a technician just completed a new external website and set up an access control list on the firewall. after some testing, only users outside the internal network can access the site. the website responds to a ping from the internal network and resolves the proper public address. what can the technician do to fix this issue while causing internal users to route to the website using its internal ip address?

Answers

Answer 1

The issue with the external website not being accessible for internal users despite responding to a ping from the internal network could be due to the access control list on the firewall blocking internal traffic to the website's public IP address.

How to resolve the issue?

To resolve this, the technician can create a rule on the firewall that allows internal traffic to access the website's public IP address.

However, to ensure that internal users access the website using its internal IP address, the technician can also set up a DNS server that resolves the website's URL to its internal IP address for internal users. This way, internal users can access the website using its internal IP address, while external users continue to access it using its public IP address.

By implementing these measures, the technician can resolve the issue while ensuring seamless and secure access to the website for all users.

Learn more about IP addresses at

https://brainly.com/question/31026862

#SPJ11


Related Questions

step 1: interpreting the seismograms estimate the times of the first arrival of the p waves and the s waves at each seismograph station. enter these times into your data table. reminder: you are trying to find the difference between the arrival time of the p wave and the s wave. determine the difference between the arrival of the p wave and the arrival of the s wave, and enter this difference into the data table.

Answers


To interpret the seismograms and estimate the times of the first arrival of the P waves and the S waves at each seismograph station, use the following steps:

Look for the point at which the waves first appear on the seismogram. This is the time of the first arrival for each wave type.Record the time of the first arrival of the P wave and the S wave in your data table.Subtract the time of the first arrival of the P wave from the time of the first arrival of the S wave to get the difference between the two.Enter this difference into the data table.

Remember that the time difference between the arrival of the P waves and the S waves is an important indicator of the type of seismic event and its location.

learn more about  seismograms :

brainly.com/question/27339869

#SPJ11

Which html attribute specifies an alternate text for an image, if the image cannot be displayed?.

Answers

The html attribute "<img> alt attribute" is used to specify the alternate text for an image if the image can not displayed.

What are alternate text?

An alternate text acronyms is (Alt text) which is a text description that can be added to an image's HTML tag on a Web page.

In conclusion, the html attribute "<img> alt attribute" is used to specify the alternate text for an image if the image can not displayed

Read more about alternate text

brainly.com/question/12809344

"If a security measure or control has failed for whatever reason, the system is not rendered to an insecure state" is a statement of what security principle?

Answers

The security principle is referred to as "defense in depth," and it means that a system should not be entirely reliant on a single security measure or control to keep it secure.

A failure of any one security mechanism does not imply that the system is insecure. Instead, a system should be safeguarded by a variety of security measures that can detect and avoid assaults. No security mechanism is ideal, and no security mechanism can prevent all attacks. As a result, security measures must be used in layers, each layer improving the security of the system.

Therefore, it is the responsibility of security managers and system administrators to put in place a multi-layered security strategy that is resilient to a wide range of threats and cyber attacks. It can be concluded that "if a security measure or control has failed for whatever reason, the system is not rendered to an insecure state" is a statement of the "defense in depth" security principle. The defense in depth principle acknowledges that a system cannot be fully secured with a single security mechanism or control. Instead, several security measures are used in layers to keep the system secure from potential threats.

A security failure in one layer should not compromise the system's security because other layers can compensate for the failure. As a result, a multi-layered security approach should be implemented to ensure the security of the system.

Learn more about defense in depth here,

https://brainly.com/question/30395225

#SPJ11

Careers in IT fall into two groups. What are those two groups?
Question 1 options:
A.Network technology and Customer Service management
B.Information management and Information technology
C.Security networking and Informative Education
D.Firewall Careers and Intranet technology

Answers

Careers in IT fall into two groups Network technology and Customer Service management. Hence option A is correct.

What is information technology?

Information technology is defined as the creation, processing, storing, retrieving, and exchanging of data and information of all types using computers. Information and communications technology includes IT. Electronic security, storage, and effective communication are all provided.

