What are the characteristics of desktop alerts in Outlook 2016? Check all that apply.
On-screen notifications will pop up for new emails, meeting invites, and new tasks.
Email pop-ups will display the sender's name, subject, and a small bit of the message.
Reading the pop-up alert is the best way to read email messages.
Desktop alerts cannot be turned off.
O Sound notifications can be customized.

Answers

Answer 1

Answer:

A & B

Explanation:

Answer 2

Answer:

A. On-screen notifications will pop up for new emails, meeting invites, and new tasks.

B. Email pop-ups will display the sender’s name, subject, and a small bit of the message.

E. Sound notifications can be customized.

Explanation:

this is for Outlook 2019


Related Questions

What the five types of initiatives that are necessary when putting together and implementing an IT strategy

Answers

Answer:

Pre-implementation

Planning

Execution

Completion

Control

Explanation:

The pre-implementation stage speaks volumes on the breakdown of the implementation stages and how it is being formulated. It shows a stepwise identification of important implementation carriers and the responsibility of the IT organization. Their focus is to determine the content and human resources that are required to implement the strategy being formulated.

The purpose of the planning implementation stage is to plan and agree on specific goals by considering all stakeholders. There is also a need to set deadlines, time-to-time evaluation, and effective coordination of the stakeholders.

The execution phase enforces the implementation plan. As the name implies, it builds a comprehensive plan by focusing on the target group to maintain and ensure a structural and systematically conducted work environment.

The completion phase includes all actions necessary to bring out the results within the organizzation. Initially, there is a need to agree on the dimension of the IT strategy, the time dimension, and the detailed dimension.

The last phase which is the control deals with the logic of setting appropriate quantitative and qualitative control measures so as to allows continuous implementation control and navigation implementation control.

is a colon (:) and semicolon (;) important in CSS declaration?

Answers

Answer:

YES

Explanation:

this is very important

Match the type of secondary storage devices to their examples.
CD
hard disk
flash memory
magnetic storage devices
arrowRight
optical storage devices
arrowRight
solid-state storage devices
arrowRight

Answers

Answer:

1. CD: optical storage devices.

2. HDD: magnetic storage devices.

3. flash memory: solid-state storage devices.

Explanation:

A storage device can be defined as a computer hardware that is typically used for the storage of data or any computer related information such as images, videos, texts, music, codes and folders.

Some examples of storage devices used in the field of computer science are;

1. Optical storage devices: it is circular in shape and includes compact disk (CD), DVD, Blu-ray disk etc. A compact disc (CD) is a small digital-optical disc that is used to store computer data using a laser beam. It is able to store digital data because it is made up of a polycarbonate (a tough-brittle plastic) with one (1) or more metal layers.

2. Magnetic storage devices: this is one of the most widely used storage devices and it comprises of hard disk drive (HDD), floppy diskette, magnetic strip etc.  

3. Solid-state storage devices: it is typically made up of integrated circuits and uses flash memory to store data.

Consider all of the ways that you interact with the internet during a normal month in your life: websites, banking, apps, etc. Of all of those interactions, explain which one you think is LEAST secure and describe how much “risk” you experience using it. Then explain which interaction you feel is MOST secure?

Answers

Answer:

Website, are probably the least secure because depending on what site you click on it can be an add for a different website. You can risk ending up on a site you didn't want to. I think that banking apps are the most secure, because its mostly through your bank so it would have to be secure.

Explanation:

The Matlab Script should:1. Clear the command window2. Clear the workspaceQuestion 1: Why do we clear the command window and workspace at the beginning of a script

Answers

Answer:

This is done for the simple reason of having more space to work on

Explanation:

This is done for the simple reason of having more space to work on. By clearing the command window and workspace you provide yourself with sufficient space to create new commands without the clutter of the previous commands. This also prevents your focus from shifting towards old commands and allows you to simply focus on the commands you are currently working on. This does not clear all variables from the script, it only clears the current screen but the previous commands can still be accessed by using the up-arrow key


Jim wants to enlarge a black-and-white photograph with a warm-black tone. What type of black-and-white paper emulsion should Jim use for this
process?
A chlorobromide
B. bromide
C. chloride
D platinum

Answers

Answer:

A. Chlorobromide

Explanation:

I took the test and got it right. (Plato)

The type of black-and-white paper emulsion should be used by Jim is chlorobromide. Thus, option (A) is correct.

