(blank) is an expansion card that enables a computer to connect to a network:
A Network interface card
B VGA Card
C FAX Card
D Sound card​

Answers

Answer 1

Answer:

A

Explanation:


Related Questions

How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas

Answers

The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.

How did Native Americans gain from the long cattle drives?

When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.

Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.

There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.

Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.

Learn more about cattle drives from

https://brainly.com/question/16118067
#SPJ1

what is role can ICT play in helping school take part in social responsibility

Answers

Answer:

The answer is below

Explanation:

Given that Social responsibility deals with ideas that individuals or groups of people are expected or bound to work in alliance with other individuals or groups of people in favor of the generality of society.

Hence, some of the role ICT can play in helping school take part in social responsibility are:

1. Helps students to have independent access to knowledge

2. It assists the students with special needs

3. It helps the teachers to teach outside the comfort of the classroom only.

4. It exposes teacher and students to more knowledge and opportunities

5. The school governing body can access people and the community's opinions about ways to improve the school better.

6. It exposes the school to more ideas and opportunities.

7. It can be used to assist the school in improving the quality of education, both for the teachers and students side.

Identify the link element that accesses a style sheet file named output. Css only when the device is a printer or a projection device.

Answers

There are different types of link element. The link element that accesses a style sheet file named output is:

<link href="output.css" media="print, projection" />

Style sheets often shows a key growth for Web page designers, widening their ability to boast the appearance of their pages.

In the web environments, people are very concerned with the content of their documents than the way it was presented.

There are techniques that often work for some of the people but not for all of the people and there is need therefore to make new techniques.

Learn more about link element from

https://brainly.com/question/25608430

Please complete the following questions. It is important that you use complete sentences and present the questions and answers when you submit your work.

1.Give several reasons why Python is such a great programming language. Explain how Python is related to flowcharts.

2.Consider this program:
Cost1 = input("Please enter the first expense: ")

Cost2 = input("Please enter the second expense: ")

print("Your total for both expenses was", Cost1 + Cost2)

3.If the user inputs “10” for the first expense and “20” for the second expense, what will the interpreter show in the final line when this program is run? If this result in not what the programmer intended, how would you explain what went wrong?

4.You are writing a line of code that should ask the user to input the balance of their bank account in dollars and cents. The program will then perform a multiplication problem to tell the user how much interest they can earn. Identify three errors in your line of input code and explain why they are incorrect. Include the corrected line of code in your answer. Here is the code:
1num = input(What is your balance?)

5.What are some kinds of comments that might be useful for a programmer to include in a program?
If you were planning how to write a program, at what point would a flowchart be helpful? At what point would pseudocode be helpful? Explain your reasoning.

Answers

Answer:

ndnxnndjdjsnnznnzbzbbdbdhdhhdbdbdbbdhdjidieiei

Explanation:

bxbzbxncnxbbcnfnnfnfndndnndndnndndnndndndnndndndndnnddnndndndnhrjjsjdudjjdjd

A network administrator was told by the Chief Information Officer (CIO) to set up a new office with a network that has redundancy. What topology would BEST meet the CIO's requirement?

Answers

Answer:

"Mesh topology" is the correct answer.

Explanation:

A mesh topology seems to be a network configuration where there has been an interconnection between each hardware and communications system. This topology configuration allows the distribution of many of these signals, although one of the connexons starts going down.This topology needs to connect each destination to any other end destination, thus creating a completely pointless channel.

How do I access my GGC claw mail?

Answers

To access your GGC Claw Mail account, use the URL clawmail.ggc.edu. Visit GIL-Find in the GGC. In the top right corner, click My Account. Simply click the yellow column's "Sign In" button. The Log in as box should be clicked on GGC Students, Faculty & Staff.

What is GGC Claw Mail?

GGC uses Claw Mail as their email service for staff, students, and teachers. Claw Mail is accessible through Microsoft Office 365, which provides use of a number of collaborative and communication features like industry-standard email, calendar and schedule sharing, and integration with Microsoft Office applications.

The majority of new students get their first Claw Card at Grizzly Orientation. To get your Claw Card, you must show a picture ID that has been approved by the government. You can pick up your Claw Card from the Claw Card office if you didn't get it during Grizzly Orientation.

