The option 3, "Radar points show exact points of objects," is true about RADAR points.
To provide an explanation, RADAR points are points on a 3D model that are used to accurately represent the physical shape and location of an object. They are not just lines with dots (option 1) and should not be clipped (option 2) as they are essential for creating an accurate 3D model.
While it is not necessary for every object to have at least one RADAR point (option 6), they are especially important for objects both far away (option 7) and close by (option 8) as they allow for precise measurement and placement in the 3D model.
Lastly, option 5 is a helpful shortcut to view RADAR points, but it is not a defining characteristic of them.
RADAR points are crucial for creating an accurate 3D model as they show the exact points of objects and are important for objects both near and far.
To know more about RADAR visit:
https://brainly.com/question/3521856
#SPJ11
a user has complained about not being able to remove a program that is no longer needed on a computer. the programs option is not available in control panel. you suspect that a policy is enabled that hides this option from the user. but after opening the local group policy editor, you see that the policy to hide programs is not configured. you know that other users in this domain can access the programs option. where should you look next to determine whether the policy is enabled?
If the policy to hide programs is not configured in the Local Group Policy Editor, there may be another policy that is preventing the user from accessing the Programs option in Control Panel.
Here are some additional procedures you can take to troubleshoot this issue:
Check if the user account has sufficient privileges: Make sure that the user account that is trying to remove the program has administrative privileges. Only users with administrative rights can install or remove programs on a computer.Check if the program is installed for all users: Some programs can be installed either for a specific user or for all users on the computer. If the program was installed for all users, only an administrator can remove it. If the user is not an administrator, they may not be able to remove the program.Check for any other policies that may be affecting the user: There may be other policies that are preventing the user from accessing the Programs option in Control Panel. To check for this, run the command "gpresult /r" in the Command Prompt. This will display all the group policies that are applied to the user and computer.Check if the program can be uninstalled from the Start menu: Some programs can be uninstalled from the Start menu. To check if this is possible, go to the Start menu, find the program, and right-click on it. If there is an option to uninstall the program, click on it and follow the instructions.If none of these steps work, it may be necessary to contact the system administrator for further assistance.
Learn more about programs:
https://brainly.com/question/23275071
#SPJ11
You will need an Excel Spreadsheet set up for doing Quantity Take- offs and summary estimate
sheets for the remainder of this course. You will require workbooks for the following:
Excavation and Earthwork
Concrete
Metals
Rough Wood Framing
Exterior Finishes
Interior Finishes
Summary of Estimate
You are required to set up your workbooks and a standard QTO, which you will submit
assignments on for the rest of the course. The QTO should have roughly the same heading as
the sample I have provided, but please make your own. You can be creative, impress me with
your knowledge of Excel. I have had some very professional examples of student work in the
past.
NOTE: The data is just for reference, you do not need to fill the data in, just create a QTO.
Build the columns, and you can label them, however you will find that you will need to adjust
these for different materials we will quantify.
Here are some examples of what they should look like:
We can see here that in order to create Excel Spreadsheet set up for doing Quantity Take- offs and summary estimate, here is a guide:
Set up the spreadsheet structureIdentify the required columnsEnter the item details: In each sheet, start entering the item details for quantity take-offs. What is Excel Spreadsheet?An Excel spreadsheet is a digital file created using Microsoft Excel, which is a widely used spreadsheet application. It consists of a grid of cells organized into rows and columns, where users can input and manipulate data, perform calculations, create charts and graphs, and analyze information.
Continuation:
4. Add additional columns to calculate the total cost for each item.
5. Create a new sheet where you will consolidate the information from all the category sheets to create a summary estimate.
6. Customize the appearance of your spreadsheet by adjusting font styles, cell formatting, and color schemes.
7. Double-check the entered quantities, unit costs, and calculations to ensure accuracy.
Learn more about Spreadsheet on https://brainly.com/question/26919847
#SPJ1
To find the item with the lowest cost in column C, what Excel formula should be used in C11? SUM (C3:C10) =MAX (C4:C10) MIN (C3:C10) =MIN (C4:C10)
Answer:
The correct excel formula to use can't be sum cause that's addition of everything in the column. It can't be Max cause that's for the highest. Depending on where the values start, it could be either MIN(C3:C10) or MIN(C4:C10)
The correct Excel formula to find the item with the lowest cost in column C would be =MIN(C3:C10).
