Giving Branliest IFFF CORRECT

Which feature displays certain data in a database?

Chart

Filter

Seek

Sort

Answers

Answer 1

Answer:

filter

Explanation:

when you use filter, it only fetches data that meets the filter criteria you applied

Answer 2

Answer:

(2)/B - Filter

Explanation:


Related Questions

Gary frequently types his class assignment. His ring automatically types the letter O. What is Gary using when he types?

A.Keyboard shortcut
B.Home row
C.Muscle memory
D.Windows logo

Answers

the answer would be C
The answer is C. Muscle memory


Hope this answers your question

Write a program that asks the user to enter in a username and then examines that username to make sure it complies with the rules above. Here's a sample running of the program - note that you want to keep prompting the user until they supply you with a valid username:

Answers

user_in = input ("Please enter your username: " )

if user_in in "0123456789":

print ("Username cannot contain numbers")

elif user_in in "?":

print ("Username cannot continue special character")

else:

print (" Welcome to your ghetto, {0}! ".format(user_in))

Bharath has made a table of content for his document in Open Office, in which he wants to make few changes, but he is unable to make the changes. Give reason. Explain how he can make the necessary changes

Answers

Answer:

H cannot update it because it is probably protected.

If you cannot click in the table of contents, it is probably because it is protected. To disable this protection, choose Tools > Options > OpenOffice.org Writer > Formatting Aids, and then select Enable in the Cursor in protected areas section. If you wish to edit the table of contents without enabling the cursor, you can access it from the Navigator.

Explanation:

. To update a table of contents when changes are made to the document:

Right-click anywhere in the TOC.

From the pop-up menu, choose Update Index/Table. Writer updates the table of contents to reflect the changes in the document.

You can also update the index from the Navigator by right-clicking on Indexes > Table of Contents1 and choosing Index > Update from the pop-up menu.

What is resource Management in Wireless Communication ? Explain its Advantages?

Answers

Answer:

Resource management is the system level transmission cellular networks and wireless communication.

Explanation:

Wireless communication is the process to continue to the address for faster response time,to the resource management.

Transmission is the provided by that more utilization and wireless resources available,and to discovered data.

Wireless communication system to demand the larger bandwidth and transmission using development to the system.

Wireless communication resources management the larger bandwidth and reliable transmission consumed all the system layer.

Resource management techniques tool are used in a preliminary concepts or mathematical tools,and average limited power battery.

Resource management are they necessary mathematical and fundamental tools are used in wireless communication.

Wireless communication in the provide that wireless industry in a wireless communication.

How teachers apply stenhouse theory

Answers

Answer:

In curriculum, a vision of knowledge, the role of the educator and a concept of the process of education are all present. In this sense, Stenhouse suggests that the role of teachers and professors is fundamental in the elaboration and implementation of curriculum.

What will be displayed after the following code executes? mystr = 'yes' yourstr = 'no' mystr += yourstr * 2 print(mystr)

Answers

Answer:

yesnono

Explanation:

mystr = 'yes'

yourstr = 'no'

mystr += yourstr * 2

mystr = "yes"yourstr * 2 = "no"+"no"yes + no+noyesnono

Tuesday
write the
correct
answer
Text can be celected using
2 A mouse
device of
is
ch
3 Scrolls bars are
buttons which assist
upwards downwards
sideways to
skole
Text can be selectedusing

Answers

Answer:

number 2 is the awnser(the mouse)

On the Excel Ribbon, click the Data tab in the Sort & Filter Group, and then click the Sort button to conduct a _____ sort. a. table range b. pivot table c. auto sum d. multiple column

Answers

Answer:

a. Table range

Explanation:

Excel is used for maintaining the data of the company. It contains various formulas, features like pivot table, macros, sort & filter group so the firm could able to present its data in an effective and efficient way

Here the sort button is used to ascending or descending the table based on the name, values, etc

So in the given situation, the first option is correct

Answer:

Datasheet, aecending, home

Explanation:

Diana is working on an Access file. She added a rectangle to the title of her form and would like to change the color of the rectangle border. To complete this task, Diana goes into Design view, clicks on Property Sheet, and then clicks on the Other tab. She is unable to find the Border Color option to make the change. What error did Diana make? A.She should have used Format view instead of Design view.
B.She should have clicked Controls before clicking Property Sheet.
C.She should have clicked on the Format tab after clicking Property Sheet.
D.She should have looked for the Border Width option instead of the Border Color option.

