when we merge two branches, one of two algorithms is used. if the branches have diverged, which algorithm is used?

Answers

Answer 1

When merging two branches, there are two algorithms that can be used: fast-forward merge and three-way merge.

Fast-forward merge is used when the branches have not diverged, meaning that the changes made in one branch can be applied directly to the other without any conflicts. In this case, the branch is simply moved forward to incorporate the changes from the other branch.

However, if the branches have diverged, meaning that both branches have made conflicting changes to the same file, the three-way merge is used. Three-way merge combines the changes made in both branches with the original version of the file to create a new version that includes all the changes. It uses a common ancestor, which is the last commit that both branches share, to identify which changes conflict and needs to be resolved.

During a three-way merge, Git will identify any conflicting changes and ask the user to resolve them manually. This involves choosing which changes to keep and which to discard, or finding a way to merge the changes together. Once the conflicts are resolved, the merge can be completed and the changes can be committed to the branch.

You can learn more about algorithms at: brainly.com/question/22984934

#SPJ11


Related Questions

Which standard assists in the sharing of information from one provider to another for patient care?

Answers

The Health Level 7 (HL7) standard is widely used in the healthcare industry to assist in the sharing of information from one provider to another for patient care. HL7 is a set of international standards for the exchange,

integration, sharing, and retrieval of electronic health information. It provides a framework and guidelines for the exchange of data such as patient demographics, clinical observations, laboratory results, and more, among healthcare systems and applications, ensuring interoperability and seamless information exchange for patient care coordination. HL7 has various versions and profiles, including HL7 v2, HL7 v3, and Fast Healthcare Interoperability Resources (FHIR), which are commonly used for data exchange in healthcare settings.

Learn more about  provider   here:

https://brainly.com/question/29992394

#SPJ11

A machine used as a holding area for implements after they have been properly disinfected is called a(n):

Answers

Answer:

UV light sterilizer

Explanation:

hris has received an email that was entirely written using capitalization. He needs to paste this text into another document but also ensure that the capitalization is removed.

What should Chris do?

Answers

He should un caps lock it

Evidence that a source is authoritative includes a. An email address to ask further questions about information in the source c. No verbiage used which could identify bias about the information provided b. A date regarding when the source was written d. Logical structure of the information provided so that it is easily read and understood Please select the best answer from the choices provided A B C D

Answers

Answer:

i belive   it iz      C

Explanation:

o

Answer:

The correct answer is A

Explanation:

The wireless card MC7700 described in your text provides which of the communication types shown?
Mobile broadband internet
Mobile internet and Bluetooth
Cellular video

Answers

The wireless card MC7700 described in the text provides mobile broadband internet communication.

It enables devices to connect to cellular networks and access the internet using mobile data services. This allows users to have internet connectivity on their devices even when they are not within range of a Wi-Fi network. The MC7700 wireless card supports cellular network technologies such as 3G and 4G/LTE, allowing for high-speed data transfer and internet access. It does not provide Bluetooth or support for cellular video specifically.

Know more about mobile broadband internet here:

https://brainly.com/question/32362261

#SPJ11

Why can't kites fly well near buildings? (Explain)

Answers

Kites are flown high up in the sky and require a considerable amount of space to soar. They require open fields or spaces without obstructions to fly properly. When flying kites near buildings, it disrupts the wind flow, which leads to a less predictable and more turbulent wind flow.

The wind is the most important factor when flying a kite, and tall buildings tend to block or alter the wind's direction and speed.A kite is dependent on wind speed, direction, and flow. When a building blocks the wind, it makes it more difficult for the kite to fly. The turbulent wind around buildings makes it difficult for the kite to maintain the desired height and direction.

Also, when kites fly near buildings, they tend to get caught on the roofs or ledges of buildings. This leads to the kite crashing or getting damaged. Therefore, to fly kites well, there must be a lot of open space with no obstacles to obstruct the wind flow.

To know more about properly visit:

https://brainly.com/question/25808222

#SPJ11

What would happen if you fake a credit card number online on a website.
My 13 year old friend did that months ago and now he got a message saying his “chase account was locked due to suspicious activities”

I’m only asking because he’s freaking out

Answers

If it worked. The card person might need to block their account so no one uses and then there will need to be a confirmation by the card owner that it was him or it wasn’t then they might be refunded. But other then that I’m not sure because all websites are different

4. Assume you have a list of numbers
12,10,32,3,66,17,42,99,20
a) Write a loop that prints each of the numbers on a new line.
b) Write a loop that prints each number and its square on a new line.

