what is a computer and what is the work of it​

Answers

Answer 1

Answer:

A computer is an electronic machine that processes information. It is an information processor. It takes data, stores it, and then gives the result or answer.

It is a machine composed of hardare and software componests to be manually ised or atonomosly used.

Hope this helps!

Answer 2

Answer:

A computer is a machine that accepts data as input, processes that data using programs, and outputs the processed data as information. Many computers can store and retrieve information using hard drives. Computers can be connected together to form networks, allowing connected computers to communicate with each other.


Related Questions

what is subnetting. what does subnetting mean

Answers

Answer:

Subnetting is the practice of dividing a network into two or more smaller networks. It increases routing efficiency, enhances the security of the network and reduces the size of the broadcast domain.

Explanation:

NEED HELP ASAP! You are looking for information in the online catalog for your local library. Which field would you not expect to see in a library's catalog or database?
A. Author
B. Title
C. Year
D. Phone number

Answers

Answer:

The answer is D

Explanation:

     

What are input masks most useful for in data validation? moving data from one field to another hiding parts of a value that are unnecessary identifying duplicate values in different records in a table ensuring consistent formatting of values in a specific field

Answers

Answer:

Ensuring Consistent Formatting of Values in a Specific Field

Explanation:

Answer: ensuring consistent formatting of values in a specific field

Explanation: on edg

Which of the following best describes the safety of blogging

Answers

we need the options

Generally safe, but there may be some privacy and security concerns. Therefore option B is correct.

While blogging can offer a relatively safe platform for expressing ideas and connecting with an audience, it is not entirely risk-free.

Privacy and security concerns can arise, especially when bloggers share personal information or discuss sensitive topics.

Cybersecurity threats, such as hacking or data breaches, can also compromise a blogger's personal information or their readers' data.

Additionally, bloggers should be mindful of online harassment and potential legal issues related to content ownership or copyright infringement.

Being aware of these risks and implementing best practices for online safety can help ensure a more secure and enjoyable blogging experience.

Therefore option B is correct.

Know more about Cybersecurity:

https://brainly.com/question/31928819

Your question is incomplete, but most probably your full question was.

Which of the following best describes the safety of blogging?

A. Completely safe, with no risks involved.

B. Generally safe, but there may be some privacy and security concerns.

C. Moderately safe, but potential risks exist, especially with sensitive topics.

D. Highly unsafe, with significant risks to personal information and security.

Scrabble is a word game in which words are constructed from letter tiles, each letter tile containing a point value. The value of a word is the sum of each tile's points added to any points provided by the word's placement on the game board. Write a program using the given dictionary of letters and point values that takes a word as input and outputs the base total value of the word (before being put onto a board). Ex: If the input is: PYTHON the output is: 14

Answers

Complete question:

Scrabble is a word game in which words are constructed from letter tiles, each letter tile containing a point value. The value of a word is the sum of each tile's points added to any points provided by the word's placement on the game board. Write a program using the given dictionary of letters and point values that takes a word as input and outputs the base total value of the word (before being put onto a board). Ex:  If the input is:  PYTHON

the output is: 14

part of the code:

tile_dict = { 'A': 1, 'B': 3, 'C': 3, 'D': 2, 'E': 1, 'F': 4, 'G': 2, 'H': 4, 'I': 1, 'J': 8,  'K': 5, 'L': 1, 'M': 3, 'N': 1, 'O': 1, 'P': 3, 'Q': 10, 'R': 1, 'S': 1, 'T': 1,  'U': 1, 'V': 4, 'W': 4, 'X': 8, 'Y': 4, 'Z': 10 }

Answer:

Complete the program as thus:

word = input("Word: ").upper()

points = 0

for i in range(len(word)):

   for key, value in tile_dict.items():

       if key == word[i]:

           points+=value

           break

print("Points: "+str(points))

Explanation:

This gets input from the user in capital letters

word = input("Word: ").upper()

This initializes the number of points to 0

points = 0

This iterates through the letters of the input word

for i in range(len(word)):

For every letter, this iterates through the dictionary

   for key, value in tile_dict.items():

This locates each letters

       if key == word[i]:

This adds the point

           points+=value

The inner loop is exited

           break

This prints the total points

print("Points: "+str(points))

Answer:

Here is the exact code, especially if you want it as Zybooks requires

Explanation:

word = input("").upper()

points = 0

for i in range(len(word)):

  for key, value in tile_dict.items():

      if key == word[i]:

          points+=value

          break

print(""+str(points))

Explain what an IM is,

Answers

Answer: Stands for "Instant Message." Instant messaging, or "IMing," as frequent users call it, has become a popular way to communicate over the Internet

Explanation:

what is work immersion and its nature​

Answers

Work Immersion refers to the subject of the Senior High School Curriculum, which involves hands-on experience or work simulation in which learners can apply their competencies and acquired knowledge relevant to their track.

