Router R1 lists a route in its routing table. Which of the following answers list a fact from a router uses when matching the packet's destination address? (choose 2)
A) Mask
B) Next-hop router
C) Subnet ID
D) Outgoing interface

Answers

Answer 1

The following options that are a fact from a router uses when matching the packet's destination address is A) Mask and C) Subnet ID. These two types address useful when forwarding packets that happen to match the route.

In the term of computer and technology, Routing generally can be defined as the process of selecting a path for traffic in a network or between or across multiple networks. In general, routing usually used   in many types of networks, such as  circuit-switched networks, such as the public switched telephone network, and computer networks, and others. Route can be classified into several types, such as connected route, local route, static route, and dynamic route.

Here you can learn more about routing https://brainly.com/question/30409461

#SPJ4


Related Questions

10+2 is 12 but it said 13 im very confused can u please help mee

Answers

Mathematically, 10+2 is 12. So your answer is correct. However, if you are trying to write a code that adds 10 + 2, you may need to troubleshoot the code to find where the bug is.

What is troubleshooting?

Troubleshooting is described as the process through which programmers detect problems that arise inside a specific system. It exists at a higher level than debugging since it applies to many more aspects of the system.

As previously stated, debugging is a subset of troubleshooting. While debugging focuses on small, local instances that can be identified and fixed in a single session, troubleshooting is a holistic process that considers all of the components in a system, including team processes, and how they interact with one another.

Learn more about Math operations:
https://brainly.com/question/199119
#SPJ1

true or false. Two of the main differences between storage and memory is that storage is usually very expensive, but very fast to access.​

Answers

Answer:

False. in fact, the two main differences would have to be that memory is violate, meaning that data is lost when the power is turned off and also memory is faster to access than storage.

Calculate the total time required to transfer a 500KB file in the following cases. Assume an RTT of 50ms, a packet size of 2KB, and an initial 2xRTT of handshaking before data is sent. A. If the bandwidth is 2Mbps, what is the Bandwidth-Delay Product (BDP)

Answers

Answer:

i) Total time = 2457.73 secs

ii) BDP = 0.01 Mbyte

Explanation:

Packet size : 2 Kb = ( 2 * 8192 ) bits = 16384 bits

Bandwidth : 2Mbps = 2,000,000 bits/sec

RTT = 50 ms = 0.050 secs

i) Determine total time required to transfer 500 kB

= Initial handshake + Time for transmission of all files + propagation delay

= 2 x RTT +  Time for transmission + RTT /2

Total time = ( 2 * 0.05 ) +  (1500 * 1.6384 )+ ( 0.050 / 2 ) = 2457.73 secs

ii) Determine the Bandwidth-delay product

= data link capacity * RTT

= 2 Mbps  * 50 ms =  100,000 =  0.01 MByte

How does one take personal responsibility when choosing healthy eating options? Select three options.

1 create a log of what one eats each day
2 increase one’s consumption of fast food
3 critique one’s diet for overall balance of key nutrients
4 identify personal barriers that prevent an individual from making poor food choices
5 eat only what is shown on television advertisements

Answers

The three options to a healthier eating culture are:

create a log of what one eats each daycritique one’s diet for overall balance of key nutrientsidentify personal barriers that prevent an individual from making poor food choices

How can this help?

Create a log of what one eats each day: By keeping track of what you eat, you become more aware of your eating habits and can identify areas where you may need to make changes. This can also help you to monitor your intake of certain nutrients, and ensure that you are getting enough of what your body needs.

Critique one’s diet for overall balance of key nutrients: A balanced diet should include a variety of foods from different food groups. By assessing your diet, you can determine whether you are consuming enough fruits, vegetables, whole grains, lean proteins, and healthy fats. If you find that you are lacking in any of these areas, you can adjust your eating habits accordingly.

Read more about healthy eating here:

https://brainly.com/question/30288452

#SPJ1

You are a network technician for a small corporate network. Your organization has several remote employees who usually work from home, but occasionally need to be in the office for meetings. They need to be able to connect to the network using their laptops. The network uses a DHCP server for IP address configuration for most clients. While working in the Lobby, a remote employee asks you to configure her laptop (named Gst-Lap) so she can connect to the network.
The laptop is already configured with a static connection for her home office, but the laptop cannot connect to the network while at the office. You need to configure the TCP/IP properties on the laptop to work on both networks. In this lab, your task is to complete the following:
Record the laptop's static IP and DNS configuration settings.
Configure the laptop to obtain IP and DNS addresses automatically.
Create an alternate TCP/IP connection with static settings.

