fill in the blank. question 12 0 / 5 pts a researcher interested in identifying what smartphone technology aids student comprehension of college-level coursework would best be served by using___research. correlational applied theoretical ethnographic

Answers

Answer 1

A researcher is interested in identifying what smartphone technology aids student comprehension of college-level coursework and would best be served by using applied research.

Applied research is a type of research that is focused on solving practical problems or answering specific questions related to real-world issues. It is often conducted in a controlled or experimental setting, and it involves the application of theoretical knowledge to practical problems.

In the case of the researcher interested in identifying what smartphone technology aids student comprehension of college-level coursework, applied research would involve conducting experiments or studies to determine the effectiveness of different smartphone technologies on student learning outcomes. This could involve measuring student comprehension before and after using a particular smartphone technology, comparing the performance of students who use different technologies, or testing different instructional approaches that incorporate smartphone technology.

To get a similar answer on research :

https://brainly.com/question/8353185

#SPJ11


Related Questions

Which is the best model of Dell Latitude laptop?

Answers

The Dell 9330 is one of the best mobile performance laptops, according to the Dell Latitude 9330 2-in-1. A classy, professional compact.

Is the Dell Latitude an outmoded model?

Dell Latitudes were introduced in 2012, therefore they are now fairly dated. For the price of a cheap Chromebook, you can still buy a certified Dell Latitude E6430. By 2016 standards, the old Latitude's specs are still respectable.

The ideal Dell laptop for daily use?

This laptop, which combines incredible power in a sleek thin and light chassis, doesn't skimp on internal components or features that enhance your computing experience as a whole, making it the finest Dell laptop of 2022.

To know more about Dell Latitude laptop visit:-

https://brainly.com/question/15502347

#SPJ4

explain why the computer is powerful working tool???​

Answers

Answer:

here ya go

Explanation:

A computer is a powerful tool because it is able to perform the information processing cycle operations (input, process, output, and storage) with amazing speed, reliability, and accuracy; store huge amounts of data and information; and communicate with other computers.

Using the property_ value.csv file on Moodle, create two pie charts representing the property values in US vs. Myrtle Beach for the year 2020. Your pie slice labels would be the value bucket column. Use the share column for the pie percentages.

Using the property_ value.csv file on Moodle, create two pie charts representing the property values

Answers

A graphical representation method known as a pie chart shows data as a graph with a circular form.

What is piechart?

It is a static composite chart that performs best when there are few variables. Pie charts are frequently used to display sample data, where each data point represents a mix of various categories. A "slice of the pie" is used to illustrate each of these categories.

The quantity of data points that fall into each category determines the size of each slice in a direct proportion.

Consider a pie chart showing the monthly sales for a retail store as an illustration. The slices stand in for the sales of toys, furniture, home accessories, and electronics.

Therefore, A graphical representation method known as a pie chart shows data as a graph with a circular form.

To learn more about Pie chart, refer to the link:

https://brainly.com/question/9979761

#SPJ1

Use parallel and highway in a sentence

Answers

Answer:

The road ran parallel to the highway, with the Uncompahgre River separating the unpaved road from the main thoroughfare to the east.

Answer:

QUESTION:

Use parallel and highway in a sentence

ANSWER:

We were on the highway parallel to the train tracks.

Explanation:

Hope that this helps you out! :)  

If any questions, please leave them below and I will try my best and help you.  

Have a great rest of your day/night!  

Please thank me on my profile if this answer has helped you!

Which of the following is NOT one of the purposes of establishing a security policy for an organization? Question 1 options: Providing legal support for any intrusion or unauthorized use of information. Preventing and monitoring loss of information. Absolving users of individual liability on the network systems. Protecting the value of vital corporate information.

Answers

Answer:

Initially, national security was defined as the government's ability to protect its citizens from military attacks. Today, this definition also includes other non-military areas such as defense against crime and terrorism, economic security, environmental security, food security, energy security and cyber security.

Miriam Is a network administrator. A few employees want to access sensitive Information stored on a backup device. She wants to give access
rights these employees. Which option will she use?
ОА.
remote desktop
ОВ.
monitoring service
Oc.
user accounts
OD.
print service
OE.
directory service

Miriam Is a network administrator. A few employees want to access sensitive Information stored on a backup

Answers

Answer:

C. user accounts

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list primarily is composed of a set of permissions and operations associated with a NTFS file such as full control, read only, write, read and execute and modify.