What is emulsion?

A sort of colloid called an emulsion is created by mixing two liquids that wouldn't typically mix. A dispersion of the other liquid is present in one liquid in an emulsion.

Emulsions frequently occur in foods like egg yolk, butter, and mayonnaise. Emulsification is the process of combining liquids to create an emulsion.

According to the above scenario, Jim wishes to expand a warm-toned black-and-white photograph. For this purpose, he should use chlorobromide for black-and-white paper emulsion.

Paper covered with a chemical compound that is light-sensitive, which is inferred as photographic paper. When exposed to light, it captures the latent image.

Therefore, it can be concluded that option (A) is correct.

Learn more about emulsion here:

https://brainly.com/question/6677364

#SPJ2

You need to update your router settings, so you log into the administration panel, whose Internet Protocol (IP) address is 192.168.0.1. Which IP version is this

Answers

Answer:

IPv4

Explanation:

An IP address is an acronym for internet protocol address and it can be defined as a unique number assigned to a computer or other network devices, so as to differentiate each device from one another in an active network system. Thus, an IP address is typically used to uniquely identify each computer or network devices connected to the internet or network.

In Computer networking, IP address are classified into two (2) main categories and these are;

1. Local (internal) IP address.

2. Global (external) IP address.

Also, the internet protocol (IP) address comprises of two (2) versions and these are;

I. Internet protocol version 4 (IPv4): this is the first and original version of the internet protocol which was introduced in 1983 using the Advanced Research Projects Agency Network (ARPANET). An example of an IPv4 address is 192.168.1.0.

II. Internet protocol version 6 (IPv6): it is the modified (latest) version of the IPv4 address system and as such can accommodate more addresses or nodes. An example of an IPv6 is 2001:db8:1234:1:0:567:8:1.

Hence, Internet protocol version 6 (IPv6) was developed and introduced to replace the previous version (IPv4); Internet protocol version 4. The best statement which describes a benefit of IPv6 over IPv4 is that, Internet protocol version 6 (IPv6) eliminates the use of hierarchy in addressing, making addresses easier to use because the size of the routing table is smaller (reduced) and as such making routing with IPv6 to be more efficient.

In this scenario, you need to update your router settings, so you log into the administration panel, whose Internet Protocol (IP) address is 192.168.0.1. Thus, this is the IPv4 IP version.

What is the difference between MySQL and MariaDB?

Answers

Answer:

Explained below

Explanation:

They are both server database.

MySQL Server database has two licensing options namely GPLv2 and Enterprise. Whereas, MariaDB Server database is one that has only one license which it is licensed to namely GPLv2.

Now, the license for both of them differs in that the one for MySQL Server database comes with some available features and support. Whereas, the one for MariaDB comes with the full-featured package.

What type of device is a projector?

Input
Memory
Output
Storage

Answers

Answer:

MEMORY

Explanation:

yeahhhh

Answer:

Output

Explanation:

A projector is an Output device.

what is active transport​

Answers

Answer:

the movement of ions or molecules across a cell membrane into a region of higher concentration, assisted by enzymes and requiring energy.

Here ya go ;)

HELP PLEASE WHAT DOES THIS MEAN!

Answers

Answer:

darling you have two brackets there

Design and implement a set of classes that define various types of reading material: books, novels, magazines, technical journals, textbooks, and so on. Include data values that describe various attributes of the material, such as the number of pages and the names of the primary characters. Include methods that are named appropriately for each class and that print an appropriate message. Create a main driver class to instantiate and exercise several of the classes.

Answers

Answer:

Following are the code to this question:

please find the attached file.

Explanation:

In this code, four class "novels, magazines, technical journals, and textbooks", is defined, in which it holds their respective default constructor and the get and set method to hold the string and integer value, and in the book class the main method is defined, that creates its object and a switch to for search value and print its value.

