The ______ is a group of microchips on the motherboard that control the flow of data and instructions to and from the processor

Answers

Answer 1

A chipset is a group of microchips on the motherboard that control the flow of data and instructions to and from the processor.

The chipset, a vital part of the motherboard of a computer, is responsible for regulating the transfer of information and commands between various hardware elements, principally the processor (CPU) and other devices.

The Northbridge and Southbridge are two of the many microchips that make up the chipset, each of which performs a distinct task. The Northbridge manages the high-speed connection between the CPU, memory (RAM), and graphics card and is often placed nearer to the CPU. Through the front side bus (FSB), or more recently, the Direct Media Interface (DMI) or PCI Express, it makes data transfer easier.

Learn more about Chipset and Motherboard here:

https://brainly.com/question/14722946

#SPJ4


Related Questions

A SaaS provider such as Oracle or SAP manages service levels and availability . This is advantageous because _____.

Answers

A SaaS provider managing service levels and availability is advantageous because it relieves the burden of managing and maintaining the underlying infrastructure and software from the end-user.

What is Oracle?

Oracle is a multinational computer technology corporation that specializes in developing and marketing database software, cloud engineered systems, and enterprise software products. It is best known for its flagship product, the Oracle Database, which is widely used in many large corporations and organizations. Oracle also provides other software and services, including cloud-based infrastructure and platform services, enterprise resource planning (ERP) software, customer relationship management (CRM) software, and more.

Here,

This means that the end-user can focus on using the software to run their business rather than worrying about the technical aspects of the software. Additionally, SaaS providers often have more resources and expertise in managing infrastructure and software, which can lead to better service levels and availability compared to what the end-user could achieve on their own.

To know more about Oracle,

https://brainly.com/question/26420772

#SPJ4

What is BM(of KARD)'s favorite color,I'm making a Powerpoint about K-Pop because my teacher asked me to,and for me to give them some song reccomendations(I have that covered though UwU).
Thanks!

Answers

Answer:

I don't even know but hey fellow K-Pop stannnnn

List three professional ethical dilemmas that you might face at work and identify your personal ethics that may conflict or align with each ethical dilemma. For each of the three professional ethical dilemmas, describe how would you separate your personal ethics from the professional ethical dilemma? 2. Why are ethical codes important in practicing medicine? 3. Why is it important to study ethics as a health care professional? 4. How do duty-based, utilitarianism, and virtue-based ethical theories differ? How are they the same? 5. Compare how morals and values are developed.

Answers

1. Professional ethical dilemmas that you might face at work and your personal ethics that may conflict or align with each ethical dilemmaProfessional ethical dilemmas are common and you may face them frequently at work. Here are three ethical dilemmas with an explanation of how to align personal ethics with professional ethical dilemmas.

1. Patient ConfidentialityAs a healthcare professional, patient confidentiality is paramount. However, you may face a situation where sharing confidential information about a patient could save another patient's life. The conflict arises between the obligation to protect a patient's information and the duty to prevent harm. Personal ethics aligned with the Hippocratic Oath, which prioritizes the patient's well-being over privacy concerns, can conflict with the obligation to maintain patient confidentiality. Therefore, healthcare providers should consider the severity of the situation and ensure that they comply with the law.

2. Quality of Care vs. Cost ControlHealthcare providers are responsible for providing quality care to patients, but cost control measures can conflict with this obligation. The ethical dilemma arises when healthcare providers have to make choices between controlling the cost of treatment and providing quality care. If the healthcare provider prioritizes patient care, it may increase the cost of care. Personal ethics aligned with the principle of justice, which calls for equal access to healthcare, may conflict with the need to control the cost of care. Healthcare providers should consider the ethical implications of their actions and work with their organizations to improve the quality of care while keeping costs under control.

3. End-of-Life CareDecision-making about end-of-life care is another professional ethical dilemma that healthcare providers face. There is a conflict between the need to preserve life and the patient's autonomy. Personal ethics that support patient autonomy and the right to make end-of-life decisions may conflict with the obligation to preserve life.

