What does it mean "Be Proactive"?

Answers

Answer 1

Answer:controlling a situation by making things happen or by preparing for possible future problems

Explanation:

Answer 2
Make things happen instead of waiting for them

Related Questions

what was the pascaline used for?​

Answers

Answer:

Math like multiplication, addition, division, and subtraction

what does PR stand for ?

Answers

Answer:

Public Relations or Pull Request (computer programming)

Explanation:

Hope this helps

Tim Berners-Lee cultivated a way to interconnect and self-index data. He made a major contribution to the development of the Internet by creating _____.
A. graphic data
B. emoticons
C. the hyperlink
D. digital data

Answers

Answer: D. Digital data

Consider the following declaration:
String s = "cat";
Which of the following statements assigns the number of characters in s to k?

A. int k = s.length;
B. int k = s.length();
C. int k = s.size;
D. int k = s.size();

Consider the following declarations:
String s1 = "apple";
String s2 = "apple";
What is the result of s1.compareTo(s2)?

A. true
B. false
C. 0
D. 1

Consider the following declarations:
String s1 = "apple";
String s2 = "APPLE";
Which of the following expressions is true?

A. s1.equals(s2) && s1.equalsIgnoreCase(s2)
B. !s1.equals(s2) && s1.equalsIgnoreCase(s2)
C. s1.equals(s2) && !s1.equalsIgnoreCase(s2)
D. !s1.equals(s2) && !s1.equalsIgnoreCase(s2)

Answers

Answer:

B, C, B

Explanation:

According to my understanding of these questions, these are in Java.

For the first one, there is a built in function called .length() for a string, so it's answer B.

For the second one, this should come out as C, 0 since compareTo compares the ascii values of the characters.

The third one's answer should be B. s1.equals(s2) for characters that are caps and not caps comes out with false, so ! would negate it. s1.equalsIgnoreCase(s2) would come out as true, ignoring the cases of APPLE.

Write a program to repeatedly read integers from the standard input until it reads "-1" and exits. For each number before "-1," if it is positive and odd, do the following:

Answers

Answer:

#include <stdio.h>  

int main() {  

int p=0, n=0, z=0, inp=0;  

printf("How do I write a C program to read numbers until -1 "  

 "is encountered and also count the number of positive, negative, "  

 "zeroes encountered by users using a while loop?\n\n\n");  

printf("Enter an integer  (-1 to quit): ");  

scanf("%d",&inp);  

while(inp != -1) {  

 if(inp > 0) p++;  

 else if(inp < 0) n++;  

 else z++;  

 printf("\nEnter next integer (-1 to quit): ");  

 scanf("%d",&inp);  

}  

n++; /* -1 is also a -ve number */  

printf("You have entered ...\n");  

printf("\t\tPositive numbers: %d\n",p);  

printf("\t\tNegative numbers: %d\n",n);  

printf("\t\t          Zeroes: %d\n",z);  

}

Explanation:

Create a Python script that will compare two (2) numbers entered by the user. Refer to the attached image and to the following algorithm. There is no need to create a class similar to how Java works.

3.1. User enters the first number.
3.2. User enters the second number.
3.3. If the first number is less than, greater than, or equal the second number, a message is displayed.

Please Help me. Thank You!
Marry Christmas!​

Answers

x = int(input("Enter first number\n"))

y = int(input("Enter second number\n"))

if x > y:

   print(x, "is greater than", y)

elif x < y:

   print(x, "is less than", y)

else:

   print(x, "is equal to", y)

i'm not the greatest coder, but it works :)

Implement a class named BankAccount. Every bank account has a starting balance of $0.00. The class should implement methods to accept deposits and make withdrawals. __init__(self): Sets the balance to 0. deposit(self, amount): Deposits money. Return True if transaction is successful. Return False if amount is less than 0 and ignore the transaction. widthdraw(self, amount): Withdraws money. Return True if transaction is successful. Return False if amount is more than the balance and ignore the transaction.

Answers

The BankAccount class implementation in Python 3.8 is found in the attached image

The deposit method  uses an if statement to check if the amount to be deposited is negative. If so, it does nothing, but returns False signifying that the transaction failed.

However, if the test finds out that the amount to deposit is positive or zero, the deposit method increments the balance, then returns True, signifying a successful transaction.