Suppose you observe that your home PC is responding very slowly to information requests from the net. And then you further observe that your network gateway shows high levels of network activity, even though you have closed your email client., Web browser, and other programs that access the net. What types of malware could cause these symptoms

Answers

ANSWER: BOT

EXPLANATION: When a PC is experiencing the listed effects, it thus depicts that the PC is under attack by a bot, which is a type of script or software application that establishes automated tasks via command.

However, a bad bots often initiate malicious tasks that gives room for attackers to take control over an affected PC remotely, most especially for fraudulent activities.

When several affected computers are connected, they form a botnet connection.

explain the different type of shift register counter ​

Answers

Answer:

Shift registers are also used as counters. There are two types of counters based on the type of output from right most D flip-flop is connected to the serial input. Those are Ring counter and Johnson Ring counter.

There are two types of shift register counters. They are given below:

Ring counter.Johnson ring counter.

What do you mean by Shift register counter?

The shift register counter may be defined as a sequence of a specific number of core registers that are significantly interconnected to one another in order to provide a clock-driven data shift.

A shift register is a set of f FFs that can be connected within the series and the stored data can be moved in the registers sequentially as per the command or instruction is given.

They are also utilized as counters. The type of shift register counter is based on the output from the D flip-flop which is connected to the serial input from the rightmost side.

Therefore, the two types of shift register counters are well mentioned above.

To learn more about Shift register, refer to the link:

https://brainly.com/question/14096550

#SPJ6

g Write a function named vowels that has one parameter and will return two values. Here is how the function works: Use a while loop to determine if the parameter is greater than 1. If it is not greater than 1, do the following: Display a message to the user saying the value must be greater than 1 and to try again. Prompt the user to enter how many numbers there will be. Use a for loop that will use the parameter to repeat the correct number of times (if the parameter is 10, the loop should repeat 10 times). Within this for loop, do the following: Generate a random integer between 65 and 90 Convert this integer to is equivalent capital letter character by using the chr function. If num is the variable with this integer, the conversion is done like this: ch

Answers

10-20-100.40 = my bin =nice

HELP ASAP DONT ANSWER WITH A LINK​

Answers

Answer:

Layout

title

title and content

section header

comparison

Orientation

landscape

portrait

3. Never
to any instant messages, phone call, video call, or screen
staring requests from someone you do not know.
A. reply
B. refuse
C. forward text
D. accept pictures

Answers

Answer:

[tex]\color{Blue}\huge\boxed{Answer} [/tex]

B.Refuse

Answer:

Never reply to any instant messages, phone call, video call, or screen staring requests from someone you do not know.

Hope it helps u ARMY!!

What are
the rules for giving
variable name ?​

Answers

Answer:

Rules for naming variables:

- Variable names in Visual C++ can range from 1 to 255 characters. To make variable names portable to other environments stay within a 1 to 31 character range.

- All variable names must begin with a letter of the alphabet or an underscore ( _ ).  For beginning programmers, it may be easier to begin all variable names with a letter of the alphabet.

- After the first initial letter, variable names can also contain letters and numbers.  No spaces or special characters, however, are allowed.

- Uppercase characters are distinct from lowercase characters.  Using all uppercase letters is used primarily to identify constant variables.  

- You cannot use a C++ keyword (reserved word) as a variable name.

If a 9V, 7W radio is on from 9am to 12pm. Calculate the amount of charge that flows through it, hence or otherwise the total number of free electrons that pass through at a point at the power supply terminals​

Answers

Answer:

Q=It

and

p=IV

Given, v=9V P= 7W

I=P/V

I =7/9

Also, time(t) from 9am to 12pm is 3hrs

Converting into sec =3×3600

t=10800

Q= 7/9 ×10800

Q =8400C

Write one line Linux command that performs the required action in each of the problems given below: (a) Find the difference in text between two text files File1.txt and File2.txt and save the result in a file named result.txt (b) Change the permissions of the file remote_driver.c such that the owner has the permissions to read, write and execute and anybody other than the owner can only read the file but cannot write or execute. (c) Search for the string ir_signal in the file /home/grad/remote_driver.c and print on the terminal the number of instances of the given string in the file /home/grad/remote_driver.c (d) Reboot the system after 5 minutes. (e) Display the list of processes currently being run by the user harvey. (f) Print 3 copies of a file named my_driver.c from a printer that has a name HPLaserJet4300. (g) Put the last 40 lines of the file driver_log.log into a new file final_fault.txt.

