an ISP owns the ip address block 99.29.254.0/23. The ISP should divide its address block into four equal-sized address blocks to be given to four different organizations suppoerted by this ISP. Give the network address and the subnet mask that will be assigned to each organization

Answers

Answer 1

The IP address block 99.29.254.0/23 has a total of 512 addresses, ranging from 99.29.254.0 to 99.29.255.255. To divide this block into four equal-sized blocks, we can use a /25 subnet mask, which gives us 128 addresses per subnet.

To calculate the network addresses for each organization, we can start with the first address in the block (99.29.254.0) and add multiples of 128 to get the network addresses for each subnet:

Organization 1: Network address = 99.29.254.0/25

Organization 2: Network address = 99.29.254.128/25

Organization 3: Network address = 99.29.255.0/25

Organization 4: Network address = 99.29.255.128/25

Each organization will have its own network address and can use the addresses within its assigned subnet as needed.

Learn more about IP address  here:

https://brainly.com/question/31171474

#SPJ11


Related Questions

predictive health, a fast-growing medical research firm, has accumulated so much patient information that conventional database management systems cannot handle its needs. therefore, predictive health purchased very sophisticated analysis software and supercomputing-level hardware to leverage the power of

Answers

The AI-driven insights will also help Predictive health create personalized preventive care plans for patients, which can help reduce the prevalence of certain medical issues.

1.Predictive health accumulates patient information which is too large to be handled by conventional database management systems

2.In order to process the data, Predictive health purchased sophisticated AI software and supercomputing-level hardware

3.The AI software and hardware will enable Predictive health to analyze the patient data and provide insights that would otherwise be impossible to obtain with conventional database management systems

4.The AI software and hardware will be used to identify patterns in the data, uncover correlations between patient data points, and draw conclusions that can be used to improve patient care.

5.The AI-driven insights will also help Predictive health create personalized preventive care plans for patients, which can help reduce the prevalence of certain medical issues.

Learn more about insights here

https://brainly.com/question/30680210

#SPJ4

a client is requesting an internet connection type that is not affected by atmospheric conditions and is always on. which of the following will meet these requirements? a. dial-up b. cable c. satellite d. cellular hotspot

Answers

A client is requesting an internet connection type that is not affected by atmospheric conditions and is always on. The answer choice that will meet these requirements is a satellite

What is a Satellite Connection?

Satellite internet is a wireless link made up of several satellite dishes that can be found both on Earth and in space.

It gives isolated regions of the world useful access to major networks. They remain connected as a result, giving them access to modern information and communication networks.

Read more about satellite here:

https://brainly.com/question/18496962

#SPJ1

An ISP is granted a block of addresses starting with 190.100.0.0/16 (65,536 addresses). The ISP needs to distribute these addresses to three groups of customers as follows: a. The first group has 64 customers; each needs 256 addresses b. The second group has 128 customers; each needs 128 addresses c. The third group has 128 customers; each needs 64 addresses Design the sub blocks and find out how many addresses are still available after these allocations.

Answers

The number of IP addresses still available after these allocations are 24,576.

To design the sub blocks, the subnet mask must be calculated which is as follows:

Number of bits required to represent 256 addresses is 8 (as 2⁸ = 256)

Number of bits required to represent 128 addresses is 7 (as 2⁷ = 128)

Number of bits required to represent 64 addresses is 6 (as 2⁶ = 64)

Total bits required to represent the customers of all three groups is 8 + 7 + 6 = 21 bits.

IP address provided is 190.100.0.0/16. The first 16 bits are already assigned and cannot be changed. 21 bits are required for the subnets. The remaining number of bits are 32 - 16 - 21 = 5 bits. Subnet mask = 255.255.248.0 (obtained by converting the remaining 5 bits to 1s and padding 0s to complete 8 bits in each octet)Now, the sub blocks can be calculated as follows:

a. The first group needs 256 addresses for each of the 64 customers. The block size required for this is 256 × 64 = 16,384 addresses which can be represented in 14 bits. Hence, the first group will be allocated addresses from 190.100.0.0/21 to 190.100.63.255/21.

b. The second group needs 128 addresses for each of the 128 customers. The block size required for this is 128 × 128 = 16,384 addresses which can be represented in 14 bits. Hence, the second group will be allocated addresses from 190.100.64.0/21 to 190.100.127.255/21.

c. The third group needs 64 addresses for each of the 128 customers. The block size required for this is 64 × 128 = 8,192 addresses which can be represented in 13 bits. Hence, the third group will be allocated addresses from 190.100.128.0/20 to 190.100.191.255/20.

