Make five E-learning questions
make any five questions in your own words

Answers

Answer 1

Five e-learning or online learning questions are:

When did e-learning develop?What are the strategies for e-learning?What are the advantages of e-learning?What are the demerits of e-learning?Is e-learning the same as traditional learning?

What is E-Learning?

E-learning is a learning approach that is based on formalized instruction but uses electronic resources. While education can take place in or out of the classroom, computers and the Internet are the primary components of E-learning.

Online learning assists students in developing and communicating new ideas. Aside from school, you have the opportunity to improve your talents and gain information. One of the most important aspects of e-learning is that it assists students and teachers in developing advanced abilities.

The following are the benefits of online courses:

Online classes are practical.Online classes provide convenience.Online courses deliver education to your doorstep. Online courses provide more personalized attention.Online classes allow you to meet new individuals.Online courses provide you with real-world skills.

Learn more about E-Learning:
https://brainly.com/question/2014724
#SPJ1


Related Questions

Explain how I can clear my site suggestions in the chrome app

Answers

Open the Chrome browser on your Android device, pick "Bookmarks" from the menu by pressing the "Menu" button. Tap and hold the bookmark you want to delete once the list of bookmark thumbnails shows.

What are site suggestions?

As users enter keywords in a search field, suggested queries show up in a menu. As users write each letter of their search, a list of suggestions that display below the search box are updated.

On your Android device, launch the Chrome browser, then select "Bookmarks" from the menu by clicking the "Menu" icon.

Once the list of bookmark thumbnails appears, tap and hold the bookmark you want to delete.

Open Chrome on your iPhone or iPad to disable link previews.Click on More Settings.Look for and select Content Settings.Disable Show Link Previews.

Thus, this way, one can clear site suggestions in the chrome app.

For more details regarding server, visit:

https://brainly.com/question/30168195

#SPJ1

The transmit power of a TV satellite is 40 W and the diameter of the parabolic antenna at the transmit antenna is 80 cm. The diameter of the parabolic antenna at the receiver is 120 cm. Distance from the satellite to the earth is 40 000 km, frequency is 11.5 GHz. Given that both antenna efficiencies are equal to nt = nr = 0.7, how many dBm is the signal received by the receive antenna? (Hint the antenna aperture of a parabolic antenna with diameter D is given by
(pi × D^2 )/4​

Answers

Answer:

Explanation:

.

I don’t know the answer I’m sorry maybe nextime

Is information technology the most recent subfield of the quantitative perspective?

Answers

No, information technology is not the most recent subfield of the quantitative perspective. Quantitative perspectives are concerned with the measurement and analysis of data, often using mathematical or statistical methods.

What is Quantitative ?

Quantitative in computer science is the use of mathematical and statistical methods to analyze data, identify trends, and develop models to solve problems. It is heavily used in artificial intelligence, machine learning, and data mining. Quantitative methods involve the application of mathematical equations to data in order to identify patterns, trends, and correlations. Data analysis, machine learning, and predictive analytics are all forms of quantitative analysis.

Quantitative research has been around for centuries and is one of the most commonly used research methods in the social sciences. The most recent subfields of the quantitative perspective include machine learning, artificial intelligence, and big data analytics.

To learn more about Quantitative
https://brainly.com/question/30458251
#SPJ1

TRUE/FALSE. the vulnerability database is an essential part of effective remediation because it helps organizations keep track of specific vulnerabilities as they are reported and remediated.

Answers

TRUE

The vulnerability database is an essential part of effective remediation because it helps organizations keep track of specific vulnerabilities as they are reported and remediated.

Vulnerability remediation is essential in a world of ever-evolving cyber threats. Successful vulnerability remediation enables organizations to prioritize and address critical issues on a continuous basis, closing gaps that could facilitate cyber attacks. These solutions take the legwork out of implementing and managing vulnerability remediation and help IT security teams gain the most insight from their vulnerability data.

