Answers

Answer 1
is this java or python pls explain or else i can’t answer

Related Questions

Which of the following are examples where AI is now used in daily life? Select all that apply.
Group of answer choices

professional wrestling

video game development

banking and financial services

postal and shipping services

customer service industry

Yoga

Answers

Answer:

Video game development .

Banking and financial services.

Postal and shipping services.

Customer service industry.

Explanation:

Artificial Intelligence is called the set of computer programs that, inserted in certain objects or systems, automate processes in such a way that they carry out certain actions in an "intelligent" way, that is, processing different variables through algorithms to respond correctly to the user need.

A clear example of artificial intelligence occurs in the case of homebanking, where a person can transfer money from their bank account through a mobile application that manages their bank account remotely.

What is the most common representation of a distribution?
Pie Chart
Table
Histogram
Bar Chart

Answers

The correct answer is C, Histogram.

What is the difference between internal hardware and software?

Internal hardware is the physical parts of a computer that you see on the outside; software is the physical parts of a computer that you see on the inside.
Internal hardware is the physical parts of a computer that you see inside the computer; software is the physical parts of a computer that you see on the outside.
Internal hardware is the programs and applications that make the computer work; software is the physical parts that help the computer work.
Internal hardware is physical parts that help the computer work; software is the programs and applications that make the computer work.

Answers

Answer:

software are the tangible parts of a computer which you can see and touch and hardware are the intangible parts of a computer like the programs and files

Suppose a byte-addressable computer using set-associative cache has 2 16 bytes of main memory and a cache size of 32 blocks and each cache block contains 8 bytes. a) If this cache is 2-way set associative, what is the format of a memory address as seen by the cache; that is, what are the size of the tag, set, and offset fields

Answers

Answer:

Following are the responses to these question:

Explanation:

The cache size is 2n words whenever the address bit number is n then So, because cache size is 216 words, its number of address bits required for that  cache is 16 because the recollection is relational 2, there is 2 type for each set. Its cache has 32 blocks, so overall sets are as follows:

[tex]\text{Total Number of sets raluired}= \frac{\text{Number of blocks}}{Associativity}[/tex]

                                               [tex]=\frac{32}{2}\\\\ =16\\\\= 2^4 \ sets[/tex]

The set bits required also are 4. Therefore.

Every other block has 8 words, 23 words, so the field of the word requires 3 bits.

For both the tag field, the remaining portion bits are essential. The bytes in the tag field are calculated as follows:

Bits number in the field tag =Address Bits Total number-Set bits number number-Number of bits of words

=16-4-3

= 9 bit

The number of bits inside the individual fields is therefore as follows:

Tag field: 8 bits Tag field

Fieldset: 4 bits

Field Word:3 bits

the device that store data and program for current purpose​

Answers

Answer:

A computer, what you are using. smh.

Answer:

Podría ser el teléfono porque puedes almacenar imágenes de datos depende del almacenamiento interno que pueda contener el dispositivo no.

Explanation:

Por ejemplo en este tiempo depende mío puede almacenar la clases miércoles y 3 cosas de aprendizaje y la formación de nuevas personas con valores y virtudes en el ámbito social político y económico.

Gracias.

#cuidemonosdesdecasa.

Write a program that repeatedly reads in integers until a negative integer is read. The program keeps track of the largest integer that has been read so far and outputs the largest integer when the (first) negative integer is encountered. (See subsection Example: Finding the max value of section 4.1 Loops (general) to practice the algorithm).

Answers

Answer:

In Python:

num = int(input("Enter number: "))

maxn = num

while num >=0:

   if num>maxn:

       maxn = num

   num = int(input("Enter number: "))

print("Largest: "+str(maxn))

Explanation:

Get input from the user

num = int(input("Enter number: "))

Initialize the largest to the first input

maxn = num

This loop is repeated until a negative input is recorded

while num >=0:

If the current input is greater than the previous largest

   if num>maxn:

Set largest to the current input

       maxn = num

Get another input from the user

   num = int(input("Enter number: "))

Print the largest

print("Largest: "+str(maxn))

Synchronization barriers are a common paradigm in many parallel applications.

a. True
b. False

Answers

Answer:

I am not sure on this one I am guessing it is True

Explanation:

Based on the description below which website is more appropriate


A. a site that asks you to send $10 to help schoolchildren in Uganda
B. a site that describe violent behavior
C. a site that asks for your personal information to win a contest for a new bike
D. a site sponsored by a government agency that gives you factual information

Answers

Answer:

D

Explanation:

Answer:

The answer is d

Explanation:

because asking for 10 dollars is the first website is not normal and in the second describing violent behavior is not ok and the third asking for personal information for a free bike is not good but d a site sponsored giving you factual information that made by the government is trustworthy

The Painting Company has determined that for every 112 square feet of wall space:
One gallon of paint at $9.53 per gallon is required if total square feet is 2000 or less. If square footage is greater than 2000, paint is $10.50 per gallon.
8 hours of labor at $35 per hour is required.
A hazardous material disposal fee of 7.5% of the total paint cost is required.
Create a function called paintJobCost which allows the user to provide the total number of square feet for the paint job and produces an itemized list of charges that includes:
Number of gallons of paint required.
Total Cost of the Paint (Paint Cost x Gallons Required)
Hours of labor required to paint (8 hrs per 112 sq ft)
Total Cost of the Labor.
The hazardous material fee.
The total cost of the paint job. (Paint Cost + Labor Cost + Hazardous Material fee)
Your function, when called, must display all the above information exactly as shown below.
Expected Output
Call the paintJobCost function where the total square footage of the paint job is 1800. Square Footage Paint Required Paint Cost 16.07 gal $153.16 Labor Hours 128.57 hrs Labor Cost $4,500.00 Hazard Fee $11.49 TOTAL COST OF PAINT JOB $4,664.65 Call the paintjobCost function where the total square footage of the paint job is 2700. Square Footage Paint Required 2700 24.11 gal Paint Cost $253.12 Labor Hours 192.86 hrs Labor Cost $6,750.00 Hazard Fee $18.98 TOTAL COST OF PAINT JOB $7,022.11 Call the paintJobCost function where the total square footage of the paint job is 3200. Square Footage Paint Required Paint Cost 3200 28.57 gal $300.00 Labor Hours 228.57 hrs Labor Cost $8,000.00 Hazard Fee $22.50 TOTAL COST OF PAINT JOB $8,322.50

Answers

Answer:

Answered below

Explanation:

#Program is written in Python.

sq_feet = int(input ("Enter paint area by square feet: ")

gallons = float(input (" Enter number of gallons: ")

paint_job_cost(sq_ft, gallons)

#Function

def paint_job_cost(sq_ft, gal){

gallon_cost = 0

cost_per_hour = 35

if sq_ft <= 2000:

 gallon_cost = 9.53

else:

gallon_cost = 10.50

paint_cost = gal * gallon_cost

labour_hours = 8 * (sq_ft/112)

total_labour_cost = labour_hours * cost_per_hour

hazard_fee = 0.075 * paint_cost

total_cost = paint_cost + total_labour_cost + hazard fee

print (paint_cost)

print(labour_hours)

print (total_labour_cost)

print (hazard_fee)

print(total_cost)

}

ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP​

Answers

Answer:

10.b

11.c

12.c

13.a

14.d

15.b

16.c

Explanation:

please brainleist please ♨️☺️

For a single CPU core system equipped wiith addditional hardware modes (besides user and kernel), choose those items that are examples of the possible usage of the additional modes.

1. Data parallelism
2. Enhanced user security policy, such as user groups, so that group members may execute other group members' programs
3. Task parallelism
4. USB device driver support outside of kernel mode

Answers

Answer:

Task parallelism

Explanation:

The Task parallelism is most popularly known as the function parallelism and the control parallelism. In the computer codes, it is the form of a parallelism across the multiple processors in a parallel computing environments. It focusses on distributing the task that are concurrently performed by the threads or the processors.

For the single CPU core system that is equipped with an additional hardware modes, the task parallelism is one of the example of the usage oh a additional modes.

how can you hack on a cumputer witch one chrome hp

Answers

Answer:

http://www.hackshop.org/levels/basic-arduino/hack-the-chromebook

Explanation:

yes

yes

yes

yes

yes

yes

yes

yes

yes

yes

yes

yes

yes

yes

yes

yes

yes

yes

yes

yes

Log onto the Internet and use a search engine to find three Web sites that can be models for the new site. (At least one should sell sporting goods.) For each site you selected, list the URLs in your document. Tell why you chose them. Navigate to the three sites you choose and take notes about at least three things you like and don’t like about the sites.