Answers

You have to add the integer

jettison folk 2007, Magnum opus, be moving, offers poisoned commentary on the film industry.

Answers

Answer:

I'm a little confused...

Explanation:

Can you reword this please?

Implement a class Clock whose getHours and getMinutes methods return the current time at your location. (Call java.time.LocalTime.now().toString() and extract the time from that string.) Also provide a getTime method that returns a string with the hours and minutes by calling the getHours and getMinutes methods. Provide a subclass WorldClock whose constructor accepts a time offset. For example, if you live in California, a new WorldClock(3) should show the time in New York, three time zones ahead. Which methods did you override

Answers

Answer:

Explanation:

The following code was written in Java. It uses the LocalTime import to detect the current time. Then it creates a getHours, getMinutes, and getTime method to correctly print out only the hours and minutes in a simple format. Then it does the same for the WorldClock subclass which takes in the time offset as an int parameter and adds that to the hours in your own timezone.

class Clock {

   public String getHours() {

       String hours = java.time.LocalTime.now().toString().substring(0,2);

       return hours;

   }

   public String getMinutes() {

       String min = java.time.LocalTime.now().toString().substring(3,5);

       return min;

   }

   public String getTime() {

       String time = getHours() + ":" + getMinutes();

       return time;

   }

}

class WorldClock extends Clock {

   int timeZone = 0;

   public WorldClock(int timeZone) {

       super();

       this.timeZone = timeZone;

   }

   public String getHours() {

       String hours = String.valueOf(Integer.parseInt(super.getHours()) + 3);

       return hours;

   }

   public String getTime() {

       String time = getHours() + ":" + super.getMinutes();

       return time;

   }

}

class Test {

   public static void main(final String[] args) {

       Clock myClock = new Clock();

       System.out.println("My Time: " + myClock.getTime());

       WorldClock worldClock = new WorldClock(3);

       System.out.println("My Time + 3: " + worldClock.getTime());

   }

}

If not cleared out, log files can eventually consume a large amount of data, sometimes filling a drive to its capacity. If the log files are on the same partition as the operating system, this could potentially bring down a Linux computer. What directories (or mount points) SHOULD be configured on its own partition to prevent this from happening?

Answers

Answer:

/var

Explanation:

The /var subdirectory contains files to which the system writes data during the course of its operation. Hence, since it serves as a system directory, it would prevent log files from consuming a large amount of data.

Answer:

/var

Explanation:

Hope this helps

Consider the following two data structures for storing several million words.
I. An array of words, not in any particular order
II. An array of words, sorted in alphabetical order
Which of the following statements most accurately describes the time needed for operations on these data structures?
A. Finding the first word in alphabetical order is faster in I than in II.
B. Inserting a word is faster in II than in I.
C. Finding a given word is faster in II than in I.
D. Finding the longest word is faster in II than in I.

Answers

Answer:

The correct answer is C.

Explanation:

Finding a given word requires the search operation. The search operation is faster in a sorted array compared to an unsorted array. In a sorted array the binary search method is used which runs on logarithmic time while in an unsorted array, there's no other way than linear search which takes O(n) time on the worst case where the required word is not in the array.

The statement which most accurately describes the time needed for operations on these data structures is: C. Finding a given word is faster in II than in I.

What is a binary search?

Binary search can be defined as an efficient algorithm that is designed and developed for searching an element (information) from a sorted list of data, especially by using the run-time complexity of Ο(log n)

Note: n is the total number of elements.

In Computer science, Binary search typically applies the principles of divide and conquer. Thus, to perform a binary search on an array, the array must first be sorted in an alphabetical or ascending order.

In conclusion, the statement which most accurately describes the time needed for operations on these data structures is that, finding a given word is faster in data structure II than in I.

Read more on data structure here: https://brainly.com/question/24268720

Provide an example of formula (with proper syntax) that would check whether cell B5 has a negative number, and return a value of "negative" if it was and "not negative" the value was zero or higher.