Generally, access control list are defined for specific user accounts and may either be an administrator, standard user or guest account.

In this scenario, Miriam a network administrator wants to give access rights to employees who are interested in accessing sensitive Information stored on a backup device. Thus, the option Miriam should use is user account.

Answer:

user accounts

Explanation:

What property of virtualization allows entire virtual machines to be saved as file that can moved or copied like any other file?
Question 2 options:
Isolation
Hardware Independence
Partitioning
Encapsulation

Answers

The property of virtualization that allows entire virtual machines to be saved as a file, which can be moved or copied like any other file, is known as Encapsulation. Correct answer: letter D.

This is because the entire virtual machine is encapsulated in a single file. This single file can be moved or copied like any other file, allowing for greater flexibility in the use of virtual machines. With this property, entire virtual machines can be backed up and moved to different dates or even to different computer systems.

What are virtualization properties?

Are the characteristics of virtualization that allow for efficient use of hardware and software resources. Examples of virtualization properties include:

EncapsulationVirtual machinesVirtual networksCloud computingVirtual storage

These properties allow for increased flexibility, scalability, and cost savings when using virtualized resources. They also allow for better security, by allowing for the separation of resources and allowing for multiple layers of security. Virtualization properties also allow for greater performance, by allowing for more efficient use of hardware resources.

Learn more about virtualization properties:

https://brainly.com/question/12972001

#SPJ4

which of the following infix expressions corresponds to the given postfix expression? 3 5 4 2 3 6 / * - ^

Answers

The given postfix expression is: 3 5 4 2 3 6 / * - ^

To convert it to an infix expression, we can use a stack to keep track of the operators and operands. We start by scanning the postfix expression from left to right.

Here is the step-by-step conversion:

Read "3":

Push it onto the stack.

Read "5":

Push it onto the stack.

Read "4":

Push it onto the stack.

Read "2":

Push it onto the stack.

Read "3":

Push it onto the stack.

Read "6":

Push it onto the stack.

Read "/":

Pop the top two operands from the stack: 6 and 3.

Enclose them in parentheses: (6 / 3).

Push the result back onto the stack.

Read "*":

Pop the top two operands from the stack: (6 / 3) and 2.

Enclose them in parentheses: ((6 / 3) * 2).

Push the result back onto the stack.

Read "-":

Pop the top two operands from the stack: ((6 / 3) * 2) and 4.

Enclose them in parentheses: (((6 / 3) * 2) - 4).

Push the result back onto the stack.

Read "^":

Pop the top two operands from the stack: (((6 / 3) * 2) - 4) and 5.

Enclose them in parentheses: ((((6 / 3) * 2) - 4) ^ 5).

The corresponding infix expression is: ((((6 / 3) * 2) - 4) ^ 5).

Therefore, the answer is the last option: ((((6 / 3) * 2) - 4) ^ 5).

Learn more about operators  here:

https://brainly.com/question/32025541

#SPJ11

If you wanted a smartphone with the fewest restrictions on application development which smartphone operating system should you choose

Answers

Answer:

Apple iOS

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Basically, softwares are categorized into two (2) main categories and these are;

I. Proprietary software: it's also known as a closed-source software and it can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer.

II. Open-source software: it's a type of software in which end users are granted the permission to use, study, modify, copy and share the software with its source code anyhow.

An Apple iOS is an example of an operating system that has the open-source software features and as such its users are faced with minimal restrictions on application development.

This ultimately implies that, if you wanted a smartphone with the fewest restrictions on application development the smartphone operating system you should choose is Apple iOS.

―Connectivity is Productivity‖- Explain the statements.

Answers

connectivity is productivity. It’s true for a modern office, and also for any place – for an undeveloped village.

what is the name of the statement used for providing calculations in pseudocode​

Answers

Answer:

processing statement

Explanation:

processing statement is used to perform calculation or assignment.

An ad agency is interested in keeping track of their clients a little more easily. Help them out by creating two ArrayLists :


1. Create an ArrayList called company Name that stores an ArrayList of all the company names.


2. Create an Integer ArrayList called contractValue that stores the value of the contract that the ad agency has with its clients.

