vacuum tubes produced a large amount of

Answers

Answer 1

Answer: suck

Explanation:

sucktion    


Related Questions

Print the two strings in alphabetical order. Assume the strings are lowercase. End with newline. Sample output: capes rabbits import java.util.Scanner: public class OrderStrings { public static void main (String args) { String firstString: String secondString: firstString = "rabbits" secondString = "capes" /*Your solution goes here */ return: } }import java.util.Scanner;public class OrderStrings { public static void main(String[] args) { String firstString; String secondString; firstString = "rabbit"; secondString= "capes"; //String class in java provide string comparison function, use it, and get //your work done may even use brute force i.e using for loop and compare character by // character which will not good for the programming language which already have vast //predefined number of functions if(firstString.compareTo(secondString) < 0){ System.out.println(firstString + " " + secondString); } else{ System.out.println(secondString + " " + firstString); } return; }}

Answers

Answer:

Following are the code to the given question:

import java.util.Scanner;//import package

public class OrderStrings // defining a class OrderStrings  

{

   public static void main(String[] args) //defining a main method

   {

       Scanner scnr = new Scanner(System.in);//defining a Scanner class object  

       String firstString;//defining a String variable

       String secondString; //defining a String variable

       firstString = scnr.next();//input value

       secondString = scnr.next();//input value

       if (firstString.compareTo(secondString) < 0)//use if to compare sting value

           System.out.println(firstString + " " + secondString);//print sting value  

       else//else block

           System.out.println(secondString + " " + firstString);//print sting value

   }

}

Output:

rabbits capes

capes rabbits

Explanation:

In this code a class "OrderStrings" is defined inside the class the main method is defined that declares the two string variable that uses the input method to input the string value and after input, it uses the conditional statement. Inside this compareTo method is declared that compare string value and prints the string value.

What is machine learning

Answers

Answer:

machine learning is the ability for computers to develop new skills and algorithms without specific instructions to do so.

Machine learning is a branch of artificial intelligence (AI) and computer science which focuses on the use of data and algorithms to imitate the way that humans learn, gradually improving its accuracy.

Which attack form either exploits a software flaw or floods a system with traffic in order to prevent legitimate activities or transactions from occurring?

Answers

Answer:

Denial of service attack.

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, sniffing, DOS attack, etc.

A denial of service (DOS) attack is a form of cyber attack that involves either the exploitation of a software flaw or overwhelmingly floods a computer system in a network with traffic in order to prevent authorized users from performing legitimate activities or transactions.

Some of the ways to prevent vulnerability or cyber attacks in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

What is the default return type of a method in Java language?

A.Void

B.Int

C.None

D.Short

Answers

Answer:

The default return data type in function is int

Answer: Option (b)

Explanation:

The default return data type in a function is int. In other words commonly if it is not explicitly mentioned the default return data type of a function by the compiler will be of an integer data type.

If the user does not mention a return data type or parameter type, then C programming language will inevitably make it an int.

mark me brainlist

im sure its option b!!

application of printer​

Answers

Answer:

In addition, a few modern printers can directly interface to electronic media such as memory cards, or to image capture devices such as digital cameras, scanners; some printers are combined with a scanners and/or fax machines in a single unit, and can function as photocopiers.

A user reports network resources can no longer be accessed. The PC reports a link but will only accept static IP addresses. The technician pings other devices on the subnet, but the PC displays the message Destination unreachable. Wh are MOST likley the causes of this issue?

Answers

Answer: is this a real question but I think it would be Ip address hope this helps :)))

Explanation:

A strategy that adopts interface standards that are defined by and widely used throughout industry to facilitate the update of components with new technology is __________. Open systems Non-developmental items Software-embedded systems Automated Information Systems

Answers

Answer:

The right approach is Option d (Automated information systems).

Explanation:

A technology that collects as well as disseminates knowledge or material throughout a range or variety of computerized systems, they are determined as an Automated information system.Oftentimes virtually minimal individual personal interference is necessary except perhaps construction as well as services.

Other choices aren't related to the given scenario. So the above is the appropriate one.

A small company with 100 computers has hired you to install a local area network. All fo the users perform functions like email, browsing and Office software. In addition, 25 of them also do a large number of client/server requests into a database system. Which local area network operating system would you recommend?

