I.Read the statements carefully. Write “R” if the syntax of the code is Right and write “W” if it is wrong.

1 __r__ In dreamweaver there are three types of View only.
2 ____ The Code View shows you the codes that the web browser will execute in order to display
your work.
3 ____ The Split View shows you the Code View and Live View.
4 ____ Adobe Dreamweaver utilizes Roundtrip HTML.
5 ____ The following are the steps to publish a file: Documents Toolbar ► Press Preview/Debug in
browser icon ► Preview in IExplorer.
6 ____ Try .
7 ____ .
8 ____ .
9 ____ .
10 ____ .
11 ____ .
12 ____ Songs .
13.____ Spaces within names is a no-no. Use an underscore instead of a space
14._____ Always use uppercase because unix servers are case sensitive.
15. _____ Avoid using special characters. Keep it simple.
16.______ HTML files should have the appropriate extensions. You can use either .html or .htm.
17.______Make your filenames long so that users can remember them and it will be easy to type in your website.
18.______ A part of Adobe Dreamweaver where you can change a text’s Font Color and
Size.
19. _______A panel where you can change the Text Alignment and Formatting.
20. _________ These are the shortcut keys for adding a Linebreak.

Answers

Answer 1

Answer:

R

R

R

R

W

W

W

W

W

W

W

W

R

W

R

R

W

R

R

W

Explanation:

hope this helps :)


Related Questions

100 POINTS NEED THIS BEFORE 11:59 TODAY!!!!!!!!!!!!!!!

100 POINTS NEED THIS BEFORE 11:59 TODAY!!!!!!!!!!!!!!!

Answers

Answer:ok be how hobrhkihfehgdhdj fuiufiisefif jfkijfjfhhfhfhfhf

Explanation:

A nested folder Can best be described as what?

Answers

Answer:

A nested folder can be described as a folder within a folder, or a subfolder.

Ghani has an arm with a birth defect. He wants to play sports. He feels discouraged and left out because he is differently abled as he cannot actively participate in any sports. Suggest and innovative idea that can help Ghani play sports

Answers

Answer:

So he can cheer up and people around him and give him positive energy

Explanation:

Adapt the rules of the sport to fit Ghanis needs. So Ghani and others have an equal playing field.

combining and splitting multiple channels across a fiber optic connection is called ?

Answers

frequency-division multiplexing I believe

one disadvantage of using a wireless network over a wired network​

Answers

Answer:

Slower than wired network​

Explanation:

This is much weaker than a wired connection. It is likely that the network is less secure. A variety of factors, including large distances or artifacts, can impede wireless transmission around wireless devices as well as other wireless devices.

Select the correct answer.
Which graphic design tool should you use to achieve the effect in the image shown here?
Ο Α. Move
B.
color and painting tools
C. Layers
D. Marquee

Select the correct answer.Which graphic design tool should you use to achieve the effect in the image

Answers

Answer:

B.  color and painting tools

Explanation:

your script is parsing filenames and is creating a count of how many files per file extension type exist within a directory. what slice could you use to extract the file extension substring, assuming the extensions are three letters only?

Answers

To extract the file extension substring in a script that parses filenames and creates a count of how many files per file extension type exist within a directory, you can use the following slice assuming the extensions are three letters only:

1. Iterate through the filenames in the directory using a loop.
2. For each filename, use the slice `filename[-3:]` to extract the last three characters, which represent the file extension.
3. Add the extracted substring to a dictionary or a counter, and increment the count for each occurrence of the file extension.

Here's a step-by-step breakdown of the process:

1. Loop through the filenames in the directory.
2. Use the slice `filename[-3:]` to extract the file extension substring from each filename.
3. Add the extracted substring to a count data structure (e.g., a dictionary).
4. Increment the count for each occurrence of the file extension.

By following these steps, your script will create a count of how many files per file extension type exist within the given directory.