To know more about IP address refer to:

https://brainly.com/question/14219853

#SPJ11

After the distribution of these addresses to three groups of customers, the total number of IP addresses still available are 24,576.

To design the sub-blocks, we need to find the number of bits required for each group. The numbers of addresses required are as follows:

Group 1: 64 customers; each needs 256 addresses.

Total addresses needed = 64 * 256 = 16,384

The minimum number of bits required to provide 16,384 addresses is 14 bits (2^14 = 16,384)

Group 2: 128 customers; each needs 128 addresses.

Total addresses needed = 128 * 128 = 16,384

The minimum number of bits required to provide 16,384 addresses is 14 bits (2^14 = 16,384)

Group 3: 128 customers; each needs 64 addresses.

Total addresses needed = 128 * 64 = 8,192

The minimum number of bits required to provide 8,192 addresses is 13 bits (2^13 = 8,192)

Therefore, the total number of bits required is 14 + 14 + 13 = 41 bits

The ISP was granted a /16 block which is equivalent to 16 bits. Therefore, 16 + 41 = 57 bits are needed for the three groups. This means the ISP will need an additional /9 block (64 - 57 = 7; 2^7 = 128) to provide enough addresses for the three groups of customers. Now we can design the sub-blocks as follows:

Group 1: /22 block (14 + 8 = 22) 190.100.0.0/22 to 190.100.63.0/22

Group 2: /22 block (14 + 8 = 22) 190.100.64.0/22 to 190.100.127.0/22

Group 3: /23 block (13 + 8 = 21) 190.100.128.0/23 to 190.100.255.0/23

To know more about IP address refer to:

https://brainly.com/question/14219853

#SPJ11

which type of software license allows a predetermined number of people to use the account at the same time?

Answers

The 'concurrent license' type of software license permits a predetermined number of people to use the account at the same time.

A concurrent license is a type of software license that is based on the maximum number of people who will use the software or account simultaneously. For instance, if an organization purchases five concurrent licenses, it means that up to five number of its employees can use the software at any given time simultaneously; the sixth user is prohibited from the use of this software which is being allowed to use for only the five users. A concurrent license typically deals with software that runs on the server where users connect via the network

You can learn more about concurrent license at

https://brainly.com/question/13502276

#SPJ4

___are designed to infect and cause damage to operating system files, computer registry, and other locations on the motherboard

Answers

Answer:

Viruses

Explanation:

virusues are designed to infect and cause damage to operating system files, computer registry, and other locations on the motherboard

Chatbots are popular on retail websites and enhance which of the seven website design elements that marketers can use to produce an effective customer experience online?.

Answers

Chatbots are popular on retail websites and enhances one of the seven website design elements that marketers can use to produce an effective customer experience online, which is: D. commerce.

What is a website?

A website can be defined as a collective name which connotes a series of webpages that are interconnected and linked together with the same domain name, so as to provide certain information to end users.

What is e-commerce?

e-commerce can be defined as a business model that is typically designed and developed to involve the buying and selling of goods (products) over the internet (website), without the need for physical presence or cash payment for the products ordered.

Generally speaking, there are seven important elements of a website design that shouldn't be ignored by any marketer and these include the following:

Context. Commerce. Connection. Communication.Content. Community. Customization.

In conclusion, we can reasonably and logically deduce that chatbots enhance communication.

Read more on e-commerce here: brainly.com/question/23369154

#SPJ1

Complete Question:

Chatbots are popular on retail websites and enhance which of the following is one of the seven website design elements that marketers can use to produce an effective customer experience online?