Answers

Answer:

Explanation:

The only things requested in this question were the two Arraylists. These following arraylists need to be called and values need to be added to them by the corresponding code. At the moment they would be empty.

1.         ArrayList<String> Names = new ArrayList<>();

2.        ArrayList<Integer> contractValue = new ArrayList<>();

They can be added to any code or in the main method as long as they are within the scope of the code that will be calling them.

Which kind of a person will you be if you prove to be accountable for your actions?

Answers

Answer: You would be a person of integrity.

Explanation: Look up Integrity for details.

.To what extent can a pie chart be rotated?
Up to 360 degrees
Up to 180 degrees
Up to 45 degrees
Up to 90 degrees

Answers

The rotation is usually done by dragging the chart with a mouse or touchpad, and it can be rotated in any direction up to 360 degrees, allowing the viewer to see the chart from all angles.

A pie chart is a circular chart that is divided into sectors to represent numerical proportions. Each sector's size is proportional to the quantity it represents. The chart's main purpose is to display the relative sizes of different categories in a dataset. The chart's slices or sectors are typically arranged in a clockwise direction, with the first slice starting at 12 o'clock. The chart can be rotated to show different perspectives or highlight specific slices of data.
However, it's essential to note that rotating a pie chart can sometimes make it difficult to read or understand the data it represents. For instance, if the chart is rotated too much, it might become challenging to compare the size of different sectors accurately. As a result, it's essential to use discretion when rotating pie charts to ensure that the data remains clear and understandable

Learn more about pie chart here:-brainly.com/question/1109099

#SPJ11

what is output by the following?
print("/\\")
print("\\/")​

Answers

Answer:

/\\

\\/

Explanation:

It literally says it. :skull:

The ______ tab is a contextual tab and displays only when media content on your slide is selected

Answers

The complete statement is:

The Table Tools tab is a contextual tab and displays only when media content on your slide is selected

How to determine the tab

There are several tabs in Microsoft Office packages

Some of these tabs include

Home Page layoutReview and ViewEtc

Of all the available tabs in these packages, the table tool tab is contextual.

This is so because it is not display unless the media is selected

Read more about tabs at:

https://brainly.com/question/14139335

when using the​ _______ always be careful to avoid​ double-counting outcomes.

Answers

When using the "inclusion-exclusion principle," always be careful to avoid double-counting outcomes.

The inclusion-exclusion principle is a fundamental principle in combinatorics used to count the number of elements in the union of multiple sets. It helps calculate the size of the union by considering the sizes of individual sets and their intersections. However, when applying the inclusion-exclusion principle, there is a risk of double-counting outcomes if not done carefully.

The principle states that to find the size of the union of sets A, B, C, and so on, one must sum the sizes of the individual sets minus the sizes of their intersections. However, in doing so, it is important to subtract the overlapping elements only once to avoid counting them multiple times.

To prevent double-counting, one must identify and exclude the common elements among the sets. By subtracting the intersections of the sets, we ensure that each element is counted only once in the final result, providing an accurate count of the desired outcome.

Therefore, when applying the inclusion-exclusion principle, it is crucial to exercise caution and take appropriate measures to avoid double-counting outcomes and obtain accurate results.

To learn more about element  click here

brainly.com/question/33722029

#SPJ11

Answer:

When using the "inclusion-exclusion principle," always be careful to avoid double-counting outcomes.

The inclusion-exclusion principle is a fundamental principle in combinatorics used to count the number of elements in the union of multiple sets. It helps calculate the size of the union by considering the sizes of individual sets and their intersections. However, when applying the inclusion-exclusion principle, there is a risk of double-counting outcomes if not done carefully.

The principle states that to find the size of the union of sets A, B, C, and so on, one must sum the sizes of the individual sets minus the sizes of their intersections. However, in doing so, it is important to subtract the overlapping elements only once to avoid counting them multiple times.

To prevent double-counting, one must identify and exclude the common elements among the sets. By subtracting the intersections of the sets, we ensure that each element is counted only once in the final result, providing an accurate count of the desired outcome.

Therefore, when applying the inclusion-exclusion principle, it is crucial to exercise caution and take appropriate measures to avoid double-counting outcomes and obtain accurate results.