Answers

Answer:

A

Explanation:

she should have used format view instead of design view

b. Does “refactoring” mean that you modify the entire design iteratively? If not, what does it mean?

Answers

Explanation:

Refactoring consists of improving the internal structure of an existing program's source code, while preserving its external behavior. 

Develop a simple game that teaches kindergartners how to add single-digit numbers. Your function game() will take an integer n as input and then ask n single-digit addition questions. The numbers to be added should be chosen randomly from the range [0, 9] (i.e.,0 to 9 inclusive). The user will enter the answer when prompted. Your function should print 'Correct' for correct answers and 'Incorrect' for incorrect answers. After n questions, your function should print the number of correct answers.

Answers

Answer:

2 correct answer out of 3

identification and authentication in local and distributed systems

Answers

Answer:

This local distributed systems identification and authentication computer system networks describe centrally support facilities.

Explanation:

Identification is the process of identify employ, student and others is associated  with a other entity, identify is associated by always that a person,id number and they personal id.

Identification number is assigned to the employee and students an administration system identification entities such as departments, roles, computer base service.

Identification is the number to perform regular faculty staff as defined in the register.

Authentication is the secure identification system of users,all users computer system and network must develop implement control policies.

Authentication responsible for the determining method to use among that available for a particular system,provide by standard organization then using the authentication method system.

Authentication policy apply to the transactions routing school and office area transmission by administrative offices, transaction is crucial to conduct of university business.  

Explain how Deep Packet Inspection works (DPI). How is this technology beneficial to Perimeter Security? Lastly, describe a scenario where the use of DPI may be considered a privacy concern.

Answers

Answer:

Answered below

Explanation:

Deep packet inspection is a kind of data processing that thoroughly inspects data sent over a computer network and acts on it by rerouting, logging or blocking it. Uses of DPI include;

To ensure that data is in the correct format, internet censorship, to check for malicious code, and also eavesdropping.

DPI uses port mirroring and optical splitter to acquire packets for inspection. It combines the functionality of an intrusion detection system and intrusion prevention system with a traditional stateful firewall.

DPI is therefore helpful in perimeter security by keeping unauthorized users out and at the same time protecting authorized users from attack. Privacy concerns have been raised over the inspection of content layers of internet protocols such as in the case of censorship and government regulations and control.

_________ enables customers to combine basic computing services,such as number crunching and data storage,to build highly adaptable computer systems.A) IaaSB) EAP peerC) CPD) SaaS

Answers

Answer:

The correct answer to the question is option A (IaaS)

Explanation:

IaaS (Infrastructure as a Service) can be used for data storage, backup, recovery, web hosting, and various other uses as it is cost-effective, and it also has secured data centers. It is a service delivery method by a provider for cloud computing as it enables customers to be offered the service the possibility to combine basic computing services to build and direct access to safe servers where networking can also be done. These services rendered by the providers allow users to install operating systems thereby making it possible to build highly adaptable computer systems.

SaaS (Software as a Service): Here, the service provider bears the responsibility of how the app will work as what the users do is to access the applications from running on cloud infrastructure without having to install the application on the computer.

The cloud provider (CP) as the name suggests is anybody or group of persons that provide services for operations within the cloud.

Kith Smallest Number Real World Example

Hello!

What are five reasons why one would need to find the kth smallest number of an array? Also known as the Selection Problem.

