Alex, a web designer, is assigned the task of creating a mobile-device-friendly website for a leading fashion outlet called AllStyles. A desktop version of AllStyles's website already exists. Alex can refer to this desktop version of the website to create the mobile website design.
For the AllStyles's main web page, Alex creates a navigation bar that includes topical areas named Clothing, Accessories, and About Us. Alex wants to create nested lists within each of these topical areas that would contain links to specific pages on the AllStyles website. In order to do so, Alex must _____ while writing the HTML code.​
A. ​Set the width of the layout viewport to the width of the nested lists
B. ​Put each of the nested lists within a class
C. ​Insert the structure of the nested list within a specific style sheet structure
D. ​Use theonlykeyword to hide the list items

Answers

Answer 1

In order to do so, Alex must set the width of the layout viewport to the width of the nested lists while writing the HTML code.​

A. ​Set the width of the layout viewport to the width of the nested lists

Explanation:

In mobile technology, a web browser displaying web pages has a mobile mode or desktop mode. While the end-user selects mobile mode it web pages displayed in compression mode and limit information depends on the web pages designer.

While select the desktop mode by the end-user web pages is displayed as the normal desktop version.

While the designer has to set the styles to all the web pages and it should be mapped properly so the web page display in both mode in the mobile technology.

Answer 2

Final answer:

Alex must use class or ID tags for the elements in the HTML code and style them with CSS, utilizing descendant selectors for nested lists to create a functional and styled navigation bar.

Explanation:

Alex, in creating nested lists for the navigation bar on the AllStyles mobile website, must ensure that the HTML and CSS code is written in a way that supports the hierarchical organization of menu items. One effective way to accomplish this is to assign class or ID tags to elements such as lists, which can then be styled using CSS. For instance, if Alex wants nested lists within the Clothing, Accessories, and About Us sections of the navigation bar, these lists can be organized by using <ul> tags for the main items and <li> tags for the nested items. Additionally, by making use of CSS descendant selectors, specific styles can be applied to lists within certain classes, aiding in the creation of a visually appealing and functional dropdown menu.


Related Questions

A(n) __________ network is a high speed communications connection used to exchange data between production line equipment and other devices within a manufacturing facility.

Answers

Answer:

Industrial network

Explanation:

Networks is simply a medium to transfer data and one example is an industrial network which is a high speed communications connection network that deal with the exchange of data on a large scale between the production line equipment and other devices within a manufacturing facility.

__________ describes a module for which the software developer does not care how the processing is performed, but instead, knows that the code, when provided valid inputs, will produce predictable results.

Answers

Answer:

The correct answer for the following question is "Black Box Testing" .

Explanation:

The black box is a software testing in which it works overall specification of the application rather than the internal structure of the application.The main aim of this kind of testing to check the functionality of the overall system.

In the black box testing when valid inputs are performed the predictable results is produced rather then it focuses on the processing. The advantages of black-box testing is given below.  

it hides the internal structure of the program.  focus on the output rather than the implementation. This type of testing takes less time to test the module of the code.

The Solution Explorer window ____.

a. displays items that you can use when creating a project
b. displays the classes, methods, and properties included in a solution
c. displays data connections and servers
d. displays a list of the projects contained in the current solution

Answers

Answer:

The correct answer for the given question is option(d).

Explanation:

Solution Explorer is found in Microsoft Visual Studio.When we create a project in the c# or another programming language the solution explorer window is used. The Solution Explorer takes care of the projects and files.  

Solution Explorer displays an overall view of the current project. In the Solution Explorer we can delete or add the file in the project. The  Solution Explorer window displays the list that is contained in the current solution.

Option(a),Option(b) and Option(c) are the incorrect option for the Solution Explorer window. So, Option(d) is the correct answer for the solution explorer.

d. displays a list of the projects contained in the current solution.

The Solution Explorer window in an Integrated Development Environment (IDE) like Visual Studio typically displays the projects, files, and resources contained within a solution. It provides a hierarchical view of the components of your software project, allowing you to navigate through the different files and folders, manage project dependencies, and access various project settings. It's an essential tool for organizing and managing the structure of your solution.

When researching the new power supply, what feature does James need to look for to make sure he has enough power to run his computer with the new video card?

Answers

Answer:

Power in watts also called Wattage

Explanation:

Power supply needs to have enough power to run a device or a computer, in a case where the device's wattage is greater than that of the power supply the power supply won't work. the solution will be to get a power supply with enough wattage to power the device or computer, considering the fact that video cards' wattage has increased in recent times.

