Krashen uses the formula i 1 to explain comprehensible input. in this formula, 1 refers to:______

Answers

Answer 1

Krashen uses the formula i+1 to explain comprehensible input. In this formula, 1 refers to the level of language which is slightly more advanced than the current level.

What is Krashen's theory of comprehensible input?

Krashen's theory of comprehensible input illustrates that second language learners require to be exposed to linguistic input that is just slightly above their current language level so that they can easily understand the new input.

In this formula of comprehensible input, "i" represents the person's current language level. This learning hypothesis reveals the acquisition of language which is slightly different from the actual learning language.

Therefore, in the formula of comprehensible input, 1 refers to the level of language which is slightly more advanced than the current level.

To learn more about Krashen's theory, refer to the link:

https://brainly.com/question/13054811

#SPJ1


Related Questions

Who is responsible for the actions of autonomous systems? (please help me :C)

Answers

The responsibility for failures was deflected away from the automated parts of the system (and the humans, such as engineers, whose control is mediated through this automation) and placed on the immediate human operators, who possessed only limited knowledge and control.

Ohio university college

Jacob wants to introduce a new game to Andres where they can challenge each other's skills and add other players to compete. This game, called "Words with Friends", can also be played via social media and its objective is to see who is the smartest and fastest at creating words out of random letters. What role does this game have in today's society?
A. Recreation
B. Education
C. Therapy
D. Social Networking

Answers

La respuesta es C Therapy

This game, called "Words with Friends", can also be played via social media and its objective is to see who is the smartest and fastest at creating words out of random letters, the role does this game have in today's society is therapy. Thus option C is correct.

what is social media ?

A social media can be defined  as the sharing of interesting content and important information by different strategy plans through electronic devices such as computers or phones.

The primary feature  of social media include the easiness of access and the speed the sharing the content is fast with each other, it was introduced in  in the early 70s.

A good social media is defined as if it make a good content strategy  focusing on actively delivering contents like infographics, blog posts, videos, images etc of an individual  through the use of an effective channel.

Learn more about social media, on:

brainly.com/question/18958181

#SPJ2

What is a manual that contains standards for the design and writing of documents?

Answers

A Style Guide is a manual that contains standards for the design and writing of documents.

What is Documents?

Documents are written or printed materials that provide information or evidence. They are used for a variety of purposes, including providing legal proof of transactions, recording business activities and actions, and preserving history. Documents may contain text, images, audio, or video, and may be stored in physical or digital formats. Documents can also be used to create a written record of agreements, contracts, or other legally binding documents.  Documents are important for providing evidence or proof of anything, and are essential for many businesses, organizations, and governments.

To know more about Documents
https://brainly.com/question/1218796
#SPJ4

Select the correct answer.Priyanka wants to send some important files to her head office. Which protocol should she use to transfer these files securely?A.HTTPB.FTPSC.FTPD.DNS

Answers

Answer: FTP

Explanation: FTP stands for file transfer protocol.

Which of the following behaviors does not harm a company if your employment is terminated?
A. getting a copy of word-processing software before leaving
B. selling trade secrets to competing companies or to your future employer
C. creating a username and password so you can access company information after you have left
D. notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave

Answers

Answer:

Notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave.

Answer:

its D

Explanation:

took the test

write aQbasic program to find simple interest,time ,rate principal using go to function. don't use any ai.​

Answers

Here is a sample program in QBasic that calculates simple interest using the GOTO function:

The QBasic Program

CLS

INPUT "Enter Principal amount: ", P

INPUT "Enter Rate of interest: ", R

INPUT "Enter Time in years: ", T

SI = P * R * T / 100

PRINT "Simple Interest = $"; SI

GOTO END

END:

END

This program takes inputs for the principal amount (P), the rate of interest (R), and the time in years (T).

It then calculates the simple interest using the formula SI = P * R * T / 100 and prints the result. Finally, the program jumps to the end using the GOTO END statement.\

Read more about Qbasic here:

https://brainly.com/question/20727977

#SPJ1

mr. keely stole pin number of ms jones credit card and has been using for buying expensive items. the credit card company calls mr. keely to confirm a $15000 purchase. mr. keely denied ever making that purchase. which of the following most likely technique credit card company a. neural network b. fuzzy logic c. expert system d. a dss

Answers

The technique used by credit card companies based on the above case, where the company calls Mr. Keely who uses stolen pin numbers to buy many things is called an expert system (C).

