You have been given an assignment for a magazine. The assignment involves architectural photography. The magazine wants high-contrast black and white abstract images that follow the basics of composition. Choose four elements of composition and explain in detail how you would translate them into architectural photographs. Produce architectural photographs using the chosen rules of composition.

(Subject Photography)

Answers

Answer 1

Answer:

I think it should be camera


Related Questions

what is a type of worksheet that contains fields and controls that enable a user to easily enter or edit data

Answers

Type of worksheet that contains fields and controls that enable a user to easily enter or edit data is form.

What is form?

A form is a document designed with a standard structure and format that facilitates the retrieval, organization, and manipulation of information, whether printed or online. Forms and the many controls and objects that you can add to forms simplify entering data into worksheets and improve the appearance of worksheets. You can also do this yourself with little or no VBA (Microsoft Visual Basic for Applications) code.

Spreadsheet forms are not the same as Excel templates. Templates are preformatted files that you can use to start creating workbooks the way you want them. Forms contain fields, drop-down lists, and other controls that make it easy for people using the worksheet to enter or edit data. For more information on templates you can download, see Excel Templates.

Learn more about form https://brainly.com/question/19169731

#SPJ4

When parameters are passed between the calling code and the called function, parameters and arguments are matched by

Answers

Answer:

Their relative positions in the parameter and argument lists.

PLEAS help me with the number triangle

Answers

Answer:

 public static void makeNumberTriangle() {

   for(int i=1; i<=5; i++) {

     for(int j=1; j<=i; j++) {

       System.out.printf("%d ",j);

     }

     System.out.println();

   }

 }

Explanation:

You were very close!

11.1.2 Ball and Paddle Code HS JavaScript



Overview

Add the ball and paddle. The ball should bounce around the screen. The paddle should move with the mouse.


Add Ball and Paddle

The first step is to add the ball to the center of the screen, and the paddle to the bottom of the screen. The dimensions of the paddle and its offset from the bottom of the screen are already constants in the starter code.


The next step is to get the paddle to move when you move the mouse. The paddle should be centered under the mouse, and should not go offscreen.


Move Paddle, Bounce Ball

The next step is to get the ball to bounce around the screen. We may have done this exact problem before…

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that Add the ball and paddle. The ball should bounce around the screen. The paddle should move with the mouse.

Writting the code:

function setupBall(){

ball = new Circle(BALL_RADIUS);

ball.setPosition(getWidth()/2, getHeight()/2);

add(ball);

}

function setupPaddle(){

paddle = new Rectangle(PADDLE_WIDTH, PADDLE_HEIGHT);

paddle.setPosition(getWidth()/2 - paddle.getWidth()/2,

 getHeight() - paddle.getHeight() - PADDLE_OFFSET);

add(paddle);

}

function getColorForRow(rowNum){

rowNum = rowNum % 8;

if(rowNum <= 1){

 return Color.red;

}else if(rowNum > 1 && rowNum <= 3){

 return Color.orange;

}else if(rowNum > 3 && rowNum <= 5){

 return Color.green;

}else{

 return Color.blue;

}

}

function drawBrick(x, y, color){

var brick = new Rectangle(BRICK_WIDTH, BRICK_HEIGHT);

brick.setPosition(x, y);

brick.setColor(color);

add(brick);

}

function drawRow(rowNum, yPos){

var xPos = BRICK_SPACING;

for(var i = 0; i < NUM_BRICKS_PER_ROW; i++){

 drawBrick(xPos, yPos, getColorForRow(rowNum));

 xPos += BRICK_WIDTH + BRICK_SPACING;

}

}

function drawBricks(){

var yPos = BRICK_TOP_OFFSET;

for(var i = 0; i < NUM_ROWS; i++){

 drawRow(i, yPos);

 yPos += BRICK_HEIGHT + BRICK_SPACING;

}

}

function setSpeeds(){

vx = Randomizer.nextInt(2, 7);

if(Randomizer.nextBoolean())

 vx = -vx;

}

function setup(){

drawBricks();

setupPaddle();

setupBall();

setSpeeds();

}

See more about JAVA at brainly.com/question/18502436

#SPJ1

what function can you use to record the start and end times of a block of code, and then use the difference between the resulting values to determine the elapsed time in seconds?

Answers

The difference in function BetweenTimePeriod() determines how much time has passed between the two periods. Without returning it, the main() method displays the outcome (using call by reference technique).