The MIN function in Excel is used to find the minimum value in a range of cells. In this case, we want to find the lowest cost in column C, so we use the MIN function with the range C3:C10. This will compare the values in cells C3 to C10 and return the smallest value.
When you enter the formula =MIN(C3:C10) in cell C11, Excel will evaluate the range C3:C10 and return the smallest value in that range. It will display the item with the lowest cost from column C.
By using the MIN function in Excel, you can easily identify the item with the lowest cost in a given range of cells. This is useful for analyzing data and making decisions based on the minimum value in a set of values. Excel provides a range of functions to perform calculations and analyze data, making it a powerful tool for managing and manipulating numerical information.
To know more about Excel Formula, visit
https://brainly.com/question/20497277
#SPJ11
Modern processors attempt to execute more than one instruction per clock cycle, by replicating the internal components of the computer and launching multiple instructions in every stage. This technique is called ________.
Multiple Instruction Execution (MIE)
Multiple Parallelism
Massive Instruction Parallelism (MIP)
Multiple Issue
Modern processors attempt to execute more than one instruction per clock cycle, by replicating the internal components of the computer and launching multiple instructions at every stage. This technique is called Multiple Issue.
Multiple Issue is a technique used in modern processors to execute multiple instructions simultaneously in a single clock cycle. To achieve this, the processor replicates its internal components and assigns them to each instruction in a process called instruction-level parallelism. The replicated components work independently and in parallel, executing multiple instructions simultaneously in different stages. This technique improves processor efficiency by reducing the idle time of the internal components and making full use of the available hardware resources. Multiple Issue is a key factor in achieving high performance and throughput in modern processors, allowing them to perform complex tasks at high speeds while minimizing the number of clock cycles required to complete them.
learn more about Modern processors here:
https://brainly.com/question/31075204
#SPJ11
Productivity software controls the common hardware functionality on your computer. True False?
Productivity software is application software used for producing information such as documents, presentations, worksheets, databases, charts, graphs, digital paintings, electronic music, and digital video. The given statement is false.
Productivity software controls the common hardware functionality on your computer is a false statement.Productivity software provides a user with specific functionality to perform specific tasks on a computer. They don't control the computer's hardware functionality.
Examples of productivity software include word processing software, spreadsheet software, presentation software, and project management software. These applications do not control the hardware functionality of your computer, but they utilize it. For instance, a word processing application may use the keyboard or mouse input of a computer to help you type or format a document.
To summarize, productivity software does not control the common hardware functionality on your computer. The statement is false.
Know more about the Productivity software
https://brainly.com/question/27248879
#SPJ11
what is the address of the first dns server that the workstation will use for name resolution?
The address of the first DNS server that the workstation will use for name resolution is specified in the computer's network configuration settings.
The DNS server address can be obtained from the network administrator or Internet Service Provider. A DNS server is a computer that translates domain names into IP addresses that computers can understand and vice versa. A DNS server is responsible for resolving domain names to IP addresses, which is necessary for a computer to access a website, send an email, or connect to any other network service.In a Windows environment, the DNS server address can be configured in the TCP/IP settings of the network adapter. The workstation will use this address to send DNS queries when it needs to resolve a domain name into an IP address. If the first DNS server is unavailable, the workstation will automatically try to use the next available DNS server that is configured in its network settings.A DNS server can also be configured to forward queries to another DNS server if it is unable to resolve a name itself. This allows DNS servers to work together to provide name resolution services across the internet.
Learn more about Internet Service Provider here:
https://brainly.com/question/28342757
#SPJ11
how to print in this on python
#
# #
# # #
# # # #
# # # # #
Answer:
triangular ##&((+ hhvbh. hhhb hhv
Answer:
for i in range(1, 6):
print(("# " * i).rstrip())
Explanation:
You need to print one hashtag, then 2, then 3, and so on. We can use Python's string multiplication to get each line quicker.
String multiplication is an easy way to repeat the same string a certain number of times. It's done by multiplying the string to a number.
For example,
"hello" * 6
>> "hellohellohellohellohellohello"
If we multiply the string "#" by any number, we would get a number of hashtags side by side, without any space. To easily avoid this, we can multiply "# " instead to automatically put a space to the right of each hashtag.