Answers

lst = [12,10,32,3,66,17,42,99,20]

a)

for x in lst:

   print(x)

b)

for x in lst:

   print(str(x) + " " +str(x**2))

I think this is what you're looking for. Hope this helps!

PYTHON!
PLEASE HELPP

File name: 2 String Formatting
Task 1: Fill the blank using string formatting: Use 2 different ways to complete the sentence
first_name = 'Baby'
last_name = 'shark'
___ ___ doo doo doo doo doo doo
Print out: Baby shark, doo doo doo doo doo doo

Task 2: Write a program that aligns with the image below, using string formatting.
(PICTURE BELOW)


Task #3 Mad libs:
Mad_libs = '''Face it {name}, you are about the greatest thing since
{favorite_food}. No one else can {verb1} like you can.
Your best friend says you are the {adjective1}-est person in
the world. Sure, you once {embarassing_thing_you_did},
but you also {honorable_thing_you_did}. So, {favorite_endearment},
today is the day you're going to stop beating up on yourself for being
{negative_adjective1} and start loving yourself for being
{positive_adjective1}, {postive_adjective2} and {positive_adjective3}.
And if people give you a {adjective2} time, just tell'em they can take
their {noun} and {verb2} it to the trash.'''

PYTHON!PLEASE HELPPFile name: 2 String FormattingTask 1: Fill the blank using string formatting: Use

Answers

Explanation:

hi dude 15 Alignment, font styles, and horizontal rulesContentsFormattingBackground colorAlignmentFloating objectsFloat an objectFloat text around an objectFontsFont style elements: the TT, I, B, BIG, SMALL, STRIKE, S, and U elementsFont modifier elements: FONT and BASEFONTRules: the HR elementThis section of the specification discusses some HTML elements and attributes that may be used for visual formatting of elements. Many of them are deprecated.15.1 Formatting15.1.1 Background colorAttribute definitionsbgcolor = color [CI]Deprecated. This attribute sets the background color for the document body or table cells.This attribute sets the background color of the canvas for the document body (the BODY element) or for tables (the TABLE, TR, TH, and TD elements). Additional attributes for specifying text color can be used with the BODY element.This attribute has been deprecated in favor of style sheets for specifying background color information.

15.1.2 Alignment

It is possible to align block elements (tables, images, objects, paragraphs, etc.) on the canvas with the align element. Although this attribute may be set for many HTML elements, its range of possible values sometimes differs from element to element. Here we only discuss the meaning of the align attribute for text.Attribute definitionsalign = left|center|right|justify [CI]Deprecated. This attribute specifies the horizontal alignment of its element with respect to the surrounding context. Possible values:

left: text lines are rendered flush left.

center: text lines are centered.

right: text lines are rendered flush right.

justify: text lines are justified to both margins.

The default depends on the base text direction. For left to right text, the default is align=left, while for right to left text, the default is align=right.

A user finished working on a computer in the lab. What should the user do so
that their work is safe and others can use the computer?

Answers

Answer:

Explanation:

The best thing to do in this scenario would be to save all of the work that the user has just finished on a personal data USB drive and then delete any of his work off of the computer. Also, if the user entered into the computer using their own account they should also log off from the computer. The next individual can log in with their own account if they need to use the computer. This would make sure that their work is safe and with them, as well as making sure that no other individual can see, take, or modify the work that they have done.

replace ??mean function?? with the name of python function that calculates the mean. replace ??median function?? with the name of python function that calculates the median. replace ??var function?? with the name of python function that calculates the variance. replace ??std function?? with the name of python function that calculates the standard deviation.

Answers

The name of the Python function that calculates the mean is "mean" and it is part of the statistics module. The syntax for using the mean function is "statistics. mean(data)", where "data" is a list of numeric values.

The name of the Python function that calculates the median is "median" and it is also part of the statistics module. The syntax for using the median function is "statistics. median(data)", where "data" is a list of numeric values.

The name of the Python function that calculates the variance is "variance" and it is part of the statistics module. The syntax for using the variance function is "statistics. variance(data)", where "data" is a list of numeric values.

