InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 27051. |
Which Generation of computer should be most making profit in present year give your idea with reference? |
|
Answer» Explanation:Fast, INEXPENSIVE computers are now essential to numerous HUMAN endeavors. But less well understood is the need not just for fast computers but also for ever-faster and higher-performing computers at the same or better costs. Exponential GROWTH of the type and scale that have fueled the entire information technology industry is ending.1 In addition, a growing PERFORMANCE gap between processor performance and memory bandwidth, thermal-power challenges and INCREASINGLY expensive energy use, threats to the historical rate of increase in transistor density, and a broad new class of computing applications pose a wide-ranging new set of challenges to the computer industry. Meanwhile, societal expectations for increased technology performance continue apace and show no signs of slowing, and this underscores the need for ways to sustain exponentially increasing performance in multiple dimensions. The essential engine that has met this need for the last 40 years is now in considerable danger, and this has serious implications for our economy, our military, our research institutions, and our way of life. |
|
| 27052. |
Anyone knows one-dimensional array in Java Create a program using a one-dimensional array that will group numbers in an array following the given groupings provided below: Range Group 01-10 1 11-20 2 and so on... There will be 10 values as interval. Your program will only terminate once the input is 0 and below and above the highest range of 100. Sample Run: Enter an integer number: 22 22 belongs to Group 3 Enter an integer number: 5 5 belongs to Group 1 Enter an integer number: 0 Goodbye |
|
Answer» Anyone KNOWS one-dimensional array in JavaCreate a program using a one-dimensional array that will GROUP numbers in an array following the given groupings provided below:Range Group 01-10 111-20 2 and so on...There will be 10 values as interval. Your program will only terminate once the input is 0 and below and above the highest range of 100.Sample Run:Enter an integer number: 2222 BELONGS to Group 3Enter an bjh |
|
| 27053. |
Discuss in detail all generations of computer? |
|
Answer» rs are such an integral part of our everyday life now most people take them and what they have added to life totally for granted.first-generation-computerEven more so the generation who have grown from infancy WITHIN the global desktop and laptop revolution since the 1980s.The history of the computer goes back several decades however and there are five definable generations of computers.Each generation is defined by a significant technological development that changes fundamentally how computers operate – leading to more compact, less expensive, but more powerful, efficient and robust machines.1940 – 1956: First Generation – Vacuum TubesThese early computers used vacuum tubes as circuitry and magnetic drums for memory. As a result they were enormous, literally taking up entire rooms and costing a fortune to run. These were inefficient materials which generated a lot of heat, sucked huge electricity and subsequently generated a lot of heat which caused ongoing breakdowns.These first generation computers relied on ‘machine language’ (which is the most basic programming language that can be understood by computers). These computers were limited to solving one problem at a time. Input was based on punched cards and paper tape. Output came out on print-outs. The two notable machines of this era were the UNIVAC and ENIAC machines – the UNIVAC is the first every commercial computer which was purchased in 1951 by a business – the US Census Bureau.1956 – 1963: Second Generation – TransistorsThe replacement of vacuum tubes by transistors saw the advent of the second generation of computing. Although first invented in 1947, transistors weren’t used significantly in computers until the end of the 1950s. They were a big improvement over the vacuum tube, despite still subjecting computers to damaging LEVELS of heat. However they were hugely superior to the vacuum tubes, making computers smaller, faster, cheaper and less heavy on electricity use. They still relied on punched card for input/printouts.The language evolved from cryptic binary language