Block of code: What does that mean?

Block codes are employed in software development to convert methods or software code to particular forms in order to reduce errors inside the code, if any. Block coding has applications in the domains of telecommunication, theory, and coding theory.

How should block code be written?

Add three backticks (') to the editor and then the language or code you want to be in your code block to add a distinct code block or snippet.

To know more about  block of code visit:

https://brainly.com/question/14466244

#SPJ4

the work breakdown structure (wbs) can only be prepared with a complex, specialized desktop pc application. a. true b. false

Answers

This statement is false. A project management method called a work breakdown structure (WBS) uses a step-by-step process to finish big projects with many of moving parts.

What is work breakdown structure ?In project management and systems engineering, a work-breakdown structure is a deliverable-focused division of a project into more manageable parts. A essential project deliverable that divides the team's work into digestible chunks is a work breakdown structure.The WBS's main objective is to plan the project's timetable. The length of each work is planned in relation to its necessary predecessors and subsequent tasks. The WBS then offers a comprehensive plan so the project manager may understand how the project should develop and effectively manage the workflow.Depending on the complexity of your projects, you can add extra levels to WBS charts, which typically contain three. Initiation, planning, execution, control, and closeout are the five project phases that branch from the primary deliverable at the top and serve as control accounts.

To learn more about project management refer :

https://brainly.com/question/16927451

#SPJ4

what type of subquery is an embedded select expression that returns only one coloumn and no more than one row

Answers

The  type of subquery is an embedded select expression that returns only one coloumn and no more than one row is Single Row Subqueries.

What is Single Row Subqueries?When the outcomes of the outer query depend on a single, ambiguous variable, a single-row subquery is employed. Although the name of this query type is "single-row," it really returns several columns but only one row of results. However, a single-row subquery can only give the outer query one row of results made up of a single column.The minimal salary for the company is the only row that is returned by the inner SQL in the SELECT query below. It then compares the salaries of all the employees using this number and only shows those whose salaries are equal to the minimum wage.

SELECT first_name, salary, department_id

FROM employees

WHERE salary = (SELECT MIN (salary)

 FROM employees);

To learn more about Single Row Subqueries refer to:

https://brainly.com/question/29522983

#SPJ4

true/false: if a whole paragraph is included in a single string, the split() method can be used to obtain a list of the sentences included in the paragraph.

Answers

If a whole paragraph is included in a single string, the split() method can be used to obtain a list of the sentences included in the paragraph is a true statement.

What does the string's split () function do?

A delimited string is split into substrings using the split command. To define zero or more delimiting characters or strings, you can use either a character array or a string array. White-space characters are used to break a string if no delimiting characters are given.

By looking for a pattern, the split() method breaks a String into an ordered list of substrings. It then stores these substrings in an array and returns the array.

Therefore, A string can be divided into a list of substrings using the split method.

Learn more about split() method from

https://brainly.com/question/16746156
#SPJ1

which style type helps you navigate in a document when you are using the navigation pane?

Answers

The text or image that you want to appear as a hyperlink should be selected. Input Ctrl+K. You may also choose Link from the shortcut menu by right-clicking the text or image and selecting it.

What does Powerpoint's navigation pane do?

The primary interface for viewing and navigating among all of your database objects is the Navigation Pane, which by default appears on the left side of the Access window. Note Numerous adjustments can be made to the Navigation Pane.

The Navigation pane is which ribbon?

The group of commands on the File tab of the ribbon is known as the Backstage view. Working with database objects is made possible via the Navigation Pane, which is located on the left side of the Access program window.

To know more about navigation pane visit;

https://brainly.com/question/14966390

#SPJ4

use the command line interface (cli) to answer the following questions: according to the command line help, which switch can you use with the killall command to kill a process only if it is running as a specific user? view the contents of the /root/.bash profile file. what is the last word in the file? what is the value for the shell environment variable? list the iptables firewall rules. which tcp services have been allowed through the firewall for the input chain?

Answers

1) Note that according too the Command Line Interface, the switch can you use with the killall command to kill a process only if it is running as a specific user is (-g)

2) given the contents of the /root/.bash profile file, the last word in the file is: PATH

3) The value of the shell environment variable are:
user, term, home, and path.

