Checksum can detect the flip of a single bit within a packet as a result of being transmitted through an underlying link. O True O False

Answers

Answer 1

True.

Checksums are commonly used in network communication to detect errors introduced during transmission.

A checksum is a value calculated from the data in a packet and included in the packet itself. When the packet is received, the checksum is recalculated and compared to the transmitted checksum.

If the calculated checksum doesn't match the transmitted checksum, it indicates that the packet has been altered, which can include the flip of a single bit. Therefore, checksums can indeed detect the flip of a single bit within a packet.

You can learn more about checksum at

brainly.com/question/23091572

#SPJ11


Related Questions

who made bars no jutsu

Answers

Answer:

he made it

Explanation: Louis [Cap]one

What is one thing the ADDIE model does NOT account for?
O An investigation of the problem and audience
O The need for end users to receive training in the use of the product
O The existence of various types of media that could be used to deliver the content
O New discoveries and needs that come up in the process of the design step

Answers

Answer:

O An investigation of the problem and audience

Explanation:

ADDIE stands for Analysis, Design, Development, Implementation, and Evaluation which is defined as an instructional systems design framework that helps to develop training courses.

The main idea behind the development of ADDIE was to provide a good learning experience through structured training methods. But there was a limitation of ADDIE that is, it is not able to recognise or investigate the problems and unable to solve the issues.

Hence, the correct option is "An investigation of the problem and audience".

Answer:

It should be the last option

Explanation:

i want pizzzzzzzaaaaaaaaaaa

Answers

sameeeeeeeeeeeeeeeeeeeee

your network uses the following backup strategy: full backups every sunday night incremental backups monday night through saturday night on a thursday morning, the storage system fails. how many restore operations would you need to perform to recover all of the data? answer 1 2 3 4 5

Answers

Two restore operations would you need to perform to recover all of the data.

Which backup technique enables you to backup the modifications every night since the last thorough backup was finished?

Differential backup involves storing data that has been added to or modified since the last full backup. Simply said, after doing a full backup, additional backups are executed to include all changes made to the files and directories. The three most commonly used backup types are full, incremental, and differential. Other backup formats include mirroring and synthetic complete backups.

The incremental backups reflect daily modifications made to files created by email or software programmes, for example. A safe period of time to preserve the backup files is typically two months for a full system backup.

Learn more about the Differential Backups here: https://brainly.com/question/13025611

#SPJ4

TRUE/FALSE. the one-way hash function is important not only in message authentication but also indigital signatures.

Answers

The statement one-way hash function is important not only in message authentication but also in digital signatures is True.

What is a one-way hash function?

A mathematical function called a one-way hash function, commonly referred to as a message digest, takes a variable-length input string and converts it into a fixed-length binary sequence that is challenging to invert—that is, produce the original string from the hash.

One of a cryptographic hash function's key traits is that it is simple to compute the hash given a message. With a good hash function, a message's 1-bit modification will result in a different hash.

To learn more about a one-way hash, use the link given
https://brainly.com/question/13164741
#SPJ4


Fill is the inside color of a shape.
O
a. True
B. False

Answers

Answer:

True.

Explanation:

Fill describes the color of the area inside a designated shape. This statement is true.

the correct answer is true

Within a word processing program, predesigned files that have layout and some page elements already completed are called
text boxes
templates.
frames
typography

Answers

Answer:

I think it's B) templates

     

                   Sorry if it's wrong I'm not sure!!

Explanation:

Within a word processing program, predesigned files that have layout and some page elements already completed are called: B. templates.

In Computers and Technology, word processor can be defined as a processing software program that is typically designed for typing and formatting text-based documents. Thus, it is an application software that avail end users the ability to type, format and save text-based documents such as .docx, .txt, and .doc files.

A template refers to a predesigned file or sample in which some of its page elements and layout have already completed by the software developer.

In this context, predesigned files in a word processing program, that have layout and some page elements already completed by the software developer is referred to as a template.