To know more about vulnerability database: https://brainly.com/question/20218029?referrer=searchResults

#SPJ4

user intent refers to what the user was trying to accomplish by issuing the query

Answers

Answer:

: User intent is a major factor in search engine optimisation and conversation optimisation. Most of them talk about customer intent ,however is focused on SEO not CRO

Explanation:

12. What was the trade Howard offered to Death?​

Answers

Answer:

His life

Explanation:

Sites like Zillow get input about house prices from a database and provide nice summaries for readers. Write a program with two inputs, current price and last month's price (both integers). Then, output a summary listing the price, the change since last month, and the estimated monthly mortgage computed as (currentPrice * 0.051) / 12 (Note: Output directly. Do not store in a variable.). Ex: If the input is: 200000 210000 the output is:
This house is $200000.
The change is $-10000 since last month.
The estimated monthly mortgage is $850.0.

Answers

Answer:

The program in Python is as follows:

currentPrice = int(input("Current: "))

lastMonth = int(input("Last Month: "))

print("The house is $",currentPrice)

print("The change is $",(currentPrice-lastMonth),"since last month")

print("The estimated monthly mortgage is $",(currentPrice * 0.051) / 12)

Explanation:

Get input for current price

currentPrice = int(input("Current: "))

Get input for last month price

lastMonth = int(input("Last Month: "))

Print current price

print("The house is $",currentPrice)

Print change since last month

print("The change is $",(currentPrice-lastMonth),"since last month")

Print mortgage

print("The estimated monthly mortgage is $",(currentPrice * 0.051) / 12)

A hard disk drive has 10 surfaces, 10240 tracks per surface, and 512 sectors per track. Sector size is 4 KB. The drive head traverses 1280 track/ms and the spindle spins at 5400 r.p.m.
(a) What is the total capacity of hard disk drive (in GB)?
(b) What is the physical address of the sector whose logical block address (LBA) is 2312349 ?
(c) What is the longest time needed to read an arbitrary sector located anywhere on the disk?

Answers

(a) The total capacity of the hard disk drive is 10 surfaces * 10240 tracks/surface * 512 sectors/track * 4 KB/sector = 204800 MB = 200 GB.

What is the physical address of the sector?

(b) The physical address of the sector with LBA 2312349 is calculated as: surface = LBA/(trackssectors) = 2312349/(10240512) = 4; track = (LBA%(trackssectors))/sectors = (2312349%(10240512))/512 = 2512; sector = LBA%sectors = 2312349%512 = 85.

So, it's (4, 2512, 85).

(c) The longest time to read an arbitrary sector is from the outermost track to the innermost track (10240 tracks) at 1280 track/ms speed, plus one full rotation at 5400 RPM: (10240/1280) ms + (60/5400) s = 8 ms + 11.11 ms = 19.11 ms.

Read more about block address here:

https://brainly.com/question/14183962

#SPJ1

Complete the sentence about bias and equity.
There is a lack of
in the field of computer science.

Answers

Answer:

diversity

Explanation:

Complete the sentence about bias and equity.

There is a lack of  

diversity

in the field of computer science.

got it right

Answer:Below

Explanation:

Complete the sentence about bias and equity.There is a lack of in the field of computer science.

Do any of these algorithms (Random Allocation, Round-Robin, Weighted Round-Robin, Round-Robin DNS Load Balancing, and Least Connections) compromise security?

Answers

Answer:

yes and

Explanation:

why do you need to know about a buildings security are you going to rob it ???

list the field in the tcp header that are missing from udp header

Answers

Answer:

Sequence number, acknowledgement number, data offset, res, flags, window size, checksum, urgent pointer, options.

Explanation:

Check out the picture for details. "Missing" is not really the right term, since UDP has a different purpose than TCP. TCP needs these headers to form a connection oriented protocol, whereas UDP is a fire-and-forget type of packet transfer.

list the field in the tcp header that are missing from udp header

Before you post anything online what are at least 5 things you should keep in mind?

Answers

The audience or target
Your status quo- your personality
The kind of feedback or engagements you want
The regulation of the social site or app
The reason behind the post

discuss MIS as a technology based solution must address all the requirements across any
structure of the organization. This means particularly there are information to be
shared along the organization

Answers

MIS stands for Management Information System, which is a technology-based solution that assists organizations in making strategic decisions. It aids in the efficient organization of information, making it easier to locate, track, and manage. MIS is an essential tool that assists in the streamlining of an organization's operations, resulting in increased productivity and reduced costs.

It is critical for an MIS system to address the needs of any organization's structure. This implies that the information gathered through the MIS should be easily accessible to all levels of the organization. It must be capable of handling a wide range of activities and functions, including financial and accounting data, human resources, production, and inventory management.MIS systems must be scalable to meet the needs of a company as it expands.