The name of the Python function that calculates the standard deviation is "stdev" and it is also part of the statistics module. The syntax for using the stdev function is "statistics.stdev(data)", where "data" is a list of numeric values.

Find out more about the python

at brainly.com/question/30427047

#SPJ4

True or Fales: Securing web applications is easier than protecting other systems.

Answers

False. Securing web applications is not necessarily easier than protecting other systems. In fact, it can be more complex and challenging due to the unique characteristics of web applications.

Web applications are generally accessible to a wide range of users from various locations, often over public networks. This wide accessibility makes them more vulnerable to security threats and cyberattacks. Additionally, web applications can involve a range of technologies, such as client-side scripting languages (e.g., JavaScript), server-side programming languages (e.g., PHP, Python), and databases, each with their own security concerns.

Protecting web applications requires a multi-layered approach that includes proper input validation, secure authentication mechanisms, encryption of sensitive data, and timely patching of vulnerabilities. It also involves addressing security issues in third-party components, such as plugins and libraries, which can be an ongoing challenge.

In contrast, other systems, such as closed networks or standalone applications, may have more controlled environments and limited access points, making it easier to implement security measures. However, it is important to note that the level of difficulty in securing any system depends on its specific features and requirements.

In conclusion, it is false to claim that securing web applications is inherently easier than protecting other systems. The unique nature of web applications, along with their widespread accessibility, can make them more challenging to secure. However, with a robust security strategy and continuous monitoring, it is possible to maintain a high level of protection for web applications.

Learn more about web applications here:

https://brainly.com/question/8307503

#SPJ11

Why do you think Beyonce's performance of the Negro National Anthem was so impactful at
Coachella?

Answers

Answer:

it showed a movement of black rights and brought awareness to it

Which method adds 10 to the right end of the array?
myArray.(10)
1- append
2- insert
3-add
4- index

Answers

Answer:

I believe it would be Array.append(10), would be able to give a definite answer if I knew the programming language.

Answer

B.append

Explanation:

the answer is append but it shows up as b for me so make sure your answes are aligned with the answer choices

;) bye have a great day

NEED ASAP.


Which multimedia feature can be used to automatically move objects in your slides?
X transition
O animation
O clipart
O innovation

Answers

Animationnnnnnnnnnnnn
Animation or clip art!!

Which of the following cannot be used in a calculated field? [HoursWorked] (a field in the current database)
An asterisk (*)
The number 12
All of these can be used in a calculated field

Answers

All of these can be used in a calculated field.

In a calculated field, you can use various elements to perform calculations and derive new values. The field [HoursWorked], which is already present in the database, can certainly be used in a calculated field. Additionally, both an asterisk (*) and the number 12 can also be utilized within a calculated field to perform

All of these can be used in a calculated field.

In a calculated field, you can use various elements to perform calculations and derive new values. The field [HoursWorked], which is already present in the database, can certainly be used in a calculated field. Additionally, both an asterisk (*) and the number 12 can also be utilized within a calculated field to perform mathematical operations. The asterisk symbol is commonly used to represent multiplication, while the number 12 can be used as a constant value or operand in calculations. Therefore, there are no restrictions on using any of these elements in a calculated field, allowing for flexibility in data manipulation and analysis.operations. The asterisk symbol is commonly used to represent multiplication, while the number 12 can be used as a constant value or operand in calculations. Therefore, there are no restrictions on using any of these elements in a calculated field, allowing for flexibility in data manipulation and analysis.

Learn more about calculated field here:

https://brainly.com/question/30408514

#SPJ11

How many lines are on a standard sheet of typing paper?

Answers

60 lines on the paper

Sophia wants to purchase and use a mat board that will be the safest option for long-term use. What would likely be the BEST option for her?
A. Installation board
B. velveteen mat board
OC. acid-soaked board
OD. archival rag board

Answers

The most likely best option for Sophia  is installation board is  Installation board.

What can I use in place of a mat board?

An alternative forms of matboard is Scrapbooking papers as it is made up of a wide range of options that one can be able to see at any craft store.

Therefore, the most likely best option for Sophia  is installation board is  Installation board. as it is the best option.

Learn more about board from

https://brainly.com/question/5016185

#SPJ1

Answer:

archival rag board

Explanation:

I just took it and this is the correct answer

Which type of free software contains embedded marketing material within the program?

shareware

freeware

Spyware

adware

Answers

Adware is the answer

Which example best demonstrates an impact of computers on the economy?