to symbolic (‘assembly’) languages. This meant programmers could create instructions in words. About the same time high level programming languages were being developed (early versions of COBOL and FORTRAN). Transistor-driven machines were the first computers to store instructions into their memories – moving from magnetic drum to magnetic core ‘technology’. The early versions of these machines were developed for the atomic energy industry.1964 – 1971: Third Generation – Integrated CircuitsBy this phase, transistors were now being miniaturised and put on silicon chips (called semiconductors). This led to a massive increase in speed and efficiency of these machines. These were the first computers where users interacted using keyboards and monitors which interfaced with an operating system, a significant leap up from the punch cards and printouts. This enabled these machines to run several applications at once using a central program which functioned to monitor memory.As a result of these ADVANCES which again made machines cheaper and smaller, a new mass market of users emerged during the ‘60s.1972 – 2010: Fourth Generation – MicroprocessorsThis revolution can be summed in one word: Intel. The chip-maker developed the Intel 4004 chip in 1971, which positioned all computer components (CPU, memory, input/output CONTROLS) onto a single chip. What filled a room in the 1940s now fit in the palm of the hand. The Intel chip housed thousands of integrated circuits. The year 1981 saw the first ever computer (IBM) specifically designed for home use and 1984 saw the MacIntosh introduced by Apple. Microprocessors even moved beyond the realm of computers and into an increasing number of everyday products.The increased power of these small computers meant they could be linked, creating networks. Which ultimately led to the development, birth and rapid evolution of the Internet. Other major advances during this period have been the Graphical user interface (GUI), the mouse and more recently the astounding advances in lap-top capability and hand-held devices.2010- : Fifth Generation – Artificial Intelligencefifthgeneration-artificalintelligenceComputer devices with artificial intelligence are still in development, but some of these technologies are beginning to emerge and be used such as voice recognition.AI is a reality made POSSIBLE by using parallel processing and superconductors. Leaning to the future, computers will be radically transformed again by quantum computation, molecular and nano technology.The essence of fifth generation will be using these technologies to ultimately create machines which can process and respond to natural language, and have capability to learn and organise themselves. |
|
| 27054. |
Write a program to input names of n countries and their capitals and currency, store it in a dictionary and search and display for a particular country |
|
Answer» 1-In this program first you will call the dictionary function. 2-then you will INITIALISE the counter i as 1. 3-ask the no.of entries from user. 4-give while condition. 5-ask user to enter input(capital,country,CURRENCY) 6-store tuple in dictionary. 7-increment VALUE of i. 8-call keys usinf keys() function. |
|
| 27055. |
The interface betwee a computer dit A common networking model which enables many users to accessinformation in an efficient manner.ork in the world, connecting millions of |
|
Answer» ical user so so partho partho s model Oxford Dorset OUTDOOR at IST co |
|
| 27056. |
aloo ki vidut dhara kis electrode pr rang ka parivartan hota h a option a. ghan electrone pr b. rin electrone pr c. rarg electrone pr. d. dono electrone pr |
|
Answer» The owner of a GENERAL Store WANTS to open a branch innearby town will you advicehim to take a PARTNER to RUN the branch.Store wants to open a branch Store or employa manager/assistent? Give REASON |
|
| 27057. |
Explain basic commands in QBasic with examples. |
| Answer» SIC useful commands on QBasic:PRINT: This COMMAND prints the statement or data written after it. ...INPUT: INPUT command is used to take inputs/data from the user. ...CLS: CLS stands for CLEAR SCREEN and is used to clear the screen if some previous results/outputs are present on the screen. | |
| 27058. |
Discuss in detail all generations of computer |
|
