Which of the following is NOT a task in preparation for installing an OS?
A) perform a low-level format on all disk drives
B) make sure the computer meets hardware requirements
C) ensure the hardware is working correctly
D) have an understanding of the features of the new OS

Answers

Answer 1

It is NOT a chore to be completed in advance of installing an OS to do a low-level format on each disk drive of the following.

Which of the following is not a function an operating system performs?

The operating system's fundamental capabilities do not include job control. Data management, memory management, and job scheduling are all options. Operating systems facilitate network connectivity and user interaction with computers. Operating system capabilities do not include job control.

Understanding is crucial when getting ready to install an OS.

It's crucial to know the kind of network environment an OS will be installed into before beginning the installation process. Two processes are loaded into memory on a cooperative multitasking system, and process 1 is currently active.

To know more about installing an OS visit :-

https://brainly.com/question/30045716

#SPJ4


Related Questions

Which of the following Intel CPUs is a low power processor that would be found in smartphones and tablets

Answers

A:  Intel Atom is the Intel CPU having a low-power processor that would be found in tablets and smartphones.

Intel atom is a low-power, lowe cost, and low- performance processor that was originally made for budget devices. It is known primarily for netbooks, which were very popular in the early 2010s. However, it has also been used in low-end laptops, smartphones, and tablets. No matter what the Intel Atom is used for, one thing is obvious that it is not good at gaming.

Thus, the Intel CPU's low-power processor is known to be as Intel Atom.

"

Complete question:

Which of the following Intel CPUs is a low power processor that would be found in smartphones and tablets

A: Intel Atom

B: Intel i-core

"

You can learn more about processor  at

https://brainly.com/question/614196

#SPJ4

Write a program that:

Takes the list lotsOfNumbers and uses a loop to find the sum of all of the odd numbers in the list (hint: use Mod).
Displays the sum.
Situation B
Write a procedure that takes a positive integer as a parameter. If the number given to the procedure is no more than 30, the procedure should return the absolute difference between that number and 30. If the number is greater than 30, the procedure should return the number doubled.

Answers

Situation A:

#include <iostream>

#include <vector>

#include <string>

int main(int argc, char* argv[]) {

 //Fill it by own.

 std::vector<int> lotsOfNumbers = {0,1,2,3,4,5,6,7,8,9};

 //Loop to find odd numbers.

 for(int i=0;i<lotsOfNumbers.size(); i++) {

   if(lotsOfNumbers[i]%2!=0) std::cout << lotsOfNumbers[i] << std::endl;

   else continue;

 }

 return 0;

}

Situation B:

#include <iostream>

#define check(x) ((x>30) ? 2*x : 30-x)

int main(int argc, char* argv[]) {

 std::cout << check(15) << std::endl;

 std::cout << check(-2) << std::endl;

 std::cout << check(30) << std::endl;

 std::cout << check(78) << std::endl;

 

 return 0;

}

Which Annotation tool provides the ability to convert the mouse icon when giving a presentation to better focus the audience attention?

1. Arrow
2. Ink Color
3. Eraser
4. Laser Pointer

Answers

A laser pointer provides the ability to convert the mouse icon when giving a presentation:)

A user notices the system clock is changed every morning. The computer is shut down daily. A technician checks the time zone and finds it is correct, and then checks the BIOS settings and finds the time to be incorrect. Which of the following is MOST likely the problem

Answers

The CMOS battery does not have a charge. Your laptop's BIOS firmware, which is in charge of starting up your computer and configuring data flow, is powered by the CMOS battery.

What is CMOS battery ?The BIOS firmware in your laptop, which is in charge of initiating the boot process and establishing data flow, is powered by the CMOS battery. When your laptop has trouble starting up, drivers start to disappear, or your laptop's date and time are off, your CMOS battery has likely failed.Even when your computer is not plugged into a power source, BIOS must continue to function. The battery enters the picture here. The CMOS battery supplies power to BIOS when your computer is unplugged.Both laptops and desktop computers use CMOS batteries, although laptops use them more frequently. That's because desktop computers are frequently left unplugged for shorter periods of time than laptops. The majority of desktop computers are rarely removed from their power source.

To learn more about CMOS battery refer :

https://brainly.com/question/14767803

#SPJ4

Murray is a database technician. He has created a single enterprise database system. How is this better than multiple databases in independent solutions

Answers

The process of centralizing many databases and instances to share resources and, among other things, save license and hardware costs, is known as database consolidation.