Answers

Answer:

Explanation:

In order to accomplish these tasks, you need to do the following

First, open up the command prompt (CMD) and type in the following command ipconfig ... This will give you both the IP and DNS configuration so that you can record it.

Secondly, right-click on the Ethernet icon on the taskbar, select Properties, then the Networking tab, then Internet Protocol Version 4 (TCP/IPv4), and then click Properties. Here you are going to check the option that says Obtain an IP address automatically and Obtain DNS server address automatically.

Lastly, go over to the General Tab, and enable DHCP. Now, hop over to the Alternate Configuration tab, and select the "User configured" option, and fill in the required information for the static IP address that you want the connection to have.

Network access methods used in PC networks are defined by the IEEE 802
standards.
O a.
False
O b. True

Answers

Answer: stand

Explanation:

2 Consider the sequence of keys (5,16,22,45,2,10,18,30,50,12,1). Draw the result of inserting entries with these keys (in the given order) into a. An initially empty (2,4) tree. b. An initially empty red-black tree.

Answers

Answer:

A) (2,4) tree

Insertion of  key 45 makes key unbalanced and this is because it violates the 2,4 tree so we split the nodeinsertion of key 10 makes key unbalanced and this is because it violates the 2,4 tree so we split the node

B) Red-black tree

Explanation:

The diagrams for the solutions are attached showing the results of inserting entries

2 Consider the sequence of keys (5,16,22,45,2,10,18,30,50,12,1). Draw the result of inserting entries
2 Consider the sequence of keys (5,16,22,45,2,10,18,30,50,12,1). Draw the result of inserting entries
2 Consider the sequence of keys (5,16,22,45,2,10,18,30,50,12,1). Draw the result of inserting entries

Write the HTML code to make the text "Learn Magic" link to a page called "magic-tricks.html”.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The below code is written in HTML

************************************************************************************************

 <!DOCTYPE html>

<!--html start from here and this is comment line -->

<html lang="en-US">  

<body> <!--html body start from here -->

<!-- a link attribute is given below that links another file (magic-tricks)  in the same folder -->  

<p><a href="magic-tricks.html">Learn Magic</a></p>

</body><!--html body end at here -->

</html>

<!--html end at here and this is comment line -->

*************************************************************************************************

When you run this code, it is neccessary     for you to create another html file in same folder and named it "magic-tricks". When you will run the code into any browser and link "learn magic" will appear, as you will click on it "magic-tricks.html" file will get open.

     

4-14. The article mentions that Peloton released a new treadmill exercise platform to accompany its stationary bike product. What recommendation would you give to the company to increase sales of both products, especially since they are so expensive?

Answers

In order to draw in a wider audience of clients, Peloton should increase the variety of workout classes available on their website. This can entail introducing more challenging courses like HIIT.

What is HIIT?

A training method known as high-intensity interval training involves alternating quick bursts of severe or explosive anaerobic exercise with quick rest intervals till exhaustion.

Exercises are performed in HIIT in short, repetitive bursts of maximum or almost maximal effort, followed by periods of rest or low activity.

Due to the body's large recruitment of anaerobic energy systems, the activity differs from aerobic activity in terms of intensity, interval length, and number of bouts.

Hence, "the anaerobic energy release mechanism virtually maximally" is relied upon by the approach. HIIT exercises enhance glucose metabolism while also enhancing athletic performance. The intensity of the high-intensity workout should be close to maximal.

Learn ore about HIIT, here

https://brainly.com/question/26524818

#SPJ1

A vendor conducting a pilot program with your organization contacts you for
organizational data to use in a prototype. How should you respond?

Answers

Since the  vendor is conducting a pilot program with your organization contacts you for organizational data to use in a prototype, The way that you  can respond is to  Refer the vendor to the right personnel.

What is an example of a reference vendor?

A report outlining the payment history between a company customer and its supplier or vendor is known as a supplier reference (or trade reference). It helps a supplier to evaluate your creditworthiness and determine whether you're a trustworthy customer before extending credit to you.

You can determine whether you are prepared to undertake the project fully by running a pilot program. It might highlight unforeseen difficulties that must be resolved, providing you the chance to change and improve in a way that lessens the effects of those difficulties.

Hence, An organization can discover how a large-scale project might function in practice by conducting a small-scale, brief experiment known as a pilot program, also known as a feasibility study or experimental trial.

