Why does a WEB photo have a smaller/lower resolution than a PRINT photo?

So that a PRINT photo will print faster and a WEB photo will look sharper on screen.

So that the WEB photo will load faster on a website while a PRINT photo needs to look sharper and higher quality in a printed photo or book. ​

Answers

Answer 1

Answer:

So that the WEB photo will load faster on a website while a PRINT photo needs to look sharper and higher quality in a printed photo or book. ​

Explanation:

lower resolution = lower quality, load faster


Related Questions

When a scrum master encounters resistance from outside of the scrum team, what should the scrum master do?.

Answers

When a scrum master encounters resistance from outside of the scrum team, The thing that the master can do is Work in hand with other Scrum Masters to boast the effectiveness of the software of the Scrum in the said Organization.

How do you manage the resistance of a person in Scrum?

Avoiding escalation is the key to dealing with any resistance. Simply pointing out someone's error can result in dispute, which could put the project in jeopardy.

Note that It is your responsibility as a Scrum Master to justify why the team must operate in a specific manner and why their suggestion would not be successful.

Therefore, Having a one-on-one talk with the person is the greatest strategy to overcome this barrier. Don't compel them to defend their resistance to the team or their management in front of a group of people.

Learn more about scrum master from

https://brainly.com/question/4763588
#SPJ1

What is the final value of x (after this code has executed)?

int x = 0;

for (x = 0; x < 200; x++)

{

System.out.println(x);

}

Answers

Answer:

199

Explanation:

i starts at 0. One more than 0 is one. Until you get 199.  

The computer is counting as seen below:

0

1

2

....

199

The web server at Terry's company recently was attacked by multiple computers. The attack overwhelmed the company's web servers and caused the web servers to crash. What type of attack occurred

Answers

It sounds like the web server at Terry's company experienced a Distributed Denial of Service (DDoS) attack.

 

What exactly is Distributed Denial of Service (DDoS) attack?

Based on the given scenario, it sounds like Terry's company experienced a Distributed Denial of Service (DDoS) attack. This type of attack involves multiple computers flooding a web server with traffic or requests, overwhelming the server's capacity and causing it to crash or become unavailable. DDoS attacks are often used as a means of disrupting or disabling online services or websites.

Therefore, it sounds like the web server at Terry's company experienced a Distributed Denial of Service (DDoS) attack. In a DDoS attack, multiple computers overwhelm the targeted web server with a flood of traffic, causing it to crash and become unavailable for legitimate users.

To know more about Distributed Denial of Service (DDoS) attack.

visit:

https://brainly.com/question/30167850

#SPJ11

4. Security Passwords "Research This" Use a searcli engine to locale at least 2 different companies' lists of the 10 or 20 more common passwords in the past two years. Which passwords appear on both lists? Find a password-strength checking website and type three passwords to determine how easy or difficult they are to crack. Why do you think consumers continuc to use these passwords despite repeated warnings to avoid them? Do you have accounts using one or more of these passwords? What advice is.giyen for developing strong passwords? How do the companies gather data to determine common passwords?

Answers

According to various studies, "123456" has been the most common password in the past two years. Many users do not change the default passwords on their devices or use simple, easy-to-guess passwords such as "qwerty" or "password."

Password cracking tools can easily guess such passwords.The first thing to keep in mind when developing a strong password is to make it lengthy and complex. Use a mixture of uppercase and lowercase letters, numbers, and special characters. As an alternative, using passphrases is also a good idea. Furthermore, do not use the same password for multiple accounts, and avoid using simple patterns like "1111" or "abcd."To determine the most frequent passwords, data scientists typically analyze data breaches and attack methods used by hackers. They analyze the stolen data to look for patterns and identify frequently used passwords.

This data is then compiled into lists of the most commonly used passwords. Several websites can determine the strength of a password based on a series of tests. Users can input their passwords and see how strong they are.To conclude, users should prioritize their security by having strong passwords. The most common passwords like “123456” and “password” should be avoided. Instead, users can use passphrases and mix them up with symbols, uppercases, and numbers. To further add to their security, users can change their passwords every 60-90 days and avoid using the same passwords for different accounts.

