Once data is in memory, a computer or mobile device interprets and executes instructions to process the data into information.a. Trueb. False

Answers

Answer 1

The given statement "Once data is in memory, a computer or mobile device interprets and executes instructions to process the data into information" is True.

Memory is a crucial component of any computing device, and it stores information in a way that can be accessed quickly and efficiently by the central processing unit (CPU). When the CPU receives instructions to process data, it reads the information from memory and executes the instructions to transform the data into useful information.The process of interpreting and executing instructions is known as the fetch-decode-execute cycle. In this cycle, the CPU fetches instructions from memory, decodes them to understand what they mean, and then executes them to perform a specific task. The instructions may involve performing mathematical operations, moving data from one location to another, or making decisions based on the data.The ability to interpret and execute instructions is what makes computers and mobile devices so powerful. They can process vast amounts of data quickly and accurately, and they can perform complex tasks with ease. As technology continues to advance, we can expect to see even more sophisticated computing devices that are capable of processing even larger amounts of data and performing even more complex tasks.

For more such question on mathematical

https://brainly.com/question/2228446

#SPJ11


Related Questions

Which word did alexander graham bell want adopted as a telephone greeting instead of hello.

Answers

Answer:

I believe it was Ahoy.

Explanation:

I could be wrong though.

Answer: Ahoy

Explanation: According to nrp.com "Alexander Graham Bell initially suggested that the standard greeting when answering a telephone should be 'ahoy', but instead 'hello' (suggested by Thomas Edison) was adopted."

T/F. The only way to create a PDF file is in document management applications.

Answers

False. Creating a PDF file is not limited to document management applications. PDF (Portable Document Format) files can be created using a variety of software tools and applications.

including word processing software, presentation software, graphic design software, and online converters. Many modern operating systems and office suites include built-in functionality to save or export documents in PDF format. Additionally, there are numerous online tools and websites that allow users to create PDF files from different file formats. PDF files are widely used for sharing documents in a format that preserves the original formatting and can be easily viewed and printed across different devices and platforms.

learn more about PDF files    here:

https://brainly.com/question/14863778

#SPJ11

Excel - To clear the active cell, you can use the Ribbon, the keyboard, or the mouse.


True
False

Answers

The answer to your question is true

briefly mention the use of ICT in banking sector​

Answers

Explanation:

ICT is used in bank to keep customers whole records ,handle transactions, maintain ledger, provide online service, ATM service ABBS etc.

Donte needs to print specific sections in the workbook, as opposed to the entire workbook. Which feature should he use? Page Setup Backstage view Print Area Option.

Answers

Donte needs to use the feature Print Area to print specific sections in the workbook.

Before workbooks are being printed out, they are usually being typed with Microsoft Office packages such as:

Microsoft wordMicrosoft Excel.Microsoft Powerpoint

In the Microsoft Office Package, to print a page, you can hover your cursor to the select file button and click on print pages.

But when you want to print some selected sections in the Microsoft Office Package, let's say the Microsoft Excel for example;

After using the file button print pages

You will need to set the print features you need. To do that, under the settings, you will click on the Print selection which will help you to select the sections you want to print from the entire workbook.

Learn more about the use of Microsoft Office Packages here:

https://brainly.com/question/25203116?referrer=searchResults

Which of the following information technology (IT) departmental responsibilities should be delegated to separate individuals?
A. Data entry and quality assurance.
B. Data entry and antivirus management.
C. Data entry and application programming.
D. Network maintenance and wireless access.

Answers

It is important to delegate different IT responsibilities to separate individuals to ensure proper network maintenance and wireless access. The correct answer is D: "network maintenance and wireless access."

This responsibility should be delegated to separate individuals because network maintenance requires technical expertise and knowledge of network architecture, while wireless access involves configuring and maintaining wireless network infrastructure. By delegating these responsibilities to separate individuals, the IT department can ensure that each area is managed by a specialist with the necessary skills and knowledge.

The other options listed do not require as distinct and specialized skill sets, and can be performed by the same individual or team without causing conflicts of interest or inefficiencies.

Therefore, the correct answer option is D.

You can learn more about  information technology (IT)  at

https://brainly.com/question/12947584

#SPJ11

which describes the safest way to sit at a desk while typing on the computer?

Answers

The safest way to sit at a desk while typing on the computer is to Keep the knees and hips at 90-degree angles and the wrists straight.