A. Entertainment is delivered instantly to users via streaming video to
televisions and smartphones.
B. Smartphones and other smart devices have changed the way we
research topics for school assignments.
C. Over a million people in the United States are employed in online
sales and advertising.
D. Content you post online may be used against you, hurting your
chances of employment.

Answers

The example that best demonstrates an impact of computers on the economy is that option C. Over a million people in the United States are employed in online sales and advertising.

What are the economic impacts of computers ?

A lot of studies have found a link between the use of computer and economic growth.

The use of  computer have improved communication, as well as inclusion, economic activity and good productivity and as such, The example that best demonstrates an impact of computers on the economy is that option C. Over a million people in the United States are employed in online sales and advertising.

Learn more about computers  from

https://brainly.com/question/24540334

#SPJ1

Answer:

C. Over a million people in the United States are employed in online

sales and advertising.

Passwords can be used to restrict access to all or parts of the cisco ios. Select the modes and interfaces that can be protected with passwords. (choose three. ).

Answers

Passwords can be used to limit access to the VTY and console interfaces. Out-of-band router administration can be prohibited in both user and privileged EXEC modes.

What is the purpose of a Vty?

Virtual teletype (VTY) is a command line interface (CLI) built in a router that is used to connect to the daemon through Telnet, a network protocol often used in local area networks. Users must enter a valid password to connect to a VTY.

User EXEC mode is the device’s default mode; it offers the most basic degree of user permissions. In this mode, you can run basic tasks like ping and traceroute, but only a subset of clear, show, and debug commands are available. The sample below shows the User EXEC prompt after logging in.

To learn more about VTY Refer:

https://brainly.com/question/17353008

#SPJ4

Answer

Explanation

Tormund wants to build a proxy firewall for his two computers, A and B. How can he build it?
A.
by connecting computer A with computer B and computer B to the proxy firewall
B.
by connecting a different firewall to each computer
C.
by connecting computer A to computer B through the proxy firewall
D.
by connecting only one of the computers to the firewall

Answers

Answer:

b

Explanation:

This is an analytical paper, so minimum theory.
1. Introduction – one paragraph – define and shortly describe the topic.
2. Provide analysis of whether a computer is innovation – apply criteria from the class materials or presentations.
3. Write a conclusion where provide your vision of the perspective for further development of computer technology.
Format:
1. One or two pages.
2. Font: 12 Times New Roman or similar.
3. Can be partly text and bullet points

Answers

This analytical paper aims to evaluate whether a computer can be considered an innovation, using criteria from class materials or presentations. The analysis will explore the characteristics and impact of computers to determine their innovative nature.

The introduction should provide a brief definition of the topic, highlighting that the paper will assess whether a computer qualifies as an innovation. It should also mention the criteria or frameworks from class materials that will be used to evaluate the innovative nature of computers.

The analysis section will delve into the criteria or frameworks discussed in class to assess whether a computer can be considered an innovation. It should examine the key features and advancements of computers, such as their ability to process information, automate tasks, facilitate communication, and enable unprecedented access to information. The analysis can incorporate bullet points to highlight specific aspects of innovation, such as novelty, usefulness, impact, and adoption.

In conclusion, the paper should present the author's vision of the future development of computer technology based on the analysis conducted. It can discuss the potential for further innovation in areas like artificial intelligence, quantum computing, and human-computer interaction. The conclusion should summarize the main points discussed and provide a forward-looking perspective on the continued evolution and impact of computers.

Overall, the paper should be concise and well-structured, providing an analytical assessment of computers as an innovation and offering insights into their future prospects.

Learn more about  innovation here :

https://brainly.com/question/17516732

#SPJ11

This analytical paper aims to evaluate whether a computer can be considered an innovation, using criteria from class materials or presentations.

The analysis will explore the characteristics and impact of computers to determine their innovative nature.

The introduction should provide a brief definition of the topic, highlighting that the paper will assess whether a computer qualifies as an innovation. It should also mention the criteria or frameworks from class materials that will be used to evaluate the innovative nature of computers.

The analysis section will delve into the criteria or frameworks discussed in class to assess whether a computer can be considered an innovation. It should examine the key features and advancements of computers, such as their ability to process information, automate tasks, facilitate communication, and enable unprecedented access to information. The analysis can incorporate bullet points to highlight specific aspects of innovation, such as novelty, usefulness, impact, and adoption.