I'm looking for 5 real world examples.

Will definitely give brainliest!


The Selection Problem is a problem where we must find the kth order statistic of a given array. As in, we must find the largest kth number. For example, if our array is [1, 3, 4, 5, 9], and k = 3, we would want to find the 3rd largest number, so our algorithm should output the number 4.

Answers

Answer:

A new coffee shop is being built. Its location is the reflection of the arcade's coordinates across

the y-axis. Which procedure will find the correct distance between the arcade and the new coffee shop

Agile Software Development is based on Select one: a. Iterative Development b. Both Incremental and Iterative Development c. Incremental Development d. Linear Development

Answers

Answer:

b. Both incremental and iterative development.

Explanation:

Agile software development is based on both incremental and iterative development. It is an iterative method to software delivery in which at the start of a project, software are built incrementally rather than completing and delivering them at once as they near completion.

Incremental development means that various components of the system are developed at different rates and are joined together upon confirmation of completion, while Iterative development means that the team intends to check again components that makes the system with a view to revising and improving on them for optimal performance.

Agile as an approach to software development lay emphasis on incremental delivery(developing system parts at different time), team work, continuous planning and learning, hence encourages rapid and flexible response to change.

Write a method named coinFlip that accepts as its parameter a string holding a file name, opens that file and reads its contents as a sequence of whitespace-separated tokens. Assume that the input file data represents results of sets of coin flips. A coin flip is either the letter H or T, or the word Heads or Tails, in either upper or lower case, separated by at least one space. You should read the sequence of coin flips and output to the console the number of heads and the percentage of heads in that line, rounded to the nearest whole number. If this percentage is 50% or greater, you should print a "You win!" message; otherwise, print "You lose!". For example, consider the following input file: H T H H T Tails taIlS tAILs TailS heads HEAds hEadS For the input above, your method should produce the following output: 6 heads (50%) You win!

Answers

Answer:

Here is the JAVA program:

import java.io.*;

import java.util.*;

public class Main {

public static void main(String[] args) throws FileNotFoundException{ //the start of main() function body, it throws an exception that indicates a failed  attempt to open the file

Scanner input = new Scanner(new File("file.txt")); //creates a Scanner object and a File object to open and scan through the file.txt    

coinFlip(input);    } //calls coinFlip method

public static void coinFlip(Scanner input) { //coinFlip method that accepts as its parameter a string input holding a file name

while(input.hasNextLine()) { //iterates through the input file checking if there is another line in the input file

Scanner scan = new Scanner(input.nextLine()); //creates a Scanner object

int head = 0; // stores count of number of heads

int count = 0; //stores count of  total number of tokens

while(scan.hasNext()) { //iterates through the sequence checking if there is another sequence in the input file

String token= scan.next(); // checks and returns the next token

if (token.equalsIgnoreCase("H")||token.equalsIgnoreCase("Heads")) { //compares H or Heads with the tokens in file ignoring lower case and upper case differences

           head++;                } //if a token i.e. any form of heads in file matches with the H or Heads then add 1 to the number of heads

           count++;            } //increment to 1 to compute total number of counts

double result = Percentage(head, count); //calls Percentage method passing number of heads and total counts to compute the percentage of heads

System.out.println(head + " heads " + "(" + result +"%)"); // prints the number of heads

if(result >= 50.00) { //if the percentage is greater or equal to 50

System.out.println("You win!");} //displays this message if above if condition is true

else //if the percentage is less than 50

{System.out.println("You lose!");}  }    } //displays this message if above if condition is false

public static double Percentage(int h, int total) { //method to compute the percentage of heads

double p = (double)h/total* 100; // divide number of heads with the total count and multiply the result by 100 to compute percentage

return p;    } } //returns result

Explanation:

The program is well explained in the comments mentioned with each line of the above code. I will explain how the method coinFlip  works.