Sitting at a desk and typing can be a lot stressful and also strain our back and neck and may leads to injury. To ensure maximum protection for our back, sit with the knees and hips at a 90-degree angle.

Conclusively, we can say The safest way to sit at a desk while typing on the computer is to Keep the knees and hips at 90-degree angles and the wrists straight.

Learn more from

https://brainly.com/question/14235788

Digital citizen are thoe who ue the internet regularly and effectively. What are three (3) good qualitie of a reponible digital citizen?

Answers

Three digital citizenship tenets. The term "digital citizenship" refers to a user's appropriate and responsible use of technology. Mike Ribble created the three guiding principles of respect, education, and protection to instruct people on how to use technology responsibly and evolve into digital citizens.

"Digital citizen" has been given a variety of definitions. According to Karen Mossberger, one of the authors of Digital Citizenship: Using the Internet Effectively, digital citizens are "those who use the internet regularly and effectively." Participation, society, and the Internet. A digital citizen is a person who uses technology to engage in politics, society, and the government. The self-enactment of individuals' duties in society through the use of digital technologies is defined as "digital citizenship" in more recent formulations of the concept, emphasising the empowering and democratising elements of the citizenship idea. These theories attempt to explain the ever-increasing datafication of contemporary society, which gravely calls into question their intended function.

Learn more about citizens from

brainly.com/question/28445744

#SPJ4

Question 4 of 10
A business is having trouble keeping up with the competition. They cannot
respond to their customers like the competition. Which type of system will
likely be able to help them solve this issue?
A. Transaction processing system
OB. Decision support system
O c. Management communication system
D. Management information system

Answers

The type of system that will likely be able to help them solve this issue is B. Decision support system

What is a Decision support system?

A decision support system (DSS) is a category of a system that equips managers and decision-makers with the essential resources and details to scrutinize intricate business issues and arrive at well-informed conclusions.

In this situation, a system is required by the business to improve its customer response efficiency and maintain its competitiveness. A system designed to support decision-making can make use of customer data, market trends, and competitor strategies to offer helpful recommendations and insights.

Through the utilization of a DSS, a company can enhance their competitive advantage and enhance their level of responsiveness to consumers.

Read more about Decision support system here:

https://brainly.com/question/28883021

#SPJ1

A business is having trouble keeping up with the competition. They cannot

respond to their customers like the competition. The type of system will

likely be able to help them solve this issue is "Management information system" (Option D)

What is a Management information system?

A management information system is an information system that is used in an organization for decision-making as well as the coordination, control, analysis, and visualization of information.

People, procedures, and technology are all involved in the study of management information systems in an organizational environment.

A management information system is made up of five components: people, business processes, data, hardware, and software.

Each of these components must work together to achieve business objectives. People: These are the people who use the system to keep track of everyday business transactions.

Learn more about Management information system:
https://brainly.com/question/30289908
#SPJ1

how to shutdown a computer by step by step​

Answers

Answer:

1) Press Ctrl + Alt + Del

2) Click the power button in the bottom-right corner of the screen.

3) From the desktop, press Alt + F4 to get the Shut Down Windows screen.

and that's how to shut down your computer

Please mark as brainliest if answer is right

Have a great day, be safe and healthy  

Thank u  

XD  

Answer:

click on start button

click on shut down button

wait for screen to turn blank

switch off monitor

switch off the electricity

What is digital graphics?
How are they used in the Entertainment Industry?
Why are they used in the Entertainment Industry?

Answers

Answer:

1) its what they use to make things

2)to make things like dinosaurs

3) it makes these things look real

Explanation:

Answer:

-Digital graphics combine text and images to produce a graphic product which cane used for s specific purpose. By using both writing and images they can present an idea or a message in an eye-catching and effective way. They can be printed or used onscreen.

-Digital graphics can simply be produce to entertain people.

-The graphics included in multimedia or game products are also obvious examples of graphics designed to entertain. Part of entertaining can be to grab the attention of potential readers so that they are more likely to think about buying the product.

What is the purpose of the following ICMP message types: ICMP Redirect, ICMP Time Exceeded, and ICMP Parameter Problem?

Answers

ICMP Redirect is used to inform hosts of a better path. ICMP Time Exceeded is used to indicate a packet's TTL has expired. ICMP Parameter Problem is used for notifying a packet has invalid header.

