Ideally, how often should you back up the data on your computer?

Answers

Answer 1

Answer:

not oftenly, but leave space for other things and important stuff.


Related Questions

Need to use Python to create the below function;
''' This function takes as input two lists of same length. It outputs net correlation value between these two lists. To compute correlation between two lists:
1. Compute the average of each list
2. Subtract a list's average from every element in the list (repeat for both lists)
3. Multiply corresponding differences from each list to compute the element-wise correlation
4. Sum all the values from step 3 to compute the net correlation value
Example: [-10,0,10,20],[20,10,10,20] -> 0
def compute_net_correlation(self,data_series_1,data_series_2):
''' #### FILL IN CODE HERE ####
net_correlation = # fill in computation
return net_correlation

Answers

Answer:

The function is as follows:

def compute_net_correlation(data_series_1,data_series_2):

   series1 = 0; series2 = 0

   for i in range(len(data_series_1)):

       series1+=data_series_1[i]

       series2+=data_series_2[i]

   avg_series1 =series1/len(data_series_1)

   avg_series2 =series2/len(data_series_1)

   for i in range(len(data_series_1)):

       data_series_1[i]-=avg_series1

       data_series_2[i]-=avg_series2

       data_series_1[i]*=data_series_2[i]

   net_correlation = 0

   for i in range(len(data_series_1)):

       net_correlation +=data_series_1[i]

   return net_correlation

Explanation:

This defines the function

def compute_net_correlation(data_series_1,data_series_2):

This initializes the sum of each series to 0

   series1 = 0; series2 = 0

This iterates through each data series

   for i in range(len(data_series_1)):

This adds series 1

       series1+=data_series_1[i]

This adds series s

       series2+=data_series_2[i]

This calculates the average of data series 1

   avg_series1 =series1/len(data_series_1)

This calculates the average of data series 2

   avg_series2 =series2/len(data_series_1)

This iterates through each data series

   for i in range(len(data_series_1)):

This subtracts the average from series 1

       data_series_1[i]-=avg_series1

This subtracts the average from series 2

       data_series_2[i]-=avg_series2

This multiplies the corresponding elements of both series

       data_series_1[i]*=data_series_2[i]

This initializes the net correlation to 0

   net_correlation = 0

This iterates through each data series

   for i in range(len(data_series_1)):

This adds up the corresponding elements of both series

       net_correlation +=data_series_1[i]

This returns the net correlation

   return net_correlation

Grade Average Lab Assignment Purpose: The goal of this lab assignment is to learn how to use for loops and if/else commands. Write a program that will calculate a numeric average and a letter grade for a student. The main method creates an object of the Grades class that sends two parameters to the Grade class constructor: a student name and the grades to be averaged.

Answers

Answer:

//class to test the Grade class

public class GradeTest{

    public static void main(String []args){        

       //create the grades to be averaged

      double [] grades = {23, 45, 67, 12.6};

       

       //create an object of the Grade class and

       //pass in the necessary arguments to the constructor

       Grade grade = new Grade("John", grades);

       

       //print out the results from the Grade object.

       System.out.println("Your name is " + grade.getName());

       System.out.println("Your average score is " + grade.getAverage());

       System.out.println("Your letter grade is " + grade.getLetterGrade());

       

   }

}  //End of the GradeTest class

//The Grade class

class Grade {

   

   //create instance variables

   private String name;

   private double [] grades;

   

   //constructor for the class

  public Grade(String name, double [] grades){

       

       //initialize the instance variables

      this.name = name;

       this.grades = grades;

       

   }

   

   //method to return the name of the student

  public String getName(){

       //return the name

       return this.name;

   }

   

   

   //method to calculate the average of the grades

  public double getAverage(){

       

       double [] grades = this.grades;

       

       //initialize some needed variables

       double sum = 0;

       double average = 0;

       

       //loop through the grades array and add each element to the sum variable

       for(int i =0; i < grades.length; i++){

           sum += grades[0];    

       }

       

       //calculate the average

      average = sum / grades.length;

       

       //return the average grade

       return average;

     

   }

   

   

   //method the calculate the letter grade from the average

   public char getLetterGrade(){

       

       //initialize some variables

      double average = this.getAverage();

       char letterGrade;

       

       //check the average and determine its corresponding letter grade

       if(average >= 40 && average < 45){

           letterGrade = 'E';

