Which of the following is a characteristic of TIFFs?

universal standard for image file formats

cross-platform

the one version of TIFF that exists

only available as a vector graphic
please help

Answers

Answer 1

Answer:

What are the characteristics of a TIFF file?

A TIFF file supports grayscale as well as RBG,CMYK, and LAB color space. The format allows a color depth of up to 16 bits per color channel and is therefore ideal for data exchange during a RAW conversion. The abbreviation TIFF, or more rarely TIF, stands for “Tagged Image File Format”.

Answer 2

Answer:

universal standard for image file formats


Related Questions

The following code appears in a sort function. Will this function sort in increasing order (smallest first) or decreasing order (largest first)? Explain your answer if (list[index] < list[index + 1]) { temp = list [index]; list[ index] = list [index +1]; list[index +1] = temp; }

Answers

A sort function sorts in an ascending or desceding order

The true statement is that the function would sort in decreasing order.

What is a sort function?

A sort function is a code segment that is used to reorder a list in ascending or descending order, when called or evoked

The order of the sort function

The code segment is given as:

if (list[index] < list[index + 1]) {

temp = list [index];

list[ index] = list [index +1];

list[index +1] = temp;

}

In the above code, we can see that the code compares a list element with the next element on the list, and the larger value comes to the front

This means that the sort function sorts in decreasing order

Read more about code segments at:

https://brainly.com/question/16397886

19) If you want to find your lowest paid, full time employee (with "FT" in column B and each employee's salary found in column C), you would use the ________ function.

A. IFSMAX


B. MAXIF


C. MIN


D. MINIFS

Answers

Answer:

MAXIF

Explanation:

The MAXIF function is a function used in Ms Excel.

This function indicates the maximum value located on an array .

Option B

Answer:

Maxif

Explanation:

If you want to find your lowest paid, full time employee (with "FT" in column B and each employee's salary found in column C), you would use the MAXIF function.

How many categories of computer do we have?

Answers

Answer:

The 10 types of computers include personal computers, desktops, laptops, tablets, hand-held computers, servers, workstations, mainframes, wearable computers and supercomputers.

Which method adds 10 to the right end of the array?
myArray.
insert
(10)

Answers

JavaScript has a set of mutator functions that allow you to modify the contents of an array without referencing the individual elements.To add to to myArray we us the push() method

Adding Elements to an Array

To add to to myArray we us the push() method

(10)

myArray.push(10)

There are two mutator functions for adding elements to an array: push() and unshift(). The push() function adds an element to the end of an array:

var nums = [1,2,3,4,5]; print(nums); // 1,2,3,4,5 nums.push(6);

print(nums); // 1,2,3,4,5,6

var nums = [1,2,3,4,5]; print(nums); // 1,2,3,4,5 nums[nums.length] = 6; print(nums); // 1,2,3,4,5,6

Learn more about arrays here:

https://brainly.com/question/24275089

It would be Array.append(10), so append is the answer.

A person entering the field of financial analysis
will end up taking what kind of classes in
college?
A. accounting
B. agriculture
C. astronomy
D. advertising

Answers

Answer:accounting

Explanation:

Type the correct answer in the box. Spell the word correctly.

Which firewall monitors traffic from the DMZ to the LAN?

When a DMZ is set up using dual firewalls, the___

-end firewall monitors traffic moving from the DMZ toward the LAN while the ___

firewall monitors the traffic from the Internet toward the DMZ.

Answers

The firewall that monitors traffic from the DMZ to the LAN is the second, or internal (dual-firewall)

Which firewall manages traffic from the DMZ to the LAN?

In this kind of traffic, the second, or internal, firewall is known to be the one that gives room for traffic to move from the DMZ to the internal network.

Note that the dual-firewall approach is seen as a very secure way due to the fact that  two devices have to be compromised before any kind of attacker can be able to gain access into the internal LAN.

When a DMZ is set up using dual firewalls, the web server is placed inside the DMZ and the private network is often placed behind the DMZ.