To know more about Professional visit:

https://brainly.com/question/3396195

#SPJ11

PLEASE HELP ME !!!!!!!!

PLEASE HELP ME !!!!!!!!

Answers

Answer:

This is way to long

Explanation:


What types of customizations have you or would you make to your operating system, and why?

Answers

Answer:

Explanation:

I have made a couple of customizations to my OS, which is Windows 10. The first being that I activated dark mode, this feature turns the entire OS into a dark-themed color, including apps and menus. This makes using the computer for extended hours much easier on the eyes. The other very important customization I added was a hover taskbar. This allows me to add many important shortcuts to the taskbar which all appear when I hover over the taskbar. It makes my desktop much cleaner and I have quick and easy access to my most important applications.

you will write a program to model a series of stock market transactions over time. your program will allow a user to examine stock prices and find trends using real historical price data.

Answers

To model a series of stock market transactions over time and allow users to examine stock prices and find trends using real historical price data, you can build a program using a programming language like Python. Here's an outline of how the program can be structured:

Collect Historical Price Data: Utilize an API (e.g., Alpha Vantage, Yahoo Finance) to fetch historical stock price data for a given stock symbol or ticker. Define the time period (start and end dates) for which the historical data should be retrieved. Store the Data: Create a data structure, such as a list or a pandas DataFrame, to store the fetched historical price data. Each data point should include the date and the corresponding stock price.Analyze and Visualize Data: Implement functions or methods to analyze the stored data, such as calculating moving averages, identifying peaks and troughs, or detecting trends using statistical techniques.

Learn more about transactions here

https://brainly.com/question/31385909

#SPJ11

Open the pt activity. Perform the tasks in the activity instructions and then answer the question. What is the code displayed on the web page?

a. 192. 168. 10. 1

b. 192. 168. 10. 100

c. 209. 165. 201. 3

d. 209. 165. 201. 4

Answers

I cannot directly access or open specific activities or web pages. However, I can guide you on how to find the code displayed on a web page.To find the code displayed on a web page, you can follow these steps:

Open the web page in a web browser. Right-click on the web page and select "Inspect" or "Inspect Element" from the context menu. This will open the browser's developer tools. In the developer tools panel, you will see several tabs, such as Elements, Console Network, etc. Click on the "Elements" tab.


Within the Elements tab, you will see the HTML code of the web page. You can expand or collapse sections of the code to find the specific code you are looking for. Look for the code that is relevant to your question. It could be a line of code, an HTML tag, or a CSS class. Once you have located the code, you can note it down or take a screenshot for reference.

To know more about web page visit :-

https://brainly.com/question/32613341

#SPJ11

Elena finished typing her report on dogs into a Word document. What command should she choose to proof her document for errors

Answers

Elena should choose the "Spelling & Grammar" command in Microsoft Word to proof her document for errors.

To proofread her document for errors, Elena should select the "Spelling & Grammar" command in Microsoft Word. This feature automatically checks the text for spelling and grammar mistakes. By selecting this option, Word will scan the entire document, underlining any potential errors and offering suggested corrections.

The "Spelling & Grammar" command in Word is a powerful tool that helps users identify and correct mistakes in their documents. When Elena initiates the command, Word will review the text and highlight any misspelled words or grammar errors using red or green underlines. She can then right-click on the underlined words or phrases to see a list of suggested corrections.

By carefully reviewing these suggestions, Elena can make the necessary corrections to ensure her report is free from errors and maintains a professional quality. Additionally, the command also provides grammar suggestions, such as identifying incorrect verb tenses or subject-verb agreement errors, which further enhances the overall accuracy and clarity of the document.

Learn more about Microsoft Word here:
https://brainly.com/question/30160880

#SPJ11

what ensures that multiple consumers of a private cloud can't access each other's data

Answers

Through segregation and isolation, the cloud provider can allocate resources to the various groups while preventing them from seeing or altering each other's assets.