Learn more about pilot program from

https://brainly.com/question/28920126
#SPJ1

a. Write code to implement the above class structure. Note the following additional information:
Account class: Create a custom constructor which accepts parameters for all attributes. The withdraw method should check the balance and return true if the withdrawal is successful.
SavingsAccount class: Create a custom constructor which accepts parameters for all attributes.
CurrentAccount class: Create a custom constructor which accepts parameters for all attributes. The withdraw method overrides the same method in the super class. It returns true if the withdrawal amount is less than the balance plus the limit.
Customer class: Create a custom constructor which accepts parameters for name, address and id.
b. Driver class:
Write code to create a new Customer object, using any values for name, address and id. Create a new SavingsAccount object, using any values for number, balance and rate. Set the SavingsAccount object as the Customer’s Savings account. Create a new CurrentAccount object, using any values for number, balance and limit. Set the CurrentAccount object as the Customer’s Current account.
Prompt the user to enter an amount to deposit to the Savings account and deposit the amount to the customer’s Savings account.
Prompt the user to enter an amount to withdraw from the Current account and withdraw the amount from the customer’s Current account. If the withdraw method is successful print a success message, otherwise print an error.
Finally print a statement of the customer accounts using methods of the Customer object. Output from the program should be similar to the following:

Enter amount to withdraw from current account:
500
Withdrawal successful
Enter amount to deposit to savings account:
750
Customer name: Ahmed
Current account no.: 2000
Balance: 1000.0
Savings Account no.: 2001
Balance: 1500.0

Answers

According to the question, the code to implement the above class structure is given below:

What is code?

Code is the set of instructions a computer uses to execute a task or perform a function. It is written in a programming language such as Java, C++, HTML, or Python and is composed of lines of text that are written in a specific syntax.

public class Account{

   private int number;

   private double balance;

   //Custom Constructor

   public Account(int number, double balance){

       this.number = number;

       this.balance = balance;

   }

   public int getNumber(){

       return number;

   }

   public double getBalance(){

       return balance;

   }

   public void setBalance(double amount){

       balance = amount;

   }

   public boolean withdraw(double amount){

       if(amount <= balance){

           balance -= amount;

           return true;

       }

       return false;

   }

}

public class SavingsAccount extends Account{

   private double rate;

   //Custom Constructor

   public SavingsAccount(int number, double balance, double rate){

       super(number, balance);

       this.rate = rate;

   }

   public double getRate(){

       return rate;

   }

}

public class CurrentAccount extends Account{

   private double limit;

   //Custom Constructor

   public CurrentAccount(int number, double balance, double limit){

       super(number, balance);

       this.limit = limit;

   }

   public double getLimit(){

       return limit;

   }

   private String name;

   private String address;

   private int id;

   private SavingsAccount savingsAccount;

   private CurrentAccount currentAccount;

   //Custom Constructor

   public Customer(String name, String address, int id){

       this.name = name;

       this.address = address;

       this.id = id;

   }

   public SavingsAccount getSavingsAccount(){

       return savingsAccount;

   }

   public void setSavingsAccount(SavingsAccount savingsAccount){

       this.savingsAccount = savingsAccount;

   }

   public CurrentAccount getCurrentAccount(){

       return currentAccount;

   }

   public void setCurrentAccount(CurrentAccount currentAccount){

       this.currentAccount = currentAccount;

   }

   public String getName(){

       return name;

   }

   public void printStatement(){

       System.out.println("Customer name: " + name);

       System.out.println("Current account no.: " + currentAccount.getNumber());

       System.out.println("Balance: " + currentAccount.getBalance());

       System.out.println("Savings Account no.: " + savingsAccount.getNumber());

       System.out.println("Balance: " + savingsAccount.getBalance());

   }

}

public class Driver{

   public static void main(String[] args){

       Customer customer = new Customer("Ahmed", "123 Main Street", 123);

       SavingsAccount savingsAccount = new SavingsAccount(2001, 1000, 0.1);

       customer.setSavingsAccount(savingsAccount);

       CurrentAccount currentAccount = new CurrentAccount(2000, 1000, 500);

       customer.setCurrentAccount(currentAccount);

       Scanner scanner = new Scanner(System.in);

       System.out.println("Enter amount to withdraw from current account:");

       double amount = scanner.nextDouble();

       if(currentAccount.withdraw(amount)){

           System.out.println("Withdrawal successful");

       }

       else{

           System.out.println("Error");

       }

       System.out.println("Enter amount to deposit to savings account:");

       double amount2 = scanner.nextDouble();

       savingsAccount.setBalance(savingsAccount.getBalance() + amount2);

       customer.printStatement();

   }

}

To learn more about code

https://brainly.com/question/30505954

#SPJ1


1. What criteria must be maintained once a clinical record has been created ?

Answers

The criteria that must be maintained once a clinical record has been created are:

All vital   clinical findings are accurate.A record of the decisions made are true and exact.