Answers

Please see the following file for your required answer, thank you.

If you were able to earn interest at 3% and you started with $100, how much would you have after 3 years?​

Answers

109

A= Amount+ interest *sb

interest=P×r×t/100

100×3×3/100

100 cancel 100=3×3=$9

100+9=109

You have been hired by The Mandarin Inn, a local Chinese restaurant that has adapted to the new shelter-in-place environment by expanding to online restaurant orders, and also offering a new pantry service to local customers. Your first project is to conduct basic data analysis for the restaurant to determine how well a social media post is contributing to the Mandarin Inn's current strategic goal of acquiring new customers for its online pantry service offering. Which of the following metrics for the advertisement is the best candidate for a KPI relative to the strategic goal?
A. Views of the advertisement over time.
B. Shares of the post over time.
C. Likes of the post over time.
D. Clicks to the pantry signup page from the post over time.

Answers

Answer:

The answer is "Choice D".

Explanation:

The registration program enables users and organizations to log in independently and also to access your system. The user registration sites are popular as per the types of people and associations that you can choose to register.

It is called Click By Rate. It tells you good this video is When they want to push your audience on following your video, the click-through rate measure is perhaps the most critical.

"Why do the linked stack and queue implementations not include iterators, as in the linked list classes of Chapter 16? Are there cases in which a stack or queue might need to be traversed privately, even if access cannot be provided publicly? If so, should an iterator be used for these cases?"

Answers

Answer:

Explanation:

A linked stack is a LIFO (last in, first out) while a queue is a FIFO (first in, first out) data structure. This means that you can only access and modify the first or last elements of the stack or queue repectively. Therefore, there is no use for iterators in such a data structure which is why they do not exist. Iterators are mainly for traversing sequential access or random access within the given data structure which is not possible with these data structures, but is possible with lists. A stack or queue would either be made automatic so that it is completely private or simply made public so that it can be accessed by other methods and classes, regardless iterators would not be used.

State and explain five misused of science and technology​

Answers

Answer:

1. Perpetration of violence

2. Breach of privacies

3. Replacement of human labor

4. National threats

5. Devotion of excessive time to technologies

Explanation:

The advent of science and technology have come with lots of benefits to man. Some of these benefits include, the invention of phones, electricity, the internet and social media, satellites, drones, etc. However, science and technology have been misused in the following ways;

1. Perpetration of violence: Weapons of war have caused the mass destruction of more people than was obtainable before. To aid these activities the fast means of communication and transportation cause seamless operations.

2. Breach of privacies: People with technical knowledge have the ability to intrude into the privacies of others. They can obtain information that was not originally meant for them.

3. Replacement of human labor: Machines and equipment have reduced the number of humans that were gainfully employed prior to the advent of these technologies.

4. National threats: Nations and governments now threaten their counterparts with the deployment of missiles. These attitudes aid international conflicts.

5. Devotion of excessive time to technologies: Teenagers most especially have developed an overdependence on technologies. A lot of time is now spent on phones, thus causing the neglect of social relationships.

What is the codebook?
Python dictionary of code shortcuts
Standard survey shorthand codes
Documentation of the survey questions, the design of the study and the encoding of the responses
General term for development code books

Answers

Answer:

Option C

Explanation:

A codebook gives following information

a) Content

b) Structure of the codebook

c) Layout of the data collected

In general it is a document that contain information about the purpose and format of the codebook along with the methodological details.

Hence, Option C is correct

An integrated circuit RAM chip has a capacity of 512 words of 8 bits each where the words are organized using a one-dimensional layout.a) How many address lines are there on the chip?b) How many such chips would be needed to construct a 4Kx16 memory?c) How many address and data lines needed for a 4Kx16 memory?#addresss lines = #data lines =

Answers

Answer:

A. 9

B. 16

C. Number of addresses = 12 number of data lines = 16

Explanation:

The capacity of this chip is 512 x 8

That is 512 words and these words have 8 bits

A. The number of the address lines would be

log2(512) = 2⁹

So the answer is 9

B. The total number of chips required

= 512 x 8 = 4096

(4096 x 2)/ 512 = 16

C. Number of address = log4092 = 2¹²

= 12

The number of data lines = 8x2 = 16

Thank you!

what will you recommend to HP Mini 5103 Notebook?​

Answers

Hey what are you guys going on with your dad today or tomorrow night

Dexter is trying to draw a rhombus and play the pop sound at the same time in his program. How should he correct the error in this algorithm? When space key pressed, draw rhombus, play pop sound.

a- Add another when space key pressed event and move play pop sound to that event.
b- Change the draw rhombus command to a draw triangle command.
c- Put the code inside a loop block with two iterations.
d- Use a conditional block so that the code is if draw rhombus, then play pop sound.