What does a database serve?

Any collection of data or information that has been properly structured for quick search and retrieval by a computer is referred to as a database, often known as an electronic database. Databases are designed to make it easy to save, retrieve, edit, and delete data while carrying out various data-processing tasks.

What advantages does a database offer a company?

A DBMS gives businesses a thorough understanding of how data is shared, preventing the needless duplication of data. A DBMS also enables businesses to enforce data security and privacy guidelines to lower the chance of a data leak.

To know more about databases visit:-

https://brainly.com/question/6447559

#SPJ4

Question:

Murray is a database technician. He has created a single enterprise database system. How is this better than multiple databases in independent solutions?

A. It results in data duplication

B. It results in data redundancy.

C. It results in data consistency.

D. It results in data concurrency.

the statement in the body of a while loop acts as a decision maker. true or false

Answers

Answer:

FALSE FALSE FALSE

Explanation:

Using the code below, will the body of the page have the background-color defined in the file style.css or the background color define in the

A.

Answers

Any background-color defined within the HTML page will not take precedence over the style.css file.

The file style.css or the background color define in the (Option B.) background color defined in the HTML page.

Using CSS to Define the Background Color of a Page

The background color of the body of the page will be the one defined in the style.css file, as the code in the HTML page is linking to that file and using the background-color property defined in it. This means that the background color of the body of the page will be the one defined in the style.css file, and not the one defined in the HTML page.

Since the question is incomplete, here's the full answer:

Using the code below, will the body of the page have the background-color defined in the file style.css or the background color define in the:

Choose the right option:

A. background-color defined in the file style.cssB. background color defined in the HTML page

Learn more about HTML: https://brainly.com/question/4056554

#SPJ4

The standard header file for the abs(x)function is ____.
a. <cmath>
c. <cctype>
b. <ioinput>
d. <cstdlib>

Answers

The basic header file again for abs(x)function is <cstdlib> .

What is header in HTML?

A container for introductory material or a group of navigational links is represented by the "header" element. One or more heading elements (h1-h6), a logo, or an icon are commonly contained in a "header" element. authorship details.

What is an example of a header?

A header or heading is text that displays there at top of each page of an electronic or hard copy document. For instance, in Word Documents, the page numbers of each page might be shown in a text's header. An printed or electronic document's footer, on the other hand, is located at the bottom of each page.

To know more about Header visit :

https://brainly.com/question/12908595

#SPJ4

To implement the circular nature of the bounded-buffer problem, the producer fills the slot buffer[next_in] and then increments next_in by 1 mod n. Similarly, the consumer empties the slot buffer[next_out] and then increments next_out by 1 mod n. (a) What problem would occur if multiple producers or multiple consumers executed the bounded buffer code

Answers

Introduction to bounded buffer The following are crucial portions for the bounded-buffer problems (also known as the: A producer updating next in while writing to a buffer slot.

Which two processes are connected to the bounded buffer issue, and what are their names?

Producer-consumer problem is another name for the bounded buffer problem. The Producer-Consumer problem is used to generalize this issue. The solution to this issue is the creation of two counting semaphores, "full" and "empty," which count the number of full and empty buffers currently present.

How can processes share memory using a bounded buffer?

A fixed buffer size is what is implied by the term "bounded buffer." Consumers and producers both wait for new items while the buffer is filled. The Producer and the Consumer must coordinate. The bounded-buffer problem's shared memory solution permits up to (n-1) items in the at most (n-1) items can be present at once buffer.

To know more about consumer empties visit:-

brainly.com/question/28990014

#SPJ4

The common elements of an algorithm are: Group of answer choices induction, recursion, divide and conquer, greedy data, calculation, interfaces, features effectiveness, correctness, definiteness input, computation, selection, iteration, output, variables

Answers

Input, computation, selection, iteration, output, variables are the common elements of an algorithm.

What are an algorithm's characteristics?

Algorithm characteristics: Eventually, it ought to come to an end. It ought to generate at least one output. It ought should require no input or more. Deterministic systems produce the same results for the same input situation. The algorithm's steps must all be efficient, meaning they must all produce results.

What is the principal purpose of an algorithm?

Simply put, an algorithm is a series of actions taken to do a certain task. They are the fundamental units of programming, and they enable the operation and decision-making of devices including desktops, mobile devices, and websites.