SS+

The ICMP Redirect message type is used by routers to inform a host that there is a better path to a destination network. This allows the host to update its routing table and choose a more efficient path for future packets.
The ICMP Time Exceeded message type is used by routers to inform a host that a packet has been discarded due to exceeding the maximum hop count allowed. This is used to prevent packets from looping endlessly and causing network congestion.The ICMP Parameter Problem message type is used by routers to inform a host that a packet has been discarded due to a problem with one or more of the packet's parameters. This can include errors in the packet's header, options, or data. The purpose of this message is to help diagnose and correct network issues.


Learn more about ICMP https://brainly.com/question/6265069

S
Learn more about ICMP https://

Quick!
who can solve this?

:}
:}
:}
:}
:}​

Quick!who can solve this?:}:}:}:}:}

Answers

Answer:

1.server

2.container

3.empty

4.lead

5.body

6.conttribute

i just know this much

sry

what is the use of functions in Ms excel

Answers

Answer:

To perform or carry out calculation

Explanation:

Function is a special command or set out the formula in Microsoft Excel, that accomplishes calculations using specific values in a specific arrangement.

For example, in Microsoft Excel, Function can be applied to rapidly deliver or calculate outcomes such as total sum, average, count, main value, and least value for a range of cells.

Hence, in this case, the correct answer is "To perform or carry out the calculation.".

What are the different types of topology?​ in details

Answers

Answer:

NETWORK TOPOLOGY .

This tefers to how nodes are connected to the network.

Types of topology.

Physical topology.Logical topology.

In physical topology,nodes are connected physically using wires(cables).

Types of physical topology include:

Bus topologyTree topologyHybrid topologyStar topologyRing topology.

Hope it helps you,any question so far...comment !!!

\(\huge\mathcal{♨ANSWER♥}\)

Geometric representation of how the computers are connected to each other is known as topology. There are five types of topology.

They are,

Bus topologyRing topologyStar topologyMesh topologyTree topology

♻Bus topology

Bus topology, also known as line topology, is a type of network topology in which all devices in the network are connected by one central RJ-45 network cable or coaxial cable. The single cable, where all data is transmitted between devices, is referred to as the bus, backbone, or trunk.

♻Ring topology

Ring topology is a type of network topology in which each device is connected to two other devices on either side via an RJ-45 cable or coaxial cable. This forms a circular ring of connected devices which gives it its name. Data is commonly transferred in one direction along the ring, known as a unidirectional ring.

♻Star topology

Star topology is an implementation of a spoke–hub distribution paradigm in computer networks. In a star network, every host is connected to a central hub. In its simplest form, one central hub acts as a conduit to transmit messages. The star topology is one of the most common computer network topologies.

♻Mesh topology

A mesh topology is a network setup where each computer and network device is interconnected with one another. This topology setup allows for most transmissions to be distributed even if one of the connections goes down. It is a topology commonly used for wireless networks.

♻Tree topology

A tree topology is a special type of structure where many connected elements are arranged like the branches of a tree. For example, tree topologies are frequently used to organize the computers in a corporate network, or the information in a database.

...hope this helps...

_♡_mashi_♡_

gianna, a fingerprint examiner, uploads a photograph of the print using a scanner. she applies a low-pass filter to the image to eliminate harsh edges and reduce the intensity difference between pixels. next, she applies a high-pass filter which provides contrast between the elements and the background. what is the name of the method for the analysis gianna is performing?

Answers

The method Gianna is performing is called edge enhancement.

What is edge enhancement?

Edge enhancement is a digital image processing technique that is used to improve the contrast and sharpness of an image. Edge enhancement is achieved by applying a high-pass filter to an image.

This filter allows for the contrast between the elements and the background to be increased, which makes the edges of the objects in the image more defined and visible. Edge enhancement is a valuable tool for fingerprint analysis, as it can help to make the details of a print more visible and easier to identify.

Learn more about Edge enhancement:

https://brainly.com/question/16040958

#SPJ4

For which programming task would you use a while loop?

A) Computing the average of a list of 30 integers

B) Copying the contents of one list of 500 characters to another list

C) Drawing a circle with a specific radius

D) waiting for a keyboard key to be pressed

Answers

Answer:

D

Explanation:

Which of the following is true of planning and buying TV and radio advertising? O Radio formats appeal to mass audiences, giving it more spillover than TV. O Radio ads are much more expensive to produce than TV ads. O A disadvantage of TV is that it is unable to build awareness quickly. O TV advertising takes up a lesser portion of the IMC budget as compared to radio. O TV is still the best medium to generate excitement around a brand.

Answers

When it comes to planning and purchasing TV and radio advertising, TV is still the strongest medium for generating excitement about a brand.