Learn more about firewall from

https://brainly.com/question/13693641

Write a program that allows two players (player X and player O) to play a game of tic-tac-toe. Use a two- dimensional char array with three rows and three columns as the game board. Each element of the array should be initialized with an asterisk (*). The players take turns making moves and the program keeps track of whose turn it is. Player X moves first. The program should run a loop that:

Answers

#include <iostream>

using namespace std;

//function prototypes

void showBoard(char[][3]);

bool checkWinner(char[][3], char);

void playerMove(char[][3], char);

int main()

{

  //declare variables needed

  //declare 2D array for the board

  //and initialize with all *

  char board[3][3] = {{'*', '*', '*'},

                      {'*', '*', '*'},

                      {'*', '*', '*'}};

  int moves = 0;  //variable to keep track

                  //of number of moves

                  //to determine tie

  cout << "TIC - TAC - TOE\n\n";

  //while loop to repeat until 9 moves are done

  while(true){

      //display board

      showBoard(board);

      cout << "Player 1 moves\n";

      //get player X move

      playerMove(board, 'X');

      //increment moves counter

      moves++;

      //if this is a winning move

      //store winner and terminate

      if(checkWinner(board, 'X')){

          showBoard(board);

          cout << "\nPlayer 1 (X) wins!\n";

          return 0;

      }

      //if 9 moves are done

      //break from loop

      if(moves == 9)

          break;

      //display board again

      showBoard(board);

      cout << "Player 2 moves\n";

      //do the same thing for player O

      playerMove(board, 'O');

      moves++;

      if(checkWinner(board, 'O')){

          showBoard(board);

          cout << "\nPlayer 2 (O) wins!\n";

          return 0;

      }

  }

  //if we have gone this far and program

  //still has not terminated (no winner)

  //it means this is a tie

  showBoard(board);

  cout << "This game is a tie!\n";

  //return 0 to mark successful completion of program

  return 0;

}

//this function is helpful because we need to show

//the board repetitively during the program

void showBoard(char board[][3]){

  cout << endl;

  //loop on the rows

  for(int row = 0; row < 3; row++){

      //loop on the columns

      for(int col = 0; col < 3; col++)

          cout << board[row][col] << "    ";

      //display newline after each row

      cout << endl << endl;

  }

  cout << endl;

}

//this function checks if second argument

//is a winning player

bool checkWinner(char board[][3], char player){

  //boolean variable to check

  //for winner later

  bool flag;

  //CHECK FOR WINNER IN ROWS

  for(int row = 0; row < 3; row++){

      //initialize flag to true

      flag = true;

      //loop within a row

      for(int col = 0; col < 3; col++){

          //Notice that the right part of the

          //assignment operator, is an expression

          //with a relational operator (==)

          //this expression will yield either

          //true (1) or false (0)

          //while flag is already true (1)

          //if multiplied by true (1) will result

          //in true(0), or multiplied by false (0)

          //will result in false (0)

          flag *= (board[row][col] == player);

      }

      //after checking within row, if the flag

      //is still true at this point, it means we have

      //three chars of the same kind within the row,

      //thus we have a winner

      if(flag)

          return true;

      else

          continue;

  }

  //CHECK FOR WINNER IN COLUMNS

  //using a similar logic

  for(int col = 0; col < 3; col++){

      flag = true;

      for(int row = 0; row < 3; row++){

          flag *= (board[row][col] == player);

      }

      if(flag)

          return true;

      else

          continue;

  }

  //CHECK FIRST DIAGONAL (row = col)

  //reset flag to true

  flag = true;

  //check diagonal

  for(int i = 0; i < 3; i++){

      flag *= (board[i][i] == player);

  }

  //check if there is winner

  if(flag)

      return true;

  //CHECK OTHER DIAGONAL (row = 2 - col)

  //reset flag to true

  flag = true;

  //check diagonal

  for(int col = 0; col < 3; col++){

      flag *= (board[2-col][col] == player);

  }

  //check if there is winner

  if(flag)

      return true;

  //if all of these have been checked

  //and function still has not returned,

  //it means there is no winner

  return false;

}

//this function gets a move from the player,

//checks if it is valid, and if yes it puts

//it on the board

void playerMove(char board[][3], char player){

  //variables to store user move

  int row, col;

  //get user move

  cout << "Row: ";

  cin >> row;

  cout << "Col: ";

  cin >> col;