To take private property through eminent domain, three steps must be taken by the state or local government. What are they?

Answers

Answer:

•The owner of the property must receive compensation on the property.

• The property must be useful to the general public.

• The owner must initiate due process in the court.

Explanation:

A filtering system designed for use by Web site owners is available through the ____, a nonprofit organization whose members include Internet industry leaders such as AOL Europe, BellSouth, British Telecom, IBM, Microsoft, and Verizon.

a. Anti-Defamation League (ADL)
b. Electronic Privacy Information Center
c. Internet Content Rating Association (ICRA)
d. Electronic Frontier Foundation

Answers

Answer:

The answer is C. Internet Content Rating Association (ICRA)

Explanation:

The Internet Content Rating Association (ICRA) is a non profit organization whose members include internet industry leaders such as AOL Europe, BellSouth, British Telecom, IBM, Microsoft and Verizon.The Electronic Privacy Information Center (EPIC) mission is to focus public attention on emerging privacy and related human rights issues. EPIC works to protect privacy, freedom of expression, and democratic values, and to promote the Public Voice in decisions concerning the future of the Internet. The Anti-Defamation League (ADL) is a global leader in exposing extremism and delivering anti-bias education, and is a leading organization in training law enforcement. ADL is the first call when acts of anti-Semitism occur. ADL's ultimate goal is a world in which no group or individual suffers from bias, discrimination or hate.The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group founded to promote Internet civil liberties.

Write a function double average(int arr[] , int n), that returns the average of the even elements of the array. If the array has no even elements, throw an integer-based exception containing the value 0. The number of elements in the array is specified by the parameter n.

Answers

Answer:

double average(int arr[], int n){

int evenElementCount = 0;

double sum = 0;

for( int i = 0; i < n; i++) {

if( arr [ i ] % 2 == 0 && arr [ i ] != 0 ){

evenElementCount += 1;

sum+=arr[i];

}

}

if(evenElementCount == 0)

throw 0;

return sum/evenElementCount;

}

Explanation:

The Method called average takes in an array and number of elements, it loops through the array using a for-loop to find all the even elements in the array, it stores the number of even elements in a variable named evenElementCount, it throws an integer-based exception if the evenElementCount variable is 0, returns average of even elements if the evenElementCount variable is not 0.

need help with this please and thanks

Answers

Answer:

Connector names are written below Picture vise:USB-CUSB 2.0Micro USB

Explanation:

Following is the brie Illustration of the terms used:

USB-C:

              It is the newest connector in the market with the             reversible/symmetrical design. It can be adapted to work with the legacy connectors such as USB-A, USB-B, USB-C and Micro USB.

USB 2.0:

              It is used mostly in the connections of electronic devices such as printers and smartphones. It has A to B connectors as well as micro USB connectors and mini USB connectors.

Micro USB:

              It is used for the connection o compact devices such as smartphone and mp3 players. They are further grouped into three categories: Micro A, Micro B and micro USB 3.

I hope it will help you!

What is VoIP?

a. VoIP uses IP technology to transmit telephone calls.
b. VoIP offers the low cost ability to receive personal and business calls via computer.
c. VoIP offers the ability to have more than one phone number.
d. VoIP offers all of these.

Answers

Answer:

D) offers all the given options

Explanation:

VoIP also referred to as  IP telephony, Internet telephony or broadband telephony are  technologies that has made phone, video and general multimedia communication over the internet possible. It allows low cost because the communication infrastructure is shared between data and voice,  and can be used by both individuals and businesses

What data discovery process, whereby objects are categorized into predetermined groups, is used in text mining?
A. classification
B. trend analysis
C. association
D. clustering

Answers

I believe the answer is (A) classification. Have a nice day :)

A blog is best defined as: a web site primarily involved in tracking people's behavior on the Internet. a web site that typically acts as brokers for advertisers and web sites. a smaller version of the banner that often look like an icon and usually provide a link to an advertiser's landing page. a little billboard that spreads across the top or bottom of the web page. a reverse chronological journaling site.

Answers

Answer:

a reverse chronological journaling site.

Explanation:

A blog originally known as weblog, is an online journal containing informational or educational content, it usually displays information from the last added item ( that is why it is called reverse chronological journaling site), it can be personal or for a corporate entity for promoting brand identity.