Answer» tion:Nowadays, generation includes both hardware and SOFTWARE, which together make up an entire computer system. There are five computer GENERATIONS known till DATE. Each generation has been discussed in DETAIL along with their time period and characteristics. ... The period of third generation: 1965-1971. |
|
| 27059. |
Is used to set the minimum distance between two adjacent cells |
| Answer» CELL padding 3) Cell padding. is an attribute of the tag to set the MINIMUM distance between TWO ADJACENT cells.Explanation: | |
| 27060. |
4.) Abhay wants to organise his data into rows and columns. suggest him a suitable way (with steps) to do so. (Application Based Questions) . |
| Answer» K as a BRILLIANT PLZ plz plz plz | |
| 27062. |
Obf suum gsy miit comeWhat is a computer |
|
Answer» ProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZzProSnipZz |
|
| 27063. |
Type A : Short Answer Questions/Conceptual Questions *What you1. What is modulation ? What is the need of modulation ?2. What are two main types of modulation techniques ?How is amplitude modulation different from frequency modulation ?understand by collisions in a network ?5. Wired and wireless networks use different mechanisms to detect and handle6. What is CSMA/CA ?7. Why can't wireless network detect collisions ?8. What are ACK, RTS, CTS signals ?9. Explain the working of CSMA/CA and its two implementation.10. Which implementation of CSMA/CA is used for smaller networks and which11. What is the process of routing ?of t11 in routine 2 |
|
Answer» so muchanswer 1Modulation is the process of CONVERTING data into radio waves by adding information to an electronic or optical carrier signal. A carrier signal is one with a steady waveform -- constant height, or amplitude, and frequencyModulation allows us to send a signal over a bandpass frequency range. If every signal gets its own frequency range, then we can transmit multiple signals simultaneously over a single channel, all using different frequency ranges. Another reason to modulate a signal is to allow the use of a smaller antenna.answer 2modulation techniques are classified into two major types: analog and digital or pulse modulation.The main difference between both modulations is that in frequency modulation, the frequency of the carrier wave is modified as per the transmit data, while in amplitude modulation, the carrier wave is modified according to the data.answer 5Yes. If you have a wireless router that also has Ethernet ports, you can use wired and wireless devices TOGETHER. A LAN that includes both wired and wireless devices is sometimes called a "mixed networkanswer 6Carrier-sense multiple access with collision avoidance (CSMA/CA) in computer networking, is a network multiple access method in which carrier sensing is used, but nodes attempt to avoid collisions by beginning transmission only after the channel is sensed to be "idle".answer 7This is due to CSMA/CD's nature of 'listening' if the medium is free before transmitting packets. ... Therefore, CSMA/CA is used on wireless networks. CSMA/CA doesn't detect collisions (UNLIKE CSMA/CA) but rather avoids them through the use of a control message.answer 8RTS/CTS (Request To Send / Clear To Send) is the optional mechanism used by the 802.11 wireless networking protocol to reduce frame collisions introduced by the hidden node problemanswer 9The algorithm of CSMA/CA is: When a frame is ready, the transmitting station checks whether the channel is idle or busy. If the channel is busy, the station waits until the channel becomes idle. If the channel is idle, the station waits for an Inter-frame gap (IFG) amount of time and then sends the frameanswer 10I don't know sorryanswer 11Routing is the process of selecting a path for TRAFFIC in a network or between or across multiple networks. Broadly, routing is performed in many types of networks, including circuit-switched networks, such as the public switched telephone network (PSTN), and computer networks, such as the Internet.In packet switching networks, routing is the higher-level decision making that directs network packets from their source toward their destination through intermediate network nodes by specific packet forwarding mechanisms. Packet forwarding is the TRANSIT of network packets from one network interface to another. Intermediate nodes are typically network hardware devices such as routers, gateways, firewalls, or switches. General-purpose computers also forward packets and perform routing, although they have no specially optimized hardware for the task.worked very very hard to give this answer |