To know more about passwords visit:

https://brainly.com/question/31815372

#SPJ11

Laura lives in the mountainous state of Nevada. She doesn't receive very good television reception. She wonders whether there is a problem
with her television set or the antenna she uses. Her neighbor Patsy does not have any problem with her television reception. Patsy also
mentioned that she has no antenna. Patsy is possibly using a
television system.

Answers

Answer:

Patsy is using a wired connection as an antenna uses radio waves which can be blocked by land formations

Explanation:

What is computer software?

O A. It is the part of a computer that processes data generated by the
RAM.

O B. It is a peripheral that allows the input of data by a user.

O C. It is the instructions that direct computers how to handle and
display information.

OD. It is storage whose data is deleted when a computer is turned off.
SUBMIT

Answers

Answer:

Software from a computer

Explanation:

it is soft and doesn't ware therfore it is not hardware it exists in technology

When this logic block is included in a control structure, what must be the
case for the entire condition to be met?
and
OA. One or both of the conditions must be true.
OB. Only one of the conditions must be true.
C. Both conditions must be true.
OD. Neither condition must be true.
CUR

Answers

When this logic block is included in a control structure, for the entire condition to be met, " One or both of the conditions must be true." (Option A)

What is a Control Structure?

The sequence in which individual statements, instructions, or function calls in an imperative program are performed or evaluated is referred to as control flow in computer science. An imperative programming language is distinguished from a descriptive programming language by its emphasis on explicit control flow.

In structured programming, there are three basic control structures. Structure of Sequence Control: This refers to line-by-line execution, in which statements are run in the same sequence as they occur in the script.

In C, there are four types of control statements:

Statements of decision-making (if, if-else)Statements of choice (switch-case)Statements of iteration (for, while, do-while)jump  Statements (break, continue, goto)

In other words, control statements allow users to determine the sequence in which instructions in a program are executed. These enable the computer to make certain decisions, do particular activities repeatedly, or even go from one piece of code to another.

Learn more about Control Structure:
https://brainly.com/question/28144773
#SPJ1

Answer:

I think your asking the and one

the answer to that is

both conditions must be true

i just did it

Explanation:

which of the following situations indicates that a page fault occurs? a. a running program is stopped by a running error b. a system call is waiting in the ready queue c. the paging daemon is killed accidentally by the system administrator d. a page referenced by a running program is not found in the memory

Answers

Page fault is indicated by a running program that cannot locate a page it has referenced in memory. It means, when a process addresses a page with the valid/invalid bit set to invalid, a page fault occurs.

This can also be said to occur when a process accesses a location in logical memory that isn't now accessible in physical memory. A page fault occurs when:

1. The OS traps a page fault and suspends the process.

2. It determines whether the reference is legitimate or not.

3. The procedure is terminated if the reference was unlawful.

The OS gets ready to bring the required frame into physical memory if the reference was permissible. The page is simply loaded if a frame is available from the free frame list. If no free frame is available, the operating system chooses one of the current frames as a victim, writes it back to secondary storage, and then loads the required page into the newly free frame. The operation is then restarted from the line that generated the trap once the page table has been modified to reflect this change.

To learn more about Page fault click here:

brainly.com/question/29849429

#SPJ4

You are working as a project manager. One of the web developers regularly creates dynamic pages with a half dozen parameters. Another developer regularly complains that this will harm the project’s search rankings. How would you handle this dispute?

Answers

From the planning stage up to the deployment of such initiatives live online, web project managers oversee their creation.They oversee teams that build websites, work with stakeholders to determine the scope of web-based projects, and produce project status report.

What techniques are used to raise search rankings?

If you follow these suggestions, your website will become more search engine optimized and will rank better in search engine results (SEO).Publish Knowledgeable, Useful Content.Update Your Content Frequently.facts about facts.possess a link-worthy website.Use alt tags.Workplace Conflict Resolution Techniques.Talk about it with the other person.Pay more attention to events and behavior than to individuals.Take note of everything.Determine the points of agreement and disagreement.Prioritize the problem areas first.Make a plan to resolve each issue.Put your plan into action and profit from your victory.Project managers are in charge of overseeing the planning, execution, monitoring, control, and closure of projects.They are accountable for the project's overall scope, team and resources, budget, and success or failure at the end of the process.Due to the agility of the Agile methodology, projects are broken into cycles or sprints.This enables development leads to design challenging launches by dividing various project life cycle stages while taking on a significant quantity of additional labor.We can use CSS to change the page's background color each time a user clicks a button.Using JavaScript, we can ask the user for their name, and the website will then dynamically display it.A dynamic list page: This page functions as a menu from which users can access the product pages and presents a list of all your products.It appears as "Collection Name" in your website's Pages section.