To know more about data structure visit:

https://brainly.com/question/28447743

#SPJ11

Please answer in Java
Sale! During a special sale at a store, a 10% discount is taken off of purchases over $10.00.
Create an application that prompts the user for the dollar amount of purchases and then
returns the discounted price, if any. The program should neatly display the subtotal before
the discount, the amount of money discounted (if any), the HST applied to the subtotal and
finally the total. The program should be able to handle negative numbers and give an
appropriate message.
Sample Run #1:
Enter the purchase amount: 9.45
No discount applied.
Subtotal: $9.45
HST: $1.23
Total: $10.68
Sample Run #2
Enter the purchase amount: 15.00
10% discount applied.
Subtotal: $15.00
Discount: - $1.50
HST: S1.76
Total: $15.26

Answers

Answer:

Scanner keyboard = new Scanner(System.in);

   

       

       

        double discount = 0;

        double productPrice;

        double subTotal;

        double salesTax;

        double saleTotal;

       

       

       System.out.printf("Enter the purchase amount:");

       productPrice = keyboard.nextDouble();

       

       if (productPrice > 10) {

          discount = 10;

}

       System.out.println( + discount + "% discount applied.");

       

       subTotal = (productPrice);

       salesTax = (subTotal * 0.14);

       saleTotal = (subTotal + salesTax - discount );

       System.out.printf("Subtotal: $%5.2f\n", subTotal);

       System.out.printf("Discount; -$%5.2f\n", productPrice - discount);

       System.out.printf("HST: $%5.2f\n", salesTax);

       System.out.printf("Total: $%5.2f\n", saleTotal + salesTax);

}

}

Explanation:

How long you plan to keep your investments in your portfolio refers to:
A. Time horizon
B. Asset allocation
C. Personal financial health
D. Risk tolerance

Answers

Answer:

A, because it has to do with the amount of time you have it in your portfolio.

What is the name of the message that comes from the game engine that calls some (or all) of the other engines into action?

Answers

The name of the message that comes from the game engine that calls some (or all) of the other engines into action is said to be Game Call.

What is an engine in a game?

A gaming engine is known to be a kind of a software development environment, that is said to be known as the  a “game architecture” or “game framework.

Note that it is one that is made up of settings and configurations that is said to often optimize and breaks down the development of video games in all of the kinds of programming languages.

Hence, The name of the message that comes from the game engine that calls some (or all) of the other engines into action is said to be Game Call.

Learn more about game engine from

https://brainly.com/question/27406405

#SPJ4

please help me out with answering the questions

please help me out with answering the questions

Answers

10.

if "h" in letter:

   #do something

11.

if value >= 13.6:

   #do something

12.

if 5 < y < 11:

   #do something

13.

if num1 == num2:

   print("equal")

14.

num1 = int(input("Enter a number: "))

num2 = int(input("Enter a number: "))

if num1 > num2:

   print(num1)

else:

   print(num2)

15.

if number == 89 or number == 78:

   print("Your number is equal to 89 or 78")

I hope this helps! If you have any other questions, I'll do my best to answer them.

Free computer games and free screen saver programs are typical carriers of _______.

A. DoS

B. worms

C. viruses

D. Trojan horses

Answers

Free computer games and free screen saver programs are typical carriers of Trojan horses. Therefore, the correct answer option is: D. Trojan horses.

What is a malware?

A malware is any type of software program such as a game or screen saver, that is designed and developed to be intentionally harmful to a host computer, website, server, or network, especially for the purpose of wreaking havoc, disruption, and destruction such as a Trojan horse.

In Computer technology, some examples of a malware include the following:

WormsRootkitRATAdwareTrojan horseSpywareZombiesViruses

In conclusion, a Trojan horse simply refers to a type of malware that has the ability to perform undocumented actions which are completely unapproved by an end user of the device and they are commonly found in free software such as computer games and free screen saver programs.

Read more on malware here: brainly.com/question/28260161

#SPJ1

Match each Excel term to its definition. cell a group of cells containing related data ribbon a row of tabs, groups, and commands Excel's version of a spreadsheet range a container used to input data title bar file name 4 worksheet​

Answers

Answer:

ribbon- a row of tabs, groups, and commands

range- a group of cells containing related data

title bar- file name

cell- a container used to input data

worksheet- Excel’s version of a spreadsheet

Explanation:

Functions are pre-written formulas that carry out calculations by utilizing particular values, referred to as inputs, in a given order, or structure. Functions can be used to do calculations of any complexity. The Formulas tab on the Ribbon contains the syntax for all of Excel's functions.

What are the different Excel term?

The four primary value kinds in Microsoft Excel are referred to as Excel data types. Data can be categorized into four types: text, numbers, logical, and error. Each type can be used for a variety of tasks, so knowing which to use and when to use it is crucial.

