write a program to read in three nonnegative integers from the keyboard. Display the integers in increasing order.

Answers

Answer 1

Final answer:

To display nonnegative integers in increasing order, you can use a sorting algorithm like selection sort.

Explanation:

To write a program that reads in three nonnegative integers from the keyboard and displays them in increasing order, you can use a sorting algorithm such as selection sort. Here's an example in Python:

# Read in three integers from the keyboard

num1 = int(input('Enter the first integer: '))

num2 = int(input('Enter the second integer: '))

num3 = int(input('Enter the third integer: '))

# Create a list with the three integers

numbers = [num1, num2, num3]

# Sort the list in increasing order

numbers.sort()

# Display the integers in increasing order

print('Integers in increasing order:', numbers)

This program prompts the user to enter three integers, creates a list with those integers, sorts the list in increasing order, and finally displays the integers in increasing order.


Related Questions

Juan's web server was down for an entire day last september. It experienced no other downtime during that month. Which one of the following represents the web server uptime for that month?
A. 96.67%
B. 3.33%
C. 99.96%
D. .04%

Answers

Answer: A- 96.67%

Explanation: Juan's web server was down for an entire day last September.

The web server up time for the month of September is 1/30=0.0333 which is one day out of the 30 days in the month.

Therefore 1-0.0333= 0.96667 *100 = 96.67%

A technician looks at a motherboard and sees a 24-pin connector. What component would connect to the motherboard through the use of this 24-pin connector?

Answers

Power supply connects to the motherboard through the use of the 24 pin connector.

Explanation:

Power supply

is an electrical devicesource of it come from electrical gridability to convert different form of energy (solar, mechanical & chemical) to electrical energyConverts main AC voltage to low-voltage current3 types - linear voltage, switch, unregulatedIt is also called PSU unit (Power supply unit)have to protect from over current, high voltage, etcMandatory for laptop to charge and use later

"Power supply" would connect to the motherboard through the utilization of 24-pin connector. A complete explanation is below.

A device which thus provides electricity to something like a load, would be considered as Power Supply.All power supplies have always had an influencing input connections which thus accepts energies from a source for the production of a wide range of electronic phenomena, and one or more peak power connectors that send current to such loads.

Thus the above response is right.

Learn more:

https://brainly.com/question/3158552

What type of object is a GUI widget the user can click to select an option, and allows for any number of these objects to be selected at the same time?

Answers

Answer:

Checkbox

Explanation:

I remember this question.

If you were investigating login issues on a Windows computer, which portion of the Event Viewer logs would be a good place to start your investigation?

Answers

Answer:

If we are investigating login issues then we have to start with 'security logs' in 'windows logs' portion of Event viewer.

Explanation:

Much information about login issues is contained in log files which are related to security because it is mostly security issue. Some it is also better to start with 'system logs' portion of windows logs portion of Event viewer when there may be system problems instead of security issues. But in most cases there is security issues so 'security logs' is better option overall

Final answer:

To investigate login issues on a Windows computer, start by checking the Security logs in the Event Viewer, as they record security-related events including login attempt details.

Explanation:

If you were investigating login issues on a Windows computer, a good place to start your investigation would be the Security logs in the Event Viewer. The Security logs, which are part of the Windows Logs category, record security-related events such as valid and invalid login attempts as well as events related to resource use like file operations and user management. By examining the details contained within these logs, you can identify patterns or anomalies that may indicate what is causing the login issues.

When an object is created, the attributes associated with the object are called: A. instance fields B. instance methods C. fixed attributes D. class instances

Answers

Answer:

Option A is the correct answer for the above question

Explanation:

The object is used to take memory for the class member and functions because the class is the only structure which defines the types of the member for that class. The class object is used to reference a member of the class. The object of the class is known as an instance of the class and the one object variables value is different from the other objects variable value for the same class. So the object is used to holds the instance field because the object is used to initialize the value of the variable of the class. So the attributes associated with the class object can be called the instance field . The above question also asked the same and the answer is Instance field which is stated from the option A. Hence Option A is the correct answer while the other is not because--

Option B states about instance method which refers to the method of a class for which that object is created.Option C states about the fixed attributes which are not the correct answer.Option D states about class instances which refer to the object of the class.

Final answer:

In the context of programming, the attributes associated with an object are called instance fields. These variables differentiate different instances of a class.