What is maintained in a medical record?

Medical records are known to be any kind of document that helps to tell all detail in regards to the patient's history, as well as their clinical findings, their diagnostic test results, medication and others.

Note that  If it is  written rightly, the, notes will help to aid the doctor about the rightness of the treatment of the patient.

Therefore, some of the criteria for high quality form of clinical documentation are they must be :

AccurateExactClearConsistentCompleteReliableLegible, etc.

Therefore, based on the above, The criteria that must be maintained once a clinical record has been created are:

All vital   clinical findings are accurate.A record of the decisions made are true and exact.

Learn more about clinical record from

https://brainly.com/question/21819443
#SPJ1

Write a program that asks the user to enter in a username and then examines that username to make sure it complies with the rules above. Here's a sample running of the program - note that you want to keep prompting the user until they supply you with a valid username:

Answers

user_in = input ("Please enter your username: " )

if user_in in "0123456789":

print ("Username cannot contain numbers")

elif user_in in "?":

print ("Username cannot continue special character")

else:

print (" Welcome to your ghetto, {0}! ".format(user_in))

For Questions 1-4, consider the following code: def mystery1(x): return x + 2 def mystery2(a, b = 7): return a + b #MAIN n = int(input("Enter a number:")) ans = mystery1(n) * 2 + mystery2 (n * 3) print(ans)
What is the output when the user enters -4?
What is the output when the user enters 3?
What is the output when the user enters -2?
What is the output when the user enters 9?

Answers

Answer:

What is the output when the user enters -4?

-9

What is the output when the user enters 3?

26

What is the output when the user enters -2?

1

What is the output when the user enters 9?

56

Explanation: Just did it and got all correct. Hope it helps!!

Write code in MinutesToHours that assigns totalHours with totalMins divided by 60

Given the following code:

Function MinutesToHours(float totalMins) returns float totalHours
totalHours = MinutesToHours(totalMins / 60)
// Calculate totalHours:
totalHours = 0

Function Main() returns nothing
float userMins
float totalHours

userMins = Get next input
totalHours = MinutesToHours(userMins)

Put userMins to output
Put " minutes are " to output
Put totalHours to output
Put " hours." to output

Answers

Answer:

Function MinutesToHours(float totalMins) returns float totalHours

   // Calculate totalHours:

   totalHours = totalMins / 60

   return totalHours

End Function

Which of these are examples of an access control system? Select all that apply.

Answers

Some examples of access control systems are: Card-based access control systems, Biometric access control systems, Keypad access control systems, Proximity access control systems

Access control systems are used to limit or control access to certain areas or resources by determining who or what is authorized to enter or exit. In modern-day society, access control systems are widely used in both commercial and residential settings to enhance security and safety. Some examples of access control systems are discussed below.

1. Card-based access control systems- These are the most common types of access control systems. In card-based systems, authorized personnel are issued an access card that contains a unique code or number. When the person swipes the card through a reader, the system checks if the card is valid and then unlocks the door.

2. Biometric access control systems- In this system, the user's unique physical characteristics are used to identify them, such as fingerprints, voice, face, or retina scans. Biometric systems are highly accurate and provide enhanced security.

3. Keypad access control systems- Keypad systems use a secret code entered through a keypad. The code can be changed frequently to prevent unauthorized access.

4. Proximity access control systems- Proximity systems use a small chip or key fob that emits a radio signal to a reader mounted near the door. When the signal is received, the door unlocks. These are just a few examples of access control systems. There are other systems like security guards, smart cards, RFID-based systems, and more.

For more such questions on Proximity access, click on:

https://brainly.com/question/30733660

#SPJ8

Robyn needs to ensure that a command she frequently uses is added to the Quick Access toolbar. This command is not found in the available options under the More button for the Quick Access toolbar. What should Robyn do?

Access Outlook options in Backstage view.
Access Outlook options from the Home tab.
Access Quick Access commands using the More button.
This cannot be done.

Answers

Access Outlook options in Backstage view

The following do-while loop is suppose to ask for the price for a gallon of gas. The price must a positive number. The price can be an integer value or a double value. for example the price can be 3 or 3.0 or 3.5.