A. consistency

B. collaboration

C. commercialization

D. commerce

E. creativity

virtual conections with science and technology. Explain , what are being revealed and what are being concealed​

Answers

Some people believe that there is a spiritual connection between science and technology. They believe that science is a way of understanding the natural world, and that technology is a way of using that knowledge to improve the human condition. Others believe that science and technology are two separate disciplines, and that there is no spiritual connection between them.

What is technology?
Technology is the use of knowledge in a specific, repeatable manner to achieve useful aims. The outcome of such an effort may also be referred to as technology. Technology is widely used in daily life, as well as in the fields of science, industry, communication, and transportation. Society has changed as a result of numerous technological advances. The earliest known technology is indeed the stone tool, which was employed in the prehistoric past. This was followed by the use of fire, which helped fuel the Ice Age development of language and the expansion of the human brain. The Bronze Age wheel's development paved the way for longer journeys and the development of more sophisticated devices.

To learn more about technology
https://brainly.com/question/25110079
#SPJ13

Which type of keyword is "capital"?

an event

a title

an abbreviation

a vocabulary term

Answers

Answer:

a vocabulary term

Explanation:

Answer:(d) a vocabulary term

Explanation:

from hardware design/engineering point of view, why is it better to build several microprocessors (cores) on a single circuit board than several individual faster cores, one per board? (15 pts)

Answers

From a hardware design/engineering point of view, it is better to build several microprocessors (cores) on a single circuit board than several individual faster cores, one per board, due to the following reasons:

Cost savings: Building multiple cores on a single circuit board is significantly cheaper than creating individual faster cores, one per board. Increased reliability: Having multiple cores on a single board increases the reliability of the system since each core is able to work in parallel, thus providing redundancy.Increased performance: Multiple cores on a single board allow for more efficient use of resources, increased speeds, and better power management.Reduced complexity: By having multiple cores on a single board, the complexity of the design is reduced since there is no need to design and build separate boards for each core. More flexibility: Multiple cores on a single board can be easily reconfigured and customized, allowing for more flexibility.

Learn more about microprocessors: https://brainly.com/question/30467115

#SPJ4


What do the numbers 0s and 1s actually represent inside a computer?

Answers

Answer:

Binary.

Explanation:

Binary, the off and on, Is how computers think.

You think code is Function(Os,35,Export) and stuff like that? Thats trillions of binary lines to make that. Binary is the very fabric of code. modern code engines are very organized binary to make predefined functions so your brain doesnt have to manually think of quadrillions of off and on switches for each function you assign.

Select the one that uses the heading tag correctly.

a.


b.

c.

d.

Answers

what is it the choices

Answer:

yes . where is option please check it

assume the variable age has been assigned an integer value, and the variable is full time student has been assigned a boolean value (true or false). write an expression that evaluates to true if age is less than 19 or is full time student is true.

Answers

The expression that evaluates to true if age is less than 19 or is full time student is true will be age<19 or True== is_full_time_student

What is the Boolean value about?

The truth value, or TRUE or FALSE, is represented by a Boolean value. The null value is used to represent a value of unknown for a Boolean statement or predicate.

An expression that may only be evaluated as true or false is known as a boolean expression. It was named after mathematician George Boole.

Therefore, the expression that evaluates to true if age is less than 19 or is full time student is true will be age<19 or True== is_full_time_student

Learn more about Boolean on:

https://brainly.com/question/25039269

#SPJ1

A_______VPN connection is a private network that uses a public
network to operate.

A)Point-to-Point
B)Point-to-Tunnel
C)Point-to-Site
D)Site-to-Site

Answers

Answer:

letter c. point to site po sagot diyan

how much space does the adjacency list representation of a graph require, as a function of the number n of vertices and the number m of edges?

Answers

According to the given statement, The adjacency list representation of a graph requires O(n + m) space.

What is adjacency list?

Adjacency list is a data structure used to represent a finite graph. It is an array of linked lists, where each linked list represents an edge of the graph. The linked list contains a vertex (node) and the cost associated with that edge. The cost can represent the weight of an edge in a weighted graph, or the presence of an edge in an unweighted graph. The adjacency list is used to store information about which vertices are adjacent to each other in a graph. It is a compact way to represent the graph and is used to efficiently store the graph in memory or on disk.