        To learn more about search rankings. refer

        https://brainly.com/question/14024902  

         #SPJ1

Aside from human user types, there are non human user groups. Known as account types, __________ are implemented by the system to support automated services, and __________ are accounts that remain non human until individuals are assigned access and can use them to recover a system following a major outage. A. contingent IDs, system accounts B. system accounts, contingent IDs C. systems administrator accounts, contingent IDs D. control partners, system accounts

Answers

Answer: B. system accounts, contingent IDs

Explanation:

Aside from human user types, there are non human user groups. Known as account types, (system accounts) are implemented by the system to support automated services, and contingent IDs are accounts that remain non human until individuals are assigned access and can use them to recover a system following a major outage. The system account is refered to as the user account which the operating system creates during installation.

Therefore, the correct option is B.

what would be displayed if a user executes this shell script and answers blue when prompted? the answer is red or blue. the answer is not red nor blue. the code would cause an error. the answer is red or blue. the answer is not red nor blue.

Answers

If a user executes this shell script and answers "blue" when prompted, the output would be "the answer is red or blue." This is because the condition in the script checks for the user's input and the corresponding output is displayed based on the condition.

The script would execute the following logic:

Prompt the user to enter their answer.

Read the user's input.

Check if the input is "red" or "blue" using an if statement.

If the input is "red" or "blue", the script will display the message "the answer is red or blue."

If the input is not "red" nor "blue", the script will continue to the next line.

Since the user answered "blue" in this case, the condition is satisfied, and the script will display "the answer is red or blue" as the output.

Learn more about script here

https://brainly.com/question/26165623

#SPJ11

write a program to add 8 to the number 2345 and then divide it by 3. now, the modulus of the quotient is taken with 5 and then multiply the resultant value by 5. display the final result.

Answers

Answer:

Here is a program in Python that will perform the operations described:

# Calculate 8 + 2345

result = 8 + 2345

# Divide by 3

result = result / 3

# Take modulus with 5

result = result % 5

# Multiply by 5

result = result * 5

# Display final result

print(result)

Explanation:

This program will add 8 to the number 2345, divide the result by 3, take the modulus with 5, and then multiply the result by 5. The final result will be displayed on the screen.

I hope this helps! Let me know if you have any questions or if you need further assistance.

(Please write your answers on paper, scan and save them as one PDF file, then upload it) Hard red winter wheat is planted in the fall to be harvested in the spring. Suppose that wheat production uses acres of land and labor in its production as follows: q=αA+L
β
where q is in thousand bushels. A. What is the CMP tangency condition? B. Find the demand equation for land (A) and labor (I)

Answers

The given equation q=αA+L^(β) represents the production function of wheat, but to derive the demand equation for land and labor, we need additional information on prices and constraints specific to the production process.

A. The CMP tangency condition refers to the condition where the capital market line (CML) is tangent to the production possibility frontier (PPF). In the given wheat production equation q=αA+L^(β), the CMP tangency condition can be expressed as the equality between the marginal rate of technical substitution (MRTS) and the relative prices of land (A) and labor (L). Mathematically, it can be represented as:

MRTS = -∆L/∆A = -∂q/∂A / ∂q/∂L = -α/β

B. To find the demand equation for land (A) and labor (L), we need additional information such as the prices of land and labor and the total output level (q). With this information, we can determine the optimal allocation of land and labor that maximizes production. However, without the specific values of these variables, it is not possible to provide a precise demand equation for land and labor in this context.

for more questions on equation

https://brainly.com/question/29174899

#SPJ8

BREIFLY (4 sentences) describe why cybersecurity is a necessary career field

Answers

Answer:

Whenever there are rules or general etiquettes that must be followed, there is no doubt that there will be humans to break them. Like how Laws and law enforcement was made to deter humans from breaking rules in the physical world. Cyber security is a necessary career field in society that will help prevent people from breaking rules in the cyber space.