Therefore, ribbon- a row of tabs, groups, and commands. Range- a group of cells containing related data. Title bar – file name. Cell- a container used to input data. Worksheet – Excel’s version of a spreadsheet.

Learn more about Excel here:

https://brainly.com/question/3441128

#SPJ2

8.3.5: Max In List
Write the function max_int_in_list that takes a list of ints and returns the biggest int in the list. You can assume that the list has at least one int in it. A call to this function would look like:

my_list = [5, 2, -5, 10, 23, -21]
biggest_int = max_int_in_list(my_list)
# biggest_int is now 23
Do not use the built-in function max in your program!

Hint: The highest number in the list might be negative! Make sure your function correctly handles that case.

Answers

Answer:

here!!

Explanation:

# Write code here...

def max_int_in_list(my_list):

   highest = my_list[4]

   

   for num in my_list:

       if num > highest:

           highest = num

       return highest

my_list = [5, 2, -5, 10, 23, -21]

biggest_int = max_int_in_list(my_list)

print biggest_int

A version of the required program written in python 3 is given below.

my_list = [5, 2, -5, 10, 23, -21]

def max_int_in_list(my_list):

#iniate the function named max_int_in_list which takes in a list argument

maximum = my_list[0]

#set the first value in the list as maximum

for num in my_list:

#iterate through every value in the list

if num > maximum:

#Check if any of the iterated values in the list is greater than the set maximum value

maximum = num

#if so set the Number as the new maximum value

return maximum

#return the maximum value

print(max_int_in_list(my_list))

A SCREENSHOT of the program output is attached.

Learn more on python programs :https://brainly.com/question/24782250

8.3.5: Max In ListWrite the function max_int_in_list that takes a list of ints and returns the biggest

if ordertotal has a value of 50 and quantity has a value of 10, what is the value of discount after these statements are executed? if (quantity

Answers

In order to answer this question, we need to know what the statements following "if (quantity" are. Without knowing the full condition and subsequent action in the if statement, it is not possible to determine the value of discount.

Please provide the full code for us to accurately answer your question.

In general, if statements are used to execute a specific action or set of actions when a certain condition is met. The condition is typically a comparison of two values, and the action is a statement or set of statements that are executed when the condition is true.

For example, if we have the following if statement:

if (quantity > 5) {
 discount = ordertotal * 0.1;
}

This would set the value of discount to 10% of the ordertotal if the quantity is greater than 5. However, without knowing the full if statement in your question, we cannot accurately determine the value of discount.

Learn more about programming: https://brainly.com/question/26134656

#SPJ11

Complete the following sentence.
Some manufactured dams produce BLANK power in addition to retaining water.

Answers

Answer:

Some dams produce renewable hydroelectric power  

Explanation:

hydroelectric is power from water

Answer:

hydroelectric

Explanation:

The correct answer is hydroelectric. Dams are structures created to serve as a barrier and to retain water. Some dams are also used to produce hydroelectric power.

Describe the key differences between raster-based and vector-based graphics.

Describe the main differences between 2D and 3D images. Provide at least one example of each, as well as an example of the software used for creating and editing them.

Imagine a client asked you to create a billboard to promote their new line of hair care products. Describe the tools and specific elements that you would use to create this image.

Imagine that you were hired to create the label for a new brand of soup. The client wants to emphasize that the soup has homemade flavor. Describe the tools and specific elements that you would use to create this image.

Describe a situation in which you might use anti-aliasing on an image.

Answers

Answer:

asd

Explanation:

A user calls to report that she’s unable to log on to e-mail, and you ask a couple of questions. Because you know that no one else is using the network right now, you can’t determine whether the problem is unique to her machine or affects the entire network. Probing further, you learn that she’s also unable to print. You decide this problem is probably easier to troubleshoot from the user’s computer. Using the eight-step problem-solving process, outline the items you must check and the questions you must ask when you arrive at the user’s office. B. Based on the possible responses to your questions, describe the actions you will take to correct potential causes of this problem

Answers

The outline of items that one must check is first to know or clarify the issue, break the issue down, etc.

What is troubleshooting?

This is known to be a step by step approach to problem handling that is often used to know and handle issues with systems etc.  

Others includes:

Set one's target in working on the issue, Analyze the main cause, Develop any form of Countermeasures.Then you Implement the Countermeasures made Monitor the Results that was givenGo through the Process to Standardize it and tell the user that it is solved.

Conclusively, By following the steps, one can know the issue and solve it.