Method coinFlip accepts a string holding a file name as its parameter. It opens that file and reads its contents as a sequence of tokens. Then it reads and scans through each token and the if condition statement:

if (token.equalsIgnoreCase("H")||token.equalsIgnoreCase("Heads"))

checks if the each token in the sequence stored in the file is equal to the H or Heads regardless of the case of the token. For example if the first token in the sequence is H then this if condition evaluates to true. Then the head++ statement increments the count of head by 1. After scanning each token in the sequence the variable count is also increased to 1.

If the token of the sequence is HeAds then this if condition evaluates to true because the lower or upper case difference is ignored due to equalsIgnoreCase method. Each time a head is found in the sequence the variable head is incremented to 1.

However if the token in the sequence is Tails then this if condition evaluates to false. Then the value of head variable is not incremented to 1. Next the count variable is incremented to 1 because this variable value is always incremented to 1 each time a token is scanned because count returns the total number of tokens and head returns total number of heads in the tokens.

Percentage method is used to return the percentage of the number of heads in the sequence. It takes head and count as parameters (h and total). Computes the percentage by this formula h/total* 100. If the result of this is greater than or equal to 50 then the message  You win is displayed otherwise message You lose! is displayed in output.

Ann. An employee in the payroll department, has contacted the help desk citing multiple issues with her device, including: Slow performance Word documents, PDFs, and images no longer opening A pop-up Ann states the issues began after she opened an invoice that a vendor emailed to her. Upon opening the invoice, she had to click several security warnings to view it in her word processor. With which of the following is the device MOST likely infected?

a. Spyware
b. Crypto-malware
c. Rootkit
d. Backdoor

Answers

Answer:

d. Backdoor

Explanation:

A backdoor is a type of malware that overrides security checks and authentications to access a computer or embedded device.

When this is done, remote access is granted and databases and servers can be accessed and modified. Attackers can also give remote commands to the system.

What happened to Ann in the payroll department is probably a backdoor attack that affected her device.

Select the Stats Worksheet. Enter simple formulas in B3 and B4 to pull through the calculated Total Expenditure and Total Net from the Data worksheet (cells X2 and Y2). If you have done it correctly the pie chart should now show how income is proportioned between expenditure and net. QUESTION: According to the pie chart, what percentage of Income is made up by Expenditure?

Answers

Answer:

62.49

Explanation:

What do you do if your computer dies/malfunctions? Reboot (Restart) Shut Down Recovery CD and Recover your system Call a person to fix it​

Answers

Answer:

Restart

Explanation:

Simply I may restart my pc if it dies/malfunctions. I'll not restart immediately, I'll wait for an hour and do restart my computer. If it doesn't work then maybe I'll Call a person to fix it.

what is programming code

Answers

Answer:

Such languages are used to create computer code or program code, the set of instructions forming a computer program which is executed by the computer. This source code is translated into machine code by a compiler or interpreter, so that the computer can execute it to perform its tasks.

Answer:

Writing code,” “coding,” and “programming” are basically interchangeable terms. Broadly speaking, knowing how to write code is the process of creating instructions that tell a computer what to do, and how to do it. Codes are written in various languages, such as javascript, C#, Python, and much more.

hlo samradhiki can we chat in comment section

Write a recursive function stringReverse that takes a string and a starting subscript as arguments, prints the string backward and returns nothing. The function should stop processing and return when the end of the string is encountered. Note that like an array, the square brackets ( [ ] ) operator can be used to iterate through the characters in a string.

Answers

Answer:

void stringReverse(string s, int start){

   if(s[start]=='\0'){

       return;

   }

   else{

       stringReverse(s.substr(1,s.length()-1),start+1);

       cout<<s[start];

   }

}

Explanation:

What is the different type of secondary memory of a computer system.? explain

Answers

Explanation:

Solid state storage devices

optical storage devices

magnetic storage devices

Consider the following instruction: OR( %1111_0000, AL ) ; After its execution, what will be true about the bits stored in AL?

