In a one-story purple house, there was a purple person, a purple cat, a purple fish, a purple computer, a purple chair, a purple table, a purple telephone, a purple shower - everything was purple! What color were the stairs? O Purple O None of these O WhiteO Green O Blue

Answers

Answer 1

None of these. There were no stairs in the one-story purple house.

The riddle presents a scenario in which everything in a one-story purple house is purple, including the person, cat, fish, computer, chair, table, telephone, and even the shower. The question asks what color the stairs are, with answer options including purple, none of these, white, green, and blue.

This is a classic example of a riddle where the answer is not necessarily related to the clues given in the question. Riddles like this one are often meant to be thought-provoking and require a bit of creative thinking to solve. They can be a fun way to challenge yourself and exercise your brain.

Learn more about The riddle:

https://brainly.com/question/21958257

#SPJ11


Related Questions

Describe at least three of the characteristics that project managers look for in project participants and explain why you think they are important

Answers

Answer:

1. Knowledge of Project Management Principles: A project participant should have the required knowledge of how project management works and how to function well in a team to achieve a common goal.

2. Time management skills: Despite the fact that it might be teamwork, the effectiveness of each individual is key. Every team member should be able to meet deadlines so as not to burden the team when they are given an individual task.

3. Excellent Communicator: A project participant should be able to communicate well with other team members, the project manager, different audiences, even customers and potential customers. Any weakness in communication skills could affect the project generally.

why you think they are important

1. Having knowledge of project management principles would lessen work and save time for the project manager and other team members as the project participant would have an idea per time of what to do.

2. A project participant that can manage time would generally increase the efficiency of the company, help the company meet deadlines, help the team meet targets.

3. Any weakness in communication skills could affect the project generally.

What features in Excel are the same as in Word?
What features are differ?

Answers

Answer:

Following are the difference and similarity between word and Excel:

Explanation:

The similarity in word and excel:

The MS-word and MS-Excel both are the part of Microsoft, that is used for the word processing and the  Spreadsheet (tablet program).  In the word processing is used to create papers like essays while the spreadsheet is used for manipulating the mathematical formula, in another way we can say that both are used for type letters. In both spreadsheet and the word processing is used for insert images, graphs, and hyperlinks, it also uses the tools for formatting bars and the toolbars.

The difference in word and excel:

In a word, it includes an application for text processing, and excel would be used for the tablet program.  The word is used to create documents like assignments file data files,  while excel is being used for the manipulation of numbers by mathematical equations.

how is internet connection made possible.​

Answers

Answer:

To connect to the Internet and other computers on a network, a computer must have a NIC (network interface card) installed. A network cable plugged into the NIC on one end and plugged into a cable modem, DSL modem, router, or switch can allow a computer to access the Internet and connect to other computers.

Help again. :,(
My 2nd semester is harder than last, either it’s hard for me to remember stuff or I’m just non-smart. :^

Help again. :,(My 2nd semester is harder than last, either its hard for me to remember stuff or Im just

Answers

Answer: C

Explanation:  that just seems like the write one

in the /var directory is a subdirectory called backup. you need to delete backup and any files. you change your directory focus to /var. which command will delete the directory backup and its files?

Answers

The command to delete the 'backup' directory and its files within the '/var' directory is rm -r /var/backup.

To delete the 'backup' directory and its files within the '/var' directory, you can use the following command:

rm -r /var/backup

This command will delete the 'backup' directory and all its contents, including any files or subdirectories within it. The '-r' option is used to specify that the deletion should be done recursively, ensuring that all files and subdirectories within the 'backup' directory are also deleted.

It is important to exercise caution when using the 'rm' command, as it permanently deletes files and directories without confirmation. Make sure you are in the correct directory and double-check the command before executing it.

Learn more:

About delete directory here:

https://brainly.com/question/32410655

#SPJ11

The command that can delete the directory backup and its files is rm -r backup.

The rm command is used to remove or delete files and directories. The -r option means that the removal is done recursively, meaning it removes the directory and its content. However, before using the rm command, it is essential to be sure that the directory to be deleted is correct as there is no undo for the delete operation.In the Unix or Linux operating system, the /var directory is the place where files that frequently change are stored. It contains files such as system logs, spool files, and temporary files that need to be stored across reboots.