Explanation:

The code segment below is intended to swap the values of the variables first and second using a temporary variable, temp.


first <- second
second <- temp

Which of the following can be used to replace < MISSING CODE > so the code segment works as intended?
second <- first

second <-temp

temp <- first

temp <- second

Answers

The correct replacement for < MISSING CODE > is temp <- first.

How can this be done?

To swap the values of the variables first and second using a temporary variable temp, you need to assign the value of first to temp before assigning the value of second to first.

Here's the corrected code segment:

tpemp <- first

first <- second

second <- tem

In this code, we're swapping values of two variables: first and second. First, we store first's value in temp. Next, we replace first with second's value. Finally, we assign temp (the original first value) to second, completing the swap.

Read more about code here:

https://brainly.com/question/26134656

#SPJ1

Which import option is not supported in Access 2016?

from Access
from Excel
from PDF
from Text file

Answers

Answer: from PDF(C)

Explanation:

Took it on edg

Answer:

C

Explanation:

which group on the home tab contains the command for changing the fill color of a cell?

Answers

The group on the home tab that contains the command for changing the fill color of a cell is called the Styles group.

This group is usually located near the middle of the "Home" tab and contains commands related to formatting cells and ranges in Excel.

The command for changing the fill color of a cell is typically represented by a paint bucket icon, and it can be found in the Styles group. When you click on the icon, a color palette will appear and you can choose the color you want to use to fill the cell. You can also use the "More Colors" option to select from a wider range of colors.

Additionally, you can also access the fill color option by right-clicking on the cell and selecting "Format Cells" from the context menu. Then, in the Format Cells dialog box, navigate to the "Fill" tab.

It's worth noting that this group and its commands may vary depending on the version of Excel you are using. But in general, the Styles group contains commands related to formatting cells and ranges, including the fill color.

Learn more about Styles group at:

brainly.com/question/2986242

#SPJ4

when debugging a program, it is helpful to focus on the most likely location of the error in the code
True
False

Answers

true!! it’s better to have an idea of what and where the program is having trouble with so you can take that knowledge and debug it
The correct choice is True

what guidance identifies fedseral information security controls

Answers

The guidance that identifies federal information security controls is the National Institute of Standards and Technology (NIST) Special Publication 800-53.

This publication provides a comprehensive set of security controls and guidelines for federal information systems in the United States.The National Institute of Standards and Technology (NIST) Special Publication 800-53 is a widely recognized guidance document that identifies federal information security controls. It is developed by NIST in collaboration with various government agencies and private sector organizations. The publication provides a comprehensive catalog of security controls and guidelines that federal agencies must implement to protect their information systems.

NIST SP 800-53 outlines a set of controls that address various aspects of information security, including access control, incident response, risk management, configuration management, and more. These controls are based on industry best practices, standards, and regulations. They are designed to help federal agencies establish a robust security posture and safeguard sensitive information from unauthorized access, disclosure, and alteration.

The controls defined in NIST SP 800-53 serve as a framework for federal agencies to assess their security requirements, develop security plans, and implement security measures. The publication provides detailed guidance on the selection, implementation, and assessment of security controls. It also emphasizes the importance of continuous monitoring and periodic reviews to ensure the effectiveness of the implemented controls.

In summary, the guidance that identifies federal information security controls is the NIST Special Publication 800-53. This publication plays a crucial role in establishing information security requirements for federal agencies in the United States. It provides a comprehensive catalog of security controls and guidelines based on industry best practices, helping agencies protect their information systems and sensitive data from potential threats. Compliance with these controls is essential for ensuring the confidentiality, integrity, and availability of federal information systems.

Learn more about Technology here:- brainly.com/question/9171028

#SPJ11

Give a recursive solution to the following problem. State the requirements for a recursive solution, and justify that your solution satisfies each requirement. Input: int[] nums Output: The sum of the values, i.e., nuns [0] + nums [1] + nums [2] + ...

Answers

The recursive solution to the following problem. State the requirements for a recursive solution, and justify that your solution satisfies each requirement.

Recursion is a procedure that can be repeated over and over. When a process refers to itself, it is known as recursion. Recursion is typically used to resolve issues that may be broken down into simpler or similar subproblems.