  //check if this is valid move

  //you have to check if that tile has

  //already been marked, or if tile

  //of choice is out of bounds of board

  while(board[row-1][col-1] != '*' ||

        row > 3 || row < 0 ||

        col > 3 || row < 0)

          {

      cout << "Invalid move! Try again\n";

      cout << "Row: ";

      cin >> row;

      cout << "Col: ";

      cin >> col;

  }

  //after validation, mark new move

  board[row-1][col-1] = player;

}

Answer:

if on edgen. The answer is c

Explanation:

In this lab, you will implement a temperature converter in JavaScript. The user may type a temperature in either the Celsius or Fahrenheit textbox and press Convert to convert the temperature. An image displays based on the converted temperature. (see the image uploaded here)

Answers

Use the knowledge in computational language in JAVA to write a code that convert the temperature.

How do I convert Celsius to Fahrenheit in Java?

So in an easier way we have that the code is:

Fahrenheit to celsius:

/* When the input field receives input, convert the value from fahrenheit to celsius */

function temperatureConverter(valNum) {

 valNum = parseFloat(valNum);

 document.getElementById("outputCelsius").innerHTML = (valNum-32) / 1.8;

}

Celsius to Fahrenheit:

function cToF(celsius)

{

 var cTemp = celsius;

 var cToFahr = cTemp * 9 / 5 + 32;

 var message = cTemp+'\xB0C is ' + cToFahr + ' \xB0F.';

   console.log(message);

}

function fToC(fahrenheit)

{

 var fTemp = fahrenheit;

 var fToCel = (fTemp - 32) * 5 / 9;

 var message = fTemp+'\xB0F is ' + fToCel + '\xB0C.';

   console.log(message);

}

cToF(60);

fToC(45);

See more about JAVA at brainly.com/question/12975450

Good people can y'all help me do this activity

For Part 1 of the activity: 1. Look around you. Talk to your friends and family. Talk to other people in your network. Keep an eye on the local news. Search on the internet. Do you observe any common problem that many of these people are facing? That just can be your business opportunity! 2. But before you jump ahead and start looking at this problem as your business opportunity, you need to first think whether you have any idea on how to solve the particular problem. You also need to find out whether the people facing this problem are even keen on a solution they have to pay for. 3. As a tip, remember that your potential customers should feel that the problem that they are facing is an acute one and their life is affected because of it......

Answers

Answer: I don't think anyone can help with that

Explanation:

Also i don't think this is coding related-

Identify three (3) general-purpose computing devices and write a short (no more than one page) essay explaining in detail the computing process.

Answers

The three general-purpose computing devices are desktops, notebooks, smartphones. The computing process of these devices are further explained below.

What are general-purpose computers?

A general-purpose computer is a type of computer that has the ability to carry out many different tasks. The following tasks can be performed by the general purpose computing devices:

installation of softwares,

processing of data, and

storage of processed data.

The computing process of all the general-purpose computer are the same.

It involves preparation and inputting of data into the computer using the input devices.

The data is sent to the processing unit called the central processing unit (CPU) which has the electronic circuitry that manipulates input data into the information people want.

The information is then displayed in an output device example the monitor, for the user to view.

Therefore, the three general-purpose computing devices are desktops, notebooks, smartphones.

Learn more about computing process here:

https://brainly.com/question/26409104

What should I do instead of listen to music?

Answers

You could watch a movie
Learn something new that you are interested in

These are raised as livestock for meat and milk EXCEPT one
A. Hog
B. Goat
C. Carabao
D. Cattle

Answers

The livestock that is not raised for  meat and milk is  hog.

What are animals raised for meat?

Livestock are known to be some domesticated animals that are said to be raised in an agricultural farm to give labor and produce things such as meat, eggs, milk, etc.

The animals that are raised for their meat and milk are:

Boar BroilerCattle, etc.

Learn more about animals from

https://brainly.com/question/25897306

Type the correct answer in the box. Spell all words correctly.
Craig has told his team to design a website, but he wants to see a fully laid out detailed version before functionality can be added. How can his team produce this?
Craig's team can demonstrate this by creating a(n) {----------}
.

