Why do some computer systems not allow users to activate macros?
O Amacro can be used by only one person.
0 You must close all other programs to run a macro.
O The Word software does not work well with macros.
O Macros can carry viruses that can harm a computer.

Answers

Answer 1
Macros can carry viruses that can harm a computer.

Related Questions

Write a recursive function called DigitCount() that takes a positive integer as a parameter and returns the number of digits in the integer. Hint: The number of digits increases by 1 whenever the input number is divided by 10. Ex: If the input is:

Answers

Recursive functions are functions that are called from within itself

The recursive function DigitCount() in Python where comments are used to explain each line is as follows:

#This defines the function

def countDigits(n):

   #If the integer is less than 10

   if n< 10:

       #Then the integer has 1 digit

       return 1

   #Otherwise,  

   else:

       #Count the number of integers

       return 1 + countDigits(n / 10)

At the end of the function, the count of integers is returned to the main function

Read more about similar programs at:

https://brainly.com/question/20397067

What is the difference between (IF instructions & WHILE instructions )
0
를 들
T
!

Answers

Answer:

While statements determine whether a statement is true or false. If what’s stated is true, then the program runs the statement and returns to the first step. If what’s stated is false, the program exits the while and goes to the next statement. An added step to while statements is turning them into continuous loops. If you don’t change the value so that the condition is never false, the while statement becomes an infinite loop.

If statements are the simplest form of conditional statements, statements that allow us to check conditions and change behavior/output accordingly. The part of the statement following the if is called the condition. If the condition is true, the instruction in the statement runs. If the condition is not true, it does not. The if statements are also compound statements. They have a header (if x) followed by an indented statement (an instruction to be followed is x is true). There is no limit to the number of these indented statements, but there must be at least one.

Today we see the advantages as well as disadvantages of a wired network. In comparison what technology would you recommend Wired Ethernet or a Wireless network technology for home and what would you recommend for business? Explain your answer

Answers

Answer:

wired network

Explanation:

Wired networks are generally much faster than wireless networks. ... This is mainly because a separate cable is used to connect each device to the network with each cable transmitting data at the same speed. A wired network is also faster since it never is weighed down by unexpected or unnecessary traffic.

hope that helps your welcome

30th Nov 2020. Difference between Data and Information

Answers

Answer:

Data is a collection of unstructured or unorganized facts and figures.

Information is a collection of processed data.

Hope it helps...............

The capability of moving a completed programming solution easily from one type of computer to another is known as ________. Group of answer choices

Answers

Answer: Portability

Explanation: I hope it helps you!

what are the main barriers to the adoption of an industry standard for internet system

Answers

Answer:

Industry experts say that although many companies find the potential of the Internet of Things very attractive, they either lack a clear value proposition for end-users or lack interoperability.