Learn more about troubleshoot from

https://brainly.com/question/14394407

Write a Python program in codehs, using post-test while loop, to print the powers of 2 less than one million, starting from 2 to the power of 0.

Hint: Recall from Python Basics Math Operators Unit that ** is the exponentiation operator.

Usage: To find 10 to the power of 5, do 10 ** 5 in Python.

Paste your program in the space provided below, after you test its functionality in codehs.

Answers

This loop will print out the powers of 2 (2^0, 2^1, 2^2, etc.) until it reaches 2^power which is greater than 1 million. The power variable is incremented by 1 each time the loop runs which allows us to keep track of which power of 2 we are at.

What is the variable ?

A variable is a named memory location used to store a value that can be changed during the execution of a program. Variables are essential to programming, as they allow programmers to store and manipulate data during the execution of a program. Variables are typically declared with a specific data type, such as an integer or string, and they are assigned a unique name so they can be accessed and manipulated within the program.

#Start

power = 0

while 2**power < 1000000:

   print(2**power)

   power += 1

#End

To learn more about variable

https://brainly.com/question/29360094

#SPJ1

53.8% complete question a startup company adds a firewall, an ids, and a hips to its infrastructure. at the end of the week, they will install hvac in the server room. the company has scheduled penetration testing every month. which type of layered security does this represent?

Answers

The setup described represents a layered security approach that includes both preventive and detective controls, which is a common approach to securing IT infrastructure.

What is the firewall about?

The firewall, IDS (Intrusion Detection System), and HIPS (Host Intrusion Prevention System) are examples of preventive controls. These are designed to prevent security incidents by blocking unauthorized access and detecting and stopping attacks before they can cause damage.

The scheduled penetration testing is an example of a detective control. Penetration testing is a method of testing the security of a system by attempting to exploit vulnerabilities in a controlled environment.

Therefore, the installation of HVAC in the server room is an example of a physical security control. This control is designed to protect the physical infrastructure from environmental threats such as overheating, humidity, and dust.

Read more about firewall here:

https://brainly.com/question/13693641

#SPJ1

Let the sign of q2 be changed from positive to negative. At which position can the point charge q be placed now so that the net electrostatic force on it is zero?.

Answers

The point charge q can now be placed at the midpoint between q1 and q2 so that the network connection electrostatic force on it is zero.

When the sign of q2 is changed from positive to negative, the direction of the electrostatic force exerted on q2 gets reversed. At this point, the net electrostatic force on q will no longer be zero. To make the net electrostatic force on q zero, q must be placed at the midpoint between q1 and q2. This is because when q is placed at the midpoint, the force exerted by q1 and q2 will cancel each other out and the net force on q will be zero. Therefore, the point charge q can now be placed at the midpoint between q1 and q2 so that the net electrostatic force on it is zero.

Learn more about network connection here:

brainly.com/question/29970297

#SPJ4

Assuming each operating system installed requires 2GB of RAM, what is the minimum amount of physical RAM that will need to be installed in the host system to meet the requirements of this scenario

Answers

Answer:

3gb i believe

What are the three major activities of an operating system with regard to memory management?

Answers

The three major activities of an operating system with regard to memory management are allocation, deallocation, and protection.

Allocation refers to the process of assigning a portion of the memory to a process or application that requests it. The operating system must keep track of which portions of the memory are currently in use and which ones are free. When a process or application requests memory, the operating system must locate a free portion of memory and allocate it to the process.

Deallocation refers to the process of freeing up memory that is no longer in use by a process or application. When a process terminates or no longer needs a portion of memory, the operating system must free up that memory so that it can be used by other processes or applications.

Protection refers to the mechanisms that the operating system uses to prevent processes or applications from accessing memory that they are not supposed to. The operating system must ensure that each process can only access the portions of memory that it has been allocated and that it cannot interfere with the memory used by other processes.

Overall, memory management is a crucial aspect of operating system design, as it ensures that processes and applications can efficiently use the available memory without interfering with each other.

Learn more about memory  here:

https://brainly.com/question/28754403

#SPJ11

Which of the following are ways that
employees can check their behaviors at work
after reviewing the written policies? (choose
all that apply)
observing coworkers
checking in with a supervisor frequently
discussing their employment contract with
legal department

Answers

Answer:

A and b

Explanation:

Answer: A AND B

Explanation:

HTML stands for _______.
A)Hypertools Main Linguistics
B)Hyperlink Tools Main Language
C)Hypertools Markup Linguistics
D)Hypertext Markup Language

Answers

HTML stands for  Hypertext Markup Language.