To know more about Mail, visit:

https://brainly.com/question/24688558

#SPJ4

(Maximum 400 words) Describe how this period of Coronavirus (COVID-19) will influence and affect the STEM (Science, Technology, Engineering, and Mathematics) fields.

Answers

The period of coronavirus will have both negative and positive impacts on STEM fields.

However, the STEM (Science, Technology, Engineering, and Mathematics) fields have shown significant changes and impacts.

Here is how this period of COVID-19 will affect the STEM fields.

1. Technology

The current situation has increased the use of technology in various fields. Remote work and online meetings are becoming more popular, and this has led to increased technology usage. Technological advancements are expected in the future, leading to new business models that are more efficient.

2. Biomedical research

The COVID-19 pandemic has sparked the need for more biomedical research and led to an increase in research funding. Scientists are researching vaccines, treatments, and diagnostic tools, which is expected to lead to a better understanding of viruses and other infectious diseases.

3. Education

The pandemic has affected the education system globally, with many institutions closing and students learning from home. Teachers and educators are now incorporating technology in teaching, and the pandemic has accelerated the adoption of e-learning platforms. This has led to the development of new ways to learn and teach, and new online learning platforms are expected to emerge in the future.

4. Engineering

The pandemic has led to an increase in demand for essential supplies such as ventilators, personal protective equipment (PPE), and other medical devices. This has led to the development of new designs and manufacturing processes that are more efficient. The need for innovation has also led to the development of new solutions, such as 3D printing of medical supplies.

5. Mathematics

Mathematical models are used to understand the transmission of diseases, and the COVID-19 pandemic has led to the development of new models to understand the spread of the virus. These models help policymakers and public health officials make decisions to control the pandemic.

In conclusion, the COVID-19 pandemic has impacted STEM fields significantly, leading to new developments and innovations. With increased technology adoption, biomedical research, e-learning platforms, and engineering, the STEM fields are expected to change and adapt to the new normal. It is crucial to keep up with these changes and find ways to take advantage of the opportunities presented by the pandemic.

learn more about STEM fields here:

https://brainly.com/question/30082530

#SPJ11

the algorithm credited to euclid for easily finding the greatest common divisor of two integers has broad significance in cryptography. T/F

Answers

True. The Euclidean algorithm, named after the ancient Greek mathematician Euclid, is a method for finding the greatest common divisor (GCD) of two integers.

It has been widely studied and applied in number theory, and has broad significance in various fields of mathematics, including cryptography. In particular, the security of some cryptographic systems, such as RSA, relies on the difficulty of factoring large numbers into their prime factors. The GCD algorithm can be used to efficiently find the prime factors of a given number, which is one of the key steps in factoring.

Therefore, the Euclidean algorithm plays an important role in modern cryptography by enabling secure communication over public channels through the use of techniques such as public key encryption. As a result, the Euclidean algorithm continues to be a fundamental tool in both theoretical and practical aspects of modern cryptography.

Learn more about firewalls here:

https://brainly.com/question/31936515

#SPJ11

Give three examples of the following types of data?
Give three examples for each category in the software domain ?

CCDI :)??

Give three examples of the following types of data?Give three examples for each category in the software
Give three examples of the following types of data?Give three examples for each category in the software

Answers

An example of transactional data are:

Sales ordersPurchase ordersShipping documents

Its software domain are: Personal  meeting, a telephone call, and a Video call

An example of  financial data are: assets, liabilities, and equity. The software are: CORE Banking, Retail Banking, and Private banking

An example of intellectual property data are: books, music, inventions. The software domain are Patents, trademarks, and copyrights

What types of software are used in the financial industry?

Through sales and marketing tools, data-driven contact management, and workflow automation, customer relationship management (CRM) software assists financial services organizations in fostering new relationships and maximizing the value of existing customers.

You can see how your consumers are utilizing your website to complete a transaction by using transaction management software. It may demonstrate both how each website element functions on its own and as a part of the overall technological infrastructure.

Note that Information that is gathered from transactions is referred to as transactional data. It keeps track of the date and location of the transaction, the time it took place, the price ranges of the goods purchased, the mode of payment used, any discounts applied, and other quantities and characteristics related to the transaction.

Learn more about transactional data  from

https://brainly.com/question/28081430
#SPJ1

The rolling movement of the mouse causes a corresponding movement of the ___________ or ______________ on the screen​

Answers

Answer:

cursor or pointer

Explanation:

beacause the main js crom the algorithm

Which security protocol for wireless networks attempts to establish the same security for them as would be present in a wired network?