You modified the GreenvilleRevenue program to include a number of methods. Now modify every data entry statement to use a TryParse() method to ensure that each piece of data is the correct type. Any invalid user entries should generate an appropriate message, and the user should be required to reenter the data.
using System;
using static System.Console;
class GreenvilleRevenue
{
static void Main(string[] args)
{
const int fee = 25;
int lastYearsContestants;
int thisYearsContestants;
const int LOW = 0;
const int HIGH = 30;
int other = 0;
int dancer = 0;
int musician = 0;
int singer = 0;
WriteLine("**********************************");
WriteLine("* The stars shine in Greenville. *");
WriteLine("**********************************");
WriteLine("");
lastYearsContestants = getContestantsNum(message, LOW, HIGH);
string[] contestant = new string[thisYearsContestants];
string[] talent = new string[thisYearsContestants];
getContestantsInfo(contestant, talent);
for (int x = 0; x < talent.Length; ++x)
{
if (talent[x] == "O")
{
++other;
}
else if (talent[x] == "S")
{
++singer;
}
else if (talent[x] == "D")
{
++dancer;
}
else if (talent[x] == "M")
{
++musician;
}
}
Clear();
WriteLine("Currently signed up, there are..");
WriteLine("{0} dancers", dancer);
WriteLine("{0} singers", singer);
WriteLine("{0} musicians", musician);
WriteLine("{0} everything else!", other);
contestantByTalent(contestant, talent);
Clear();
contestantInfo(thisYearsContestants, lastYearsContestants, fee);
}
static int getContestantsNum(string message, int LOW, int HIGH)
{
WriteLine("Please enter the number of contestants for last year.>>");
string input = ReadLine();
int contestantsNum = Convert.ToInt32(input);
while (contestantsNum < LOW || contestantsNum > HIGH)
{
WriteLine("Valid numbers are 0 through 30, Please try again.>>");
contestantsNum = Convert.ToInt32(ReadLine());
}
return contestantsNum;
WriteLine("Please enter the number of contestants for this year.>>");
string input = ReadLine();
int contestantsNum = Convert.ToInt32(input);
while (contestantsNum < LOW || contestantsNum > HIGH)
{
WriteLine("Valid numbers are 0 through 30, Please try again.>>");
contestantsNum = Convert.ToInt32(ReadLine());
}
return contestantsNum;
}
static string getTalent(int contestantsNum)
{
bool correct = false;
string talentType = "";
while (!correct)
{
WriteLine("What is contestant " + contestantsNum + "'s skill? Please enter 'S' for Singer, 'D' for Dancer, 'M' for " +
"Musician, 'O' for Other.>>");
talentType = ReadLine().ToUpper();
if (talentType == "S" || talentType == "D" || talentType == "M" || talentType == "O")
{
correct = true;
}
else
{
WriteLine("Please enter a valid response.>>");
}
}
return talentType;
}
static void contestantByTalent(string[] contestant, string[] talent)
{
WriteLine ("To see a list of all contestants with a specific talent, Please enter a talent code.talent codes are(S)inger, (D)ancer, (M)usician, (O)ther; altenatively, you may type (E) to exit.>>");
string entry = ReadLine().ToUpper();
while (entry != "E")
{
if (entry != "S" && entry != "D" && entry != "M" && entry != "O")
{
WriteLine("That wasn't a valid talent code. Valid talent codes are (S)inger, (D)ancer, (M)usician, (O)ther; altenatively, you may type (E) to exit.>>");
entry = ReadLine().ToUpper();
if (entry == "E")
break;
}
for (int x = 0; x < talent.Length; ++x)
{
if (entry == talent[x])
WriteLine("Contestant " + contestant[x] + " talent " + talent[x]);
}
WriteLine("To see a list of all contestants with a specific talent, Please enter a talent code. talent codes are (S)inger, (D)ancer, (M)usician, (O)ther; altenatively, you may type (E) to exit.>>");
entry = ReadLine().ToUpper();
}
}
static void getContestantsInfo(string[] contestant, string[] talent)
{
for (int x = 0; x < contestant.Length; ++x)
{
WriteLine("What is the name for Contestant " + (x + 1) + "?");
contestant[x] = ReadLine();
talent[x] = getTalent(x + 1);
}
}
static void contestantInfo (int thisYearsContestants, int lastYearsContestants, int fee)
{
if (thisYearsContestants > lastYearsContestants * 2)
{
WriteLine("The competition is more than twice as big this year!");
WriteLine("The expected revenue for this year's competition is {0:C}", (thisYearsContestants * fee));
}
else
if (thisYearsContestants > lastYearsContestants && thisYearsContestants <= (lastYearsContestants * 2))
{
WriteLine("The competition is bigger than ever!");
WriteLine("The expected revenue for this year's competition is {0:C}", (thisYearsContestants * fee));
}
else
if (thisYearsContestants < lastYearsContestants)
{
WriteLine("A tighter race this year! Come out and cast your vote!");
WriteLine("The expected revenue for this year's competition is {0:C}.", (thisYearsContestants * fee));
}
}
}

Answers

Doin it for points sorry

What is the best data type for traveling day?

Answers

here if its wrong sorry

Viewing digital content

Answers

Digital Content Creation Platforms offer content subscription or pay-as-you-go services for organizations. ... By offering access to this media, Digital Content Creation platforms make it so that organizations can share media of social interest while still complying with copyright laws.

camera mount that is worn over the shoulders of a camera operator. What is it called?

Answers

It is called a camera stabilizer.
I hope this helped :)

What are 3 things message timing must include

Answers

Answer:

1)Message Timing. Another factor that affects how well a message is received and understood is timing. ...

2)Access Method. Access method determines when someone is able to send a message. ...

3)Flow Control. Timing also affects how much information can be sent and the speed that it can be delivered.

