using a pointer to find the value of a variable is called . group of answer choices a. pointer arithmetic b. tracing a pointer c. indirect addressing d. tracing a value

Answers

Answer 1

Using a pointer to find the value of a variable is called C: indirect addressing.

Indirect addressing is a technique in computer programming where a memory address is accessed via an intermediate value, usually a pointer. In this case, the pointer is used to store the memory address of the variable, and the value of the variable can be accessed indirectly by using the pointer to look up the memory address and retrieve the value stored there.

Pointer arithmetic refers to the arithmetic operations that can be performed on pointers, such as adding or subtracting an offset to the pointer value. Tracing a pointer refers to the process of following the pointer to locate the memory address it references. Tracing a value is not a term typically used in the context of pointer operations.

You can learn more about indirect addressing at

https://brainly.com/question/28249993

#SPJ11


Related Questions

We intercepted a barcode we think might be hiding a flag. See if you can find it. What format does the barcode use?

Answers

The number of televisions per capital is calculated by dividing the number of television sets by the total US population. In this case, we divide the 285 million television sets by the population of 298.4 million.

What is use of televisison?

This gives a result of 0.9551 televisions per capita. Note that this method (dividing the number by the population) also is used for calculating the per capita of many other things like GDP.

In this case, we divide the 285 million television sets by the population of 298.4 million. This gives a result of 0.9551 televisions per capita.

Therefore, The number of televisions per capital is calculated by dividing the number of television sets by the total US population. In this case, we divide the 285 million television sets by the population of 298.4 million.

Learn more about  television on:

https://brainly.com/question/16925988

#SPJ1

Fill in the blanks to complete the “countdown” function. This function should begin at the “start” variable, which is an integer that is passed to the function, and count down to 0. Complete the code so that a function call like “countdown(2)” will return the numbers “2,1,0”.

Answers

Answer:

Check the code down below

Explanation:

You can use this code:

for i in range(5,-1,-1):

print(i)

This will print:

5

4

3

2

1

0

5 is changeable by the way!

The complete the “countdown” function. This function should begin at the “start” variable, which is an integer that is passed to the function, and count down to 0 is in the explanation part.

What is programming?

The process of creating a set of instructions that tells a computer how to perform a task is known as programming.

Computer programming languages such as JavaScript, Python, and C++ can be used to create programs.

Here is the code to complete the “countdown” function:

def countdown(start):

   for i in range(start, -1, -1):

       print(i, end=",")

The countdown function takes an integer start as an argument and counts down from start to 0 using a for loop.

The range function is used to generate an integer sequence from start to 0, with a step size of -1. (i.e., counting backwards).

Thus, each integer in the sequence, separated by commas, is printed using the print function.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ2

Michael is stuck due to an electric shock generated at the fridge. What should you do to save michael?.

Answers

Pull him away from the fridge with a non-conducting material and begin cardiopulmonary resuscitation .

What is meant by electric shock?

When a human comes into contact with an electrical energy source, they experience an electric shock. A shock is produced when electrical energy passes through a section of the body. Exposure to electrical energy has the potential to cause fatalities or absolutely no injuries.

The tangible and tangible result of an electrical current entering the body is electrical shock. The shock could be anything from a dangerous discharge from a power line to an uncomfortable but safe jolt of static electricity after walking over a thick carpet on a dry day. trauma; related topics.

The complete question is : Michael is stuck due to an electric shock generated at the fridge. What should you do to save Michael?

A. push the fridge away with a non-conducting material and begin cardiopulmonary resuscitation

B. push the fridge away from him and begin cardiopulmonary resuscitation

C. pull him away from the fridge with a non-conducting material and begin cardiopulmonary resuscitation

D .pull him away from the fridge with your hands and begin cardiopulmonary resuscitation

To learn more about electric shock refer to:

https://brainly.com/question/28361869

#SPJ1

Without the use of protocols:

A. The internet would be insecure
B. Networks couldn’t function at all
C. Only businesses would be able to use the internet
D. Severs couldn’t store data

Answers

(A)

Explanation:

The Internet will be insecure

The answer would be B or ether D

________ are storage drives that contain both solid-state storage and hard disks in an attempt to gain the speed and power benefits of SSDs while still having the low cost and large capacity of hard drives.

Answers

Hybrid Drives

Explanation

This is the name for the two drives mixed together. I have one in my pc and it works pretty well.