The backup subdirectory is commonly used to store backups of the /var directory or files. If you want to delete the backup directory and its files, you must first switch your focus to the /var directory and then use the rm -r backup command. Be careful not to use this command on the wrong directory because it can result in the permanent deletion of important files and directories.

Learn more about directory backup: https://brainly.com/question/5849057

#SPJ11

hannes complains that his computer is always giving error messages, the file names and folder names are garbled, and there is an odd noise coming from his computer tower. which hardware device do you suspect is causing the problem?​

Answers

Answer:

It could be the hard disk drive (HDD)

Assignment 3: Chatbox python coding
I just need something real simple that follows the criteria in simple coding

Assignment 3: Chatbox python codingI just need something real simple that follows the criteria in simple

Answers

In python:

import random

good_responses = (["That's cool!", "Wow!", "That's great to hear!", "Tell me more"])

bad_responses = (["I'm sorry", "That sucks!"])

first_name = input("What's your first name? ")

last_name = input("What's your last name? ")

print(f"Hello {first_name} {last_name}, nice to meet you!")

age = int(input(f"How old are you, {first_name}? "))

if age > 17:

   print("Wow, you're old enough to vote!")

else:

   print("Quite young, aren't you.")

   

color = input("What's your favorite color? ")

print(good_responses[random.randint(0, 3)])

feeling = input("How are you feeling? (sad/happy) ")

if feeling == 'sad':

   print(bad_responses[random.randint(0, 1)])

else:

   print(good_responses[random.randint(0, 3)])

print(f"It's been nice chatting with you, {first_name}!")

I hope this helps!

Hurry please I’ll give Brainliest if you are right

Hurry please Ill give Brainliest if you are right

Answers

Answer:

I think kevin?

Explanation:

100 POINTS!!! PLEASE HELP ME

100 POINTS!!! PLEASE HELP ME

Answers

Answer:

1 web

2- invintory

3- spreadsheet

4-survey

Explanation:

hope it helps

Answer:

1. WE.b Ch.at

2. spreadsheet

3. Online Inventory

4. online survey

Explanation:

Hope this helps ^^

Have a great day!

Which of the following is true about the Internet of Things?
1. The Internet of Things is the network of devices with the ability to connect
and exchange data.
II. The Internet of Things increases our vulnerability to cyber attacks.
III. The Internet of Things is purely positive-there are no negative
consequences to increased connectivity

Answers

Answer:

option A

the internet of things is the network of devices with the ability to connect

The statement that is true regarding internet of things is it is the network of devices with the ability to connect and exchange data. The correct option is 1.

What is internet?

The Internet is a vast network that connects computers worldwide. People can share information and communicate via the Internet from any location with an Internet connection.

It enables effective communication to any part of the world via email and instant messaging.

It enhances business interactions and transactions while saving valuable time. Banking and shopping online have simplified life.

The use of the internet for education facilitates the sharing of information and communication.

It allows students to view lectures online and access relevant study material in a variety of multimedia formats.

Thus, the correct option is 1.

For more details regarding internet, visit:

https://brainly.com/question/13308791

#SPJ2

The Coins class was created to hold all your loose change, kind of like a piggy bank! For this exercise, you are going to simulate starting a bank with a specific number of coins, then adding to your piggy bank to bring your total to $2.12. What you need to do: Create a Coins object that initially has 4 quarters, 3 dimes, 2 nickels, and 1 penny. After you create the initial object, print out the total, then add coins to your bank until you have a total of 15 coins totaling 2.12. You will need to figure out which combination gets you to the correct total with the correct number of coins! When you are finished, call the method to print the bank count then the bank total to verify that you got the correct values.

Answers

Answer:

Coins c1 = new Coins (4, 3, 2, 1);

     c1.bankValue();

     c1.addQuarter();

     c1.addQuarter();

     c1.addDime();

     c1.addDime();

     c1.addPenny();

     c1.bankCount();

     c1.bankValue();

Explanation:

What is the author's purpose for writing this article? A to persuade readers to consider a career in aerospace engineering and at NASA B to caution readers about the difficulties that aerospace engineers encounter C to highlight the experiences of Tiera Fletcher growing up and as an aerospace engineer D to promote Tiera Fletcher's book and her nonprofit organization, Rocket With The Fletchers

Answers

Answer:

C to highlight the experiences of Tiera Fletcher growing up and as an aerospace engineer

Explanation:

Dream Jobs: Rocket Designer, a Newsela article by Rebecca Wilkins was written with the intent of informing the readers of how Tiera Fletcher developed a love for mathematics at an early age and further developed a desire to be a Space Engineer which she succeeded at. She highlighted the different steps she took before she realized her goal. Some of these steps included working as an intern in several space establishments and performing research.