What is an expert system?

An expert system replicates human capability in making decisions. It automatically detects any activity, controls it and performs action based on previously programmed steps. An expert system is part of artificial intelligence which emulates human experts in decision making. This system is designed to solve more complex problems than the conventional system does. Expert system is considered the first successful form of artificial intelligence which was created first in the 1970s.

Learn more about artificial intelligence https://brainly.com/question/25523571

#SPJ4

This is for career exploration, I need help please! <3 HELPPPP
Grant and Cara are coworkers at a design firm. Grant is so good at his job that he does not like to listen to the opinions of others. Cara is not as experienced as Grant and it takes her a little bit longer to complete design tasks, but she is a good listener and tries to make changes that her co-workers suggest. Which person would you rather work with? Give two reasons for your answer. Why might co-curricular, extra-curricular, career preparation, or extended learning experiences have been important in helping prepare the person you chose to have those qualities that are desirable in the workplace?

Answers

Answer: cara.

Explanation:  i would pick cara because she would listen to you better and Luke try her best to get what you want!

Answer:

CARA

Explanation:

1.  I would rather work with Cara because she would listen to me and understand me that in my opinion is a good co worker

You need to identify the manufacturer of a network interface. Where will you look for this information?
A. The first three octets of a Media Access Control (MAC) address
B. The last octet of a Media Access Control (MAC) address
C. The first octet of a Media Access Control (MAC) address
D. The fourth octet of a Media Access Control (MAC) address

Answers

The answer is C. The first octet of a Media Access Control MAC address.

It can be used to determine a network interface's maker. This is due to the fact that the OUI (Organizationally Unique Identification), which is granted to manufacturers by the IEEE, is the first three octets of a MAC address (Institute of Electrical and Electronics Engineers). The organizationally unique identifier is this (OUI). The network interface's maker is specifically identified by a 24-bit identifier called the OUI. You can discover who made the network interface by looking up the OUI in a database. The first three octets of a network interface's Media Access Control MAC address can be used to determine the network interface's maker.

Learn more about MAC here:

https://brainly.com/question/29670807

#SPJ4

why is the pc showing the same display on two monitors

Answers

\(Answer:\)

Your computer is set to that by default. If you want the display to be separated, see what you can find in your settings\(.\)

If that doesn't work, try to find some reliable help on a browser search.

Encryption can be applied on a file, a folder, or an enitre hard disk and provide a strong level of protection.
a. true
b. false

Answers

The given statement "Encryption can be applied on a file, a folder, or an entire hard disk and provide a strong level of protection" is true.

Encrypting File System provides an added layer of protection by encrypting files or folders on various versions of the Microsoft Windows OS. EFS is a functionality of New Technology File System (NTFS) and is built into a device via the OS. It facilitates file or directory encryption and decryption with the help of complex cryptographic algorithms.

Encryption can be used to protect all of the above by using a secure algorithm to scramble data into an unreadable format. Files, folders, and hard disks can all be encrypted to prevent unauthorized access.

Therefore, the given statement is true.

Learn more about the Encryption here:

https://brainly.com/question/30225557.

#SPJ4

A __________network is useful for connecting a small network. campus area local area wide area system area

Answers

WLAN (Wireless Local Area Network) helps you to link single or multiple devices using wireless communication within a limited area like home, school, or office building.

What is communication ?

It is said that communication is "an apparent remedy to the unpleasant divisions between self and other, private and public, and inner thought and outer world" (from the Latin communicare, meaning "to share" or "to be in relation with").

As this definition makes clear, it is challenging to consistently define communication because, in everyday usage, the term refers to a very broad spectrum of various behaviors involved in the spread of information. According to John Peters, the challenge in defining communication arises from the fact that it is both a universal phenomenon (because everyone communicates) and a distinct academic profession with institutionalized research.

To learn more about communication from the given link:

brainly.com/question/26152499

#SPJ4

How is a procedure different than a function?

Answers

Answer: A procedure is used to perform certain task in order.

I don’t want you going back and to send it back and to do the other things that you are going yyt I don’t think gonna was the

2. What changes, if any, could Lisa make to her income?
Ramsey classroom

Answers

Answer: what changed if any could lisa make to her income

Explanation:

a multicast subscription is made between two dante devices. the latency value of the transmitter and receiver are 0.25msec and 0.5msec, respectively. what is the resulting latency of this stream?