Answers

Answer:

The formula is:

=IF(B3<0,"negative","not negative")

Explanation:

The formula can be split as follows:

= --> This begins all excel formulas

IF --> This means that we are writing an IF condition formula

B3<0, ---> This is the condition being tested

"negative", ---> This is the result is the condition is true

"not negative" ---> This is the result is the condition is false

You are going to visit a national park, and have never been there before. You are using a map to try and make the distance travelled as short as possible. There are 5 intermediate towns, A, B, C, D, and E, you may gln your way to the park, and the distances between the various locations are given below.

Answers

Answer:

eggs fishing didn't ysjffj

At the beginning of the semester, we studied partially filled arrays. This is when the number of elements stored may be less than the maximum number of elements allowed. There are two different ways to keep track of partially filled arrays: 1) use a variable for the numberElements or 2) use a sentinel (terminating} value at the end of elements (remember c-strings?). In the code below, please fill in the details for reading the values into the an array that uses a sentinel value of -1. Complete the showArray function as well.
#include
using namespace std;
void showArray(int array[]);
// ToDo: Code showArray function with one array parameter
int main()
{
const int MAX_SIZE=16;
int array[MAX_SIZE]; // store positive values, using -1 to end the values.
cout <<"Enter up to " << MAX_SIZE-1 << " positive whole numbers, use -1 to stop\n";
//To do: Read the int values and save them in the static array variable.
// When the user enters -1 or the array has no more room, leave the loop..
//To do: store -1 at the end of elements in the array
// Show array function
showArray(array);
return 0;
}
// To do: print out for the array
void showArray(int array[])
{
}

Answers

Answer:

Complete the main as follows:

int num;

cin>>num;

int i = 0;

while(num!=-1 && i <16){

array[i] = num;

cin>>num;

i++;  }

array[i+1] = -1;

The showArray() as follows:

int i =0;

while(array[i]!=0){

   cout<<array[i]<<" ";

   i++;

}

Explanation:

See attachment for complete program where comments are used to explain difficult lines

What is the name for the part of a camera which can block light when it's closed, and let light in when it's open?


Pixel


Lens


Focus


Shutter

Answers

dnt listen to the link stuff

QUESTION 1
Which of the following is an example of firewall?
O a. Notepad
b. Bit Defender internet Security
O c. Open Office
O d. Adobe Reader

Answers

Answer is Bit defender Internet security
B

What should a valid website have?

Select one:
a. Cited sources, copyright, and a clear purpose
b. Cited sources, copyright, and a poor design
c. Cited sources, copyright, and colorful images
d. Cited sources, no copyright, and a broad purpose

Answers

Answer:

A. cites sources,copyright,and a clear purpose

6
Suppose the following formula is inputted into Excel:
=MROUND(1/4,100)
The output in the cell will be:
0
0.25
0.2500
1

Answers

Answer:

the output in the cell will be 0,2500

If you are insured with third party insurance, it will cover which costs?

A. business losses due to a denial-of-service attack
B. loss of data in your laptop because of a coffee spillover
C. ransomware attack on your laptop
D. costs related to lawsuits, and penalties due to a cyberattack

Answers

Answer:

c.

Explanation:

Answer: D (costs related to lawsuits, and penalties due to a cyberattack)

Explanation: Third Party insurance covers the liabilities of policyholders to their clients or customers. Regulatory: It covers the cost related to legal affairs, lawsuits and penalties due to a cyberattack.  

c program that calculates the summation of integers from one to N. Allow the user to input an integer, then pass that number to a function that will calculate the sum of all integers up to N. For example, if the user inputs the number 5, then the function will return the sum 1 2 3 4 5. Allow the user to enter multiple integers, calling the function for each number. Use a sentinel value or similar method to terminate user input.

Answers

Answer:

Answered below.

Explanation:

#include <studio.h>

#include<conio.h>

void main(){

int I = 0;

int sumOfNumbers = 0;

int number;

printf("Input an integer: ");

("%d", &sumOfNumbers);

//Loop over while adding numbers

while(I <= number){

sumOfNumbers = sumOfNumbers + I;

I++;

}

printf("\n Sum of N numbers is: %d", sumOfNumbers);

getch();

}

I need help solving this problem on Picoctf. The question is What happens if you have a small exponent? There is a twist though, we padded the plaintext so that (M ** e) is just barely larger than N. Let's decrypt this: ciphertext. The ciphertext is this. I tried using stack flow and the rsatool on GitHub but nothing seems to work. Do you guys have any idea of what I can do. I need to solve this problem asap

Answers

Explanation:

Explanation:

RSA encryption is performed by calculating C=M^e(mod n).

