TINKERCAD ONLY TINKERCAD ONLY TINKERCAD ONLY

In Tinkercad, design a system capable to condition the output voltage from the sensor (MIN temp to MAX temp) to enter an analog port of an Arduino system (0V to 5V), the temperature in celsius as well as in Farenheit, must be displayed in a LCD.

Take a screenshot and upload it in this space

Answers

Answer 1

Here is the C++ code for Temperature Conversion and LCD Display:

#include <Wire.h>

#include <LiquidCrystal_I2C.h>

LiquidCrystal_I2C lcd(0x27, 16, 2);  // I2C address may vary, use I2C scanner if necessary

const int sensorPin = A0;

void setup() {

 lcd.begin(16, 2);

 lcd.print("Temperature:");

 lcd.setCursor(0, 1);

 lcd.print("C:    F:");

}

void loop() {

 int sensorValue = analogRead(sensorPin);  

 float voltage = sensorValue * (5.0 / 1023.0);

 float temperatureC = (voltage - 0.5) * 100.0;

 float temperatureF = (temperatureC * 9.0 / 5.0) + 32.0;

 lcd.setCursor(2, 1);

 lcd.print("     ");  // Clear previous values

 lcd.setCursor(2, 1);

 lcd.print(temperatureC, 1);  

 lcd.setCursor(9, 1);

 lcd.print("     ");  // Clear previous values

 lcd.setCursor(9, 1);

 lcd.print(temperatureF, 1);

 delay(1000);

}

Learn more about Tinkercad here:

https://brainly.com/question/30901982

#SPJ11


Related Questions

1. You are designing a program that will keep track of the boxes in a doctor’s office. Each box will have three attributes: date, contents, and location. Write a class that will consist of box objects.

Answers

Answer:

Public class Box

{

private String myDate;

private String myContents;

private String myLocation;

public class Box(String date, String contents, String location)

{

myDate = date;

myContents = contents;

myLocation = location;

}

}

Hope this is what you're looking for! If not, let me know and I can try to help more. :)

Each box will have three attributes: date, contents, and location. It is class box.

What is class box?

There is a method in the box class of this program. Box is a brand-new data type for the class.

Box is used to declare objects of this type as having double height; Class declaration just generates a template; it does not generate any actual objects. None of the objects of type are affected by this code. Box void volume

Therefore, Each box will have three attributes: date, contents, and location. It is class box.

To learn more about class box, refer to the link:

https://brainly.com/question/14427083

#SPJ2

A pedometer treats walking 1 step as walking 2.5 feet. Define a function named FeetToSteps that takes a double as a parameter, representing the number of feet walked, and returns an integer that represents the number of steps walked. Then, write a main program that reads the number of feet walked as an input, calls function FeetToSteps() with the input as an argument, and outputs the number of steps.

Answers

In computing, it should be noted that a program is a specific set of ordered operations that is given to the computer to perform. The program based on the information given is illustrated below

How to depict the program?

The program will be:

import java.util.Scanner;

public class LabProgram {

   public static int feetToSteps(double userFeet){

       return (int) (userFeet/2.5);

   }

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       double userFeet = in.nextDouble();

       int steps = feetToSteps(userFeet);

       System.out.println(steps);

   }

}

In conclusion, the program is shown above.

Learn more about programs on:

https://brainly.com/question/1786465

#SPJ1

pls help
Question 2 (1 point)
True or false: when you use someone's copyrighted work in something you are
selling, you only have to cite them.

Answers

The given statement of copyrighted work is false.

What do you mean by copyright?

A copyright is a type of intellectual property that grants the owner the exclusive right to copy, distribute, adapt, display, and perform a creative work for a specific period of time. The creative work could be literary, artistic, educational, or musical in nature. The purpose of copyright is to protect the original expression of an idea in the form of a creative work, not the idea itself. A copyright is subject to public interest limitations, such as the fair use doctrine in the United States.

When you use someone's copyrighted work in something you are selling, you must get their permission first.

To learn more about copyright

https://brainly.com/question/357686

#SPJ13

What are the Key Process Areas for CNNi Level 2?