You have four DCs in your domain. Active Directory appears to be corrupted on one of the DCs, and you suspect a failing hard drive. You attempt to remove it from the domain, but the procedure fails. You take the DC offline permanently and will replace it with another DC of the same name. What must you do before you can replace the DC?

Answers

Answer:

perform a metadata cleanup

Explanation:

Based on the information provided within the question it can be said that in this situation the the first thing you must do is perform a metadata cleanup. This is a procedure that must be used every time when forcibly taking a DC offline, this will remove all data from the Active Directory Domain Services that identifies a DC to the replication system. Allowing you to replace it with another DC of the same name.

__ view is a special view that you typically use when showing a presentation through two monito

Answers

Answer: presenter view

Explanation:

Presenter view is used to show a presentation from two displays such as laptop,monitor, projector screen

After correctly configuring a new wireless enabled thermostat to control the temperature of the company's meeting room, Joe, a network administrator determines that the thermostat is not connecting to the internet-based control system. Joe verifies that the thermostat received the expected network parameters and it is associated with the AP. Additionally, the other wireless mobile devices connected to the same wireless network are functioning properly. The network administrator verified that the thermostat works when tested at his residence. Which of the following is the MOST likely reason the thermostat is not connecting to the internet?

Answers

Answer:

The WPA2 shared key is incorrect is the correct answer.

Explanation:

The WPA2 shared key is incorrect because when the technician installs a new wireless thermostat for the purpose to control the temperature of the meeting room. Then, admin determines that the thermostat is not connecting to the control system through the internet and the admin authenticate that its parameter of receiving thermostat is associated with the AP. So, that's why the following option is correct.

Performance-related data from what document is used to develop the After-Action Report (AAR)?

Answers

Answer:

The answer is "EEGs".

Explanation:

EEGs stands for Exercise Evaluation Guides, It is designed to collect information related specifically to the evaluation criteria defined by the EP (Exercise Planning)Committee.

It is an organization that assesses the capacity to perform a task, role or goal.It is an evaluation based on the performance of critical tasks for the selected capability at specific levels.

You have a forest named PLAB and two domains, PLABA and PLABB. You want to add the users from both the domains to a group that should be restricted within the PLABA domain. Which type of group scope should you set for this group?

Answers

Global group is also called universal group users.

Explanation:

A network administrator has two domains are such  as PLABA AND PLABB. End-user of each domain wants to login both domain PLABA AND PLABB.

Network administrator has created global group accounts user domain and map all the users in the global group user domain.  For every user active directory and rights also be mapped.  Global group is also called universal group users. Group polices of each user has to be applied and mapped properly.

Once user are mapped and activated user can login from both domain server.

You’re responsible for an always-on VPN connection for your company and have been told that it must utilize the most secure mode for IPSec possible. Which of the following is best?

A) Tunneling
B) AH
C) IKE
D) Transport

Answers

Answer:

Tunneling

Explanation:

A networking protocol that is used to send data from one network to another network by encapsulation process.

It is the more secured method as it secures the data with the help of encapsulation process. Rest of the protocols are not helpful in security of data.

According to EEOC guidelines, a reasonable accommodation includes: (I) Providing interpreters or readers for the disabled employee (II) Making the facilities usable by individuals with disabilities (III) Restructuring the job by lowering the standards for disabled employees (IV) Modifying work schedules

Answers

Answer:

Option (i), (ii) and (iv) is the correct options for the following question.

Explanation:

Because according to the EEOC, the citizen of the United State gets the equal rights of the employment without any resistance on the color of the peoples, religion, sex, etc.

Under these guidelines, the government especially facilitates those persons also who are disabled by providing them interpreters or readers and also modifying schedules of the work.

A network administrator has been given a network of 172.16.85.0/21 and wants to know the usable range of IP addresses on that subnet. Which of the following indicates the correct IP address range?A. 172.16.80.0-172.16.85.254B. 172.16.80.0-172.16.88.255C. 172.16.80.1-172.16.87.254D. 172.16.80.1-172.16.85.255

Answers

Answer:

The correct answer to the following question will be option C.

172.16.80.1-172.16.87.254

Explanation:

IP Address: IP Address stands for Internet Protocol Address, a unique numerical label allotted to every computer network that are connected to the network of the computer and communicate through the internet protocol.