Answers

Answer:

the higher order bits in AL will be true

Explanation:

We know from the truth table that in an OR operation, once one operand is true the result is true, no matter the value of the other operand. From the above AL will have the higher order bits to be true since the first four higher order bits are 1s, 1111_0000, this is regardless of the original values of AL. We cannot however ascertain if the lower bits of AL are true from this. Note 1 evaluates to true while 0 is false

#Below is a class representing a person. You'll see the
#Person class has three instance variables: name, age,
#and GTID. The constructor currently sets these values
#via a calls to the setters.
#
#Create a new function called same_person. same_person
#should take two instances of Person as arguments, and
#returns True if they are the same Person, False otherwise.
#Two instances of Person are considered to be the same if
#and only if they have the same GTID. It does not matter
#if their names or ages differ as long as they have the
#same GTID.
#
#You should not need to modify the Person class.

class Person:
def __init__(self, name, age, GTID):
self.set_name(name)
self.set_age(age)
self.set_GTID(GTID)

def set_name(self, name):
self.name = name

def set_age(self, age):
self.age = age

def set_GTID(self, GTID):
self.GTID = GTID

def get_name(self):
return self.name

def get_age(self):
return self.age

def get_GTID(self):
return self.GTID

#Add your code below!

#Below are some lines of code that will test your function.
#You can change the value of the variable(s) to test your
#function with different inputs.
#
#If your function works correctly, this will originally
#print: True, then False.
person1 = Person("David Joyner", 30, 901234567)
person2 = Person("D. Joyner", 29, 901234567)
person3 = Person("David Joyner", 30, 903987654)
print(same_person(person1, person2))
print(same_person(person1, person3))

Answers

Answer:

Here is the function same_person that takes two instances of Person as arguments i.e. p1 and p2 and returns True if they are the same Person, False otherwise.

def same_person(p1, p2):  #definition of function same_person that takes two parameters p1 and p2

   if p1.GTID==p2.GTID:  # if the two instances of Person have same GTID

       return True  #returns true if above condition evaluates to true

   else:  #if the two instances of Person do not have same GTID

       return False #returns false when two persons have different GTID

Explanation:

person1 = Person("David Joyner", 30, 901234567)  #first instance of Person

person2 = Person("D. Joyner", 29, 901234567)  #second instance of Person

person3 = Person("David Joyner", 30, 903987654)  #third instance of Person

print(same_person(person1, person2))  #calls same_person method by passing person1 and person2 instance of Person to check if they are same

print(same_person(person1, person3)) #calls same_person method by passing person1 and person3 instance of Person to check if they are same

The function works as follows:

For function call print(same_person(person1, person2))

The GTID of person1 is 901234567 and that of person2 is 901234567

If condition if p1.GTID==p2.GTID in the function same_person checks if the GTID of person1 is equal to the GTID of person2. This condition evaluates to true because GTID of person1 = 901234567 and GTID of person2 = 901234567

So the output is:

True

For function call print(same_person(person1, person3))

The GTID of person1 is 901234567 and that of person3 is 903987654

If condition if p1.GTID==p2.GTID in the function same_person checks if the GTID of person1 is equal to the GTID of person3. This condition evaluates to false because GTID of person1 = 901234567 and GTID of person2 = 903987654 and they are not equal

So the output is:

False

The complete program along with its output is attached in a screenshot.