Answers

A Dante device's average default delay is 1 ms. This is enough for a very big network that consists of 100 megabit lines to Dante devices and a gigabit network core (with up to 10 hops between edge switches).

The term "latency" refers to the minute amount of time (10 milliseconds in the case of Dante Via) that is added to each audio stream. Via may 'packetize' the audio from the source and send it across the network to the destination before it is scheduled to be played out thanks to the minor delay. Audio and control are combined into one potent network because computer control and recording signals go over the same connections as the audio data.

Learn more about network here-

https://brainly.com/question/13102717

#SPJ4

in an entity-relationship model, entities are restricted to things that can be represented by a single table true false

Answers

The given statement "In an entity-relationship model, entities are restricted to things that can be represented by a single table". This statement is true because it is method of representation.

What is an entity-relationship model?

An entity-relationship model is a method for graphically representing the relationships between different entities in a database or information system.

The ER model's purpose is to help database developers to recognize the relationships between various entities and create databases that follow the rules.

An entity is a person, location, event, concept, or object about which data can be stored. Relationships depict how entities are related to one another. Attributes are characteristics or features of an entity.

When creating an ER diagram, entities are represented by rectangles, attributes by ovals, and relationships by lines connecting the entities. In summary, entities are the building blocks of an ER model.

Entities in an ER model are restricted to things that can be represented by a single table. This is because a single table can only represent one type of entity. The ER model's main purpose is to reduce data redundancy and make data retrieval more efficient. If an entity can be represented by a single table, there would be no need to divide it into multiple tables.

Learn more about entities here:

https://brainly.com/question/14986536

#SPJ11

vendor builds multiple types of tablet computers. Each has a type identification number and a name. The key specifications for each type include amount of storage and display type. The company uses multiple processor types, exactly one of which is used for a specific tablet type. The same processor can be used in multiple types of tablets. Each processor has a manufacturer and a manufacturer's unique code that identifies it.

Answers

Answer:

ARM processor

Explanation:

The processors can be shared across different tablet types and are characterized by a manufacturer and a unique code.

How does the company assign processors to tablet types?

The company assigns processors to different tablet types based on their specific requirements. Each tablet type is associated with exactly one processor, chosen from the available options.

This ensures that the tablets are equipped with processors that meet their performance and compatibility needs. Multiple tablet types may utilize the same processor if it satisfies their respective specifications. The processors themselves are identified by their manufacturer and a unique code, allowing for easy identification and tracking within the company's inventory and production systems.

Read more about processors

brainly.com/question/614196

#SPJ2

What is a decision tree

Answers

A decision tree is a diagram or chart that people use to determine a course of action or show a statistical probability.

What is the missing line of code?
>>> sentence = "Programming is fun!"
>>>
'gr
O sentence[3:6)
O sentence[2:6)
sentence(3:5)
O sentence[2:5)

Answers

Answer:

sentence [3:5]

Explanation:

What is the missing line of code?&gt;&gt;&gt; sentence = "Programming is fun!"&gt;&gt;&gt;'grO sentence[3:6)O

The missing line of code is sentence(3:5) in the given code which is the correct answer would be an option (C).

What is the programming language?

A programming language is a collection of grammatical rules and a vocabulary for instructing a computer or processing equipment to do assigned duties. High-level languages like as BASIC, C, C++, COBOL, Java, FORTRAN, Ada, and Pascal are commonly referred to as programming languages.

Every programming language has a distinct collection of keywords (words that it recognizes) and a distinct syntax for structuring application programs.

According to the given question,

We have been given the code:

>>> sentence = "Programming is fun!"

>>>

'gr

Here, the missing line of code is sentence(3:5) in the above code.

Therefore, the correct answer would be an option (C).

To learn more about the programming language click here :

https://brainly.com/question/23959041

#SPJ2

_____________ is a Windows tool that can scan the system memory at the booting time.

Answers

The Windows tool that can scan the system memory at booting time is known as Windows Memory Diagnostic. It is a built-in tool that comes with Windows operating systems and is designed to test and diagnose problems.