The storage drives that contain both solid-state storage and hard disks in an attempt to gain the speed and power benefits of SSDs while still having the low cost and large capacity of hard drives are called as Hybrid drives.

What is drive?

Drive provides a storage space and speed for processing the data in the drive on the personal computers or laptops at low cost.

There are two types of drives- Solid state hard drives and Hard disks.

So, the combination of both the drives is named as Hybrid drives containing features of large space as well as higher processing speed.

Thus, Hybrid drives are storage drives that contain both solid-state storage and hard disks in an attempt to gain the speed and power benefits of SSDs while still having the low cost and large capacity of hard drives.

Learn more about drive.

https://brainly.com/question/10677358

#SPJ2

A systems administrator is designing a directory architecture to support Linux servers using Lightweight Directory Access Protocol (LDAP). The directory needs to be able to make changes to directory objects securely. Which of these common operations supports these requirements?

Answers

The options available are:

Search, modify.

StartTLS, delete.

Bind, modify.

Bind, add.

Answer:

StartTLS, delete

Explanation:

StartTLS is a computer networking term for email protocol command, in which a system administrator buses it to command an email server that an email client running in a web browser, wants to turn an existing insecure connection into a secure one. Thus, during this process, StartTLS permits a client to communicate securely using LDAPv3 over TLS.

On the other hand, the DELETE operation can make a change to a directory object.

According to the given question, the common operations that supports requirements where directory needs to be able to make changes to directory objects securely are;

Bind, addSearch, modifyBind, modifyStartTLS, delet

According to the question, we are to discuss the common operations that supports some requirements as regards the changing of directory objects securely.

As a result of this we can see that making use of  StartTLS, delete can serve this purpose and other function as well.

Therefore, common operations that supports requirements where directory needs to be able to make changes to directory objects securely is Search and modify.

Learn more about directory architecture at:

https://brainly.com/question/13171394

What is output by the following code?
C = 1
sum = 0
while (c< 10):
C=C+2
sum = sum + c
print (sum)

Answers

The output of the code is 17. The output is simply what happens once all of the code is completed, the end result. It is what is entered into the console after all of the calculations have been completed.

What is Python ?

Python is a general-purpose, high-level programming language. Its design philosophy prioritises code readability by employing significant indentation. Python is garbage-collected and dynamically typed. It is compatible with a variety of programming paradigms, including structured, object-oriented, and functional programming.

It is compatible with a variety of programming paradigms, including structured, object-oriented, and functional programming. Because of its extensive standard library, it is frequently referred to as a "batteries included" language.

Guido van Rossum began developing Python as a successor to the ABC programming language in the late 1980s, and it was first released in 1991 as Python 0.9.0.

To find out output let first write the question:

C=1

sum = 0

while(C<10):

C=C+3

sum=sum + C

print(sum)

Now Focus on

while(C<10):

C=C+2

sum=sum + C

The value of C is initially 1

C=1+2

Sum= 0+3

In second loop the value of C will become 3

c=3+3

sum=3+6

In third loop the value of C will be 6

c=6+2

sum=9+8

so the answer is 9+8 = 17

To learn more about Python refer :

https://brainly.com/question/26497128

#SPJ1

Select the correct answer.
Nancy wants to buy a cooking stove that’s electrically insulated and resistant to heat. What material should she choose for the cooktop?
A.
composite
B.
polymer
C.
metal
D.
ceramic
E.
semiconductor

Answers

Answer:

E I think is the best answer

MS-Word 2016 is the latest version of WORD software. True or False
It's urgent ​

Answers

Answer:

true

Explanation:

Answer: This is True!

I hope you have a nice day

Marking brainlyest look at the picture

Marking brainlyest look at the picture

Answers

I’m pretty sure the answer is C.

for Jenny's personal computer?
id videos. Which operating
system would be appropriate Jenny's needs to buy a computer to create word documents, make presentations, listen to music, and watch movies and videos.
OA. UNIX
O B. Linux
O C. Microsoft Windows
O D. MS-DOS

Answers

Answer: C

Explanation: Microsoft Windows would be the most viable option here because UNIX and Linux are used for server-side applications, and MS-DOS is an old operating system which is not supported anymore. There is also the Microsoft 365 suite on Microsoft Windows, which can allow Jenny to make presentations using powerpoint, and edit videos.