Tamanika got a raise in her hourly pay, from $15.90 to $17.65. Find the percent increase

Answers

15.90/17.65 = x/100
1590 = 17.65x
x = 90.08%
So this means the increase would be 9.92%

Five jobs arrive nearly simultaneously for processing and their estimated CPU cycles are, respectively: Job A = 2 ms, Job B = 12 ms, Job C = 15 ms, Job D = 7 ms, and Job E = 3 ms.

Using FCFS, in what order would they be processed? What is the total time required to process all five jobs? What is the average turnaround time for each of these five jobs?

Answers

This is an example with solution:

Five jobs arrive nearly simultaneously for processing and their estimated CPU cycles are, respectively: Job A = 12, Job B = 2, Job C = 15, Job D = 7, and Job E = 3 ms.

a. Using FCFS, and assuming the difference in arrival time is negligible, in what order would they be processed? What is the total time required to process all five jobs? What is the average turnaround time for all five jobs?

Answer: The order of processing for the given jobs = A->B->C->D->E.

Total time needed to process all the jobs = 12+2+15+7+3 = 39 ms.

Turn around time for job A = 12 ms.

Turn around time for job B = 15 ms.

Turn around time for job C = 30 ms.

Turn around time for job D = 37 ms.

Turn around time for job E = 40 ms.

Answer : Therefore, the average turnaround time = (12+15+30+37+40)/5 = 26.8 ms.

Order of processing is A, B, C, D, E and Total time to process and Average turnaround time is 39 ms and 24 ms

Turnover time and order of processing:

Order of processing = A, B, C, D, E

Total time to process all five jobs = Job A + Job B + Job C + Job D + Job E

Total time to process all five jobs = 2 + 12 + 15 + 7 + 3

Total time to process all five jobs = 39 ms

Average turnaround time = [(2-0) + (2+12-0) + (2+12+15-0) + (2+12+15+7-0) + (2+12+15+7+3-0)] / 5

Average turnaround time = (2+14+29+36+39) / 5

Average turnaround time = 24 ms

Find out more information about 'Turnaround time'.

https://brainly.com/question/5768680?referrer=searchResults

What is primary difference between the header section of a document and the body

Answers

Answer:

A HTML file has headers and a "body" (payload) — just like a HTTP request. The <body> encapsulates the contents of the document, while the <head> part contains meta elements, i.e., information about the contents. This is (typically) title, encoding, author, styling etc.

Explanation:

CAN I GET BRAINLIEST

Please describe how you can use the login page to get the server run two SQL statements. Try the attack to delete a record from the database, and describe your observation.

Answers

The only sure way to prevent SQL Injection attacks is input validation and parametrized queries including prepared statements. The application code should never use the input directly. ... Database errors can be used with SQL Injection to gain information about your database.

Which statement best explains how the main idea relates to taking notes?

The main idea is always included in effective notes.
The main idea is always easy to identify.
The main idea is rarely used as a title for notes.
The main idea is rarely identified by listening or reading

Answers

Answer:

The main idea is always included in effective notes.

Answer:

a

Explanation:

I did the quiz

computer Graphics:
B. Arbitrary reference point:
1) Apply a rotation by 60° on the Pivot Point (-10, 10) and display it.
2) Apply a rotation by 270° on the Pivot Point (10, 0) and then translate it by tx
= -20 and ty = 5. Display the final result.

Answers

Thanks hope it helps

Problem: For multi access control, there are two approaches, those based on channel partitioning, and those based on random access. In packet switching, there are two rather similar approaches as well, namely, circuit switching and package switching. Discuss the similarities and differences in these two problem domains and the corresponding approaches g

Answers

The similarity between the two systems is the ability to connect many different communication devices and transfer data between a sender and a receiver. The main difference is the need for a connection for both to work.

We can arrive at this answer because:

Circuit and package quotation is very important for the connections of different communication devices.Furthermore, these two systems are used efficiently when a data transfer is required.However, even being used for the same purposes, they have many differences between them.The biggest difference is the need for a connection, as package switching is done without the need for a connection, while circuit switching needs a connection to act.

In addition, circuit switching is more widely used because of its ability to transfer data from one point to another via message transfer, while package switching is used when circuit switching is not available as it does the sending data more slowly across one drive.

More information:

https://brainly.com/question/7227504

You work in an office that uses Linux and Windows servers. The network uses the IP protocol. You are sitting at a Windows workstation. An application you are using is unable to connect to a Windows server named FileSrv2. Which of the following commands would work BEST to test network connectivity between your workstation and the server?

a. arp
b. dig
c. tracert
d. nslookup
e. ping

Answers

Answer:

ping

Explanation:

its ping. im a computer science nerd :')

How does a computer work?