If you used D*n as the criterion in a Short Text field called FirstName, what would appear in that field in the query results

Answers

When querying a list or table, the use of wildcard symbols maybe used to optimize the search result. The words D*n will return First names which starts with D and ends with n.

The (*) denotes that the search returns any values or alphabets inbetween D and n.

Names such as Dean, Don, Drezn and other rated names would be included in the returned query.

Therefore, the returned query would include names starting with the letter D and ends with the letter n.

Learn more : https://brainly.com/question/25586700

Q2. What does JSON stand for? Can you give an example of a JSON object. Q3. What is the purpose of a "projection" in a find query for MongoDB?

Answers

Answer:

Q2: JavaScript Object Notation

Q3: The $project function in MongoDB passes along the documents with only the specified fields to the next stage in the pipeline. ... The specification for $project command contain the inclusion of fields, the suppression of the _id field, the addition of new fields, and the resetting the values of existing fields.

Explanation:

What does

mean in computer science

Answers

Answer:

i think the answer is a character or characters that determine the action that is to be performed or considered.

Explanation:

hope this helps

A Hospital wants to store different types of data I need to find the best storage device for each type and why what is the best storage device to store the patient's data

Answers

Answer:

On-Premise Data storage

Explanation:

On-Premise Data storage prefers on-premise data to store and manage patient data. The main reason is straightforward and control over the in-house data. On-premise data centers do not need wireless connections, and no risk of downtimes. Healthcare can access the data from secure, making on-premise data storage choices.

On-premise data storage stored and managed escalates and demand more physical space. When hospitals use on-premise data storage, they have to arrange the physical space within the premises of the host of the server.  On-premise data is connected to the local network and could consider the secure data option in upkeeping the security of premise healthcare with anti-virus software, firewalls, and multifactor authentication.

Hospital moves toward holistic data storage option. The on-premise to cloud data storage for healthcare affirms that challenges are nullified.

Why does my smoke detector keep beeping even after i change the battery?.

Answers

Sometimes they just beep for no reason or the batteries are faulty

To troubleshoot a smoke detector that continues beeping after a battery change, check the battery installation, clean the detector, consider replacing it if it's old, and consult the manufacturer or customer support if needed.

The objective of this question is to seek assistance in troubleshooting a smoke detector that continues to beep after a battery change.

There could be a few reasons why it's still beeping even after you've changed the battery.

First, make sure that you've installed the new battery correctly. Double-check the battery compartment to ensure it's securely in place and the contacts are making good contact.

It's also a good idea to use a high-quality battery to ensure optimal performance.

Another possibility is that there might be some residual smoke or dust particles inside the smoke detector, causing it to detect a false alarm. Try gently cleaning the detector using a soft brush or compressed air to remove any debris that may be interfering with its operation.

Additionally, it's worth checking if the smoke detector itself needs to be replaced.

Over time, smoke detectors can age and become less reliable. If your smoke detector is more than 10 years old, it may be time to invest in a new one for optimal safety.

If none of these suggestions solves the issue, it might be best to consult the manufacturer's instructions or contact their customer support for further assistance.

To learn more about troubleshooting visit:

https://brainly.com/question/29736842

#SPJ3

NEED THIS ASAP!!) What makes open source software different from closed source software? A It is made specifically for the Linux operating system. B It allows users to view the underlying code. C It is always developed by teams of professional programmers. D It is programmed directly in 1s and 0s instead of using a programming language.

Answers

Answer: B

Explanation: Open Source software is "open" by nature, meaning collaborative. Developers share code, knowledge, and related insight in order to for others to use it and innovate together over time. It is differentiated from commercial software, which is not "open" or generally free to use.

Some organizations and individuals, such as patent trolls, abuse intellectual property laws .



computer science

Answers

Answer:

False.

Explanation:

Patent can be defined as the exclusive or sole right granted to an inventor by a sovereign authority such as a government, which enables him or her to manufacture, use, or sell an invention for a specific period of time.

Generally, patents are used on innovation for products that are manufactured through the application of various technologies.

Basically, the three (3) main ways to protect an intellectual property is to employ the use of

I. Trademarks.

II. Patents.

III. Copyright.

Copyright law can be defined as a set of formal rules granted by a government to protect an intellectual property by giving the owner an exclusive right to use while preventing any unauthorized access, use or duplication by others.