Answers

Answer:

Option A makes the most sense

Explanation:

Add another when space key pressed event and move play pop sound to that event. The correct option is A.

What is algorithm?

A set of instructions designed to perform a specific task or solve a specific problem is referred to as an algorithm.

It is a step-by-step procedure that defines a sequence of actions or operations that, when carried out, result in the solution of a problem or the completion of a task.

Dexter is attempting to draw a rhombus while also playing the pop sound in his program.

She should add another when space key is pressed event and move the play pop sound to that event to correct the error in this algorithm.

Thus, the correct option is A.

For more details regarding algorithm, visit:

https://brainly.com/question/22984934

#SPJ3

which benefit does the cloud provide to star-up companies without access to large funding?

Answers

Explanation:

Start-up companies can store, manage, process data and use programs through a web-based interface – something that greatly reduces costs. Data stored in the cloud can be accessed from anywhere through various devices with web connectivity, which is an advantage for small companies that don't have a huge IT budget.

Cloud provides storage access and management for files and information using a the cloud computing provider. This could help reduce the cost expended on physical content storage devices.

The cost of purchasing storage devices to habor information and data may be daunting for new startups with little capital.

The cloud computing framework is a cheaper alternative, yet provides easier accessibility at all times.

Hence, the cloud could in the cost expended on physical storage.

Learn more : https://brainly.com/question/22841107

with the aid of an example describe absolute file path as used in file management​

Answers

Answer:

here's your answer

Explanation:

A path is either relative or absolute. An absolute path always contains the root element and the complete directory list required to locate the file. For example, /home/sally/statusReport is an absolute path.

I think it's helpful for you.....

Write a function header for the ZooAnimal class member function daysSinceLastWeighed. This function has a single integer parameter today and returns an integer number of days since the animal was last weighed. void ZooAnimal::Destroy () { delete [] name; } // -------- member function to return the animal's name char* ZooAnimal::reptName () { return name; } // -------- member function to return the number of days // -------- since the animal was last weighed { int startday, thisday; thisday

Answers

Answer:

Answered below

Explanation:

public int daysSinceLastWeighed(int today)

Method is public which means it is visible to other classes. It returns an integer which is indicated as int. Next is the method's name which clearly describes what the method does 'days since last weighed'. The opening and closing parentheses enclose the integer parameter named today. This is the function header.

Anna has a physical mobility difference, and she uses virtual reality to complete her exercises. To use virtual reality, Anna needs to follow a specific set of steps in the correct order. What is the list of steps Anna should follow to use virtual reality?
Put the virtual glasses around her neck, complete the exercises in the virtual world, take the glasses off
Put the virtual glasses over her eyes, complete the exercises in the virtual world, take the virtual glasses off
Put the virtual glasses on her forehead, go outside, complete the exercises
Put the virtual glasses over her eyes, go to the living room, complete the exercises

Answers

Answer:

Explanation:

The basic concept of virtual reality is that they are a pair of lenses in a headset that allows you to visualize a virtual 3D world and become immersed within it. To do the exercises correctly Anna would need to follow the following basic steps.

Put the virtual glasses over her eyes, complete the exercises in the virtual world, take the virtual glasses off

The headset/glasses need to fit comfortably on her eyes and around her head so that she can clearly see the image on the lenses and so that the headset/glasses do not fall off while she is completing her exercises. Once she is done with her exercises Anna can simply take off her virtual glasses and put them away.

Create a map using the Java map collection. The map should have 4 entries representing students. Each entry should have a unique student ID for the key and a student name for the element value. The map content can be coded in directly, you do not have to allow a user to enter the map data. Your program will display both the key and the value of each element.