4) to list all iptable rules on Linux, we:

Open the terminal app or login using ssh command: $ ssh useratserver-name.To list all IPv4 rules: $ sudo iptables -S.Get list of all IPv6 rules: $ sudo ip6tables -S.To list all tables rules: $ sudo iptables -L -v -n | more.Just list all rules for INPUT tables:

5) to check which TCP services have been allowed through the firewall for the input chain:

you must use "systemctl status firewalld"

What is a command line interface?

A command-line interface (CLI) is a text-based UI used to run applications, manage computer files, and communicate with the computer. CLIs are also known as command-line user interfaces, console user interfaces, and character user interfaces.

Using precise commands via a command-line interface can be more efficient and faster than navigating between GUI tabs and dialogs. This may be very useful when performing extremely repetitious activities across numerous systems, and it highlights the advantages of a command-line interface.

Learn more about a shell environment:
https://brainly.com/question/28902960?
#SPJ1

PLEASEEE HELPPP !!! What term refers to layers of music that, when played together, enhance the game?


A.

stem


B.

feedback


C.

audio


D.

storytelling

Answers

The term that refers to layers of music that, when played together, enhance the game is option is option C. audio.

What is the name of the musical layers?

The layers of sound in a piece of music are also referred to as texture, and they are identified by their functions. The type of texture employed in a piece of music is referred to by a number of specialist words. Monophonic, homophonic, heterophonic, and polyphonic are some of its examples.

Therefore, in the context of the above,  A sound card on a computer creates an audio signal that may be heard through speakers or headphones and is measured in hertz. An audio file, often known as a sound file, is any digital information that includes speech or music that is saved on and played through a computer.

Learn more about audio from

https://brainly.com/question/26260073
#SPJ1

you are worried about email spoofing. what can be put throughout an email's header that provides the originating email account or ip address and not a spoofed one?

Answers

X header can be put throughout an email's header that provides the originating email account or IP address and not a spoofed one.

What is IP address?

IP address is defined as a special string of characters used to identify each computer communicating across a network utilizing the Internet Protocol. The codes known as IP addresses allow our computers, servers, phones, cameras, printers, and sensors to communicate with one another.

In spam and phishing assaults, email spoofing is a technique used to deceive people into believing a message came from a source they either know or can trust. Spoofing attacks include the sender changing email headers so that client software displays a bogus sender address that most users take at face value.

Thus, X header can be put throughout an email's header that provides the originating email account or IP address and not a spoofed one.

To learn more about IP address, refer to the link below:

https://brainly.com/question/16011753

#SPJ1

what is the purpose of using ethernet bonding? (select two.) answer increases network performance provides increased bus speeds enables dual remote access (dra) over a wan link increases read and write operations between the system bus and network adapters provides a failover solution for network adapters

Answers

By connecting National insurance contributions or switch ports together, a variety of physical interconnections to the network can be established. Ethernet bonding offers enhanced results and some fault tolerance.

What purposes does Ethernet serve?

Ethernet remains an widely used type of access point and is employed to communicate devices across a network. Polypropylene is utilized for local networks because of its great speed, security, and dependability in places where it is specifically needed, including company offices, grounds of educational institutions, and hospitals.

How would Ethernet ports function?

Once it hooks in, you insert the other end of the cord into slot on the second phone. The two entities are then connected as a result of this. You can accomplish this from a computer to your router, your router to your modem, your router to your switch, or any other device that includes an Ethernet port.

To know more about Ethernet visit:

https://brainly.com/question/26956118

#SPJ4

all of the wireless users on the third floor of your building are reporting issues with the network. every 15 minutes, their devices disconnect from the network. within a minute or so they are able to reconnect. what type of attack is most likely underway in this situation?

Answers

Note that where all of the wireless users on the third floor of your building are reporting issues with the network, and every 15 minutes, their devices disconnect from the network, and within a minute or so they are able to reconnect again, the type of attack is most likely underway in this situation is: " Disassociation attack" (Option D)

What is a Disassociation attack?

Note that a disassociation attack is a type of wireless networking attack that involves disrupting or severing the connection between a wireless device and a wireless access point (WAP).

The goal of a hacker with the disassociation attack is to prevent the wireless device from communicating with the WAP, which can prevent the device from accessing the Internet or other network resources.

This type of attack can have serious consequences, such as disrupting business operations, stealing sensitive information, or causing financial losses.