Write a program that computes and prints the average of the numbers in a text file. You should make use of two higher-order functions to simplify the design.

Answers

Answer:import functools

# open your file

file = open("integers.txt", 'r')

file = file.read()

# put numbers into a list

file = file.split()

# convert list into integers

file = list(map(int, file))

# use lambda function to get average.

print(functools.reduce(lambda x, y: x+y / len(file), file, 0))

Explanation:

In which area is composing for games different from composing for movies?
A. looping scores
B. royalties earned
C, temp tracks
D. adaptive scores

Answers

Answer: royalties earned

Explanation:

In areas such as the looping scores, temp tracks and adaptive scores, there are similarities when composing for games and when composing for movies.

The area where there is difference when composing for games and composing for movies is the royalties earned. The interest that is earned on royalties for both cases are different.

A customer has several small branches and wants to deploy a Wi-Fi solution with local management using CAPWAP. Which deployment model meets this requirement

Answers

Answer:

Mobility express

Explanation:

Mobility express is defined as the ability to use the access point or the AP as a controller. It related to the lightweight network which is without a controller box. The access point of the mobility express uses CAPWAP images.

The CAPWAP stands for Control And Provisioning of Wireless Access Points. It is standard protocol which allows a central wireless of LAN access controller to use and manage the wireless access points.

Thus a customer who has various small branches and wishes to deploy a Wi-fi solution with the local management using CAPWAP should use the Mobility express as the deployment model.

_____ software enables team members to prioritize and track tasks by providing features such as boards, timelines, and calendars.

Answers

Answer:

task management

Explanation:

Use the syntax SELECT ________ (expression) [Column Name] to limit the result set to the number of rows defined by the expression.

Answers

Answer:

Use the syntax SELECT _LIMIT_ (expression) [Column Name] to limit the result set to the number of rows defined by the expression.

Explanation:

The LIMIT keyword is often used to limit the number of rows returned in a result.  Usually, the Limit expression is combined with the "SELECT column_name(s) FROM table_name...WHERE condition" can be used to limit the result set to the number of rows defined by the expression, LIMIT.  The WHERE condition is optional, meaning it can be omitted.

suspect that several users are attempting to install unauthorized software. Upon researching, you discover that the attempts were unsuccessful. What tool did you implement that logged those attempts and identified the users

Answers

Two factor authentication? I’m not sure

Split the worksheet into panes at cell G1.

Answers

Answer:

1. Select below the row where you want the split, or the column to the right of where you want the split.

2. On the View tab, in the Window group, click Split.

Explanation:

New microwave how do i use it is it mad e by the alins and how do I cook

Answers

Assuming your cooking a packaged refrigerated/frozen meal, just follow the instructions.

Tip: NEVER use 'popcorn' mode to cook popcorn (unless the package says so)

All of the following are data providers included with .NET for accessing and manipulating data in databases, EXCEPT ____. Group of answer choices

Answers

Complete Question:

All of the following are data providers included with .NET for accessing and manipulating data in databases, EXCEPT ____.

Group of answer choices.

A. OLE DB

B. ODBC

C. SQL Server

D. Access

Answer:

D. Access

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

Basically, when a database management system (DBMS) receives data update requests from application programs, it simply instructs the operating system installed on a server to provide the requested data or informations.

Some examples of data providers included with .NET for accessing and manipulating data in databases are;

A. OLE DB: this is an acronym for Object Linking and Embedding Database. OLE DB was designed and developed by Microsoft corporation and it comprises of various application programming interfaces (APIs) used for data access.

B. ODBC: it is an acronym for Open Database Connectivity and it was designed and developed by Microsoft corporation used for data access through structured query language (SQL).

C. SQL Server: it is a domain-specific language server designed and developed for managing the various data saved in a relational or structured database.

9.
How many total numbers can be represented with an 8-bit binary (base-2) system?
Α. 127
Β. 128
C. 255
D. 256

Answers

Answer:

C. 255

Explanation:

The binary code for 255 is 11111111 which is the largest binary number that can be represented in 8 bits. This means you can represent a total of 255 numbers. (0-255)

What name is given to the assurance that requested information is available to authorized users upon request

Answers

Answer:

Availability

Explanation:

With Data availability, it means that we are saying that information is accessible to users. This gives the assurance of the system and also the data being accessible to authenticated users anytime they have the need for it.