Answers

The Key Process Areas (KPAs) for CNNi Level 2 are as follows: 1. News-gathering 2. Storytelling 3. Delivery 4. Technical Production 5. Teamwork 6. Communication 7. Planning and Organization 8. Initiative 9. Professionalism 10. Personal Development

The Key Process Areas (KPAs) are general categories of abilities and accomplishments that all journalists at CNN International should have, regardless of their specialty or role. KPAs are intended to outline a range of abilities that a CNNi journalist should have at each level. The ten KPAs at Level 2, as previously noted, are News-gathering, Storytelling, Delivery, Technical Production, Teamwork, Communication, Planning and Organization, Initiative, Professionalism, and Personal Development.

KPAs, in general, are used to evaluate a journalist's professional growth and advancement potential. They represent a framework of anticipated behaviors and actions that journalists should demonstrate in order to advance to the next level.

Learn more about KPA's: https://brainly.com/question/9940533

#SPJ11

Which of these should be included in a program's comments?

a. code to set the parameters of a shape

b. a description of what the program does

c. a description of how long it took to write the code

d. code for inserting a background

Answers

Answer:

B

Explanation:

Comments in code are primarily used to describe what the program does, and how chunks of the code running the program help relate to what the program does. Comments in code are not primarily used for answers d & a, which is more code, since if you comment, the compiler doesn't notice the code, so it doesn't work. Comments in code are not used for c either, since it's not really needed to write that in the comments.

Use the ______ element to create a generic area or section on a web page that is physically separated from others

Answers

Use the div element to create a generic area or section on a web page that is physically separated from others.

In the field of computers, div can be described as a special container that is used in order to make a specific generic area or a particular section on a web page.

The 'div' element stands for division as this element causes a division to be made on the webpage. The div tags are used for multiple purposes such as web layouts.

It is due to the div element that content can be grouped in a webpage that makes it look more attractive and reliable. Without the div element, data will not be understood properly on a webpage and might be misunderstood by the reader.

To learn more about a webpage, click here:

https://brainly.com/question/14552969

#SPJ4

Corinne would like to click on the link at the bottom of a Web page but she only sees the top portion of the page. She should _____. A.click twice on the status bar
B.use the scroll bar to scroll down to the bottom of the page
C.click on the back button
D.click on the display window and drag it up

Answers

Answer:

B

Explanation:

from 3dg3

Answer:

D.click on the display window and drag it up

writte a short note on my computer​

Answers

a note is a note <3 <3<3

a note‍♀️‍♀️‍♀️‍♀️‍♀️‍♀️‍♀️‍♀️‍♀️

Which of the following statements is true regarding local area networks? SELECT 3 OPTIONS.
A: traditionally used Ethernet cables to connect devices
B: can include wired and wireless connections
C: often used in homes and small businesses
D: uses satellite technology for connections
E: connects devices in a large geographic area

Answers

Answer:

A, B and C are correct

Explanation:

A : yes, they did use ethernet cables.

B : Lan networks connected via wires are called , "LAN" and LAN networks that connect to devices wirelessly are called, "WLAN" (Wireless Local Area Networks).

C : LAN networks are a type of network that is based in a small geographical area, therefore, it can be used in homes and small businesses.

Statements that can be considered to be true about local area networks in this question are;

A: traditionally used Ethernet cables to connect devices

B: can include wired and wireless connections

C: often used in homes and small businesses

Local area network can be regarded as is group of two or more connected computers which are positioned in  a small geographic area, it could just a small building.

This connection can be a wired connection, it can also be a wireless connection.

Example if this network is Home networks ,another one is small business networks.

Therefore, option A,BC are all correct.

Learn more at:

https://brainly.com/question/22245838?referrer=searchResults

if you want to mask (or spoof) your ip address, what type of scan should you use?

Answers

If you want to mask or spoof your IP address, the type of scan you would use is called a "TCP/IP stealth scan" or simply a "stealth scan."

A stealth scan is a scanning technique used to gather information about target systems without revealing the true source IP address. It is commonly employed for security testing and penetration testing purposes.

In a stealth scan, the scanning tool sends packets to the target system with specific TCP flags set, such as the SYN flag. The tool expects certain responses from the target system to determine the status of ports or services without establishing a full connection.