Today, she is very successful in her career and hopes  that young ones can pursue a career in any STEM careers of their choice.

Answer:

c on newsella

Explanation:

what is an information technology? ​

Answers

Answer:

PLEASE BRAINLIEST

Explanation:

Information Technology means the use of hardware, software, services, and supporting infrastructure to manage and deliver information using voice, data, and video.

Answer:

Information technology is a subject that is the use of computers to store, retrieve, transmit and manipulate data or information, often in the context of business or other enterpise.

an email phishing attack results in ransomware, in which the files and folders on a computer are encrypted. what type of breach is ransomware?

Answers

Ransomware is a type of cyber breach known as a data confidentiality breach.

Ransomware is a malicious software that encrypts files and folders on a computer or network, making them inaccessible until a ransom is paid. It is considered a data confidentiality breach because it compromises the confidentiality of the victim's data by encrypting it and holding it hostage. The attacker gains unauthorized access to the victim's files, encrypts them with a strong encryption algorithm, and demands a ransom payment in exchange for the decryption key. Ransomware attacks can have severe consequences, including data loss, financial loss, and significant disruption to businesses or individuals. Preventing ransomware attacks involves implementing security measures such as regular backups, up-to-date software, and user awareness training.

To know more about Ransomware click here,

https://brainly.com/question/30166670

#SPJ11

Traceroute is the utility used in networks using_____
-based operating systems.

Answers

Answer:

Explanation:

Traceroute is a command that runs network diagnostic functionality on computer operating systems. operating system is used as an interface between computer hardware and user. In all computer system we need a operating system to run all the programs . The examples of operating system is Window2000 , Unix ,Linux , Mac.

What are the characteristics of:
Master file
Transaction file
Reference file

Answers

Master File :-Master files contain descriptive data, such as name and address, as well as summary information, such as amount due and year-to-date sales.

Transaction File :-Fast performance with a rapid response is critical. Organisations rely heavily on their TPS with failure possibly stopping business.

Reference File :-Information in one drawing can be overlaid on a different drawing, eliminating the need to redraw information. Proper use of reference files will result in significant time savings and greater coordination of drawings.

Explanation:

Hope it helps you!

Which of the following robots was considered by the industry as the first useful robot?

a. PLANETBOT
b. ASIMO
c. Colossus
d. AESOP

Answers

Answer:

I think its ASIMO. Though I am not fixed.

Explanation:

it is necessary to separate page numbers with a _____ when printing multiple pages of a document

A. Comma
B. Space
C. Period​

Answers

Answer:

A. Comma

Explanation:

In computer technology, a printer is an electronic output device (peripheral) that is used for the printing of paper documents (texts and images).

Generally, the standard text procedure for printing is to use sans-serif fonts for headlines and serif fonts for body text. This ultimately implies that, for any printed work such as novels, books, newspapers etc, it is a general rule for a printer to use sans-serif fonts for headlines and serif fonts for body text in order to enhance readability.

Also, it can be reversed in some instances by using a serif font for headlines and a sans-serif font for the body of a text.

Sometimes, when printing a document, an end user may wish to print multiple pages at a goal without any break. In order to achieve this, the user should enter the number of the pages while separating them with a comma in the print dialog box such as 1, 3, 15, 20.

Hence, it is necessary to separate page numbers with a comma when printing multiple pages of a document.

Additionally, you should use a comma for a non-sequential page (1, 3, 7, 15) and a dash for a sequential page (1-9) when printing multiple pages of a document.

Use a ________________ utility to reduce the size of a file so it takes up less storage space on a disk.

Answers

File compression utility is a tool that can be used to reduce the size of a file  it takes up less storage space on a disk.What is a file compression file compression utility is a software tool compress files into  smaller size.

This utility reduces the file size by applying various compression algorithms, which eliminates redundant data from the file. This makes the file easier to store, move, and distribute. In addition, when files are compressed, they take up less storage space, which is beneficial for those with limited storage capacity.