The two primary domains of hardware and software can be used to categorize career pathways in the information technology sector. Manufacturing, maintenance, R&D, and management fall under the category of hardware. Manufacturing, development, programming, software testing, maintenance, and support are all included under software.

Thus, careers in IT fall into two groups Network technology and Customer Service management. Hence option A is correct.

To learn more about information technology, refer to the link below:

https://brainly.com/question/14426682

#SPJ1

Can someone help me please and thank u

Can someone help me please and thank u

Answers

I believe the answer is c

Answer:

I think its C but don't quote me on it, it can also be A.

Explanation:

Immunization is important because it can show if you are vulnerable to diseases and illnesses.

Hope it helps

(Also you have very nice handwriting!)

Which of the following uses the proper syntax for creating an HTML comment?
a.
b. Home page for my personal website
c. // Home page for my personal website
d.

Answers

Answer:

c

Explanation:

Given class triangle (in files triangle.h and triangle.cpp), complete main() to read and set the base and height of triangle1 and of triangle2, determine which triangle's area is larger, and output that triangle's info, making use of triangle's relevant member functions.
ex: if the input is:
3.0 4.0
4.0 5.0
where 3.0 is triangle1's base, 4.0 is triangle1's height, 4.0 is triangle2's base, and 5.0 is triangle2's height, the output is:
triangle with larger area:
base: 4.00
height: 5.00
area: 10.00
given (in main.cpp):
#include
#include "triangle.h"
using namespace std;
int main(int argc, const char* argv[]) {
triangle triangle1;
triangle triangle2;
// todo: read and set base and height for triangle1 (use setbase() and setheight())
// todo: read and set base and height for triangle2 (use setbase() and setheight())
// todo: determine larger triangle (use getarea())
cout << "triangle with larger area:" << endl;
// todo: output larger triangle's info (use printinfo())
return 0;
}

Answers

The C++ program that would complete the main () and set the base and height of triangle1 and of triangle2 is:

main.cpp

#include <iostream>

#include "Triangle.h"

using namespace std;

int main()

{

   Triangle Tri1;  

Triangle Tri2;

   double base1, height1, base2, height2;

   cout << "Enter a base for your Triangle1: ";

   cin >> base1;

   cout << "Enter a height for your Triangle1: ";

   cin >> height1;

   cout << endl;

   cout << "Enter a base for your Triangle2: ";

   cin >> base2;

   cout << "Enter a height for your Triangle2: ";

   cin >> height2;

   cout << endl;

   

   cout << "################################" << endl;

   

   cout << "Triangle with larger area:" << endl;

   if ((0.5)*base1*height1 > (0.5)*base2*height2){

      Tri1.setValues(base1, height1);

      Tri1.getValues();

      cout << "Area: " << Tri1.getArea() << endl << endl;

}

else{

 Tri2.setValues(base2, height2);

 Tri2.getValues();

    cout << "Area: " << Tri2.getArea() << endl;

}

   

   return 0;

}

Read more about C++ programs here:

https://brainly.com/question/20339175

#SPJ1

assume that a variable hoursworked has been assigned an integer. write a statement that assigns the value true to the variable workedovertime if hoursworked is greater than 40 and false otherwise.

Answers

The statement that assigns the value true to the variable worked overtime if hours worked are greater than 40 and false otherwise is as follows:

If hoursworked > 40; the workedovertime = true; else false.

What is an Integer?

An integer may be defined as a whole number that can be positive, negative, or zero but it does not include any sort of fractional number. Some examples of integers are -7, 0, 4, 9, etc.

In another form, the statement that assigns the value true to the variable worked overtime if hours worked are greater than 40 and false otherwise is also written as follows:

workedovertime = hoursworked > 40.

Therefore, the statement that assigns the value true to the variable worked overtime if hours worked are greater than 40 and false otherwise is appropriately mentioned above.

To learn more about Integers, refer to the link:

https://brainly.com/question/17695139

#SPJ1

what is the difference between pattern matching based on program structure and regex string matching? (select three)

Answers

The difference between pattern matching based on program structure and regex string matching are:Pattern matching based on program structure is a technique of recognizing patterns using a specific set of rules or instructions defined by the programmer. This technique is mostly used in programming languages that support it.