This is because an adjacency list uses O(n) space to store the vertices in the graph and O(m) space to store the edges. The overall space requirement is therefore the sum of the two, which is O(n + m).

To learn more about adjacency list visit :

brainly.com/question/18403205

#SPJ4

How do I fix DirectX encountered an unrecoverable error in warzone?

Answers

To fix DirectX encountered an unrecoverable error in Warzone, you can follow the steps below:

1. Update DirectX

2. Reinstall DirectX

3. Update your Graphics Card Drivers

4. Disable Overlay Programs

5. Modify Game Settings

6. Disable Antivirus

7. Run the Game as Administrator

8. Disable V-Sync

A group of Windows components called DirectX enables software—most notably games—to communicate directly with your visual and audio hardware. Games that support DirectX may utilize the hardware's built-in multimedia accelerator capabilities more effectively, which enhances your entire multimedia experience. Many Windows games need the multimedia technology known as DirectX. Your game might not function correctly if your PC doesn't have the correct version of DirectX installed (the product packaging should specify which one you need).

Learn more about DirectX: https://brainly.com/question/30077898

#SPJ11

restricting access of users to specific portions of the system as well as specific tasks, is an example of…

Answers

The act of controlling access to different parts of the system or specific tasks in the system is called access control. Access control is a security measure used to ensure that data and system resources are secure and only accessible to authorized users.

The access control mechanism is used to manage user rights and privileges by granting or denying access to specific system resources.Access control can be implemented using a combination of hardware, software, and procedures. One common approach to access control is to use usernames and passwords to authenticate users. Users must provide their username and password before accessing any system resources.

In conclusion, restricting access to specific portions of the system or specific tasks is an example of access control. Access control is a critical security mechanism that helps organizations manage user rights and privileges to ensure data and system resources are secure. Access control can be implemented using a combination of hardware, software, and procedures and can be used to grant or deny access to specific system resources based on different access control models.

To know more about system visit:

https://brainly.com/question/19843453

#SPJ11

What are the 8 steps to creating a safety program?

Answers

An 8-Step Safety Program-Become dedicated to safety, Discover the standards that apply to your sector, Determine risks and dangers, Create procedures and software, Your workforce needs education, All accidents and occurrences should be looked into and tracked, Examine your programme, Use an EHS management programmer.

A safety programmer aids in anticipating, identifying, and preventing circumstances or behaviours that could result in occupational illnesses and accidents. It is preferable for employees to be involved in the process of creating a workplace safety programme. The main goal of safety and health programmes is to prevent workplace injuries, illnesses, and fatalities as well as the suffering and cost that these occurrences may cause for workers, their families, and employers. The suggested practises take a proactive approach to managing workplace safety and health. By organising and recording safety obligations, recognising and regulating threats, and responding to emergencies, a health and safety programme seeks to prevent accidents and occupational diseases.

Learn more about Safety from

brainly.com/question/27883396

#SPJ4

Match each definition to the correct type of media.

1. Information transmitted to people using airwaves or digital data
2. An electronic form of communication that reaches people through electronic devices
3. Material published on paper to deliver information to various people

Medias!
1. Print Media
2. Broadcast Media
3. Internet

Answers

Answer:

1-2

2-3

3-1

Explanation:

I couldn't find a way to explain this.

Broadcast Media is the Information transmitted to people using airwaves or digital data.

What is media?

Others are:

Internet is  an electronic form of communication that reaches people through electronic devices Print Media are material published on paper to deliver information to various people.

The word media is known to be a term that is often used as a form of communication ways through which people often pass news, etc.

Conclusively,  Broadcast Media is the Information passed to people through the use of airwaves or digital data.

Learn more about Media from

https://brainly.com/question/26152499

#SPJ2

Plz help
You want Excel to automatically apply “stripes” in an alternating pattern to existing raw data in your spreadsheet. Describe the precise steps you could take to do so. What other function would be added when you apply this change, assuming you have a header row and leave the default options selected?

Answers

Answer:

1)Select the cells you want to shade.