HTML stands for Hypertext Markup Language. It is the standard markup language used for creating and structuring web pages. HTML uses various tags and elements to define the structure, content, and formatting of a webpage. It is the backbone of every web page and provides the foundation for displaying text, images, links, multimedia, and other elements on the internet. HTML is not a programming language, but rather a markup language that allows web browsers to interpret and render the content of a webpage.

To know more about HTML visit

brainly.com/question/11569274

#SPJ11

he sets P, R, and E: P = {PO, P1, P2, P3} R = {RO, R1, R2,R3, R4,R5} Resource instances: • One instance of resource type RO,Two instances of resource type R1, Two instances of resource type R2, Three instance of resource type R3, Two instances of resource type R4, Two instances of resource type R5 Process states: • Process PO is holding an instance of resource type R4 and is waiting for an instance of resource type RO . Process P1 is holding an instance of resource type R1 and is waiting for an instance of resource type R2 and R4. • Process P2 is holding an instance of resource type R2 and R4 and is waiting for an instance of resource type R5. Process P3 is holding an instance of resource type RO,R1,R3,R5, and is waiting for an instance of resource type R2. . a) Draw the RAG b) From the RAG draw the wait for Graph

Answers

In this problem, we have processes P = {P0, P1, P2, P3} and resources R = {R0, R1, R2, R3, R4, R5} with varying instances. To answer the question, we will create a Resource Allocation Graph (RAG) and a Wait-for Graph.

a) Draw the RAG:To construct the RAG, we follow these steps:
1. Create nodes for each process (P0, P1, P2, P3) and resource type (R0, R1, R2, R3, R4, R5).
2. Connect processes to resource nodes to represent held instances.
3. Connect resource nodes to processes to represent requested instances.Here is a textual representation of the RAG:
P0 --Holds--> R4 --RequestedBy--> P1
P0 --Requests--> R0 --HeldBy--> P3
P1 --Holds--> R1 --HeldBy--> P3
P1 --Requests--> R2 --HeldBy--> P2
P1 --Requests--> R4 --HeldBy--> P2
P2 --Holds--> R2 --RequestedBy--> P3
P2 --Holds--> R4
P2 --Requests--> R5 --HeldBy--> P3
P3 --Holds--> R0, R1, R3, R5
P3 --Requests--> R2
b) Draw the Wait-for Graph:To construct the Wait-for Graph, we remove the resource nodes and directly connect the processes that are waiting for resources held by other processes.Here is a textual representation of the Wait-for Graph:
P0 --WaitsFor--> P3
P1 --WaitsFor--> P2
P1 --WaitsFor--> P0
P2 --WaitsFor--> P3
P3 --WaitsFor--> P2
The Wait-for Graph represents the dependencies between the processes waiting for resources held by other processes.

Learn more about Resource here

https://brainly.com/question/12748073

#SPJ11

microsoft has announced a new patch for its operating system. for a platform as a service solution, who would be responsible for applying the patch?

Answers

In a Platform as a Service (PaaS) solution, the responsibility for applying patches and updates to the operating system typically lies with the PaaS provider.

PaaS providers offer a platform on which developers can build, deploy, and manage applications without the need to worry about underlying infrastructure and operating systems. The provider takes care of managing the underlying hardware and software stack, including the operating system.

As part of their service, PaaS providers are responsible for ensuring the security, stability, and maintenance of the platform. This includes applying patches and updates to the operating system to address security vulnerabilities, bug fixes, and performance improvements. The provider is responsible for monitoring and managing the infrastructure to ensure that the underlying operating system is up to date and secure.

Know more about Platform as a Service here:

https://brainly.com/question/32223755

#SPJ11

Which of the following is a location or selection of text which can be named to mark and navigate to different locations?

Endnotes

Footnotes

Bookmarks

Citations

Answers

Answer:

bookmarks because it is able to navigate diffrent locations

Explanation:

which term describes how python assigns the type of a variable? question 34 options: dynamic typing static typing random typing quick typing

Answers

A term that describe the way in which Python assigns the type of a variable is: A. dynamic typing.

What is a variable?

In Computer technology, a variable can be defined as a specific name that references a location in computer memory and it is typically used for storing a value such as a string, an integer, etc.