Which of the following is NOT a benefit of television advertising?

Television gives a transient message with nothing concrete for the audience to scrutinize or think about, which is one of its benefits. For a very long time, advertisers have utilized television commercials to promote their goods and services to customers.

Which of the following is true regarding radio advertising's benefits?

With radio, communications may be customized and regionalized for each intended audience. Advertisers can target particular demographics, psychographics, geographic regions, as well as events and genres within a market.

To know more about radio technology visit:-

https://brainly.com/question/14455347

#SPJ4

What software maintain and increase the efficiency of a computer system?

Answers

Answer:

Computer maintenance software

Explanation:

Computer maintenance software perform optimization tasks such as the removal of files that are not used in the operation of the system or by the applications in the system such as memory dumps, temporary files, and old log files

Computer maintenance software can also perform cleaning of the registry of the computer such that clutter in the computer registry is removed

can rank u r guys in rocket leagye

Answers

Ha ha ha ha ha ha ha ha

C++ language. I need a full program
with a screenshot of output
Write a program that
supports creating orders for a (very limited) coffee house.
a) The
menu of commands lets you add to

Answers

Here's a C++ program that supports creating orders for a limited coffee house. It has a menu of commands that allows you to add to, remove, and display items in the order.

The program also calculates the total cost of the order based on the prices of the items.
#include
#include
#include
#include
using namespace std;
int main()
{
   string order[100];
   int price[100], choice, qty[100], total = 0, count = 0, i;
   cout << "\t\t\tWelcome to Coffee House\n";
   cout << "\t\t\t======================\n\n";
   do
   {
       cout << "\n\t\t\tMenu\n";
       cout << "\t\t\t====\n\n";
       cout << "1. Add Item\n";
       cout << "2. Remove Item\n";
       cout << "3. Display Order\n";
       cout << "4. Exit\n\n";
       cout << "Enter your choice: ";
       cin >> choice;
       system("cls");
       switch (choice)
       {
       case 1:
           cout << "\n\t\t\tAdd Item\n";
           cout << "\t\t\t========\n\n";
           cout << "1. Espresso         Rs. 100\n";
           cout << "2. Cappuccino       Rs. 120\n";
           cout << "3. Latte            Rs. 140\n";
           cout << "4. Americano        Rs. 90\n\n";
           cout << "Enter your choice: ";
           cin >> choice;
           switch (choice)
           {
           case 1:
               order[count] = "Espresso";
               price[count] = 100;
               break;
           case 2:
               order[count] = "Cappuccino";
               price[count] = 120;
               break;
           case 3:
               order[count] = "Latte";
               price[count] = 140;
               break;
           case 4:
               order[count] = "Americano";
               price[count] = 90;
               break;
           default:
               cout << "Invalid choice!";
               continue;
           }
           cout << "Enter quantity: ";
           cin >> qty[count];
           count++;
           break;
       case 2:
           cout << "\n\t\t\tRemove Item\n";
           cout << "\t\t\t===========\n\n";
           if (count == 0)
           {
               cout << "Order is empty!";
               continue;
           }
           for (i = 0; i < count; i++)
           {
               cout << i + 1 << ". " << order[i] << "\tRs. " << price[i] << "\t" << qty[i] << "\n";
           }
           cout << "Enter item number to remove: ";
           cin >> choice;
           for (i = choice - 1; i < count - 1; i++)
           {
               order[i] = order[i + 1];
               price[i] = price[i + 1];
               qty[i] = qty[i + 1];
           }
           count--;
           break;
       case 3:
           cout << "\n\t\t\tDisplay Order\n";
           cout << "\t\t\t==============\n\n";
           if (count == 0)
           {
               cout << "Order is empty!";
               continue;
           }
           for (i = 0; i < count; i++)
           {
               cout << i + 1 << ". " << order[i] << "\tRs. " << price[i] << "\t" << qty[i] << "\n";
               total += price[i] * qty[i];
           }
           cout << "Total Cost: Rs. " << total << "\n";
           break;
       case 4:
           break;
       default:
           cout << "Invalid choice!";
       }
   } while (choice != 4);
   return 0;
}

To know more about commands visit:

https://brainly.com/question/32329589

#SPJ11

for digital investigators, tracking intranet e-mail is easier because accounts use standard names the administrator establishes. (T/F)
(T)rue

Answers

For digital investigators, tracking intranet e-mail is easier because accounts use standard names the administrator establishes true statements.