The withdraw method is similar, but this time, it tests if the amount to be withdrawn is greater than the available balance. If so, it ignores the transaction, and returns False.

If the withdrawal amount is less or equal to the available balance, the withdraw method decrements the available balance, then returns True, signifying a successful transaction.

Learn more about Python programming here https://brainly.com/question/20379340

A(n) __________ is a system where banks in the United States eventually figured out that they could print more __________ than the gold that they had in their vaults.

Answers

Based on the information given regarding money, the correct option will be fractional reserve; paper money.

It should be noted that in the United States, there are banking institutions that hold reserves which is simply the fraction of deposits of other banks.

The fractional reserve is equal to the fraction of the bank's deposit liabilities that are owed to customers.

Therefore, a fractional reserve is a system where banks in the United States eventually figured out that they could print more paper money than the gold that they had in their vaults.

Learn more about money on:

https://brainly.com/question/24556197

how to download film​

Answers

Which film are you talking about?
what film are you trying to download from

What type of system software manages memory?

Answers

Answer:

"Operating System"

Explanation:

The type of system software that manages memory is an operating system. To manage memory, the operating system employs a number of software strategies.

What is system software?

The most crucial piece of software that runs on a computer is the operating system. It controls the memory, operations, software, and hardware of the computer.

You can converse with the computer using this method even if you don't understand its language. Memory connections are the structures that come before and after all memory areas, whether they are allocated or available.

Working memory, short-term memory, and long-term memory are the three primary categories of memory. While long-term memory stores your enduring memories, working memory and short-term memory enable you to retain and use transient information.

Therefore, an operating system is a sort of system software that controls memory.

To learn more about system software, refer to the link:

https://brainly.com/question/12908197

#SPJ2

what is office course
how to learn office course

Answers

Answer:

It includes Word, to create, polish, and share documents; Excel, to analyze and visualize data; PowerPoint, to create, collaborate, and effectively present ideas; OneNote, to organize ideas into a digital notebook; Outlook, to organize email, coordinate schedules, and stay up to date with contacts; Access, to create .

Hope this helps you XD ✌️

List the four types of computer cases

Answers

Answer:

full-tower, mid-tower, mini-tower, and SFF(Small Factor Form).

I hope it helps.

This is the answer. Hope it’s helpful

seven characteristics of information ​

Answers

Answer:

1.Accuracy and Precision.

2.Legitimacy and Validity.

3.Reliability and Consistency.

4.Timeliness and Relevance.

5.Completeness and Comprehensiveness.

6.Availability and Accessibility.

7.Granularity and Uniqueness.

Explanation:

#carry on learning

Write a Boolean expression that tests if the value stored in the variable num1 is equal to the value stored in the variable num2.

Answers

Answer:

num1 = int(input("Enter value: "))

num2 = int(input("Enter value: "))

if num1 == num2:

   print("Equals.")

else:

   print("Unequal.")

Explanation:

The Boolean expression that tests if the value stored in the variable num1 is equal to the value stored in the variable num2 can be found in explanation.

What is boolean expression?

A logical statement that could be either true or false is referred to as a Boolean expression.

As long as both parts of the expression have the same basic data type, Boolean expressions can compare data of any type. Data can be tested to see if it is the same as, greater than, or less than other data.

A Boolean expression is a type of expression used in programming languages that produces a Boolean value when evaluated. A Boolean value can only be true or false.

The boolean expression for the given scenario can be:

num1 = int(input("Enter value: "))

num2 = int(input("Enter value: "))

if num1 == num2:

  print("Equals.")

else:

  print("Unequal.")

Thus, above mentioned is the program for the given code.

For more details regarding boolean expression, visit:

https://brainly.com/question/13265286

#SPJ5

challenge encountered ​

Answers

Answer:

What challenge?

Explanation:

Apart from using secure networks, how else can Dhruv keep his deliverables safe in the office and on the go? Select all that apply.

Answers

It should be noted that data can be secured when working in the following way:

Establishing a cyber security policy.Using two-factor authentication.Keeping passwords strong.Using secure internet connections.

Your information is incomplete. Therefore, an overview relating to the topic will be given. It should be noted that as telecommuting becomes a standard practice, the challenge regarding data security increases.

Employers should educate their employees about data security. The workers should know that data security is a priority and that all the internet connections are secure.