The following are some of the most popular file compression utilities:WinRAR7-ZipWinZipBandizipZipZipegFile compression utilities are used in a variety of industries, including technology, business, and gaming. These tools are useful for transferring large files.

To know more about File compression visit:

https://brainly.com/question/30225170

#SPJ11

50 POINTS
in Java
A palindrome is a word, phrase, or sequence that reads the same backward as forward, e.g., madam or nurses run.

In this program, ask the user to input some text and print out whether or not that text is a palindrome.

Create the Boolean method isPalindrome which determines if a String is a palindrome, which means it is the same forwards and backwards. It should return a boolean of whether or not it was a palindrome.

Create the method reverse which reverses a String and returns a new reversed String to be checked by isPalindrome.

Both methods should have the signature shown in the starter code.

Sample output:

Type in your text:
madam
Your word is a palindrome!
OR

Type in your text:
hello
Not a palindrome :(

Answers

import java.util.Scanner;

public class JavaApplication52 {

   public static String reverse(String word){

       String newWord = "";

       for (int i = (word.length()-1); i >= 0; i--){

           newWord += word.charAt(i);

       }

       return newWord;

   }

   public static boolean isPalindrome(String word){

       if (word.equals(reverse(word))){

           return true;

       }

       else{

           return false;

       }

   }

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       System.out.println("Type in your text:");

       String text = scan.nextLine();

       if (isPalindrome(text) == true){

           System.out.println("Your word is a palindrome!");

       }

       else{

           System.out.println("Not a palindrome :(");

       }

   }

   

}

I hope this works!

How is a game like Pokemon Go an example of Augmented reality

Answers

A game like Pokemon Go is an example of Augmented Reality (AR) because it combines the real world with virtual elements.

In the game, players use their mobile devices to locate and capture virtual creatures called Pokemon, which appear on the screen as if they are in the player's real-world location. This is achieved through the use of GPS technology and the device's camera, which overlays the virtual elements onto the real world.

As a result, players experience a seamless blend of the real and virtual worlds, which is the defining characteristic of Augmented Reality.

Learn more about Augmented reality:

https://brainly.com/question/22621708

#SPJ11

A game like Pokemon Go is an example of Augmented Reality (AR) because it combines the real world with virtual elements.

In the game, players use their mobile devices to locate and capture virtual creatures called Pokemon, which appear on the screen as if they are in the player's real-world location. This is achieved through the use of GPS technology and the device's camera, which overlays the virtual elements onto the real world.

As a result, players experience a seamless blend of the real and virtual worlds, which is the defining characteristic of Augmented Reality.

Learn more about Augmented reality:

brainly.com/question/22621708

#SPJ11

Assume that strike Counter has already been declared to be a "pointer to int". Assume further that strike Counter has been initialized -- its value is the address of some int variable. Write a statement that adds 22 to the value of the variable that strikeCounter is pointing to.

Answers

Answer:

The statement to this question can be defined as follows:

*strike_Counter =*strike_Counter +22;//adds  value 22 in *strike_Counter

Explanation:

In the given question, it is already defined, that "strike_Counter" is an integer pointer variable, which means, it only holds the integer value in its address memory.

In the next step, it is defined, that it adds the value "22" in its variable, and for this, we declare the statement in the answer section, which adds the value.  

for example, if in the "strike_Counter" variable holds the integer value, that is 5 and after adding the 22 it will become 27.    

A _____ standard describes the requirements for obtaining a domain name for use by external parties?

Answers

A DNS control standard describes the requirements for obtaining a domain name for use by external parties.

What is a domain name?

A domain name is a name that is easy and easy to remember. The name is used for online websites for companies or vlogs that contain an IP address on the internet. It is like the street address.

The DNS control system is a system that is used by every domain name user. It controls how visitors would see the website and how they will receive emails.

Thus, the standard requirement for obtaining a domain name is the DNS control standard.

To learn more about the domain name, refer to the below link:

https://brainly.com/question/3044569

#SPJ1

Lionel is a director working on a children's video. He's finding it difficult to manage so many young actors. What should Lionel do to free himself for other creative work?

Answers

Answer:

Explanation:

There are two things that Lionel can do in order to free himself. One of which would be to create a program that automates the management process of the young actors, such as scheduling them, payments, rehearsals, etc. Anything that Lionel would have to spend time on to do that does not require face to face communication can be automated, thus saving him time. The second thing that Lionel can do is to limit his workday with the children, therefore leaving more time in the day to pursue other creative work.