A desktop operating system would most likely be used on a laptop computer. A desktop operating system is the kind of operating system that is most likely to be found on a laptop computer. Smartphones and tablets often run mobile operating systems,

The Windows Memory Diagnostic tool starts automatically when a machine is turned on without the need for any further preparation. It checks the system memory for any problems that can lead to instability or crashes, like faulty RAM or damaged data.

By hitting the F8 key during bootup and choosing the "Windows Memory Diagnostic" option from the advanced boot menu, the Windows Memory Diagnostic tool can be launched. It is an effective tool for identifying and resolving issues with the system memory.

Learn more about operating systems here

https://brainly.com/question/31551584

#SPJ11

What is a special kind of block that can only give two responses?
A.
forever block
B.
conditional block
C.
loop block
D.
Boolean value

Answers

Answer:

A. forever block

Explanation:

u dont need a explaination

where are mainframe computers mainly used for​

Answers

They are usually used as servers on the World wide web.

They are also used in large organisations such as banks,airlines and universities.

They are also used for census.

Explanation:

They are larger in size,have high processing speed and larger storage capacity.

Answer:

Mainframes have been used for such applications as payroll computations, accounting, business transactions, information retrieval, airline seat reservations, and scientific and engineering computations.

You selected and copied worksheet data containing formulas. However, you want the pasted copy to contain the current formula results rather than formulas. What do you do?.

Answers

If you have selected and copied worksheet data containing formulas, however, you want the pasted copy to contain the current formula results instead of formulas, then you can follow these steps to do that in Microsoft Excel: To copy only the values and not the formulas, you can use the Paste Special command.

After you copy the cell range that contains formulas, right-click the destination cell range and then select Paste Special from the context menu. Next, click Values in the Paste Special dialog box and then click OK. This will paste the cell range values and remove the formulas from the pasted cell range.

Tip: You can also use the keyboard shortcut keys, Ctrl + Alt + V, to display the Paste Special dialog box, and then select Values from the list of available options.

To know more about worksheet data visit:

https://brainly.com/question/30626579

#SPJ11

which command rebuilds the boot sector for the active system partition?

Answers

The command that rebuilds the boot sector for the active system partition is "bootrec /fixboot". This command is useful in cases where the boot sector has been corrupted or damaged, preventing the computer from booting up properly.In order to use the "bootrec /fixboot" command,

follow these steps:1. Insert the Windows installation media and boot from it.2. Choose the language and other preferences, and click on the "Next" button.3. Click on the "Repair your computer" option at the bottom-left corner of the screen.4. Select the operating system you want to repair, and click on the "Next" button.5. Choose the "Command Prompt" option from the list of repair options.6. Type in the command "bootrec /fixboot" and press the Enter key.7. Wait for the command to complete, and then restart the computer. This should fix any issues with the boot sector and allow the computer to boot up normally again.

Note that the "bootrec /fixboot" command should only be used as a last resort, after trying other troubleshooting steps such as running a virus scan or repairing the Master Boot Record (MBR). It should also be used with caution, as an incorrect command or typo could cause further damage to the system.

To know more about command visit:

https://brainly.com/question/32329589

#SPJ11

which method call would print the items in a perfect size array? assume shoppinglist is a perfect sized array, and printitems is a function that printsa.printitems(shoppinglist, listsize);b.shoppinglist

Answers

The method call that would print the items in a perfect size array is a. `printitems(shoppinglist, listsize)`.

Given that shoppinglist is an array that is of a perfect size and print items is a function that prints. So, the call to printitems function will print the contents of shoppinglist which are of a perfect size. Below is the detailed explanation; We are given that the array shoppinglist is of a perfect size. We are also given that there is a function named printitems which prints items. And finally, we are given two options:a. `printitems(shoppinglist, listsize);`b. `shoppinglist`The option that would print the items in a perfect size array is option a `printitems(shoppinglist, listsize);`. This is because the printitems() function takes two parameters, the first is the array shoppinglist which contains the items to be printed and the second is listsize which specifies the size of the array. Since shoppinglist is already of the perfect size, we can just pass it along with its size to the printitems() function and it will print the contents of the array. Therefore, option a is the correct option.

Learn more about Array here:

https://brainly.com/question/31605219

#SPJ11

What statement indicates which variable to sort by when using a proc sort step? select one: a. out b. by c. proc sort d. data e. data = f. run g. out =

Answers

A statement which indicates which variable to sort by when using a PROC SORT step is:  b. by.