It is typically used to find specific structural patterns in a program, such as if-then statements or loops, which can then be manipulated or analyzed in some way.Regex string matching, on the other hand, is a more general technique of recognizing patterns in strings of characters. This technique is widely used in many programming languages and text editors. It is used to search for specific patterns of characters, such as a sequence of digits or a certain word, within a larger string of text. Unlike pattern matching based on program structure, which is limited to a specific set of rules defined by the programmer, regex string matching is much more flexible and can be used to search for a wide variety of patterns.Therefore, the three differences between pattern matching based on program structure and regex string matching are:Pattern matching based on program structure is specific to the rules defined by the programmer, while regex string matching is much more flexible and can be used to search for a wide variety of patterns.Pattern matching based on program structure is mostly used to find specific structural patterns in a program, while regex string matching is used to search for specific patterns of characters within a larger string of text.Pattern matching based on program structure is used in programming languages that support it, while regex string matching is widely used in many programming languages and text editors.

Learn more about  string matching  here:

https://brainly.com/question/29767520

#SPJ11

If you mistakenly undo an action, how do you correct your mistake?
a. press CTRL+R
b. click the redo button in the quick access toolbar
c. click the undo button in the quick access toolbar
d. press CTRL+Z

Answers

If you mistakenly undo an action  press CTRL + Z in order to correct your mistake.

Option D is correct.

What functions do the undo and redo commands serve?

Press Ctrl + Z to undo an action; press Ctrl + Y to redo an undone action. The Undo and Redo features allow you to remove or repeat single or multiple typing actions; however, you can only undo or redo actions in the order in which you did them; you are unable to skip actions.

Undo :

Undo is a method of interaction that is used by many computer programs. It restores the document to an earlier state by erasing the most recent modification. Undo will overwrite the last command that was executed on the file that is being edited in some more advanced programs, like graphic processing software.

Learn more about CTRL + Z:

brainly.com/question/29386414

#SPJ4

PLEASE HELP!! And please don't just answer for points.

This question is from my animation class.

What was the “aha!” moment or breakthrough that Ulbrich describes?

Answers

Answer:

What was the aha moment or breakthrough that Ulbrich describes?

Explanation:

The “aha!” moment was when the found out about a new type of technology, called contour. This helped them create their character in a much better way.

Problem: Feed Nibble Monster Till Full

Write a program that generates a number in [0, 500] at the beginning -- this corresponds to how hungry the monster is -- and keeps asking the user to feed the monster until that number falls to zero.

Each time the user feeds the monster a nibble, hunger decreases by the decimal value of the character (i.e. if the user feeds 'A' hunger decreases by 65). But when the user feeds the monster some character that isn't a nibble, the hunger increases by the decimal value of the character (since puking depletes energy).

Use while loop.

Sample runs:

Notice the loop exits after one iteration, because hunger was very low and one nibble made the monster full:

Notice hunger increasing after non-nibble (pink highlight):

Notice that the program just keeps going when the user feeds the monster only non-nibbles. Do you think the program will keep running forever if the user never gives the monster nibbles?

Problem: Feed Nibble Monster Till FullWrite a program that generates a number in [0, 500] at the beginning

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that write a program that generates a number in [0, 500] at the beginning -- this corresponds to how hungry the monster is -- and keeps asking the user to feed the monster until that number falls to zero.