However, if n is much larger than e (as is the case here), and if the message is not too long (i.e. small M), then M^e(mod n) == M^e and therefore M can be found by calculating the e-th root of C.

Which of the following does cloud computing allow users to do? Check all of the boxes that apply.

access data from anywhere with an Internet connection

store pictures and music

store data

have a unique address for their computer

Answers

Answer:

a b c

Explanation:

there just right

Answer: a b c d

Explanation edge 2023

Other Questions
Please HELPWhat are the four types of journalism? Explain the characteristics of each and give an example for each type.Choose one of the types of journalism and explain the advantages and disadvantages of this type. What can this type of journalism do to compensate for disadvantages?There are many different types of news. Which type do you consider to be the most important? What type is the least important? Explain your answers.Which job in journalism do you think has the most pressure? Explain what aspect of the job you think is the most challenging and why.One of the unique features of the United States is that it has a free and independent press. How does this make the United States different from other nations that do not have freedom of the press? The chihuahua turned out to be this creature! What is it called? The cost of 12 oranges and 7 apples is 5.36. Eight oranges and 5 apples cost 3.68. Find the cost of each What is the percent chance the offspring will be tall plants with yellow fruit? (2nd question) 1. Select all the equations that have no solution.a. +6=5+b. -2(3)=-2+6c. 44=3+2d. 4(+1)=3(+2)e. 53=-3+4 how do you come up with questions when finishing a story for kids(first I came up with) it is only 4 of them I have to come up with 1. what do you think of the book 2.3.4. 2) The equation y = 18x represents the relationship between 2, the number of hours biked, andy, the distance traveled,Which ordered pairs represent a number of hours and the correspondingdistance in the given equation? Choose ALL that apply.(2,36)(3,54)(5,23)(23,5)(36,2)(54,3) What inference can be drawn about mrs.auld in this excerpt Find the length of side x in simplest radical form with a rational denominator. 5. Outside of the distractions, do you think the Rolling Stones were larger than the Beatles? Pleasegive details|Yes 100 points brainliest!!! plz answer all to the best of your ability no links they don't work for meAnswer the following questions using what you've learned from this unit. Write your responses in the space provided.1. Part I: The degree of a polynomial is the (greatest / least) of the degrees of its terms. (Circle the term that correctly completes this definition.) (1 point)Part II: In order to write a polynomial in descending order, you must write the terms with the exponents (decreasing / increasing) from left to right. (Circle the term that correctly completes this rule.) (1 point)Part III: For each polynomial, determine the degree and write the polynomial in descending order. (4 points: 2 points each)A. 4x2 12 + 11x4 B. 2x5 + 14 3x4 + 7x + 3x32. Use addition and subtraction to simplify the following polynomials.A. Add polynomials: (3 4x + 8x2) + (6 + 2x 5x2)Step 1: Rewrite the polynomials without the parentheses. (1 point)Step 2: Write the polynomial in descending order and use parentheses around like terms. (1 point)Step 3: Add the like terms identified in Step 2 to simplify the polynomial. (1 point)B. Subtract polynomials: (3x 5 7x2) (2 + 6x2 5x)Step 1: Rewrite the polynomials without the parentheses. Remember to multiply each term in the second parentheses by 1. Show your work. (2 points)Step 2: Write the polynomial in descending order and use parentheses around like terms. (1 point)Step 3: Add the like terms identified in Step 2 to simplify the polynomial. (1 point)3. Use the FOIL method to multiply binomials.Part I: When multiplying binomials, the FOIL method helps you to organize the multiplication of each term of the first binomial by each term of the second. Fill in each blank with the word used to show how the binomials' terms are multiplied. (2 points: 0.5 point each)F O I L Part II: Using the FOIL method, multiply the terms in the binomials below. Show your work in the blanks provided. Then, add any like terms and write the polynomial in standard form in the space provided. Show your work. (8 points: 2 points each)A. (3x + 7)(2x 5) B. (x2 + 2x)(5x2 3x)______ + _______ + _______ + _______ ______ + _______ + _______ + ___________________________________________________C. (5x + 4)(5x 4) D. (x2 7)(x2 4)______ + _______ + _______ + _______ ______ + _______ + _______ + _____________________________ ______________________4. Use