For a recursive solution, there are a few criteria that must be met: Stopping criterion – There must be some point at which the recursion ends. The criteria for stopping determine when to halt the recursion. Development towards the end – The procedure must move toward the stopping criterion.

In order to obtain a recursive solution for the problem of adding up values, you may start with the following code:```int sum(int[] nums, int index, int n){if(index == n) return 0; else return nums[index] + sum(nums, index + 1, n);} ```In this code, the sum() function accepts an array, a starting index, and the number of elements in the array. If the starting index is equal to the array's length, 0 is returned; otherwise, the value at the current index is added to the recursive call sum(nums, index + 1, n) of the sum function.

The result is the sum of all of the values in the array. If there is no issue, this recursive solution satisfies the criteria for recursive solutions, which are a stopping criterion and development towards the end.

To know more about recursive solutions here:

brainly.com/question/32069961

#SPJ11

At least 3 facts I learned about our Amazon Volunteer or their career experience:

Answers

Answer:

Amazon's Global Month of Volunteering includes hundreds of partners. Tens of thousands of employees around the world are coming together to support over 400 organizations in their local communities.

What is micro computer? List out the types of microcomputer. What is micro computer ? List out the types of microcomputer .​

Answers

A full-featured computer designed for single-use on a smaller size is known as a microcomputer.

What exactly is a microcomputer?

A full-featured computer designed for single-use on a smaller size is known as a microcomputer.

A single-chip microprocessor-based device is now more commonly referred to as a PC, replacing the outdated name "microcomputer." Laptops and desktops are examples of typical microcomputers.

The types of microcomputers are;

Desktop Computer

Laptop

Smartphone

Notebook

Tablet

Hence, a full-featured computer designed for single-use on a smaller size is known as a microcomputer.

To learn more about the microcomputer refer;

https://brainly.com/question/21219576

#SPJ1

The coalesce function provides one way to substitute constant values for _________________ values.

Answers

The coalesce function provides one way to substitute constant values for null values.

What is a coalesce function?

Is a function that returns the first non-NULL value from a series of expressions. The expressions are evaluated in the order in which they are specified, and the result of the function is the first value that is not null. The result of the COALESCE function returns NULL only if all the arguments are null.

Data type determination of the resulting expression is different. ISNULL uses the data type of the first parameter, COALESCE follows the CASE expression rules and returns the data type of value with the highest precedence.

See more about coalesce function at brainly.com/question/14970953

#SPJ1

In Full Screen Reading View, which area is reduced?
O document
O toolbars
O Save options A
O Go To options

Answers

In Full Screen Reading View, the toolbars area is reduced.

What i the difference between pa-by-value and pa-by-reference in computer programming?

Answers

Use pass by value when the parameter is only "used" for a computation and not changed for the client program.

What distinguishes pass by reference from pass by value?

Pass by reference refers to a method of sending the function's real parameters, whereas pass by value refers to a method of copying the value of a function parameter to another variable. In light of this, the primary distinction between pass by value and pass by reference is this.

A copy of the address of the real argument is saved when using pass by reference, which is also known as pass by address.

To know more about pass-by-reference visit:-

https://brainly.com/question/23838498

#SPJ4

Type the correct answer in the box. What is the output of the formula =NOT(12+12=24)? The output of the formula =NOT(12+12=24) is .

Answers

Answer:

In a programming language, the formula is that it is printing out whatever equation is NOT 12+12. This would mean it's printing out any other number than 24, or 12.

Explanation:

I hope this helps

What is the result when you run the following line of code after a prompt?

>>> print "Good job"

A. No result due to an error
B. Good job
C. 'Good job'
D. "Good job"

Answers

A syntax mistake will appear in the code. Although being written in Python 2 syntax, the code print "Nice job" will produce a syntax error if run in Python 3.

While the code print "Excellent job" is written in Python 2 syntax, if it is run in Python 3, a syntax error will occur. In Python 3, print is a function and the parameter must be enclosed in parentheses. Thus, print would be the appropriate syntax for the code in Python 3. ("Good job"). In contrast, the code would produce "Excellent job" without quotation marks in Python 2. Even in Python 2, it is wise to use parentheses for the print statement. Thus, it is advised to use print("Nice work") in Python 3 and print "Good job" in Python 2 to prevent mistakes and preserve consistency.

