which type of ""cookies"" enables a user to stay logged to a site and keeps your shopping cart intact as you click from page to page?

Answers

Answer 1

The type of cookie that enables a user to stay logged in to a site and keeps the shopping cart intact as they navigate from page to page is commonly known as a session cookie or a session identifier cookie.

Cookies are temporary cookies that are stored in the user's browser only for the duration of their browsing session.

They are used to maintain session information, such as login credentials or the contents of a shopping cart, as the user moves through different pages on a website.

Session cookies are typically deleted once the user closes their browser or logs out of the website.

A user logs in to a site, a session cookie is created and associated with their session.

This cookie contains a unique identifier that is used to retrieve the relevant session data stored on the server.

As the user interacts with the site, the session cookie is sent along with each request, allowing the server to recognize the user's session and maintain their logged-in state and shopping cart information.

It's worth noting that session cookies have certain limitations.

They are tied to a specific browsing session and are not persistent, meaning they are not stored on the user's device beyond the current session.

This means that if the user closes their browser or their session expires, the session cookie will be deleted and the user will need to log in again and rebuild their shopping cart.

Websites often combine session cookies with other types of cookies, such as persistent cookies, to provide a more seamless and personalized browsing experience.

Persistent cookies can store information for an extended period, allowing the website to remember user preferences or login information across multiple sessions.

For maintaining a logged-in state and preserving shopping cart contents during a single browsing session, session cookies are typically used.

For similar questions on cookie

https://brainly.com/question/29891690

#SPJ11


Related Questions

what form of communication are they using​

 what form of communication are they using

Answers

Poor communication I would say.

PLEASE ILL GIVE BRAINLIEST IMMEDIATELY
Web Directories use a search engine to gather websites, but then those websites are evaluated, selected and saved to their Internet Library by _______________________________. *
Artificial Intelligence (AI).
UniversICTy of Wisconsin professors.
human editors.
specialists from the Federal Government.

Answers

Answer:

AI

Explanation:

The answer is Artificial intelligence.

The first Web browser that could handle graphics was called which of the following?
a)mosaic
b)bob kahn and vint cerf
c)url
d)all the above

Answers

The first web browser that could handle graphics was called Mosaic. It was developed in 1993 by Marc Andreessen and Eric Bina at the National Center for Supercomputing Applications (NCSA) at the University of Illinois, Urbana-Champaign.

Mosaic was the first browser to display images inline with text instead of requiring users to click on a separate link to view the image. It was also the first browser to offer a graphical user interface and support for multiple operating systems, making it widely accessible to users across different platforms.Mosaic was a game-changer in the early days of the internet and paved the way for the modern web.

Its success led to the development of other web browsers, including Netscape Navigator and Internet Explorer. Today, there are numerous web browsers available for users to choose from, including Chrome, Firefox, Safari, and Edge. Each browser has its unique features and capabilities, but they all owe their existence to Mosaic, the browser that revolutionized the way we access and interact with the internet.

To know more about  Supercomputing Applications visit:

https://brainly.com/question/28484249

#SPJ11

RIGHT ANSWER GETS BRAINLEST

Complete the code.

You are writing a loop to allow the user to enter data until they enter a "Q". You want to allow them to enter an upper- or lowercase "Q".

if yourTeam.
() == "q":
break


The options they give are:
Upper
Compare
lower

Answers

Answer:

sir i beleive lower is your answer, i know it isnt upper.

Explanation:

:D

Answer:

lower

Explanation:

i just did the quiz and got it right :)

which edition of windows server should you consider if you want to run many virtual instances of windows server with hyper-v on the server?

Answers

The edition of window server that should you consider if you want to run many virtual instances of windows server with hyper-v on the server is known as the Windows Server 2016 Datacenter Edition.

What is a Window server?

A window server may be defined as a collection of operating systems that are significantly designed by Microsoft that effectively supports enterprise-level management, data storage, applications, and communications.

If you need Storage Spaces Direct, then only Datacenter Edition can help you. However, Datacenter Edition allows for an unlimited number of running Windows Server instances. For this instance, most people utilize Datacenter Edition for the same features.

Therefore, the Windows Server 2016 Datacenter Edition is the edition of window server that should you consider if you want to run many virtual instances of windows server with hyper-v on the server.

To learn more about Window server, refer to the link:

https://brainly.com/question/14526761

#SPJ1

What is the location of root directory?