Writting the code:

import java.util.Scanner;

public class App {

   public static void main(String[] args) throws Exception {

       int hunger = getRandomNumber(0, 500);

       char ch;

       boolean flag = true;

       Scanner scan = new Scanner(System.in);

       while (hunger > 0) {

           System.out.println("Monster Hungry :E");

           System.out.println("H U N G E R: " + hunger);

           System.out.print("Feed Monster Nibble :0 ");

           ch = scan.next().charAt(0);

           if (Character.isLetterOrDigit(ch)) {

               hunger -= ch;

               if (hunger <= 0) {

                   System.out.println("Monster full :).\nYou may go");

               } else {

                   if (flag) {

                       System.out.println("yum!");

                       flag = !flag;

                   } else {

                       System.out.println("m04r f00d!");

                       flag = !flag;

                   }

               }

           } else {

               System.out.println("Ewww! :o=" + ch);

               hunger += ch;

           }

       }

       scan.close();

   }

   public static int getRandomNumber(int min, int max) {

       return (int) ((Math.random() * (max - min)) + min);

   }

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Problem: Feed Nibble Monster Till FullWrite a program that generates a number in [0, 500] at the beginning

differences between binary, decimal and hexadecimal

Answers

Answer:

In binary, there are only two numbers: one, and zero. Each “place” also has different values. ... Hexadecimal is different from binary and decimal. It uses base-sixteen, meaning that there are sixteen different digits that can appear in a single place.

Explanation:

In binary, there are only two numbers: one, and zero. Each “place” also has different values. ... Hexadecimal is different from binary and decimal. It uses base-sixteen, meaning that there are sixteen different digits that can appear in a single place.

Binary number systems use a base of two while hexadecimal uses a base of 16. In a hexadecimal system, it is necessary to count to 15. To represent the numbers 10 – 15, the letters A – F are used respectively. To distinguish the different number systems, suffixes or subscripts are often used.

Why is it essential to design an architecture before implementing the software? (1 point)

Designing the architecture first is important so future developers can use the architecture as a reference.


Designing the architecture first makes time use analysis for the product easier.


Architecture design beforehand is essential because it encapsulates the complete cost analysis before launch.


Having a designed architecture ensures things are planned well and allows for evaluation of and changes to the project before deployment.

Answers

The reason why it is essential to design an architecture before implementing the software is option d: Having a designed architecture ensures things are planned well and allows for evaluation of and changes to the project before deployment.

What is the importance of architectural design in software design?

Architecture is known to be one that acts as the framework or the blueprint for any kind of system.

Note that it is one that tends to provide a form of an abstraction that can be used to handle the system complexity as well as set up some communication and coordination methods among parts.

Therefore, based on the above, one can say that The reason why it is essential to design an architecture before implementing the software is option d: Having a designed architecture ensures things are planned well and allows for evaluation of and changes to the project before deployment.

Learn more about architecture  from

https://brainly.com/question/9760486

#SPJ1

Give the usage and syntax of AVERAGE function.

Answers

The average function is used to calculate the statistical mean of selected data, and uses the syntax =AVERAGE (in excel I assume)

Which excel feature allows you to select all cells in the column with inconsistent formulas.

Answers

CTRL + D is used to fill the formula column down

What is the feature?

Hold down the SHIFT key while pressing one of your arrow keys, selecting the cell containing the erroneous formula, and then releasing the SHIFT key. This will select all the cells, including the one that is inconsistent. then choose one of these: To fill the formula down, press CTRL+D while selecting the cells below.

Excel's Go To Special Function[1] enables you to quickly choose all cells that match a set of requirements, such as cells that contain: Formulas (numbers, text, locals, errors) (numbers, text, locals, errors) Constants (text, numbers, logic, and mistakes)

Hence to conclude that CTRL+D excel feature allows you to select all cells in the column with inconsistent formulas.

To know more about the ctrl+D option and excel features follow this link

https://brainly.com/question/24749457

#SPJ4

Michelle just learned she was passed over for a promotion because the management team thought she was too young. This is an example of which of the
following?

Answers

Answer:Promotion Discrimination:Age discrimination

Explanation:

Wrongful failure to promote is illegal.

Michelle should have been taken into consideration for a promotion.

She should not have been passed over, because age discrimination is illegal, and she could claim damages against the company if she wants.

What can cause camera shock?

Answers

The flash of the camera

Which can be used to plan a program?

pseudochart

pseudoplan

pseudocode

flowcode

Answers

Answer:

it is Pseudo-code

Explanation:

i am sure of it because i was taught that a couple days ago

Which expression is equivalent to 3x + 3x + 3x?