In conclusion, the paper should present the author's vision of the future development of computer technology based on the analysis conducted. It can discuss the potential for further innovation in areas like artificial intelligence, quantum computing, and human-computer interaction. The conclusion should summarize the main points discussed and provide a forward-looking perspective on the continued evolution and impact of computers.

Overall, the paper should be concise and well-structured, providing an analytical assessment of computers as an innovation and offering insights into their future prospects.

Learn more about  innovation here :

https://brainly.com/question/17516732

#SPJ11

"please help i have exam
Discuss three phases of social media marketing maturity.

Answers

The three phases of social media marketing maturity are: 1. Foundation Phase 2. Growth Phase 3. Optimization Phase

1. Foundation Phase: In this phase, businesses establish their presence on social media platforms and focus on building a solid foundation for their marketing efforts. They create social media accounts, develop a consistent brand voice, and start engaging with their audience. The primary goal is to increase brand awareness and establish a basic level of social media presence.

2. Growth Phase: During this phase, businesses expand their social media strategies and start leveraging the full potential of social media marketing. They focus on growing their audience, increasing engagement, and driving traffic to their website or physical stores. This phase involves implementing more advanced strategies such as content marketing, influencer partnerships, and targeted advertising campaigns.

3. Optimization Phase: In the optimization phase, businesses refine their social media strategies based on data-driven insights and continuous improvement. They use analytics tools to measure the effectiveness of their campaigns, identify areas for improvement, and optimize their social media content and advertising strategies. This phase emphasizes the importance of data analysis, testing, and ongoing optimization to achieve better results and maximize return on investment.

The three phases of social media marketing maturity represent a progression from establishing a basic presence to achieving strategic growth and continuous optimization. As businesses advance through these phases, they develop a deeper understanding of their target audience, refine their messaging, and refine their tactics to drive meaningful results from their social media marketing efforts.


To learn more about website click here: brainly.com/question/32113821

#SPJ11

What kind of animation is used in the powerpuff girls show??

Answers

Calarts? Cartoon I don’t really know but that’s all the information that I have

cloud kicks want to give credit to opportunity team members based on the level of effort contributed by each person toward each deal. what feature should the administrator use to meet this requirement?

Answers

Opportunity Splits is the perfect feature that the administrator can use to meet Cloud Kicks' requirement of giving credit to opportunity team members based on the level of effort contributed by each person toward each deal.

Cloud Kicks want to give credit to opportunity team members based on the level of effort contributed by each person toward each deal. In order to meet this requirement, the administrator should use the feature known as "Opportunity Splits."Opportunity splits is a feature in Salesforce that allows for revenue sharing and record creation between team members working together to close a sale. This feature provides an easy and efficient way for sales teams to allocate credit to each team member who contributed to closing an opportunity. Opportunity Splits enables the administrator to determine how much percentage credit a team member will receive for their efforts. It automatically splits the amount of credit between each team member, based on the percentage amount that has been assigned to them. This ensures that each member is credited proportionately to their efforts and level of contribution. The feature also provides a comprehensive explanation of the percentage of credit shared among team members, based on their efforts. This makes it easier for the team members to understand and accept the credit allocation without any confusion.

To know more about Cloud visit:

brainly.com/question/1558130

#SPJ11

Any application that wants to be displayed on the web must use the HTTP protocol
True
False

Answers

Answer:

true

Explanation:

Absolute cell adressing

Answers

When copying a formula from one cell to another in Excel, an absolute reference is a cell reference where the column and row coordinates remain constant.

What is excel?

Users of Microsoft Excel may format, arrange, and compute data in a spreadsheet.

Data analysts and other users can make information easier to view as data is added or changed by organising data using software like Excel.

Cell references come in two flavours: absolute and relative. When copied and filled into other cells, relative and absolute references behave in different ways.

A formula's relative references are altered when it is copied to another cell. Contrarily, regardless of where they are duplicated, absolute references hold true.

When a specific cell reference needs to be constant, an absolute cell reference can be used. Formulas, charts, functions, and other instructions frequently use references to cells in their syntax.

Thus, this can be concluded regarding absolute cell addressing.