Answers

The root directory, also known as the root folder, is the top-most directory in a file system. In most operating systems, the root directory is designated by a forward slash "/".

What is operating systems?

An operating system (OS) is the software that manages the hardware and software resources of a computer. It acts as an intermediary between the user and the computer hardware, providing a platform for running application software. Some common examples of operating systems include Windows, macOS, Linux, and Android.

The root directory, also known as the root folder, is the top-most directory in a file system. In most operating systems, the root directory is designated by a forward slash "/". For example, in Linux, Unix and macOS, the root directory is "/". In Windows, the root directory is usually designated by a backslash "", such as "C:".

In a hierarchical file system, the root directory serves as the starting point for all other directories and files, and all other directories are organized and stored within the root directory.

Learn more about root directory click here:

https://brainly.com/question/14614936

#SPJ4

An apple cake recipe calls for 454 grams of apples and 50 grams of raisins. How many kilograms of fruit are needed to make 12 cakes?

Answers

Answer:

9.08

Explanation:

Because 454 divided by 50 is 9.08

To make the first day on the job easier, you can

Answers

Answer:

How To Prepare For Your First Day At A Job

Research, Research, Research.

Make Contact With Your Manager.

Confirm Your Schedule.

Do A Test Run Of Everything.

Introduce Yourself To The Team Virtually.

Find A Buddy.

Practice Extra Self-Care.

Arrive Early.

Explanation:

pls, help it's urgent... 44 points plsssssssssssssssss

Write an algorithm and Flowchart for reversing a Number eg. N=9486.

Answers

The steps to reverse a number is given below:

The Algorithm

Step 1 Start

step 2 Read a number n

Step 3 a=n/1000

step 4 calculate b=(n%1000)/100

step 5 calculate c= (n%100)/10

step 6 calculate d = n%10

step 7 calculate reverse = a+(b*10)+(c*100)+(d*1000)

step 8 display reverse

step 9 stop

Read more about algorithms here:

https://brainly.com/question/24953880

#SPJ1

Mr. Stevens is the principal of a high school. Why might he want to export data from a database of students’ exam scores?

Answers

Because a database would be accurate and professional

Mr. Stevens might create a presentation using other software on how students' scores have changed throughout a semester.

What are presentation method?

A presentation method is known to be the ways or process that a person uses deliver any kind of presentation.

Note that by creating a presentation using other software on how students' scores have changed throughout a semester, Mr. Stevens can export data from a database of students’ exam scores.

Learn more about database from

https://brainly.com/question/27246719

#SPJ2

which type of attack is wep extremely vulnerable to?

Answers

WEP is extremely vulnerable to a variety of attack types, including cracking, brute-force, IV (Initialization Vector) attack, and replay attack.

What is Initialization Vector?

An Initialization Vector (IV) is a random number used in cryptography that helps to ensure the uniqueness and randomness of data used in an encryption process. The IV is typically used as part of an encryption algorithm, where it is combined with a secret key to encrypt a message. The IV is unique for each encryption session, and must be unpredictable and non-repeating. A good IV should not be reused across multiple encryption sessions, and it should be kept secret from anyone who does not have access to the decryption key. Without a good IV, a cryptographic system can be vulnerable to attacks such as replay attacks, where an attacker can gain access to the system by repeating an encrypted message.

To learn more about Initialization Vector
https://brainly.com/question/27737295
#SPJ4

What do devices provide? A.data to be processed B. Software code C.text and images only D.results of processing.

Answers

A is the correct answer!

you plan to deploy the following azure web apps: webapp1, that uses the .net 6 runtime stack webapp2, that uses the asp.net v4.8 runtime stack webapp3, that uses the java 17 runtime stack webapp4, that uses the php 8.0 runtime stack you need to create the app service plans for the web apps. what is the minimum number of app service plans that should be created?

Answers

Since you need to create the App Service plans for the web apps, the minimum number of App Service plans that must be created is option A-1.

How does Azure webapp work?

Without needing to deploy, set up, and maintain your own Azure VMs, you may create an app in Azure using the platform offered by Azure Web Apps. The ASP.NET, PHP, Node. js, and Python may all be used to create web applications. Additionally, they incorporate well-known coding environments like GitHub and Visual Studio.

Microsoft developed and maintains Azure Web Apps, a platform for hosting websites based on cloud computing. It is a platform as a service that enables the publishing of Web apps using several frameworks and different programming languages, including proprietary ones from Microsoft.