Answers

Answer:

Based on the requirements indicated in the question above, the best Local Area Network (LAN) operating system that can be used is

Windows 7 , 8.1 or Windows 10. This is because they all are configured to handle extensive LAN activity and can connect over 200 users.

Explanation:  

Generally speaking, Windows 10 packs more improvement over the previous windows.

Cheers

You are having a problem with your Windows computer that is isolated to a single graphics editing program that you use every day in your work. When you described the problem to the customer service support person for this product, she told you that the only fix for it is to edit a key under HKEY-LOCAL_MACHINE\SOFTWARE. She has assured you that this fix will work without causing any problems, but you are wary of doing this. Descript the steps and precautions taken.

Answers

Answer:

I'm not a big tech head but I know that creating a restore point is highly recommended for changing anything that you aren't 100% sure about to your computer.

Data representation and interactivity are important aspects of data visualization.

a. True
b. False

Answers

Answer:

a. True

Explanation:

Data visualization are defined as the representation of the data and information in graphical way. The data visualization tool uses charts, diagrams, graphs, maps, etc. to represent and visualized the information and understand the patter or trend in the data.

It is an effective way to interact with the user and works likes a form of a visual art.

Thus interactivity and data representations are the two important aspect of the data visualization.

Hence, the answer is true.

In confirmatory visualization Group of answer choices Users expect to see a certain pattern in the data Users confirm the quality of data visualization Users don't know what they are looking for Users typically look for anomaly in the data

Answers

Answer: Users expect to see a certain pattern in the data

Explanation:

Confirmatory Data Analysis occurs when the evidence is being evaluated through the use of traditional statistical tools like confidence, significance, and inference.

In this case, there's an hypothesis and the aim is to determine if the hypothesis is true. In this case, we want to know if a particular pattern on the data visualization conforms to what we have.

State two ways of preventing virus attack on a computer.​

Answers

Answer:

updating the computer and having an anti virus on your computer

Batter boards (if properly offset) will allow for the end user to continually re-string the layout to double check accuracy without having to continually set up an instrument True False

Answers

Answer:

The given statement is "True".

Explanation:

Batter panels seem to be platform frames that are used to temporarily suspend foundations plan threads. These same batter board members look like barriers once built.Its positioning is important for creating a foundation precisely as the plans state since some components of their development would have to be accurate. Placed correctly batter panels guarantee that the boundaries seem to be at the appropriate temperatures as well as positions.

1. Write the CSS for an id with the following characteristics: fixed position, light grey background color, bold font weight, and 10 pixels of padding

Answers

Answer:

#element

{

position: fixed;

background-color: RGBA(211, 211, 211, 1);

font-weight: bold;

padding: 10px;  

}

Assume that an O(log2N) algorithm runs for 10 milliseconds when the input size (N) is 32. What input size makes the algorithm run for 14 milliseconds

Answers

Answer:

An input size of N = 128 makes the algorithm run for 14 milliseconds

Explanation:

O(log2N)

This means that the running time for an algorithm of length N is given by:

[tex]F(N) = c\log_{2}{N}[/tex]

In which C is a constant.

Runs for 10 milliseconds when the input size (N) is 32.

This means that [tex]F(32) = 10[/tex]

So

[tex]F(N) = c\log_{2}{N}[/tex]

[tex]10 = c\log_{2}{32}[/tex]

Since [tex]2^5 = 32, \log_{2}{32} = 5[/tex]

Then

[tex]5c = 10[/tex]

[tex]c = \frac{10}{5}[/tex]

[tex]c = 2[/tex]

Thus:

[tex]F(N) = 2\log_{2}{N}[/tex]

What input size makes the algorithm run for 14 milliseconds

N for which [tex]F(N) = 14[/tex]. So

[tex]F(N) = 2\log_{2}{N}[/tex]

[tex]14 = 2\log_{2}{N}[/tex]

[tex]\log_{2}{N} = 7[/tex]

[tex]2^{\log_{2}{N}} = 2^7[/tex]

[tex]N = 128[/tex]

An input size of N = 128 makes the algorithm run for 14 milliseconds

In C++, objects instantiated on the stack must be returned to program memory through the explicit use of the delete keyword.
a) True
b) False

Answers

Answer:

b. False.