Explanation:

When an object is created in the realm of programming, the attributes associated with the object are called instance fields. These are variables that are associated with an instance of a class. Another way to comprehend it is to visualize a class to be a blueprint. Each instance (or object) of that class can have different values for these fields. For example, if we have a class 'Car', potential instance fields might include color, make, model, etc. Each specific car (instance) would have specific values for these attributes.

Learn more about Instance Fields here:

https://brainly.com/question/31779226

#SPJ6

Consider the following two code segments: Segment 1: while (k > 0) { System.out.println(k); k--; } --------------- Segment 2: while (k > 0) { System.out.println(k); k--; } while (k > 0) { System.out.println(k); k--; } Assume that in both cases variable k has the same initial value. Under which of the following conditions will the two code segments produce identical output.

Answers

Answer:

Always same value

Explanation:

These both code segments will always generate identical values given that we provide same value of k to both segments.

You can see attached pictures.

Windowok Inc. implemented a new pay policy for its employees. According to the policy, all employees who exceed their performance targets will earn a bonus in addition to their regular pay. What has Windowok implemented?

Answers

Answer:

Performance bonus policy is the correct answer.

Explanation:

The term performance bonus refers to a way of additional compensation that is given to an employee or a department; it is a reward paid for achieving particular goals or hitting predetermined targets. In this case, Windowok Inc. is paying to employees who exceed their performance targets as a bonus.

The main disadvantage of using this device is its negative impact on network performance, resulting from the fact that any incoming signal on any of its ports is re-created and sent out on any connected ports.?

Answers

Answer:

Hub

Explanation:

Hub is used to connect devices in a network. It is also called a dumb device because it broadcasts the signals or messages on any of its ports to all other ports. For example a message has to be sent to a computer. Lets name that computer H. Hub will send that message to all connected ports on the hub not just considering that specific port of computer H. So hub is an unintelligent device which is not able to distinguish between devices and sends a messages to every port irrespective of which the destination host is. Now when the destination computer H responds to that message this too goes to all other ports on hub.This has a negative effect on network's performance as it might result in collisions between data packets.The bandwidth of hub is shared by all the devices connected to it. When a source host is sending a large amount of data to destination, it will take all the bandwidth which leads to slow network performance and access in other connected computers .The network speed and performances reduces as more devices are added.
Final answer:

The device referred to is a Network Hub, which is used to connect multiple devices in a network. Its disadvantage is that it broadcasts all incoming data to all connected devices, potentially causing unnecessary network traffic and impacting performance.

Explanation:

The device being described in the question is likely a Network Hub. Hubs are networking devices that connect multiple devices in a LAN (Local Area Network). The main disadvantage of a Hub is that it broadcasts the data it receives to all connected devices. This can negatively affect network performance because data might unnecessarily reach devices not intended to get the data, which can create network traffic. For example, if Computer A sends data to Computer B, the hub would broadcast this data to all connected devices, not just Computer B.

This disadvantage is not present in more sophisticated devices like Switches or Routers, as these devices intelligently direct the traffic to the intended recipient only, instead of broadcasting it to all devices.

Learn more about Network Hub here:

https://brainly.com/question/31860753

#SPJ3

What is a type of application that allows users to interact with certain stimuli by projecting a realistic graphical representation, often in three dimensions?

Answers

Answer:

The application that allows users to do what is stated in the question is known as "Visual Simulation"

Explanation:

Visual simulation otherwise referred to as computer simulation projects a realistic graphical representation as it interacts with a particular stimuli. A very clear example is the popular flight simulator. It can be also used in the medical field and in business.

Going further, visual simulation has been expanded to virtual reality devices that are being used in many ways. Even though, the use of virtual reality devices for visual simulations is on the increase, many people still relate to visual simulation through games. These games project a two-dimensional image to look like a three-dimensional image using advanced graphics.

Individuals who work on visual simulation have some form of degree in engineering precisely, computer engineering. This is because it projects the basics in programming and engineering.

In the Remote Access Domain, if private data or confidential data is compromised remotely, you should set automatic blocking for attempted logon retries.A) True B) False

Answers

Answer:

B, False.

Explanation:

Remote access is the ability of a device in a network to achieve a remote connection and control of another system. Its connection is not physical but uses telecommunication or the internet to access systems that cannot be accessed physically.

The RDP or remote desktop protocol is an example of protocols used to remotely access other computers in a network. It connects to the graphical interface of the other computer. When private data is compromised in a remote access, automatic blocking cannot be used to cancel an already established connection, but the system should be shutdown to prevent further exposure.