Some ways to ensure the prevention of disassociation attacks are:

to use strong security measures, such as encryption, authentication, and access controls, and to regularly update the firmware and security settings of wireless devices and WAPs.

Learn more about a Disassociation Attack:
https://brainly.com/question/15000254
#SPJ1

Full Question:

All of the wireless users on the third floor of your building are reporting issues with the network. Every 15 minutes, their devices disconnect from the network. Within a minute or so, they are able to reconnect. What type of attack is most likely underway in this situation?

A. WPS attack

B. Downgrade attack

C. Brute force attack

D. Disassociation attack

A game designer wants to make sure that their game looks good from all angles. What is the game designer striving for?

A.
looping

B.
fluidity

C.
readability

D.
game-feel

Answers

Since a game designer wants to make sure that their game looks good from all angles, the game designer is striving for: D. game-feel.

What is a game development tool?

In Computer technology, game development tool can be defined as a set of specialized software programs that are typically used by game developers or programmers for the design and development of a game, and these include the following:

Modeling toolEmulatorGame engineLevel editorScripting tool

What is a game-feel?

A game-feel is sometimes referred to as game juice and it can be defined as all of the intangible, tactile sensation that is typically experienced when game players interact with games.

Read more on game development here: brainly.com/question/13956559

#SPJ1

Answer:

your answer would be D. Game feel

Explanation:

which is the most powerful when a browser is determining how conflicting css styling rules will be applied?

Answers

The order of significance determines how CSS cascades styles sheets. Regulations from the most significant style sheet take precedence when they conflict with rules from other style sheets.

What is CSS styling used for?

To style and layout web pages, CSS (Cascading Style Sheets) is employed. For instance, CSS can be used to change the font, color, size, and spacing of your text, divide it into numerous columns, or add animations and other ornamental elements.

What are the three CSS styling techniques?

There are three ways to include CSS in HTML or XHTML: linked, embedded, and inline. Instead of being included in the HTML page itself, the linked technique stores the CSS in a separate file. The header area of the HTML page houses the CSS when using the embedded technique.

To know more about CSS styling visit;

https://brainly.com/question/27818468

#SPJ4

list any two advantages of data sorting​

Answers

Answer:

1 ) it helps arrange all records in a table.

2 ) it is able to deal well with a huge list of items.

Explanation:

there is no additional storage is required .

in three to five sentences, describe how technology helps business professionals to be more efficient. include examples of hardware and software.

Answers

Answer:

Technology helps business professionals to be more efficient in a number of ways. For example, hardware such as computers and laptops allow professionals to process and analyze data quickly, while software such as productivity suites and project management tools help them to organize and manage their work. In addition, technology helps professionals to communicate and collaborate with colleagues and clients more effectively, through tools such as email, videoconferencing, and instant messaging. Overall, technology enables professionals to work more efficiently by providing them with the tools and resources they need to complete tasks quickly and effectively. Some examples of hardware and software that can help business professionals to be more efficient include:

Hardware:

Computers and laptops

Smartphones and tablets

Printers and scanners

Software:

Productivity suites (e.g. Microsoft Office)

Project management tools (e.g. Trello)

Communication and collaboration tools (e.g. Slack, Zoom)

Explanation:

The "shrinking" of time and space as air travel and the electronic media make it easier for people of the world to communicate with one another refers to _____.
the World Wide Web
the global village
e-commerce
social networking

Answers

Answer:

the global village

Explanation:

Klout was hyped as a platform that could track online influence but became inactive. Why?.

Answers

Scalzi, in his CNN Money column, makes a witty remark about Klout practically sucking in data from all social media platforms and "throwing it into an algorithmic pot."

As a result, Peter Hess, Khoros's then-CEO, sent out a message indicating that Klout had finally lost its Klout.

How did Klout went down?

Even though some people took Klout seriously, Andrew Hutchinson writes for a social media website that its critics saw it as "a vanity metric - and like all vanity metrics, it can be gamed, it can be cheated, and thus it's rendered largely useless" .

Lithium Technologies confirmed earlier rumors that it had purchased Klout for about $200 million in March 2014. For businesses to create online communities, Lithium offered the necessary tools. After it combined with Spredfast (a company that specializes in social media marketing, community management, and software), it ceased to exist as a separate entity and was renamed Khoros LLC.