2)On the Home tab of ribbon select Conditional Formatting > New Rule

3)Select 'Use a formula to determine which cells to format' > enter your formula in the 'Edit the Rule Description' field.

4)Click the Format button and from the Format Cells dialog box select the Fill tab > choose your weapon (colour, pattern, fill effect etc.):

Explanation:

Write a program that asks the user to enter the name of an input file. If the file does not exist, the program should prompt the user to enter the file name again. If the user types QUIT in any uppercase/lowercase combinations, then the program should exit without any further output.

Answers

Answer:

I can help you with that inbox me

Actuators drive everything that moves on a competition robot. The most
common type of actuator in this application is a motor; in particular, VEX
Robots utilize____Motors. *

A)Direct Speed

B)Direct Current

C)Free Current

D)Direct Circulating

Answers

Answer:

c

Explanation:

Write the logical Expression and Draw the Truth table for the
following questions

Write the logical Expression and Draw the Truth table for the following questions

Answers

The logical expressions are

(X NOR Y ) OR Z ⇒ \((\bar X \bar + \bar Y) + Z\)(A NAND B) AND NOT C ⇒ \((\bar A \bar \cdot\bar B) \cdot \bar C\)

How to determine the logical expressions?

Logical expression 1

X and Y are linked by the NOR gate.

So, we have:

X NOR Y

The X NOR Y is linked to Z by the OR gate.

So, we have:

(X NOR Y) OR Z

Hence, the logical expression is (X NOR Y ) OR Z ⇒ \((\bar X \bar + \bar Y) + Z\)

Logical expression 2

A and B are linked by the NAND gate.

So, we have:

A NAND B

The A NAND B is linked to C by the AND gate.

So, we have:

(A NAND B) AND C

Hence, the logical expression is (A NAND B) AND NOT C ⇒ \((\bar A \bar \cdot\bar B) \cdot \bar C\)

See attachment for the truth tables

Read more about truth tables at:

https://brainly.com/question/27989881

#SPJ1

Write the logical Expression and Draw the Truth table for the following questions

What are the return values for the method calls, mScore(27, 89, 15) and mScore('d', 'e', 'f')? public class SortScores { public static T mScore(T scr1, T scr2, T scr3) { T matchScore = scr1; if (scr2.compareTo(matchScore) > 0) { matchScore = scr2; } if (scr3.compareTo(matchScore) > 0) { matchScore = scr3; } return matchScore; } } Select one: a. 15 and f b. 89 and f c. Error d. 27 and d

Answers

The correct answer is option B. 89 and f. The given code defines a generic method mScore that takes three arguments of type T and returns the largest of the three.

In the first method call mScore(27, 89, 15), the arguments are all integers, so the type parameter T is inferred to be Integer. The method compares the three integers and returns the largest, which is 89. Therefore, the return value of this method call is 89. In the second method call mScore('d', 'e', 'f'), the arguments are all characters, so the type parameter T is inferred to be Character. The method compares the three characters and returns the largest, which is f. Therefore, the return value of this method call is f.

Learn more about mScore here:

https://brainly.com/question/31655086

#SPJ11

the default comparison condition for the subtype discriminator attribute is the comparison. a.less than b.greater than c.equality d.nonequality

Answers

Additionally, disjoint subtypes are subtypes that contain unique subsets of the supertype entity set, not nonunique subsets. The other options mentioned in the query, such as less than, greater than, and nonequality, do not apply to the subtype discriminator attribute comparison.

It is important to note that the subtype discriminator can be null, and each supertype occurrence can be a member of at least one subtype. Overall, the subtype discriminator attribute is an essential feature that enables the entity supertype to inherit the attributes and relationships of the subtype. It allows for a more efficient and structured approach to database design, particularly when dealing with complex data models.

Find out more about disjoint subtypes

brainly.com/question/31102888

#SPJ4

why is it important to be part of a team in times you fail and in times you succeed?​

Answers

Answer:

well you will feel better when you lose and have a better time winning with friends?