When formulating a linear programming problem on a spreadsheet, objective cells will show the levels of activities for the decisions being made. A)True B) False

Answers

Answer:

B. False

Explanation:

Linear programming is a mathematical technique that optimises the linear constraints and objectives functions, which is the quantity whose value needs to be maximized or minimised, using the value stored in a variable.

The spreadsheet application is used to run the linear program on a particular cell, in apps background and automatically, once the enter key is pressed.

Suppose you want to click up- and down-arrows on a "control" to change the value of the product price in cell C7. What form control (two word answer) would you use?

Answers

Answer:

Spin button.

Explanation:

Spread sheet applications are softwares used to analyze and manipulate data for clean and easy data presentation.

It is composed of columns or fields and rows or records to make a worksheet of a workbook in the application. Each box on the worksheet is called a cell.

Data can be inputted directly to a cell or with functions and formulas and with the form control feature.

Form control is use to specify the range of input to use in cells for easy data input. The spin button of the form control is used to input data by pressing the up and down arrow key on the keyboard.

Information technology (IT) consists of all the hardware that a firm needs to use in order to achieve its business objectives, whereas information systems consist of all the software and business processes needed. True or false?

Answers

Answer:

The answer is False

Explanation:

Information Technology (IT) handles the proper transmission, storage, retrieval and manipulation of data using computers. It also includes the use of  computer software, hardware and other peripheral equipment.

Information Systems on the other hand  are organisational systems that are designed to retrieve, store, manipulate and share information. The following are core components of information systems:

TechnologyStructure (which include the various roles in the organisation)People andTask.

Most programming languages allow you to ask two or more questions in a single comparison by using a(n) ____ operator that joins decisions in a single statement.

Answers

Answer:

And is the correct answer for the above question.

Explanation:

And operator is an operator in the programming language which described two decisions in a single statement and it gives true if both the condition defined in the statement is true and it gives false if any of the conditions defined in the statement gives the false result.The above question-statement asked about that operator by which the user can write the two conditions in a single statement. Then the answer is And operator. One example for And operator in c language with if statement is-- if(a>=5&&a<=10), in which && symbols represents AND operator.
Final answer:

Logical operators like AND and OR in programming languages allow you to ask two or more questions in a single comparison. The AND operator requires both conditions to be met, while the OR operator requires at least one of the conditions to be met.

Explanation:

Most programming languages allow you to ask two or more questions in a single comparison by using a logical operator that joins decisions in a single statement. Logical operators include AND and OR operators. The AND operator (often symbolized as & or &&) allows for two conditions to be met, whereas the OR operator (often symbolized as | or ||) stipulates that at least one of the conditions be met. For example, in the statement if (age > 18 && citizenship == 'American'), both conditions (the age being greater than 18 and the citizenship being American) have to be satisfied due to the AND operator.

Learn more about Logical Operators here:

https://brainly.com/question/36193462

#SPJ3

Sherri is considering replacing a processor on her laptop. The laptop is running slower than she would like. What should Sherri consider prior to taking the laptop apart? (Select all that apply.)
a. Try an external device before replacing the motherboard.
b. Make sure you have the correct processor for the motherboard.
c. Verify that the laptop is not under warranty.
d. Determine whether a teardown procedure is available.

Answers

Answer: Option(b), (c) and (d) are correct.

Explanation:

According to the question,Sherri should check that process is right for motherboard as incorrect processor may not be able to process instruction and operation successfully and rapidly.

She should also check the warranty of the laptop.If in case , laptop is under warranty then she can get it repaired or replaced as per the policy of laptop company. Tear-down process can be verified so that laptop can be dismantled to investigate the components of processor that is causing issue in processing or other part is responsible for slow execution.Option (a) is incorrect because external devices is attached with motherboard with help of ports and cables.Processor is the actual unit that can cause slow execution and external devices are not responsible for it.Thus, the correct options is option(b),(c) and(d).

Final answer:

Sherri should check if her laptop is still under warranty, ensure she has a compatible processor for her motherboard, and locate a guide for the proper teardown procedure before attempting to replace her laptop's processor.

Explanation:

Sherri should consider several factors before attempting to replace the processor on her laptop to address its slow performance. Firstly, she should verify that the laptop is not under warranty. Tampering with the hardware can void the manufacturer's warranty, and if the laptop is still covered, it might be more beneficial to seek professional repairs.