Explanation:

Delete function not used to remove data stored on the stack. It is only used to free memory on the heap. The C++ is programming language used to develop operating systems.

To connect several computers together, one generally needs to be running a(n) ____ operating system

Answers

Answer:

Local Area Network

Explanation:

In the Information technology it is called Local Area Network.

what is an RTF file?

Answers

Answer:

The Rich Text Format is a proprietary document file format with published specification developed by Microsoft Corporation from 1987 until 2008 for cross-platform document interchange with Microsoft products.

A majority of the people whose information was compromised are homeless; therefore there is no easy way to contact them in order to alert them of the security breach. How should Data-Time Inc. manage this breach in security

Answers

Incomplete question. Here's the full question:

Data-Time Inc. is a company that manages databases for a large city in Colorado. Included in these databases is information collected from the city’s homeless shelters and free clinics. Specifically, the databases contain personal information of the users of these services over the past 10 years; this includes people’s Social Security numbers and health records.

This data is highly secure and only accessible to the employees of Data-Time Inc. Employees are given a laptop when they are hired which allows them to access the database remotely. Unfortunately, one of these laptops is stolen and the security of the database is compromised.

A majority of the people whose information was compromised are homeless; therefore there is no easy way to contact them in order to alert them of the security breach. How should Data-Time Inc. manage this breach in security?

Explanation:

Since the emphasis is not on reversing the breach that has occurred, but on managing the level of security damage that could occur, it is important measures are directed towards preventing unauthorized access to sensitive information.

For example, the Media Access Control Address (MAC address) of the laptop if known could be greylisted from accessing the server that contains the sensitive information.

how much is this worth in dollars​

Answers

Answer:

This is worth 50 dollars.

Explanation:

١ - one

٢ - two

٣ - three

٤ - four

٥ - five

٦ - six

٧ - seven

٨ - eight

٩ - nine

٠ - zero

What you see above is the ten digits in Arabic.

Both 5 (٥) and 0 (٠) appear here, thus representing 50.

Functions IN C LANGUAGE
Problem 1
Function floor may be used to round a number to a specific decimal place. The statement
y = floor( x * 10 + .5 ) / 10;
rounds x to the tenths position (the first position to the right of the decimal point). The
statement
y = floor( x * 100 + .5 ) / 100;
rounds x to the hundredths position (the second position to the right of the decimal
point).
Write a program that defines four functions to round a number x in various ways
a. roundToInteger( number )
b. roundToTenths( number )
c. roundToHundreths( number )
d. roundToThousandths( number )
For each value read, your program should print the original value, the number rounded to
the nearest integer, the number rounded to the nearest tenth, the number rounded to
the nearest hundredth, and the number rounded to the nearest thousandth.
Input Format
Input line contain a float number.
Output Format
Print the original value, the number rounded to the nearest integer, the number rounded
to the nearest tenth, the number rounded to the nearest hundredth, and the number
rounded to the nearest thousandth
Examples
Example 1
Input 1
24567.8
Output 1
24567.8 24568 24570 24600

Answers

Definitely C I am going to be home in a few wewwww

___________ colors come forward and command attention. ______________ colors recede away from our eyes and tend to fall into the background of a design.

Answers

Answer:

"Warm; Cool/receding" is the correct answer.

Explanation:

The color temperature would be referred to as summer and winter upon that color wheel, the hottest becoming red/orange as well as the most cooler always being bluish or greenish.A terminology to define the warmth of the color is termed as Warm colors. Warm hues are prominent as well as lively just like reds, oranges, etc.

Thus the above is the right answer.

9.18 LAB: Exact change - methods Write a program with total change amount as an integer input that outputs the change using the fewest coins, one coin type per line. The coin types are dollars, quarters, dimes, nickels, and pennies. Use singular and plural coin names as appropriate, like 1 penny vs. 2 pennies. Ex: If the input is:

Answers

Answer:

Explanation:

The following code is written in Java. It asks the user to enter the amount of change needed. This is done as a double since we are dealing with coins and not full dollar values alone. It then makes the necessary calculations to calculate the number of each coin needed and outputs it back to the user. A test case has been provided in the picture below with a sample output.

