item added to the data list is the first removed, and it is similar to a stack.

A queue is a data structure that follows first-in-first-out (FIFO) principle, meaning that the first item added to the data list in the queue becomes the first item to be removed.

In queues two operations enqueue and dequeue are allowed only. Enqueue refers to insertion of an element at the back/end of the data list in the queue, while dequeue refers to removing the element from front/start of the data list in the queue. Consider an analogy that a queue is a line of people to pay electricity bills; new addition is made at the end, while removal after paying the bill happens at the start.

Disk controllers use the queue (FIFO) as an algorithm of disk scheduling to determine the order to serve disk I/O requests. Further, in computer networking FIFO is used to hold data packets in order to send them to their next destination.

A stack is also a data structure that represents last–in-first-out principle (LIFO), allowing the last item inserted in the data list in stack to be removed first for processing.

In stacks, insertion and removal of elements is possible only from the top. Only the two allowed operations by stacks are push and pop. Push means adding an item to the top of the stack and pop means removing the item from stack’s top. Consider an analogy of a stack of books; a book can be added to and removed from only the top.

Computers use stacks (LIFO) when it is required to get the most recent information entered, from data buffers or arrays.

The main difference between queues (FIFO) and stacks (LIFO) is in removal of the items from the data list. In queues, the oldest added item is removed first. In stacks, the newest added element is removed first.

You can learn more about queues at

https://brainly.com/question/24275089

#SPJ4

It is advised to fully charge the battery of a laptop before using it for the first time. True or false?.

Answers

It is advised to fully charge the battery of a laptop before using it for the first time is a true statement.

Should a person fully charge laptop before first use?

Yes, it is very important for a person to charge their laptop before they make use of it.

Note that the first charge is seen to be  most important charge because if a person buy a new laptop, it is good to charge your battery for 24 hours to ensure that it gets a full charge on its first attempt and thus helps to prolong its life.

Therefore, based on the above, It is advised to fully charge the battery of a laptop before using it for the first time is a true statement.

Learn more about laptop  from

https://brainly.com/question/14956175

#SPJ1

Other Questions
-StateBorderNationalBorderC2011 Map ResourcesWhich type of border shows the division between Haiti and the Dominican Republic?O Physical boundaryO Natural boundaryO National borderO State border The french physician jean nicot was successful in curing blank______ of catherine de medici, queen of henry ii of france, which made tobacco use popular. Debra notes that theo chocolate has started holding its own operations to the same imo standards of fair trade to which it holds its suppliers. This type of behavior encourages more ethical decision-making by sends a powerful message to employees and customers. True or false?. By enacting economic reform, education expansion, and railroad construction, reconstruction governments delayed settling the issue of? What are the factors of production? explain the production of a good or service using the want-satisfaction chain. Calculate the energy of a photon emitted when an electron in a hydrogen atom undergoes a transition from =7 to =1. The ratio of density of a mineral to that of freshwater is called the mineral's ______. Dr. anderson is a therapist who tends to focus on his clients' growth potential and their need for love and acceptance. dr. anderson's area of specialization is:_________ What is the amount of total operating capital (o.c) for 2018? o.c = nowc net fixed asset When time, inc. publishes a kid's version of its sports illustrated publication it is attempting to influence today's children to purchase si when they become adults. this process is an example of:_______ Exercise 1 Write a personal pronoun that agrees with the indefinite pronoun antecedent in the sentence. Underline the antecedent. Mike said he has something important to tell me. I wonder what ______________ is. Given n bits, how many unsigned integers can be represented with the n bits? what is the range of these integers? What are the six growth factors for microorganisms?F. A.T.T.O.M. Paul pierce is busy working with other managers evaluating the products and businesses making up their company. paul is engaged in ________. The nurse wants to increase physical activity but lives alone in a major metropolitan area. what should the nurse do to enhance this self-care practice? Where did some of theearly Europeans who came to America comefrom? Carbohydrates are classified as micronutrients. true/ false economic causes of wwi ? Which of the following is an important consideration in setting up the proper environment to complete tasks on time limited distractions free from distractions a cluttered workspace working whenever time allows Find the 9th term of the arithmetic sequence 4x+44x+4, 9x+119x+11, 14x+18, 14x+18,...