Read more on template here: https://brainly.com/question/13859569

Topic: Looking around: D&S Theory as Evidenced in a Pandemic News Article Description: In this reflection you are to find a news article from the pandemic on the web that has some connection to Canada. The goal will be to analyse the change in demand and/or supply of a good/service during the pandemic. Read the article and address the following questions/discussion points: 1. Briefly summarize the article and make note about how your article connects with the theory of supply and demand. 2. Based on the article, what kind of shift or movement along the demand and/or supply curve would be expected? Make sure to explain your reasoning and draw a Demand and Supply graph with the changes shown. Also, address the change in equilibrium price and quantity. 3. How, in the limited amount of economics we have covered thus far, has your perspective on how the economy works changed? Include either a copy of your article in your submission, or a hyperlink embedded in your submission for your professor to access the article. Your reflection should be between 250 and 300 words or one page double spaced, 11 or 12 pt font.

Answers

Article summaryThe article “Canadian small business owners frustrated with customers refusing to wear masks” by Karen Pauls published in CBC News on August 14, 2020.

The article shows how small business owners are grappling with the balance between health and safety for their customers and workers and the economic impact of the pandemic on their businesses. The article connects with the theory of supply and demand as it highlights how the change in demand for products and services offered by small businesses is influenced by changes in customer behaviour and attitudes towards the mandatory use of masks.2. Shift or movement along the demand and/or supply curve

The mandatory use of masks by customers in small businesses would lead to a decrease in demand for products and services offered by the small businesses, resulting in a leftward shift of the demand curve. The decrease in demand would lead to a decrease in the equilibrium price and quantity of products and services. For instance, in the case of small businesses, this would mean a decrease in the quantity of products sold and the price charged for the products.

To know more about article visit:

https://brainly.com/question/32624772

#SPJ11

Compare and contrast iOS in a short essay and explain which one is better. Also, write the significant points as bullet points.
Do not troll; wrong answers will be deleted and reported.
The best answer will be marked brainliest!

Answers

Android is a more open operating system than iOS. In iOS, users hardly have any system permissions, whereas, in Android, users may easily modify their phones. There is Android software for numerous brands, like Samsung, LG, etc.

What is the system?

A system is a group of moving or interrelated elements that act according to a set of rules to form a unified whole. A system, surrounded and influenced by its situation, is described by its boundaries.

The advantages of the IOS are considered as.

iOS By using it they were provided with the best interface and understanding.iOS is a most secure operating system than any other.the iOS operating system is best for Businesses and Professionals.

Therefore, As a result, IOS devices are very much significant and useful. There are different features are there in it.

Learn more about the system here:

https://brainly.com/question/19843453

#SPJ1

how would you describe a condition in which one attribute is dependent on another attribute when neither attribute is part of the primary key?

Answers

This type of condition is known as a functional dependency, where one attribute's value is uniquely determined by another attribute's value, even if neither attribute is part of the primary key.

For example, let's say we have a table that stores information about students, including their ID, name, and their academic program. If we observe that each student's academic program is determined by their ID, then we say that there is a functional dependency between the "academic program" attribute and the "ID" attribute.

Functional dependencies are an important concept in database design, as they can affect the efficiency and correctness of database operations such as querying, updating, and deleting records. In some cases, we may want to modify the table's structure to remove or reduce functional dependencies, through techniques such as normalization.

Learn more about  functional dependency

https://brainly.com/question/30045891

#SPJ11

question 6a data analyst sorts a spreadsheet range between cells k9 and l20. they sort in ascending order by the first column, column k. what is the syntax they are using?

Answers

When the data analyst sorts a spreadsheet range between cells K9 and L20 and sorts in ascending order by the first column, Column K, the syntax they are using is the SORT Function. Syntax for the SORT function is given below:SORT(range, sort_column, is_ascending, [sort_column2, is_ascending2], ….)

In the above syntax, the first argument is the range, which is a contiguous range or an array to sort. The second argument is sort_column, which indicates which column to sort by. The third argument is a boolean value, is_ascending, which is used to sort the range in ascending order. The fourth argument is an optional argument, sort_column2, which can be used to sort the range by a second column if the values in the first column are equal. The fifth argument is another optional argument, is_ascending2, which can be used to indicate whether the range should be sorted in ascending or descending order.

To know more about Data Analyst visit :

https://brainly.com/question/31594489

#SPJ11

you are given an array of integers which is sorted in decreasing order, and you want to sort it in increasing order. you decide to use quick-sort. in the implementation of quick-sort, the first index is always chosen as the pivot. this leads to a o(nlogn) solution to this problem. question 16 options: true false

Answers

When given an array of integers that are arranged in descending order, you wish to arrange them in ascending order. You opt to employ quick-sort. The first index is always chosen as the pivot when quick-sort is used. This results in an o(nlogn) answer to the issue: False.