What is SAS?

SAS is an abbreviation for Statistical Analysis System and it can be defined as a statistical software suite which was developed at North Carolina State University by SAS Institute for the following field of study:

What is a PROC SORT?

In Statistical Analysis System, a PROC SORT can be defined as a function which is typically used to replace an original data set with a sorted data set, especially based on a variable.

Read more on Statistical Analysis and PROC SORT here: https://brainly.com/question/18650699

#SPJ1

Once a business determines that change needs to occur, what ahould the
business create?
A. Business operation
B. Business analysis
C. Business model
D. Business strategy

Answers

Answer:

D. Business strategy

Explanation:

Kono Dio Da!!

please convert this for loop into while loop

please convert this for loop into while loop

Answers

Answer:

The code segment was written in Python Programming Language;

The while loop equivalent is as follows:

i = 1

j = 1

while i < 6:

     while j < i + 1:

           print('*',end='')

           j = j + 1

     i = i + 1

     print()

Explanation:

(See attachment for proper format of the program)

In the given lines of code to while loop, the iterating variables i and j were initialised to i;

So, the equivalent program segment (in while loop) must also start by initialising both variables to 1;

i = 1

j = 1

The range of the outer iteration is, i = 1 to 6

The equivalent of this (using while loop) is

while ( i < 6)

Not to forget that variable i has been initialized to 1.

The range of the inner iteration is, j = 1 to i + 1;

The equivalent of this (using while loop) is

while ( j < i + 1)

Also, not to forget that variable j has been initialized to 1.

The two iteration is then followed by a print statement; print('*',end='')

After the print statement has been executed, the inner loop must be close (thus was done by the statement on line 6, j = j + 1)

As seen in the for loop statements, the outer loop was closed immediately after the inner loop;

The same is done in the while loop statement (on line 7)

The closure of the inner loop is followed by another print statement on line 7 (i = i + 1)

Both loops were followed by a print statement on line 8.

The output of both program is

*

*

*

*

*

please convert this for loop into while loop

External hard drives typically connect to a computer via an external port (such as a usb or ____ port) or a wireless connection.

Answers

External hard drives typically connect to a computer via an external port (such as a USB or thunderbolt port) or a wireless connection.

What is a hard drive?

A hard drive can be defined as an electro-mechanical, non-volatile data storage device that is made up of magnetic disks (platters) that rotates at high speed.

In Computer technology, all hard drives are commonly installed on computers and other digital service for the storage of digital files and to enable the booting of a computer through its operating system (OS).

What is a memory?

A memory can be defined as a terminology that is used to describe the available space on an electronic device that is typically used for the storage of data or any computer related information such as:

ImagesVideosTextsMusicCodesFolders

In conclusion, all external hard drives typically connect to a computer through an external port such as a USB, thunderbolt port, or a wireless connection.

Read more on hard drive here: brainly.com/question/26382243

#SPJ1

if not managed properly, certificate and key management can represent a critical vulnerability. assess the following statements about key management and select the true statements. (select all that apply.)

Answers

if not managed properly, certificate and key management can represent a critical vulnerability. The statements about key management that are true statements are B and C:

B. It is exponentially more difficult to ensure the key is not compromised with multiple backups of a private key.C. If a private key, or secret key, is not backed up, the storage system represents a single point of failure.

What is management of certificates and keys?

On the Sun Secure Application Switch system, you can create, manage, and store cryptographic keys and certificates using the Certificate and Key Manager (CKM) utility.

The difficulty of creating multiple backups of a private key is a drawback of key storage. To make sure that the key is not compromised in this circumstance is exponentially more challenging.

A key that is not backup is a single point of failure. A lost key can be recovered by using a method called "key recovery" to backup keys and/or decrypt data.

A compromised key that is only used for signing can be discarded and a new key generated. An encryption key cannot be readily destroyed. The encrypted data must first be retrieved. Both of the private key's intended uses—to encrypt and sign a document—are jeopardized if it is stolen.

Learn more about  certificate and key management from

https://brainly.com/question/28140084
#SPJ1

See full question below

If not managed properly, certificate and key management can represent a critical vulnerability. Assess the following statements about key management and select the true statements. (Select all that apply.)