The information stored in an MIS should be able to be shared across the organization, from the highest to the lowest level. This feature allows for smooth communication and collaboration among departments and employees, which leads to better decision-making and increased productivity.

Furthermore, MIS systems must provide a comprehensive overview of a company's operations. This implies that it must be capable of tracking and recording all relevant information. It should provide a real-time picture of the company's performance by gathering and analyzing data from a variety of sources. As a result, businesses can take quick action to resolve problems and capitalize on opportunities.

For more such questions on Management Information System, click on:

https://brainly.com/question/14688347

#SPJ8

I need help solving this, please. (Do not know if this is allowed but I definitely need help.)

You work as an IT manager for Bower Industries, a Web hosting company that provides off-site Web hosting for online businesses. Your current service level agreement promises customers 24/7 server availability; however, in the unlikely event of a server outage, you need to gauge the economic impact.

Based on your current user base, you estimate a cost of $1,500 an hour in customer refunds if an outage were to occur.

Your assistant has attempted to create a one-variable data table to estimate further the economic impact of outages between one and five hours in length.
Unfortunately, the one-variable data table is not returning the correct results due to an error in the input values.

You will correct the error and add existing range names to the Total Cost for Outage formula.

Finally, you will create a custom number format for cell E3.

Open e06d1NetworkOutage and save it as e06d1NetworkOutage_LastFirst.

Delete the inaccurate values in the range E4:E12.

Apply the pre-existing range names to the worksheet.

Enter a reference to the Total Cost for Outage (cell B6) in cell E3.

Create a one-variable data table to detail the sensitivity of expense based on an outage range of one to five hours based on half-hour increments.

Add a Custom number format to cell E3 to display the word Cost.

Create a footer with your name, the sheet name code, and the file name code.
Save and close the file. Submit e06d1NetworkOutage_LastFirst.

I need help solving this, please. (Do not know if this is allowed but I definitely need help.)You work

Answers

Answer:

hi sorry, this is excel right?

Explanation:

 

What characteristics are common among operating systems

Answers

The characteristics are common among operating systems are User Interface,Memory Management,File System,Process Management,Device Management,Security and Networking.

Operating systems share several common characteristics regardless of their specific implementation or purpose. These characteristics are fundamental to their functionality and enable them to manage computer hardware and software effectively.

1. User Interface: Operating systems provide a user interface that allows users to interact with the computer system. This can be in the form of a command line interface (CLI) or a graphical user interface (GUI).

2. Memory Management: Operating systems handle memory allocation and deallocation to ensure efficient utilization of system resources. They manage virtual memory, cache, and provide memory protection to prevent unauthorized access.

3. File System: Operating systems organize and manage files and directories on storage devices. They provide methods for file creation, deletion, and manipulation, as well as file access control and security.

4. Process Management: Operating systems handle the execution and scheduling of processes or tasks. They allocate system resources, such as CPU time and memory, and ensure fair and efficient utilization among different processes.

5. Device Management: Operating systems control and manage peripheral devices such as printers, keyboards, and network interfaces. They provide device drivers and protocols for communication between the hardware and software.

6. Security: Operating systems implement security measures to protect the system and user data from unauthorized access, viruses, and other threats.

This includes user authentication, access control mechanisms, and encryption.

7. Networking: Operating systems facilitate network communication by providing networking protocols and services. They enable applications to connect and exchange data over local and wide-area networks.

These characteristics form the foundation of operating systems and enable them to provide a stable and efficient environment for users and applications to run on a computer system.

For more such questions characteristics,click on

https://brainly.com/question/30995425

#SPJ8

Write a program to repeatedly read integers from the standard input until it reads "-1" and exits. For each number before "-1," if it is positive and odd, do the following:

Answers

Answer:

#include <stdio.h>  

int main() {  

int p=0, n=0, z=0, inp=0;  

printf("How do I write a C program to read numbers until -1 "  

 "is encountered and also count the number of positive, negative, "  

 "zeroes encountered by users using a while loop?\n\n\n");  

printf("Enter an integer  (-1 to quit): ");  

scanf("%d",&inp);  

while(inp != -1) {  

 if(inp > 0) p++;  

 else if(inp < 0) n++;  

 else z++;  

 printf("\nEnter next integer (-1 to quit): ");  

 scanf("%d",&inp);  