It is simply saying that information would be operable by users with authorization whenever they request to.

Write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither. The input begins with

Answers

Question:

Write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither. The input begins with an integer indicating the number of integers that follow. Assume that the list will always contain less than 20 integers.

Answer:

Written in Python

listlent = int(input("Length of List: "))

mylist = []

mylist.append(listlent)

for i in range(listlent):

    num = int(input(": "))

    mylist.append(num)

   

evens = 0

odds = 0

for i in range(1,listlent+1):

    if mylist[i]%2==0:

         evens=evens+1

    else:

         odds=odds+1

       

if(evens == 0 and odds != 0):

    print("All Odds")

elif(evens != 0 and odds == 0):

    print("All Even")

else:

    print("Neither")

Explanation:

This prompts user for length of the list

listlent = int(input("Length of List: "))

This initializes an empty list

mylist = []

The following iteration reads the list items from the user

mylist.append(listlent)

for i in range(listlent):

    num = int(input(": "))

    mylist.append(num)

   

The next two lines initialize even and odd to 0, respectively

evens = 0

odds = 0

The following iteration if a list item is even or odd

for i in range(1,listlent+1):

    if mylist[i]%2==0:

         evens=evens+1

    else:

         odds=odds+1

This checks and prints if all list items is odd        

if(evens == 0 and odds != 0):

    print("All Odds")

This checks and prints if all list items is even        

elif(evens != 0 and odds == 0):

    print("All Even")

This checks and prints if all list items is neither even nor odd

else:

    print("Neither")

AM GIVING BRAINLIEST! Assume you have entered the following after a prompt. >>> import time
How would you pause a program for 5 seconds?

pause(3)
time.pause(5)
time.sleep(5)
sleep(3)

Answers

Answer:

time.sleep(5)

Explanation:

For Python, not sure what program your teacher is asking about.

The Python time sleep function is used to delay a program's execution. To stop the running of the program for a certain amount of time in seconds, we can use the sleep function in Python. Thus, option C is correct.

What time sleep () in Python?

Python comes with built-in functionality for sleeping your program. The sleep() function in the time module allows you to pause the caller thread's execution for however long you choose.

The current thread's execution can be paused for a given amount of time in milliseconds by using the sleep() function. The millisecond argument value cannot be negative. If not, it raises an Illegal Argument Exception.

The current thread is put on hold for a set amount of time via sleep. This is an effective way to give other threads of an application or other apps that could be executing on a computer system access to processor time.

Therefore, time.sleep(5) pause a program for 5 seconds.

Learn more about Python here:

https://brainly.com/question/178238

#SPJ2

If a folder exists on an NTFS partition, which permission is needed by a user who needs to set security permissions on the folder?

Answers

Answer:

Full control.

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list primarily is composed of a set of permissions and operations associated with a NTFS file such as full control, read only, write, read and execute and modify.

Hence, if a folder exists on a new technology file system (NTFS) partition, the permission which is needed by a user who needs to set security permissions on the folder is full control.

Reading Materials Design and implement a set of classes that define various types of reading material: books, novels, magazines, technical journals, textbooks, and so on. Include data values that describe various attributes of the material, such as the number of pages and the names of the primary characters. Include methods that are named appropriately for each class and that print an appropriate message. Create a main driver class to instantiate and exercise several of the classes.

Answers

Answer:

Answered below

Explanation:

//The designs are implemented in Kotlin.

//Book class

class Book (val title: String,

val type: String,

val numberOfPages: Int,

val author: String ,

val yearPublished: Int ) {

fun bookDescription( ){

print("Book title is $title. Written

by $author and published

in $yearPublished" )

}

}

//Driver class

class Main {

fun main( ) {

val novel: Book = Book("Animal Farm", "novel", 200, "Orwell", 1990 )

println(novel.title)

println(novel.author)

val description = novel.bookDescription( )

println(description)

val magazine: Book = Book("Forbes", "magazine", 50, "Michael", 1995)

}

}

How many questions have you seen so far other than this one?