We can use a for loop that goes through range(1, 6) to print out 5 rows.
for i in range(1, 6):
Then, we can print the string "# " multiplied by i.
print("# " * i)
However, this will also put a space at the end of the string, which we do not want to print. Hence, we can use the .rstrip() method to strip the string of any spaces on the right. We will first put the whole string in parentheses, then invoke rstrip on it.
print(("# " * i).rstrip())
Let's put both lines together.
for i in range(1, 6):
print(("# " * i).rstrip())
can you cure the effects of fatigue without sleep
True or false
FOR THE LOVE OF GOD I NEED HELP PLEASE HELP
When you log onto a server or domain, what service are you using?
When you log onto a server or domain, you are using the service called Authentication Service. This service is responsible for checking the user's identification and validating their credentials, such as username and password. It ensures that only authorized users can access the system.
Authentication services are implemented through various authentication protocols like Kerberos, LDAP, and RADIUS. Kerberos is used for authenticating users on Unix and Linux operating systems, while LDAP and RADIUS are used for authenticating users on Windows systems. Kerberos is a network authentication protocol designed to provide strong authentication for client/server applications. It is widely used for authenticating Windows domains, web applications, and other network services.LDAP (Lightweight Directory Access Protocol) is an open protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network.
LDAP provides a way to access and manage information about users, groups, and other network resources. RADIUS (Remote Authentication Dial-In User Service) is a networking protocol that provides centralized authentication, authorization, and accounting management for users who connect and use a network service. RADIUS servers are used by Internet service providers (ISPs) and enterprise organizations to authenticate dial-in users and provide secure remote access to corporate resources.
To know more about Authentication visit:
https://brainly.com/question/30699179
#SPJ11
Multiple TCP streams can distinguished on a given machine using.
Select one:
a. network interface cards
b. All of the mentioned ,t. c. Ports
0 d. DNS addresses
The correct answer is option c. Ports.
Multiple TCP streams can be distinguished on a given machine using ports. In TCP/IP networking, ports are used to identify specific applications or services running on a device. Each TCP stream is associated with a unique combination of source and destination ports, allowing the system to differentiate between multiple concurrent connections.By using different port numbers for each TCP stream, the operating system can correctly route incoming packets to the corresponding application or service, ensuring that the data is delivered to the correct destination.
Learn more about TCP here:
https://brainly.com/question/27975075
#SPJ11
3.27 Triangle Analyzer (C++)
Develop your program in the Code::Blocks or other Integrated Development Environment. I think that you must name the file TriangleAnalyzer.cpp because that is how I set up it up in the zyLab.
Write a program that inputs any three unsigned integer values in any order.
For example, the user may input 3, 4, 5, or 4, 5, 3, or 5, 4, 3 for the three sides.
Do NOT assume that the user enters the numbers in sorted order. They can be entered in any order!
First, check to make sure that the three numbers form a triangle and if not output a message that it is not a triangle. (you did this in the previous zylab)
Second, classify the triangle as scalene, isosceles, or equilateral.*
Third, If the input sides form a scalene triangle test if it is also a right triangle. Consider using a boolean variable that is set to true if the triangle is scalene.
(Note: Isosceles and Equilateral triangles with sides that are whole numbers can never be right triangles. Why?)
Run your program in CodeBlocks or other IDE and test it thoroughly. Once it has been tested, submit through zyLab for testing with my test suite of cases. Follow the zylab submission instructions for uploading your program.
These are the various output messages my program uses (with a new line after each message):
Enter three whole numbers for sides of a triangle each separated by a space. Triangle is equilateral Triangle is isosceles but not equilateral Triangle is scalene This triangle is also a right triangle These input values do not form a triangle
(You can adjust your messages so that your program output agrees with mine and passes the tests!)
This program requires the use of IF, nested IF-ELSE or IF-ELSE IF nested statements.
You may use logical operators to form compound relational expressions.
Careful planning of the order of testing is important if you are not to produce a logical "snakepit" of a program.
*Mathematics: Triangles are classified by the lengths of their sides into Scalene (no equal sides), Isosceles ( two equal sides) or Equilateral (three equal sides). In Math, an equilateral triangle is isosceles as well, but for this program ignore that and classify triangles as Equilateral, Isosceles or Scalene only.