This ultimately implies that, a variable simply refers to a named location that is used to store data in the memory of a computer. Additionally, it is helpful to think of variables as a container which stores (holds) data that can be changed in the future.

In Python programming, dynamic typing is a terminology that describe the way in which variable types are assigned to functions by Python.

Read more on variable here: https://brainly.com/question/14447292

#SPJ1

hris has received an email that was entirely written using capitalization. He needs to paste this text into another document but also ensure that the capitalization is removed.

What should Chris do?

Answers

He should un caps lock it
Other Questions
The potential at location A is 452 V. A positively charged particle is released there from rest and arrives at location B with a speed vB. The potential at location C is 791 V, and when re- leased from rest from this spot, the particle arrives at B with twice the speed it previously had, or 2vB. Find the potential at B. The sum of five times a number and four is equal to negative eleven. What is the number?-4-5-2-3 Help me find x value please. Which of the following pairs of charts are used together? Select one: a. R-chart and p-chart b. R-chart and s-chartc. -chart and p-chart d. -chart and R-chart A. Identify the items found in your classroom..1.Hago mi tarea en la A balloon whose volume is 800 m3 is to be filled with hydrogen at atmospheric pressure (1.01105Pa).Part AIf the hydrogen is stored in cylinders with volumes of 1.95 m3 at a gauge pressure of 1.23106 Pa , how many cylinders are required? Assume that the temperature of the hydrogen remains constant.N =Part BWhat is the total weight (in addition to the weight of the gas) that can be supported by the balloon if the gas in the balloon and the surrounding air are both at 15.0 C?The molar mass of hydrogen (H2) is 2.02 g/mol. The density of air at 15.0 C and atmospheric pressure is 1.23 kg/m3.W =NPart CWhat weight could be supported if the balloon were filled with helium (with a molar mass of 4.00 g/mol) instead of hydrogen, again at 15.0 C?N which is the most therapeutic instruction for the nurse to provide to a client with severe preeclampsia PLS HELP, WLL GIVE BRAINLEST, AND DONATE POINTS, PLEASE HELP ASAP!!!!!! ALSO GIVING 30 POINTS i need help with geometry! compare the light-gathering power of a 10 m keck telescope with that of a 0.5 m telescope. The profile height of the tire sidewall (from bead to tread) is 117 mm. The height of the rim is 381 mm. What is the total height of the rim and tire together? Which equation represents the nth term of the sequence {2, -1, -4, -7, ...} ?A. an = 2n-5B. an = 3n-1C. an = -3n-10D. an = -3n+5 FILL IN THE BLANK. on average ______ of those exposed to hcv by needlestick accident will develop hepatitis c. Answer the following questions to capture how you see yourself in terms of values, aspirations, key qualities, goals, strengths, and areas of growth:1) Describe your values, motivations or aspirations in your own words.2) Describe some of your main personal, academic, and professional goals. Make sure to write five or more complete sentences.3) What are some of your strength areas? Think about the top 23 skills you would advertise about yourself, or consider what others come to you for advice about. Make sure to write five or more complete sentences.4) What are some areas you would like to grow and improve in? Make sure to write five or more complete sentences. Rewrite the poem we both parted ways .you Focus particularly on making your rewrite read like a modernist poemnin terms of its language, style, literary elements, and themes. Be sure to incorporate into your rewrite at leastthree of the six qualities of modernist poetry listed below. Budgeting is the __________ based on a determined structure. need to know the answers for this proof Boeing Corporation has just issued a callable (at par) three-year, 5.2% coupon bond with semi-annual coupon payments. The bond can be called at par in two years or anytime thereafter on a coupon payment date. It has a price of $98.67. a. What is the bond's yield to maturity? b. What is its yield to call? c. What is its yield to worst? a. What is the bond's yieid to maturity? The bons yield to maturity is of (Round to two decimal places.) b. What is its ylold to call? What is the role of enzymes primase in the DNA replication?A. Primase relaxes the DNA double helix so that other enzymes can reach the DNA.B. Primase initializes replication by building short RNA primer complementary to the template. C. Primase seals any gaps between Okazaki fragments or Fragments of DNA. D. Primase is the enzyme that connects the ribosome to the DNA. Look at this piece of pottery. This piece of art was created using: O A. frieze carving. O B. the red-figure technique. C. tempera paints. D. foreshortening.