Answers

Answer:

A project scope

Explanation:

I just took this on plato

The team designs the website according to the team leader by a project scope.

What is a website?

The website is a set of web pages located under a single domain name,  generated by a single person or any organization.

Craig has told his team to design a website, but he wants to see a fully laid out detailed version before functionality can be added.

A project can be introduced to create a website for the team members whether individually or in a team.

Thus, the team produce this by a project scope.

Learn more about website.

https://brainly.com/question/19459381

#SPJ2

What service handles the execution of missed cron jobs in the /etc/cron.hourly, /etc/cron.daily, /etc/cron.weekly and cron.monthly files?

Answers

The service handles the execution of missed cron jobs is /etc/crontab.

Where are /etc/crontab is system crontabs file?

This is a command that is often used by root user or daemons. It is used to configure system different kinds of jobs.

Vonclusively, Cron jobs are often seen  in the spool directories. They are known to be often stored in tables known as crontabs. This /etc/crontab. is a service handles the execution of missed cron jobs.

Learn more about commands from

https://brainly.com/question/25243683

Misinformations about Corona virus

Answers

Answer:

be in a crowded place without a mark

in what year was CCTV added to a broadcast network?

Answers

CCTV added to a broadcast network in 1949

Write a C++ program to grade the answers to a true-false quiz given to students in a course. The quiz consists of 5 true-false questions. Each correct answer is worth 2 points.

Answers

The quiz program is an illustration of loops and conditional statements

Loops are used to perform repetitionConditional statements are used to make decisions

The quiz program

The quiz program written in C++, where comments are used to explain each action is as follows:

#include <iostream>

using namespace std;

int main(){

   //This prints the instruction

   cout<<"Enter T/t for True; F/f for False\n";

   //This initializes the question

   string questions[5] = { "Q1", "Q2", "Q3", "Q4", "Q5"};

   //This initializes the correct options

   char options[5] = { 'T','T','F','F','T'};

   //This declares the user response

   char opt;

   //This initializes the score to 0

   int score = 0;

   //This loop is repeated 5 times

   for (int i = 0; i < 5; i++){

       //This prints the current question

       cout << i + 1 <<". "<<questions[i]<<"\nAnswer: ";

       //This gets the user response

       cin>>opt;

       //If the user response is correct

       if(toupper(opt) == options[i]){

           //The score is incremented by 2

           score+=2;

       }

   }

   //This prints the total score

   cout<<"Score: "<<score;

   return 0;

}

Read more about loops at:

https://brainly.com/question/19347842

Under what scenarios can we clear the NVRAM by moving the PSWD jumper to the RTCRST
pins?

Answers

One can clear the NVRAM by moving the PSWD jumper to the RTCRST pins in the following scenarios:

When the computer system is on for 10 secondsWhen the jumper is set to the closed position

What is a jumper ?

A jumper (usually found on early days computers) is used when the computer needs to close an electrical circuit

The NVRAM which means a non-volatile random-access memory can be reset or clear when the computer system is on for 10 seconds and when the jumper is set to the closed position

Read more about computer at:

https://brainly.com/question/24032221

what does the GPU do?

Answers

Answer:

With graphics processing units (GPU), many pieces of data can be processed simultaneously, which makes them useful for applications such as machine learning, editing, and gaming. It is an electronics circuit capable of accelerating the processing of images, animations, and videos.

Explanation:

What is information computer security

Answers

Answer:

Computer security, cybersecurity, or information technology security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

Explanation:

1.Skills

1.SkillsThe Top Skills Required for Cybersecurity Jobs

1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...

1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...

1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...Knowledge of Security Across Various Platforms. ...

1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...Knowledge of Security Across Various Platforms. ...Attention to Detail. ...

1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...Knowledge of Security Across Various Platforms. ...Attention to Detail. ...Communication Skills. ...

1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...Knowledge of Security Across Various Platforms. ...Attention to Detail. ...Communication Skills. ...Fundamental Computer Forensics Skills. ...

1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...Knowledge of Security Across Various Platforms. ...Attention to Detail. ...Communication Skills. ...Fundamental Computer Forensics Skills. ...A Desire to Learn. ...