Patent trolls buy up patents in order to collect royalties and sue other companies. This ultimately implies that, patent trolls are individuals or companies that are mainly focused on enforcing patent infringement claims against accused or potential infringers in order to win litigations for profits or competitive advantage.

Hence, some organizations and individuals, such as patent trolls, do not abuse intellectual property laws.

Answer:

the answer is intentionally

Explanation:

i took the test

write the definition of a function named max that has three integer parameters and returns the largest of the three parameters.

Answers

Answer:

def max(x,y,z):

if (x>z and x>y):

return (x)

elif (y>x and y>z):

return y

else:

return z

Explanation:

Using the knowledge in computational language in python it is possible to write a code that  write the definition of a function named max that has three integer parameters and returns the largest of the three parameters.

Writting the code:

def max(x,y,z):

if (x>z and x>y):

return (x)

elif (y>x and y>z):

return y

else:

return z

See more about python at brainly.com/question/12975450

#SPJ1

write the definition of a function named max that has three integer parameters and returns the largest

Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. He needs to create a list of invitees, design the card, and personalize the card. How should he complete the tasks? a. Use mail merge for steps 1 and 2 and a word processor for step 3. b. Use a graphics software for step 1, mail merge for step 2, and a word processor for step 3. c. Use a word processor for steps 1 and 2 and a graphics software for step 3. d. Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3.

Answers

Answer:

1: Word Processor

2: Graphics Software

3: Mail Merge

Explanation:

Given

1. Create a list of invitees

2. Design an invitation card

3. Personalize the card

Creating a list of invitees is a task that requires basic activities such as typing, using of numbers and bullets; these activities can be achieved using word processing software programs such as Microsoft Word, WordPerfect, amongst others.

So task 1 requires a word processor

An invitation card is a piece of graphics that can be perfectly handled by graphics software programs such as CorelDraw, Adobe Photoshop, etc.

So task 1 requires a graphics software

Task 3 can be achieved using mail merge and this is because mail merge can be used either to print or to mail recipients. While mailing the recipients, one can easily personalize each letter (or in this case, an invitation card) to suit the recipient it is being directed to.

Identify the tool in OpenOffice writer which will help us to obtain special text effects.
Gallery
Clip Art
Fontwork Gallery
None of the above

Answers

Answer:

Fontwork Gallery

Explanation:

The "Fontwork Gallery" helps create special effects for your text, so it can speak volumes. It allows you to select any Fontwork style and become creative with it by filling it with different colors. You may also change the font's line color and width. You may also wrap it to the right, wrap it through and so on. It gives you enough freedom to make your font stand out and add color and style to any document you're working on.

the speed of cpu is measured in terms of what?

Answers

Answer:

Megahertz (MHz) or Gigahertz (GHz)

1 GHz = 1000 MHz

When measuring a computer, if you are most concerned with getting large amounts of data processed, you should look at:
CPU utilization
Throughput
Turnaround time
Waiting time

Answers

When measuring a computer, if you are most concerned with getting large amounts of data processed, you should look at throughput. Throughput refers to the amount of data that can be processed in a given period of time.

It is a measure of the overall performance of a system and takes into account factors such as CPU speed, memory bandwidth, and disk access speeds. While CPU utilization is important for measuring the percentage of time that the CPU is busy, it does not necessarily correlate with the amount of data that can be processed. Turnaround time and waiting time are more focused on measuring the time it takes for a specific task to be completed, rather than the overall performance of the system. Therefore, if you are most concerned with processing large amounts of data, throughput should be your primary focus.

learn more about throughput here:

https://brainly.com/question/31470420

#SPJ11

you need to configure a few changes to how the locatedb index file is created

Answers

To configure changes to the creation of the locatedb index file, you will need to access the relevant settings in your operating system.

The process will vary depending on the specific OS you are using, but generally involves accessing the terminal or command prompt and entering specific commands. This may involve adjusting parameters such as the frequency of updates to the index file or the types of files that are included in the index. By making these changes, you can ensure that the locatedb index file is optimized for your specific needs and helps you quickly locate files on your system. Be sure to consult online resources or seek expert advice if you are unsure about making these changes.

learn more about  index file here:
https://brainly.com/question/28232570

#SPJ11

what should the forensics specialist keep updated and complete in order to support his or her role as an expert and document enhancement of skills through training, teaching, and experience?