If the first index is always chosen as the pivot in quick-sort, then it will lead to worst-case time complexity of O(n²) for already sorted or reverse-sorted input arrays. This is because the pivot will always be the smallest or largest element in the array, resulting in an unbalanced partitioning that leads to many recursive calls and a significant increase in running time. Therefore, it is not guaranteed to have an O(nlogn) solution with this approach. A better pivot selection strategy can be used to improve the performance of quick-sort on already sorted or reverse-sorted input arrays.

To learn more about array
https://brainly.com/question/29989214
#SPJ11

Which of the following best describes today’s average gamer?

The average age is eighteen, and many more males play than females.
The average age is thirty, and only slightly more males play than females.
The average age is thirty, and many more males play than females.
The average age is eighteen, and only slightly more males play than females.

Answers

The correct answer is A

In two to three paragraphs, compare and contrast digital audio with analog. In your writing, be sure to demonstrate mastery by citing at least three sources and showing a clear comparison of the two technologies.

Assignment Guidelines:

Use complete sentences and cite any resources that you use.

Submission Requirements:

Submit two to three paragraphs.

When submitting written assignments please remember to:

Submit the assignment question(s) and your responses.
Proofread for spelling, grammar, and punctuation.
Use complete sentence structure.
Paragraphs need to have minimum of six sentences.

Answers

Answer:

Honestly I don’t want to:(((

Explanation:

I know I usually jus answer your questions but! GAH

Your motherboard has two memory slots and supports a maximum of 8 GB of RAM. After installing two 4 GB modules and booting your system, you find that Windows only recognizes 3.5 GB of RAM. What should you do?

A. Upgrade to a 64-bit version of Windows.
B. Change the memory timings in the BIOS to a slower (higher) setting
C. Return both modules for a replacement
D. Reboot the computer and run memory diagnostic tests on the memory
E. Make sure that both modules are seated properly in their slots.

Answers

Answer: A. Upgrade to a 64-bit version of Windows.

Explanation: In this situation, you are most likely using a 32-bit version of Windows, which can only address a maximum of 4 GS of RAM. Some of the 4 GB is used by drivers hence it only reports 35 GB of System RAM. Upgrading to a 64-bit version of Windows should fix the problem.

The BIOS should display the total amount of system memory during POST. If it does not count the proper amount of memory, verify that the memory is inserted correctly. In most cases, you will not need to change the memory timings. When you do it is typically because the system is unstable or crashes. Testing memory helps you identify when specific memory storage locations are going bad. Device Manager will not enable memory not recognized by the BIOS.

Explanation:

We should upgrade to a 64-bit version of Windows. Hence option A is correct.

What is Windows?

Windows is defined as a collection of different proprietary graphical operating system families that Microsoft has created and is promoting. Microsoft Windows is a personal computer operating system (OS) created by the Microsoft Corporation. It is also known as Windows and Windows OS (PCs).

Most likely, you are using a 32-bit version of Windows in this case, which can only address up to 4 GS of RAM. It only reflects 35 GB of system RAM since some of the 4 GB are being consumed by drivers. The issue should be resolved by upgrading to a 64-bit version of Windows. You can detect whether particular memory storage places are failing by testing the memory. Memory that is not recognized by the BIOS will not be enabled by Device Manager.

Thus, we should upgrade to a 64-bit version of Windows. Hence option A is correct.

To learn more about Windows, refer to the link below:

https://brainly.com/question/13502522

#SPJ5

Why is it important to take precautions such as turning off a computer and discharging electricity before
opening the case on a computer?
O The case requires battery operation only when being opened.
O The case is locked until the computer is unplugged.
/
O Memory will be lost if the case is removed while connected to electricity.
O The internal components are static sensitive.

Answers

The reason why is it important to take precautions such as turning off a computer and discharging electricity before opening the case on a computer is: "The internal components are static sensitive." (Option D)

What is the rationale for the above response?  

It is important to take precautions such as turning off a computer and discharging electricity before opening the case on a computer because the internal components of a computer are sensitive to static electricity.