Therefore, You can support up to 10 Web Apps by creating one App Service Plan. Any additional use of the other resources is unnecessary and not specified as a prerequisite.

Learn more about  azure web apps from

https://brainly.com/question/28813133
#SPJ1

See full question below

You plan to deploy the following Azure web apps:

WebApp1, which uses the .NET 5 runtime stack

WebApp2, which uses the ASP.NET V4.8 runtime stack

WebApp3, which uses the Java 11 runtime stack

WebApp4, which uses the PHP 8.0 runtime stack

You need to create the App Service plans for the web apps.

What is the minimum number of App Service plans that must be created?

A-1

B-2

C-3

D-4

Which term refers to pretending to be a computer to work through lines of programming code?code blockingimportingdesk checkingsyntaxing

Answers

The computer programming that enables it to work with the line of programming code has been checking syntaxing.

What is computer programming?

The computer programming is given as the codes in the computer language for the operation of the task or the software program.

The line of programming for the code that enables the computer programming is checking syntaxing Thus, option C is correct.

Learn more about computer programming, here:

https://brainly.com/question/3397678

#SPJ1

Please help!!!
What does the Turtle Graphics Module in Python allow programmers to do?
Display strings on screen
Draw on the screen or create images
Evaluate mathematical equations
Sort a list of information

Answers

Answer:  its Draw on the screen or create images

Explanation: i just to the test and got it right

Importing code to draw on the screen and From the naming of the module itself, Python's Turtle Graphics Module, one can see that the objective of the module is to let python users handle graphics which could be a dot, lines, images or shapes (rectangle, triangle, etc.)

What are the applications of the module?

There are several applications of this module, one of which is: it is useful in designing games. To import the module in your python program, you make use of the following syntax import turtle.

Graphics are defined as a visual representations or patterns on a surface, such as a stone, paper, canvas, wall, or screen, for the sake of education, entertainment, or information. Line, shape, color, texture, type, space, and image are the seven foundational components of graphic design.

Turtle Graphics has been defined as the Python module that is already installed and gives users a virtual canvas on which to draw shapes and images. A fantastic technique just to expose children to coding just through turtle visuals. Little ones may construct and change while learning using quick programs that only have five to ten lines of code.

Therefore,  Python's Turtle Graphics Module, one can see that the objective of the module is to let python users handle graphics.

Learn more about graphics on:

https://brainly.com/question/14191900

#SPJ3

the meaning of perfect reproduction when referring to digital information

Answers

Perfect reproduction in the context of digital information refers to the ability to replicate the original data exactly, without any loss of information or degradation in quality.

Digital information, such as images, audio files, or documents, is typically stored in binary code - a series of 0s and 1s that represent the data. When this information is copied or transmitted, there is a risk of errors or loss of information due to factors such as data corruption, compression, or interference.

In the context of digital information, perfect reproduction means that the data can be copied, transferred, or stored without any loss or degradation in quality.

To know more about Digital information visit:-

https://brainly.com/question/30744364

#SPJ11

100% pl…View the full answer
answer image blur
Transcribed image text: Convert the following Pseudo-code to actual coding in any of your preferred programming Language (C/C++/Java will be preferable from my side!) Declare variables named as i, j, r, c, VAL Print "Enter the value ofr: " Input a positive integer from the terminal and set it as the value of r Print "Enter the value of c: " Input a positive integer from the terminal and set it as the value of c Declare a 2D matrix named as CM using 2D array such that its dimension will be r x c Input an integer number (>0) for each cell of CM from terminal and store it into the 2D array Print the whole 2D matrix CM Set VAL to CM[0][0] Set both i and j to 0 While i doesn't get equal to r minus 1 OR j doesn't get equal to c minus 1 Print "(i, j) →" // i means the value of i and j means the value of j If i is less than r minus 1 and j is less than c minus 1 If CM[i][j+1] is less than or equal to CM[i+1][j], then increment j by 1 only Else increment i by 1 only Else if i equals to r minus 1, then increment j by 1 only Else increment i by 1 only Print "(i, j)" // i means the value of i and j means the value of j Increment VAL by CM[i][j] Print a newline Print the last updated value of VAL The above Pseudo-code gives solution to of one of the well-known problems we have discussed in this course. Can you guess which problem it is? Also, can you say to which approach the above Pseudo-code does indicate? Is it Dynamic Programming or Greedy? Justify your answer with proper short explanation.