}  

n++; /* -1 is also a -ve number */  

printf("You have entered ...\n");  

printf("\t\tPositive numbers: %d\n",p);  

printf("\t\tNegative numbers: %d\n",n);  

printf("\t\t          Zeroes: %d\n",z);  

}

Explanation:

Managers can use __ software to discuss financial performance with the help of slides and charts

Managers can use __ software to discuss financial performance with the help of slides and charts

Answers

Answer:

presentation

Explanation:

Software like Google Slides and Microsoft Powerpoint can be utilized to present financial performances through the use of slides and charts.

Question:
Draw flowchart diagram for the following
programs using loop.
A) A program that display number 1 to 202

Answers

CLS
C=1
FOR I = 1 TO 202
PRINT C
C=C+1
NEXT I
END

What is the output of the following code snippet if the variable named cost contains 100? if cost < 70 or cost > 150 : discount = 0.8 * cost else : discount = cost print("Your cost is ", discount)

Answers

Answer:

The output is: Your cost is  100

Explanation:

Given

The above code snippet

and

\(cost = 100\)

Required

Determine the output of the code

if cost < 70 or cost > 150

The above condition checks if cost is less than 70 or cost is greater than 150

This condition is false because 100 is neither less than 70 nor is it greater than 150

So, the else statement will be executed.

discount = cost

Which means

discount = 100

So, the print instruction will print: Your cost is  100

Current Tetra Shillings user accounts are management from the company's on-premises Active Directory. Tetra Shillings employees sign-in into the company network using their Active Directory username and password.

Answers

Employees log into the corporate network using their Active Directory login credentials, which are maintained by Tetra Shillings' on-premises Active Directory.

Which collection of Azure Active Directory features allows businesses to secure and manage any external user, including clients and partners?

Customers, partners, and other external users can all be secured and managed by enterprises using a set of tools called external identities. External Identities expands on B2B collaboration by giving you new options to communicate and collaborate with users outside of your company.

What are the three activities that Azure Active Directory Azure AD identity protection can be used for?

Three crucial duties are made possible for businesses by identity protection: Automate the identification and elimination of threats based on identity. Use the portal's data to research dangers.

To know more about network visit:-

https://brainly.com/question/14276789

#SPJ1

Which of the following would be considered software? Select 2 options.
memory
printer
operating system
central processing unit (CPU)
Microsoft Office suite (Word, Excel, PowerPoint, etc.)
Thing

Answers

Answer:

Microsoft Office suite (Word, Excel, PowerPoint, etc.), and thing

Explanation:

The Operating system and Microsoft Office suite will be considered as software.

A Software is the opposite of Hardware in a computer system.

Let understand that Software means some set of instructions or programs on a computer which are used for operation and execution of specific tasks.

There are different type of software and they include:

Application Software are software installed into the system to perform function on the computer E.g. Chrome.System Software is the software designed to provide platform for other software installed on the computer. Eg. Microsoft OS. Firmware refers to set of instructions programmed on a hardware device such as External CD Rom.

In conclusion, the Operating system is a system software while the Microsoft Office suite is an application software.

Learn more about Software here

brainly.com/question/1022352

Question 1 of 25
Which hardware device uses abstraction to allow a user to navigate within a
computer interface?
A. Headphones
B. Cables
C. Mouse
D. Memory card

Answers

Answer:

mouse

Explanation:

b) Write and run a program that will produce the following results (3 pts)

Square Cube
1 1 1
3 9 27
5 25 125
7 49 343
9 81 729


Answers

Answer:

print("Square Cube")

for i in range(1, 10, 2):

   print(f"{i} {i**2} {i**3}")

Explanation:

The main issues covered by IT law are: Hardware licensing Data privacy Department security True False

Answers

The main issues covered by IT law are: Hardware licensing, Data privacy, Department security is a true statement.

What topics are addressed by cyber law?

There are three main types of cyberlaw:

Human-targeted crimes (e.g.: harassment, stalking, identity theft) Vandalism of property (e.g.: DDOS attacks, hacking, copyright infringement) The theft from the govt (e.g.: hacking, cyber terrorism)

Cyber law includes provisions for intellectual property, contracts, jurisdiction, data protection regulations, privacy, and freedom of expression. It regulates the online dissemination of software, knowledge, online safety, and e-commerce.