What is wireless?

a network that covers a large geographical area
a network confined to a limited geographical area
the process of sending data to the receiving device
a method of connecting computers using radio signals instead of physical wires

Answers

Answer:

The correct option is;

A method of connecting computers using radio signals instead of physical wires

Explanation:

Wireless is the term used to describe a network connection between two or more devices, such as computers, mobile phones and routers, that make use of a radio signal system instead of physical wires for data connection between the nodes in the network

It enables the avoidance of the necessary cost involved in the process installing physical network wires in a premise

The three basic types are Wireless Wide Area Network, WAN, Wireless Local Area Network, WLAN, and Wireless Personal Area Network WPAN.

The socket object in java, and the tcpclient object in c# can be used to read information from a remote server, but not write to it?.

Answers

For connecting, sending, and receiving stream data across a network in synchronous blocking mode, the TcpClient class offers straightforward methods.

A TcpListener or Socket established with the TCP ProtocolType must be watching for incoming connection requests in order for TcpClient to connect and exchange data. To construct a TCP socket, the following four bits of data are required: The IP address of the local system. the TCP port that is being used by the local application. The IP address of the distant system. A socket is a nameable and addressable communications connection point (endpoint) in a network. The usage of socket APIs to create communication channels between remote and local processes is demonstrated via socket programming.

Learn more about socket here-

https://brainly.com/question/14319817

#SPJ4

Brenda has a laptop that is more than six years old. Since she upgraded the windows operating system to the latest version, her machine crashes when she starts it up. To solve the issue, brenda should try

Answers

The laptop Brenda uses keeps crashing when she starts it up ever since she updated Windows to the most recent version. It is older than six years. She ought to attempt System Restore to fix the problem.

Microsoft Windows has a tool called System Restore that lets users change the system files, installed programs, the Windows registry, and system settings of a machine back to a prior state. This approach can be used to fix issues like system crashes and other issues. System Restore can reverse system modifications to fix windows 10 issues.

Follow the link to learn more on resolving windows problems

https://brainly.com/question/28318083

#SPJ4

Find out how to print the below pattern in python and also come up with pseudocode,
you have to use for loop for this, you can use a for loop inside the outer for loop.
You can't use operator like " *" in python , only use print statement to print the below pattern. Find out how to print in 5 lines one by one in python , there is a way to print one line then next
X

XXX

XXXXX

XXXXXXX

XXXXXXXXX

Answers

Answer:

for i in range(5):

   for j in range(2*i + 1):

       print("*", end="")

   print()

Explanation:

for row index going from 0 to 5
           for column index going from 0 to 2*row index + 1
                      print * suppressing new line

          print a new line to move to next row

Sending or receiving information between two
more person
.technical term​

Answers

Two-Way Communication

if you choose a one-time backup, you can create a system state backup. T/F

Answers

The statement "if you choose a one-time backup, you can create a system state backup" is TRUE.

What is a one-time backup?

A one-time backup, also known as a manual backup, is a backup process that allows you to create a backup of your data or system once, rather than automatically. You must initiate the process manually in order to complete the one-time backup.

The System State Backup is a backup utility that comes with the Microsoft Windows operating system that enables you to back up important system-related components such as system settings, user profiles, hardware configurations, and boot files.

The System State Backup option is available on Windows Server 2008 R2, Windows Server 2012 R2, Windows Server 2016, and Windows Server 2019, as well as some Windows 10 and 8.1 versions. It is a type of backup that enables users to quickly restore their computer or server to a previous state if it becomes corrupted or fails.

Learn more about backup at

https://brainly.com/question/29590057

#SPJ11

Write a program in C++ that that will perform the following
functions in a linear link list.
1. Insert
an element before a target point.
2. Delete
an element before a target point.

