If you were to re-design your App, what future improvements would you make and why?

Answers

Answer 1

Answer:

Create A Prototype app to Save Time and Budget

Explanation:

The Prototype model is one of the software development life cycle models in which a prototype is built with minimal requirements. This prototype is then tested and modified based on the feedback received from the client until a final prototype with desired functionalities gets created. This final prototype also acts as a base for the final product.

As mentioned earlier, this model is useful when all the detailed requirements are not known to the client before starting the project. It is also useful when the product to be developed is a complex one and similar product does not exist in the market.  

In such a scenario, the client can ask the developers to start working on the basic prototype with limited requirements. Once the basic prototype is ready, the client can see and check the prototype to decide what all changes are required.

To Get a Prototype App consultancy: https://www.savahapp.com/app-prototyping-tool


Related Questions

Which of the following kinds of file utilities shrink the size of a file(s)?
A. conversion. B. file compression. C. matrix. D. unit

Answers

The Correct answer is Option (B), A file compression utility is a utility that shrinks the size of a files.

What is Compression utility?

A software package that compressed and decodes different file types is known as a compression software or compression utility. Tools of compressing and uncompressing files are generally included with operating systems. For instance, the most recent versions of Microsoft Windows come with a tool for producing and extracting compressed files.

What makes a compression tool helpful?

Black and white pictures can be compressed up to 10 times, and color image files can be compressed up to 100 times). They will upload faster as a result, making them considerably simpler to email and transfer.

To know more about Compression utility visit :

https://brainly.com/question/30022738

#SPJ4

An application named APP1 runs on a domain-joined Windows server named SERVER1. When APP1 runs, it reads and writes to a specific registry key. You need to harden APP1's access to the registry. What should you do

Answers

Make a service account for APP1 and use regedit.exe to provide the service account the required registry rights.

In regedit, how can I add permissions?

Click Start > Run > type regedit.exe > press Enter to launch the Registry Editor. Right-click the key that requires permission in the left pane, then select Permissions. Choose the user or group to which the permission should be applied. For the access levels of the group or username, select the Allow checkbox.

Registry permissions: What are they?

Each permission option allows you to manage Registry rights for a certain person or group. Three groups of these permissions are provided by the Registry. The procedure of defining user access to the Registry keys is made simpler by these groupings.

To know more about APP1 visit:-

https://brainly.com/question/30137229

#SPJ4

Which of the following Windows PowerShell commands performs a DNS name query for www.contoso.com?
a. ping www.contoso.com
b. dnsquery www.contoso.com
c. resolve-DNSName -Name www.contoso.com
d. resolve-DNSquery

Answers

The DNS name query for www.contoso.com is carried out by the Windows PowerShell command resolve-DNSName -Name www.contoso.com.

When syncing a Windows 10 machine with a wifi access point?

The most recent security protocol with the highest standards is WPA3 (Wi-Fi Protected Access version 3). Simultaneous Authentication of Equals is a handshake used by WPA3 to protect against dictionary attacks and shield its network from potential assaults that WPA2 could allow.

To verify network connectivity between two hosts, which of the following commands is used?

Traceroute - To find the route between two connections, use the traceroute command. Frequently, a link to another device must pass via several routers. The traceroute command will return all of the router names or IP addresses between two devices.

To know more about DNS name query visit :-

https://brainly.com/question/28235999

#SPJ4

Why is computer science so important?

Answers

The reason that computer science are:

Economic Impact: Technological AdvancementSocietal ImpactSkill Development

What is computer science?

Computer science is important for several reasons:

Economic Impact: Computer science is a rapidly growing field with a high demand for skilled professionals. It plays a crucial role in driving innovation and economic growth in various industries such as finance, healthcare, education, and entertainment.

Technological Advancement: Computer science is the foundation of modern technology. It is the backbone of the internet and it's a key driver of technological advancements such as artificial intelligence, machine learning, and big data.

Societal Impact: Computer science plays a critical role in solving complex societal problems such as healthcare, education, and environmental issues. It can help to improve the quality of life and make the world a better place.

Lastly, in Skill Development: Learning computer science helps to develop a range of skills such as problem-solving, critical thinking, and creativity that are valuable in any field.

Learn more about computer science  from

https://brainly.com/question/20837448

#SPJ1

When checking to see whether a particular name is registered on the Internet, your computer accesses a database that is kept on a(n) ________ server.