Secondly, it is essential to make sure you have the correct processor for the motherboard. Not all CPUs are compatible with every motherboard due to socket type, chipset, and power requirements. Lastly, Sherri should determine whether a teardown procedure is available to guide her through disassembling and reassembling her laptop safely.

Missing this step could lead to damage to the laptop components or render it completely inoperable when done incorrectly.

Dr. Bassin, a hiring manager, is using the employee screening and selection device that is used more frequently than any other employee screening and selection device. Which device is she using?

Answers

Answer:HIRING INTERVIEWS

Explanation: Hiring interview is the most widely used employees screening and selection device,this involves the questioning of the potential employee,this process also involves various forms of assessment which may include the person's ability to express himself on the interview questions,the person's dressing and overall presentation. The person is assessed by a panel of persons which may be from the organisation or from external hiring companies.

A digital certificate confirms that the macro created by the signer has not been altered since the digital certificate was createdA. TrueB. False

Answers

Answer: False

Explanation:

Digital certificate is defined as entity identification in digital form that is used by a user or firms to share their information along with authentication and security. It uses public key cryptographic technique and so it is also know as public key certificate.

Digital signature is the signature that is done digitally to secure data or document.It maintains security of the content present  in message of information that is being exchanged through e-signature.It follows encryption technique for maintaining authenticity.Therefore, digital signature is the signing feature that protects macro after being made to maintain its authenticity.Thus, the given statement is false.

Where is line-of-sight Internet common?
In space
Outdoors
Inside
In businesses

Answers

Answer:

In businesses

Explanation:

Line of Sight internet provides an over-the-air internet connection to buildings that have a clear line of sight to a dedicated mast. This means no underground cables, quicker installation times and lower latency. It is common in businesses.

What is the output of the program below? public class Java1234 { public static void main(String args[ ]) { int matrix[ ][ ]; matrix = new int[3][4]; for(int p = 0; p < 3; p++) { for(int q = 0; q < 4; q++) System.out.prin

Answers

Given the complete question to be:

What is the output of the program below?

public class Java1234 {

   public static void main(String args[ ]) {

       int matrix[ ][ ];

       matrix = new int[3][4];

       for(int p = 0; p < 3; p++) {

           for(int q = 0; q < 4; q++)

           System.out.print(matrix[p][q]);

       }

   }

}

Answer:

000000000000

Explanation:

The output of program will be 0's in twelve places since the line " int matrix[ ][ ];"  declared an array of unknown size which will consist of zeros as it's element.

The  line "matrix = new int[3][4];" declared the size of the matrix to be 3 by  4 while the for loop printed the elements of the arrays by looping through it.

Actual Question:

What is the output of the program below?

public class Java1234 {

  public static void main(String args[ ]) {

      int matrix[ ][ ];

      matrix = new int[3][4];

      for(int p = 0; p < 3; p++) {

          for(int q = 0; q < 4; q++)

          System.out.print(matrix[p][q]);

      }

  }

Answer:

000000000000

Explanation:

Going through the code line after line;

=> Line 1

public class Java1234 {

This is just a class declaration where the class name is Java1234. Every program in Java is run in a class

=> Line 2

public static void main(String args [ ] ) {

This is the main method declaration. Execution in Java starts at the main method.

=> Line 3

int matrix [ ][ ];

This is a declaration of a 2 dimensional array matrix to hold integer variables.

=> Line 4

matrix = new int[3][4];

Here the array variable matrix has been initialized to be an array of 3 rows and 4 columns. Therefore, it can hold 12 integer variables.

In Java, when an array is initialized this way, its values assume their default values. And since it is an array of integers, integer variables have a default value of zero(0). Therefore, the array matrix contains 12 integer variables with each value set to 0.

=> Lines 5 through 8  

for (int p = 0; p < 3; p++) {

   for (int q = 0; q < 4; q++)

   System.out.print(matrix[p][q]);

}

This is a nested for loop that cycles through each of the element in the array.