1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...Knowledge of Security Across Various Platforms. ...Attention to Detail. ...Communication Skills. ...Fundamental Computer Forensics Skills. ...A Desire to Learn. ...An Understanding of Hacking

2.Thesaurus

ThesaurusCybersecurity refers to the practice of securing electronic devices from unauthorized access or attack or the measures taken in pursuit of this practice.

3.Risk assessment

Risk assessmentWhat does a cybersecurity risk assessment include? A cybersecurity risk assessment identifies the various information assets that could be affected by a cyber attack (such as hardware, systems, laptops, customer data, and intellectual property), and then identifies the various risks that could affect those assets.

and last..........is four

4. Field

FieldDifferent branches of cyber security

FieldDifferent branches of cyber securityApplication security.

FieldDifferent branches of cyber securityApplication security.Network and infrastructure security.

FieldDifferent branches of cyber securityApplication security.Network and infrastructure security.Intrusion detection and penetration testing.

FieldDifferent branches of cyber securityApplication security.Network and infrastructure security.Intrusion detection and penetration testing.Digital forensics and incident response.

FieldDifferent branches of cyber securityApplication security.Network and infrastructure security.Intrusion detection and penetration testing.Digital forensics and incident response.Endpoint protection and mobile security.

FieldDifferent branches of cyber securityApplication security.Network and infrastructure security.Intrusion detection and penetration testing.Digital forensics and incident response.Endpoint protection and mobile security.Data governance, risk and compliance.

What stands for “vlog”?

Answers

Answer:

Vlog means a Video Blog or log

Explanation:

Stay safe, stay healthy and blessed.

Have a blessed day !

Thank you

Answer ↓

"vlog" stands for "video blog"

Explanation ↓

If you have a vlog, you have a blog where most of the content is in video format. So your content is mostly videos.

hope helpful ~

with the aid of your own example explain how memory,registers and secondary storage all work together​

Answers

Memory, registers and secondary storage all work together​ so as to create or produce an ideal storage conditions.

How does memories works together?

The use of storage memory serves for different purposes. There is the primary storage and secondary storage that are known to work together so as to bring about a better ideal storage conditions.

An example is if a person save their work in Word, the file data is said to move the data or file from primary storage to a secondary storage device for long-term keeping.

Learn more about Memory from

https://brainly.com/question/25040884

Homework 8 Matlab Write a function called fibonacciMatrix. It should have three inputs, col1, col2, and n. col1 and col2 are vertical arrays of the same length, and n is an integer number greater than 2. It should return an output, fib, a matrix with n columns. The first two columns should be col1 and col2. For every subsequent column:

Answers

In this exercise we have to use the knowledge in computational language in python to write the following code:

We have the code can be found in the attached image.

So in an easier way we have that the code is:

function v = myfib(n,v)

if nargin==1

   v = myfib(n-1,[0,1]);

elseif n>1

   v = myfib(n-1,[v,v(end-1)+v(end)]);

end

end

function v = myfib(n,v)

if nargin==1

   v = myfib(n-1,[0,1]);

elseif n>1

   v = myfib(n-1,[v,v(end-1)+v(end)]);

elseif n<1

   v = 0;

end

function [n] = abcd(x)

if (x == 1 || x==0)

   n = x;

   return

else

   n = abcd(x-1) + abcd(x-2);

end

end

fibonacci = [0 1];

for i = 1:n-2

   fibonacci = [fibonacci fibonacci(end)+fibonacci(end-1)];

end

>> myfib(8)

ans =

   0    1    1    2    3    5    8   13

>> myfib(10)

ans =

   0    1    1    2    3    5    8   13   21   34

See more about python at  brainly.com/question/18502436

Can someone give me answers for 1-4

Answers

Answer:

you want me help u with this one?

2. The different amount of shades of color

3. The artist had given every marvel or DC or villian the color that fit them and the texture is also very nice in the picture.

4. The artist maybe could make the pic a little bit more high quality cause in the image is sort of blurry and you cant really see the further people that well.

Match the product to its function.