Answers

The security protocol for wireless networks attempts to establish the same security for them as would be present in a wired network is WEP. The correct option is A.

What is WEP?

Wired Equivalent Privacy (WEP) is a security protocol defined by the IEEE 802.11b Wireless Fidelity (Wi-Fi) standard.

That standard is intended to provide a wireless local area network (WLAN) with security and privacy comparable to that of a wired LAN.

WEP is a wireless network security protocol that attempts to provide the same level of security as a wired network.

Thus, the correct option is A.

For more details regarding WEP, visit:

https://brainly.com/question/13775698

#SPJ4

Your question seems incomplete, the missing options are:

A. WEP

B. WEB

C. WELL

D. WALL

most computers have temporary holding areas called __________.

Answers

Answer:

Random Access Memory (RAM)

RAM (Random access memory)

Write a function called hasadjacentrepeat() that uses loops to determine if any two adjacent numbers in an array are the same. The input argument is an integer precision array called inarray. The output argument is an integer scalar called adjacentrepeat. This value is set to an integer value of 1 if two adjacent values in the array have the same value. Otherwise, this value is set to 0

Answers

Answer:

def hasadjacentrepeat(inarray):

   # Initialize a variable to 0 to indicate that there are no adjacent repeated numbers

   adjacentrepeat = 0

   

   # Loop through the input array, except for the last element

   for i in range(len(inarray)-1):

       # Check if the current element is equal to the next element

       if inarray[i] == inarray[i+1]:

           # If they are equal, set the adjacentrepeat variable to 1 and break out of the loop

           adjacentrepeat = 1

           break

   

   # Return the value of the adjacentrepeat variable, which is 1 if there are adjacent repeated numbers, 0 otherwise

   return adjacentrepeat

Example:

a = [1, 2, 3, 4, 5, 5, 6]

b = [1, 2, 3, 4, 5, 6, 7]

print(hasadjacentrepeat(a)) # Output: 1

print(hasadjacentrepeat(b)) # Output: 0

What should the Product Owner do in the middle of the Sprint, when the Development Team realises they are not able to finish all the Sprint Backlog items?

Answers

The Product Owner plays a critical role in the Scrum process and their responsibilities include ensuring that the Development Team is working on the most valuable work items, prioritizing the Sprint Backlog, and collaborating with stakeholders to gather requirements and feedback.

In the middle of a Sprint, if the Development Team realizes that they are not able to finish all the Sprint Backlog items, the Product Owner should be notified immediately.

It is important for the Product Owner to work closely with the Development Team to determine why they are falling behind and to identify any impediments that may be affecting their progress.
In this situation, the Product Owner may need to adjust the Sprint Backlog by reprioritizing the remaining items or by removing low-priority items altogether.

The Product Owner should work closely with the Development Team to ensure that they can focus on the most valuable work items and to help them manage their workload. If necessary, the Product Owner may need to collaborate with stakeholders to gather feedback on the remaining work items and adjust the Sprint Backlog accordingly.
Overall, the Product Owner should be proactive in responding to any issues that arise during the Sprint and should work closely with the Development Team to ensure that they have everything they need to complete the work on time and to the best of their ability.

This may involve making difficult decisions and trade-offs, but ultimately the goal should be to deliver the most valuable product possible to stakeholders.

Know more about the Product Owner here:

https://brainly.com/question/16412628

#SPJ11

Machine learning systems analyze patterns in data to improve their performance automatically.
True
False

Answers

Note It is TRUE to state that Machine learning systems analyze patterns in data to improve their performance automatically.

What is a Machine learning System?

Machine learning is a branch of artificial intelligence that is widely described as a machine's capacity to mimic intelligent human behavior. Artificial intelligence systems are used to do complicated tasks in a manner comparable to how people solve issues.

There are three forms of machine learning: supervised, unsupervised, and reinforcement learning.

Machine learning is used in search engines, email filters to filter out spam, websites to create personalized recommendations, banking software to detect anomalous transactions, and many apps on mobile phones, such as voice recognition.

Learn more about Machine Learning Systems:
https://brainly.com/question/28470561
#SPJ1


Give three code examples of how to increment the integer j by 1.