Learn more about code here:

https://brainly.com/question/17204194

#SPJ4

Other Questions
You will complete an Informational Research Chart for a problem/solution article by gathering information on an everyday monster.Select the Informational Research Chart.Important: Immediately save the worksheet to your computer or drive.Select one everyday monster to research. You may choose from the vulture, the Komodo dragon, or the jellyfish.Begin your research by using the source provided for your everyday monster.Vulture sourceKomodo Dragon sourceJellyfish source(Optional step) Locate a second online or printed source if you need additional information.Fill out information in each box of your Informational Research Chart.Save your work to your computer or drive.Submit your work in 02.04 Researching and Organizing Information.If you cannot save your worksheet, you can type the information into a document and submit. Which paintings or element did you find most interesting in the article about Thomas Hart Benton? Why? Assume you are the project manager for the tidal 2 software project. You have been asked to calculate the expected cost for the project. Your companys database indicates that developers can handle eight function points each person-month and that the cost per developer at your firm is $7,600 per month. You and your team of five developers have come up with the following requirements: What details does the speaker use to contrast life in her fathers original culture and life in the city? What tone is used to describe these two settings? without title Which is the solution to p7+11>15? Let X be a continuous random variable with E(X)=i! for i=0,1,2,.... (a) Show that X has an exponential distribution. State its parameter. (a) If X, X,..., X are independent observations for X the lpn/lvn is having difficulty interpreting an order left by a healthcare provider on rounds. which resource should be used for clarification? What are the components of digital twin? a. Artificial intelligence, loT b. cloud-based access, Artificial intelligence, Bigdata, IoT c. Bigdata, loT, cloud-based access d. IoT, cloud-based access, Ar A bacteria culture initially contains 2500 bacteria and doubles every half hour.Find the size of the bacterial population after 20 minutes. Find the size of the bacterial population after 8 hours. Quick check 3 Find slope What was one impact of the Agricultural Adjustment Act (AAA)?A.It provided loans for sharecroppers and tenant farmers.B.It increased the amount of food in the country.C.It provided money to farms to produce less crops which reduced overproduction.D.It restored confidence in banks.Please Help!!!!!!!!!! 7. A dolphin is swimming at a depth of-50 feet and then ascends a certainnumber of feet to a depth above -35 feet.Determine the number of feet the dolphinascended. Then interpret the solution. Exercise 6.11 presents the results of a poll evaluating support for a generic "National Health Plan" in the US in 2019, reporting that 55% of Independents are supportive. If we wanted to estimate this number to within 1% with 90% confidence, what would be an appropriate sample size? Public defenders and assigned counsel perform similar roles, though there are differences. Which of the following are characteristics of public defenders, assigned counsel, or both?a) assigned to capital casesb) salaried defense lawyers funded by the statec) available to defendants who cannot afford private counseld) The most common form of defense for poorer defendants in most countiese) private lawyers appointed by judges to offer legal representation to poor clientsPublic Defendersb) salaried defense lawyers funded by the stateBotha) assigned to capital casesc) available to defendants who cannot afford private counselAssigned Counseld) The most common form of defense for poorer defendants in most countiese) private lawyers appointed by judges to offer legal representation to poor clients Does anyone know how to do this if so please help immediately!!!Ill give you brainlist answer and points!!! After it is labeled, the diagram below will illustrate photosynthesis. Write each of the following terms on the correct numbered line. Then answer the questions that follow. Carbon dioxide Chlorophyll Light Glucose 1. 2. 3. Oxygen Water In converting a bank's balance sheet to a weighted balance sheet according to risk-based capital guidelines, $10 Million investment portfolio of U.S. Treasuries would carry a ______ % weight and would then equal $________ for capital adequacy purposes. PLEASE HELP QUESTION IN PICTURE 15 POINTS Degree and Radian MeasuresConvert the given radian measure to a degree measure.1.2 /pi ()a. -216b. 108c. 216d. -108Please select from the best choices provided An MRI would most likely be used to?A. locate a blood clot B. identify a brain tumor C. find a fracture in a leg bone D. determine the skin of a unborn child