Static electricity can build up in the body or in clothing and can cause a discharge of electricity when in contact with sensitive electronic components. This discharge can damage or destroy the components, leading to the malfunctioning or failure of the computer.

By turning off the computer and discharging any residual electricity, the risk of a static discharge is minimized.

Learn more about static sensitive at:

https://brainly.com/question/18354578

#SPJ1

algorithm and flowchart and c program to display sum of 5 different number​

Answers

The algorithm and flow chart and c program to sum of 5 different number is given below.

Describe C programming?

C is a compiled language, which means that programs written in C must be compiled before they can be run. This compilation process produces machine code, which is the code that can be executed by a computer. Because of this, C programs can be very fast and efficient.

One of the strengths of C is its ability to work with memory directly through pointers. Pointers are variables that store memory addresses, allowing the programmer to manipulate the data at that address. This can be useful in low-level programming tasks, such as working with hardware or writing device drivers.

Here's the algorithm to display the sum of 5 different numbers:

Declare a variable sum and initialize it to zero.Prompt the user to enter the first number and store it in a variable.Add the value of the first number to the sum variable.Repeat steps 2-3 for the second, third, fourth, and fifth numbers.Output the value of the sum variable.

Here's the flowchart for the same:

          Start

             ↓

Initialize sum = 0

             ↓

Prompt user for first number

             ↓

Add first number to sum

             ↓

Prompt user for second number

             ↓

Add second number to sum

             ↓

Prompt user for third number

             ↓

Add third number to sum

             ↓

Prompt user for fourth number

             ↓

Add fourth number to sum

             ↓

Prompt user for fifth number

             ↓

Add fifth number to sum

              ↓

Output sum

               ↓

            End

Here's the C program to display the sum of 5 different numbers:

#include <stdio.h>

int main() {

   int num1, num2, num3, num4, num5, sum;

   printf("Enter the first number: ");

   scanf("%d", &num1);

   printf("Enter the second number: ");

   scanf("%d", &num2);

   printf("Enter the third number: ");

   scanf("%d", &num3);

   printf("Enter the fourth number: ");

   scanf("%d", &num4);

   printf("Enter the fifth number: ");

   scanf("%d", &num5);

   sum = num1 + num2 + num3 + num4 + num5;

   printf("The sum of the numbers is %d\n", sum);

   return 0;

}

This program prompts the user to enter 5 different numbers, stores them in variables, calculates their sum, and outputs the result.

To know more about sum visit:

https://brainly.com/question/13437666

#SPJ9

2. What changes, if any, could Lisa make to her income?
Ramsey classroom

Answers

Answer: what changed if any could lisa make to her income

Explanation:

Give three uses of sub-directors or subfdders​

Answers

Organization and file management: Sub-directories or subfolders are often used to organize and categorize files within a larger directory or folder. This can make it easier to find and access specific files, and can also help to keep files organized and prevent clutter.

Security and access control: Sub-directories or subfolders can be used to restrict access to certain files or groups of files. By creating sub-directories or subfolders and then setting permissions on them, an administrator can control who has access to specific files and what level of access they have.

Backup and recovery: Sub-directories or subfolders can be used to create backups of important files. By creating a sub-directory or subfolder and copying important files into it, an administrator can ensure that a copy of the files is always available in case of a data loss or failure.

Why should you delete files from your computer?


so that you will have less work to do

because only one hundred files can be saved in a directory

to increase the computer's efficiency

to improve your productivity

Answers

to increase the computer's efficiency

Explanation

The more files it holds, the more "jobs" it has to run, which means that you're computer would be using the same amount of energy running all of them as to less of them. When you close (or delete) some files, it allows the computer to concentrate on only running a smaller amount of files as oppose to a large amount.

hope it helps!

Answer:

To increase the computer's efficiency.

Explanation:

Having a bunch of files will most likely slow down your computer and make things harder to do. If you don't have a bunch of files, though, your computer will be faster and easier to guide through.

I hope this helps :)

Write a pseudocode algorithm that ask a user to enter three numbers. The program should calculate and print their average

Answers

Answer:

BEGIN

INPUT first_number, second_number, third_number

average = (first_number + second_number + third number)/ 3

PRINT average

END

Explanation:

That is the simplest answer one can create

what is the purpose of padding in an ethernet frame

Answers

The purpose of padding in an Ethernet frame is to ensure that the data field of the frame meets the minimum length requirement.