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       int dollars = 1;

       double quarters = 0.25;

       double dimes = 0.10;

       double nickels = 0.05;

       double pennies = 0.01;

       Scanner in = new Scanner(System.in);

       System.out.println("Enter Change Value: ");

       double change = in.nextDouble();

       int numDollars, numQuarters, numDimes, numNickels, numPennies;

       double newChange;

       numDollars = (int) (change / dollars);

       newChange = change % dollars;

       numQuarters = (int) (newChange / quarters);

       newChange = newChange % quarters;

       numDimes = (int) (newChange / dimes);

       newChange = newChange % dimes;

       numNickels = (int) (newChange / nickels);

       newChange = newChange % nickels + 0.001;

       numPennies = (int) (newChange / pennies);

       newChange = newChange % pennies;

       

       System.out.println("Minimum Num of Coins needed: ");

       if (numDollars != 1) {

           System.out.println(numDollars + " Dollars");

       } else {

           System.out.println(numDollars + " Dollar");

       }

       if (numQuarters != 1) {

           System.out.println(numQuarters + " Quarters");

       } else {

           System.out.println(numQuarters + " Quarter");

       }

       if (numDimes != 1) {

           System.out.println(numDimes + " Dimes");

       } else {

           System.out.println(numDimes + " Dime");

       }

       if (numNickels != 1) {

           System.out.println(numNickels + " Nickels");

       } else {

           System.out.println(numNickels + " Nickel");

       }

       if (numPennies != 1) {

           System.out.println(numPennies + " Pennies");

       } else {

           System.out.println(numPennies + " Penny");

       }

   }

}

The program is an illustration of conditional statements

Conditional statements are used to make decisions

The program in C++ where comments are used to explain each line is as follows

#include<iostream>

using namespace std;

int main() {

// This line declare all the variables

int amount, dollar, quarter, dime, nickel, penny;

// This prompts the user for input (i.e. the amount)

cout<<"Amount: ";

//This gets the amount from the user

cin>>amount;

// This checks if the amount is 0 or less

if(amount<=0)  {

//This prints "No Change"

cout<<"No Change";

}

//If the amount is greater than 0

else {

// These convert the amount to various coins

dollar = amount/100;

amount = amount%100;

quarter = amount/25;

amount = amount%25;

dime = amount/10;

amount = amount%10;

nickel = amount/5;

penny = amount%5;

// The next lines print the coins

if(dollar>=1)  {

if(dollar == 1) {

cout<<dollar<<" dollar\n"; }

else {

cout<<dollar<<" dollars\n"; }

}

if(quarter>=1) {

if(quarter== 1) {

cout<<quarter<<" quarter\n";

}

else {

cout<<quarter<<" quarters\n";

}

}

if(dime>=1) {

if(dime == 1) {

cout<<dime<<" dime\n";

}

else {

cout<<dime<<" dimes\n";

}

}

if(nickel>=1) {

if(nickel == 1) {

cout<<nickel<<" nickel\n";

}

else {

cout<<nickel<<" nickels\n";

}

}

if(penny>=1) {

if(penny == 1) {

cout<<penny<<" penny\n";

}

else {

cout<<penny<<" pennies\n";

}

}

}

return 0;

}

Read more about conditions at:

https://brainly.com/question/15683939

Create a function called GetColors that will accept two parameters. These parameters can only be red, blue or yellow. Your function needs to analyze these two colors and determine the color mix. Make sure your function returns the color mix back to where it was called.

Answers

Answer:

Explanation:

The following code is written in Java. It creates a GetColors method that takes in the two parameter colors of either red, blue or yellow. It combines those colors and returns the mix of the two colors back to the user. A test case has been used in the main method and the output can be seen in the attached image below.