Learn more about Klout

https://brainly.com/question/11383000

#SPJ1

State what each extension are stands for:
BAT
COM
XLS
TXT

Answers

The file's extension informs your computer which program created or can open the file and which icon to use.

What are some of the computer extensions?.bat : Batch file.com : MS-DOS command file.txt : Plain text file.xls Microsoft Excel fileExcel Binary File Format is represented by files having the XLS extension.Text, Text File (filename extension), Textile, Tomorrow X Together, and TXT are all examples of TXT."commercial" is abbreviated as ".com." Although most business websites do use this domain, a site doesn't always need to be for profit to use.bat. Microsoft's initial filename extension for batch files.

To learn more about the computer extensions refer to:

https://brainly.com/question/28578338

#SPJ1

What is the most obvious purpose of games? A. teaching logic B. having fun C. encouraging cooperation D. learning a new skill

Answers

Games typically combine both mental and physical stimulus. Many video games aid in the development of practical skills, provide exercise, or serve other educational, stimulative, or psychological purposes. Thus, option D is correct.

What is the main purpose of games?

While playing games, students can improve their linguistic abilities as well as their social skills and interpersonal interactions. Goals, rules, challenge, and engagement are essential elements of games.

Therefore, it is apparent that games may and ought to be employed as a technique of instruction when teaching languages.

Learn more about games here:

https://brainly.com/question/24662707

#SPJ1

Write a loop that continually asks the user what pets the user has until the user enters stop, in which case the loop ends. It should acknowledge the user in the following format. For the first pet, it should say You have one cat. Total # of Pets: 1 if they enter cat, and so on.

Answers

Answer:

pets = []

pet = input('What pet do you have? ')

while pet != 'stop':

   pets.append(pet)

   print('You have one ' + pet + '. Total # of Pets: ' + str(len(pets)))

   pet = input('What pet do you have? ')

What type of game allows the user to choose the outcome?

A.
shooter games

B.
choose your own adventure games

C.
single action games

D.
virtual reality games

Answers

B choose your own adventure games

What is information output from an information system to facilitate decision making?.

Answers

The information output from an information system to facilitate decision making is generally referred to as business system reporting.

What is an information system?

An information system (IS) can be defined as a collection of computer systems and Human Resources (HR) that is used by a business organization (company or firm) to obtain, store, compute, and process data, as well as the dissemination of information, knowledge, and the distribution of digital products from one location to another.

The components of an information system (IS).

In Computer technology, there are different components of an information system (IS) and these include the following:

DataProceduresSoftwareHardware

What is the decision making process?

The decision making process can be defined as a cognitive process that involves gathering (obtaining) information, analyzing them, and then evaluating alternatives, so as to enable the proper selection of an optimum solution (choice) to a particular problem.

In Business management, business system reporting simply refers to all of the information output from an information system (IS) that are generated in order to facilitate proper decision making.

Read more on information system here: brainly.com/question/24944623

#SPJ1

which of the following is true about python keywords? a. they can begin with a number, letter, or hyphen b. they are case sensitive c. they are written in uppercase d. they can be a maximum of 6 characters long

Answers

According to the question we have Python keywords are case sensitive, and that much is true.

What purposes serves Python?

Python is a well-liked coding language used to build websites and applications, automate procedures, and do data analysis. Python is an all-purpose language, which means it may be used to make many various types of applications and isn't tailored for any particular issues.

Is learning Python difficult?

No, most people don't find learning Python difficult. Python is really regarded as one of the simplest programming things to learn. If you've never authored a foot of Python code before, you can learn to program in Python, but it will take time and you should prepare for some frustrating times.

To know more about Python visit :

https://brainly.com/question/18502436

#SPJ4

what does imma go slide on sum sh mean​

Answers

Answer:

Something inappropriate.

Explanation:

On a Saturday night, you should spend time turning in your homework.

how should a security analyst review system generated events for signs of intrusion or other problems on the network?

Answers

A software program called an intrusion detection system (IDS) automates the intrusion detection procedure. Software that combines all the features of an intrusion detection system with the ability to try to thwart potential events is known as an intrusion prevention system (IPS).

What security analyst review system generated events?

Through the client-side injection of malicious scripts, XSS vulnerabilities give attackers the ability to manipulate user interactions with web applications, plan impersonations, and/or launch phishing campaigns.