Answers

Answer:

18 other questions were answered by myself and Aristotle

Answer:

id.k

Explanation:

thanks for the points

A company wants to build a new type of spaceship for transporting astronauts to the moon. What should the company do first?

Answers

Answer:

Think of some ideas of how their gonna create the new spaceship

Explanation:

Because I'm Smort (typo intended)

Answer: The steps: ask to identify the need and constraints, research the problem, imagine possible solutions, plan by selecting the most promising solution, create a prototype, test and evaluate the prototype, and improve and redesign as needed. Also called the engineering design process.

Explanation:

Drag each tile to the correct box.
Match the device to its correct classification. Choose pairs that will use up all the tiles.
output
input
dual
peripheral
printer
monitor
modem
mouse

Answers

Answer:

Answers In explanation but don't know about dual

Explanation:

Input: mouse peripheral

Output: Monitor printer

Both: Modem

Answer:

Modem- Dual

Mouse- Input

Monitor- Output

Printer- Peripheral

Explanation:

I took the test

Other Questions
Sam told me _ films would be good to see (that /which) Find the equation of the line.Use exact numbers.100+y8+7+6+9 8 7 6 5 4 3 22 3 4 5 6 7 8 9-3-4-5-6+-7-8 The graph at left in the tc-plane models the global wind power capacity, c, in gigawatts, t years since 1996. What is the best interpretation of the c-intercept of this graph?The image shows an exponential curve graphed in the first quadrant of the 't c'-plane. The horizontal 't'-axis is labeled Years since 1996 and the vertical 'c'-axis is labeled Global wind power capacity (gigawatts). The graph crosses the 'c'-axis at about 7 and increases exponentially, passing roughly through the point (13 comma 150). (ZOOM IN TO SEE )plzzzz Why did farmers of the U.S. constitution fear majority rule? Example of uncontrollable risk factors include all of the following except ? A. Gender B. Physical inactivity C. Race D. Heredity f(x) = x2 + 2x-5g(x) = -3x2 - 4x + 1What is f(x) - g(x)?Answer choices: A. 2x 2x - 4B. -2x + 6x-6c. 4x- 2x - 4D. 4x+6x-6 Allison converted 50 US dollars to 290 Argentine pesos. If she converts another 80US dollars to Argentine pesos, how many pesos would she get for 80 US dollars?( A) 1.6B) 5.8464D) 580 which two type of quardialtera has no parallel side hello! i need someone to paraphrase this with your own words!!!!!! ill give you brainliest! FROG Frogs have no outer ears; their prominent eardrums are exposed on the sides of the head. The bulging eyes have nictitating membranes to keep the eyes moist. Adult frogs have lungs, but their breathing mechanism is poorly developed. At rest they breathe mainly through the mouth lining, filling the lungs only occasionally. Why did the U.S. want to purchase California from Mexico?a. to instigate war with Mexicob. to retaliate against property damages to U.S. merchants in Mexicoto gain free trade along the Pacific coastd. to allow more slave states into the UnionC.Please select the best answer from the choices provided What is the volume of this cone? Consider the monthly payment formula M=Pr(1+r)^n/(1+r)^n-1. what is the name of the formula you get if you solve for P? what about if you solve for n? what special function do you need to use when solving for n?WRITTEN RESPONSE QUESTION PLEASE ANSWER ASAP WILL AWARD BRAINLIEST. THE STREAM of secrets: As I was sitting by the stream Looking over it was clean that Day I just thought of my mom when I was chewing my favorite treat Had this guitar since I was 14 Now, I am turning 15 today but it was an enjoyable day Nothing going wrong with my horse I made my bed with no regret I destroyed a friend's guitar because he said my singing sucked but It was a fair day I got a new tractor Got down for and met my country friends once again out in the woods with no worries at all feeling like I had nothing to doooooo without you my friend had the good old days with you my old pal 4. Two bulbs have a resistance of 20 ohms when working normally. They are placed in a seriescircuit whey they operate normally. What is the combined resistance of the two bulbs?