Answers

In order to defend his or her position as an expert and to demonstrate how training, instruction, and experience have improved their skills, forensics specialists maintain thorough and up-to-date "CVs."

Explain the term forensics specialist?

Using various analysis techniques, such as chemical, instrumental, microscopic, as well as physical analysis, forensic specialists examine and assess physical evidence.

They may occasionally need to handle biological materials such as blood, hair, and the remains of gunshots. The responsibilities of a forensic specialist depend on their specialty.The Latin word curriculum vitae (CV) means "course of life." Resumé, on the other hand, is French meaning "summary." CVs and resumes both: are customized for the particular position/business you are applying for. should demonstrate that you are the most qualified applicant.

Thus, in order to defend his or her position as an expert and to demonstrate how training, instruction, and experience have improved their skills, forensics specialists maintain thorough and up-to-date "CVs."

To know more about the forensics specialist, here

https://brainly.com/question/28149413

#SPJ4

What threat do insiders with authorized access to information?

Answers

Answer:

An insider threat uses authorized access, wittingly or unwittingly, to harm national security through unauthorized disclosure, data modification, espionage

Explanation:

Which button is used to enlarge a window to full screen?

Answers

The button used to enlarge a window to full screen is the "Maximize" button.

When working on a computer, you may often want to make the window you're currently using take up the entire screen for a more immersive experience or to maximize your workspace. The button that allows you to do this is typically located in the top right corner of the window and is represented by a square icon with two diagonal arrows pointing towards each other. This button is commonly known as the "Maximize" button.

Clicking the "Maximize" button resizes the window to fit the entire screen, utilizing all available space. This action eliminates the window's title bar, taskbar, and borders, allowing you to focus solely on the content within the window. This can be particularly useful when watching videos, working on graphic design projects, or engaging in activities that require a larger viewing area.