An IP address can be separated by periods and having four numbers that are called Octet. Range of IP address can be from 0 to 255.We have to keep the first 21 bits and start setting all from the 22nd bit on to 0 (zero).To get the suitable and the correct range of the address, we add and subtract 1 from the given broadcast address i.e.,172.16.85.0/21.

So, option C is the right answer and no other option is usable according to the given explanation and the address given by the administrator.

Which of the following represent correct syntax to display first name from global variable user? Select the one correct answer.
a. {User.FirstName}
b. {!User.FirstName}
c. $User.FirstName
d. {!$User.FirstName}

Answers

Answer:

Option D i.e., {!$User.FirstName} is the correct answer.

Explanation:

The following option is correct because in the following statement, the user programmer will ask to display the first name by using the global variable then, in the PHP Programming Language the following is the correct way to display the first name of the user, which is inside the curly braces then, not operator and then, name of the variable through which it call.

Final answer:

The correct syntax to display the first name from the global variable user is option d. {!$User.FirstName}, which is used in platforms like Salesforce that require merge field syntax.

Explanation:

The correct syntax to display the first name from a global variable user is d. {!$User.FirstName}. This syntax is typically used in Salesforce or similar platforms where the merge field syntax is required. The exclamation mark and curly braces indicate that it is a dynamic reference to a variable's property, and the dollar sign indicates that it is a global variable.

If you are working within a different context, such as pure JavaScript or another programming language, this syntax may not be applicable, and the correct syntax for accessing object properties might differ.

The ____ term implies that the type’s data can be accessed only through methods.

A. abstract type library
B. advanced data type
C. abstract definition type
D. abstract data type

Answers

Answer:

D. abstract data type

Explanation:

Abstract data type is a data type whose implementation is embedded behind an abstraction. They can be worked via methods and functions but their  specification is abstracted.

Lists and Stacks can be given as examples of abstract data types.

Abstract data type can be considered as the opposite of Concrete Data Type (CDT).

Final answer:

The abstract data type (ADT) is the correct term that refers to a type where its data is accessible only through specific methods, providing encapsulation of data.

Explanation:

The abstract data type (ADT) term implies that the type’s data can be accessed only through methods. This encapsulates the data and only allows it to be accessed or manipulated through a defined set of operations. ADTs provide a mathematical model for data types where data and operations are defined independently of any specific implementation.

This abstraction allows for different implementations that can vary internally but share the same external interface. An example of an ADT is a stack, which provides operations such as push, pop, and peek without revealing the underlying data structure, whether it be an array, list, or any other method of internal representation.

In defining security implemention, what are the roles of the following committees. 1) gateway committee 2) project committee 3) security compliance committee

Answers

In network, security plays important roles and implementing is a big task.

1. Gateway committee: It protects the hackers and any malware spyware to attack the network. Once hardware appliance is installed schedule update is happening at regular interval time.

2. Project committee:- it is an implementation plan and with minimum downtime in network and restoring the network and bring back the activities of the network.

3. Security compliance committee: - The network administrator has to select proper hardware appliance and to place in a network with minimum downtime.

in python Write a loop that counts the number of lowercase characters that appear in the string referenced by mystring.

Answers

Answer:

mystring = "My name is David Acheme"

count = 0

for i in mystring:

    if(i.islower()):

        count=count+1

print("The number of lowercase characters in: "+mystring)

print(count)

Explanation:

1. We declare a String Variable and assign a value.

2. Intialize a count variable to zero.

3. Using a for loop is to loop through each characters in the string.

4. The if condition checks when a lower case character is encountered using the islower method and increases count by 1

5. Prints the value of count.

An administrator is trying to enable hardware-assisted virtualization in the BIOS of a computer and notices it is not an option. He checks the specification on the manufacturer's website and finds that the system should support hardware-assisted virtualization. What is most likely the reason why he can't enable it?A. The BIOS needs a firmware update.B. The BIOS is corrupt.C. Hardware-assisted virtualization is enabled in the operating system, not the BIOS. D. The firmware is corrupt.

Answers

Answer:

this is difficult

Explanation:

i also need helo with this question

Dot Notation can be used with lower(), upper() or str() string methods. true or false

Answers

Final answer:

The statement is true; dot notation can indeed be used with the lower(), upper(), or str() string methods to manipulate strings in programming.

Explanation:

The statement that Dot Notation can be used with lower(), upper(), or str() string methods is true. Dot notation is a syntactic form that allows access to an object's properties, functions, or methods. In the context of string manipulation in programming languages such as Python, when you have a string object, you can apply various methods to it using dot notation.