To create a datasheet that lists all herbs that are Perennials, Jorge will create a new query. The Perennial field has a data type of Yes/No. Which criterion should Jorge use in the query for the Perennial field

Answers

The criterion that Jorge should use in the query for the Perennial field is Yes

What is a Datasheet?

This refers to the document that summarizes the product specifications and other necessary details of the project.

Hence, we can see that Jorge has created a database for the herb garden he is planting this spring.

The fields in the database include Plant Name, When to Plant, Amount of Sun, Annual, and Perennial.

Therefore, the criterion that Jorge should use in the query for the Perennial field is Yes

Read more about datasheets here:

https://brainly.com/question/27362402

#SPJ1

In the case above, to create a datasheet that lists all herbs that are Perennials, Jorge will create a new query. The Perennial field has a data type of Yes.

What means datasheet?

A datasheet is known to be a kind of a document that is known to be often printed or electronic that gives a kind of a details in regards to a product, such as a computer, computer component, and others.

Note that  the datasheet is made up information that can be used to be able to make a buying decision about a product or services by giving technical specifications in regards to the product.

Hence the response is yes, In the case above, to create a datasheet that lists all herbs that are Perennials, Jorge will create a new query. The Perennial field has a data type of Yes.

See full question below

Jorge has created a database for the herb garden he is planting this spring. Fields in the database include: Plant Name, When to Plant, Amount of Sun, Annual, and Perennial. He needs to answer the following questions using his database.Which plants need full sun?Which plants are Perennials? To create a datasheet that lists all herbs that are Perennials, Jorge will create a new query. The Perennial field has a data type of Yes/No. Which criterion should Jorge use in the query for the Perennial field?

Learn more about Perennial field from

https://brainly.com/question/9465492

#SPJ1

What is a blank workbook?

Answers

A workbook is a file that contains one or more worksheets to help you organize data. You can create a new workbook from a blank workbook or a template

ransomware is typically introduced into a network by a ________ and to an individual computer by a trojan horse.

Answers

The following term can complete the given sentence, "ransomware is typically introduced into a network by a ________ and to an individual computer by a trojan horse" - vulnerability.

Ransomware is a type of malicious software that locks users out of their devices and data. This software aims to demand a ransom from victims by encrypting the files on their computers or by preventing them from accessing the system.

These attacks are a popular way for cybercriminals to profit because they are relatively easy to carry out, and the ransom can be paid anonymously through digital currencies such as Bitcoin.

Ransomware is usually introduced into a network by exploiting vulnerabilities in software or operating systems. Once a vulnerability is identified, ransomware is often delivered via email attachments, malicious downloads, or through infected websites.

Once it infects a computer, ransomware can quickly spread through a network, encrypting files and locking users out of their systems.

A Trojan horse is a type of malware that is designed to trick users into downloading it onto their computers. It typically arrives as an email attachment or as a link to a malicious website.

Once it is downloaded, the Trojan horse can perform a variety of tasks, such as stealing sensitive information, downloading other malware, or giving a remote attacker control over the infected computer.

To know more about vulnerability visit:

https://brainly.com/question/30296040

#SPJ11

What voting rights law did you choose?

Answers

Answer:

FREE AND FAIR ELECTION

Answer:

I Dont even know.. to be honest

Explanation:

In Prolog, you can Group of answer choices never use a variable more than once assign a value to a variable modify a variable that has been initialized none of the above

Answers

In Prolog, you can assign a value to a variable and modify it later, but you should never use a variable more than once in a single query.

This is because Prolog follows a logical programming paradigm where each variable represents a unique value or entity. Reusing a variable can lead to unexpected results and logical inconsistencies.

When you assign a value to a variable in Prolog, it creates a binding between the variable and the value. You can then use this variable to query the knowledge base and retrieve information based on the assigned value. If needed, you can also modify the value of a variable by reassigning it.

However, it is important to note that once a variable is assigned a value, it cannot be changed within the same query. Prolog evaluates queries by unifying variables with their assigned values and finding solutions based on these bindings. Reusing a variable within the same query can disrupt this unification process and produce incorrect results.