Learn more about data security on:

https://brainly.com/question/10091405

What is it called when a unique letter is assigned to a shared drive

Answers

Answer:

Assigning a drive letter to a network drive is called mapping the drive, or linking the drive, by network nerds.

Explanation:

This provides an easy method for workers to use their computers. FAT FAT RAM RAM DOS DOS GUI

Answers

C: GUI or Graphical User Interface.
A: Dos is an operating system (MS Dos)
B Fat is a file format for drives
D: Ram is one of the many things that makes a computer work

Answer:

GUI

Explanation:

Compare and contrast the android and windows operating systems

Answers

The main difference between Windows and OS X is the computer you can use it with. OS X is exclusively for Apple computers, commonly known as Macs, while Windows is basically for any personal computer from any company.

Write a program that reads the student information from a tab separated values (tsv) file. The program then creates a text file that records the course grades of the students. Each row of the tsv file contains the Last Name, First Name, Midterm1 score, Midterm2 score, and the Final score of a student. A sample of the student information is provided in StudentInfo.tsv. Assume the number of students is at least 1 and at most 20.
The program performs the following tasks:
Read the file name of the tsv file from the user.
Open the tsv file and read the student information.
Compute the average exam score of each student.
Assign a letter grade to each student based on the average exam score in the following scale:
A: 90 = < X o
B: 80 = < x < 90
C: 70 = < X < 80
D: 60 = < x < 70
E: X < 60
• Compute the average of each exam.
• Output the last names, first names, exam scores, and letter grades of the students into a text file named report.txt. Output one student per row and separate the values with a tab character.
• Output the average of each exam, with two digits after the decimal point, at the end of report.txt. Hint: Use the setprecision manipulator to format the output.
Ex: If the input of the program is:
StudentInfo.tsv
and the contents of StudentInfo.tsv are: 70 45 59
Barrett Edan 96 97 88
Bradshaw Reagan 73 94 80
Charlton Caius 88 61 36
Mayo Tyrese 90 86 45
the file report txt should contain
Barrett Edan 70 45 59 F
Baadha Boagan 9e 157 89 A
Charlton Caius 73 94 80 B
Mayo and Tyrese 58 61 36 D
Stern and Brenda 90 36 45 C
Average midterm 83.40, midterm2 76.60, final 61.60

Answers

#include
#include
#include
#include
#include
#include


using namespace std;

// Class student required to store the data
class Student{
public:
string lname;
string fname;
int marks[3];
char grade;

// Function which generates the grade for student
void calculate_grade(){
double sum = 0;
for(int i=0;i<3;i++){
sum+= marks[i];
}
double average = sum/3;
if(average>=90 && average<100)
this->grade = 'A';
else if(average>=80)
this->grade = 'B';
else if(average>=70)
this->grade = 'C';
else if(average>=60)
this->grade= 'D';
else this->grade = 'F';
}
};

// This function reads the file , and creates a vector of Students data
vector read_file(string fileName){

// Opening the file
fstream fin;
fin.open(fileName);


// Temp variables
vector list;
vector row ;
string line, word, temp;

// Read the data into vector
while(getline(fin,line)){
row.clear();
stringstream s(line);

while(getline(s,word,'\t')){

row.push_back(word);

}
Student st;
st.fname = row[0];
st.lname = row[1];
st.marks[0] = stoi(row[2]);
st.marks[1] = stoi(row[3]);
st.marks[2] = stoi(row[4]);
st.calculate_grade();
list.push_back(st);
}
fin.close();
return list;
}

// This function takes filname to be output as input, and list of student
void writeFile(string filename, vector list){

// Opening the new file
ofstream fin(filename);
for(int i=0;i string line = list[i].fname+"\t"+list[i].lname+"\t"+to_string(list[i].marks[0])+"\t"
+to_string(list[i].marks[1])+"\t"+to_string(list[i].marks[2])+"\t"+list[i].grade+"\n";
fin<
}


// Find the stats required
double average1 =0,average2 =0 ,average3 = 0;
for(int i=0;i average1+=list[i].marks[0];
average2+=list[i].marks[1];
average3+=list[i].marks[2];
}
average1/=list.size();
average2/=list.size();
average3/=list.size();

// Writting the stats
fin<<"\n"<<"Average: "<<"mid_term1 "<
// Closing the file
fin.close();
}
int main(){

// Taking the input
cout<<"Enter the filename: ";
string filename;
cin>>filename;
vector list;

// Reading and Writting to the file
list = read_file(filename);
writeFile("report.txt",list);


}

In this exercise we have to use the knowledge of the JAVA language to write the code, so we have to:

The code is in the attached photo.