Padding helps maintain data integrity and allows for the proper functioning of the frame-check sequence.

Padding is essential for Ethernet frames because Ethernet standards specify that a frame must be a certain minimum length to ensure the proper functioning and integrity of the network. The standard requires the data field of an Ethernet frame to be at least 46 bytes. If the actual data being transmitted is less than this, padding bytes are added to meet the minimum requirement. The receiving end discards these padding bytes upon reception. Without padding, frames that are too short could lead to errors in the timing of collision detection or may be mistaken as network noise, which could result in a failure in data transmission.

Learn more about Ethernet frames here:

https://brainly.com/question/30097829

#SPJ11

____ is an older tcp/ip protocol and an application used for text-based commmunication

Answers

Telnet is an older TCP/IP protocol and an application used for text-based communication.

Developed in the late 1960s, it allows users to remotely access another computer over a network. Telnet works by establishing a connection between a client and a server, with the client sending commands to the server for execution.

As a text-based protocol, Telnet is simple to use and can be accessed through a command-line interface or a dedicated application. However, it has been largely replaced by more secure alternatives like SSH, as Telnet transmits data in plain text, making it vulnerable to eavesdropping and unauthorized access. Despite its security flaws, Telnet remains a valuable tool for network diagnostics, troubleshooting, and simple remote access to legacy systems.

Learn more about Telnet here: https://brainly.com/question/29417864

#SPJ11

Universal Containers is designing a new community using the Customer Community license type. They would like to have the users complete survey questions through the community interface and store the responses in a Custom Object that has a lookup to the account object. Any internal user who has access to the account should be able to see all survey responses. All Customer Community users should be able to see surveys filled in by other users for their company, but not surveys for other companies. What are the correct security settings to achieve this

Answers

Answer:

The correct option is B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

Explanation:

Note: This question is not complete as the options are not included. The complete question with the options is therefore provided before answering the question as follows:

Universal Containers is designing a new community using the Customer Community license type. They would like to have the users complete survey questions through the community interface and store the responses in a Custom Object that has a lookup to the account object. Any internal user who has access to the account should be able to see all survey responses. All Customer Community users should be able to see surveys filled in by other users for their company, but not surveys for other companies. What are the correct security settings to achieve this?

A. Set all Organization-Wide Default security to be "Public Read/Write" for internal users and "Private" for external users.

B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access

C. Set all Organization-Wide Default settings to be "Public Read/Write" for both internal and external users.

D. Set the custom object to be master-detail to the Account and leave the Organization-Wide Default settings as their default values.

The explanation of the answer is now provided as follows:

Organization Wide Default security refers to settings that provides most restrictive settings that may be opened up by Role Hierarchy and Role hierarchy can be opened by Sharing rules. And the visibility of records at the record level is determined by all of these factors. Private, Public Read, Read/Write, and Read/Write & Transfer are the four permissions available in Sharing Rules.

The rules that are used to offer sharing access to users in public groups, roles, or territories are referred to as sharing rules. By introducing automatic exceptions to your org-wide sharing policies, sharing rules allow certain users more access.

By implication, the correct security settings to achieve the objective stated in the question is to set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

Therefore, the correct option is B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

Use the drop-down menus to describe how Adnan can add shapes to his presentation.

Which command group in the Insert tab should he click?


Which cursor would appear on the slide?


Which combination of actions should he take to insert the shapes on the slide?

Answers

Answer:

✔ Illustrations

✔ a crosshair

✔ left-click and drag

Explanation:

Answer:

1) Illustrations

2) a crosshair

3) left-click and drag

Explanation:

Which layer(s) of the web application are being used when the user hits the button?

Answers

When a user hits a button on a web page the three layers including presentation layer, logic layer, and data layer, of the web application are being used.

For data processing the web applications are organized into three layers which are the presentation layer, the logic layer, and the data layer.  Based on the given scenario in the question, all the three layers of the web application are being utilized when the user hits a button on a web page/web application.

The working of each layer of the web application upon hitting a button is as follows:

The presentation layer:  It allows the user to hit the button. It provides an interface through which the user interacts with the web application by clicking a button. The user hits the button on the presentation layer.