Answers

Answer:

In Java:

import java.util.*;  

public class Main{

   public static void main(String[] args) {

       Map<String, String> students = new HashMap<>();

       students.put("STUD1", "Student 1 Name");

       students.put("STUD2", "Student 2 Name");

       students.put("STUD3", "Student 3 Name");

       students.put("STUD4", "Student 4 Name");

       for(Map.Entry m:students.entrySet()){  

           System.out.println(m.getKey()+" - "+m.getValue());    }  

}}

Explanation:

This creates the map named students

       Map<String, String> students = new HashMap<>();

The next four lines populates the map with the ID and name of the 4 students

       students.put("STUD1", "Student 1 Name");

       students.put("STUD2", "Student 2 Name");

       students.put("STUD3", "Student 3 Name");

       students.put("STUD4", "Student 4 Name");

This iterates through the map

       for(Map.Entry m:students.entrySet()){  

This prints the details of each student

           System.out.println(m.getKey()+" - "+m.getValue());    }  

Agent Phil Coulson developed this program to register Avengers in S.H.I.E.L.D's database using cutting-edge programming language - Java. Complete the Avengers Registry class. Ex. if input is Steven Rogers Captain America 105 4 Then output should be: Name: Steven Rogers, Age: 105, Alias: Captain America, Security Clearance Level: 4 2892227722684 3z0y7 LAB ACTIVITY 11.6.1: miniLab: Avengers Initiative 0/10 Current file: Avengers Registry.java Load default template... 1 import java.util.Scanner; 2 Current file Avengers Registry.java Load de 1 import java.util.Scanner; 2 3 public class Avengers Registry { 4 5 6 7 8 public static Avenger createAvenger (Scanner scnr){ String name; int age; String alias, int clearance; 9 10 Avenger avenger = new Avenger(); name = scnr.nextLine(); alias = scnr.nextLine(); age = scnr.nextInt(); clearance = sonr.nextInt(); // your code here 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 return avenger; } public static void main(String[] args) { Scanner scnr = new Scanner(System.in); // your code here } File is marked as read only Current file: IndividualData.java 1 public class IndividualData { 2 private String name; 3 private int age; 4 5 public void setIndividualName(String individualName) { 6 name = individualName; 7 8 9 public String getIndividualName() { 10 return name; 11 } 12 13 14 public void setIndividualAge (int inYears) { 15 age = inYears; 16 } 17 18 public int getIndividualAge() { 19 return age; 20 } 21 22 public void printDetails() { 23 System.out.print("Name: + name); 24 System.out.print(", Age: + age) 25 } 26 H File is marked as read only Current file: Avenger.java 1 public class Avenger extends IndividualData { 2. private int securityClearance; 3 private String alias; 4 5 public void setSecurityClearance(int secLevel) { 6 securityClearance = secLevel; } 8 9 public int getSecurityClearance(){ 10 return securityClearance; 11 12 13 public void setAlias (String a) { 14 15 } 16 17 public String getAlias() { 18 return alias; 19 3 20 21 } alias = a;

Answers

eh I think yes I think. Maybe

jo.in Goo.gle meet the code/rhk-rvet-tdi​

Answers

Answer:

nah

Explanation:

cuz ion wanna

Scenario
You are the IT administrator for a small corporate network. You're repairing the computer in the Support Office, which appears to have a failed power supply. After testing the power supply and confirming the failure, you removed it from the computer. Now you need to select a replacement power supply. In this lab, your task is to complete the following: Install a power supply based on the following requirements:
The power supply must have the appropriate power connectors for the motherboard and the CPU. Make sure the power supply you select will support adding a graphics card that requires its own power connector.
Make the following connections from the power supply:
Connect the motherboard power connector.
Connect the CPU power connector.
Connect the power connectors for the SATA hard drives.
Connect the power connector for the optical drive.
Plug the computer in using the existing cable plugged into the power strip.
Turn on the power supply. Start the computer and boot into Windows.

Answers

Answer:

Explanation:

The following connections will need to be done once the power supply is fully installed inside the case and make sure to discharge any built up electricity from you body by using an anti-static bracelet if available.

Connect the motherboard power connector: This requires a 20 pin + 4 pin connector and is usually located in the middle right side of the motherboard.