       }

       else if(average >= 45 && average < 50){

           letterGrade = 'D';

       }

       else if(average >= 50 && average < 60){

           letterGrade = 'C';

       }

       else if(average >= 60 && average < 70){

           letterGrade = 'B';

       }

       else if(average >= 70 && average <= 100){

           letterGrade = 'A';

       }

       else {

           letterGrade = 'F';

       }

       //return the letter grade

       return letterGrade;

       

   }

   

}   //End of the Grade class

Sample Output:

Your name is John

Your average score is 23.0

Your letter grade is F

Explanation:

The code above is written in Java and it contains comments explaining important parts of the code. It also contains a sample output got from running the program. To run this on your machine, copy the code and save in a file named GradeTest.java

At what point is photo editing too much? What is your opinion? Please answer in 5-7 sentences.​

Answers

Answer:

Too much photoshop to the point where you start to resemble Kim Kardashian is way too much. Simple men like me enjoy average women. Like makeup, an absurd amount of photoshop will deter most men as they'll find you shallow and fraudulent. More women should start to flaunt their natural beauty. Natural beauty is always a better indicator than excessive photoshop for a good relationship and partner.

Explanation:

protocol layering can be found in many aspect of our lives such as air travelling .imagine you make a round trip to spend some time on vacation at a resort .you need to go through some processes at your city airport before flying .you also need to go through some processes when you arrive at resort airport .show the protocol layering for round trip using some layers such as baggage checking/claiming,boarding/unboard,takeoff/landing.​

Answers

Answer:

Baggage checking/claiming:

Check in at the city airport and check your baggage

Claim your baggage at the resort airport


Boarding/unboarding:

Board the plane at the city airport

Unboard the plane at the resort airport


Takeoff/landing:

Takeoff from the city airport

Land at the resort airport

Takeoff from the resort airport

Land at the city airport

explain the fundamental Components of a Programming Language
can u answer in 8 lines

Answers

Answer:

1. Syntax: Syntax is the structure of a programming language which includes rules for constructing valid statements and expressions.

2. Data Types: Data types are used to define the type of data that is stored in a variable.

3. Variables: Variables are used to store data values.

4. Operators: Operators are used to perform operations on variables and values.

5. Control Structures: Control structures are used to control the flow of a program.

6. Functions: Functions are used to group related code into a reusable block.

7. Libraries: Libraries are collections of functions and data structures that can be used in a program.

8. Comments: Comments are used to document code and make it easier to understand.

Explanation:

What are examples of the major macro actions? Check all that apply.
A) create new records
B) open and close forms
C) open database objects
D) lock databases from changes
E) prevent users from viewing data
F) navigate through records
G) import and export data

Answers

Answer:

A)create new records

B)open and close forms

C)open database forms

F)navigate through records

G)import and export data

Explanation:

Correct on Edge

Modify array elements using other elements.
Write a loop that sets each array element to the sum of itself and the next element, except for the last element which stays the same. Be careful not to index beyond the last element.
Ex: Initial scores: 10, 20, 30, 40
Scores after the loop: 30, 50, 70, 40
The first element is 30 or 10 20, the second element is 50 or 20 30, and the third element is 70 or 30 40. The last element remains the same.
1 include ciostream
2 using namespace std;
3
4 int maino
5 const int SCORES SIZE - 4;
6 int bonus Scores[SCORES SIZE);
7 int i;
8
9 for (i = 0; i 10 cin >> bonus Scores[i];
11 >
12
13 /Your solution goes here
14
15 for (1-; i < SCORES.SIZE; ++) {
16 cout << bonus Scores[1] << " ";
17
18 cout << endl;

Answers

Answer:

Complete the code using:

   for (i = 0; i <SCORES_SIZE-1; i++) {

       bonus_Scores[i] = bonus_Scores[i] + bonus_Scores[i+1];

   }

Explanation:

This iterates through all elements of the list except the last

   for (i = 0; i <SCORES_SIZE-1; i++) {

This adds the current element to the next, the result is saved in the current list element

       bonus_Scores[i] = bonus_Scores[i] + bonus_Scores[i+1];

   }

See attachment for complete code

Alvin has designed a storyboard using the following technique. Which storyboard technique did he use?