Answers

Answer:

MYSQL: Database

MONGO DB: Database

SVELTE: Framework

JS: Language

VUE: Framework

PHP: Language

POSTGRES: Database

React: Framework (a JS library actually)

Python: Language

explain declaration and initialization of one and two dimensional arrays with example

Answers

The declaration and initialization of arrays involves creating and using the arrays

How to declare an array?

Assume the programming language is Java.

To declare and initialize an array, we make use of:

One dimensional array: Data-Type Array-name [] = {List of array values}Two dimensional array: Data-Type Array-name [] [] = {List of array values}

Assume the array name of the one dimensional array is num, and the data type is integer.

The following can be used to declare and initialize the array to have 5 elements

int num [] = {1,2,3,4,5}

Assume the array name of the two dimensional array is num, and the data type is integer.

The following can be used to declare and initialize the array to have 2 rows and 3 columns

int num [][] = {{1,2},{3,4},{5,6}}

Read more about arrays at:

https://brainly.com/question/22364342

Explain the distinction between a real address and a virtual address.

Answers

Answer:

A real address is the physical address in main memory. Though a virtual address is the address of a storage location in virtual memory.

hopes this help (:`

Answer:

send to you and the world is

list the factors that influenced the advancement of AI in recent years​

Answers

Answer:

In any case, there are 5 factors which are driving the development of Artificial Intelligent and other technologies of Big Data, ML, etc.

Next-Generation Computing Architecture. ...

Open Data. ...

Growth in Deep Neural Networks. ...

Legal and Ethical Issues. ...

Historical Datasets.

what is the important of hvac?

Answers

Answer:

Moreover, buildings need HVAC installed in them because:

HVAC systems are used for controlling the overall climate in a building. ...

HVAC fosters enhanced productivity in offices as they feel comfortable. ...

HVAC improves air quality in the building, helping make it appropriate for human breathing and comfort. ...

HVAC systems help you achieve more savings when it comes to energy bills

Explanation:

Answer:

Units larger than a terabyte include a petabyte, exabyte, zettabyte, yottabyte and brontobyte. A geopbyte is also larger than a terabyte and refers to 10 30 bytes, or 1,000 brontobytes. Additional units of measurement become necessary as the amount of data in the world increases.

Explanation:

what is the future of web development

Answers

Answer:

Creating websites that can execute automated tasks and new programing languages revolving around web development.

Explanation:

Other Questions
2(x+16)= 6x please help me :) can someone help me ? A cone with a height of 4 in, and a diameter of 6 in. Find the surface area and Volume What was the concept behind "Lady with a weasel" painting? What can you take from 60 to make 20? The solubility of a gas is 0.890 g/L at a pressure of 120 kPa. What is the solubility of the gas if the pressure is changed to 100 kPa, given that the temperature is held constant? Respected individuals in the community who review and evaluate media messages and then pass the information to friends and acquaintances are called a. sociologists. c. opinion leaders. b. lobbyists. d. gatekeepers. please select the best answer from the choices provided a b c d The first four terms of an arithmetic sequence are 7, 14, 21, 28... Calculate the sum of the first 50 terms. Which of Mendels laws or principles state that gametes carry one allele for each trait? |x+3/4|= 5 6/7 please help with this question from 6.2 russian mathemetics school What characteristics do the early Roman calendar and the Islamic calendar share? 3. Evaluate the following: a.) What value of Syields the coordinate point (1, 3)? b.) What value of Syields the coordinate point (3, 1)? c.) x(710)= d.) y(V10+ V5)= = B e.) x(2)= f.) y(2.5)= What type of art did harlem renaissance artist augusta savage produce?. One benefit of presenting information in a video rather than in text is that a video canO explain a concept in great detail.O include interviews with experts.show close-ups of images.Obring concepts to life. I am not sure how to answer this question; Describe the Fugitive Slave Act in terms that show it did not go far enough. I know how to answer describe the Fugitive Slave Act, but not the second part of the question in terms that show it did not go far enough? The scissor kick is the most efficient kick while treading waterQuestion 3 options:True or false Women's Temperance Movement what were the weaknesses of the movement? Pls help asap, have a great dayfind, w: x: y: z: Please help asap almost due en cote d'ivoire vous ___ beaucoup de cocotiers sur les plages A. VoitB. Voyons C. voisD. voyez