To create a robust program, we must do the data validation and as long as the user is entering a negative value or a String, the program must keep asking the user to enter a valid input.

in this program you need to use some of the scanner methods listed here, make sure to use the proper ones: hasNextInt(), hasNextDouble(), hasNextLine(), hasNext(), nextInt(), nextDouble(), nextLine()

Must flush the buffer at the proper locations in the code

Answers

Answer:

import java.util.Scanner;

public class qs {

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       double price;

       do {

           System.out.print("Enter the price for a gallon of gas: ");

           while (!input.hasNextDouble()) {

               System.out.println("That's not a number!");

               input.next(); // this is important!

           }

           price = input.nextDouble();

       } while (price < 0);

       System.out.println("The price is " + price);

   }

}

. What projects would Excel best be used for?

Answers

Answer:

Projects that require spreadsheet organization and/or calculations between data

Explanation:

That is why Excel is a spreadsheet program

One advantage of the Second generation of programming language is that it is machine dependent. True or False

Answers

Answer:

I THINK FALSE

Explanation:

Read the following statements and select the
conditional statements. Check all that apply.
If my car starts, I can drive to work
It is inconvenient when the car does not start.
If my car does not start, I will ride the bus to
work
I purchased this car used, and it is not
reliable

Answers

if my car starts, i can drive to work

if my car does not start, i will ride the bus to work

Answer:

if my car does not start, i will ride the bus to work

if my car starts, i can drive to work

Explanation:

For connection to place on any network you must have a set of standards?
O True
O False

Answers

Answer:

false

Explanation:

false i just looked into it

Name four successful conversions to an electronic health record system in a medical facility

Answers

A successful conversions to an electronic health record system in a medical facility can be seen at:

Patient identifiersPatient diagnosesMedicationsLaboratory results.

What is EHR conversion?

EHR data conversion, is known to be as a form of data migration where it is known as the process of removing or taking data from an old health record system and putting or moving it into a new system.

Note that EHR data conversion process can take place between paper-based health records and also new EHR.

Learn more about record system from

https://brainly.com/question/508235

#SPJ1

When do you use while loop instead of a for loop?
To loop exactly 10 times
To make sure a correct number is entered
To loop until a certain condition is reached
To perform number calculations

Answers

The option that tells when a person use while loop instead of a for loop is option C:To loop until a certain condition is reached.

What is the while loop?

While loops and for loops are both control structures that can be used in programming to repeat a block of code until a certain condition is met.

While loops are used when you want to repeat a block of code an unknown number of times, or as long as a certain condition is true. The syntax for a while loop is:

Copy code

while (condition) {

 // code to be executed

In all, a person would use a while loop when you want to repeat a block of code until a certain condition is met, and you would use a for loop when you want to repeat a block of code a specific number of times.

Learn more about while loop from

https://brainly.com/question/19344465
#SPJ1

What is one way a lender can collect on a debt when the borrower defaults?

Answers

Answer:

When a borrower defaults on a debt, the lender may have several options for collecting on the debt. One way a lender can collect on a debt when the borrower defaults is by suing the borrower in court. If the lender is successful in court, they may be able to obtain a judgment against the borrower, which allows them to garnish the borrower's wages or seize their assets in order to pay off the debt.

Another way a lender can collect on a debt when the borrower defaults is by using a debt collection agency. Debt collection agencies are companies that specialize in recovering unpaid debts on behalf of lenders or creditors. Debt collection agencies may use a variety of tactics to try to collect on a debt, including contacting the borrower by phone, mail, or email, or even suing the borrower in court.

Finally, a lender may also be able to collect on a debt when the borrower defaults by repossessing any collateral that was pledged as security for the debt. For example, if the borrower defaulted on a car loan, the lender may be able to repossess the car and sell it in order to recover the unpaid balance on the loan.

Explanation:

You want to send an email to members of your team working on a school project. In which field would you put the email addresses of the team members?

Answers

Answer: In the "Send to" section.

Explanation: When sending an email to a single person or group, make sure to type their email addresses into the "Send to" section so that it goes to the correct person/people.

Jason is playing a game in which players must maneuver around changing barriers
and moving objects inside a maze. This is an example of which type of game?

Jason is playing a game in which players must maneuver around changing barriersand moving objects inside

Answers

Answer:
Skill

I hope helps :)

Answer:

skill

Explanation:

In java Please

3.28 LAB: Name format
Many documents use a specific format for a person's name. Write a program whose input is:

firstName middleName lastName

and whose output is:

lastName, firstInitial.middleInitial.