The objective is to avoid detection and maintain anonymity by concealing the true IP address.

By spoofing the source IP address, the stealth scan makes it appear as if the scan is originating from a different IP address than the actual one.

This helps to obfuscate the true identity of the scanning system and protect against potential retaliation or identification by the target system or network administrators.

It's important to note that while stealth scans can be useful for certain legitimate security purposes, it's crucial to ensure that their usage complies with applicable laws and regulations.

Engaging in unauthorized activities or attempting to hide malicious intent through IP address spoofing is illegal and unethical.

Learn more about IP address:

https://brainly.com/question/14219853

#SPJ11

which of the following file names would comply with a Windows operating system? .Budget2014 Budget_Proposal? Budget_Proposal_2014 Budget_Proposal/2014

Answers

Answer:

A and C

Explanation:

Based on my computers saving process, A and C both worked while B and D didn't. I tried all four names on a PowerPoint Presentation and only A and C saved.

This is assuming I read your options correctly, I tried the following

.Budget2014

Budget_Proposal?

Budget_Proposal_2014

Budget_Proposal/2014

Based on the information in the table below, which men could not be the father of the baby? Justify your answer with a Punnett Square.
Name
Blood Type
Mother
Type B
Baby
Type A
Father 1
Type A
Father 2
Type AB
Father 3
Type O
Father 4
Type B

Answers

Given the table :Name Blood Type Mother Type B Baby Type A Father 1Type A Father 2Type AB Father 3Type O Father 4Type B To find out which men could not be the father of the baby, we need to check their blood types with the mother and baby’s blood type.

If the father’s blood type is incompatible with the baby’s blood type, then he cannot be the father of the baby .The mother has Type B blood type. The baby has Type A blood type. Now let’s check the blood type of each possible father to see if he could be the father or not .Father 1:Type A blood type. The Punnett square shows that Father 1 could be the father of the baby. So he is not ruled out. Father 2:Type AB blood type. The Punnett square shows that Father 2 could be the father of the baby. So he is not ruled out. Father 3:Type O blood type. The Punnett square shows that Father 3 could not be the father of the baby. He is ruled out as the father of the baby. Father 4:Type B blood type. The Punnett square shows that Father 4 could be the father of the baby. So he is not ruled out.Thus, based on the given information in the table, only Father 3 (Type O) could not be the father of the baby.

To know more about Punnett square visit :-

https://brainly.com/question/32049536

#SPJ11

Austin General Hospital is evaluating new lab equip ment. The interest rate is 12% and in each case the equipment's useful life is 5 years. Use NPW analysis to pick which company you should purchase from. 5-64 Company $13,500 $20,000 $15,000 1,500 1,800 1,100 Annual benefit 9,500 11,000 9,000 Salvage value 3,500 6,000 4,000 First cost O&M costs

Answers

Austin General Hospital is evaluating new lab equipment from three different companies. The interest rate is 12% and the useful life of the equipment is 5 years. We will use the Net Present Worth (NPW) analysis to determine which company's equipment should be purchased based on their costs, benefits, salvage value, and operating and maintenance (O&M) costs.

To perform the NPW analysis, we calculate the present worth of each cash flow associated with the equipment over its useful life and compare them.

For Company 5-64:

First cost: $13,500

Annual benefits: $9,500

Salvage value: $3,500

O&M costs: $1,500

For Company $20,000:

First cost: $20,000

Annual benefits: $11,000

Salvage value: $6,000

O&M costs: $1,800

For Company $15,000:

First cost: $15,000

Annual benefits: $9,000

Salvage value: $4,000

O&M costs: $1,100

To calculate the NPW, we discount each cash flow to its present value using the interest rate of 12% and sum them up. The equipment with the highest NPW would be the preferred choice.

By performing the NPW analysis for each company's equipment, we can determine which equipment provides the highest net present worth and thus represents the best investment choice for Austin General Hospital.

Learn more about  investment here: https://brainly.com/question/30105963

#SPJ11

What invention of the ancient world provided power that did not depend on human or animal labor?