(1 Point)22 ohms20 ohms10 ohms40 ohms Evaluate cd if c=11 and d=3 . Explain why Lilys feelings about history change as a result of Ms. Traynors visit to the class. Support your response with examples from the text. I will give Brainliest but I need 2 answered for brainiestA Town's HistoryLily glanced up at the clock in the front of the classroom. The minute hand was crawling much too slowly. There was still more than an hour until lunchtime and Lily could already hear her stomach complaining. She slumped down in her seat and started to fiddle with the pencils on her desk.Is the speaker going to be here soon, Mr. Gardiner? Kevin eagerly asked the teacher. On Monday, the teacher had told the class that someone would come give a presentation that Friday, but he hadnt told them who it would be. All week, Lily and her classmates had been trying to guess the speakers identity.What about the President? Steven asked. Everyone laughed at the idea of the President of the United States coming to talk to the fifth-grade glass in their small town in Oregon.Okay, class, said Mr. Gardiner. I will finally tell you the name of our speaker: Ms. Traynor. She works at the local history museum and will be sharing information with us about our towns history.History is so boring, Lily thought. I cant imagine that anything interesting ever happened here.Just then, there was a knock at the door, and the principal came in with a business-like woman carrying a large briefcase. Mr. Gardiner introduced her to the class.Your teacher has told me that you are studying the Oregon Trail, Ms. Traynor said. Does anyone know how this town is an important part of the trails history?Its at the very end of the Oregon Trail, Bethany answered.Thats right. Today, Im going to tell you about some of the first settlers in our town. Ms. Traynor began to pull several old black-and-white photographs from her briefcase, displaying them for the class. Some were faded at the corners, and most showed people posing stiffly for the camera. Even the children looked serious.Lily liked looking at the photographs that demonstrated what people had worn back then. One photograph showed a pretty woman standing tall in a long dress with long sleeves and a flowered bonnet. She must have sweltered in that outfit, like I do when I wear a sweatshirt on a warm day, she thought. The photo made Lily think of what it might have been like to not be able to wear a short-sleeved shirt when she wanted to, or enjoy air-conditioning!One of the ways we study history is to read the letters and journals written by the people of the time, Ms. Traynor explained.Where do you get the journals and letters? was Stevens query.People donate them to the museum so we dont have to buy them. Many of the people who live here are descendants of the first settlers. Sometimes people have saved letters and journals from their great-grandparents. Other people find old journals and mementos when they are cleaning out their houses. I am going to share some of these historic treasures with you today.In one letter, a woman wrote to her sister back east describing her journey on the Oregon Trail. She told of long, hot, dusty days on the trail and cold nights camping with the wagons circled around them. She had written about crossing a river on a small, wooden raft that was rocked by the strong rapids. Some of her belongings had fallen into the river, but she had been relieved to make it safely to the other side.When Ms. Traynor passed around a journal that had been discovered in someones attic, Lily couldnt wait to look at it. It had been written by a girl around Lilys age. She turned the pages of the small book carefully. She saw that the girl had written about her new town and her new school. The girl had been nervous about beginning school in a place where she didnt know anyone, but the other students had made her feel welcome. She had even met her new best friend at the new school.Then suddenly, Ms. Traynor said, I know you all have to go to lunch, so we will end our discussion here.Lily looked up at the clock and saw that it was already 12:30. The hour had flown by. Then Lily thought about her grandmothers attic. She knew her grandmother kept family letters and journals. What kinds of stories could Lily find in those journals? She couldnt wait to find out. A resting state through the winter.Adaptation: Bear sleeping in a cave during the winter months0 A. LocomotionB. HibernationC. MigrationD. Defense Which manufacturing process is shown in the photograph?O A. FormingB. CombiningC. ConditioningD. Separating The area of this rectangle is 5x? What does the coefficient 5 mean in termsof the problem?width xlength 5xA. The length is 5 times the width.B. The total area of the square is 5.C. The length is 5.MaD. The width is 5 times the length.