Which cloud enables users to serve various customers simultaneously?

Resource pooling and multi-tenancy Multi-tenancy enables numerous users to share the same apps or physical infrastructure while maintaining the privacy and security of their data.

What does cloud computing scalability mean?

Cloud scalability in cloud computing refers to the capacity to increase or decrease IT resources to meet changing demand. One of the cloud's distinguishing characteristics and the main reason for its skyrocketing popularity among enterprises is scalability.

To know more about privacy and security visit:-

https://brainly.com/question/13165806
#SPJ4

Which properties of the word "readability” changed? Check all that apply.

Answers

Answer:

case

color

size

style

Explanation:

If the value is set to equals to current entry then
a) the argument remains unchanged
b) the argument always changed
c) the argument will be deleted
d) the argument can be ignored
I will definitely mark you Brainliest for answering the correct answer!​

Answers

Answer:

this is a fallacy

a is the answer

REOLVER EL SIGUIENTE PROBLEMA: R1=1.7K, R2=33K R3=4.7K R4=5.9K R5=17K IT=20mA CALCULAR: VT, I1, I2, I3, I4, I5 Y RT

Answers

Answer :

Ok

Step-by-Step Explanation:

the program associates placeholders in the cursor with pl/sql variables. a. parse b. bind variable c. close cursor d. execute

Answers

The process of associating placeholders in the cursor with PL/SQL variables is called b.binding variables.

The parsing step involves checking the syntax of the SQL statement and generating an execution plan. Once the placeholders are bound to variables, the cursor is ready to be executed. After execution, the cursor should be closed to release resources. A variable is a named storage location in a program where a value or object can be stored and retrieved as needed.

Binding a variable involves assigning a value or object to the variable name so that it can be referenced later in the program. Binding variables is an essential concept in computer programming, as it allows programs to store and manipulate data, and to create more complex algorithms and data structures.

Learn more about binding variables: https://brainly.com/question/30418967

#SPJ11

Potential Energy and Kinetic Energy both mean "energy in motion" True or False​

Answers

Answer:

false

Explanation:

pretty sure energy in motion is only for kinetic energy

Answer:

False

Explanation:

I'm pretty sure potential energy is there when something isn't moving and kinetic energy is when something is in motion

almost all mans are based on one of two basic forms of supporting technology: ____ or ethernet.

Answers

Almost all LANs are based on one of two basic forms of supporting technology: Wi-Fi or Ethernet.

A LAN (Local Area Network) is a computer network that connects devices within a limited geographic area, such as a home, office building, or campus. LANs can use a variety of technologies to facilitate communication and data sharing between devices, but the two most common forms of supporting technology are Wi-Fi and Ethernet. Wi-Fi is a wireless networking technology that uses radio waves to transmit data between devices, while Ethernet is a wired networking technology that uses cables to transmit data. Both Wi-Fi and Ethernet have their advantages and disadvantages, and the choice of which technology to use depends on factors such as network size, speed requirements, and security considerations. In recent years, Wi-Fi has become increasingly popular due to its convenience and flexibility, but Ethernet remains an important technology for many applications, especially those requiring high-speed and reliable connections.

To learn more about Ethernet click the link below:

brainly.com/question/29792308

#SPJ11

Create a program that:
Asks if you want to participate. If they type anything but y, yes, Yes, or YES, it repeats until they type y, yes, Yes, or
YES (While statement)
The program then asks three survey questions that you create. At least on of the questions must have a decision structure that takes a different path depending on the answer.
Lastly, the program prints a summary of the responses.

Answers

Consider a scenario where we want to create a program that can calculate the average of a set of (moredata[0]) allows us to accept "y", "yes", or "yeah" to continue the loop.

In Python, how do you repeat a program?

repeat() For practicing repeat in Python, the itertools package offers the repeat() function. We supply the data and the number of repetitions in the repeat() function.