Answers

The following is the solution to the provided Pseudo code in C++ programming language. As for which problem this Pseudo code gives a solution for, it is the problem of finding the path with minimum weight in a matrix from its top-left corner to its bottom-right corner, known as the Minimum Path Sum problem.The above Pseudo code shows the Greedy approach of solving the Minimum Path Sum problem. This is because at each cell of the matrix, it always picks the minimum of the right and down cell and moves there, instead of keeping track of all paths and comparing them, which would be the Dynamic Programming approach. Hence, it does not require to store all the sub-problem solutions in a table but instead makes a decision by selecting the locally optimal solution available at each stage. Therefore, we can conclude that the above Pseudo code does indicate the Greedy approach to the Minimum Path Sum problem in computer programming.Explanation:After receiving input of the dimensions of the matrix and the matrix itself, the Pseudo code declares a variable VAL and initializes it with the first cell value of the matrix. It then uses a while loop to iterate through the matrix till it reaches its bottom-right corner. At each cell, it checks if it can only move to the right or down, and then it moves in the direction of the minimum value. VAL is then updated by adding the value of the current cell to it.After the loop is exited, the last updated value of VAL is printed, which is the minimum path sum value.

Learn more about Pseudo code here:

https://brainly.com/question/21319366

#SPJ11

What will you see on the next line? >>> int(6.5)

Answers

Answer:

6

Explanation:

The int functions founds down to the nearest whole number, which in this case would be 6.

Answer:

6

Explanation:

You have just plugged a USB hard drive into an older laptop and the disk has not appeared as available. You are concerned that the hard disk hardware has not been recognized by the computer. What utility would you use to verify??

Answers

Answer:

Device Manager and Disk Management

Explanation:

There are two main utilities that can be used to solve this problem. The main one being device manager. This utility will show you any and all devices connected to the computer. This includes USB hard drives. If it is detected and has a driver installed it will show up in Device Manager. From here you can also change the drivers, disable/enable it, etc. If the device is not listed in Device Manager then you can use the Disk Management utility to check if it is listed there. This can sometimes happen when the disk does not have a proper drive letter, which can be adjusted in Disk Management. Both of these utilities are built-in to windows operating systems.

what are some websites you commonly use​

Answers

Answer:

boredpanda.com

Explanation:

it has fun collections of tweets, stories, photos etc.

Write a Java program called DisplayText that includes a String array called names [] containing the following elements, (Jane, John, Tim, Bob, Mickey). Display the contents of the String array in the command line window.

Answers

The Java program "DisplayText" uses a String array called "names[]" to store names. It then displays the contents of the array in the command line window.

public class DisplayText {

   public static void main(String[] args) {

       String[] names = {"Jane", "John", "Tim", "Bob", "Mickey"};

       // Display the contents of the names array

       for (String name : names) {

           System.out.println(name);

       }

   }

}

When you run this program, it will print each element of the "names" array on a separate line in the command line window.

learn more about Java here: brainly.com/question/2266606

#SPJ11

Write a loop that sets newScores to oldScores shifted once left, with element 0 copied to the end. Ex: If oldScores = {10, 20, 30, 40}, then newScores = {20, 30, 40, 10}.Note: These activities may test code with different test values. This activity will perform two tests, both with a 4-element array (int oldScores[4]). See "How to Use zyBooks".



If the submitted code tries to access an invalid array element, such as newScores[9] for a 4-element array, the test may generate strange results. Or the test may crash and report "Program end never reached".



#include

using namespace std;

int main() {

const int SCORES_SIZE = 4;

int oldScores[SCORES_SIZE];

int newScores[SCORES_SIZE];

int i;



for (i = 0; i < SCORES_SIZE; ++i) {

cin >> oldScores[i];

}

/* Your solution goes here */

for (i = 0; i < SCORES_SIZE; ++i) {

cout << newScores[i] << " ";

}

cout << endl;

return 0;

}

Answers

Below is a possible solution using a loop to shift the elements of oldScores and store them in newScores:

css

for (i = 0; i < SCORES_SIZE; ++i) {

 newScores[(i + SCORES_SIZE - 1) % SCORES_SIZE] = oldScores[i];

}

newScores[SCORES_SIZE - 1] = oldScores[0];

What is the loop  about?