Answers

Answer: DNS

Explanation:

The trackpad/touchpad on my laptop is acting unusual. When I click on something or move to an area, it jumps or moves to another area. What would be a good troubleshooting step to try and resolve this issue

Answers

1. Check Drivers: this probably won't solve your issue as driver problems are pretty rare, but it's a pretty good first step. To find drivers, search your model number on your manufacturers website.

2. Dry out the touchpad: I've had similar experiences when a touchpad is wet. Dry out the touchpad using a microfiber cloth or a paper towel.

an array is a(n) ____ of values in computer memory.

Answers

In a computer's memory, an array is a list of values. Each element (value or variable) in an array is identified by at least one array index or key. An array is a type of data structure.

when using subscript 6 when you have a 5 element array?

It is argued that your subscript is out of limits if you have a five element array and use subscript 6. The loop control variable has two possible values: increase and decrease. By exiting a loop as soon as a match is discovered in the array, you can increase a program's efficiency.

In a data structure, what exactly is an array?

A continuous stream of memory locations is used to hold elements of the same data type in arrays.

To know more about array visit :-

https://brainly.com/question/13261246

#SPJ4

Joe works for an insurance company and has been tasked with creating a web-based application that the field adjusters can use to upload pictures of vehicles they are inspecting. Which of the following components would Joe need to create and configure on their cloud service provider's portal for the pictures to be saved to

Answers

We tried several cloud backup services, and while they are all difficult to use for various reasons, we nevertheless advise utilising one.

What is cloud backup services?Local backups serve as the foundation of a sound backup strategy, but an online backup service should be the capstone. In our opinion, Back blaze is the best cloud backup service for the majority of users and the most user-friendly after years of testing.Back blaze is the least expensive backup solution we examined, offering unrestricted online storage for one machine for about $70 annually. On Mac and Windows, it is simple to use. The uploads begin right away with the most frequently used folders that need backing up when the software is installed and the settings are left to their defaults. Despite the fact that Back blaze only retains file versions for 30 days, which is shorter than we'd prefer, it does provide paid upgrades to extend the time that backups are kept accessible. Backblaze supports external drives that are linked to your computer and offers a robust selection of online support resources. However, the use of private encryption keys compromises some security for usability, and the restoration procedure is far too slow.

To Learn more About cloud backup services Refer To:

https://brainly.com/question/13152446

#SPJ4

While configuring a Windows 10 workstation for a new high priority project, you decide to mirror the operating system disk drive for redundancy. Which type of RAID (Redundant Array of Independent Disks) will you be configuring in Windows disk management

Answers

RAID1 type of RAID will be configuring in Windows disk management.

What do RAID 1 0 and 0 +1 mean?

Despite the similarities between RAID 1+0 and RAID 0+1, the numbers' reversed order implies that the two RAID levels are layered in the opposite direction. In RAID 1+0, two drives are mirrored together before being combined into a striped set. Two stripe sets are created and then mirror using RAID 0+1.

RAID 1 has how many drives?

With two drives, RAID 1 is most frequently used. Drive failure fault tolerance is provided by the replicated data on the disks. While write performance is reduced to that of a single drive, read performance is boosted. Without data loss, a single drive failure is possible.

To know more about RAID visit

brainly.com/question/14669307

#SPJ4

I need help with creating a code for defining if a number i an Armtrong or not
on code h

Answers

A number is said to be Armstrong if the sum of its digits raised to the power of three equals the number itself. For instance, the number 371 is an Armstrong number as 3**3 + 7**3 + 1**3 = 371

I don't know how to receive my Armstrong number.

Armstrong numbers are numbers that are identical to themselves when the various digits of the number are added together to form a cube. Because 153 = 13+53+33, it is an Armstrong number. Expected Results: The Armstrong number is 153.

The inventor of the Armstrong number?

American electrical engineer and inventor Edwin Howard Armstrong (December 18, 1890 – February 1, 1954) created the superheterodyne receiver system and FM (frequency modulation) radio.

To know more about armtrong number visit:

https://brainly.com/question/29556551

#SPJ4

The statement “If a customer buys a dozen eggs, he or she is 80% likely to also purchase milk.” is a conclusion that may be determined from what type of data mining?

Regression Analysis
Clustering Analysis
Association Rule Mining
Anomaly or Outlier Detection

Answers

Answer:

Association Rule Mining

Explanation:

The statement being made is a conclusion that may be determined with Association Rule Mining. This is because this type of data mining focuses on discovering various frequently occurring patterns, correlations, or associations in large sets of data. In this statement, various surveys or experients would have most likely concluded that many individuals that ended up buying a dozen eggs also purchased milk, which would have indicated a pattern in the data set.