The outer loop goes from 0 to 2 (less than 3). And at each cycle, the inner loop goes from 0 to 3 (less than 4) and prints the array element at the index determined by p and q. i.e

when p = 0, q will go from 0 to 3

=> at p = 0, q = 0, 1, 2, 3

=> for each value of q, the matrix[p][q] will be calculated as follows

matrix[0][0] = 0

matrix[0][1] = 0

matrix[0][2] = 0

matrix[0][3] = 0

when p = 1, q will go from 0 to 3

=> at p = 1, q = 0, 1, 2, 3

=> for each value of q, the matrix[p][q] will be calculated as follows

matrix[1][0] = 0

matrix[1][1] = 0

matrix[1][2] = 0

matrix[1][3] = 0

when p = 2, q will go from 0 to 3

=> at p = 2, q = 0, 1, 2, 3

=> for each value of q, the matrix[p][q] will be calculated as follows

matrix[2][0] = 0

matrix[2][1] = 0

matrix[2][2] = 0

matrix[2][3] = 0

Therefore, the loop will run 12 times altogether and at each cycle, it prints 0 since the array has not been actually initialized with any value and so it assumes its default value which is 0 for an integer.

Output:

000000000000

A computer user who enters an incorrect formula in a spreadsheet that results in a serious error is a victim of which common problem?

Answers

Answer:

User mistake

Explanation:

memory is a small unit of ultra-fast memory that is used to store recently accessed or frequently accessed data so that the CPU does not have to retrieve this data from slower memory circuits such as RAM.

Answers

Answer:

The answer is "Cache memory".

Explanation:

Cache memory, which is specifically created for the circuits of the CPU, that is also called the primary cache, and the secondary cache is called the memory cache contained on an external circuit. It is used to access information from the cache easily, instead of having to get, it from the main memory of the computer.

What type of IPv6 address should you use when you have multiple routers on a subnet and want hosts to use the nearest router for packets that should be delivered to remote networks?
-Unicast
-Anycast
-Multicast
-Broadcast

Answers

Answer:

Anycast

Explanation:

Anycast is linked with the BGP protocol which ensures that all of a router’s neighbors are aware of the networks that can be reached through that router and the topographical distance to those networks. The main principle of anycast is that an IP address range is advertised in the BGP messages of multiple routers. As this propagates across the Internet, routers become aware of which of their neighbors provides the shortest topographical path to the advertised IP address.

A method of participant observation designed to help a researcher experience a culture's complex web of meaning is called textual analysis.True / False.

Answers

Answer:

The answer is "False".

Explanation:

The textual analysis is a method of research, that is used to describe and provides the understanding feature to understand the given text.

A process of observation by participants that helps a scientist knowledge of the complex network of the meaning of societies is known as Ethnography, that's why the given statement is false.

Which is true about TCP and UDP? Choose two answers.
TCP is a connection-oriented protocol
TCP is often used in video streaming apps
UDP is often used for sending documents
UDP does not acknowledge a receipt of data

Answers

Answer:

TCP is a connection-oriented protocol

UDP does not acknowledge a receipt of data

Explanation:

TCP (Transmission Control Protocol) is a protocol to transfer data, this is one of the most important protocols on the entire internet, this method was implemented from the beginning of the network.

UDP (User Datagram Protocol) this is a protocol faster than TCP because this method doesn't establish a connection to sent data, in this case, always sent data, but TCP is more secure than UDP, and for that UDP is used to transfer music or videos, and TCP websites and database.

UDP doesn't need acknowledgment is done by UDP, is only concerned with speed.

In JavaScript, what is the term for a built-in method that does not belong to any particular object, such as the isNaN() method?

Answers

Answer:

Top-level function  is the correct answer.

Explanation:

Top-level function  is the method in the JavaScript that is not a part of any other objects. It is built-in method in JavaScript such as isNaN() function, eval() function, _dump() function, print() function and may other functions. These functions are the object of the global variable or object.

So, that's why the following answer is correct.

Dynamic Host Configuration Protocol is the protocol that assigns __________ to devices joining a network.
names
websites
ranges
IP addresses

Answers

Answer:

Option D: IP addresses

Dynamic Host Configuration Protocol is the protocol that assigns IP addresses to devices joining a network.

Explanation:Dynamic host configuration protocol is abbreviated as DHCP.Networks are managed according to DHCP protocol widely.It is used to assign IP address to the devices in a network.While using Static protocol, we are allowed to assign he IP addresses to the connected users ourself from a given range.Where as in DHCP, each device is assigned IP address dynamically from a pool of addresses.DHCP is thus a ast and efficient way of assigning IPs to the devices as it gives each device a unique IP.

I hope it will help you!