To know more about algorithm visit

brainly.com/question/21172316

#SPJ4

As part of preventing reinfection, what should you configure to prevent spoofing?
A) DNS
B) The host firewall
C) Regular backups
D) MAC filtering

Answers

Should always you do to minimize spoofing (A) DNS as part of stopping reinfection .

What function does a firewall serve?

A firewall in either hardware that keeps track of all network traffic, including inbound and outbound. Hardware or software can both be referred to as a "firewall." Internal networks can be protected from external and internal threats via firewalls, which can be used to control access to them.

Is a firewall really necessary?

Any online network needs a firewall as protection. Even while every computer has some basic firewall security measures in place, there are still some weaknesses that can be attacked without a sophisticated firewall barrier.

To know more about Firewall visit :

https://brainly.com/question/13098598

#SPJ4

A recovery tool that creates restore points, which are snapshots of Windows, its configuration, and all installed programs.

Answers

restore the system A recovery application that takes screenshots of Windows, its setup, and all installed programs to generate restore points

A recovery tool is what?

Software tools for backup and recovery are made to provide storage backup to tape, disk, or optical media as well as data recovery when necessary. Products geared specifically toward helping the recovery process, such as virtual tape libraries, are also included in this area.

What is the mechanism of the recovery tool?

When the master file table reference is deleted, the space on the disk where the data is stored is marked as free and accessible for new data to be overwritten. If no data is erased, data recovery is still a possibility. This is essentially how data recovery software works.

To know more about recovery tool visit:

https://brainly.com/question/29315685

#SPJ4

what are the two types of electronic components

Answers

Answer:

The two type of electronic components are Active components and passive components

Active components are parts of a circuit that rely on an external power source to control or modify electrical signals. ... - Passive components like resistors, transformers, and diodes don't need an external power source to function. These components use some other property to control the electrical signal.

Answer:

The two types of electronic components are:

Active components- Active components are devices that can amplify an electric signal and produce power.

Passive components- Passive components cannot control electric current utilizing a second electrical signal.

These components are diametrically different from each other based on their functional properties and operation.

The registers are the communication channels inside the computer.( true or false)

Answers

False
Registers are storage, not channels

You were conducting a forensic analysis of an iPad backup and discovered that only some of the information is within the backup file. Which of the following best explains why some of the data is missing

Answers

The backup being examined in this case is probably a differential backup that contains the data that has changed since the last complete backup.

How does forensic analysis work?

A thorough study to determine the cause, origin, perpetrators, and outcomes of a security event or a breach of company policy or federal law is known as forensic analysis. Particularly in criminal cases, forensic analysis is frequently associated with evidence presented to the court.

What is the work of a forensic analyst?

Forensic science technicians often perform the following tasks in labs: Analyze the forensic evidence you have collected from crime scenes using chemical, biological, and microscopic methods. Investigate potential connections between suspects and criminal conduct using DNA or other scientific analysis findings.

To know more about forensic analysis visit:

https://brainly.com/question/4327079

#SPJ4

What methods are most commonly used by physical security teams to verify whether somebody is authorized to access a facility

Answers

Security teams can employ physical authentication techniques like ID card scanners and near-field communication (NFC) ID cards to confirm people's identities as they enter and leave different locations.

Which type of physical access control is more prevalent?

The most widespread and affordable type of physical access control device is a set of key locks. The cost of fencing, lighting, and security personnel is significantly higher.

Which of the above controls is an illustration of a physical access control technique?

Which of the above controls is an illustration of a physical access control technique? EXPLANATION One physical access control strategy is the use of locks on doors. Physical barriers prevent or regulate physical access. Technical controls include things like passwords, access control lists, and smart cards.

To know more about Security teams  visit :-

https://brainly.com/question/27872903

#SPJ4

I am a non-volatile type of built-in memory. I store my contents long-term. My job is to store critical programs that the computer needs to access in order to boot up. What am I

Answers

In order to store and retrieve data fast, hard disks are nonvolatile storage devices.

Why would someone utilize non-volatile memory?

Non-volatile memory (NVM) is a category of computer memory with the capacity to retain stored data even after the power is switched off. NVM does not require the data in its memory to be refreshed on a regular basis, unlike volatile memory. For long-term reliable storage or secondary storage, it is frequently employed.