So to make it easier the code can be found at:

using namespace std;

// Class student required to store the data

class Student{

public:

string lname;

string fname;

int marks[3];

char grade;

// Function which generates the grade for student

void calculate_grade(){

double sum = 0;

for(int i=0;i<3;i++){

sum+= marks[i];

}

double average = sum/3;

if(average>=90 && average<100)

this->grade = 'A';

else if(average>=80)

this->grade = 'B';

else if(average>=70)

this->grade = 'C';

else if(average>=60)

this->grade= 'D';

else this->grade = 'F';

}

};

// This function reads the file , and creates a vector of Students data

vector read_file(string fileName){

// Opening the file

fstream fin;

fin.open(fileName);

// Temp variables

vector list;

vector row ;

string line, word, temp;

// Read the data into vector

while(getline(fin,line)){

row.clear();

stringstream s(line);

while(getline(s,word,'\t')){

row.push_back(word);

}

Student st;

st.fname = row[0];

st.lname = row[1];

st.marks[0] = stoi(row[2]);

st.marks[1] = stoi(row[3]);

st.marks[2] = stoi(row[4]);

st.calculate_grade();

list.push_back(st);

}

fin.close();

return list;

}

// This function takes filname to be output as input, and list of student

void writeFile(string filename, vector list){

// Opening the new file

ofstream fin(filename);

for(int i=0;i string line = list[i].fname+"\t"+list[i].lname+"\t"+to_string(list[i].marks[0])+"\t"

+to_string(list[i].marks[1])+"\t"+to_string(list[i].marks[2])+"\t"+list[i].grade+"\n";

fin<

}

// Find the stats required

double average1 =0,average2 =0 ,average3 = 0;

for(int i=0;i average1+=list[i].marks[0];

average2+=list[i].marks[1];

average3+=list[i].marks[2];

}

average1/=list.size();

average2/=list.size();

average3/=list.size();

// Writting the stats

fin<<"\n"<<"Average: "<<"mid_term1 "<

// Closing the file

fin.close();

}

int main(){

// Taking the input

cout<<"Enter the filename: ";

string filename;

cin>>filename;

vector list;

// Reading and Writting to the file

list = read_file(filename);

writeFile("report.txt",list);

}

See more about JAVA at brainly.com/question/2266606

Which meter would you use to determine which lamp is defective in the shortest possible time? Explain how you would use this meter and why.

Answers

Answer:

bla bla bla bla

Explanation:

I dont anther stand

Consider our authentication protocol 4.0, in which Alice authenticates herself to Bob, which we saw works well (i.e., we found no flaws in it.). Now suppose that at the same time that Alice authenticates herself to Bob, Bob must authenticate himself to Alice. Give a scenario by which Trudy, pretending to be Alice, can now authenticate herself to Bob as Alice.

Answers

According to protocol 4.0, the scenario can be defined in terms of Bob, Alice and Trudy as follows:

The communication is done between Bob and Alice only in whom they share a secret key KAB with each other. The Trudy is an intruder who wants to get the information that is being communicated between Alice and Bob. To do so, Trudy wants Bob to initiate the communication by authenticating herself her Alice. Thus, Trudy waits for the Bob to start in-order to make the Bob authenticate himself.

Here are the steps how the communication is done between the Bob and Trudy:

Step 1: Bob starts the communication by himself to other side and waits for the reply.

Step 2: Trudy starts to disguise as Alice herself and authenticate herself to Bob.

Step 3: After looking at the reply, Bob sends the nonce key to Trudy. At this step, still Trudy does not know the KAB(R) in-order to reply to Bob.

Step 4: At this point Trudy response to the step-1 while Bob still continuing to authentication. Trudy picks the nonce for the Bob to encrypt the message with the Bob sent nonce in the Step-3.

Step 5: Now Bob completes his own authentication to himself on the other side of encrypting the nonce he sent at step 4. Where, Trudy gets the nonce key KAB( R).

Step 6: Now, Trudy completes her authentication in responding to R that is sent by Bob in step 3. At this point, Trudy has responded properly, so Bob thinks that he is communicating with Alice(Trudy).