Below is the solution that sets newScores to oldScores shifted once left, with element 0 copied to the end:

cpp

for (i = 0; i < SCORES_SIZE - 1; ++i) {

   newScores[i] = oldScores[i+1];

}

newScores[SCORES_SIZE-1] = oldScores[0];

This loop iterates through oldScores, copying each element to the next index in newScores (i+1). Finally, it copies the first element of oldScores (index 0) to the last index in newScores.

Here's the updated main() function with the loop and output:

cpp

int main() {

   const int SCORES_SIZE = 4;

   int oldScores[SCORES_SIZE];

   int newScores[SCORES_SIZE];

   int i;

   for (i = 0; i < SCORES_SIZE; ++i) {

       cin >> oldScores[i];

   }

   for (i = 0; i < SCORES_SIZE - 1; ++i) {

       newScores[i] = oldScores[i+1];

   }

   newScores[SCORES_SIZE-1] = oldScores[0];

   for (i = 0; i < SCORES_SIZE; ++i) {

       cout << newScores[i] << " ";

   }

   cout << endl;

   return 0;

}

Read more about loop  here:

https://brainly.com/question/26568485

#SPJ1

is it safe to give personal information to strangers you met in the internet? why?

Answers

Answer:

No it is not safe.

Explanation:

If you give personal data (such as your home address, bank details, etc) they could pretend to be you and do bad things but the consequences fire back to you.

during a mail merge what item aer merged​

Answers

Answer: The mail merge process involves taking information from one document, known as the data source.

Explanation:

log(10×

\(log(10x4 \sqrt{10)} \)

in which format does oracle 12c display a date value?

Answers

Oracle 12c displays a date value in the format 'DD-MON-YY' by default.

Oracle 12c, like other versions of Oracle databases, displays a date value by default in the format 'DD-MON-YY'. In this format, 'DD' represents the day of the month, 'MON' represents the three-letter abbreviation of the month, and 'YY' represents the last two digits of the year. For example, a date value of May 1, 2023, would be displayed as '01-MAY-23' in Oracle 12c.

It's important to note that the default display format for a date value can vary based on the configuration settings of the Oracle database or the preferences set by the user. However, the 'DD-MON-YY' format is commonly used and recognized as the default format for displaying date values in Oracle.

In summary, Oracle 12c displays a date value by default in the 'DD-MON-YY' format, which represents the day, month abbreviation, and last two digits of the year. This default format can be subject to customization based on the database settings and user preferences.

Learn more about databases : brainly.com/question/30883187

#SPJ4

How does business intelligence software assess the performance of applications? Business intelligence software assesses the performance of applications using

Answers

Answer: Scorecards

Explanation: Scorecards are a representation of applications performance.

Answer:

Scorecards

Explanation:

for Plato- edmentum

NEED ANSWERS ASAP 50 POINtTS!!!!
Katie wants to use VLOOKUP for a column in a table. Which value of the mode parameter should she use to look for an exact match of the searched data?
Katie should use the __ value of mode parameter for an exact match with the searched data.

Answers

Answer:

The exact match mode is the mode parameter that Katie should use to look for an exact match of the searched data

Further Explanation:

The VLOOKUP function in Excel helps us search for and retrieve information from a particular column in a table and lookups a value in the left-most column of the table. It has two modes of matching.

Exact matching – When you perform a range_lookup, an argument FALSE is defined to mean that there is an exact match of the return value.

To achieve this, select a cell in your Excel worksheet

Type =VLOOKUP in the type bar of the Excel sheet

Select the value to look up and then select the data range

Type the column number that you want to search and then type FALSE

Press enter

Answer:

The exact match mode is the mode parameter that Katie should use to look for an exact match of the searched data

Explanation:

The VLOOKUP function in Excel helps us search for and retrieve information from a particular column in a table and lookups a value in the left-most column of the table. It has two modes of matching.

Exact matching – When you perform a range_lookup, an argument FALSE is defined to mean that there is an exact match of the return value.

To achieve this, select a cell in your Excel worksheet

Type =VLOOKUP in the type bar of the Excel sheet

Select the value to look up and then select the data range

Type the column number that you want to search and then type FALSE

Press enter

Define the following terms:
i) Icon
ii)Desktop

Answers

Icon : an application
Desktop : A computer at a desk

Give short answers.
h.
How have computers affected education?
i.
What roles do computers play at home?

j.What effects have computers had on the practice and enforcement of law?

k. How have computers changed entertainment?

Answers

Answer:

H) Well it depends how you put it. I'm Doing virtual School for my education. And it is so easy when we have technology out their to provide the help that we need. So I think it has affected education pretty good. You can Also google the answers.