Answers

Answer:

A computer is a Device that can run multiple applications at a time and access the internet where you can find online stores and more also used to make video calls and more.

A computer system works by combining input, storage space, processing, and output. ... It is known as Computer Memory that keeps the data into it. A computer uses a hard drive for storing files and documents. It uses two types of memory, i.e., internal memory and external memory.

3 3) Why computer is called non-inteligent , IN Dull machine?

Answers

Answer:

Computers are dull: The CPU is the Central Processing Unit or the brains of the computer. The CPU knows what to do with machine language instructions. It doesn't understand them; it just knows what to do with them.

Explanation:

Hope I could help.

                                 please mark as brainliest

Just a quick question, how do you set something == to char and int in an if statement (java)
Write a method checkCharacter() which has 2 parameters: A String, and a specified index (an int). Method checkCharacter() checks the character at the specified index of the String parameter, and returns a String based on the type of character at that location indicating if the character is a letter, digit, whitespace, or unknown character.


Ex: The method calls below with the given arguments will return the following Strings:


checkCharacter("happy birthday", 2) returns "Character 'p' is a letter"

checkCharacter("happy birthday", 5) returns "Character ' ' is a white space"

checkCharacter("happy birthday 2 you", 15) returns "Character '2' is a digit"

checkCharacter("happy birthday!", 14) returns "Character '!' is unknown"


Your program must define the method:

public String checkCharacter(String word, int index)



this is what i got to but im stuck on how to find out if its a char or int


public class TollCalculation {


public double calcToll(int hour, boolean isMorning, boolean isWeekend) {

Scanner scnr = new Scanner(System.in);

int timeHour; // Time of travel hour (24 hour format)

int timeMinute; // Time of travel minute

int inputColon; // Used to read time format

String userInput; // User specified time

double tollAmount;

}


public static void main(String[] args) {

TollCalculation tollObj = new TollCalculation();


// Test the three samples from the specification.

System.out.println(tollObj.calcToll(7, true, false));

System.out.println(tollObj.calcToll(1, false, false));

System.out.println(tollObj.calcToll(3, true, true));

}

}

Answers

This is the requested code in java.

public class CharTest {

   public static String checkCharacter(String text, int index) {

       if (0 <= index && index <= text.length()) {

           char ch = text.charAt(index);

           if (Character.isLetter(ch)) {

               return ch + " is a letter";

           } else if (Character.isDigit(ch)) {

               return ch + " is a digit";

           } else if (Character.isWhitespace(ch)) {

               return ch + " is a whitespace character";

           } else {

               return ch + " is an unknown type of character";

           }

       } else {

           return "index " + index.toString() + " is out of range";

       } // end if

   } // end function checkChar()

   public static void main(String[] args) {

       // Test the three samples from the specification.

       System.out.println(checkCharacter("happy birthday", 2));

       System.out.println(checkCharacter("happy birthday", 5));

       System.out.println(checkCharacter("happy birthday 2 you", 15));

   } // end function main()

} // end class CharTest

The function checkcharacter(text, index) returns a string value describing the kind of character found at the position in text specified by index; whether it was a letter, digit, whitespace, or an unknown kind of character.

How it does that is to make use of respective functions defined within the Character class in java. That is

isLetter(char) returns a bool specifying if the char parameter is a letter.isDigit(char) returns a bool specifying if the char parameter is a digit.isWhitespace(char) returns a bool specifying if the char parameter is a whitespace character.

It calls these functions in an if statement. These else part of the if statement is then executed if the character is neither a letter, digit, or whitespace.

Finally, the function main() calls checkCharacter() three times to test the function and return the results to the console.

Another example of a java program on characters is found in the link below

https://brainly.com/question/15061607

how can computers be a threat to public safety??

help asap marking brainiest ​

Answers

Loss or theft of your computer, smartphone or tablet. Malware, including spyware, on public computers. Theft of personal information from, or access to browsing history on public computers.

Turtle graphics windows do not automatically expand in size. What do you suppose happens when a Turtle object attempts to move beyond a window boundary

Answers

When a turtle object attempts to move beyond a window boundary, the turtle object stops because it cannot move outside the window boundary.

The turtle graphics window is simply a graphics window that is used as a playground when drawing turtles.

A turtle object is always in the turtle graphics window.