A.
hierarchical
B.
linear
C.
webbed
D.
wheel

50 Points <3

Answers

Answer:

D. Wheel storyboard

Explanation:

The wheel method is like spokes connected to a main hub.

Assume your sketch has a variable named silo, which stores an object that is defined by a class you have created. The name of the class is Cylinder. The Cylinder class has a method named volume, which calculates the volume of a cylinder using its property values and returns the calculated value. Which line of code is the correct line to use the silo variable, calculate volume, and store that value in a new variable.

a. let v = [silo volume];
b. let v = volume(silo);
c. let v = silo.volume();
d. let v = silo[volume];
e. let v = cylinder.volume(radius, height);

Answers

Answer:

c. let v = silo.volume();

Explanation:

When you create and initialize a new object you pass through that object's class constructor. The constructor is in charge of initializing all the necessary variables for that class including radius and height. Once you save the object in a specific variable (silo) you need to call the class methods through that variable, using the '.' command. Therefore, in this scenario, in order to call the volume() method you would need to call it from the silo object and save it to the v variable, using the following statement.

let v = silo.volume();

Shortcuts will help you complete spreadsheet tasks more efficiently. Select each of the following that is a shortcut.

Answers

Answer:

https://quiz let.com/331278088/excel-exam-1-flash-cards/

Explanation:

delete the space in quizlet

A business wants to evaluate how much they're spending on their customers, versus how much their customers go on to spend. If they want to see how much a customer will spend during the time they're a customer, that measurement would be?

Answers

Since the business wants to evaluate how much they're spending on their customers, versus how much their customers go on to spend. The measurement that a business would use to evaluate how much a customer will spend during the time they are a customer is called Customer Lifetime Value (CLV).

What is Customer Lifetime Value (CLV)?

CLV is a prediction of the net profit attributed to the entire future relationship with a customer. It is calculated by multiplying the average value of a sale by the number of repeat transactions and the average retention time.

Therefore, based on the above, CLV can be used to identify which customers are the most valuable to a business and to allocate resources accordingly.

Learn more about business from

https://brainly.com/question/28464469

#SPJ1

Write the Holiday Date of the following holidays:
1. Bonifacio Day –
2. Christmas Day –
3. Rizal Day –
4. Day of Valor –
5. Labor Day –
6. Independence Day –
7. New Year’s Day –
8. People Power Day –
9. Ninoy Aquino Day –
10. All Saint’s Day –

Answers

Answer:

1. November 30

2. December 25

3. December 30

4. April 9

5. September 1

6. (depends)

7. January 1

8. February 25

9. August 21

10. November 1

Explanation:

one example of FLAT artwork is tagged image file format which is a common computer what file

Answers

One example of FLAT artwork is the Tagged Image File Format (TIFF). TIFF is a common computer file format used for storing raster images.

What is the image file format about?

It is a flexible format that can support a wide range of color depths and image compression methods. It is often used for high-quality images, such as those used in printing, and is supported by a wide range of image-editing software.

Therefore, based on the context of the above, TIFF files are FLAT artwork as they are a single, static image without any animations or interactivity.

Learn more about image file format  from

https://brainly.com/question/17913984

#SPJ1

Which option best describes open source software?

a type of software used to bundle products together
a type of software used to sync up to Windows
a type of software that works well with almost all applications and drivers
a type of software that can be freely used and modified

Answers

Answer:

a type of software that can be freely used and modified.

BRAINLIEST BRAINLIEST BRAINLIEST BRAINLIEST BRAINLIEST BRAINLIEST BRAINLIEST BRAINLIEST BRAINLIEST BRAINLIEST BRAINLIEST BRAINLIEST

Answers

Answer:

I think the answer is network

hope this helps

have a good day :)

Explanation:

Answer:

Network

Explanation:

A memory hierarchy is composed of an upper level and a lower level. Assume a CPU with 1ns clock cycle time. Data is requested by the processor. 8 out of 10 requests find the data in the upper level and return the data in 0.3ns. The remaining requests require 0.7 ns to return the data. Determine the corresponding values for the upper level memory.
Hit rate =
Miss rate =
Hit time =
Miss penalty =
AMAT =

Answers

Answer:

Hit rate = 80%

Miss rate = 20%

Hit time = 0.3 ns  

Miss penalty = 0.4 ns

AMAT ≈ 3.875 ns

Explanation:

8 out of 10 = 0.3ns. to return data  ( also finds data in the upper level )

2 out of 10 = 0.7 ns to return data

a) Hit rate in upper level memory

= 8/10 * 100 = 80%

b) Miss rate

= 2/ 10 * 100 = 20%

c) Hit time in the upper level memory

Hit time = 0.3 ns

d) Miss penalty

This is the time taken by the missed requests to return their own data

= 0.7 ns -  0.3 ns =  0.4 ns

e) AMAT ( average memory access time )

Hit rate = 80% , Hit time = 0.3ns

miss rate = 20%  Miss time = 0.7 ns

hence AMAT = (0.3 / 0.8 ) +  (0.7 / 0.2 )

                      ≈ 3.875 ns

Html is an improved version of________

Answers

Answer: SGML

STANDARD GENERALISED MARKUP LANGUAGE

Please mark as brainliest if answer is right

Have a great day, be safe and healthy  

Thank u  

XD  

Answer:

Hey mate.....

Explanation:

This is ur answer......

HTML is an improved version of SGML!

Hope it helps!

Brainliest pls!

Follow me! :)

The method of presentation refers to the planning process for the presentation. the information chosen for the presentation. how the presentation topic will be introduced. how the presentation will be delivered.

Answers

Yes, the method of presentation refers to the planning process for the presentation, the information chosen for the presentation, how the presentation topic will be introduced, and how the presentation will be delivered. It encompasses all aspects of creating and delivering a presentation, including the organization and structure of the information, the visual aids that will be used, and the delivery style and techniques of the presenter.

The planning process includes determining the purpose and goals of the presentation, as well as identifying the target audience and the specific information that will be most relevant and engaging to them.

The information chosen for the presentation should be relevant to the topic and purpose, it should be concise, accurate, and should be supportive of the overall message of the presentation.

The introduction should be clear and concise, it should grab the attention of the audience, and it should provide a preview of the key points that will be covered in the presentation.

The delivery of the presentation can include the use of visual aids, such as slides, videos, images, and handouts, and the presenter should be prepared to speak confidently and to answer questions from the audience. Additionally, the presenter should try to adapt to their audience and the environment of the presentation.

Describe what social engineering is and explain its existence and prevalence.
Explain why SE is an important part of an information technology security course.
Perform statistical research in the social engineering area providing the following: (1) Describe the current percentage of cyber attacks relying on social engineering and the percentage of attacks from both internal and externa sources; and (2) Describe how these percentages impact the current corporate social engineering incident response effort.
Discuss employee and management responsibilities with regard to information security and combating SE. Make sure your work clarifies your opinion as to who carries more responsibility for preventing SE-the employees or management. Provide examples to back up your statements.

Answers

Social engineering is a tactic used by attackers to manipulate individuals into divulging sensitive information or performing actions that may be harmful to the organization.

Social engineering attacks exploit human psychology, emotions, and trust to trick people into revealing sensitive information or performing actions that they otherwise wouldn't. The attacks can take many forms, such as phishing emails, phone scams, pretexting, and baiting.

What is social engineering?

The prevalence of social engineering attacks has increased in recent years, as attackers have become more sophisticated and creative in their methods.

According to the Verizon Data Breach Investigations Report (DBIR) in 2020, social engineering is used in 84% of successful cyber attacks and the most common form of social engineering is phishing. It is also reported that around 30% of phishing messages are opened and 12% of recipients click on the malicious link.

When it comes to combating social engineering, both employees and management carry some level of responsibility. Employees are the first line of defense and play a vital role in protecting the organization's sensitive information. They should be educated and trained on how to identify and avoid social engineering attacks. Management, on the other hand, is

Learn more about social engineering  from

https://brainly.com/question/29024098

#SPJ1

Can you incorporate open-source code from a github forum into IP tool?

Answers

Answer:

No

Explanation:

Answer: No, Info does not allow the use of open-source components in proprietary software he contracts.

Write a function that simulates the roll of a six-sided dice. The name of the function is rollDice. The function accepts no parameters and returns a pseudorandom int: 1, 2, 3, 4, 5, or 6. Write only the function, not the main program. You may assume that srand() was invoked in the main function. There should not be any cin or cout statements in the function.