The type of data mining from which the given statement concluded is; C: Associate Rule Mining

What is Data Mining?

The given statement made is a conclusion that can be determined with Association Rule Mining. This is because this type of data mining is one that places emphasis on discovering various frequently occurring patterns, correlations, or associations that exists in large sets of data.

Finally, various surveys or experiments would most likely have definitely concluded that many individuals that ended up buying a dozen eggs that is 80% also likely to purchase milk, which would indicate a pattern in the data set.

Read more about Data Mining at; https://brainly.com/question/14846093

Which best describes the jobs each applicant could obtain with their education background? ​

Answers

Answer:

Eli can work as an e Electromechanical Technician. Blake can work as a Museum Conservator. Fiona can work as a Robotics Engineer, and Zoey can work as a Mathematician

Explanation:

The degrees earned by the applicants for the STEM Career Cluster are;

Eli; High school diploma, associate degree

Blake; High school diploma, bachelor's degree, masters degree

Fiona; High school diploma, bachelor's degree

Zoey; High school diploma, bachelor's degree, doctoral degree

a) The educational requirement for an Electromechanical Technician is a post secondary certificate in mechanical or electronic technology or an associate degree

The suitable candidate to work as an Electromechanical Technician is Eli to prevent underemployment of the other candidates

b) The educational requirement for a Museum Conservator is usually a master's degree

The suitable candidate is Blake

c) The minimum educational requirement for a Robotics Engineer is a bachelors degree

Therefore, Fiona can obtain a job as a Robotics Engineer

d) The educational requirement for a Mathematician is usually a masters or doctorate degree

Based on the educational requirement, only Zoe can obtain a job as a Mathematician.

The rules and meaning of The Royal Game of Ur have been preserved on stone tablets.
true
false

Answers

Answer:

True

Explanation:

Answer:

True

Explanation:

To generate a surrogate key, Microsoft Access uses a(n) ____ data type.
a. identity
b. autoNumber
c. surrogate
d. sequence

Answers

B. AutoNumber???
This is a strange question..
sorry if I’m wrong


One line of code is missing (marked in
red). Write a single line that MUST use the
class function "plus" to increase the value
of num1.number.
When done correctly, this code already will
print the new value of num1.number.

Answers

Answer: num1.plus(1);

Explanation:

You are seeing streaks of toner across your papers when you are printing things using your office's laser printer. What is the MOST likely cause of this problem

Answers

It's usually a sign of a filthy transfer roller if you notice toner streaks on your printouts. As a result, routinely cleaning the transfer roller will keep your printed documents spotless.

What brings about toner streaks?

Toner can pour out of a broken cartridge, or it can cause streaky prints. It is necessary to change your toner cartridge if any of its photoconductor's (the part with the green or blue roller) parts are visibly harmed.

Why are there streaks on my laser printer's prints?

The most common causes of streaking are a used-up toner cartridge or a worn-out drum unit. Drum units are consumables that only require replacement after using three or four toner cartridges. Toner and drum units are not always used separately by printers.

To know more about laser printer visit:-

https://brainly.com/question/14783882

#SPJ4

Why do you think lists are essential concepts in programs?

Answers

Answer:

A list, sometimes called an array, is a tool for storing data, just like a variable. However, unlike a variable, which can only store one piece of data, a list can store many. Like a variable, a list is a named storage area within the computer's memory.

After embracing a BYOD policy, a company is faced with new security challenges from unmanaged mobile devices and laptops. The company’s IT department has seen a large number of the following incidents:
• Duplicate IP addresses
• Rogue network devices
• Infected systems probing the company’s network
Which of the following should be implemented to remediate the above issues? (Choose two.)
A. Port security
B. Route protection
C. NAC
D. HIPS
E. NIDS

Answers

A. Port security and C. NAC (Network Access Control) should be implemented to remediate the above issues.

What is Port security?

Port security is a feature that allows an administrator to specify which devices are allowed to connect to a switch port. It can also be used to limit the number of MAC addresses that are allowed to connect to a port. This can help prevent rogue devices from connecting to the network, which can help prevent unauthorized access and protect against attacks.

What is Network Access Control (NAC)?

Network Access Control (NAC) is a security solution that helps to enforce security policy compliance on all devices attempting to access a network. It is used to authenticate and authorize devices before they are allowed to connect to the network. It can also be used to block or quarantine infected or noncompliant devices to prevent them from spreading malware or compromising the security of the network. Additionally, NAC can be used to ensure that devices connecting to the network have the latest security updates and patches installed.