The logic layer: The presentation layer then communicates to the logic layer where the request generated by clicking the button is processed. For  processing the request, the logic layer interacts with the data layer to acquire the data needed. After receiving the data, the logic layer processes it and sends it back up to the presentation layer to be displayed to the user. The function of the logic layer is to process the requested data.

The data layer: The data layer sends the required data to the logic layer for processing. The data layer stores and manages all the data associated with the application.

You can learn more about web application layers  at

https://brainly.com/question/12627837

#SPJ4

The short-range two-way communication technology behind contactless payments is called ____.

Answers

Near field communication

The short-range two-way communication technology behind contactless payments is called Near-field communication.

What is Near-field communication?

A set of communication protocols known as near-field communication allows two electronic devices to communicate over a distance of no more than 4 cm.

NFC provides a slow connection with a straightforward setup that can be utilised to launch more powerful wireless connections.

The technology known as NFC (near field communication) enables two devices, such as your phone and a payment terminal, to communicate with one another while they are in close proximity. The technology that permits contactless payments is called NFC.

NFC payments shorten checkout queues, which boosts client satisfaction with your company. Additionally, NFC contactless payments result in shorter transaction times.

Thus, the answer is Near-field communication, visit:

https://brainly.com/question/3942098

#SPJ2

Stacy is in the process of creating a storyboard for her personal website, but she is unable to decide which storyboarding technique to use. Which technique would work best for her?

Answers

Answer:

Webbed storyboard technique

Explanation:

There are several storyboard techniques; however, the best for a website is the webbed storyboard technique.

Coined from the word "web", this technique does not only help in linking pages within the website where a page can be access from other pages, it also links pages of the website to external pages.

An illustration is as follows:

From the homepage of a website, one can access the contact page, the about page, etc.

Each of the listed pages also have link back to the homepage and to every other pages.

Is it possible to be logged into a wifi network that does not have internet access.

Answers

Answer: Im not sure.

Explanation:

If i had to give you a straight answer it would be NO.

Directions: All your answers must be on a Word Document with any equations created using the Equation Editor. Verify your answer using Excel and the Constrained Optimization template posted on Canvas, copy and paste your Answer and Sensitivity Reports into the same Word Document and turn in Monday in class. 1) Suppose you are asked to Minimize the following function using the Lagrangian technique for solving for a relative extremum:
Min f(x,y)
s.t. x+y


=x
2
+y
2

=10

a) What is the optimal value of x ? b) What is the optimal value of y ? c) What is the optimal value of λ ? d) What is the mathematical interpretation of λ ? e) Be sure to attach your Answer Report to your Word Document. f) Be sure to attach your Sensitivity Report to your Word Document.

Answers

The problem requires minimizing a function using the Lagrangian technique and solving for a relative extremum. The objective function and constraints are provided, and the optimal values of x, y, and λ need to be determined. Additionally, an Answer Report and Sensitivity Report must be attached to the Word Document.

a) To find the optimal value of x, we need to solve the Lagrangian equation by setting the partial derivative of the objective function with respect to x equal to λ times the partial derivative of the first constraint with respect to x. By solving this equation along with the given constraints, we can determine the optimal value of x.

b) Similarly, the optimal value of y can be obtained by setting the partial derivative of the objective function with respect to y equal to λ times the partial derivative of the first constraint with respect to y and solving the resulting equation along with the given constraints.

c) The optimal value of λ, also known as the Lagrange multiplier, can be determined by solving the system of equations formed by the objective function and the constraints.

d) The Lagrange multiplier λ represents the rate of change in the objective function with respect to a small change in the constraint. It provides information about the sensitivity of the objective function to changes in the constraint.

e) An Answer Report should be generated, summarizing the optimal values of x, y, and λ, as well as the corresponding objective function value.

f) A Sensitivity Report should also be generated, providing insights into the sensitivity of the optimal solution to changes in the constraints and the objective function.

Both the Answer Report and the Sensitivity Report should be attached to the Word Document for submission.