In summary, in Prolog, you can assign values to variables and modify them, but you should never use a variable more than once in a single query to maintain logical consistency and obtain accurate results.

To learn more about value:

https://brainly.com/question/30145972

#SPJ11

What is Relational Computerized Database

Answers

Answer:

Relational computerized database uses tables and columns to store data. each table is composed of records and each record is tied to an attribute containing a unique value. This helps the user use the data base by search query and gives the opportunity to build large and complex data bases

Other Questions
a waterbed heater uses 450 w of power. it is on 35 % of the time, off 65 % . part a what is the annual cost of electricity at a billing rate of $0.13 per kwhr ? express your answer using two significant figures. While the composition of oxygen and nitrogen in air does not change with altitude, the decreasing temperature at high altitude does change the percent of air that is composed of H2O. Assuming constant relative humidity, which of the following can be asserted about the total grams of H2O in a given volume of air at 3000 m above sea level versus at sea level?A. Assuming constant relative humidity means that air has roughly the same mass of H2O per unit volume at 3000 m above sea level.B. Whether air at very high altitude has more or less mass of H2O per unit volume than it does at sea level depends on the temperature at high altitude.C. Air has significantly more mass of H2O per unit volume at 3000 m above sea level.D. Air has significantly less mass of H2O per unit volume at 3000 m above sea level. Consider the following.x = 2 cos(theta), y = sec2(theta), 0 theta Use Euler's Method with a step size of h0.1 to approximate y(0.3) where y(x)is a solution to the initial given value problem:y=(xy)2 given y(0)=0.5 recalling the names of the members of a famous football team is an example of _____. Suppose you live in a CAPM world. Market efficiency means:Todays price do not reflect yesterdays informationStock market return should be equal to bond market returnAll stocks should have the same expected returnsHigh beta assets return should be higher than riskless assets return Read the excerpt from Grendel. How is Grendel characterized in this excerpt? please help fast I am baffled Samir's statement shows a previous balance of $5,336.22, a payment of $607, and anew transaction totaling $186. What is his new balance if his APR is 29.0%? Roundanswer to hundredths place if answer does not have a hundredths place this usezeros so it does. Do not include the units. Be sure to attach work for creditYour Answer: What is an abstraction? Why is abstraction important as part ofcritical thinking?What is decomposition? Why is decomposition is important aspart of critical thinking? European and american put and call options on Glaxo pharmaceuticals with an exercise price of $75 and expiring in 120 days are trading on the chicago board of options exchange. Glaxo stock is currently priced at $80 and will not make any dividend or cash payments during the life of the options. We are given that the risk free rate is 7% and the volatility (sigma) of the underlying stock returns is 30%. Assume continuous compunding. Also assume that there are 365 days in a year.1. Determine the fair price for a european put option (on Glaxo) via backward induction using the 3 step binomial model a researcher compares the effectiveness of two different instructional methods for teaching anatomy. a sample of 116 students using method 1 produces a testing average of 50.3. a sample of 151 students using method 2 produces a testing average of 68.6. assume that the population standard deviation for method 1 is 15.62, while the population standard deviation for method 2 is 17.21. determine the 99% confidence interval for the true difference between testing averages for students using method 1 and students using method 2. step 3 of 3 : construct the 99% confidence interval. round your answers to one decimal place. HW4: Problem 8 (1 point) Take the Laplace transform of the following initial value and solve for Y(s) = L{y(t)}: = g" + 1g = sin(Tt)0 An airplane weighs 41,000 kg. How long will it take the airplane to travel 10,924 km to Rome, Italy if the plane flies at 988 km/hr? societies that encourage racial and ethnic diversity have embraced the value of: 1. Discuss FIVE methods of maintenance and preservation of purecultures.2. Briefly describe the characteristics of Salmonellae anddevise a simple laboratory method you can use to isolate andidenti what is a quote form Isabel in the book refugee TRUE/FALSE. When glucose is broken down in a cell, all of the energy it stores is released simultaneously, not in a stepwise process. Use a business periodical or the Internet to determine how the value of the foreign currency of concern has changed in each of the last five weeks. Does it appear that there is a trend over the last five weeks? What is the mean percent-age change over these weeks? (yuan currency chosen) The ancient Greeks told myths to better understand events, like disasters, and to teach people from right and wrong, like the danger of arrogance and pride.true or false ?