The kind of memory that is non-volatile?

8.3. 4 ROM. Memory is referred to as non-volatile if it can maintain its values even when the power is turned off. Various read-only memory types were among the earliest non-volatile memory types (ROM).

To know more about nonvolatile storage visit :-

https://brainly.com/question/29999255

#SPJ4

A new resident in Virginia desiring to register his / her vehicle must obtain a vehicle ____________ certificate and verification of the vehicle ______________ number.

Answers

The starting system enables the driver to switch on an electric motor, solenoid switch, wiring, and battery by turning the ignition key. The lighting, safety systems, and accessories are all powered by the accessory circuits.

What are danger lights used for?

The danger lights on your car perform a crucial job in terms of safety. These lights serve as a warning to other vehicles when used properly. Most of the time, when you flash your danger lights, other drivers assume that your car is stationary and that they should avoid it.

What do yellow warning lights do?

When driving on slick roads, yellow or amber lights frequently signal a lower-level hazard or warning, such as the activation of the traction control system. White, blue, and green lights just indicate the activation of a device, such as the headlights.

To know more about accessories visit:-

https://brainly.com/question/28082899

#SPJ4

Select the best reason to include height and width attributes on an tag.
A.they are required attributes and must always be included
B.to help the browser render the page faster because it reserves the appropriate space for the image
C.to help the browser display the image in its own window
D.none of the above

Answers

The best reason to include height and width attributes on a tag is to aid the browser in rendering the page more quickly since it reserves the proper space for the image.

Which of the following justifications for adding height and width attributes to an IMG tag is the best?

Because omitting them will prevent the browser from displaying the image, width and height dimensions for images should always be coded. The page will load quicker and the browser will be more effective.

while entering values for an image's height and width attributes?

Height indicates an image's height in pixels. The term width = specifies an image's width in pixels. Use the to set values for an image's height and width attributes.

To know more about attributes visit:-

https://brainly.com/question/28163865

#SPJ4

Which of the following storage methods is used for storing long-term copies of organizational data? Select one: a. backup. b. archival. c. translational.

Answers

Archival, storage methods is used for storing long-term copies of organizational data.

What is Metadata ?

Metadata condensed information about data in order to facilitate dealing with a particular instance of data.

Metadata is typically present in spreadsheets, websites, movies, and pictures.

The availability of metadata facilitates data tracking and dealing with such data.

The time and date of creation, file size, data quality, and date produced are all examples of basic document metadata.

Metadata management and storage usually include the usage of databases.

Hence, Archival, storage methods is used for storing long-term copies of organizational data.

learn more about Metadata click here:

brainly.com/question/14960489

#SPJ4

Need help ASAP

Select the correct answer.
Which testing is an example of non-functional testing?

A.testing a module

B.testing integration of three modules

C.testing a website interface

D. testing the response time of a large file upload

Answers

Answer:

Option D, testing the response time of a large file upload

Explanation:

Non functional testing is basically the testing of non performance related attributes. Time taken in uploading a file is of a non performance attribute and hence, testing this attribute is termed as non functional testing. Remaining options are essential performance attributes which needs to be tested regularly.

Hence, option D is correct

Write a program that lets the user enter the initial height from which the ball is dropped, the bounciness index, and the number of times the ball is allowed to continue bouncing. Output should be the total distance traveled by the ball.

Answers

The following is the program for total distance traveled by the ball;

What do programming skills entail?

Programming, or "coding," skills are the ability to write commands in a variety of programming languages to tell a computer, application, or software program what to do and how to do it.

Write program for the distance travelled by ball.

height = float(input('Enter the height from which the ball is dropped: '))

bounci_index = float(input('Enter the bounciness index of the ball: '))

bounces = int(input('Enter the number of times the ball is allowed to

continue bouncing: '))

distance = height

for i in range(bounces-1):

height *= bounci_index

distance += 2*height

distance += height*bounci_index

print('\nTotal distance traveled is: ' + str(distance) + ' units.')

To know more about program visit

brainly.com/question/14368396

#SPJ4

To move a PivotChart to a new sheet, use the _____ ______ button in the Actions group on the Pivot Chart Tools Analyze tab

Answers

Use the Field List to reorder the fields in your PivotTable (pivot table), and when it vanishes, reveal the Field List once more.

What does Excel's move Chart command do?