A. If a key used for signing and encryption is compromised, it can be easily destroyed with a new key issued.

B. It is exponentially more difficult to ensure the key is not compromised with multiple backups of a private key.

C. If a private key, or secret key, is not backed up, the storage system represents a single point of failure.

D. The same private key can securely encrypt and sign a document.

Other Questions
what did the constitution replace as our governing document in the united states? Find the midpoint of the line segment with the endpoints A and B.A(8.10), B(6,4) 5. What is the value of the expression[(29 + 18) + (17 - 8)] = 8? What is one way to make connections during a formal discussion?keep all research notes handyadd new ideas that relate to the topiclean toward the speaker or sit up straightspeak clearly and present ideas carefully A quadrilateral has two angles that measure 130 and 115. The other two angles are in a ratio of 6:17. What are the measures of those two angles? Introduction, acceptance, buy, arrest, covering of the informant, and after action are common steps ofA. an undercover operation.B. a surveillance.C. a criminal investigation.D. criminal intelligence. A situation in which a person has unlimited wants but limited resources tofulfill those wants is calledA. socialismB. specializationC. scarcityD. entrepreneurship the boss ........was with the new employee over his qualifications and ability to perform his job well If I am trying to analyze which of a companys resources and capabilities and driving their competitive advantage, which analytical technique should I use?a. Porters Diamond Frameworkb. Porters 5 Forces Analysisc. VRIN Analysisd. Financial Strategic Analysise. Any kind of Competitive Analysis the assets and liabilities of a company are $88,819 and $45,074, respectively. stockholders' equity should equal An atom has an electron configuration of: 1s2 2s2 2p6 3s2 3p6 4s2 3d5. How many total electrons exist in the 4th energy level which of the following could be "breakthrough opportunities" for a candy company? (check all that apply.) How to do a storyboard that illustrates how a bill becomes a law in the US Congress. The storyboard should include at least six panels with an illustration and explanation of each of the steps in the process Which bank does not charge at all for using the ATM?Bank ABank BBank CBank DANSWER : Bank A Two ways water and ice are the same A copper atom has an atomic number of 29 and an atomic mass of 64. Whatis the structure of this atom?A. It has a central nucleus composed of 29 protons and 29 neutrons,surrounded by an electron cloud containing 35 electrons.B. It has a central nucleus composed of 29 protons and 64 neutrons,surrounded by an electron cloud containing 29 electrons.O C. It has a central nucleus composed of 35 protons and 29 neutrons,surrounded by an electron cloud containing 29 electrons.D. It has a central nucleus composed of 29 protons and 35 neutrons,surrounded by an electron cloud containing 29 electrons. 1 Select the correct text in the passage. Lyric poems often express intense feelings. Which two pairs of lines in "Lift Every Voice and Sing" express hope? Lift Every Voice and Sing by James Weldon Johnson Lift every voice and sing Till earth and heaven ring, Ring with the harmonies of Liberty; Let our rejoicing rise High as the listening skies, Let it resound loud as the rolling sea. Sing a song full of the faith that the dark past has taught us, Sing a song full of the hope that the present has brought us, Facing the rising sun of our new day begun Let us march on till victory is won. Stony the road we trod, Bitter the chastening rod, Felt in the days when hope unborn had died; Yet with a steady beat, Have not our weary feet Come to the place for which our fathers sighed? We have come over a way that with tears has been watered, We have come, treading our path through the blood of the slaughtered, Out from the gloomy past, Till now we stand at last Where the white gleam of our bright star is cast. God of our weary years, God of our silent tears, Thou who has brought us thus far on the way; Thou who has by Thy might Led us into the light, Keep us forever in the path, we pray. Lest our feet stray from the places, our God, where we met Thee, Lest, our hearts drunk with the wine of the world, we forget Thee; Shadowed beneath Thy hand, May we forever stand. True to our God, True to our native land. the unit rate of 2/5 yard in 4/3 seconds What are the primary elements that make up the Earth's atmosphere?A.nitrogen, oxygen, and argonB.oxygen and hydrogenC.carbon, nitrogen, and heliumD.oxygen and helium 16. if the 98onfidence limits for the population mean are 73 and 80, which of the following could be the 95onfidence limits? a. 73 and 81 b. 72 and 79 c. 72 and 81 d. 74 and 79