How do you handle survey questions where respondents can choose from multiple answers?

Since no statistical software will be able to measure this unless you can divide it into two separate questions, which you shouldn't do, you should eliminate the response entirely. Make sure to let your participants know that each question should only have one response.

To know more about Python visit:-

https://brainly.com/question/18502436

#SPJ1

TRUE/FALSE. The Python language is not sensitive to block structuring of code.

Answers

The statement "The Python language is not sensitive to block structuring of code" is false. Python is a language that is sensitive to block structuring of code.

Block structuring in Python is determined by indentation rather than explicit braces or keywords. The indentation level defines the scope of blocks, such as loops, conditionals, and functions. Consistent indentation is crucial for proper code execution and to maintain the intended structure of the program.

Python's use of indentation as a structural element enhances readability and promotes clean, well-structured code. It helps in maintaining code clarity and reduces the likelihood of errors related to incorrect block structuring.

For example, consider the following code snippet:

if condition:

   statement1

   statement2

else:

   statement3

   statement4

In this code, the indentation level denotes the block structure. The statements inside the if and else blocks are indented, indicating that they are part of those blocks. The Python interpreter uses this indentation to determine the grouping of statements.

If the indentation is not correct or inconsistent, it will result in an IndentationError during execution.

In conclusion, Python is indeed sensitive to block structuring through the use of indentation, making it an important aspect of writing Python code accurately.

Learn more about Python language visit:

https://brainly.com/question/11288191

#SPJ11

In this unit, you learned that test generators can be very helpful when trying to determine if a code runs properly or fails in some situations. For example, let’s say that you were writing a program where the user would input their test grades and the program would tell them their average. What kinds of data would a test generator want to test for that program to be sure that it would work in all situations?

Answers

Answer:

Using boundary value analysis and assuming the valid range of test scores is [0 - 100],

min value, min value + 1-1 and 0A Nominal value between (0, 100)100 and 101max value - 1, max value

In Boundary value analysis, we test the transition points where the program's behavior is expected to change. These transition points are the boundaries of valid and invalid partitions.

Min and max value are the smallest and largest possible values that you can store in your data type being used. This varies depending on the data type, so without knowing which you are using (and which language), I can't be more specific.

Exception handling to detect input string vs. integerthe given program reads a list of single-word first names and ages (ending with -1), and outputs that list with the age incremented. the program fails and throws an exception if the second input on a line is a string rather than an integer. at fixme in the code, add try and except blocks to catch the valueerror exception and output 0 for the age.ex: if the input is:lee 18lua 21mary beth 19stu 33-1then the output is:lee 19lua 22mary 0stu 34in python please

Answers

Python program with exception handling to validate input of numeric data. An image of the code and output of the algorithm is attached.

Python code

def main ( ) :

# Define variables

ag = int()

nme = str()

print("Type name and age")

while True:

# Validated data entry

    nme = input()

    if nme!="-1":

        try:

            ag = int(input())

# Output

            ag = ag + 1

            print(nme," ",ag)

        except ValueError:

            ag = 0

            print(nme,"",ag)

    if nme=="-1": break

main()

To learn more about Exception handling in Python see: https://brainly.com/question/15849853

#SPJ4

Exception handling to detect input string vs. integerthe given program reads a list of single-word first

Feasibility Analysis for Software Development (testing
software):
1. Operational
2. Technical
3. Schedule
4.Legal
5. Contractual and Political

Answers

Feasibility analysis is a critical step in software development, considering factors such as operational, technical, schedule, legal, contractual, and political aspects to ensure successful and effective software implementation while mitigating risks.

Conducting a feasibility analysis is essential in software development to assess the operational, technical, schedule, legal, contractual, and political factors.

Evaluating these factors helps determine whether the software can be effectively used in the business environment, built with available technology, completed within the proposed time, compliant with legal requirements, and aligned with contractual and political goals.