This program requires thorough testing to be sure that it works correctly.
The C++ program "Triangle Analyzer" takes three unsigned integer inputs and determines whether they form a triangle. If they do,
it further classifies the triangle as equilateral, isosceles (but not equilateral), or scalene. Additionally, if the triangle is scalene, the program checks if it is also a right triangle. The program utilizes if-else and nested if-else statements to perform the necessary checks. It starts by verifying if the three sides form a valid triangle based on the triangle inequality theorem. If not, it outputs a message stating that the input values do not form a triangle. If they do form a triangle, it proceeds to check for the type of triangle based on the lengths of its sides. The program then outputs the corresponding message based on the classification of the triangle: equilateral, isosceles (but not equilateral), or scalene. If the triangle is determined to be scalene, it checks if it is also a right triangle. It's important to note that isosceles and equilateral triangles with whole number sides can never be right triangles. The program should be thoroughly tested to ensure its correctness and accuracy for various input scenarios.
Learn more about triangle classification here:
https://brainly.com/question/373928
#SPJ11
What is the result when you run the following program?
print(2 + 7)
print("3+1")
9
Ost
3+1
an error statement
O
2 +7
4
9
O A
Answer:
The answer to this question is given below in the explanation section.
Explanation:
If you run the following program,
print(2 + 7)
print("3+1")
then, you can get the following result respectively against each print statement.
9
3+1
because when you print 2+7 without quotation, it will add the integer digit and print the result of adding 2 and 7.
And, when you run ("3+1") in the double quotation, the program will treat it as a string because of the enclosed double quotation (" ");
Which word should be used to begin the line of code that will direct the program to do something if a condition is not met?
Answer: If then?
Explanation:
I'm not necessarily a programming master by all means, but it could maybe be an if-then statement? If (condition is not met) then (direct the program to do something)
Sorry if I couldn't help
Answer:
I think it may be "else"
Explanation:
What is the difference between the as-is process model and the to-be process model?
AS-IS and TO-BE are phases of BPM (Business Process Management), which allow promoting the improvement of business processes. Therefore, there are two moments: the AS-IS and the TO-BE.
AS-IS is the view of an organization's current processes, which shows how a company performs its activities at a given time. It is common for the term AS-IS to be used synonymously for process analysis.
In AS-IS process analysis, processes are discovered and analyzed. It is time for exploration to create a common vision of the ruptures and deviations in the process.
AS-IS helps in discovering various types of business processes, whether they are primary processes, support processes or management processes.
TO-BE is the vision of an organization's future processes, which shows the best way to carry out the process. TO-BE is also called process design. Its objective is to propose improvements in the organizations' processes, based on what was verified in the AS-IS.
The design of TO-BE processes involves defining the workflow, roles and responsibilities, technologies required for the process, data sources and moments of integration with other processes. The great achievement of TO-BE is to promote real conditions of transformation in processes, improving the organization's competitiveness.
See more about computing at: brainly.com/question/1394311
#SPJ1
What type of a structure is the best way to iterate through the characters of a string?.
Answer:Using the character iterator is probably the only correct way to iterate over characters, because Unicode requires more space than a Java char provides. A Java char contains 16 bit and can hold Unicode characters up U+FFFF but Unicode specifies characters up to U+10FFFF.
Explanation:
Please help This is a homework in ICT class
Operating systems move code and data, as necessary, to a portion of the disk that is used as if it were memory, not just disk storage space. this disk location is called ____ _______.
Answer:
Virtual memory
Explanation:
Acts as both memory and disk storage space.
Virtual memory frees up RAM by transferring data that hasn't recently been used to a storage device, such as a hard disk or solid-state drive (SSD). Virtual memory is useful for multitasking, running large programs, and speeding up the system.
What is the role of virtual memory in disk storage space?Virtual memory fulfills two functions. First, by using disk, it enables us to increase the utilization of physical memory. Because each virtual address is converted to a physical address, it also enables memory protection.
An operating system may load programs larger than its physical memory thanks to virtual memory, which is its fundamental benefit. The users get the idea that the machine has boundless memory. Additionally, it offers memory security.
Therefore, operating systems move code and data, as necessary, to a portion of the disk that is used as if it were memory, not just disk storage space.