|
| 27064. |
E.Presskey on the keyboard for partial modification of data. |
| Answer» BACKSPACE KEY..EXPLANATION:Am i RIGHT? | |
| 27065. |
What are dictionary in python how we can create it |
|
Answer» tion:CREATING Python DictionaryCreating a DICTIONARY is as SIMPLE as placing ITEMS inside curly braces {} separated by commas. An item has a key and a corresponding value that is EXPRESSED as a pair (key: value). |
|
| 27066. |
What is ( obfsuumgsy ) programing? |
|
Answer» OBD stands for On-Board Diagnostics and is a COMPUTER SYSTEM inside of a vehicle that TRACKS and REGULATES a car's PERFORMANCE. The computer system collects information from the network of sensors inside the vehicle, which the system can then use to regulate car systems or alert the user to problems |
|
| 27067. |
CERTIFIED O.E. REMOTE2684 G8T0601KEFPVCLEAN |
| Answer» | |
| 27068. |
Question:Which of the following is not the process ofCBAM? |
|
Answer» education leaders have ADOPTED a new reform or initiative with HIGH hopes, only to see it produce few results. Successfully implementing a new program involves more than providing staff with MATERIALS, resources, and TRAINING. An often overlooked factor is the human element—the people actually doing the work. Each person will respond to a new program with unique attitudes and BELIEFS, and each person will use a new program differently. The three diagnostic dimensions of the Concerns-Based Adoption Model (CBAM) . |
|
| 27069. |
________ function can also be used to draw a circle. |
|
Answer» , also KNOWN as a pair of compasses, is a TECHNICAL drawinginstrument that can be used for inscribingcircles or arcs. As DIVIDERS, they can also be used as tools to measure distances, in PARTICULAR on maps. Compasses can beused for mathematics, drafting, navigation and other PURPOSES. |
|
| 27070. |
The job of filling all these empty boxes with appropriate data is knownas*Data entry* Moment of time |
| Answer» DATA ENTRY is the CORRECT OPTION | |
| 27071. |
15. (a) Name one Protozoan's disease caused by drinking contaminated water(b) Name one bacterial disease in plants and give its one symptom(c) How can we prevent Ringworm infection? |
| Answer» TION:a) Malariab) CITRUS CANKER | |
| 27072. |
What is boltzman machine |
|
Answer» These are stochastic learning processes having recurrent structure and are the basis of the early optimization techniques USED in ANN. Boltzmann Machine was invented by Geoffrey Hinton and Terry Sejnowski in 1985. More CLARITY can be observed in the words of Hinton on Boltzmann Machine.“A surprising feature of this network is that it uses only locally available information. The change of weight depends only on the behavior of the two units it connects, even though the change optimizes a global measure” - Ackley, Hinton 1985.Some important points about Boltzmann Machine −They use recurrent structure.They consist of stochastic neurons, which have one of the two possible states, either 1 or 0.Some of the neurons in this are adaptive freestate and some are clamped frozenstate.If we apply simulated annealing on discrete Hopfield network, then it would become Boltzmann Machine.Objective of Boltzmann MachineThe main purpose of Boltzmann Machine is to optimize the solution of a problem. It is the work of Boltzmann Machine to optimize the weights and quantity related to that PARTICULAR problem.ArchitectureThe FOLLOWING diagram shows the architecture of Boltzmann machine. It is clear from the diagram, that it is a two-dimensional array of units. Here, weights on interconnections between units are –p where p > 0. The weights of self-connections are given by b where b > 0. |
|
| 27073. |
This property specifies the format for displaying and printing the data thatwe enter in the field *O Length propertyO Format property |
| Answer» | |
| 27074. |
Is nothing but putting some possible rules and checkpoints fordata to be entered for each field thisfurther restricts the values enter in aparticular field **Field information properties* Field level validation |
| Answer» MAG ML KA salamatExplanation:SANA makatolong | |
| 27075. |
Consider the following data : a) Write the formula to find the sum of all subjects of Kerry and Risha.b) Write the formula to find the average of marks of John.c) Write the formula to find total marks in science by all the students (asap) |