Connect the CPU power connector: This requires a 4-pin connector and is located in the top right corner on most motherboards

Connect the power connectors for the SATA hard drives: These require sata cables which are small thin and flat cables and whose motherboard connectors are usually located near the motherboard power connector.

Connect the power connector for the optical drive: The power connectors are thick flat and have 4 round entry pins inside, connect this to the back of the cd-drive which should be located in the drive bay of the pc-case.

Plug the computer in using the existing cable plugged into the power strip: simply plug the computer power connector into the case and then the powerstrip

Turn on the power supply. Start the computer and boot into Windows: turn on the pc by pressing the power button and then press the F8 key on the keyboard to enter the boot options. From here choose the drive that has Windows installed on it in order to enter the Windows OS.

100 POINTS PLUS BRAINLYEST TO WHOEVER ANSWERS CORRECTLY
Raul is starting a new desktop publishing business. He needs to communicate frequently with his clients to get approval for the work he is creating for them. He will use the decision-making process to help him figure out the best telecommunications technology to use to exchange information with his clients.

Match the steps of the process to Raul's analysis.

1. Gather data.
2. Determine the goals.
3. Analyze choices.
4. Evaluate the decision.
5. Make the decision.

Raul will send sample documents to his clients using e-mail.

Raul will survey his clients to determine how the approval process is working for them.

Fax machines are able to transmit copies of documents to other locations. E-mail can be used to send documents to clients.

He needs a way to quickly exchange information with his customers. He needs to send them his designs and provide a way for them to get back to him with their approval and/or comments.

His clients have access to e-mail, but not all have fax machines.

Answers

Answer:

1. Gather data

Raul will survey his clients to determine how the approval process is working for them.

2. Determine the goals

He needs a way to quickly exchange information with his customers. He needs to send them his designs and provide a way for them to get back to him with their approval and/or comments.

3. Analyze choices

His clients have access to e-mail, but not all have fax machines.

4. Evaluate the decision

Fax machines are able to transmit copies of documents to other locations. E-mail can be used to send documents to clients.

5. Make the decision

Raul will send sample documents to his clients using e-mail.

Other Questions
Provide the appropriate present tense forms For Aprender Julio spent $21 on a magazine and five notepads. If the magazine cost $6, then how much was each notepad? What equivalent fraction would assure a whole number divisor 28/0.64 1=42 = 163 = 644 = ?What number should replace thequestion mark? what is the power output needed from a motor to lift in the absence of friction a mass of 1.5 10 kg 25 m in 6.0 s at constant speed There are 40 students in the 5th grade. 22 of them play soccer. What percentage of the students in the class do NOT play soccer? Please show work i need help When to variables are next to each other do you add divide or multiply What is 3/8 + 5/12??? The pistil collects pollen from the __________. A. seed B. ovule C. sepal D. stamen Find the one of the following sets of side lenghts could represent a right triangle Plz help me on this one. is -3x+4y=8 parallel or perpendicular to -4x+3y=-6 Corporations are becoming multinational not only in the scope of their business activities but also in their capital structure(.) Group of answer choices by raising funds from domestic as well as government sources. This trend reflects not only a conscious effort on the part of firms to raise the cost of capital by international sourcing of funds but also the ongoing liberalization and deregulation of international financial markets that make them accessible for many firms. by raising funds from foreign as well as domestic sources. by raising funds from foreign as well as domestic sources. This trend reflects not only a conscious effort on the part of firms to raise the cost of capital by international sourcing of funds, but also the ongoing liberalization and deregulation of international financial markets that make them accessible for many firms. 3. Which of the following statements best describes a central idea of the text? RI.2 * Ifp=12andq=24, evaluate the following expression:p+q/4 14. Find the value of X round the nearest degree 12 15 Given the following set of data from the decomposition of hydrogen peroxide,how is the initial rate of the reaction (between time 0 and 300 seconds)different from the rate of the reaction between 1800 and 3000 seconds?[H202 MTime (s)2.001.63001.46001.112000.7218000.153000 PLEASE HELP which of the following effects did the silk road have on the worlda the bubonic plague spreadb missionaries traveled along the routes spreading religions c the one brought eastern luxury goods which created a drain or silver from romes economyd all of the choices are correct Just asking for the answer to this problem. Fill in the blank in the following sentence with the appropriate adverb below. Veux-tu organiser la fete ______?A. Desormais B. Rarement C. Maintenant D. Durant