What is a digital investigator?

A subfield of forensics called "digital forensics" is dedicated to finding, obtaining, collecting, analyzing, and documenting stored on computers material.

Nearly all illegal acts include the use of electronic evidence, making digital forensics assistance essential for law enforcement inquiries.

As accounts utilize common identifiers that the administration has determined to be genuine claims, it is simpler for digital investigators to monitor intranet e-mail.

Learn more about digital investigators, here:

https://brainly.com/question/13267424

#SPJ1

What is psychological dependence

What is psychological dependence

Answers

a. the body can function normally but the brain craves the drug

Which of the following operations is not efficiently supported by a singly-linked list? (a) accessing the element in the current position (b) insertion after the current position (c) insertion before the current position (d) moving to the position immediately following the current position (e) all of the above are efficiently supported

Answers

The operation that is not efficiently supported by a singly-linked list among the given options is (c) insertion before the current position. This is because, in a singly-linked list, you can only traverse in one direction (forward), making it difficult to insert an element before the current position without additional traversal or storage.

The operation that is not efficiently supported by a singly-linked list is (c) insertion before the current position. This is because in order to insert a new element before the current position, the previous node needs to be updated to point to the new node, which requires traversing the list from the beginning to find the previous node. Accessing the element in the current position (a), insertion after the current position (b), and moving to the position immediately following the current position (d) are all efficiently supported by a singly-linked list. Therefore, the correct answer is (c) insertion before the current position.

Learn more about singly-linked list here:-

https://brainly.com/question/24096965

#SPJ11

Working with text in presentation programs is very ____
using text in other applications.

a) similar to

b)different from

Working with text in presentation programs is very ____using text in other applications.a) similar tob)different

Answers

Answer:

a) similar to

Explanation:

Answer: it is A

Explanation: Your inquiry states that "Working with text in presentation programs is very ____ using text in other applications." Working in presentation software such as Microsoft PowerPoint and Microsoft Word, is very different. Microsoft PowerPoint allows you to do so much more on the visuals, Microsoft PowerPoint and other presentation software also has capabilities to present information than displaying it in a text-editor.

pls make me branliest

Which term defines and describes data and its relationship?

data requirements

project modeling

project infrastructure

data modeling

Answers

Answer:

data modeling

Explanation:

Data model. A formal method of describing data and data relationships. Entity-relationship (ER) modeling. A conceptual database design method that describes relationships between entities.

Your child has broken the RJ-45 port of your laptop by sticking clay into it and there are no wireless networks available in your office building. The manufacturer of your laptop said they cannot replace the port for at least a week. Which of the following would be an appropriate workaround to get your laptop back onto the wired network in your office the quickest?
A. Purchase and use a USB to RJ-45 adapter
B. Enable NIC teaming to increase your bandwidth
C. Replace the motherboard since it contains an integrated RJ-45 port
D. Disable airplane mode and use the integrated 802.11ac adapter

Answers

Answer:

آمل أن يساعد هذا Purchase and use a USB to RJ-45 adapter-yes

fiber_manual_record Enable NIC teaming to increase your bandwidth

Explanation:

67.185.94.80

PLEASE HELP!!!!! WILL MARK BEST ANSWER BRAINLIEST!!!~~~

Which statement about broadcasting a slideshow online is true?

All transitions are properly displayed to the audience when broadcasting online.
Broadcasting a slideshow online is not an option for most PowerPoint users.
Third-party desktop sharing software must be used to broadcast online.
PowerPoint has a free, built-in service for broadcasting online.

Answers

Answer: D. PowerPoint has a free, built-in service for broadcasting online.

Explanation:

Answer:

D) PowerPoint has a free, built-in service for broadcasting online.

Explanation:

PLEASE HELP!!!!! WILL MARK BEST ANSWER BRAINLIEST!!!~~~Which statement about broadcasting a slideshow

Explain what alphanumeric data is.

Answers

Answer:

A-Z  and 0-256

Explanation:

The letters and numbers recognized by the computer. The computer does not recogniz 257

If you witness physical bullying and want to help, what should you consider first?

Answers

Answer:

confront the bully

Explanation:

If you witness physical bullying and want to help, you should consider first whether the person perpetrating bullying is struggling with something.

What is physical bullying?

Physical bullying is the use of physical actions to intimidate and gain direct control. Physical activity is unwanted by the victim and can cause damage to the body or property. Some common types of violence enacted through physical bullying are hitting, Kicking, Pinching the Damage of property.