Answers

Answer:

water currents? like the water mill

Explanation:

Water mills can be used for such purposes as grinding flour or agricultural produce, cutting up materials such as pulp or timber, or metal shaping. Traditional water mills are made from a wheel or turbine with wooden blades that turn when water runs through.

if you have water flowing through your property, you might consider building a small hydropower system to generate electricity. Microhydropower systems usually generate up to 100 kilowatts of electricity.

given a list of numbers, find and print all elements that are an even number. in this case use a for-loop that iterates over the list, and not over its indices

Answers

Input: list1 = [4, 7, 5, 66, 16]

Output: [4, 66, 16]

Input: list2 = [16, 18, 95, 3]

Output: [16, 18]

Using a for loop, iterate through each item in the list and determine whether num% 2 == 0. Only print the number if the condition is true.

Program in Python to Print Even Numbers in a List

Code:

list1 = [20, 21, 6, 45, 86, 93]

for n in list1:

if n % 2 == 0:

              print(n, end=" ")

Output:

20, 6, 86

To know more about for loop, check out:

https://brainly.com/question/19706610

#SPJ4

logic error (runtime error or bug)

Answers

A logic error, also known as a runtime error or bug, is a type of error that occurs when the program does not behave as expected due to a mistake in the code's logic.

Unlike syntax errors, which are detected by the compiler, logic errors do not cause the program to fail immediately. Instead, they can cause unexpected behavior, incorrect output, or even crashes at runtime.

Some common examples of logic errors include:

Using the wrong variable or operator in an expressionUsing an incorrect loop conditionFailing to handle edge cases or unexpected inputImproperly sequencing program instructionsMiscalculating values in a formula or algorithm

Debugging logic errors can be challenging because the code may appear to be correct syntactically, but still produce incorrect results. Developers often use tools such as code analysis, unit tests, and manual inspection to identify and fix logic errors.

You can learn more about logic error at

https://brainly.com/question/30360094

#SPJ11

Midday is a good time to take a portrait outside.
true or false?

Answers

Answer:

B: False

Explanation:

edg2020

Midday is generally not an ideal time to take a portrait outside, especially under direct sunlight. This statement is false.

During midday, the sun is at its highest point in the sky, creating harsh and unflattering shadows on the subject's face.

The intense overhead light can cause squinting and result in unappealing contrasts. Instead, photographers often prefer to shoot portraits during the golden hour, which occurs around sunrise or sunset when the sun is low on the horizon.

During these times, the light is softer, warmer, and more diffused, creating a more flattering and aesthetically pleasing effect on the subject's features, making it an optimal time for outdoor portrait photography.

Know more about portrait painting:

https://brainly.com/question/1272412

#SPJ6

Sam is a Windows system administrator responsible for setting up client workstations for different departments. After installing the operating system, Sam manually disables certain programs that aren't needed by that department. Recently, Sam learned a few workstations had been compromised. The security analyst suggests that the disabled applications may have been the target. Going forward, what should Sam change in his process

Answers

Answer:

not disable any programs after installing a new operating system

Explanation:

Sam should simply not disable any programs after installing a new operating system. If the system is working as intended then he should leave it be, as the saying says "Don't fix what isn't broken". When a new operating system is installed, the entire system is usually wiped, meaning that the only programs installed have been installed as defaults by the operating system. Usually, this is for a reason and acts as security measures for the user, the system, and all of the data. Most of these programs interact with each other and work off of each other's data. Removing them from the system can prevent other very important functions of the operating system from performing their duties, which in term can compromise the entire security of the system. Therefore, the best thing to do would be to not remove these default programs.

The development of what technology allows for collecting and transmitting big data as well as allowing local processing to detect and solve problems on the spot?

Answers

The development of the Internet of Things allows for collecting and transmitting big data as well as allowing local processing to detect and solve problems on the spot.

Internet of Things refers to a system of interrelated computing devices, objects, digital machines, etc that are provided with unique identifiers.

It should be noted that the internet of things is vital in the transmission of data over a network without the need for human-to-human interactions.

It's also vital to collect and transmit big data as well as allow local processing to detect and solve problems on the spot.