This in other words mean that, the turtle object cannot exceed the boundaries of the turtle graphics window

An attempt to move the turtle object outside its window will stop the turtle object;

This is so because the turtle object is always in the turtle graphic window, and it cannot move beyond it.

Read more about turtle graphics window at:

https://brainly.com/question/3070883

How does tracking changes relate to sharing a workbook in Excel?

Answers

Answer:When you highlight changes as you work, Excel outlines any revisions (such as changes, insertions, and deletions) with a highlighting color. On the Review tab, click Track Changes, and then click Highlight Changes. Select the Track changes while editing. This also shares your workbook check box.

Explanation:

A workbook in excel is a file that contains one or more worksheets to assist you with data organization.

What is a workbook?

A workbook in excel is a file that contains one or more worksheets to assist you with data organization. A blank workbook or a template can be used to build a new workbook.

The Advanced tab of the Share Workbook dialogue box gives further choices for changing how Excel records change. For example, you may choose the "Automatically Every" radio option and enter a value in the "Minutes" text box. If you enter 10, Excel will store changes made by users every 10 minutes.

When you highlight changes while you work, Excel highlights any modifications (such as updates, insertions, and deletions) with a highlighting colour. Track Changes and Highlight Changes may be found on the Review tab. Select the Track changes while editing.

Learn more about Workbook:

https://brainly.com/question/10321509

#SPJ2

Fill in the blank: _____ data are statistical and numerical facts about a project.
Subjective



Quantitative



Mathematical



Qualitative

Answers

Quantitative data are statistical and numerical facts about a project that can be counted, measured or expressed using numbers.

Quantitative data is statistical and its nature is usually structured, it uses numbers and values that are most suitable for the analysis of a project.

The collection of quantitative data offers the possibility of statistical analysis.

This type of data allows you to easily measure and quantify facts in an organized and accessible way within relational databases.

Therefore, we can conclude that quantitative data is data that comes from numerical information, quantities, percentages, proportions and statistics.

Learn more about quantitative data here: https://brainly.com/question/96076

Should people who are able to break a hashing algorithm be allowed to post their findings on the Internet?

Answers

Answer:

Cyber security is a very important aspect of digital world. Without cyber security our sensitive data is at risk. Its very important that companies keep our system safe by spotting any security vunerabilities. SO ACORDING TO ME I DO NOT THINK THEY SHOULD BE ABLE TO POST THEIR FINDINGS ON THE INTERNET As it may contain viruses

.tag is used to draw a horizontal line

Answers

Answer:

<hr>  tag.

Explanation:

<hr> tag makes a line along the webpage :)

Question # 1 Multiple Select Which features are important when you plan a program? Select 4 options. Knowing what information is needed to find the result. Knowing what information is needed to find the result. Knowing what the user needs the program to accomplish. Knowing what the user needs the program to accomplish. Knowing how many lines of code you are allowed to use. Knowing how many lines of code you are allowed to use. Knowing what you want the program to do. Knowing what you want the program to do. Knowing how to find the result needed. Knowing how to find the result needed.

Answers

Answer:

c

Explanation:

Answer:

Knowing what the user needs the program to accomplish.Knowing how to find the result needed.Knowing what information is needed to find the result.Knowing what you want the program to do

Explanation:

:D

Natural language generation is focused on?

Answers

While natural language understanding focuses on computer reading comprehension, natural language generation enables computers to write. NLG is the process of producing a human language text response based on some data input. This text can also be converted into a speech format through text-to-speech services.