Therefore, A network intrusion detection system (NIDS) is installed at one or more strategic locations so that it can keep track of all incoming and outgoing traffic between all networked devices.

Learn more about security here:

https://brainly.com/question/16354463

#SPJ1

You need some software for an advanced math class that you are taking. You have the option of locally-installed, the local network hosted, or cloud-based. Considering your own personal circumstances, which would you choose, and why?

Answers

Any software that is stored, controlled, and made accessible through the cloud is simply referred to as "cloud-based software."

What is cloud computing?In layman's terms, cloud computing is a collection of services made available via the internet, or "the cloud." It entails using remote servers to store and access data rather than local hard drives and personal datacenters.Before cloud computing, businesses had to buy and operate their own servers to satisfy business demands. In order to accommodate peak traffic levels and limit the likelihood of disruptions and downtime, this needed purchasing enough server capacity. As a result, a lot of server space was unused. With the aid of modern cloud service providers, businesses can do away with expensive onsite servers, maintenance staff, and other IT resources.

To Learn more About cloud-based software refer to:

https://brainly.com/question/19057393

#SPJ4

why is my Microsoft store not loading i have Wi-Fi and its strong I've tried everything I know I'm not resetting Microsoft so that's out da window pls help me

Answers

Answer:

Try restarting Windows, restarting in Safe Mode, or checking for updates for Microsoft Store

Other Questions
An event facility uses 16 servers to work an event with 400 guests. Which rate best represents the relationship between servers and guests at the event facility? How much heat must be added to 1755 grams of liquid water at 100C to completely vaporize? 1) What were two (2) things happening socially in the 1950s?2) What were two (2) things happening politically in the 1950s?3) What were two (2) things happening economically in the 1950s?4) What did you notice was similar between the 1920's and 1950s?5) What did you notice was different between the 1920's and 1950s? Shaundra drove the same route to work each morning, Monday through Friday, in a particular week. On Monday and Tuesday she averaged 20 miles per hour, and on her three remaining work days she averaged 30 miles per hour. Quantity A Shaundra's average speed for all five morning commutesQuantity B 26 miles per hourQuantity A is greater.Quantity B is greater.The two quantities are equal.The relationship cannot be determined from the information given. which policy response sets an allowable emissions standard and then creates a market for pollution allowances? 75 percent of what is 105 which of the following would be recorded as a financial account transaction in a country's balance of payments? Hurry please I will give brainly need this in about 15 mins help me help meee An object has a mass of 17 grams.What is its weight in ounces?Use 1 ounce=28.35 gram to write the conversion facto by the 1990s, 3m was starting to develop some problems. what were the causes of these problems? be sure to identify the specific issues and causes. ill mark you branliest if u answer 2. (2 points)What is an equation of the line in slope intercept form?You must justify your response. ronald, a marketing manager at tesron automobiles, is discussing an automobile concept with the design team, and the discussion quickly turns argumentative. ronald, aware of his tendency to get angry very quickly, stops the argument by changing the subject to another topic. this scenario illustrates that ronald has a high degree of Write a program that takes in a line of text as input and outputs that line of text in reverse. 1. Are defined by only one or two traits 2. Show only a few emotions 3. Don't grow or change 4. Usually minor or supporting characters. # 5: Nina is an artist who sells paintings online. She chargesthe same amount to ship each painting. When she sells 4 paintings, she charges a total of $9.96 forshipping. When she sells 8 paintings, she charges a total of $19.92 forshipping.How much more does Nina charge for shipping 20 paintingsthan for shipping 16 paintings?A. $2.49 B. $9.96 C. $19.92 D. $29.96 the health care provider (hcp) prescribes scalp stimulation of the fetal head for a primigravid client in active labor. when explaining to the client about this procedure, what would the nurse include as the purpose? Which of the following shows the sons and daughters of liberty's resistance to the stamp act? How has Elie's faith changed since he left Sighet? Does he still believe in God? Use two quotes from Chapter 5 and/or Chapter 6 of Night to support your answer. (Don't forget to include in-text citations.) identify the domain of the graphed function [-3,6)(-3,-1)U(-1,2)U(2,6)(-3,2)U(2,6][-3,-1)U(-1,6) High school graduates are surveyed about their futures. The results are shown in the tree diagram.(Use the tree diagram to calculate the percentage of all graduates who plan to enter the workforce and reside locally. Show all necessary calculations.)