For more details regarding absolute cell addressing, visit:

https://brainly.com/question/30443246

#SPJ1

You are choosing your password for an online retailer. Pick the
strongest password:
Abcdefg
NEWS159737
ThisisMyPassword
12345678

Answers

The strongest pass is NEWS159737

Answer:

NEWS159737

Explanation:

This password uses a combination of letters and numbers, which generally makes the password harder to crack. However, some password cracking software may have been written utilizing the ideals that people will try to use a password with letters, numbers, and symbols, which can actually make it easier to hack a password like 1gh234g1kflc34 than a password such as pass1234.

a customer wants a dedicated and secure connection to their on-premises data center from their oracle cloud infrastructure (oci) resources. which two oci services can be used?

Answers

Oracle Cloud Infrastructure Virtual Cloud Network (VCN)Oracle Cloud Infrastructure FastConnect.

Establishing a Dedicated and Secure Connection from Oracle Cloud Infrastructure

Oracle Cloud Infrastructure (OCI) offers two services to provide dedicated and secure connections from OCI resources to an on-premises data center. Oracle Cloud Infrastructure Virtual Cloud Network (VCN) allows customers to create a secure, isolated, and private virtual network to communicate with their on-premises applications. VCN also provides routing services to securely route traffic between their on-premises applications and resources in the cloud. Additionally, Oracle Cloud Infrastructure FastConnect provides a direct, private connection between OCI and on-premises applications, enabling customers to reduce latency and increase throughput.

Learn more about Oracle Cloud Infrastructure: https://brainly.com/question/16010619

#SPJ4

Other Questions
What is the hydronium ion concentration of a solution with a hydroxide ionconcentration of 8.1 x 10-5 M? Kelsey graphed the equation y = 3x + 1 as shown below.On a coordinate plane, a line goes through points (negative 3, 0) and (0, 3).Which describes Kelseys error?Kelsey graphed the y-intercept on the x-axis.Kelsey graphed 3 instead of 3 as the y-intercept.Kelsey graphed the slope as up 1 right 1 instead of up 1 left 1.Kelsey graphed the slope as the y-intercept and the y-intercept as the slope. In argumentative writing, the writer should organize the information so that which section comes first?evidencereasonrebuttalthesis 1. Draw the undirected graph that represents the relation R = {(1,2), (1, 1), (2,1),(1,3), (3, 1), (3,3)} 2. Is the relation from question 1 a. reflexive? (why or why not) b. symmetric? (why or why not) c. transitive? (why or why not) d. an equivalence relation? (why or why not) In a laboratory experiment, students synthesized a new compound and found that when 13.03 grams of the compound were dissolved to make 201.5 mL of a diethyl ether solution, the osmotic pressure generated was 8.78 atm at 298 K. The compound was also found to be nonvolatile and a nonelectrolyte. What is the molecular weight they determined for this compound There was 3/5 of a gallon of paint in the bucket. Dr. Wu used 2/5 of that. How much paint was left? Como podemos evitar el Bullying en los centros educativos? The numerator and denominator of a fraction are in the ratio of 3 to 5. If the numerator and denominator are both increased by 2, the fraction is now equal to. If n = the numerator and d = the denominator, which of the following systems of equations could be used to solve the problem? 5n = 3d and 3n 6 = 2d 4 5n = 3d and 4n 4 = 3d 6 3n = 5d and 3n 6 = 2d 4. 30 POINTS, NO LINKS, AND ANSWER RIGHT.-15 = 8z + 7. what is the value of z For each of the following, write the equation of the line determined by the given pair of points in slope-intercept form or in the form xa or yb. autotrophs convert radiant energy into what ? 2. A car accelerates down the road. What is the "reaction" to the tires pushing on the road? do any of you guys know the answer to this? How did you think those in the Union responded when they heard the Gettysburg Address?PLEASE HELP Filipa and her four friends are looking for a house to rent for vacation. The price of an airplane ticket is $200, and they will spit the cost of the house rental, $r. Filipa has budgeted $600 for the airplane ticket and house. Write an inequality to to determine the maximum rental price that the house can be. What is tropical Cyclone Nivar in bacteria, a regulatory gene, a control region, and structural genes collectively are referred to as a(n) what is the motivation for individuals to hold money? a. to reduce risk b. to provide liquidity c. to facilitate transactions d. all of the above How are people still in school l.m.a.o like its June What role of the media in the protest for the women's suffrage movement? Did they make it better or worse?