Write a program that uses the function strcmp() to compare two strings input by the user. The program should state whether the first string is less than, equal to, or greater than the second string7. Write a program that uses the function strcmp() to compare two strings input by the user. The program should state whether the first string is less than, equal to, or greater than the second string

Answers

user_str1 = str ( input ("Please enter a phrase: "))

user_str2 = str ( input("Please enter a second phrase: "))

def strcmp (word):

user_in1 = int (len(user_str1))

user_in2 = int (len(user_str2))

if user_in1 > user_in2:

return "Your first phrase is longer"

elif user_in1 < user_in2:

return "Your second phrase is longer"

else:

return "Your phrases are of equal length"

Using virtualization comes with many advantages, one of them being performance. Which of these is NOT another realistic advantage of using virtualization over dedicated hardware?a. There are improvements in security and high availability during outage.b. There are cost benefits.c. Maintenance and updates are simplified or eliminated.d. There are fewer points of failure.

Answers

Answer:

a. There are improvements in security and high availability during outage

Explanation:

Virtualization occurs when data that could be in several formats (for example, storage devices) are made to appear real through a software. There are virtualization providers who act as third-party between users and the original manufacturers of the software. While virtualization has received wide popularity in recent times because of the several advantages it offers of which cost-saving is included, it also has some disadvantages. One of them from the options provided is the possibility of a security breach and its uncertain availability.

The security breach arises because of the proliferation of information on the virtual space. This information can be accessed by unauthorized hackers. Also since third-party providers are the usual providers of virtualization services, the availability depends on them because if they shut down, users can no longer access the software.

1a) Skills are increasingly the key variable of the entire process of access and information inequality in the information society. Discuss the 21st century competencies or skills required in the information society and four ways (4) you can apply it during Supported Teaching on Schools.​

Answers

Answer:

Explanation:

Skill acquisition improves quality, competence and competitiveness of an individual, It boost the chances of success and ability to make an impact. Access to information plays a verybhuge role in the society as it enables hearers to get updated while those who aren't informed are left behind. Some of the key competences or skills required in the information society include:

Critical thinking : Problem identification and ways to solve them.

Information sourcing and gathering : knowing where to get vital informations and facts

Effective communication, creativity, leadership, social, media and technological skills and so on.

The skills could be can be applied on schools in the form of :

Creating clubs such as the writing and debate clubs where students are given a research topic to write and present, this improves their research ability and communication skill.

Group project or assignment improves collaboration between members.

Assignments or projects requiring technology : Students may be given problems to solve with the use of computers moutwr programs and technology, this will help mad improve productivity.

Reward for innovation: Students should be paused mad encouraged for being creative, this will improve such individual and push others as well.

What is software? Why is it needed?​

Answers

Explanation:

Software is a data and information collection of computer.

It needs to protect computer from viruses.

I hope this helps you

2. Which property is used for hiding text of the textbox?
a) Password Char b) Text Char c) Char Password d) Pass Char

Answers

Answer:

password char

Explanation:

The password char property allows the text being written in the textbox to be hidden in the form of dots or stars. As such the user entering the password is secure, as no one nearby can know the password by watching the texts.