| Answer» SE MARK as BRAINLIEST ☺ | |
| 27076. |
The table field which exist in the parent table and is in the child table isknown as foreign key and*Referencing field* Referenced field |
| Answer» REFERENCED FIELD I HOPE you GET the ANSWER | |
| 27077. |
A table though cannot have more than one primary key howevercombination of more than one fieldcan serve as a primary key, a primarykey is so designed is known as*Composite primary key*Complex primary key |
|
Answer» Primary keys MUST CONTAIN unique VALUES. A primary key column cannot have NULL values. A table can have only ONE primary key, which may consist of single or multiple fields. When multiple fields are USED as a primary key, they are called a composite key. |
|
| 27078. |
Write a Java program to Addition of two numbers in GUI format |
| Answer» TION:LENGTH() == 0) { text2 = "0"; } int VAL2 = INTEGER. parseInt(text2); int sum = val1 + val2; tf3. setText(Integer. toString(sum)); | |
| 27079. |
Write an SQL command to find the numbers of students who are from section A. Please tell the answer |
| Answer» SQL query using COUNT and HAVING clauseConsider a table STUDENT having the following schema:STUDENT (Student_id, Student_Name, ADDRESS, Marks) Student_id is the primary column of STUDENT table.Let FIRST create the table structure with CREATE Command in SQL:CREATE TABLE STUDENT (STUDENT_ID NUMBER (4), STUDENT_NAME VARCHAR2 (20), ADDRESS VARCHAR2 (20), MARKS NUMBER (3), PRIMARY KEY (STUDENT_ID)); | |
| 27080. |
Correct the program public class Main { public static void main(String[] args) { Scanner sc = new Scanner(System.in); int i, k, p; double d=0,rp,np,tax; String name, st; System.out.println("enter name of customer "); name=in.nextInt(); System.out.println("enter ur choice "); k=in.nextInt(); if(k==1) { System.out.println("enter the amount "); p=in.nextInt(); if(p20000 && p40000 && p60000) d=p*12.0/100.0; rp=p-d; tax=rp*12.5/100.0; np=rp+tax; System.out.println("customer s name "+name); System.out.println("price of product "+p); System.out.println("discount "+d); System.out.println("tax"+tax); System.out.println("amount to be paid "+np); }} } |
|
Answer» Import SCANNERYou have not imported the Scanner ClassExplanation:Import Scanner CLASS LIKE this --> import java.util.Scanner; or WRITE import java.util.*;public class Main{public static void main(String args[]){your coding is write }} |
|
| 27081. |
Question: Which of the following is true about servlets?Option 1:Servlets execute within the address space of web serverOption 2:Servlets execute within the address space of web server, platform independent and uses the functionality of java class librarieOption 3:Servlets are platform-independent because they are written in javaOption 4:Servlets can use the full functionality of the Java class libraries |
|
Answer» A servlet is a JAVA programming LANGUAGE class that is used to extend the capabilities of servers that host applications accessed by means of a REQUEST-response programming MODEL. Although SERVLETS can respond to any type of request, they are commonly used to extend the applications hosted by web servers.Explanation: |
|
| 27082. |
Please help me by answering these question |
| Answer» YES TELL me these QUESTIONS I,all TRY my BEST | |
| 27083. |
(Teacher_Name, DOB) is the key for Teacher, all the other attributes depend on the whole key, and only other FD is "School_Name determines the Teacher_Name uniquely". Is Teacher in 2NF? |
|
Answer» 34128422?answering=trePage%2F1dExplanation: |
|
| 27084. |
5. Name the two similarities between postal mail and e-mail. |
|
Answer» Answer. Email and postal letters both needs address to be mentioned. Letters to be DELIVERED should be mentioned. Letters and emails both are written on pages, the only difference in this case is that email BELONGS to INTERNET or WEB page whereas letters belong to normal pages. |
|
| 27085. |
अर्थ बताइए प्रगति ? |
|
Answer» प्रगति उसी को कहेंगे जहाँ मनुष्य की गति है - भैतिक-मानसिक तथा मानसिक-आध्यात्मिक। यह भौतिक-मानसिक गति क्या है, समाज के जितने मनुष्य हैं, सबों को साथ लेकर चलूँगा। साधक केवल अपने आगे बढ़ेंगे और दुनिया के और व्यक्ति पीछे रह जाएँगे-यह मनोभाव साधक का नहीं है।Explanation:here is your ANSWER if you LIKE my answer PLEASE FOLLOW |
|
| 27086. |