Ask them to refuse engaging emotionally. Set boundaries, don't engage with the abusive behavior, set consequences, and stick to them. Walk away if a boundary you set is crossed, or if you feel unsafe, leave. the place for some period. Talk to victim privately by setting a time aside, expressing your concern.

Offer any assistance, an ear to listen when they need it. Getting someone else involved might result in victim, be more open, to recognize the abuse, since including more people to express concern or witnessing the abuse, adds more value to the concern.

Thus, If you witness physical bullying and want to help, you should consider first whether the person perpetrating bullying is struggling with something.

Learn more about physical bullying on:

brainly.com/question/17505353

#SPJ3

Other Questions
If x varies directly as y and inverselyas z, and x = 10 when y = 5 and z = 3,for what value of z will = 3 and y =4? _____ will make you rich - if you let it.Group of answer choicesTrackingBudgetingCompound InterestSimple Interest Write the electron configurations for the Group 1A (Li, Na, K, Pb, Cs) and 1B (Ag, Au) elements. (The configuration for Cu is provided in the text.) All my points + Brainliest, pls help.From the set {1, 2, 3, 4, 5}, find the lowest value of x that makes each inequality true. Arrange the inequalities in increasing order of the lowest value of x from the set that makes them true.x + (x 1) > 55x 3x > 92x 1 > 06x 14 > 3 which statement best describes the federal reserve timeframe for monetary policy implementation and observable policy effect? A producer makes 100 units of good X at $40 each . He decides that under no circumstances will he sell the good for less than $ 40 . D 0 you agree disagree with his decision ? Explain . Can someone PLEASE help me here I forgot how to do it is due today! Ill give brainliest !! Through how many radians do the minute hand and the hour hand move between 1:00 p.m. and 1:45 p.m. (on the same day)? is y= -7x linear or non linear Does anyone one have the vocabulary words and definitions for this iready lesson? (Pls help this is graded) What was the main goal of the Republican Party ? Solve for x: (1 point) negative 7 over 6, multiplied by x minus 6 equals negative 48 10. Visual System a. What is the key difference between simple and complex cells? b. The script writer of a play conceives a scene in which a 40 years old congenitally blind character receives retinal Prime minister liz truss of britain resigned on oct. 20, making her the shortest-serving prime minister in british history. How long was she in office?. Ann thought of a number N, multiplied it by 5 and added 7. Then she told the result R to Jim. side note R=5n+7 using the previous formula write the formula that could help Jim guess annie's number N as he is given the value result of R Inswer the following questions for the total revenue equation: TR=480Q6Q 2 . a. What is the average total revenue equation? (Exyress your answur in reduced terms.) b. What is the marginal revenue equation? c. What quantity maximizes total revenuc? d. What is the dollar value of the optimal total revenue? e. State the second derivative and prove the quantity found in part (c) is a maximum. 1) Given the following total cost and total revenue functions below, answer the following questions. TC=4Q 2 96Q+125TR=8Q 2 +120Q a. Find the optimal Q using the equilibrium rule that a firm maximizes profit when MR=MC. (Hint: Find the MC and MR egmations finst) b. Write the profit function ( ) using the TR \&TC equations. (Combine like tems.) c. Find the quantity that maximizes profit using the profit cquation from part (b). d. Is profit positive? Calculate the profit by plugging your optimal quantity into the original equation. e. Did you find a true maximum for the profit equation? Check by using the second derivative of the profit function with respect to quantity. when you drive at night you can reduce the problem of glare from headlights of an approaching car by Middle School Math - Problem Solving and Discovery (7-8)Directions: Use a systemic list to solve the following problems. Make sure to show all of your work!1. Rides Tickets: Marcy had $10.00 to spend at the state fair. She spent all of it on the ride tickets. Therides cost either $0.50, $1.00, or $1.25 each. What are all the possible ways in which she spent hermoney? Underline each prepositional phrase. Draw a second line under each preposition. Then, circle the object of each preposition.6. Whos that boy sitting across from you in the cafeteria? 7. Another song I like is the Welsh tune All Through the Night. 8. Your hands stay warmer with mittens than with gloves. 9. The kitten turned its head toward its mother. 10. Where will they stay during their visit to Chicago? As Doug goes through in his mind all of the reasons he is going to kill Ralphespecially the last reason what can you conclude about Doug? A. He is an extremely violent person. B. He is a very unhappy person. C. He was scarred as a child by Ralph. D. He has thought through it all very logically.