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       System.out.println(GetColors("yellow", "red"));

   }

   public static String GetColors(String color1, String color2) {

       if (color1 == "red") {

           if (color2 == "blue") {return "purple";}

           else if (color2 == "yellow") {return "orange";}

           else {return "red";}

       } else if (color1 == "blue") {

           if (color2 == "red") {return "purple";}

           else if (color2 == "yellow") {return "green";}

           else {return "blue";}

       } else if (color1 == "yellow") {

           if (color2 == "red") {return "orange";}

           else if (color2 == "blue") {return "green";}

           else {return "yellow";}

       } else {

           return "Wrong Parameters";

       }

   }

}

..............is a piece of hardware used to provide data and instructions to a computer used for interaction and control. *
Output device.
Processing.
input device.
All of above. ​

Answers

Answer:

output

Explanation:

it can be seen and touched

What will MOST likely adversely impact the operations of unpatched traditional programmable-logic controllers, running a back-end LAMP server and OT systems with human-management interfaces that are accessible over the Internet via a web interface?

Answers

Answer:

The answer is "Option a and Option f"

Explanation:

The cross-site programming and Server-Side Requests fraud were activities that can have negative effects as these are assaults that directly affect your cloud-based servers via web apps. Although the remainder of an attack could be controlled with these approaches, then they can affect the encryption keys only less.

In python,
Here's some fake data.
df = {'country': ['US', 'US', 'US', 'US', 'UK', 'UK', 'UK'],
'year': [2008, 2009, 2010, 2011, 2008, 2009, 2010],
'Happiness': [4.64, 4.42, 3.25, 3.08, 3.66, 4.08, 4.09],
'Positive': [0.85, 0.7, 0.54, 0.07, 0.1, 0.92, 0.94],
'Negative': [0.49, 0.09, 0.12, 0.32, 0.43, 0.21, 0.31],
'LogGDP': [8.66, 8.23, 7.29, 8.3, 8.27, 6.38, 6.09],
'Support': [0.24, 0.92, 0.54, 0.55, 0.6, 0.38, 0.63],
'Life': [51.95, 55.54, 52.48, 53.71, 50.18, 49.12, 55.84],
'Freedom': [0.65, 0.44, 0.06, 0.5, 0.52, 0.79, 0.63, ],
'Generosity': [0.07, 0.01, 0.06, 0.28, 0.36, 0.33, 0.26],
'Corruption': [0.97, 0.23, 0.66, 0.12, 0.06, 0.87, 0.53]}
I have a list of happiness and six explanatory vars.
exp_vars = ['Happiness', 'LogGDP', 'Support', 'Life', 'Freedom', 'Generosity', 'Corruption']
1. Define a variable called explanatory_vars that contains the list of the 6 key explanatory variables
2. Define a variable called plot_vars that contains Happiness and each of the explanatory variables. (Hint: recall that you can concatenate Python lists using the addition (+) operator.)
3. Using sns.pairplot, make a pairwise scatterplot for the WHR data frame over the variables of interest, namely the plot_vars. To add additional information, set the hue option to reflect the year of each data point, so that trends over time might become apparent. It will also be useful to include the options dropna=True and palette='Blues'.

Answers

Answer:

Here the answer is given as follows,

Explanation:

import seaborn as sns  

import pandas as pd  

df = {'country': ['US', 'US', 'US', 'US', 'UK', 'UK', 'UK'],  

  'year': [2008, 2009, 2010, 2011, 2008, 2009, 2010],  

  'Happiness': [4.64, 4.42, 3.25, 3.08, 3.66, 4.08, 4.09],  

  'Positive': [0.85, 0.7, 0.54, 0.07, 0.1, 0.92, 0.94],  

  'Negative': [0.49, 0.09, 0.12, 0.32, 0.43, 0.21, 0.31],  

  'LogGDP': [8.66, 8.23, 7.29, 8.3, 8.27, 6.38, 6.09],  

  'Support': [0.24, 0.92, 0.54, 0.55, 0.6, 0.38, 0.63],  

  'Life': [51.95, 55.54, 52.48, 53.71, 50.18, 49.12, 55.84],  

  'Freedom': [0.65, 0.44, 0.06, 0.5, 0.52, 0.79, 0.63, ],  

  'Generosity': [0.07, 0.01, 0.06, 0.28, 0.36, 0.33, 0.26],  

  'Corruption': [0.97, 0.23, 0.66, 0.12, 0.06, 0.87, 0.53]}  

dataFrame = pd.DataFrame.from_dict(df)  

explanatory_vars = ['LogGDP', 'Support', 'Life', 'Freedom', 'Generosity', 'Corruption']  

plot_vars = ['Happiness'] + explanatory_vars  

sns.pairplot(dataFrame,  

            x_vars = explanatory_vars,  

            dropna=True,  

            palette="Blues")    

Which operating system desktop or mobile is the best

Answers

Answer:

bing or alien ware is the best.