Answers

Answer:

(This is for Javascript)

j++;

j + = 1;

j = j + 1;

RIGHT ANSWER GETS BRAINLEST

Complete the code.

You are writing a loop to allow the user to enter data until they enter a "Q". You want to allow them to enter an upper- or lowercase "Q".

if yourTeam.
() == "q":
break


The options they give are:
Upper
Compare
lower

Answers

Answer:

sir i beleive lower is your answer, i know it isnt upper.

Explanation:

:D

Answer:

lower

Explanation:

i just did the quiz and got it right :)

Can someone help me out

Can someone help me out

Answers

Answer:

what is the question I dont now what to put if I don't know the information

Of the seven types of normal forms, how many are considered the most critical for creating a working database?
A. 5
B. 3
C. 2
D. 4

Answers

Answer:3

Explanation:

(101101+10110) /110
101101-11001/101 please I need help

Answers

Answer:

000000000000000000000000000001111111111111111111

Made from zinc and copper, brass has been manufactured for thousands of years. It is used in weapons, pipes, musical instruments, and many other important ways. Which of these words best describes brass?.

Answers

Brass has been manufactured for thousands of years and has a wide range of uses, including in weapons, pipes, musical instruments, and many other important applications.

It is known for its strength, durability, and corrosion resistance, as well as its ability to be molded, shaped, and worked into a variety of different forms.

What is Brass?

Brass is a metallic alloy. An alloy is a mixture of two or more elements, at least one of which is a metal. Alloys are typically made by combining different metals in specific proportions to create materials with specific properties and characteristics. Brass is an example of an alloy that is made from the metals zinc and copper.

To learn more about corrosion resistance, visit: https://brainly.com/question/13926854

#SPJ4

which expression references the data member suit within an object that is stored in position win (an integer variable) of the variable my deck, which is a one-dimensional array of objects?

Answers

my_deck[win].suit

option 1:-> it is not used in member calling

option 3: Here the positin variable is not opting

option 4:Suit is not an object

double result = 0.0;  for (int i = 0; i < 20; i++) {    result += all_registers[i].get_total(); }

new_month > 0 && new_month < 13

Other options are not checking new_month variable individually.

you can learn more through link below:

https://brainly.com/question/19585043#SPJ4

the comments down bellow are wrong

Answers

Answer:

What Do U mean

Explanation:

what do you mean by that?

many people shop online. Dicuss the benefits and drawbacks to the customer of shopping online.

Answers

Answer:

Explanation:

Shopping online has become increasingly popular in recent years due to the convenience it offers. There are several benefits and drawbacks to shopping online for customers.

Benefits:

Convenience: Online shopping allows customers to shop from the comfort of their own home, eliminating the need to travel to a physical store.

Time-saving: Online shopping saves time, as customers can easily find and purchase products without having to navigate through crowded stores or wait in long checkout lines.

Access to a wider variety of products: Online shopping provides customers with access to a wider variety of products, including rare and hard-to-find items.

Better prices: Online retailers often offer lower prices than physical stores due to lower overhead costs.

Easy price comparison: Customers can easily compare prices of similar products from different retailers, which helps them make informed purchasing decisions.

Drawbacks:

Unable to see or touch the product before purchasing: Customers cannot physically examine the product before purchasing, which may result in receiving a product that is different from what they expected.

Delivery delays: Delivery times may vary and sometimes take longer than expected.

Shipping costs: Shipping costs can add up, especially for larger and heavier items.

Risk of online fraud: There is a risk of online fraud, such as stolen credit card information or identity theft.

Lack of personal interaction: Online shopping lacks the personal interaction that customers may receive in physical stores, such as the ability to ask questions or receive recommendations from sales associates.

Benefits of Online Shopping:


1. Greater Selection: Online shopping allows customers to access a wider range of products than they might find in a physical store. This is particularly true for niche or specialty products that might not be available locally.

2. Competitive Pricing: Online retailers often offer lower prices than physical stores, due to lower overhead costs. Customers can also easily compare prices across different retailers to find the best deal.


Drawbacks of Online Shopping:


1. Shipping Costs: Depending on the retailer and the product, shipping costs can add a significant amount to the total cost of a purchase.

2. Delayed Gratification: Unlike physical stores, where customers can take their purchases home immediately, online shopping often requires a waiting period for shipping.