Learn more about  Window buttons

brainly.com/question/29783835

#SPJ11

Other Questions
How far is Mars from the sun in numbers like this (122,322,455) Each month, Ellie spends 4 hours in tap class at her dance studio. If each month she spends 20% of her class time in tap class, what is the total number of hours she spends in dance classes each month? Show your work or explain how you found your answer in complete sentences. When positioning products relative to competitors' offerings, firms typically are most successful when they focus on opportunities Group of answer choices for diversification where value-based pricing can be ignored where customer excellence can be substituted for product excellence that build on their strengths relative to those of their competition in international markets a client has been diagnosed with a defect in the pyloric sphincter. how will the nurse explain the likely consequence of a dysfunctional pyloric sphincter? True or false: The acquisition of Spanish horses transformed the Sioux and that Cheyenne from crop growing villagers into nomadic buffalo hunters NO LINKS!! URGENT HELP PLEASE!!!1. What patterns do you observe in the table? Compare these patterns with those you observe in the graph in Question A.2. What is the fixed perimeter for the rectangles represented by this table? Explain. 3. What is the greatest area possible for a rectangle with this perimeter? What are the dimensions of this rectangle? Nativists are:1)Persons who travel as "3rdclass" passengers on steamships2) Workers who replace striking union workers in factories3) Americans who oppose immigration4) Persons who oppose equal rights for African Americans roller-coaster car doing loop-the-loop will come off the track its speed at the highest point drops below critical speed The condition that determines Ihe critical speed is r =0 Nat the highest point n" = Nat the highest point FG = 0 Nat the highest point n = mg at the highest point The communicating process of accounting includes all of the following, except a. recording b. classifying c. summarizing d. interpreting If the a of a monoprotic weak acid is 2. 6106, what is the ph of a 0. 33 m solution of this acid? A balanced 3-phase star-connected supply with a phase voltage of 330 V, 50Hz is connected to a balanced, delta-connected load with R = 100and C = 25 F in parallel for each phase. (a) Determine the magnitude and the phase angle of the load's impedance in each phase. [1 Mark] (b) Determine the load's phase currents for every phase. [3 Marks (c) Determine all three line currents. [3 Marks] (d) Determine the power factor and the power delivered to the load Does Napoleon care about the animals? T/Falmost half of IPV victims have been strangled how would I word that it is being doubled in size?The question is how did D get to E. Pizza Palace and Saucy Sams both offer food delivery. Both have a deal for large pizzas. You have to buy a lot of pizzas for your big family and you want to get a good deal. Pizza Palace has a $5 delivery charge and charges $8.49 per pizza. Saucy Sams has lower priced pizza. Saucys pizzas are $4.99 each but his delivery charge is $12. Convert 230 Fahrenheit to celsius For this assignment, you will use bash create a simple inventory system. The system will store basicinformation about items and allow the user to create, read, update, and delete them.Storing Item InformationItem information will be stored in text files.1. Files will be stored inside a directory called data within the same directory as your script.2. Each file will be named based on the item number, an integer with exactly four digits, followedby the extension .item.3. An item file consists of exactly three lines: simple_name (string with no whitespace) item_name (string) current_quantity (integer) max_quantity (integer) description (string)4. Example file named 3923.itemb_water Bottled Water35 99The finest spring water you can purchase !Script ExecutionWhen the script is run, the following should occur.1. Upon running your script, the user should be presented with the following menu:Enter one of the following actions or press CTRL-D to exit.C - create a new itemR - read an existing itemU - update an existing itemD - delete an existing item2. The user then enters a one-character action (upper or lowercase), leading to one of the following. C: an item file is created(a) From the terminal, read the following one at a timei. Item number (four digit integer)ii. Simple name (string with no whitespace)iii. Item name (string)iv. Current quantity (integer)v. Maximum quantity (integer)vi. Description (string)(b) Using the values entered by the user, create a new file in the data folder based onthe instructions above.(c) Update data/queries.log by adding the following line:CREATED: simple_name - datewhere simple_name is the items short name and date is the output from the datecommand.(d) If the item number already exists, print the following error and continue with thescript.ERROR: item already exists R: read an existing items information(a) Prompt the user for an item number:Enter an item number:(b) Search for the specified item using the item number.(c) Print the item information in the following format:Item name: item_nameSimple name: simple_nameItem Number: item_numberQty: current_quantity/max_quantityDescription: description(d) If the item is not found, print the following error and continue with the script.ERROR: item not found U: update an existing item(a) Prompt the user for the following one at a timei. Item number (four digit integer)ii. Simple name (integer with no spaces)iii. Item name (string)iv. Current quantity (integer)v. Maximum quantity (integer)vi. Description(b) Search for the specified item using the item number.(c) Update each of the corresponding fields based on the user input. If the user inputis blank for a particular field (except item number), keep the original valuefrom the file.(d) Update data/queries.log by adding the following line:UPDATED: simple_name - datewhere simple_name is the items short name and date is the output from the datecommand.(e) If the item is not found, print the following error and continue with the script.ERROR: item not found D: delete an existing item(a) Prompt the user for an item number:Enter an item number:(b) Delete the specified items file(c) Update data/queries.log by adding the following line:DELETED: simple_name - datewhere simple_name is the items short name and date is the output from the datecommand.(d) Print the following message with the items simple name:simple_name was successfully deleted.(e) If the item is not found, print the following error and continue with the script.ERROR: item not found If an invalid character is entered, print the following error and continue with the script.ERROR: invalid option3. After an action is completed, display the menu again. This should go on indefinitely untilCTRL-D or the end of a file is reached.Assignment DataAn initial data set can be found in /usr/local/courses/assign1.Copy this to your own assignments directory.Script FilesYour program should consist of five bash files: assign1.bash - the main file which is initially invoked create.bash - logic for the create option read.bash - logic for the read option update.bash - logic for the update option delete.bash - logic for the delete optionVerifying Your ProgramYour program must work with the input provided in a1Input.txt. To test it:1. Verify that your assignment folder has a data directory with the initial data set.2. Execute your script and redirect a1Input.txt into it. You should not be copying or typingthe contents of a1Input.txt into your terminal. Redirection must work.3. Verify that the output and files are as expected. Three friends were helping to push a car. If all three are pushing equally hard and the net force is 600N, how hard is each one pushing the car? Which activity would most likely improve a family relationship?A) setting aside time to perform individual hobbiesB)traveling a long pistance for work on a continual basisC)trying to convince others that one person should make decisionsD)being open and honest while communicating with one another x +28x + c what value of c will complete the square in the expansion bell and make the expression a perfect square trinomial ?