To know more about BYOD policy visit :

brainly.com/question/28096962

#SPJ4

Outline four types of cyber law.

Answers

Answer:

Fraud, Copyright, Defamation, Harassment and Stalking, Freedom of Speech, Trade Secrets, and Contracts and Employment Law.

Explanation:

These are the major areas of cyber law.

Sarah has an audio file to insert into a presentation, but she does not want the entire file to play. What should she do to have only a portion of the file play when the audio control is selected?

1. Create bookmarks.
2. Edit the file prior to inserting it into the presentation.
3. Use the Trim Audio dialog box.
4. Configure Audio styles.

Answers

Answer:

3. Use the Trim Audio dialog box. :3

Answer:

3: Use the Trim Audio dialog box.

Explanation:

I am not entirely sure, though I am quite certain.

Which local folder temporarily stores all sent mails until they are successfully sent to a recipient

Answers

Answer:

The outbox stores all outgoing emails until the Email programs sends them to a recipient.A computer or phone's outbox is a folder where emails that are awaiting sending are kept

Explanation:

You must analyze data on a digital camera's internal memory. You plan to connect your forensic computer to the camera using a USB cable. What should you do to ensure that you do not modify data on the camera

Answers

A read-only device known as a forensic disk controller or a hardware write-blocker enables users to access the data on a questionable device without running the risk of changing or destroying the data.

What initial care should be taken with a mobile device to protect data?

The easiest approach to handle a mobile device and protect data is to keep it powered on while enclosing it in a Faraday cage.

What program is used to image a disk for forensic purposes?

The Autopsy and the Sleuth Kit are probably the two most well-known forensics toolkits. The Sleuth Kit is a command-line tool that does forensic examination of hard drive and smartphone forensic photos.

To know more about forensic disk visit:-

https://brainly.com/question/9692470

#SPJ4

Python ch5
Write the code to call the function named send_signal. There are no parameters for this function.send_signal()
Write a definition of the function printDottedLine, which has no parameters and doesn't return anything. The function prints to standard output a single line consisting of 5 periods (".").
def printDottedLine():
print(".....")
Write the code to call a function whose name is send_number. There is one argument for this function, which is an int. Send 5 as an argument to the function.send_number(5)
Write the code to call a function named send_variable and that expects a single int parameter.

Answers

The code to call the function name send_signal() is given below.

In Python, how can you call any function without any arguments?

In these circumstances, we can call the function using default arguments without providing the values again for parameter values.Python allows us to accomplish this by using the = sign and the default value.

send_signal().

def printDottedLine():

print(".....")

def printDottedLine():

print(".....")

send_number(5)

send_variable(x);

To know more about Python visit:

https://brainly.com/question/13437928

#SPJ4

R Management 4. Assume that your system has one queue for jobs waiting for printing, and another queue for those waiting for access to a disk. Which queue would you expect to have the faster response? Explain your reasoning. ​

Answers

This suggests that the other queue, where jobs are awaiting access to a disk, will move more quickly.

Why is a system referred to as a computer?

Its interconnected components (input, output, storage, and CPU) work together to accomplish the tasks specified in the program being run, a computer is referred to as a system.

This is so that other jobs can't interfere with the job that is done as even the printing queue operates on the first Attend, First Wait algorithm, which requires the queue waiting and printing services to go through numerous other procedures before the service provided to print. Additionally, since the job with printing must save the data on the disk, there is a chance that doing so will quickly and randomly alter the disk's content. This may lead to the potential that perhaps the disk is just not updated with the most recent information; as a result, the printing process may produce outdated information that is unusable. However. As it does not operate according to the initial Ask, first Serve algorithm, the queue waiting for disk access would've been able to handle more jobs quickly.

To know more about System visit :

https://brainly.com/question/30146762

#SPJ4

Source code is one particular representation of a software system. It highlights some details and hides others. This is a good example of:

Answers

A nice example of abstraction is when a source code shows some details while hiding others.

What exactly is computer source code?

A programmer's text editor or visual programming tool-created programming statements that are later saved in a file are known as source code. The output, a compiled file, that results from the compilation of the source code using a C compiler is referred to as object code in most contexts.

How is the source code concealed?

Really, there is no method to conceal the source code for languages used on the web. Everyone has access to it if the browser can see it. Obfuscating it is one way to try to make it more difficult. Given enough time, one can still make sense of it.