From Performance Matters

Which expression is equivalent to 3x + 3x + 3x?From Performance Matters

Answers

9x because you can add 3x+3x+3x because they are the same and can be added
Answer:
The answer is 9x

For this recitabian project, white a peogranithat wil diiphy in menu and perfoem e fiferent arithmetic operation based on the ifiection that i made from the menu. This wilchentine until the duit option is ielected from the menu. The menur that is diplayed: a) add two numbern 6) Tquare a numbo. d) divide tuo numbero. d) गuith What is yout chotce? The cholce that is entered ha sinde fetter string value. A cPp file (mesu.कp) has been provided. It contalin the doclaraton for a string varable (mens choicel, and code that will display the mena to the user and get a strine value. Add code that will process the menu choite that was made by getting the required vilue(s) from the user; perfermine the selected arithmetic operation, and daplaves the result of the operation. This should entainse : fer as lang as the vet does not want to quit. Make sure that the mens of options is diplayed to the user atter the retults of each operation fis been displayed. If the addition operation f

a

or " A ") is selected, the user should be prompted for two integer values that should: be added and thy gewleing sum should be displyyed. Make sure the promphs to the user and the daplay of the results macch whll is shown in the output section. If the square operation f
"s"
" of "S") is selected, the user should be prorthted far a sincle intecer value that should be squared and the resulaing product should be derglayed, Make uare the peompt to the uner and the Cisplay of the results match what is shown in the cutput section. If If the division operation F"d

or "DTlis selected, the saer shiould be prompted for two inteser values fa dividend and divisor) that should be dilded and the resulting quotient AkD remainder should be cipliyed. Make sure the prompls to the user and the digily of the result match what is shown in the output section. If the mena selection is invalid, dispizy "invald selection". Frint a newaine at the end of the prceram. File You Must Submit Pace the con pleted promam code in a tource fle named menu.cPp. Output The output enat is preduced by the program will vary based en the values that ace enternd when the progam in enecuted. The ocfput that is shown below is what the program wis peoduce when it a run in an enwirentrent fuch as Dev Cer oc XCode. When it is ran theocsh the Auto Grader, the portions that ask for values Will Not: shuw the valuef that are entered. A single run of the program follow? a) adid two nimbert: a) squari a turiber d) divide taro: nu=bera

Answers

In this project, a C++ program that will display a menu and perform a different arithmetic operation based on the user's choice that was made from the menu is to be written.

This will continue until the quit option is selected from the menu. If the choice is invalid, the program should display "invalid selection". The menu that is displayed is given below:a) add two numbers b) subtract two numbersc) multiply two numbersd) divide two numberse) modulof) square a numberg) quitWhat is your choice?The choice that is entered has a single-letter string value.

A C++ file (menu.cpp) has been provided. It contains the declaration for a string variable (menuChoice), and code that will display the menu to the user and get a string value. Add code that will process the menu choice that was made by getting the required value(s) from the user; performing the selected arithmetic operation, and displaying the result of the operation.

This should contain a loop that will continue for as long as the user does not want to quit. Make sure that the menu of options is displayed to the user after the results of each operation have been displayed. If the addition operation (or "A") is selected, the user should be prompted for two integer values that should be added and their resulting sum should be displayed. If the subtraction operation (or "B") is selected, the user should be prompted for two integer values that should be subtracted and their resulting difference should be displayed. If the multiplication operation (or "C") is selected, the user should be prompted for two integer values that should be multiplied and their resulting product should be displayed. If the division operation (or "D") is selected, the user should be prompted for two integer values (a dividend and divisor) that should be divided and the resulting quotient and remainder should be displayed.

If the modulo operation (or "E") is selected, the user should be prompted for two integer values that should be divided and their resulting modulo should be displayed. If the square operation (or "F" or "S") is selected, the user should be prompted for a single integer value that should be squared and the resulting product should be displayed. If the menu selection is invalid, display "invalid selection". Print a newline at the end of the program.

To learn more about arithmetic operations:

https://brainly.com/question/30553381

#SPJ11

Which repository should you install before installing the nginx web server?