The actual scenario with respect to above steps, the communication is done as follows:

Bob: “I am Bob”

Trudy: “I am Alice”

Bob: “R”

Trudy: “R”

Bob: “KAB (R )” – Bob completes his authentication.

Trudy: Get the KAB (R ) – Trudy complete her authentication.

Thus, the communication is started between the Bob and Trudy instead of Bob and Alice according to protocol 4.0.

write a short paragraph (three to four sentences) that explains how it works for computers and internet communications in relation to cybersecurity.

Answers

Answer:

Public and private keys form the basis for public key cryptography, also known as asymmetric cryptography. In public key cryptography, every public key corresponds to only one private key. Together, they are used to encrypt and decrypt messages. If you encode a message using a person’s public key, they can decode it using their matching private key.

Explanation:

Change up the wording.

In the context of the data administration component of a database management system (DBMS), the acronym CRUD stands for _____.

Answers

CRUD is an acronym in database management system (DBMS) that stands for Create, Read, Update, and Delete.

CRUD is an acronym in database management system (DBMS) that stands for Create, Read, Update, and Delete. It is the four basic functions of persistent storage.

CRUD operations are foundation operations every database developer and administrator needs to understand.

Find out more on CRUD at: https://brainly.com/question/651396

When using wildcards and the matching case option, which of the following would not be found by entering on in the Find dialog box?
1. den
2. down
3.Dayton
4. documentation

Answers

There are different types of Wildcard. The option that would not be found by entering on in the Find dialog box is called  Dayton.

Wildcard  is commonly known wild character or wildcard character. It is known as a symbol that is often used in place of or to stand for one or more characters.

Some wildcards are;

The asterisk (*)The question mark (?) Percent ( % )

Wildcards are said to be universally used. Dayton cannot be found because it is not a wildcard but a name of a person.

Learn more about Wildcard  from

https://brainly.com/question/7380462



List and explain three ways study groups benefit your learning.

Answers

Answer:

Studying in groups can have many effective outcomes and be beneficial. Here are some ways studying in a group is benefical,

1.  More support, limits chances of procrastination

     With many people, everyone is assigned a role or there is more determination by all peoples to get the work done than an individual being the only one responsible than many trying to accomplish the completion of the project.

2. More people means more parts can get done effectively and taking notes is easier.

     More people allow the work (depending on the project of assignment) for the work to get more focused and worked on faster with the designated roles given.

3. More interactive and allows (sometimes an enjoyable times) and to even learn faster than independently.

      People, not all however, might like the company, there's support and even people skills is enhanced by being in the group.

"""
Multiply.py - This program prints the numbers 0 through 10 along
with these values multiplied by 2 and by 10.
Input: None.
Output: Prints the numbers 0 through 10 along with their values multiplied by
2 and by 10.
"""
head1 = "Number: "
head2 = "Multiplied by 2: "
head3 = "Multiplied by 10: "
NUM_LOOPS = 10 # Constant used to control loop.
print("0 through 10 multiplied by 2 and by 10" + "\n")
# Initialize loop control variable.
# Write your counter controlled while loop here
# Multiply by 10.
# Multiply by 2.
print(head1 + str(numberCounter))
print(head2 + str(byTwo))
print(head3 + str(byTen))
# Next number.
Summary
In this lab, you use a counter-controlled while loop in a Python program. When completed, the program should print the numbers 0 through 10, along with their values multiplied by 2 and by 10. The data file contains the necessary variable declarations and output statements.
Instructions
Make sure the file Multiply.py is selected and opened.
Write a counter-controlled while loop that uses the loop control variable (numberCounter) to take on the values 0 through 10.
In the body of the loop, multiply the value of the loop control variable by 2 and by 10. Remember to change the value of the loop control variable in the body of the loop.
Execute the program by clicking the "Run Code" button at the bottom of the screen.

Answers


head1 = "Number: "
head2 = "Multiplied by 2: "
head3 = "Multiplied by 10: "
NUM_LOOPS = 10 # Constant used to control loop.

print("0 through 10 multiplied by 2 and by 10" + "\n")

# Initialize loop control variable.
# Write your counter controlled while loop here
# Multiply by 10.
# Multiply by 2.
x = 0
while(x<11):
print(head1 + str(x))
print(head2 + str(x*2))
print(head3 + str(x*10))
x += 1
# Next number.