Answers

An example implementation of a linear linked list in C++ that includes functions to insert and delete elements before a target point:

#include <iostream>

using namespace std;

// Define the node structure for the linked list

struct Node {

   int data;

   Node* next;

};

// Function to insert a new element before a target point

void insertBefore(Node** head_ref, int target, int new_data) {

   // Create a new node with the new data

   Node* new_node = new Node();

   new_node->data = new_data;

   

   // If the list is empty or the target is at the beginning of the list,

   // set the new node as the new head of the list

   if (*head_ref == NULL || (*head_ref)->data == target) {

       new_node->next = *head_ref;

       *head_ref = new_node;

       return;

   }

   

   // Traverse the list until we find the target node

   Node* curr_node = *head_ref;

   while (curr_node->next != NULL && curr_node->next->data != target) {

       curr_node = curr_node->next;

   }

   

   // If we didn't find the target node, the new node cannot be inserted

   if (curr_node->next == NULL) {

       cout << "Target not found. Element not inserted." << endl;

       return;

   }

   

   // Insert the new node before the target node

   new_node->next = curr_node->next;

   curr_node->next = new_node;

}

// Function to delete an element before a target point

void deleteBefore(Node** head_ref, int target) {

   // If the list is empty or the target is at the beginning of the list,

   // there is no element to delete

   if (*head_ref == NULL || (*head_ref)->data == target) {

       cout << "No element to delete before target." << endl;

       return;

   }

   

   // If the target is the second element in the list, delete the first element

   if ((*head_ref)->next != NULL && (*head_ref)->next->data == target) {

       Node* temp_node = *head_ref;

       *head_ref = (*head_ref)->next;

       delete temp_node;

       return;

   }

   

   // Traverse the list until we find the node before the target node

   Node* curr_node = *head_ref;

   while (curr_node->next != NULL && curr_node->next->next != NULL && curr_node->next->next->data != target) {

       curr_node = curr_node->next;

   }

   

   // If we didn't find the node before the target node, there is no element to delete

   if (curr_node->next == NULL || curr_node->next->next == NULL) {

       cout << "No element to delete before target." << endl;

       return;

   }

   

   // Delete the node before the target node

   Node* temp_node = curr_node->next;

   curr_node->next = curr_node->next->next;

   delete temp_node;

}

// Function to print all elements of the linked list

void printList(Node* head) {

   Node* curr_node = head;

   while (curr_node != NULL) {

       cout << curr_node->data << " ";

       curr_node = curr_node->next;

   }

   cout << endl;

}

int main() {

   // Initialize an empty linked list

   Node* head = NULL;

   // Insert some elements into the list

   insertBefore(&head, 3, 4);

   insertBefore(&head, 3, 2);

   insertBefore(&head, 3, 1);

   insertBefore(&head, 4, 5);

   

   // Print the list

   cout << "List after insertions: ";

   printList(head);

   // Delete some elements from the list

   deleteBefore(&head, 4);

   deleteBefore(&head, 2);

   

   // Print the list again

   cout << "List after deletions: ";

   printList(head);

   return 0;

}

This program uses a Node struct to represent each element in the linked list. The insertBefore function takes a target value and a new value, and inserts the new value into the list before the first occurrence of the target value. If the target value is not found in the list, the function prints an error message and does not insert the new value.

The deleteBefore function also takes a target value, but deletes the element immediately before the first occurrence of the target value. If the target value is not found or there is no element before the target value, the function prints an error message and does

Learn more about linear linked list  here:

https://brainly.com/question/13898701

#SPJ11

What needs to be public and what needs to be private?

What needs to be public and what needs to be private?

Answers

In this scenario, the most appropriate implementation of the Car class would be:

public class Car
{
public String make;
public String model;
public Car(String myMake, String myModel) { /* implementation not shown */ }
}
In this implementation, the attributes make and model are both declared as public, which means that they can be accessed and modified by code outside of the Car class. This is appropriate, as the make and model of a car are typically considered to be public information that can be accessed by anyone.

The constructor for the Car class is also declared as public, which means that it can be called by code outside of the Car class. This is appropriate, as the constructor is used to create new instances of the Car class, and this functionality should be available to code outside of the class.

In contrast, if the attributes make and model were declared as private, they would only be accessible within the Car class and would not be available to code outside of the class. Similarly, if the constructor were declared as private, it would only be accessible within the Car class and could not be called by code outside of the class. These declarations would limit the ability of code outside of the Car class to access and use the make, model, and constructor functionality, which would not be appropriate for this scenario.

Which tab holds the command for completing a spell check?
Home
Slide Show
Review
View

Answers

The tab holds the command for completing a spell check is review tabs. Therefore the correct option is option B.

The "Review" tab in Microsoft Office programs contains the command for the completing a spell check.