To know more about abstraction visit :-

https://brainly.com/question/19419456

#SPJ4

What function should be used to draw a box?

Answers

Answer:

noun In cotton manufacturing, a set of three or more pairs of rollers attached to combing- and certain other machines for attenuating, or drawing out, the sliver.

Explanation:

What is the easiest way of ensuring that others can access a presentation that a user has created and make changes to it, while also ensuring that those changes are tracked and coauthoring can occur?

Save to removable media.
Email the file.
Store on OneDrive and share.
Make a second copy of the file.

Answers

Answer: Its C

Explanation: I just found the answer

Match the situation to the type of operating system installation best suited for it. 1 . Clean installation A new employee will be using a computer that has been in storage for some time. 2 . Upgrade installation The sales department is having all of its computers replaced. 3 . Multiboot installation A graphic artist has purchased high-end software to create animations.

Answers

If your computer experiences signs of hard drive failure, it’s best to replace it before it completely wears out. This gives you a chance to save the data stored on it, including your operating system.


How software to create animations?Start with a Template. Pick a pre-designed 2D Animated video template you like or start from scratch.Customize your scenes.Animate your Assets and Text.Add Music from Library.Download and Share your Video.A clean install is a software installation in which any previous version is eradicated. The alternative to a clean install is an upgrade, in which elements of a previous version remain. The terms are often heard in reference to operating systems (OSes) and software applications.An in-place upgrade is a Windows installation that is launched from the Windows desktop and the installation carries forward user settings and installed applications from the old OS to the new one. A Windows OS is already in place before you begin the new installation.

To learn more about software create animation refers to;

https://brainly.com/question/28218936

#SPJ4

A painting company has determined that for every 112 square feet of wall space, one gallon of paint and eight hours of labor will be required. The company charges $35.00 per hour for labor.
Write a function named compute_cost(), that takes area of wall space and the price of a paint gallon. Function then computes the following:
The number of gallons of paint required
The hours of labor required
The cost of the paint
The labor charges
The total cost of the paint job
Finally it returns the total cost to the calling program
Write the main() function that prompts the user to enter area of wall space to be painted and the price of a paint gallon. The main function then calls compute_cost() function to compute the cost and prints the total cos.
Make sure it is in python program

Answers

The sum of paint cost() and labor charge ()

print(f"The number of hours of lab time are needed: labour()hours" print(f"The number of gallons of paint are needed: gallons(wall)")

Print "The Price of Paint: $paint cost()," "The Price of Labor: $labour charge()," and "The Total Price of the Job: $round(total(), 2)"

In Python, what is a programme?

A collection of Python statements that have been carefully chosen to accomplish a certain task is the simplest definition of a programme.

The square footage of a wall in feet and the cost of a gallon of paint are inputted by the user into the python software. To determine the entire cost of the project based on the quantity of paint and the labour costs, five functions are used: gallons(), labour(), paint cost(), labour charge(), and total().

To know more about Python visit:-

brainly.com/question/18502436

#SPJ4

Which groups on her desktop system could you make her user account a member of to enable this configuration

Answers

Remote Desktop Users groups on her desktop system could you make her user account a member of to enable this configuration.

What exactly is the Remote Desktop Users Group?

The administrators' group's members are the only ones who can access remote desktops on Liquid Web's Windows servers by default. The Remote Desktop Users group, on the other hand, allows its members to safely connect to the server via RDP (Remote Desktop Protocol).

Is RDP preferable to VPN?

The primary distinction between VPNs and RDP is that an RDP gives your device more capabilities, whilst a VPN doesn't. Even though you're still using the same old device, it now has a new IP address and is far more safe when accessing the Internet.