Learn more about  information here: https://brainly.com/question/31713424

#SPJ11

Other Questions
y is the answer lock. Escoge la mejor respuesta, segun el contexto.36. Todos los di'as despue's de __ juego con mis hermanos.A. estudioB. estudiarC. estudieD. estudiando37. s importante que me digas la verdad para que __ progresar. A. poderB. podemosC. podamosD. pudiendo38. No quiero verte hasta que me __ perdo'n. A. pidasB. pidiendoC. pedirD. pides39. Ayer trabajaba cuando tu' __ a verme. A. vinisteB. vengasC. venirD. viniendo40. ?Que' tengo que hacer para que tu' me __?A. entiendesB. entiendasC. entenderD. entendiendo41. Vamos a cantar juntos en cuanto __ el pianista. A. llegadoB. llegarC. llegueD. llega42. Antes de que tu' te __ quiero contarte algo.A. vayasB. ibasC. vas D. fuiste43. No necesito la calculadora para __ el resultado. A. se'B. sabidoC. sepaD. saber44. Nadie puede jugar al futbol aqui sin __ un permiso. A. traerB. traigaC. traeD. trayendo45. Ella no entiende la leccion sin que yo le __ todo por segunda vez.A. explicarB. explicadoC. explicoD. expliqueBRAINLIEST!! How do you calculate this? Duncan takes a piece of plywood that is 16 inches long and uses a table saw to make a 20 inch cut from corner to opposite corner what was the width of the piece of plywood A customer uses three $0.75 coupons when checking out of the grocery store. Which expression below represents this scenario?A30.75B3(0.75)C(3)0.75D(3)(0.75) I need the answers pls!!! The kitchen supervisor at Cooper High School wanted to make sure that students were enjoying the lunches being provided. She decidedto conduct a survey. At the beginningof a certain lunch period, she gavethe first person who got in line asurvey and asked him or her to fill itout and return it. She then gave outsurveys to every 10th student whofollowed. This is an example of a:Answer Choices:simple random sample.systematic sample.cluster sample.stratified random sample. What mass of nacl is in 0.600 l of 0.250 m solution? I already answered number 1 and 3 I just need 2 4 and 5 thats it Ill mark you brilliant AND GIVE EXTRA POINTS!!!1.How do you know you have a direct variation in the relationship between two quantities? The ratio.2.What is constant of proportionality?3.In a graph where two quantities have a direct variation, what of the line is the constant of proportionality, the constant of variation, the rate of change? The relationship between two quantities4.The height of the water in a pool is proportional to the minutes it takes for the pool to fill up. If the height of the water is 2 inches after 5 minutes, what is the constant of proportionality/constant of variation in this situation?5.Pizzas cost $8 each plus $3 delivery charge as it . in the table below:Number of Pizzas 1 2 3 4Cost $11 $19 $27 $35Is there a direct variation?What is the rate of change/slope? Big Ideas MathThe area of a rectangle is 35 square meter. The width is 25 meter.a. What is the length of the rectangle? Write your answer as a fraction in simplest form. The length of the rectangle is meters.b. How many times greater is the length than the width? Write your answer in simplest form. The length is times greater than the width.Find the area and perimeter of the indicated regions. Write your answers as mixed numbers, if necessary.a. One end zone: Perimeter: yd Area: yd2b. The playing field (not including end zones): Perimeter: yd Area: yd2c. The playing field (including end zones): Perimeter: yd Area: yd In two or three sentences identify a specific instance of dramatic irony in the section of Romeo and Juliet the psychological contract between employers and workers is still very strong.true/false Write a letter to a fictitious friend who is addicted to tobacco. The letter should describe at least three different ways to quit smoking. Write at least one paragraph with all required information Presented. Describe strategies. Examine a centers for disease control (cdc) advertising campaign that promotes the influenza (flu) vaccination. _____ tools are capable of "drilling up," proceeding from the smallest unit of data to higher levels. Question 5Which country became extremely wealthy from precious metals exported toEurope?O SpainO ItalyFranceGermanyQuestion 62 pts What is the description of the pattern in the sequence?5, 10, 20, 40, 80,...The pattern is to multiply by 2.The pattern is to add 2.The pattern is to add 5.The pattern is to multiply by 5. In the above redox reaction, use oxidation numbers to identify the element oxidized, the element reduced, the oxidizing agent and the reducing agent. name of the element oxidized: 2HBQ3 + Cl a group of hikers is progressing steadily along up uphill trail. the graph shows their elevation What is the Ogham alphabet?