How are the waterfall and agile methods of software development similar?

Answers

The waterfall and agile methods of software development are similar in that they both aim to develop software in an organized and efficient manner. However, they differ in the approach they take to achieve this goal.

The waterfall method is a linear, sequential method of software development. It follows a defined process with distinct phases, such as requirements gathering, design, implementation, testing, and maintenance. Each phase must be completed before the next phase can begin, and changes to the software are not allowed once a phase is completed.

On the other hand, Agile method is an iterative and incremental approach to software development. It emphasizes on flexibility, collaboration, and customer satisfaction. Agile method encourages regular inspection and adaptation, allowing for changes and improvements to be made throughout the development process. Agile methodologies, such as Scrum and Kanban, follow an incremental approach, where the software is developed in small chunks called iterations or sprints.

Both Waterfall and Agile approach have their own advantages and disadvantages and are suitable for different types of projects and teams. It is important to choose a method that aligns with the specific needs and goals of the project and the team.

1. (A+B)(B'+C)(C+A)
2. A'B'C'
3. (X+Y)(X'+Z)(Y+Z)
4. A'B'C'+A'BC'+A'BC+ABC'

Answers

you need to put your question

which of the following is a limited and non-gui version of windows based on windows 10 technologies that can be used for installing, troubleshooting, and repairing windows 10?

Answers

The option that is limited and non-gui version of windows based on windows 10 technologies that can be used for installing, troubleshooting, and repairing windows 10 is known to be option a. Windows PE/.

What is Windows PE used for?

Windows PE (WinPE) is known to be a term that connote  a little form of an operating system.

It is known to be one that is often used to install, deploy, as well as been used to repair Windows desktop editions, Windows Server, and other kinds of Windows operating systems.

Note that with the use of the Windows PE, a person can be able to Set up their hard drive before they can install the  Windows.

Therefore, based on the above, The option that is limited and non-gui version of windows based on windows 10 technologies that can be used for installing, troubleshooting, and repairing windows 10 is known to be option a. Windows PE/.

Learn more about Windows PE from

https://brainly.com/question/14297547

#SPJ1

Which of the following is a limited and non-GUI version of Windows based on Windows 10 technologies that can be used for installing, troubleshooting, and repairing Windows 10?

a. Windows PE

b. WAIK

c. USMT

d. DISM

Which of the following statements is correct?
A> none of these
B. O Today's cloud-based servers no longer need CPU. IBM Watson would be a good example. C. Data centers to store cloud-based data will soon be obsolete because if the increased in computer
performance and storage
D.• Some argue that the desktop computer will be obsolete in the near future.

Answers

D. Some argue that the desktop computer will be obsolete shortly.

Among the given statements, the correct one is D. Some argue that the desktop computer will be obsolete shortly.

This statement reflects the views of some individuals who believe that desktop computers, which individuals traditionally use for personal computing tasks, will become less prevalent or obsolete in the coming years. With advancements in technology, the rise of mobile devices such as laptops, tablets, and smartphones, and the increasing popularity of cloud computing, there is a perception that desktop computers may no longer be the primary computing device for most people.

However, it's important to note that this statement represents a perspective or opinion and is not an absolute fact. The relevance and future of desktop computers will depend on various factors, including evolving user needs, technological advancements, and market trends.

To learn briefly about the computer: https://brainly.com/question/24540334

#SPJ11

What are Storage Units of a computer?​

Answers

Answer:

Storage units of a computer are places where read-only memory (ROM) or stored memory are kept in parts of 1 and 0 (bits) and these are the only language alphabets for computers.

Explanation:

Everything in a computer is stored as 1s and 0s. A single 1 or a single 0 in a computer is called a 'bit'. If we store a character in a computer it takes eight 1s and 0s, so we might say it takes eight bits to store a character.

Imagine you had to write a 1000 word essay. If we assume that each word has an average of five letters, we can do a rough calculation to work out how many bits it would take to store the essay.

If each letter takes eight bits to store and we have five letters in a word then each word would take forty bits to store.

If we have 1000 words then we would need to multiply 1000 by 40 which gives us 40,000 bits. We would also have to store the spaces between words (a space uses the ASCII code 32). This will of course, add more bits to this number.