Read related link on:

https://brainly.com/question/25189026

A camera mounted on the dashboard of a car captures an image of the view from the driver’s seat every second. Each image is stored as data. Along with each image, the camera also captures and stores the car’s speed, the date and time, and the car’s GPS location as metadata. Which of the following can best be determined using only the data and none of the metadata?

The average number of hours per day that the car is in use

The car’s average speed on a particular day

The distance the car traveled on a particular day

The number of bicycles the car passed on a particular day

Answers

Answer:

The average number of hours per day that the car is in use

Explanation:

it says every second it captures an image so logically that number can be counted per seconds

The best that can be determined using only the data and none of the metadata is the average number of hours per day that the car is in use. The correct option is A.

What is metadata?

Data that provides information on one or more characteristics of the data is referred to as metadata. It is used to condense essential data facts that can facilitate tracking and working with particular data. Several instances include methods for producing the data.

Author, creation, and modification dates, as well as file size, are some instances of fundamental metadata. Unstructured data like photographs, videos, web pages, spreadsheets, etc. are also used with metadata. Meta tags are a common way for web pages to incorporate info.

Therefore, the correct option is A. The average number of hours per day that the car is in use.

To learn more about metadata, refer to the link:

https://brainly.com/question/14699161

#SPJ2

All of the machine language commands that the cpu understands make up its _______________.

Answers

All of the machine language commands that the CPU understands make up its instruction set.

The instruction set is a collection of machine language commands that are specifically designed to be understood and executed by the central processing unit (CPU). These commands are represented in binary code, which the CPU interprets and executes to perform various tasks and operations.

The instruction set includes commands for basic arithmetic and logical operations, data movement, control flow, and other essential operations that the CPU can carry out.

To know more about CPU visit:

https://brainly.com/question/17384812

#SPJ11

Write a program in java to input N numbers from the user in a Single Dimensional Array .Now, display only those numbers that are palindrome

Answers

Using the knowledge of computational language in JAVA it is possible to write a code that  input N numbers from the user in a Single Dimensional Array .

Writting the code:

class GFG {

   // Function to reverse a number n

   static int reverse(int n)

   {

       int d = 0, s = 0;

       while (n > 0) {

           d = n % 10;

           s = s * 10 + d;

           n = n / 10;

       }

       return s;

   }

   // Function to check if a number n is

   // palindrome

   static boolean isPalin(int n)

   {

       // If n is equal to the reverse of n

       // it is a palindrome

       return n == reverse(n);

   }

   // Function to calculate sum of all array

   // elements which are palindrome

   static int sumOfArray(int[] arr, int n)

   {

       int s = 0;

       for (int i = 0; i < n; i++) {

           if ((arr[i] > 10) && isPalin(arr[i])) {

               // summation of all palindrome numbers

               // present in array

               s += arr[i];

           }

       }

       return s;

   }

   // Driver Code

   public static void main(String[] args)

   {

       int n = 6;

       int[] arr = { 12, 313, 11, 44, 9, 1 };

       System.out.println(sumOfArray(arr, n));

   }

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Write a program in java to input N numbers from the user in a Single Dimensional Array .Now, display

which of the following is an output device ?

Answers

Answer:

a mouse

a keyboard

Explanation:

those are things that require human interaction with before any thing can appear on the screen of the computer

Write a subroutine that located at memory address location $0x100 named "16bitAdder" that will perform an addition of two 16-bit numbers stored in (R1:R0) and (R3:R2). The results of the addition shall be stored in (R1:R0). Then write the main program starting at memory address location $0x200 that will initialize (R1:R0) with OxBBBB and (R3:R2) with OxAAAA, and then add them by calling the subroutine "16bitAdder".

Answers

The main program, starting at memory address $0x200, initializes (R1:R0) with OxBBBB and (R3:R2) with OxAAAA, and then calls the subroutine "16bitAdder" to perform the addition.