- BRAINLIEST answerer

Other Questions
The table below gives the atomic mass and relative abundance values for the three isotopes of element M.Relative abundance (%) Atomic mass (amu)78.99 23.985010.00 24.985811.01 25.9826What is the average atomic mass (in amu) of element M?2.865.3624.3024.98 In the modern system of biological classification ______ and ______ are used for the scientific name of organisms. Shorten this and put it in your own wordsAround the year 133 BC, Rome was set up as a democracy. Later the Roman people were sovereign. Even the system of voting was weighted to give more influence to the votes of the wealthy. By 14 AD, when the first emperor Augustus died, popular elections had all but disappeared. This was nothing short of a revolution, brought about through a century of constant civil strife, and sometimes open warfare. Many Romans themselves put the key turning point in 133 BC. The course of events is clear enough.In the process, he deposed from office another tribune who opposed the distribution and argued that his reforms should be funded from the money that came from the new Roman imperial province of Asia. Gracchus's land bill was passed. Gracchus's motivation is much less clear. Whatever his motives were, his career crystallised many of the main issues that were to underlie the revolutionary politics of the next hundred years.The consequences of Rome's growing empire were crucial. Tiberius's decision to use the revenues of Asia for his land distribution was a provocative claim - that the poor as well as the rich should enjoy the fruits of Rome's conquests. But Tiberius's desire to stand for a second tribunate also raised questions of personal political dominance. This became an increasingly urgent issue as leading men in the first century BC, such as Julius Caesar, were sometimes given vast power to deal with the military threats facing Rome from overseas - and then proved unwilling to lay down that power when they returned to civilian life. The events of 133 BC were followed by a series of intensifying crises. At the end of the century Gaius Marius, a stunningly successful soldier, defeated enemies in Africa, Gaul and finally in Italy, when Rome's allies in Italy rebelled against her.He held the highest office of state, the consulship, no fewer than seven times, an unprecedented level of long-term dominance of the political process. Marius then came into violent conflict with Lucius Cornelius Sulla, another Roman warlord, who after victories in the east actually marched on Rome in 82 BC and established himself 'dictator'.This had been an ancient Roman office designed to give a leading politician short terms powers in an emergency.Unlike Julius Caesar, however, who was to become dictator 40 years later, Sulla retired from the office and died in his bed.The middle years of the first century BC were marked by violence in the city, and fighting between gangs supporting rival politicians and political programmes.The two protagonists were Gnaeus Pompeius Magnus ('Pompey the Great', as he was called, after Alexander the Great) and Julius Caesar.Caesar promoted radical policies in the spirit of Tiberius Gracchus; Pompey had the support of the traditionalists.Historians in both the ancient and modern world have devoted enormous energy to tracking the precise stages by which these two men came head-to-head in civil war. But the fact is that, given the power each had accrued and their entrenched opposition, war between them was almost inevitable. Not much 'liberty' was to follow. Instead there was another decade of civil war as Caesar's supporters first of all battled it out with his assassins, and when they had been finished off, fought among themselves. people magazines newest ""sexiest man alive"" appeared in what marvel studios film? A boat can travel 16 Kilometers per hour in still water. The boat travels 15 kilometers down a river and then 15 kilometers up stream. The entire trip takes 5.5 hours. Which equation describes the current, c, of the river?a) [tex] \frac{16}{15 + c} + \frac{16}{15 - c} = 5.5 [/tex]b)[tex] \frac{5.5}{16 + c} + \frac{5.5}{16 - c} = 15 [/tex]c)[tex] \frac{5.5}{15 + c} + \frac{5.5}{15 - c} = 16 [/tex]d)[tex] \frac{15}{16 + c} + \frac{15}{16 - c} = 5.5[/tex] In order to send and receive packets in the Internet, hosts require an IP address. What are the 2 ways a host can obtain an IP address Will give brainliest! Louis Zamperinis family uprooted and moved from where to where? Why? Chlorophyll appears green because it? what should be included in your financial plan to protect assets Ciliated ependymal cells: A) help form the blood-brain barrier. B) circulate cerebrospinal fluid. C) form myelin in the brain and spinal cord. D) serve as wandering phagocytes during brain injury. Karens doctor suggests that she consume fewer saturated fats. What food should Karen cut back on in her diet to MOST accurately follow the doctors recommendations?A. olive oilB. nutsC. fishD. steak Kendle wants to play several games of laser tag. She has $35, 5 to play g games. Each game of laser tag costs $5 surrealism was based on explorations into the __________. if something traveled 36 feet in 22 frames in a 60 fps video, how fast would that be in mph? Tax preparation software can help prepare and file your taxes by _________. making an appointment with a tax expert for you posing questions to collect necessary information calculating your taxes based on your savings account balance providing you with blank tax forms you can fill out two rays that have a common endpoint and form a line Which statements are true?Choose THREE answers that are correct.a. Senators and members of the House of Representatives must agree to serve at least two terms in office.b. Senators and members of the House of Representatives must live in the state they represent.c. Senators have to have been a U.S. citizen for nine years prior to being elected; members of the House of Representatives must be American citizens for seven years before being elected.d. Senators must be at least 30 years old; members of the House of Representatives must be at least 25. e) The religion founded by Mohammad is called What is the relationship between DNA, chromosomes, andthe nucleus?