The number of bits (1s and 0s) that we store in a computer adds up very quickly. Remember too that pictures and videos are stored as 1s and 0s and these take many, many bits to store. If you had a video on your computer you might look at the size of it and see that it was made up of 1,258,291,200 bits. Clearly this is a large number and so thankfully we can convert this to other units that make it easier to work with.

As already stated above, a single 1 or a single 0 in a computer is called a bit. The next unit up is called a byte and a byte is 8 bits together.

Give 5 star and Brainliest if it is good.

what job titles describes a person with green engery? in career clusters

Answers

Answer:

environmental scientist

Explanation:

Other Questions
how can bohm's theory be viewed as a modal interpretation? how does bohm's theory address the measurement problem? the fragment of the antibody molecule that binds to phagocytes when antibodies opsonize an antigen is the checks can be forged by several methods: free-hand forgeries, photocopies of legit- imate signatures, and obtaining access to an automatic check- signing mechanism. what are some controls an organization could institute to minimize the chance that a forgery will occur? the measures of a pair of supplementary angles are in the ratio of $7:2$. how many degrees are in the measure of their positive difference? When giving a survey, data:A. will only be numbers based.B. will primarily be qualitative.C. can yield numbers and descriptions.D. Can only be descriptive. A prominent part of the reward pathway of the brain is the _______, located at the base of the frontal lobe. a) locus coeruleus b) suprachiasmatic nucleus c) nucleus accumbens d) reticular formation Some gram-negative prokaryotes adhere to surfaces and exchange genetic information using relatively short hairlike structures called ________ A successful manager with a background in sales and retail merchandising will be speaking. What part of a persuasive analysis is this? GIVING BRAINLIEST -60 points-Answer 1, 2, 3 & 4 for brainliest. Point H is the incenter of ABC . Find the measure.BD Which word from Paragraph 1 gives the BEST clue to the meaning of bas relief? A.words B.carved C.heavy D. Determine if the graph represents a system that is Parallel, Perpendicular, or Neither. Internal Control - is a process designed to provide reasonable assurance regarding the achievement of company objectives related to operations, reporting, and compliance. Mention and explain the Five Primary Components of internal control. StudenA football coach walks 18 meters westward, then 12 meterseastward, then 28 meters westward, and finally 14 meterseastward.GuLeWizProgres Select the correct answer.A doctor observes areas of pink scaly skin on a patient. Diagnosis reveals a white blood cell abnormality. Which disorder is the patient likely to be suffering from?A. psoriasisB. acne vulgarisC. impetigoD. wartsE. eczema The future value of a $10,000 annuity deposited at 12 percent compounded annually for each of next 5 years is: (Round to the nearest whole dollar) Japanese and American salespersons are surprisingly similar except for one difference thatJapanese rate as more important than their American counterparts. Identify this difference.job securitypromotionjob satisfactionsocial recognitionpersonal growth and development A football team had 55 players at the start of the season This key to species in the family Bittacidae has some good and bad qualities. Describe 3 positives and 3 negatives of this key. Don't copy and paste sections of the key. Explain why those things are positive or negative. I'm trying to actually understand why something is good or bad in this specific key. (not about keys in general) Describe 2 specific improvements that could be made to this key. Key to the species of Bittacidae (Hangingflies) of Illinois 1. Apices of wings dark brown and held out to the sides while at rest.......... Hylobittacus apicalis 1'. Apices of wings without dark brown spot; wings folded over back while at rest ... (genus Bittacus)...2 2 (1). Apical crossveins present 3 4 ---------.. mm-======================= . Bittacus punctiger B. pilicornis 2'. Apical grossveins absent..... 3 (2). Hind femora with brown spots surrounding base of setae. 3'. Hind femora lacking brown spots surrounding set.................. 4 (2). Subcostal crossvein, distal to the first fork of the radial sector. 4'. Subcostal crossvein basal to the first fork of the radial sector... 5 (4). Wing membranes colorless; grossveins margined.......... .B. occidentis .5 B. strigasus 5'. Wing membranes yellow to amber; crossveins not margined; in males, the lobes of the ninth tergum each bear two medial prominences bearing several black spin................ B. stigmaterus 5". Wing color brown to dark brown; crossveins not margined; in males, the lobes of the ninth tergum bear one medial prominence bearing several black spines......... B. texanus What human rights might Mr. Zimmermanclaim are being violated by the shoplifting?