Answers

Before installing the nginx web server, it is recommended to install the EPEL (Extra Packages for Enterprise Linux) repository. The EPEL repository provides additional packages that are not included in the default repositories of the operating system, which are needed to run some software, including nginx.



The EPEL repository contains various packages that are commonly used in a production environment, such as development tools, libraries, and web servers. It is available for CentOS, RHEL, and other related distributions.

To install the EPEL repository, the command may vary depending on your operating system and its version. For example, on CentOS 7, you can install the EPEL repository by running the following command:

sudo yum install epel-release

On RHEL 7, you can install the EPEL repository by running the following command:

sudo rpm -Uvh https://dl.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpm

Once the EPEL repository is installed, you can proceed with installing the nginx web server by running the appropriate command for your operating system, such as:

sudo yum install nginx (on CentOS)

sudo dnf install nginx (on Fedora)

sudo apt-get install nginx (on Debian/Ubuntu)

In summary, it is recommended to install the EPEL repository before installing the nginx web server to ensure that all necessary packages are available and up-to-date.

For more such question on environment

https://brainly.com/question/17413226

#SPJ11

A user is executing a tracert to a remote device. at what point would a router, which is in the path to the destination device, stop forwarding the packet?

Answers

The router would stop fowarding the packet when the value in the TTL field reaches zero.

When a router receives a traceroute packet, the value in the TTL field is decremented by 1. When the value in the field reaches zero, the receiving router will not forward the packet, and will send an ICMP Time Exceeded message back to the source.

What is a router?

Routers route and route network data, using packets that contain various types of data, such as files and communications, and simple transmissions, such as web interactions.

Data packets have several layers or sections, one of which contains identifying information such as sender, data type, size, and most importantly, the destination IP address (Internet Protocol). The router reads this layer, prioritizes the data, and chooses the best route to use for each transmission.

See more about computing at: brainly.com/question/10873104

#SPJ1

Which command would you use to save a document for the first time
A save
B Save as
C Save for the first time
D Either a or b

Answers

I believe it’s d because computer programs may use both
I think the awnser is f

You have a clock that tells time in the usual way: hours, minutes, and seconds. When you wake up in the morning, you want to figure out how many seconds you slept for. Conveniently, you fell asleep the night before at exactly 12:00 AM. Remember that there are 60 seconds in a minute and 60 minutes in an hour.

Answers

Answer:

give some more details

when you woke up?

Line spacing refers to the amount of space between each line in a paragraph

Answers

Answer:

yes sir, its just the format of the paragraphs

HTTP https CSS JavaScript and HTML are types of coding and formatting behind web pages true or false?

Answers

Answer:

True

Explanation:

In order to be able to run a webpage successfully, there are various coding and formatting that are required and can considered necessary.

They are:

a) Hypertext Transfer Protocol(HTTP): This is a protocol that is made use of on webpages. It is used to determine the information or data that is collected and transmitted through webpages. The commands that are programmed on webpages are modified by this protocol. The data or information that can be transmitted using HTTP includes: Pictures, Video or Audio recordings e.t.c.

b) Hypertext Transfer Protocol Secure(HTTPS) : This is an advanced or modified form of HTTP. The difference between them is HTTPS is more secure than HTTP. HTTPS is defined as a more secured protocol thorough which data or information can be transmitted from one webpage to another. HTTPS make used of an encrypted type of security during data transmission.

c) Cascading Style (CSS): It is a computer language technology that helps to define and modify the way a webpage looks like. Cascading Style can be defined as a formatting style that deal with the fonts, colour , layout of a webpage.

d) JavaScript :This is a programming language that is used on webpages. It is a set of coding that has commands embedded insided that is written to make webpages more interactive and fun for the users of the Internet.

e)Hypertext Markup Language (HTML): This is what is used to create webpages on the internet. Hypertext Markup Language defines what a webpage actually looks like which involves, the written document on the webpage

Answer:

true 100 percent true

Explanation:

its the truuth its the truuuth its the truuuuuuuth
yea aa

In a single paragraph, write about the connections between web servers and web pages. Select and differentiate between their various characteristics and how they work together.