To spell check your document, select the "Review" tab and click the "Spelling & Grammar" button located in the Proofing section of the ribbon.

This will bring up the Spelling and Grammar window where you can review each flagged word or phrase, and use the provided options to either correct, ignore, or add the word to the dictionary.

Therefore the correct option is option B.

For such more question on review tabs:

https://brainly.com/question/29809741

#SPJ11

Which of the following are advantages of coding manually? Check all of the boxes that apply.

You can see what rendered code looks like as you type.

You can view source code to figure out HTML structure and behavior.

You can learn how HTML works.

You do not need a lot of HTML knowledge to create complex web pages.

Answers

Answer: Answer B

Explanation: My point of view this answer is correct because when we write any code then we have observed the lines of code to check whether they meet the conditions or not  

What is the value of the variable result after these lines of code are executed?

>>> a = 2
>>> b = -3
>>> c = 4
>>> result = (a - b) * c

The value of result is ______.

Answers

Answer:

5 i just found the answer

like the profile from dagunrapa 3 killing harmony kokichi oma

Answer:

5

Explanation:

proper location/storage of device/system and materials give me rhe key information please ​

Answers

Answer:

Organize and label storage areas so parts and materials can be quickly located without searching. Store materials and supplies in an organized manner to ensure easy access for retrieval and transportation. Place heavier loads on lower or middle shelves. Store long, tall or top-heavy items on their side or secure them to

Explanation:

Drag the tiles to the correct boxes to complete the pairs.
Match the benefit with its detailed explanation.

Drag the tiles to the correct boxes to complete the pairs.Match the benefit with its detailed explanation.

Answers

The detailed explanation and their benefits are:

1st box - Improved Planning Session2nd box - Integrated Organisation3rd box - Improved Data Entry4th box - Reduced Inventory Costs.

What are enterprise systems?

Enterprise systems are known to be software packages in large-scale which help businesses or enterprises to track and control their complex business operations. They are used as a hub where businesses are automated.

We can see that the above has been be arranged with the detailed explanation and the benefits that follow.

Learn more about enterprise systems on https://brainly.com/question/18257319

Write one similarity and one difference between '_' (underscore) ' % ' wildcard symbol .

Answers

Answer:

the percentage wildcard is to match the characters from 0to as many as you want

Explanation:

select name from user where name like's%;

Ryan is designing an app that needs to quickly send low quality photos between users. Most smartphones take much higher quality photos than Ryan needs for his app. Which answer best describes the type of compression Ryan should choose and why?

Answers

Hi, you've asked an incomplete question. However, I inferred the best compression Ryan should use is the Lossy compression.

Explanation:

A Lossy compression type is one that reduces the original quality of an image file. For example, Ryan could develop his app compress (convert) high-quality photos into JPEG (Joint Photographic Experts Group) format; which is a low-quality photo format. Doing so will affect the colors and sharpness of the photos sent between users, but will lead to less use of storage space.

Ryan should apply lossy compression to the photos because with lossy compression, the quality and the size of the photo will be reduced.

A lossy compression of a file implies that the quality of the file is reduced in order to get the file compressed.

A lossy compression will let Ryan design an app that will reduce the quality of the high quality photo to a low quality photo, after the size of the photo is compressed.

Hence;

Ryan should make use of lossy compressionBecause it helps to reduce the quality and the size of the photos

Read more about file compressions at:

https://brainly.com/question/13663721

simple calculator code in c++

Answers

Answer:

# include <iostream>

using namespace std;

int main() {

 char op;

 float num1, num2;

 cout << "Enter operator: +, -, *, /: ";

 cin >> op;

 cout << "Enter two operands: ";

 cin >> num1 >> num2;

 switch(op) {

   case '+':

     cout << num1 << " + " << num2 << " = " << num1 + num2;

     break;

   case '-':

     cout << num1 << " - " << num2 << " = " << num1 - num2;

     break;

   case '*':

     cout << num1 << " * " << num2 << " = " << num1 * num2;

     break;

   case '/':

     cout << num1 << " / " << num2 << " = " << num1 / num2;

     break;

   default:

     // If the operator is other than +, -, * or /, error message is shown

     cout << "Error! operator is not correct";

     break;

 }

 return 0;

}

Explanation:

please mark me as brainliest

Cybercriminals operate from Select 3 options . Undeveloped countries , developed countries, Africa and China, mostly Brazil and Russia, anywhere in the world

Answers

Answer:

Undeveloped countries, mostly Brazil and Russia, Africa and China,

Explanation:

Cybercrime is a computer-oriented crime where that involves the network and maybe to threaten, steal data, or any financial matter. As approx. 30% of cyber attacks come from China. While most of the cybercriminals and fraudsters are found in developing countries like Africa, India, and even Russia.