Answers

Answer:

int rollDice(){

  return 1 + rand() % 6;

}

Explanation:

Next, you begin to clean your data. When you check out the column headings in your data frame you notice that the first column is named Company...Maker.if.known. (Note: The period after known is part of the variable name.) For the sake of clarity and consistency, you decide to rename this column Company (without a period at the end).

Assume the first part of your code chunk is:

flavors_df %>%

What code chunk do you add to change the column name?

Answers

Answer:

You can use the rename function to change the column name. Here is an example code chunk:

flavors_df %>%

rename(Company = Company...Maker.if.known.)

This will rename the Company...Maker.if.known. column to Company. Note that the old column name is surrounded by backticks () because it contains a period, which is a special character in R. The new column name, Company`, does not need to be surrounded by backticks because it does not contain any special characters.

Explanation:

What is the output of the following code segment?

String[] cs = "Bill Gates and Paul Allen founded Microsoft on April 4, 1975.".split(" ");

System.out.println(cs[6].charAt(5));

Answers

Answer:

o

Explanation:

Can someone write an essay on data storage and describe the different storages I have listed below•
Hard drive disk
floppy disk
tape
compact disk
dvd and blu-ray
usb flash drive
secure digital card
solid state drive
cloud storage
punch card
...
.
.
. This is worth 100 points!!!
I really need this!

Answers

Answer:

Explanation:

Punch card is the oldest computer storage; followed by tape and then floppy disk. Hard drive goes back as far as floppy but is still in use today. CD/DVD/BR discs are all later storage but are also used for storing music and videos. USB flash, SD card, SSD and cloud storage are the common technologies used today for data storage.

Answer:

Explanation:

the other answer talks about when the different storages were used; here are their capacity comparison; in increasing order:

punch card - one hole represents 1 bit

tape - slightly more w/ 0/1 represented by sound

floppy disk - more as 0/1 represented by magnetics

hard drive - also magnetics but capacity ranges from okay (in MB) at the beginning to enormous (in TB) currently

CD - beginning to be okay but still under 1 GB

DVD and BR - better 5-28GB

USB/SD/SSD - good; all in 10s to 100s of GB

cloud storage - UNLIMITED!

Question 2
1 pts
Which of the following is true about main and secondary memory?
O Main memory is short term memory used by the CPU in processing commands,
secondary memory is more permanent and used for storage.
Secondary memory is lost when the device's power is turned off.
Main memory is more permanent and used for storage, secondary memory is short
term memory is used by the CPU in processing commands.
Main memory is used for storage.

Answers

Answer:

Main memory is short term memory used by the CPU in processing commands,

secondary memory is more permanent and used for storage.

Explanation:

Main memory defines ur ram.

Secondary memory defines your hard drives etc.

What did the police threaten to do?

Answers

Answer:

fire?

Explanation:

ram play volleyball
simple past​

Answers

Ram played volleyball.

here's your answer..

HELP PLZZ WILL MARK BRAINLIEST

Answers

Answer:

true

value

it conveys your knowledge........

true

true

Explanation:

I also answered your other question too.

Sorry im late

Brainliest??

how do you create and Make video games for video game consoles

Answers

Answer:

Step 1: Do Some Research & Conceptualize Your Game. ...

Step 2: Work On A Design Document. ...

Step 3: Decide Whether You Need Software. ...

Step 4: Start Programming. ...

Step 5: Test Your Game & Start Marketing

Answer:

tbh- I don't really know- but just wanted to say- I HOPE YOU HAVE AN AMAZING DAY!

List 2 or 3 visual aids that you might use during a speech on "Technology in the Classroom" (or a topic of your choosing) to illustrate your main points, and explain exactly how you plan to use them. (Site 1)

Answers

Answer:

Graphs or charts: I would use graphs or charts to illustrate the trend of technology usage in the classroom over time. For example, I could show a line graph that compares the percentage of classrooms that had no technology, limited technology, or full technology access in the past decade. This would allow the audience to see the increasing trend of technology adoption in the classroom and better understand the impact that technology is having on education.

Photos or videos: I would use photos or videos to provide concrete examples of how technology is being used in the classroom to enhance teaching and learning. For example, I could show a video of a teacher using a virtual reality headset to take her students on a virtual field trip to a museum, or I could show a series of photos of students using tablets or laptops to complete assignments and collaborate with their peers. These visual aids would help the audience to better understand the specific ways in which technology is being used in the classroom and how it is benefiting students and teachers.