the distributive property to multiply the trinomial by the binomial.Circle the first term in the trinomial, multiply it by each term in the binomial, and place each result in the blank spaces provided. Repeat this process for the second and third terms of the trinomial until all of the spaces are filled in. Finally, in the space provided beneath the blanks, simplify the expression by combining like terms and arranging the terms from highest to lowest order. Show your work. (4 points)(3x2 2x + 7)(x2 + 2x)______ + _______ + _______ + _______ + ______ + _______5. Use the vertical method to multiply two trinomials.Step 1: Multiply the top trinomial by the last term in the bottom trinomial. Place each result in the blank spaces provided. (2 points)Step 2: Multiply the top trinomial by the middle term in the bottom trinomial. Place each result in the blank spaces provided. (2 points)Step 3: Multiply the top trinomial by the first term in the bottom trinomial. Place each result in the blank spaces provided. (2 points)Step 4: Add the three partial products to find the final answer. Place the result at the bottom. (1 point)6. Sabrina is making an open box from a piece of cardboard that has a width of 12 inches and a length of 18 inches. She'll form the box by making cuts at the corners and folding up the sides. If she wants the box to have a volume of 224 in3, how long should she make the cuts?Part I: Each dimension (width, length, and height) of the finished box can be represented by a polynomial expression. If the height is x inches, what is the length in terms of x? (2 points)Height = xWidth = 12 2xLength =Part II: The formula for volume is v = l w h. Use the polynomial expressions from Part I to write an equation to represent the volume of the box. Simplify on the right side by multiplying the polynomials and writing the answer in descending order. Show your work.HINT: First multiply the binomials representing length and width. Next, multiply the resulting trinomial by the expression representing height. (3 points)v =Part III: The length of each cut at the corners is represented by x. To make a box, x must fall in a certain range of values. For example, x cannot be 15 because that would make the flap longer than the width of the box. Identify one reasonable value of x. Why did you choose that value? (2 points)Part IV: Use the polynomial equation you wrote in Part II to find the volume of the box for each value of x. Show your work. (5 points) 3. Which type(s) of cells have genetic material that is contained in a nucleus?A. bacterialB. plants onlyC. animals onlyD. both plant and animal cells Urgent!!!!!12. Arrange the stages of municipal council election by writing 1-7 in thecorrect place. (2 marks each)Stages in municipal electionsGirst (1) to last (17)People going to the polling station toCouncilors campaign for election.The number of votes for each divisionis counted.Voters vote by secret ballot.Candidates nominated by two mainpolitical parties. Simplify the expression 16 3\4 Every traveller is a tourist but every tourist is not a traveller justify Who doesn't have power in a monarchy probablity question: A bag contains 4 red marbles, 3 blue marbles and 7 green marbles. If three marbles are drawn out of the bag, what is the probability, to the nearest 10th of a percent, that all three marbles drawn will be green? Consider the following code segment, where twoD is a two-dimensional (2D) String array. The code segment is intended to display "JAVA".System.out.print(twoD[2][1]);System.out.print(twoD[3][2]);System.out.print(twoD[1][1]);Which of the following code segments properly declares and initializes twoD so that the code segment works as intended?A) String[][] twoD = {{"V", "AV", "J"}, {"JA", "VA", "A"}, {"JA", "J", "JAV"}, {"AV", "V", "A"}};B) String[][] twoD = {{"VA", "J", "A", "V"}, {"J", "A", "V", "A"}, {"AV", "A", "JA", "V"}};C) String[][] twoD = {{"VA", "J", "V", "JA"}, {"J", "JA", "A", "VA"}, {"J", "VA", "A", "V"}};D) String[][] twoD = {{"A", "VA", "J", "V"}, {"VA", "A", "JA", "V"}, {"VA", "J", "A", "V"}};E) String[][] twoD = {{"A", "V"}, {"VA", "J"}, {"J", "A"}, {"A", "AV"}}; Please help here the question Rosalina just started a new job. She has $500 in her bank account. Every week, she deposits $40 into her bank account. A) Write an expression to represent how much Rosalina has in her account at any given time using x to represent the number of weeks.I ALREADY SOLVED A BUT I NEED HELP WITH B!!B) Rosalina wants to save $700 for the new smart tv write and equation to determine how many weeks (x) it will take for rosalina to have enough money to purchase her new tvHELP ME PLEASE WITH B I ALREADY SOLVED ATHANK YOU!! ___proposed the open door policy for china