Edge please don't copy paste, 20 points

Answers

Answer:

web servers hold all the info that the website has on it, most servers hold multiple websites

Explanation:

Answer:

web servers hold all the info that the website has on it, most servers hold multiple websites

Explanation:

Amara created a workbook to track the number of minutes she reads each week. Each day, she entered the number of minutes into the workbook. Identify the types of data in the workbook using the drop-down menus. 25: 105: Wed:

Answers

Answer:

25: Value

105:Formula

Wed: Label

Explanation:

Answer:

C- Value

A- Formula

B- Label

Explanation:

write the icon of full justification​

Answers

Answer:

In the paragraph group, click the Dialog box Launcher. ,and select the Alignment drop - down menu to set your justified text. You can also use the keyboard shortcut , Ctrl + J to justify your text

Other Questions
ano ang waste segregation? based on craik and lockharts levels of processing memory model, place in order how deeply the following information about dogs will be encoded, from the shallowest to the deepest. calculate the size of a cube PLEASE ANSWER!Ill mark you brainliest or whatever its called.What would happen to hydrosphere(ocean) if photosynthesis/cellular respiration wasnt occurring? can someone please answer this? Nitrogen dioxide decomposes when heated 2 NO (g) --> 2 NO (g) + O (g) During an experiment, the concentration of NO2 varied with time in the following way: Time 0.0 min [NO] 0.25 M 0.205 M 1. Which is the best tourism place in India ? The circle below is centered at the origin and has a radius of 4. What is itsequation?OA. x^2 - y^2=16OB.x+ y^2=4OC. x+y^2=16OD. x- y=4 Read the excerpt from Beowulf.Then a proud warriorquestioned the men concerning their origins:Where do you come from, carrying thesedecorated shields and shirts of mail,these (Can't Say Word) helmets and javelins?I am Hrothgars herald and officer.I have never seen so impressive or largean assembly of strangers. Stoutness of heart,bravery not banishment, must have brought you to Hrothgar.Based on this excerpt, the reader can infer that the speaker is _________ the strangers.A. In Awe Of.B. Disdainful Of.C. Frightened By.D. Disinterested In. 2. What is devolution? During what period have we seen devolution? How do block grants demonstrate some degree of devolution? 3. Identify two constitutional clauses that establish rules directing how states must relate to each other. What is the purpose of each of these clauses? 4 What is cooperative federalism? How does it relate to the idea of "big government"? 5. What powers does the Constitution deny to the states? 6. What is judicial review? Plss help me :)). I really need help Does emotion delay the negotiation process, or prevents parties from reaching an agreement? Which of the following marked the achievement of a long-held suffragist goal in the early 1900s?the Declaration of Sentimentsthe Fifteenth Amendment to the ConstitutionCatts Winning Planthe Nineteenth Amendment to the Constitution What happens as the body develops a tolerance for opioids? What is a omega? A. Leader B. higher leader C. your own answer What is the most efficient way to access data when you have multiple tables? a. Use the VLOOKUP function to create formulas to add data from other tables b. Use an application like Microsoft Query to consolidate the data into one table c. Create relationships between tables d. Use Power Query to consolidate the data into one table Confirm Find the future values of these ordinary annuities. Compounding occurs once a year. Do not round intermediate calculations. Round your aniswers to the nearest cent. a. $800 per year for 8 years at 16%. 5 b. $400 per year for 4 years at 8%. 5 c. $900 per year for 4 years at 0%. 5 d. Rework parts a,b, and c assuming they are annuities due. Future value of $800 per year for 8 years at 16% : $ Future value of $400 per year for 4 years at 8%:$ Future value of $900 per year for 4 years at 0%:$ What formed the eastern border?Atlantic OceanCanadaAppalachian Mountains . Find the area under the standard normal curve. from z = 0 to z = 1.46 from z = -0.32 to z = 0.98 from z = 0.07 to z = 2.51 to the right of z = 2.13 to the left of z = 1.04| How does the title tell the reader that the piece is satirical?