Explanation:

What defines the behavior of an object in object-oriented programming ?A. ClassB. Object by itselfC. MethodD. Device or platform on which the program runs

Answers

The actions of objects derived from a class are specified by a method. A method is an action that an object is capable of performing, to put it another way.

What factors determine an object's behaviour?

An object's methods, which are the functions and routines specified within the object class, determine how the object behaves. The only thing a class would be without class methods is a structure.

In object-oriented programming, what is behaviour?

The actions an object takes are known as its behaviours. For instance, a person's characteristics include their age, name, and height, whereas their actions include their ability to speak, run, walk, and eat. In Kotlin, behaviours are referred to as functions and attributes as properties.

To know more about class visit:-

brainly.com/question/985406

#SPJ1

Critical thinking skills can be applied to reading.


Please select the best answer from the choices provided

T
F

Answers

T

Critical thinking means that you do not just accept what an author presents. By reading critically, you read skeptically, questioning the author against your own knowledge and your own world view. Sometimes your ideas will align with an author's.

Answer:

Explanation:

hello i know the answe and the anwer is TRUE

what's 3+3 and stop deleting my question i just wasted 41 points

Answers

Answer:

I am pretty confident that the answer is 6

Explanation:

3+3=6

A doctor in progress sheet in a computer she did copy and paste of the previous progress sheet because nothing changed . But she
entered the same date .what type of error ? A. Systematic error B . Random error C. Missing error

Answers

Based on the information provided, the type of error that occurred when the doctor in progress sheet was copied and pasted with the same date is a missing error.

This is option C

This is because the doctor failed to update or change any information on the progress sheet, resulting in missing or incomplete data. It is important to regularly update and review information to ensure accuracy and prevent missing errors.

Missing errors refer to errors or mistakes that occur when something essential or necessary is not present or included. In the context of a document or a piece of writing, a missing error can occur when vital information, words, phrases, or punctuation marks are unintentionally omitted.

These errors can negatively impact the clarity and meaning of the text, leading to confusion or misinterpretation for the reader. It is important to carefully review and proofread any document to identify and correct any missing errors before finalizing it.

So, the correct answer is C

Learn more about missing error at

https://brainly.com/question/14382279

#SPJ11

A) What is the initial configuration BPDU for B4? B) What is the configuration BPDU of B3 after receiving the initial configuration BPDU of B5? C) If B3 accepted B2 as the root, what is the configuration BPDU of B3? D) If B2 accepted B1 as the root through B7, what is the configuration BPDU of B2? E) Which bridge is the designated bridge of LAN C at this time? F) Now, if B5 accepted B1 as the root, what is the configuration BPDU of B3 after receiving the new configuration BPDU of B5? G) Which bridge is the designated bridge of LAN C at this time?

Answers

Answer: b is good

Explanation:

Other Questions
PLEASE HELP ASAP ILL GIVE BRAINLIEST IF CORRECTABC has interior angles with measures x, 100, and 70, and DEF has interior angles with measures y, 70, and 50.Using the given information, which statement is true?The two triangles are not similar because xy .The triangles are similar because they each have an interior angle with a measure 70.The two triangles are not similar because the interior angles are congruent but the side lengths are different.The two triangles are not similar because y = 60 so it is impossible to have three congruent angles. Langevin Ltd., which has a calendar year end, entered into an equipment lease on June 1, 2020, with GH Financing Limited. The lease term is two years and requires payments of $3,000 at the end of each month beginning September 30. The stated rate of interest in the lease is 6%. As an incentive for entering into the contract, GH has agreed to forgive the first three payments under the lease (June, July, and August). Instructions a. What effect, if any, does the forgiveness of the first three payments have on the measurement of the lease transaction on June 1, 2020? b. Calculate the amount that Langevin should record for the lease obligation on June 1, 2020. Use a financial calculator or Excel functions in your calculation. Hint: Calculate the present value of the monthly payments as at September 1, 2020, and then discount this amount to June 1, 2020. W c. What is the amount of the interest accrual that Langevin will record on June 30, 2020, for the lease obligation? d. Is there any measurement uncertainty that needs disclosure in the notes to Langevin's financial statements? Hint: Assume that GH is confident of collecting the lease payments under the lease contract NEEDED ASAP PLEASE HURRY ILL MARK BRAINLIST!!!!!!!!!!!!!!!!!!!!!!!11Select all of the abiotic factors in an ecosystem.PlantsSunlightSoilAnimalsRocksDead deer in the forestTemperature What does it mean to have multiple audiences? Why might that be a challenge for a writer? A sample of 3.62 moles of diphosphorous trioxide isreacted with 6.31 moles of water to producephosphorous acid. Using the balanced equationbelow, predict which is the limiting reactant and themaximum amount in moles of phosphorous acid thatcan be produced.P2O3 + 3HO 2H3PO3A. water, 8.42 molesB. water, 4.21 molesC. diphosphorus trioxide, 7.22 molesD. diphosphorus trioxide, 3.75 moles estimate the line of best fit using two points on the line A business would rely on the GINI Index to understandGroup of answer choicesthe growth rate in production of competitor industries.how industry is developed based on factors of endowment.the relationship between income and expenses in a nation.the degree to which family income is distributed equally within a country. Who created Shia and Sunni and divided Muslims??? Help pls Is the american dream still alive? Billy is hiking in Colorado. He walks eastward four miles, then turns $60$ degrees northward and walks six miles. How far is he from his starting point 1. How do you do your job in Algebra? 2. What would you do to solve 27x = 9? * "A bull in a China shop, that's what she is" - In complete sentences, explain what this phrase means. The book is The Skin I'm In Suppose that you have 8 cards. 5 are green and 3 are yellow. The 5 green cards are numbered 1, 2, 3, 4, and 5. The 3 yellow cards are numbered 1, 2, and 3. The cards are well shuffled. You randomly draw one card.G = card drawn is greenE = card drawn is even-numberedSuppose that this time you randomly draw two cards, one at a time, and without replacement. G1= first card is green G2= second card is green1) What is the probability of G1 and G2?G1: G2: 4/7 2) What is the probability of at least one green? 25/28 3) What is the probability of P(G1 | G2)?Can someone help me with number 3? I do not understand how to solve for it given that there is two unknowns. Thank you! Write queries to delete the following: All the books published before 2000 (by any author) All the books published by John Grisham All the books not published by John Grisham All the b Please help!An anthill has a volume of 8792 mm3 of dirt. Its radius is 20 mm. How far does an ant have to crawl to get from the base of the cone to the top of the hill? (This is the slant height, s, of the cone.) Answer the questions to find out. Use 3.14 for and round your answer to the nearest millimeter if necessary1. What is the height of the cone? Explain how you found the height.2. Now that you have the height of the cone, how can you solve for the slant heights? 3. How far does the ant crawl to get from the base of the cone to the top of the hill? Show your work. Find the point on the sphere x+y+z = 5329 that is farthest from the point (-30,21,11). Write a program that lets the user enter a charge account number. Be sure to include comments throughout your code where appropriate. The program should determine if the number is valid by checking for it in the following list of valid account numbers: 8149420 5333174 3080098 6755963 9526981 4449539 9387197 5104726 2931356 4282637 1750219 6086650 3164838 2419590 4578589 9718904 6749941 2545408 Initialize a one-dimensional array with these values. Then use a simple linear search to locate the number entered by the user. If the user enters a number that is in the array, the program should display a message indicating that the account number is valid. If the user enters a number not in the array, the program should display a message indicating it is invalid. Next, using the same one-dimensional array, use a bubble-sort to put the array in order and perform a binary search to locate the number entered by the user. If the user enters a number that is in the array, the program should display a message indicating that the account number is valid. If the user enters a number not in the array, the program should display a message indicating it is invalid. read the passage. the regular distribution of power into distinct departments the representation of the people in the legislature by deputies of their own election: these are powerful means, by which the excellences of republican government may be retained. brainly what sales people have sold more than 1400 total units? f. when was the earliest and latest order made to samony? Maxine graphs the function m(x) which has a vertex of (-3,4) and passes through the point (-1,-8). Ricardo graphs p(x) = (x+3) +4Ricardo thinks that because both functions have the same vertex, they also have the same range. Is he correct?