Click Move Chart under Chart Tools on the Design tab's Location group. Choose one of these: Click New sheet, then type a name for the worksheet in the New sheet box to move the chart to a new worksheet.

PivotTable toolbar button: what does it do?

You may filter and organize data using the icon buttons on the PivotTable toolbar. reveals the PivotTable Settings dialog box, which offers options for the layout, format, totals, filers, display, and data. each field's data on a sheet is sorted.

To know more about PivotChart visit:-

brainly.com/question/29833710

#SPJ4

Why is it important to create a program for GLCD?




{I NEED THIS FOR MY ROBOTICS IF ANY OF U GUYS HAVE THIS SUBJECT}

Answers

"Writing a program for a GLCD, or graphic liquid crystal display, is essential because it allows you to control what appears on the screen.

Why is a GLCD Important?

Graphic liquid crystal display (GLCD) is crucial because it provides for the small and energy-efficient display of graphical and textual information. Smartphones, digital cameras, and appliances, as well as industrial and medical equipment, instruments, and cars, all employ GLCDs. They are also found in portable devices like watches and calculators, as well as computer peripherals like displays and printers.

A computer program can be used to produce pictures, messages, or animations on a GLCD screen, just as it can be used to build a website or a video game.

Note that GLCDs are well-known for their excellent contrast, broad viewing angles, and low power consumption, making them perfect for a variety of applications.

Learn mroe about program:
https://brainly.com/question/11023419
#SPJ1

The statement int wage; creates a variable named wage that is used to _____ the value 20. input output hold

Answers

The command int wage; hold a variable called wage that stores the value.

Which statement sets the subsequent input value as the variable value for numCars?

The input statement assigns the following program input value to the variable that is specified.  statement sets the subsequent input value as the variable value for numCars  design is an input statement A parallelogram indicates, As follows: Don't forget the output.

Do one-line comments frequently follow statements on the same line?

All the text after the initial / character is included in a single-line remark. Commonly, a statement on the same line is followed by a single-line comment. All content between / and / is considered to be a component of a multi-line comment, which begins with / and ends with /.

To know more about variable visit :-

https://brainly.com/question/17344045

#SPJ4

Which of the following hardware items is not compatible with Window workspaces? a. A USB hub b. USB 2.0 ports c. USB 3.0 ports d. 32-bit legacy BIOS (non-UEFI)

Answers

Windows workspaces are incompatible with the USB hub of the aforementioned hardware devices.

What does a USB hub do?

The little converter known as a USB port hub has numerous additional USB ports. It's a simple method for increasing the number of USB ports on your computer. 3 to 7 additional ports are frequently found in USB hubs.

Are USB hubs a wise choice?

For someone who owns numerous power-hungry USB devices, USB hubs are the ideal buddy. A USB hub can accommodate the needs of any device that requires USB power, including phones, tablets, and desk devices. Additionally, it is advantageous as everything can be plugged into the same hub rather than having to search for a spare mains plug.

To know more about USB hub visit :-

https://brainly.com/question/28333162

#SPJ4

Portable Document Format is a proprietary document file type created by Adobe Systems that is compatible with most computer systems.

a
DOC

b
XLS

c
PDF

d
GIF

e
JPG

f
PS

g
MP3

h
OGG

i
AVI

j
MPEG

Answers

Answer: PDF

Explanation:

The commercial activity of transporting goods to customers is called ______________.

Answers

Answer:

Logistics

Explanation:

Answer:

logiticals

Explanation:

Because the commercial activities if transportation good s to customers called ___

PYTHON 3:
myprogramminglab
QUESTION 1 : Remove the smallest element from the set, s. If the set is empty, it remains empty.
QUESTION 2: Create a dictionary that maps the first n counting numbers to their squares. Associate the dictionary with the variable squares.

Answers

1. if len(s) > 0:  s.remove(min(s))     2. squares = { i:i*i for i in range(n)}

How Do You Python Remove That Smallest Element From A Set?

To determine the lowest and largest element in the list, we are utilizing the min() and max functions.The remove() method of Set removes/deletes the specified element from of the set.

How are set components removed?

The supplied element is eliminated from the set using the remove() method.The remove() method raises an error if the supplied object does not exist, whereas the discard() method does not. This is how this method differs from the discard() method.