5. what are the causes of bucket overflow in a hash file organization? what can be done to reduce the occurrence of bucket overflows?

Answers

Causes of bucket overflow in a hash file organization, including: Poorly chosen hash function, Improper bucket size and Uneven distribution of data.

Strategies to reduce bucket overflows are:

Choose a suitable hash functionIncrease the size of the bucketsRedoDynamic resizingUse of alternative file organizations

Explanation of the causes of bucket overflow in a hash file organization:

Poorly chosen hash function: A hash function that does not distribute records evenly across buckets can cause some buckets to be overloaded with too many records.Improper bucket size: If the bucket size is too small, it can quickly fill up with records, causing the bucket to overflow.Uneven distribution of data: If data is not evenly distributed, some buckets may end up with more records than others.

Explanation for reducing the occurrence of bucket overflows:

Choose a suitable hash function: A good hash function should distribute the records evenly among the buckets to avoid overloading any of them.Increase the size of the buckets: If bucket overflow is a recurring problem, increasing the size of the buckets can help reduce the probability of overflow.Redo: Redoing involves choosing a new hash function or adjusting the parameters of an existing hash function to achieve a better distribution of records across buckets.Dynamic resizing: Some hash file organizations allow dynamic resizing of buckets, which means that the system automatically adjusts the size of the buckets based on the number of records being hashed.Use of alternative file organizations: In some cases, alternative file organizations such as B-trees or indexed sequential access method (ISAM) can be used instead of the hash file organization to avoid bucket overflow problems.

Learn more about bucket overflow:

https://brainly.com/question/7871450

#SPJ11

Please help me with my question ​

Please help me with my question

Answers

Answer:

1. Template

2. Name of the website

3. Signature of the instructor

Other Questions
Find the surface area of the figure. Round to the nearest tenth if possible. WHY DID THE DUCK CROSS THE ROAD. I NEED TO FIND OUT WHY PLEASE ANY ONE if a mammal drinks a large amount of saltwater what will happen to its urinary output Read this short paragraph and make two questions about it performance determine the slope and the y-intercept given the following linear functions. 1.f(x)=3x-10 find the following then use diagram to illustrate each 1. P R P = { 1,3,5,7,9,11,13...21 } R = { 2,4,6,8,10,12 } 2. P ( R O ) P = { 1,3,5,7,9,11,13...21 } R = { 2,4,6,8,10,12 } O = { 3, 6, 9, 12, 15, 18 }3. ( O V ) E O = { 3, 6, 9, 12, 15, 18 }V = { 4,16,20 }E = { 5, 10, 15, 20 } thank you Causes of variation that can be identified and eliminated are called what? How far apart are parallel lines m and n such that T (XYZ) = (Rn Rm)(XYZ)? Which set of coordinates satisfies the system of equations y = x 3 and y = -2x + 1? help me answer answer the ppposite of Gail est amorous qui Lallscience, and government.- During__________ people began to question religion, why did the roman government have a hard time ruling the roman empire?? What do we call a cloud that forms right on the surface of the Earth? * a2=b2=c2 solve for a During the COVID-19 pandemic, many places have seen people rushing to supermarkets for daily essentials such as toilet paper, especially when there was a recent breakout in the local area. That has led to empty shelves and stock-outs for a prolonged period of time in many supermarkets, even though the supermarkets and the product suppliers reassured that there is sufficient production capacity.From a logistics and supply chain perspective, explain two reasons why supermarkets experienced stockout for a considerable period of time, when the suppliers had sufficient production capacity. assume the partitioning algorithm always produces a 70-to-30 proportional split, write the recurrence of the running time of quicksort in this case. solve the recurrence by using a recursion tree. Compare and Contrast at least 4 differences and 3 similarities between Athens and Sparta.Please give the full senetcens please and thank you :D i will give more ponits after (3,5) and (0,7) in slope intercept form 1/7y+1/4=9/28 Solve Quick Please.