Other Questions
Cost recovery. Richardses' Tree Farm, Inc. purchased a new aerial tree trimmer for $. It is classified in the property class category of a single-purpose agricultural and horticultural structure. Then the company sold the tree trimmer after four years of service. If a seven-year life and MACRS, LOADING..., was used for the depreciation schedule, what is the after-tax cash flow from the sale of the trimmer (use a % tax rate) if a. the sales price was $? b. the sales price was $? c. the sales price was $? a. If the sales price is $, what is the after-tax cash flow? Weiming walkedto the bus-stop. He waitedfor the bus to come because he was late forschool. please answer properly so I will follow. pleaseeeeeeeeee! Which two words most suggest that the narrator does not enjoy the game? DONES is equivalent to 20 (true or false)? If a school camp has enough food for 150 students over 5 days How long would the food last for is only 100 students are there Dump out half of the particles. Place your hand tightly over the top and shake the container. Then remove most of the remaining particles, and shake the container again. Compared with the full container, which states of matter do these two models most closely represent? Explain. Write as an inequality. "Four more than half a number is at most sixteen" The term which derives from the Greek meaning sac, bladder is is inevitable a noun Please find this answer!! :) 9 Given figures showing: Sales 8,200, Opening inventory 1,300, Closing inventory 900, Purchases 6,400, Carriage inwards 200, the cost of goods sold figure is (A) 6,800 (B) 6,200 (C) 7,000 (D) Another figure The image of (-4,6) reflected along the y-axis isa. (4, -6)b. (-4,-6)c. (4, 6)d. (-4, 6) A laboratory technician combines 35.9 mL of 0.258 M chromium(II) chloride with 35.8 mL 0.338 M potassium hydroxide. How many grams of chromium(II) hydroxide can precipitate For what values of does the equation (2 + 1)^2 + 2 = 10 6 have two real and equal roots? Explore one of the agencies for quality improvement listed in this module's lecture. Write a one-page summary of what the agency does, who it affects, and how it is utilized? The table shows a set of conditional relative frequencies of drivers in a survey planning to buy a used vehicle next, based on how they obtained their current vehicle.Which interpretation of the relative frequencies given is the most appropriate?A. The greatest number of drivers who plan to buy used are those who leased their current vehicle.B. The majority of drivers who will buy used next time bought their current vehicle used.C. Of drivers who bought their current vehicle used, about 4 percent will buy new next time, almost 95 percent will buy used next time, and about 1 percent will lease next time.D. Of drivers who bought new, 3.9 percent will buy used next time; of drivers who bought used, 94.8 percent will buy used again; of drivers who leased, 1.3 percent will buy used. Which of the following groups could be identified using the biological species concept? Select all that apply. Select all that apply. bacteria living today extinct dinosaurs sunflower species living today lizard species living today Select the correct texts in the passage.Which two details in Daliahs campaign speech support her challenge of the oppositions claim that classroom libraries are sufficient?To the avid readers out there, I know that we do not currently have a school librarian, and our access to the library is limited. This is unacceptable, and I intend to address the problem if you elect me as student president.All of you are tired of spending your own money to buy books for the library and for yourselves. I understand that the schools budget was reduced due to cuts in funding from the state. But how are we supposed to grow as readers if the library is closed most of the time and can only be used to conduct research as scheduled by homeroom teachers?The school, in partnership with the PTA, conducts many fundraisers to provide funds for the sports teams and STEM activities. Yes, I understand the importance those two opportunities; however, research shows that the more access students have to books, the more student achievement improves on state and district assessments. Research also shows that the more we read, the more we learn about different cultures. The result is that we become more open minded, and we can develop more compassion and empathy for others. All of those things are important to our growth as students and as contributors to society.To those arguing that our English and reading teachers have classroom libraries, I say that thats not enough. Those teachers stock classroom libraries using their own money and donations from crowdfunding sources. They take those books with them when they move to other schools or jobs, and then a new teacher has to take time to rebuild that classroom library while readers are left high and dry. Thats unfair, dont you think? Yes, school district should do a better job of ensuring all schools have libraries and librarians. Yes, schools should do a better job of finding ways to equally fund all initiatives on campus. So, I will present a solution until those in charge can do better.I propose working with the PTA to increase fundraising efforts so that the campus can hire a part-time librarian. This part-time staff member will work on campus three days a week during the times when we have interventions, homeroom, and club time. Until we can find our part-time librarian, I will also start a petition to share a librarian with our neighboring elementary school to work on our campus twice a week for three hours in the afternoon.Answer: Those teachers stock classroom libraries using their own money and donations from crowdfunding sources. They take those books with them when they move to other schools or jobs, and then a new teacher has to take time to rebuild that classroom library while readers are left high and dry. Which preposition should be added to connect the sentence below? He could not tell the new chairs _______ the old ones. Question 8 options: a) by means of b) apart from c) according to d) This sentence does not need a preposition 4. EF is the median of trapezoid ABCD.BX +12E4x-18F3x-4APart I: Solve for x. Show your work. (4 points)