Learn more about virtual memory here:
https://brainly.com/question/13384907
#SPJ2
Typing your password at a website's login screen and then receiving a code via text message that you must then enter at a second screen is an example of
Typing the password at the website login screen and the receiving of the code via text message at the second screen represent the two-factor authentication.
The following information should be considered:
It is an extra security for the online accounts. By entering the username and password, the code should also be received to the linked mobile number so that the access could be done to the account.Learn more: brainly.com/question/17429689
do u have all the subjects
What color line appears under a word that is spelled incorrectly in power point
Answer:a wavy red line
Explanation:
Hope this helps
Can I have brainliest pls
Answer:
ReD
Explanation:
BeCaUsE
What is Multimedia Authoring Tools
Which methods are appropriate to use on seasonal data? a. Moving Average Method b. SES c. Holt's Method d. Multiple Regression with seasonal dummy variables e. Holt Winter's Method
Moving Average Method is appropriate to use on seasonal data.
Thus, A key component of time-series analysis is seasonality. Seasonal changes might affect time-series since they are indexed forward in time. For instance, we anticipate that ice cream sales will be higher in the summer and lower in the winter and seasonality.
Seasonality can occur throughout a range of time frames, including days, weeks, and months. Understanding how seasonality impacts our series is crucial for time-series analysis since it enables us to make better future projections.
We'll discuss a seasonal data example in this piece before demonstrating how to get rid of it. We wish to get rid of it because most forecasting algorithms demand that our time-series be stationary.
Thus, Moving Average Method is appropriate to use on seasonal data.
Learn more about Seasonality, refer to the link:
https://brainly.com/question/19009677
#SPJ4
Should Microsoft bring paid ads to its X-Box gaming space in light of the new activision deal? Is Microsoft moving to slow with it acquisition based strategy and should they look to develop solutions in house?
Key factors to keep in mind when utilizing paid advertisements within the box gaming domain, as well as effective methods for gaining new customers is User Experience.
What is the gaming spaceThe addition of advertisements that require payment within the box gaming world has the potential to adversely affect the user experience. Most gamers usually desire unbroken gaming and might react unfavorably towards advertisements that are intrusive or that cause disruptions.
To increase revenue on the box platform, Microsoft may consider implementing paid advertisements as a form of monetization. By making use of advertising income, there is a potential to acquire additional funds that can be utilized for various endeavors such as enhancing platform development, etc.
Learn more about gaming space from
https://brainly.com/question/24855677
#SPJ4
what version of vsftpd contained the smiley face backdoor?
Answer:
Chris Evans, author of vsftpd announced that the master site for vsftpd was compromised and that the latest version of vsftpd (vsftpd-2.3.4.tar.gz) was backdoored. The backdoor payload is interesting. In response to a smiley face in the FTP username, a TCP callback shell is attempted. There is no obfuscation.
Explanation:
The master site for vsftpd was compromised, and the most recent version of vsftpd has a backdoor, according to vsftpd programmer Chris Evans. The payload on the backdoor is intriguing. A TCP callback shell is tried in response to a smiley in the FTP username. There is no concealment.
What version of vsftpd had smiley face backdoor?Vsftpd version 2.3. 4 that could be downloaded from the main site was found to have been compromised in July 2011. A ":)" smileyface can be used as the username when entering into a compromised vsftpd-2.3. 4 server, giving users access to a command shell on port 6200.
The idea behind the attack against VSFTPD 2.3. 4 is to send a specific sequence of bytes on port 21 to start the malicious vsf sysutil extra() function, which, if executed successfully, opens the system's backdoor on port 6200.
causes the backdoor to be opened, which causes a shell to start listening on TCP port 6200. After a client connects to it and disconnects from it, the shell stops listening. This might be used by a remote, unauthenticated attacker to execute arbitrary code as root.
Thus, The master site for vsftpd was compromised, and the most recent version of vsftpd has a backdoor.
For more information about vsftpd had smiley face backdoor, click here:
https://brainly.com/question/535743
#SPJ6
For ul elements nested within the nav element, set the list-style-type to none and set the line-height to 2em.
For all hypertext links in the document, set the font-color to ivory and set the text-decoration to none.
(CSS)
Using the knowledge in computational language in html it is possible to write a code that For ul elements nested within the nav element, set the list-style-type to none and set the line-height to 2em.