A network interface card has a place where which kind of cable can be plugged in and connected to a router or switch?
HDMI
Ethernet
USB
Coax

Answers

The Ethernet is your answer
Ethernet

The ethernet cable can be plugged in and connected to a router to enhance the internet connection of the device.


We have a file that has a name in it, but the name is written one character per line. We need to write this name to the screen. What is wrong with the following code? ifstream fileIn; fileIn.open("file.txt"); char ch; fileIn.get(ch) while(!fileIn.eof( ))

Answers

Answer:i think it is using alot of stuff also keyboard and document and the mouse

Explanation:

Natalie is a secretary and must complete a large amount of filing this afternoon. At 1:00 PM, the office receptionist gets sick and goes home. The manager asks Natalie to fill in at the front desk for the rest of the afternoon. Which trait does Natalie demonstrate by adjusting her schedule?

Answers

Answer:

flexibility

Explanation:

she is able to adjust to the task that is being asked of her

The FaceSnap app has permission to use many devices on your smartphone, including the camera. A data privacy concern that arises from this is that the company could access the camera to see what you're doing without your knowledge.

Answers

Question:

Why is it not given points for Row 6(identifying data that is used by innovation and how the data is consumed), and Row 7 (identify one data storage, privacy, or security concern)

Answer:

The statement provides shares details on the computer innovation and does not show how the data is used by the app, what FaceSnap does with the information given to it.

Row 7: No specific data security concern

Other Questions
TCO 1) A problem-solving technique that decomposes a system into its component parts while focusing on the business problem independent of technology is 1. Which of the following observations is trueconcerning the effect of body mass ondemographics?a. The higher the body mass, the higherthe population densityb. The lower the body mass, the higherthe population densityC. The higher the body mass, the higherthe population sized. The lower the body mass, the higherthe population size Please help in this IXL for geometry!! X 1 2 3 4 5 Y 1 3 5 7 9 Given the table, write an expression for the function, and describe what it does.A) y= 2x. Y is double x.B) y= 3x. Y is triple x.C) y= 2x + 1. Y is twice x plus 1.D) y= 2x -1. Y is twice x minus 1. twice the quantity x plus 2 is equal to 3 less than x Sam tested every 50th candy bar from the assembly line to make sure there were enough peanuts in each bar. He found 15% did not have enough peanuts. Which type of sampling did he use? Martell wants to use is calculator to find the value of X when Y equals 22 in the equation Y equals 100 - 3X. Explain how he can use each table or graph to find the value Of X when 100 -3X equals 22. What is transformational leadership? Give examples of organizational situations that would call for transformation, transactional, and charismatic leadership. Match the following terms with their definitions.soviet temporary.provisional government in which more than one political party is prohibited.autocratic a unit of local government in communist Russia.communism possessing absolute and unlimited power.single-party state government that controls the distribution of land and resources. Assessing the __________ of a tax system means determining the amount of tax revenue needed to fund the government and ensuring that the funds are provided by the system. The shortest wavelength within the visible spectrum is _______ light. A. orange B. blue C. red D. violet For what values of x and y must ABCD be a parallelogram? What was a lasting impact of George Washington's presidency? Please help asap(show your work)How much does it cost to run a 100 volt appliance at 30 amps for 2 hours at $ .02 a kwh? Giving half the members of a group some purported psychological finding and the other half an opposite finding is an easy way to demonstrate the impact of A) risk prediction. B) skeptical scrutiny. C) hindsight bias. D) an empirical approach. Explain how lifestyle and medical risk factors increase the chance of developingCHD. Explicit equation for the nth term of the geometric sequence 3584,896,224, Research on emerging adulthood around the globe reveals variation between __________ in the criteria that define what it means to be an adult. If you see Sagittarius high in your night sky on June 20 and today is your birthday, what is your zodiac constellation? Experiment1A student tested to see if ultraviolet light made plants growmore slowly. She followed a logical method and usedcontrol and experimental groups. She repeated herexperiment several times and each time found that plantsgrow slightly slower with ultraviolet lightExperiment 2A student tested to see if a new fertilizer made rosesbloom earlier. She used a logical method and control andexperimental groups. She periomed one experiment andfound that the fertilizer had no effectWhich experiment most likely has greater reliability, and why?O A Number 2 because it has control and experimental groupsO B Number 1. because the experiment proved the hapothesisOC Number 1 because the experiment was repeated with the sameoooONumber 2 because she performed only one experiment Steam Workshop Downloader