To implement the subroutine "16bitAdder" and the main program, an assembly-like pseudocode can be used. Here's the pseudocode:

```

16bitAdder:

 ; Store R0 and R2 in temporary variables

 TEMP0 = R0

 TEMP2 = R2

 ; Perform the addition

 R0 = R0 + TEMP2

 R1 = R1 + R3

; Check if there was a carry from the addition

 IF carry_flag = 1 THEN

   R1 = R1 + 1  ; Add the carry to the higher byte

 END IF

 ; Restore the original values of R0 and R2

 R0 = TEMP0

 R2 = TEMP2

 ; Return from the subroutine

main:

 ; Initialize R1:R0 with 0xBBBB

 R0 = 0xBB

 R1 = 0xBB

 ; Initialize R3:R2 with 0xAAAA

 R2 = 0xAA

 R3 = 0xAA

 ; Call the subroutine "16bitAdder"

 CALL 16bitAdder

 ; The result of the addition is stored in R1:R0

; End of the program

```

In the main program, we initialize (R1:R0) with 0xBBBB and (R3:R2) with 0xAAAA. Then, we call the subroutine "16bitAdder" to perform the addition of the two 16-bit numbers. The result of the addition will be stored in (R1:R0) after the subroutine call.

Learn more about subroutine here:

https://brainly.com/question/32886096

#SPJ11

how do i solve this?

how do i solve this?

Answers

Answer:

turn it left then ,ove foreward

Explanation:

differences between binary, decimal and hexadecimal

Answers

Answer:

In binary, there are only two numbers: one, and zero. Each “place” also has different values. ... Hexadecimal is different from binary and decimal. It uses base-sixteen, meaning that there are sixteen different digits that can appear in a single place.

Explanation:

In binary, there are only two numbers: one, and zero. Each “place” also has different values. ... Hexadecimal is different from binary and decimal. It uses base-sixteen, meaning that there are sixteen different digits that can appear in a single place.

Binary number systems use a base of two while hexadecimal uses a base of 16. In a hexadecimal system, it is necessary to count to 15. To represent the numbers 10 – 15, the letters A – F are used respectively. To distinguish the different number systems, suffixes or subscripts are often used.

ideal environment for a computer to work properly

Answers

Answer:

The ideal environment for a computer to work properly is a cool place to avoid heating of the computer, good air circulation in the place so that the computer's fan can get cool air.

What is a computer?

Computer is an electronic device, that perform various of tasks easily that take humans much time.

It is a machine on which we can work and contains a screen and operators, like keyboard and mouse.

Thus, the ideal environment for a computer to work properly is a cool place to avoid heating of the computer, good air circulation in the place so that the computer's fan can get cool air.

Answer:

The computers should be in a cool place so that it does not over heat and good air circulation in the environment so that the computer fan can get cool air.

Hope this helps!

pls mark brainliest

Customizable diagrams, including List, Process, and Cycle diagrams, are built into Word and can be found in
O SmartArt.
O WordArt.
O Clip Art
O Pictures

Please help ASAP

Answers

Answer:

clip art

Explanation:

i hope this helps you

Define a function named StepsToMiles that takes an integer as a parameter, representing the number of steps, and returns a float that represents the number of miles walked. Then, write a main program that reads the number of steps as an input, calls function StepsToMiles() with the input as an argument, and outputs the miles walked.

Answers

The StepsToMiles function converts the number of steps into miles by multiplying the steps by a conversion factor. The main program takes the number of steps as input, calls the StepsToMiles function, and outputs the corresponding miles walked.

The function StepsToMiles takes an integer parameter named "steps," which represents the number of steps walked. To convert steps into miles, we need to know the average distance covered in a step. Let's assume that an average step covers 0.0005 miles. So, the conversion factor would be 0.0005 miles per step.

Inside the function, we multiply the number of steps by the conversion factor to get the total distance in miles. This result is returned as a float.

In the main program, the user is prompted to enter the number of steps walked. The input is then passed as an argument to the StepsToMiles function. The function calculates the corresponding miles and returns the result. Finally, the main program outputs the miles walked.

By using this approach, the StepsToMiles function allows for easy conversion between steps and miles, providing a convenient way to calculate the distance covered based on the number of steps taken.

Learn more about program outputs here:

https://brainly.com/question/14672483

#SPJ11

Checking a website author’s credentials is one way to establish a site’s _________. Group of answer choices security information literacy credibility copyright

Answers

Answer:

The answer is "Credibility".