Infographic: I would use an infographic to present a summary of the main points of my speech in a visually appealing and easy-to-understand format. The infographic could include bullet points or graphics that highlight the key benefits of technology in the classroom, such as increased engagement, improved learning outcomes, and enhanced collaboration. By presenting the information in this way, I could help the audience to quickly grasp the main points of my speech and better retain the information.

Other Questions
Blue's Berry Farm charges Percy a total of $24.75 for entrance and 2.5 kilograms of strawberries. The entrance fee is $6, and the price for each kilogram of strawberries is constant. Read this excerpt from a passage."I'll never forget that Saturday as long as I live. I mean, sure, I knew this day would come eventually, but I had avoided itfor as long as possible. When my best friends Jerome and Dylan insisted it was time to hang out at my house, I knew the dayhad finally arrived."What is the author's point of view in the excerpt?O first personthird-person omniscientO third-person limitedo second person jonn has a total of 50 coins in her purse The are either nickles or quarters The value of the ccoins is $7.10 Which system of equations can be used to determine the number of nickles ,n and quarters ,q, that jonna has in her purse . Can you guys write a sonnet poem for me please PLEASE HELP?Rewrite the function in factored form (show your work)Standard form for the function is:p(x)=-5x^+120x-315 Is this a polynomial? 3x^-2-5 Most of the religious beliefs the ancient Romans had were borrowed from the nations they occupled. The Romans adopted many of the Greek gods and goddesses and gave them Roman names, and later, adopte he faith of the Christian Jews. n central idea is expressed in this passage? e ancient Romans were unoriginal. e ancient Romans adopted religious beliefs from many cultures, including Greeks and Jews. e ancient Romans respected both the religious practices of both Greeks and Jews. e ancient Romans robbed and plundered ancient cultures of their power, wealth, and important religious beliefs 3 divided by 3/4 IN FRACTION FORM! HELP ASAP Brain scans and EEG recordings indicate that positive emotions are associated with high levels of activity in which brain section Please help me with this information please What is the main Object in the following segment by Alexander Pope's 'An Essay on Criticism' (1711): 'Tis hard to say, if greater Want of Skill Appear in Writing or in Judging ill; But, of the two, less dang'rous is th' Offence, To tire our Patience, than mis-lead our Sense: Some few in that, but Numbers err in this, Ten Censure wrong for one who Writes amiss; A Fool might once himself alone expose, Now One in Verse makes many more in Prose. (An Essay on Criticism, 1711) Select one: a. A Fool b. Alexander Pope c. The critic d. our Sense Think of another topic in science that would lend itself to creating a word web. What is the main topic and list six subtopics you would include under it. You could use a whole subject area like chemistry or the desert. Pick a topic you know something about. Help me with this please Goodwill generated internally should be:__________ a. capitalized in the year it occurs. b. represents the purchase price of a business that is about to be sold. c. is the difference between the fair value of the net tangible and identifiable intangible assets and the purchase price of the acquired business. d. is the only account in the financial statements that is based on fair value, all other accounts are recorded at an amount other than their fair value. How to simplify an equation? Which events occurred in Florida before the stock market crash and helped bring about the Great Depression I NEED HELP MY QUESTION IS "which of the following is a structural adaptation used to help animals move"A: lungsB: furC: wingsD: gills Of the 50 members of a staff, 40 percent worked the day shift and the remaining 60 percent worked the night shift in a given week. Of the staff members, 80 percent prefer working the day shift and the remaining 20 percent prefer working the night shift. What is the minimum number of staff members who failed to receive his or her preference of shift that week The Article talks mainly about _ PLEASE HELP! WILL MARK BRAINLIEST! Choose an available autobiography from your library. After reading the autobiography, write a report of at least 400 words about what you have learned. Use the questions below to gather ideas for your report.Remember to document your source properly, using MLA format 1. What is the title of the autobiography and who is it about? 2. Describe the setting. 3. What is the time setting? 4. What major historical events are occurring at this time? 5. Describe the author's personal life. 6. List some of the major turning points in the author's life. 7. What is the main theme of this autobiography and how does the author make that theme known? What is the wave speed of a wave traveling with a frequency of 37 Hz and 2 pointsa wavelength of 6 m? (Remember your units!)