HIGIL. USE Wine TOP 20. Write a program to display the following patterns as per the user's choice.Pattern 1Pattern 2IIССSSEE E |
| Answer» | |
| 27087. |
The consists of number keys arithmetic operators and the decimal point |
|
Answer» The numpad's keys are digits 0 to 9 , + (addition), - (SUBTRACTION), * (multiplication) and / (division) symbols, . (DECIMAL POINT), Num Lock , and ↵ Enter keys. ... Sometimes it is necessary to DISTINGUISH between a key on the numpad and an equivalent key elsewhere on the keyboard. |
|
| 27088. |
Insert a photographe from your computer in your documents |
| Answer» L UNIVERSE, also KNOWN as an alternate universe, or alternate REALITY, is a hypothetical self-contained plane of existence, co-existing with one's own. ... The term "parallel universe" is more general, without implying a RELATIONSHIP, or lack of relationship, with our own universe. | |
| 27089. |
The function key ______ is used to open the option of the Tool palette on the Photoshop workspace. |
| Answer» BRO I know you are a great guy but I don't get it PLS MARK me as brainliest | |
| 27091. |
an electric fan is operated at 220 v potential difference for 2 minutes if the resistence of the fan is 200 ohm then find the rate at which heat is transferred |
|
Answer» brainly.in/question/34128422?answering==feedPulic%2FmePage%2F1dExplanation: |
|
| 27092. |
What is thr use of enter key |
|
Answer» The enter key is a computer innovation, which in most CASES CAUSES a command line, window form, or dialog box to operate its default function. This is typically to FINISH an "entry" and begin the desired process, and is usually an alternative to CLICKING an OK button |
|
| 27093. |
____is best known for it’s specializing in graphics Processing. |
|
Answer» GPU ( graphics presenting UNIT ) is BEST known for its SPECIALIZING in graphics PROCESSING. |
|
| 27094. |
Which is the best laptop brand ??? |
|
Answer» Best LAPTOPS 2021 MacBook Air (late 2020) The best laptop of 2021. ... HP Envy x360 (2020) The best budget laptop you can buy. ... MacBook PRO 13 (late 2020) The best MacBook Pro for everyday USERS. ... DELL XPS 13 2-in-1. ... Dell XPS 13 (late 2020) ... Asus ROG Zephyrus G14. ... MacBook Pro (16-inch, 2019) ... HP Elite Dragonfly.Explanation: |
|
| 27095. |
Question: Which of the following is true?Option 1:A dynamic structure requires a simulator to perform analysisOption 2:A dynamic structure does not requires a simulator to perform any analysisOption 3:Connectors transfers data unidirectionalyOption 4:None of the mentioned |
| Answer» 1ST ONE is CORRECT!RIGHT? | |
| 27096. |
राइट ए प्रोग्राम टो डिस्पले दफा टर्न ऑफ 1223 334 444 55555 |
|
Answer» d Answer:-Correct Question:Write a program to display the PATTERN. 12 23 3 34 4 4 45 5 5 5 5Solution:1. In Java. public class Pattern { public static void main(String[] args) { int i, j; for(i=1;i<=5;i++) { for(j=1;j<=i;j++) System.out.print(i); System.out.println(); } }}2. In Python. for i in range(1,6): for j in range(1,i+1): print(i,end=" ") print()3. In C#include |
|
| 27097. |
Page No.1Date:28TWhat is thefull form of Computer? |
| Answer» COMMON operating machine PURPOSELY used for TECHNOLOGY and EDUCATIONAL research. MARK me as brainliest plz | |
| 27098. |
What is cybercrime?? |
| Answer» CYBERCRIME is criminal activity that either TARGETS or uses a computer, a computer NETWORK or a networked device. Most, but not all, cybercrime is committed by CYBERCRIMINALS or hackers who want to make money. Cybercrime is carried out by individuals or organizations. | |
| 27099. |
Write any 5 differences between Bus topology and Ring topology ? |
|
Answer» In Ring topology each DEVICE is CONNECTED to TWO other devices in a circular fashion. Bus topology is a topology where each device is connected to a single CABLE which is known as the backbone. 2. In Ring topology data is sent through the devices from sender to receiver device.. |
|
| 27100. |
Tab is the primary tab that contains the more frequently used commands view is the default view and lets you work in three workinge. Thef. Thetab shows thumbnails of your slidesg.tabs are displayed when you perform certain tasks.h. PowerPoint'sareas simultaneously.i.are the built-in features of Microsoft PowerPoint. |
|
Answer» Not only MUST we be good, but we must also be good for something.” – HENRY DAVID Thoreau.sorry I REALLY don't knoww this ANSWER |
|