Note that some Internet security issues that must be considered are:

Ransomware Attacks. IoT Attacks. Cloud Attacks. Phishing Attacks.Software Vulnerabilities, etc.

Learn more about IT law from

https://brainly.com/question/9928756
#SPJ1  

What is open source software? ​

Answers

Answer:

Open source software is free, modifiable, and is able to be redistributed. It is beneficial to those wanting  to customize the software to suit their purposes as it can be easily shared and redistributed.

You must give careful consideration before adding text to a placeholder because once text has been entered into a placeholder, the placeholder cannot be deleted.

True
False

Answers

False is your answer.

Using your knowledge of classes, arrays, and array list, write the Java code for the UML above in NetBeans. [7 marks]​

Answers

The Java code for the TestElection class that does the tasks is

java

import javax.swing.JOptionPane;

public class TestElection {

   public static void main(String[] args) {

       // Declare an array to store objects of the Election class

       int length = Integer.parseInt(JOptionPane.showInputDialog("Enter the number of candidates:"));

       Election[] candidates = new Election[length];

       // Request values from the user to initialize the instance variables of Election objects and assign these objects to the array

       for (int i = 0; i < length; i++) {

           String name = JOptionPane.showInputDialog("Enter the name of candidate " + (i + 1) + ":");

           int votes = Integer.parseInt(JOptionPane.showInputDialog("Enter the number of votes for candidate " + (i + 1) + ":"));

           candidates[i] = new Election(name, votes);

       }

       // Determine the total number of votes

       int totalVotes = 0;

       for (Election candidate : candidates) {

           totalVotes += candidate.getVotes();

       }

       // Determine the percentage of the total votes received by each candidate and the winner of the election

       String winner = "";

       double maxPercentage = 0.0;

       for (Election candidate : candidates) {

           double percentage = (double) candidate.getVotes() / totalVotes * 100;

           System.out.println(candidate.getName() + " received " + candidate.getVotes() + " votes (" + percentage + "%)");

           if (percentage > maxPercentage) {

               maxPercentage = percentage;

               winner = candidate.getName();

           }

       }

       System.out.println("The winner of the election is " + winner);

   }

}

What is the arrays about?

In the above code, it is talking about a group of things called "candidates" that are being saved in a special place called an "array. " One can ask the user how long they want the list to be using JOptionPane and then make the list that long.

Also based on the code, one can also ask the user to give us information for each Election object in the array, like the name and number of votes they got, using a tool called JOptionPane.

Learn more about  arrays from

https://brainly.com/question/19634243

#SPJ1

Using your knowledge of classes, arrays, and array list, write the Java code for the UML above in NetBeans. [7 marks] Write the Java code for the main method in a class called TestElection to do the following: a) Declare an array to store objects of the class defined by the UML above. Use a method from the JOptionPane class to request the length of the array from the user. [3 marks] b) Use a method from the JOptionPane class to request values from the user to initialize the instance variables of Election objects and assign these objects to the array. The array must be filled. [5 marks] c) Determine the total number of votes and the percentage of the total votes received by each candidate and the winner of the election. The sample output of your program is shown below. Use methods from the System.out stream for your output.

The ________ mouse uses a rolling ball to detect movement and requires regular cleaning to work properly

Question 7 options:

A Mechanical

B Optical

C None of the above

D All of the above

Answers

A. mechanical

The mechanical mouse uses a rolling ball to detect movement and requires regular cleaning to work properly.

Question 2 of 8
The Layer Properties Manager shows you
Select Answer
O All of the layers
O Layer names
O Layer color
O All of these

Answers

The correct answer is All of layers. All of the layers are displayed in the Layer Properties Manager.

What is Layer Properties Manager?

The Layer Properties Manager helps you organize, sort, and group layers, and allows you to work with layer standards, layer key styles, layer filters, layer overrides, and saved layer states. In the Layer Properties Manager you can perform all activities related to layers: Create, rename, and delete layers. Displays a list of the layers in the drawing and their properties. You can add, delete, and rename layers, change their properties, set property overrides in layout viewports, and add layer descriptions.

Layers and Layer Properties:

New Layer ;

Creates a layer with a default name that you can immediately change. The new layer inherits the properties of the currently selected layer in the layer list.