To know more about Remote Dekstop User visit

brainly.com/question/26605428

#SPJ4

Other Questions
How can you use the voltage across a resistor and the current through the resistor or find its resistance? What are the units for the resistance PLEASE HELP WITH EASY FRACTIONS APPRECIATED MUCH!!! The book value of an asset will equal its fair value at the date of sale if 1) a gain on disposal is recorded. 2) no gain or loss on disposal is recorded. 3) the plant asset is fully depreciated. 4) a loss on disposal is recorded. Net Present Value Analysis [LO12-2] Kathy Myers frequently purchases stocks and bonds, but she is uncertain how to determine the rate of return that she is earning. For example, three years ago she paid $13,000 for 200 shares of Malti Companys common stock. She received a $420 cash dividend on the stock at the end of each year for three years. At the end of three years, she sold the stock for $16,000. Kathy would like to earn a return of at least 14% on all of her investments. She is not sure whether the Malti Company stock provide a 14% return and would like some help with the necessary computations. Required: 1. Compute the net present value that Kathy earned on her investment in Malti Company stock. 2. Did the Malti Company stock provide a 14% return? Which type of rock is marble? 1. La Encclica Laudato Si, manifiesta:A. Sobre el cuidado de la casa comnBLa necesidad de cambiar urgentemente el sistema social, econmico y poltico en que se desenvuelveel mundo C Un grito a Dios y al hombre posmoderno a que cuide, proteja y haga un buen uso de los recursos de lamadre Tierra.D. Todas las anteriores When adults of a species try to attract a potential mate is called 4. BK has endpoints B(1, 4) and K(4, -3). Rotate BK clockwise 270 degrees about the origin. Part AWrite an algebraic description of the transformation of BK. Part B: What are the endpoints of the new line segment? what lesson did Moses learn from his call? Deforestation is a worldwide phenomenon. However, there are some areas that experience more deforestation than others. Select Deforestation: Net Loss, 2000-2015. Change Projection to Orthographic (Western Hemisphere). Zoom to Latin America and zoom in further as necessary. Show Physical Labels. Which of the following South American regions has experienced the greatest extent of deforestation (net loss, 2000-2015)? View Available Hint(s) Deforestation is a worldwide phenomenon. However, there are some areas that experience more deforestation than others. Which of the following South American regions has experienced the greatest extent of deforestation (net loss, 2000-2015)? a. Cordillera Occidental (Andes) b. Pampas c. Brazilian Highlandsd. Desierto de Atacama (the Atacama Desert) e. Patagonia 3. Selecting three desserts from eight possible choices on a menu. Howmany choices are there if you determine a 1st, 2nd and 3rd rank. What arethe possible outcome? Show all evidence of understanding. In the arrangement below, each number is the non-negative difference of the two numbers above it. What is the sum of the four greatest distinct possible values for $z$ Tell whether the rate form a proportion. 4. 8 lap every 8 minute; 3. 6 lap every 6 minute 70%of $10=$Comlelete the folling statements How can a cell increase surface area without increasing the volume? What is the final temperature of a 93.9 g block of copper (whose specific heat is .385 J/g0C) that starts at a temperature of 45.0 degrees Celsius and absorbs 1,450.3 J of energy? The civil rights movementtook place over a long period of time and included many kinds of protests.involved only one leader: Martin Luther King Jr.gave equal rights to white and black Americans by 1965.set up new laws in the 1950s to obtain equality. Please help...THE VOYAGES OF DOCTOR DOLITTLEBy Hugh LoftingChapter 1: The Cobbler's SonMy name was Tommy Stubbins, son of Jacob Stubbins, the cobbler of Puddleby-on-the-Marsh; and I was nine and a half years old. At that time Puddleby was only quite a small town. A river ran through the middle of it; and over this river there was a very old stone bridge, called Kingsbridge, which led you from the market-place on one side to the churchyard on the other.Sailing-ships came up this river from the sea and anchored near the bridge. I used to go down and watch the sailors unloading the ships upon the river-wall. The sailors sang strange songs as they pulled upon the ropes; and I learned these songs by heart. And I would sit on the river-wall with my feet dangling over the water and sing with the men, pretending to myself that I too was a sailor.For I longed always to sail away with those brave ships when they turned their backs on Puddleby Church and went creeping down the river again, across the wide lonely marshes to the sea. I longed to go with them out into the world to seek my fortune in foreign landsAfrica, India, China and Peru! When they got round the bend in the river and the water was hidden from view, you could still see their huge brown sails towering over the roofs of the town, moving onward slowlylike some gentle giants that walked among the houses without noise. What strange things would they have seen, I wondered, when next they came back to anchor at Kingsbridge! And, dreaming of the lands I had never seen, I'd sit on there, watching till they were out of sight. Which of the following best summarizes the main point of the plot as presented in the excerpt of "The Cobbler's Son"?A. Tommy had little hope of escaping his quiet life.B. Tommy learned strange songs from sailors in his youth.C. Tommy hoped to live a life of adventure in his youth.D. Tommy lived in a quaint, small village in his youth. Please helpHow does sound move from the source to the receiver? (a slinky moving back and forth) Suppose that 20 mL of 2.50 x 10^-2 M aqueous H 2 SO 4 is required to neutralize 10.0 mL of an aqueous solution of KOH. What is the molarity of the KOH solution