To know more about  Python Remove visit:

https://brainly.com/question/28029439

#SPJ4

SQL is considered difficult to learn; its command set has a vocabulary of more than 300 words.
a. True
b. False

Answers

Answer:

Explanation:

a. True

SQL (Structured Query Language) is a programming language used to manage data in relational databases. While it is relatively easy to learn the basic concepts of SQL, it can become more challenging as you learn the more advanced concepts and try to write more complex queries.

The command set for SQL does have a relatively large vocabulary, with over 300 words and commands that can be used to perform various tasks such as creating and modifying tables, inserting, updating and retrieving data from a database. It also can have slight variations depending on the specific implementation of SQL such as ANSI SQL, MySQL SQL, PostgreSQL SQL.

It's not necessarily difficult to learn, but it does take time and practice to become proficient in it. There are many resources available online that can help you learn SQL, such as tutorials, videos, and documentation, and many SQL tutorials are available for free. You can also practice by creating your own small databases and experimenting with different queries.

Other Questions
Which of the following is a line in the drawing? Can someone tell me what this is? For the rhombus below, find the measures Heeeeeeeeeeelp meeeeeeeeeeee Help help help...?What's one way we can reduce plastic's impact on the environment?by shredding it into tiny piecesby recycling itby burying itby burning it Both formal and informal Hurricane Irma knocked a tree down and destroyed a 45 degree section of yourcircular fence that has a radius of 22 feet. If you want to replace the fence, howlong would you need the replacement section to be?h How was the computer built by the us able to help the war effort brainly? The comma before and is called a - comma (a.k. a. comma I'll mark you the brainliestplzzzz help asapif x+y+z=1 and 1/x+1/y+1/z=0what is x+y+z=?A) 0B) 1C) 2D) 3and please tell me why? Use the brief summary of Uncle Tom's Cabin by Harriet Beecher Stowe to match the correct topic, theme, and perspective.Uncle Tom's Cabin by Harriet Beecher Stowe is about dignified Uncle Tom, an enslaved person, being transported to auction in New Orleans. Tom saves Little Eva, an angelic young girl, whose grateful father then buys Tom. Eva and Tom soon become great friends. Always ill, Eva's health declines, and on her deathbed, she asks her father to free all his enslaved people. He makes plans to do so but is killed, and the brutal Simon Legree, Tom's new owner, has Tom whipped after he refuses to divulge the whereabouts of certain escaped slaves.Match Term DefinitionTheme A) Slavery is evil, antireligious, and impossible in a modern, civil society.Topic B) There will always be a battle between good and evil.Perspective C) Slavery How does Edwards tap into his audience's fear in his sermon? Students who watch 5 or more hours of television score higher on tests.Please select the best answer from the choices providedO I need help with this. URGENT!! The relative movements of Earth, the Moon, and the Sun create patterns of change we observe.A complete and accurate model for explaining the phases of the Moon visible on Earth requires which of the following?Select all that are needed. - sun -earth- moon A focus mirror sculpture was opened in Rockefeller Centre in New York City in 2006. Standing three storeys tall and weighing 23 tonnes, its concave side faced the Rockefeller Centre and its convex side faced 5th Avenue. A. What is the nature of the image of 5th Avenue?B. Which property of concave mirror is utilised for using them as shaving mirrors?C. A taxi on 5th Ave is located 38 metres from the convex side of this culture and its image is 1/5 the size of the taxi. Determine the focal length of the mirror.D. Estimate the image size of the 270 metre tall Rockefeller Centre if it is located an estimated distance of 100 metres from the concave mirrors surface of focal length 10 metre. A contract entered into by a minor is voidable at the option of either of the contracting parties.true/false HELp meh with this question it very hard Midway through the year, a second-grade teacher convenes a student success team to plan additional support for a student who is performing somewhat below grade-level standards in reading. Other members of the team include the student and her parents, another teacher who works closely with the student, and a school administrator. In the context ofdeveloping an improvement plan for the student, which of the following pieces of information would be most important for the teacher to communicate to thesuccess team?A. A comparison of the student's reading skills with those of her peers who are performing at grade level.B. A list of each of the formal and informal reading assessments that the student has taken so far duringthis school year.C. A list of appropriate formal reading assessments that could be used for the student's summative evaluations.D. A description of the student's assessed strengths and weaknesses that could serve as a foundation foraddressing her needs. male violence is more likely to occur in ________ societies.