I) Looking up Answers at home

J) Parents can check up on their child's school work and see if they can help them. Also The law is involved in Education.

K) It depend's on how you put it

Explanation:

Short Answers

kevin formatted the values in a pivottable by selecting the values and then clicking the accounting number format button on the home tab. when he changed the layout of the pivottable, he lost the number formatting. which dialog box should he use instead?

Answers

The dialog box that he should use instead is the format Cells dialog box. The correct option is b.

What is the format cell dialog box?

To change the format of a single cell or a group of cells in the spreadsheet, use the Format Cells dialogue. The options for number, alignment, font, border, fill, and protection are found in the format cell dialogue box.

To change the formatting of cell numbers in Excel without changing the actual number, use the format cells function. We can modify the number, alignment, font style, border style, fill options, and protection with the aid of the format cells.

Therefore, the correct option is b. Format Cells dialog box.

To learn more about the format cell dialog box, refer to the link:

https://brainly.com/question/15975191

#SPJ1

The question is incomplete. Your most probably complete question is given below:

a. PivotTable Format dialog box

b. Format Cells dialog box

c. Value Field Settings dialog box

d. Value Properties dialog box

Other Questions
Which statement best describes what the freedom rides and the AlbanyMovement were?A. They were activities used by CORE and SNCC to test and protestsegregation.B. They were ideas that the federal government had in order to endsegregation.OC. They were code names used by the U.S. military to handle civilrights protestors if they became too violent.OD. They were activities that southerners used to keep Black peoplesegregated from white people. If DF = 35 and EF = 12, what is DE?ANSWER QUICK (x+3)(3x - 5x - 10) multiply polynomial What is the sum of the numbers, written in scientific notation? 1.4 x 103 and 5.6 x 102A. 1.96 x 2B. 1.96 x 10^3C. 1.96 x 4 D. 1.969 x 5 Which of the following is considered a disaccharide sugar ?1-C3H6O32-C6H12O63-C12H22O114-C18H32O16And why? Is breakfast is the most important meal of the day ? yes or no, provide reason to support ur answer. Forecast gaming is a result of poor __________ alignment, wherein it is rational for an individual to forecast a demand that is different than what he/she truly believes. There will always be intense competition in a community for limited resources such as food, water, and shelter. Those individuals that are best suited to obtaining those resources are more likely to like, reproduce, and pass their traits on to future offspring. What is the name of this principle, and who developed it? The picture shows 3 steel rods. The rods are congruent, solid cylinders. The area of the top of the one rod is 7.07 square centimeters. The area of the body of one rod is 39.58 square centimeters. Find the total surface area of the 3 rods.a) 53.72b) 46.65c) 139.95d) 161.16 Ryan bought grape lat week for 1. 65 per pound. If he bought n pound, write an equation to how how much money m he will pend Why did NCadopt threeConstitutionsinstead ofamending theoriginal, like theU.S.? An angle measures 44 less than the measure of its supplementary angle. What is themeasure of each angle? An architect makes a model of a new house. the model shows a tile patio in the backyard. in the model, each tile has length 2/3 in. and width 1/4 in. the actual tiles have length 1 /2 ft and width 3 1/6 ft. what is the ratio of the length of a tile in the model to the length of an actual tile? what is the ratio of the area of a tile in the model to the area of an actual tile? Kinship and adoptee studies show that intelligence isSelect one:a. influenced mainly by environmental factors.b. influenced only by environmental factors.c. determined in large part by heredity.d. determined only by heredity. In the word MATH find the p( vowel, then consonant). Who can draw me an irregular pentagon (no sides or angles should be equal) and all the sides must be in inches and ONLY whole numbers. and all the angles of the irregular pentagon must equal to 540. Which of these sentences uses pronouns correctly?A Both of the girls had their notebooks with them.B Few of the girls had her notebook with her.C Each of the girls had their notebook with them.D All of the girls had her notebook with her. Brian is trying his best to understand the concept of variable scope, so he calls his friend Molly for guidance. Brian has defined a variable named strNumberOfSongs within the click event handle for a Submit button, and he has been frustrated in his efforts to refer to this variable in the click event handler for a Clear button. What does Molly tell him is going on 0.15(w+2)=0.3+0.2w I need help Marcella divided 40.8 gallons of paint amount 8 containers. how much paint is in each container?