Writting the code:<!doctype html>
<html lang="en">
<head>
<!--
<meta charset="utf-8">
<title>Coding Challenge 2-2</title>
</head>
<body>
<header>
<h1>Sports Talk</h1>
</header>
<nav>
<h1>Top Ten Sports Websites</h1>
<ul>
</ul>
</nav>
<article>
<h1>Jenkins on Ice</h1>
<p>Retired NBA star Dennis Jenkins announced today that he has signed
a contract with Long Sleep to have his body frozen before death, to
be revived only when medical science has discovered a cure to the
aging process.</p>
always-entertaining Jenkins, 'I just want to return once they can give
me back my eternal youth.' [sic] Perhaps Jenkins is also hoping medical
science can cure his free-throw shooting - 47% and falling during his
last year in the league.</p>
<p>A reader tells us that Jenkins may not be aware that part of the
least-valuable asset.</p>
</article>
</body>
</html>
See more about html at brainly.com/question/15093505
#SPJ1
Which of the following is not a valid SQL clause?
TOP
ORDER BY
WHERE
-BOTTOM
The "-BOTTOM" clause is not a valid SQL clause. The correct keyword is "BOTTOM" without the minus sign. The "TOP" clause is used in SQL to specify the number of rows or percentage of rows to be returned.
from a query result. It is commonly used in combination with the "SELECT" statement.
The "ORDER BY" clause is used to sort the result of a query in ascending or descending order based on one or more columns.
The "WHERE" clause is used to filter rows based on specified conditions. It allows you to specify criteria to select only the rows that meet the given conditions.
However, "-BOTTOM" is not a recognized SQL clause. If you intended to specify the last few rows in a result set, you could use the "ORDER BY" clause with "DESC" (descending order) and limit the number of rows using the "TOP" clause or equivalent syntax provided by the specific database system.
Learn more about SQL here:
https://brainly.com/question/31663284
#SPJ11
What are examples of intermediate goals that require funding? Check all that apply.
1.) applying to college
2.) attending college
3.) interviewing for a job
4.) getting a summer job
5.) getting a promotion
6.) taking a licensing exam
Answer:
The answer is 1,2,6
Explanation:
The examples of intermediate goals that require funding are applying to college and attending college. Thus, option A and B are correct.
Which careers require college degree?Some careers in the financial services sector require a college degree and others require a specialized license. Those requiring a unique license are banking and accounting.
A bank is an institution that deals in money and its substitutes and provides other money-related services. In its role as a financial intermediary, a bank accepts deposits and makes loans. Many banks provide related services such as financial management and products such as mutual funds and credit cards. For career in a banking field, a persons require specialized license.
Therefore, The examples of intermediate goals that require funding are applying to college and attending college. Thus, option A and B are correct.
Learn more about bank here:
brainly.com/question/29797792
#SPJ5
Tanya is very interested in providing medical care and helping injured people. Gerald wants to discover information about people and crimes, but he wants to be self-employed and work for individual customers instead of for the government. He is also skilled at writing reports. Hunter has always wanted to protect the people in his rural town and investigate crimes. Which career is best suited to each person?
Answer: Tanya should be a Paramedic, Gerald should be a Private Investigator, and Hunter should be a Deputy Sheriff.
Explanation:
Based on the scenario, Tanya should be a Paramedic, Gerald should be a Private Investigator, and Hunter should be a Deputy Sheriff.
A paramedic is simply refered to as a health care professional that provides emergency medical care to people who are in critical condition.
Since Gerald wants to discover information about people and crimes, but he wants to be self-employed and work for individual customers instead of for the government, he should be a private investigator. A private investigator is someone who is employed to look for clues or give evidence regarding an issue. They gather facts that would be helpful in cases.
Since Hunter has always wanted to protect the people in his rural town and investigate crimes, he should be a Deputy Sheriff.
Answer:
B or 2
Explanation:
Good Luck!
Which statement is true?
A. A flowchart uses comments that can be kept as a permanent part of a program.
B. A comment line begins with #.
C. Pseudocode uses shapes such as rectangles and diamonds to plan a program.
D. You only use comments for pseudocode.
Answer:
B just took the test.
Explanation:
Answer:
comment line begin with #
Explanation:
Modern Computers compared to earlier computers are
a)faster than larger
b)less reliable
c) larger and stronger
d)faster and smaller