Explanation:

By assessing the excellently-intended, factual, or unbiased" a Site is, users, assess reliability. It can be achieved by developers, which provides a useful set of information sections, and responses to the links for external sources or resources must be provided.  The credibility of its website is mostly about making the site accurate and accurate. Only 52.8% of internet users agree that digital information is consistent, and the incorrect choice can be defined as follows:

Information on security is used in designing, that's why it's wrong.literacy is used in understanding, that's why it's incorrect.copyright refers to the legal right, that's why it's incorrect.
Other Questions
which two features are part of a line graph please help fast with an explanation if you can! A sharp-tongued woman was accused of starting a rumor. When she was brought before the village wise man, she said, I was only joking. My words were spread by others, and so I am not to blame. But the victim demanded justice, saying, Your words soiled my good name! Ill take back what I said, replied the sharp-tongued woman, and that will take away my guilt. When the wise man heard this, he knew that this woman truly did not understand her crime. And so he said to the woman, Your words will not be excused until you have done the following. Bring my feather pillow to the market square. Cut it and let the feathers fly through the air. Then collect every one of the feathers from the pillow and bring them all back to me. When you have done this, you will be cleared of your crime. The woman agreed, but thought to herself, The wise man has finally gone mad! She did as he asked, and cut the pillow. Feathers blew far and wide over the square and beyond. The wind carried them here and there, up into trees and under merchants carts. She tried to catch them, but after much effort it was clear to her that she would never find them all. She returned to the wise man with only a few feathers in her hand. Facing the wise man, she said, I could not take back the feathers any more than I could take back my words. From now on I will be careful not to say anything that would harm another, for there is no way to control the flight of words, any more than I could control the flight of these feathers. From that day, the woman spoke kindly of all she had met. What does spreading a rumor reveal about the woman's character?Select one:She thinks her words are important.She thinks her words are hurtful.She thinks her words are amusing.She thinks her words are harmless.Feathersby Anonymous Which is the solution set of a for 3(-x + a) + 7 < 5 when x = -12 Everything else held constant, an autonomous monetary policy easing ________ aggregate ________ Does Gremlins take place on Christmas Eve? Lily observes that the food served in her school cafeteria is often of poor quality. After a food poisoning scare, Lily decides to write letters to her family, her school principal, and the school newspaper. Which tone most clearly matches the intended audience for each letter?familyschool principalschool newspaperassertive, personal, and respectfularrowRightlogical, demanding, and persuasivearrowRightemotional, honest, and openarrowRight A compound shape has a triangle and a rectangle and its total area is 52square cm. If the area of the triangle is 20square cm, then find the longest side of the rectangle. Widgets'R'Us created a monthly expense equation, E = 1.48q + 4,830. The company plans to sell their widgets to retailers at a price of $3.98. How many widgets must be sold to reach the breakeven point?Using the expense and revenue equations above, if Widgets'R'Us sells 5,430 widgets, what will their profit be? 45 gallons per second to meters cubed per min With respect to secure authentication and authorization design, security professionals leverage hardware tokens because they: Edit the conditional formatting rule for range B4:B17 to highlight cells whose value is less than $50,000. Use the same cell formatting. How old am I if 500 reduced by 2 timesmy age is 322? Lorna earns P71.75 per hour for gardening. If she will work for 21 hoursthis month, then how much will she earn?Answer this or u will die what are 2 study aids Desmond sells two different types of homemade juices.Tropical punch is 16 fluid ounces for $17.44. Strawberry-mango is 24 fluid ounces for $26.40.Which juice is more expensive? What is the difference in price? When a plant dies, it often decomposes and becomes part of the soil. This process is one step in which cycle? what element in definition of conflict is present which you tell your partner what is bothering you and your partner eplains why s/he is reluctant to accommodate you? An island has 12 fur seal rookeries (breeding places). To estimate the fur seal pup population in Rookery A, 6269 fur seal pups weretagged in early August. In late August, a sample of 1100 pups was observed, and 221 of these were found to have been previouslytagged. Use a proportion to estimate the total number of fur seal pups in Rookery A.The estimated total number of fur seal pups in Rookery A is.(Round to the nearest whole number.) just pls give me the answer soonnnn