What was the main limitation of computer networking that the invention of the Robert website of the 1990s

Answers

Answer:

The TCP/IP protocol could only be used in universities, governments, and businesses. People around the world could not send data to one another.

True or False: VLANs in cloud computing are most likely to be found on direct connections with a CSP.
O True
O False

Answers

Based on computing network operation, it is false that VLANs in cloud computing are most likely to be found on direct connections with a CSP.

What is VLAN?

VLAN is an acronym of Virtual Local Area Network that establishes its broadcast domain which enables network admins to combine hosts regardless the hosts are connected on the same network switch or not.

Given that the VLAN created its broadcast domain, you are likely not found it on direct connections with a CSP.

Hence, in this case, it is concluded that the correct answer is False.

Learn more about VLAN here: https://brainly.com/question/6769174

During boom times, which of the
following is true?
A. less tax revenue is being paid by businesses
B. less tax revenue is being paid by consumers
C. more tax revenue is being collected from businesses
and consumers
D. tax increases are causing unemployment and job
loss

Answers

During boom times, the option that was true is that less tax revenue is being paid by businesses.

How does the taxation system can boom a economy?

The use of taxation is one that affect incentives, as taxes can influence supply and demand factors.

Note that by lowering marginal tax rates on wages and salaries, can bring about the zeal for people to work more and earn more.

Therefore, During boom times, the option that was true is that less tax revenue is being paid by businesses.

Learn more about  boom times from

https://brainly.com/question/26020324

#SPJ2

Other Questions
The amount of current is the same at every point. True or False has a supreme court justice ever been impeached and removed Evaluate the expression for u = -15.-2(-12 u) = what is it called when a suspect of an investigation pleads guiltya. guilt pleab. confessionc. homicided. attorney Chi is planning to put a path of paving stones through her flower garden. The flower garden is a square with sides of 15 feet. How many feet long will the path be? Angle a and angle b are supplementary angles. if measure angle A=(2x-14)degree and m angle B= (3x-6) degree, then find measure of angle A what solution, (hypertonic, hypotonic, isotonic) would make osmosis go faster? In a certain poultry farm,on average every 8 chickens lay 144 eggs per week.In five weeks the chickens laid 2880 eggs.How many chickens are in the farm? A.18. B.32. C.160. D576 Match each part of the endocrine system with the correct label. Which of the following is a government incentive with fewer income taxes at retirement? aContribution matching bOpt-in program c529 plan dTraditional IRA 1. I like the cats that are outside because they are weird.Pls translate to Spanish Read the excerpt from "Amigo Brothers.Large posters plastered all over the walls of local shops announced the fight between Antonio Cruz and Felix Vargas as the main bout.The fight had created great interest in the neighborhood. Antonio and Felix were well liked and respected. Each had his own loyal following. Betting fever was high and ranged from a bottle of Coke to cold, hard cash on the line.Antonios fans bet with unbridled faith in his boxing skills. On the other side, Felixs admirers bet on his dynamite-packed fists.Which tone would be most appropriate for a text trailer that includes this scene?a tone of happinessa tone of sadnessa tone of anticipationa tone of desperation Find f(-2) if f(x)= x^2 + 8x failing to consider the law of large numbers most likely results in errors concerning 2. Felicia took out a simple interest loan at 12 percent interest for 6 months. Her previous balance is $2,460,What is the final payment if the loan is paid off with the next payment? Job advertisements can found in stores and on billboards. They aslo can be found on websites, magazines, and newspapers. Describe how Ancient Mesopotamian society developed from small farming villages to large cities with their own rulers. pls help!!!! Which of the following is a future consequence of the use of wind energy on the environment? It generates no greenhouse gases. Weather affects the quality of wind. It produces less noise than other energy. Wind cells are used in isolated locations. Gidgits Galore's chimney stacks emit significant amounts of smoke into the air, and residents have complained about the poor air quality since the factory began operating. Janey Clancey lives within mile of the Gidgits Galore factory. She contacted the Environmental Protection Agency (EPA) many times about the smoke spewing from Gidgits Galore's chimneys and the agency has continually disregarded her complaints (and also those of several neighbors) and taken no action. Janey can bring suit against the EPA.TrueFalse I NEED HELP PLEASEEEEEEEEE