For example, the lower() method can be used to convert all characters in a string to lowercase. Similarly, the upper() method converts all characters to uppercase. The str() method is often used to convert a non-string object to a string.

Here's how they can be used in practice:

my_string.lower() - Turns all characters in my_string to lowercase.my_string.upper() - Converts all characters in my_string to uppercase.str(my_object) - Converts my_object (which could be any type of object like an integer or a float) to a string format.

Which of the following examples of using the internet to conduct research meets the federal definition of research with human subjects?

Answers

The question is incomplete! Here is the complete question and it’s answer!

Q. Which of the following examples of using the internet to conduct research meets the federal definition of research with human subjects?

A. Gathering data to supplement an oral history project about a local civil rights activist. The activist passed away while the researcher was in the process of conducting in-person interviews with the individual's social network.

B. Analyzing a website visitor report from several pro-anorexia blogs to determine the popularity of each blog. Access to the blogs is not restricted.

C. Downloading a publicly available data-set that includes high school students' academic achievement rates. The data are in aggregate and were derived from multiple school districts from different states.

D. Conducting an on-line focus group with cancer survivors to determine familial support systems. The researcher also invites subjects' significant others to be a part of the focus group.

Answer:

D. Conducting an on-line focus group with cancer survivors to determine familial support systems. The researcher also invites subjects' significant others to be a part of the focus group.

Explanation:  

According to federal definitions;

1. ‘Human Subject Research’ is a research that involves human subjects.

2. ‘Research’ is a systematic investigation that is designed to contribute to generalizable knowledge.  

Only option D is valid since other options do not fulfill the two criterion mentioned above

Name a process of deleting data by sending an eraser to clear the instruction in an address of nonvolatile memory.

Answers

Answer:

Data in Rest / Data at Rest

Explanation:

According to literature; there are basically three states associated with digital data .

1. Data in Rest

2. Data in Transit / Motion  

3. Data in Use

Data-in-rest corresponds to the data permanently stored in non-volatile memory such as hard drive, SSD, cloud storage etc. this data is inactive since it is not being currently processed or transmitted that’s why it is called data at rest.

Data-in-transit corresponds to the data temporarily stored in volatile memory such as RAM or it is being currently transmitted to a network that’s why it is called data in transit.

Data-in-use corresponds to the data that is being used by some applications and is in process of being updated/erased and is being used by the user at any endpoint.

Matthew is working to select an authentication method for his company that will support REST as well as many web-based and mobile clients. Which of the following would be the best choice?A) ShibbolethB) RADIUSC) OpenID ConnectD) OAuth

Answers

Answer:

C) OpenID Connect

Explanation:

The best option is OpenID Connect because is based in OAuth, and supports multiple web based and mobile clients, and supports REST.

With OAuth, we cannot make any user authentication just provide a token to access data.

RADIUS is a networking protocol, and Shibboleth is a single sign-on log-in system for computer networks and the Internet, both not support REST.

On the Visit screen, you will not see one of the following:
a. Eligibility
b. Access level
c. Home Address
d. None of the Above

Answers

Answer:

The answer is "Option b".

Explanation:

An access level denotes a set of data type permissions or restrictions, that reduces the access level, which is an effective way to reduce failure modes, debug time and system complexity. and other options are not correct, i.e. define as follows:

In option a, In some of the cases, the system provides security, which is responded by the server to check the Eligibility of user, that's why it is not correct.In option c, The home address is always shown on the URL, that's why it is not correct.

A _______________ is most often a device with a tablet form factor that is designed to integrate with a detachable keyboard.

Answers

Answer:

Ultra book convertable / tablet hybrid

Explanation:

In recent times laptops comes out in a fashion that makes them take the form of tablets, they come with a detachable keyboard which reduces the power consumption and boost performance. the keyboard is used when attached and the touch screen is used when detached, giving you the best experience if both laptops and tablets.

Final answer:

A 2-in-1 PC is a versatile device designed to function both as a tablet and a traditional laptop when combined with a detachable keyboard. This reflects the personal nature of modern computing. Graphics tablets, which also use induction principles, differ by converting stylus-induced magnetic fields into digital images.

Explanation:

A 2-in-1 PC is most often a device with a tablet form factor that is designed to integrate with a detachable keyboard. This versatile computing device represents the evolution of personal computing, as each individual shapes their unique relationship with technology. Unlike traditional laptops or desktops, 2-in-1 PCs offer the portability of a tablet with the full functionality of a computer when connected to a keyboard.