Layer List

Modify the layer properties using the layer list. Click the current setting to change the layer property for the selected layer or group of layers.

Note: The layer list can be filtered and sorted to make it easier to find and select the layers that you want to change.

Sort

Click a column label to sort by that column.

Column Order

Drag a column to a new location in the list to change the column order.

To learn more about layer properties manager refers to;

https://brainly.com/question/21623455

#SPJ1

One type of wire sequence commonly used for ethernet cables is called the ________ sequence

Answers

Answer:

100BaseT

Also called Fast Ethernet

Good luck...

Other Questions
Why did the Meiji Restoration occur?An optional way you may start your response is...The Meiji Restoration occurred because... Roger has lived in his house for a few decades. He's noticed that, when it rains a great deal, the ground near his house appears to be very slow at absorbing the water. But it does appear that, though it takes a long time, the ground has the capacity to hold a great deal of water. What would you say about this ground using your melting point data, what evidence allows you to conclude that your product is trans-9-(2-phenylethenyl)anthracene? Which is given as an explanation for how the Paleozoic supercontinent icecap melted?A. Volcanic eruptions decreased, raising the temperature.B. Carbon dioxide levels decreased, raising the temperature.C. Plants dying off increased the greenhouse effect.D. Plant life turned oxygen into carbon dioxide, increasing thetemperature. Solve this rational equation. PLEASE HELP So can someone explain how the heck does 4 x 4 x 4 = 64?? Cause I keep on getting 12 so like wth?? Question 2 of 10 What kind of rhythmic notes are these? O A. Sixteenth B. Quarter C. Fourth D. Eighth A spinner is spun 400 times.The probabilities it lands on each colour are shown below.The probability it lands on red is the same as the probability it lands on yellow.Colour Red Green Brown YellowProbability 0.14 0.4 How many times would you expect it to land on each colour? Which are usually considered the weakest beats of a measure? preparing to introduce multiplication to his second grade class. He knows that best practice is to introduce more than one method of multiplying numbers in order to promote number sense and encourage mathematical reasoning in his students. Which of the following would be the weakest method to introduce?each math concepts from the concrete to the representational to the abstract.Counting on a hundreds chartimplement an activity relating fractions and decimals to percentages. relied on the advice of a group of intellectuals and social workers. promised to increase government spending. planned to favor business owners. had a detailed plan of what he intended to do. aside from a stand-alone medicare prescription drug plan, how else could a medicare-eligible consumer get part d prescription drug coverage? independent random samples taken at two companies provided the following information regarding annual salaries of the employees. the population standard deviations are also given below. Explain how agriculture leads to a surplus of food. Be sure to define the word surplus in your explanation. Solve the System of equations x = -2 ; y= -3 .(show your work step by step).x+2y = 4 x +y = 1 Write an equation of a hyperbola from the given information. Assume the center of each hyperbola is (0,0) .(Distance from the center of a hyperbola to a focus) =96 ; endpoints of the transverse axis are at (-32, 0) and (32, 0) . Need help asapppppp pls The following transactions occurred during December 31, 2021, for the Microchip Company. 1. On October 1, 2021, Microchip lent $102,500 to another company. A note was signed with principal and 8% interest to be paid on September 30, 2022. 2. On November 1, 2021, the company paid its landlord $4,400 representing rent for the months of November through January. Prepaid rent was debited. 3. On August 1, 2021, collected $8,800 in advance rent from another company that is renting a portion of Microchip's factory. The $8,800 represents one year's rent and the entire amount was credited to deferred rent revenue. 4. Depreciation on office equipment is $3,300 for the year. 5. Vacation pay for the year that had been earned by employees but not paid to them or recorded is $6,800. The company records vacation pay as salaries expense. 6. Microchip began the year with $1,600 in its asset account, supplies. During the year, $5,700 in supplies were purchased and debited to supplies. At year-end, supplies costing $2,850 remain on hand. Required: If Microchip's accountant employed reversing entries for accruals, prepare the adjusting entries at the end of 2021 for only those entries that would be reversed. What is the purpose of the process picture above PLSSSSS HELPPPPPP!!!!!!Gloves required at various departments for workers of a fertilizer factory for amonth are given.Stem Leaf45 0 2 4 5 850 0 5 5 8 965 2 2 2 4 70 0 0 6