Answer:

Your choice, but personally, desktop is better.

Explanation:

Desktop devices have portrait orientations so content can stretch across a screen and often multiple messages or images can live comfortably in such a wide space. Mobile devices are usually used in portrait orientation (and the smaller screens mean that even in landscape mode, horizontal space is limited).

Definition of digital

Answers

Answer:

There are two definitions from

Explanation:

1.) (of signals or data) expressed as series of the digits 0 and 1, typically represented by values of a physical quantity such as voltage or magnetic polarization.

2.) (of a clock or watch) showing the time by means of displayed digits rather than hands or a pointer.

I'm not sure if you meant "Digit". But if you did it would mean numbers or the places where numbers would go.

Hope this helps! (If not so sorry)

Answer:

adjective

1.

(of signals or data) expressed as series of the digits 0 and 1, typically represented by values of a physical quantity such as voltage or magnetic polarization.

relating to, using, or storing data or information in the form of digital signals.

"digital TV"

involving or relating to the use of computer technology.

"the digital revolution"

The__________is an HTML tag that provides information on the keywords that represent the contents of a Web page.

Answers

Answer:

Meta tag

Explanation:

Other Questions
What is the square root of -1 Why does the narrator think that the journalist will be puzzled by his smile? Find the equation of a line that is perpendicular to y = -3x 1 and passes through the point(3,2).Give your answer in the form y = mx + b. Describe how the U.S. Constitution helps limit the power of the government. Assume declining profits in the market for Internet service force several firms in the area to drop out of the market. All else constant, this would cause the: Human-to-human transmission of plague is usually by Group of answer choices unsanitary conditions. the respiratory route. dog flea. rat flea. wounds. The circle below is centered at (4, q) and has a radius of 3. What is the equation. If three sandwiches and two bags of chips cost$22.00, and two sandwiches and one bag of chipscost $14.25, how much does a bag of chips cost? What is the answer for this equation A student selecting 3 classes for Winter quarter there are 4 drawing and design courses 3 general education courses and 3 other majors that can fit in their schedule it said student is only taking one course from each category determine the number of possible class schedules emphasizes on loving each othera)The Rig-vedab)The Quaranc)The bhuddhist People 3. A car accelerates uniformly from 0 to 72 km/h in 11.5 seconds. a) What is the acceleration of the car in m/s2? b) What is the position of the car by the time it reaches the velocity of 72 km/h? How many boxes could you stack safely on a pallet if the pallet is 5 feet deep, five feet across, every box. is 1 x 1 and the maximum safe stacking height is 5 boxes? * Assignment 01.02 Discovering History Mrs. Young is currently enrolled in Original Medicare (Parts A and B), but she has been working with Agent Neil Adams in the selection of a Medicare Advantage (MA) plan. It is mid-September, and Mrs. Young is going on vacation. Agent Adams is considering suggesting that he and Mrs. Young complete the application together before she leaves. He will then submit the paper application before the start of the annual enrollment period (AEP). What would you say If you were advising Agent Adams A toy rabbit of mass 0.15 kg is accelerated at 8 m/s2 by an angry toddler. Calculate the force exerted on the toy rabbit. Because electrons are orbiting the nucleus, the nucleus is stationarytrue or false why was the united states motivated to launch the Marshall plan immediately following world war 2 If copies of all your computer data are stored on four independent hard disk drives, what is the probability that during a year, you can avoid catastrophe with at least one working drive? With four hard disk drives, the probability that catastrophe can be avoided is Solve x2 + 10x = 24 by completing the square. Which is the solution set of the equation?(negative 5 minus StartRoot 34 EndRoot comma negative 5 + Startroot 34 EndRoot)(negative 5 minus StartRoot 29 EndRoot comma negative 5 + StartRoot 29 EndRoot){12, 2}{2, 12}