Graphics tablets are another type of device that utilize passive tablets with induction principles for digital image creation. They differ from the touch tablets, as they have an intricate grid of wires and use a magnetic field from a stylus to create changes in electromagnetic fields, which are then translated into digital lines or strokes on the screen.

Other Questions
Please help with this click on the picture to see the whole thing Weight cycling __________ and can be avoided by maintaining __________. Weight cycling __________ and can be avoided by maintaining __________. promotes loss of fat cells; negative energy balance is repeated weight gain and loss; maintaining energy balance teaches a person how to eat healthfully; negative energy balance closes the energy gap associated with weight loss; positive energy balance Which standard is used to configure digital signature settings for e-mail and contacts from the corporate address book, depending on how the corporate e-mail server is set up? A car driving at 105 km/h. what is the speed in mi/min?(1 mi = 1.61 km) Todd witnessed an automobile accident and heard one of the bystanders casually mention that the driver was probably intoxicated. Even though the driver had not been drinking, or ever crossed the center line, Tyler tells the police officer that the car was swerving all over the road. Tylers faulty recall illustrates A 28 kg child goes down a straight slide inclined 38 above horizontal. The child is acted on by his weight, the normal force from the slide, kinetic friction, and a horizontal rope exerting a 30 N. How large is the normal force of the slide on the child? If the child slides with a constant speed, how large is the kinetic frictional force from the slide? The constructor signature is defined as the constructor __________ followed by the __________. a. name, parameter list b. name, return type c. definition, body d. definition, parameter list e. header, body In what ways are cleavage lines in the skin clinically significant? A. Stretching of the skin during pregnancy or extreme weight gain will cause stretch marks along these lines. B. They are surgically important because any procedure resulting in a cut perpendicular to a cleavage line may gape and delay healing. C. Tattoos are not able to be produced across these lines.D. Breakdown of collagen fibers along these lines improves skin flexibility. Penny reads 12 pages in one-third of an hour. What is the unit rate for pages per hour? For hours per page? To meet sales requirements and to have 2,500 units of finished goods on hand at December 31, 2017, the production budget shows 9,000 required units of output. The total unit cost of production is expected to be $18. Flint uses the first-in, first-out (FIFO) inventory costing method. Interest expense is expected to be $3,500 for the year. Income taxes are expected to be 40% of income before income taxes. In 2017, the company expects to declare and pay an $8,450 cash dividend. What is most true regarding personality during adulthood? Below are transactions for Lobos, Inc., during the month of December. Calculate the amount of revenue to recognize in December.A. Receive $1,200 cash from customers for services to be provided next month.B. Perform $900 of services during the month and bill customers. C. Customers are expected to pay next month.D. Perform $2,300 of services during the month and receive full cash payment from customers at the time of service. What is the force of a 500kg car that is accelerating at 20m /sex2? Andy decides to use a measure of how many times per week research participants talk to their partner as a measure of relationship closeness. According to the chapter on methods, what is "closeness"?a)an imaginary constructb)the operationalization of a psychological constructc)the predictor variabled)a psychological construct In an open economy, as the price level increases, a(n) ____ in demand in the quantity of domestic goods results in a(n) ____ in the quantity of GDP demanded. a. decrease, decrease b. increase, increase c. decrease, increase d. increase, decrease Doing something for the first time and setting a standard for others to follow is setting a Amy has just added a 462 meter run of fiber optic cable to the network. What should she do next? Neural networks, fuzzy systems, and evolutionary computation are all forms of __________, where systems develop intelligence through an iterative learning process.a. relational intelligenceb. conventional intelligencec. fuzzy logicd. computational intelligence 4. Describe a case in which the Supreme Court used the principle of equal protection- possibly through the equal protection clause of the Fourteenth Amendment - toexpand civil rights for marginalized groups. Then describe how the Supreme Courtused the equal protection clause to limit a program that benefited marginalizedgroups in Regents of the University of California v. Bakke. (4 points)For the first example, choose from these cases: Hernandez v. Texas Bolling v. Sharpe Boynton v. Virginia United States v. Virginia Obergefell v. Hodges Describe an environment that would have a low albedo. Explain where on Earth would you likely find this environment and why. Explain why the albedo is low. Steam Workshop Downloader