Ex: If the input is:

Pat Silly Doe
the output is:

Doe, P.S.
If the input has the form:

firstName lastName

the output is:

lastName, firstInitial.

Ex: If the input is:

Julia Clark
the output is:

Clark, J.

Answers

Answer:

Explanation:

import java.util.Scanner;

public class NameFormat {

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       

       System.out.print("Enter a name: ");

       String firstName = input.next();

       String middleName = input.next();

       String lastName = input.next();

       

       if (middleName.equals("")) {

           System.out.println(lastName + ", " + firstName.charAt(0) + ".");

       } else {

           System.out.println(lastName + ", " + firstName.charAt(0) + "." + middleName.charAt(0) + ".");

       }

   }

}

In this program, we use Scanner to read the input name consisting of the first name, middle name, and last name. Based on the presence or absence of the middle name, we format the output accordingly using if-else statements and string concatenation.

Make sure to save the program with the filename "NameFormat.java" and compile and run it using a Java compiler or IDE.

Capstone Project part 11 quiz

What is the following code snippet checking? (1 point)
while response != "yes":

Othat response variable is not yet yes

O that response variable is yes

O if "yes" is indexed in an array for the variable "response"

O if the response variable is "no"



If you give all answers you will have an amazing Christmas!

Answers

It is checking if the response is not yet yes

You work at a computer store and a client approaches you, asking you to recommend a computer that she can buy for her son who wants to use the computer for gaming.
Identify the components to consider and provide examples of certain specifications to each component that would be suitable to work for a gaming computer. Also provide the best type of cooling system.

Answers

A good gaming computer shall have at least an i5 processor with liquid cooling system with a good graphic card to ensure lag-free gaming.

What are the essentials of a good computer?

A good computer shall have all the connectivity options with good features and best-in class performance. Storage capacity should be high. Furthermore, processor shall be of top-notch and latest quality.

Hence, the essential technical specifications of a computer.

Learn more about computers here:

https://brainly.com/question/21080395

#SPJ1

Other Questions
Three saucepans hold 500ml,1litre and 2.5litres respectively.Write the ratio of their capacities in its lowest terms What is Egeus's attitude towards Lysander? There are 4 green bails, 3 purple bails, 2 orange bails, and 1 white ball in a box. One bail is randomly drawn and replaced, and Ianother ball is orawWhat is the probability of getting a aroon ball then a purple ball? Which sentence contains an error?A. The data revealed that one in three children contract lice each year.B. Sources say the chicken pox epidemic affected twenty-seven children at the school.C. Five children were taken to the hospital after the crash.D. The school was given $37,000 to buy new computer equipment.I'll mark as brainliest What is the deeper meaning of Horton Hears a Who? Many of the original mayan paintings did not survive the ________ of central america and have been lost. WHy did Liberals attack FDR's plans? what do i add to 2 1/8 to make 6? Select the correct answer[B] = -|A|, which matrix is matrix B? if the policyowner, the insured, and the beneficiary under a life insurance policy are three different people, who has the ownership rights? The feminist approach directs attention to women's experiences and the importance of gender as an element of social structure. T/F Which is used to make cell walls Which words best set a suspenseful scene and create an anxious mood? Select 4 options.nervouslycalmlystartledtenseduneasyblanklyevenly What Indigenous group lived in the Columbia River region for more than 10,000 years? The area of the rectangle A is 54 m and the area of rectangle B is 24 m. If the rectangles are similar and the length of the rectangle A is 9 meters, find the length and width of both rectangle's. If the production function is Q = 30 + 38L +34K, what's the most you can produce with 6 workers (L) and 9 unit of capital (K)? Enter as a value. Type your answer... ANSWER ASAP Measures of Location The values of P50, Q2, and the median are found for the net incomesreported on all individual 1040 tax forms filed last year. What do those values have in common? Chester dives from a board 15 feet above the water he goes 7 feet below the surface of the water What is the total length of Chesters dive When looking through her father's medical supplies, Isabella is surprised to see a funny looking flashlight. She turns it on and it seems to glowpurple. She asks her father what it is for, and he tells her that he uses the light to perform Wood's Lamp Tests. He tells Isabella that it is not oftethat he uses the light but only if he suspects a certain zoonotic disease. Which disease would cause Isabella's dad to get out his black light?A ringwormB. plagueChantavirusD.anthraResetNextG Find the area and circumference. round to the nearest tenth.Area =Circumference =