This analysis minimizes risks and ensures the success and effectiveness of the software. It enables the development team to make informed decisions and consider necessary adjustments or mitigations during the development process.

By addressing feasibility considerations, software development projects can increase their chances of meeting user requirements, delivering value, and achieving desired outcomes.

Learn more about software development: brainly.com/question/26135704

#SPJ11

What could be the signature of a constructor from a class named subject?

Answers

The signature of a constructor from a class named "Subject" is "public Subject()" and it is responsible for initializing objects of that class.

The signature of a constructor from a class named "Subject" is a special method that is used to initialize objects of that class. It is usually written as "public Subject()" and does not have a return type. The purpose of a constructor is to set the initial state of an object and allocate any necessary resources. It is called automatically when an object is created using the "new" keyword. In the case of the "Subject" class, the constructor may be used to initialize variables or perform any necessary setup operations.

To know more about constructor visit:

brainly.com/question/33443436

#SPJ11

b. Differentiate between static and dynamic WebPages?in computer ​

Answers

Static websites appear the same for every user that accesses them and only change when a developer modifies the source files, whereas dynamic websites can present different information to different visitors.

Optimizing a network to handle more traffic by adding new specialized software is an example of ______ scaling. Adding additional nodes to a network is an example of _________ scaling.

Answers

Answer:vertical and horizontal

Explanation:

Answer:

Horizontal and then Vertical

Explanation:

Please deploy your application on CS3, and upload all source files to Canvas. The source files should include all the source code and an HTML file lab6.html which contains a hyperlink to your application on the CS3 server.
In this lab you are going to implement an online tool for practicing single-digit additions.
Create a Dynamic Web Project in Eclipse, then create a servlet called AdditionPractice as follows:
In doGet(), generate two random numbers between 1 and 9, and display a form that asks the user to enter the sum of the two numbers. For example, suppose the two random numbers are 6 and 2, the form should look like the following:
6 + 2 = Submit
You can use nextInt(int bound) method in Random to generate the random numbers.
In doPost(), display the correct answer, the user's answer, and tell the user if their answer is correct. For example, suppose the user entered the answer 9, the display should be:
6 + 2 = 8
Your answer 9 is incorrect.
Try Again
Clicking on Try Again should take the user back to the form with two new numbers.
The difficult part of this exercise is how to get the two random numbers in doPost() in order to check the user's answer and display the result. You may be tempted to store them in application scope, but that would be a wrong approach. Data in application scope is not only shared by all servlets, it is also shared by all users - a major difference between web applications and desktop applications is that a web application is used by many users at the same time. If you store the numbers in application scope, one user's numbers will be overwritten by another user's, which will cause the application to show wrong result for the first user. You can use two browsers to simulate two users to see the effect of this. The proper way to do this is to embed the two numbers in the form generated by doGet() using two hidden form fields, so they will be submitted to doPost() together with the user's answer. To receive full credit for this exercise, you must use this approach.

Answers

a servlet called "AdditionPractice" needs to be created in a Dynamic Web Project using Eclipse. In the doGet() method, two random numbers between 1 and 9 should be generated, and a form should be displayed to the user that asks them to enter the sum of the two numbers.

To ensure that each user's numbers are not overwritten by another user's, the two random numbers should not be stored in application scope. Instead, they should be embedded in the form using hidden form fields. This approach ensures that each user's numbers are submitted with their answer and can be used to check the answer and display the correct result. Using this approach will result in a functional and accurate addition practice tool for single-digit additions.

Learn more about Dynamic Web here;

https://brainly.com/question/30565508

#SPJ11

write a reflection on what you have learned for this week. write your answer on the space inside the cloud.(Minimum of 30 words)​

Answers

Answer:

“I think it’s about putting yourself in the students’ shoes and seeing how a first-time student, maybe someone who hasn’t even taken chemistry before, is looking at it.”

—Valerie Taraborelli, undergraduate chemistry student, University of Arizona

one of the following techniques redirects all malicious network traffic to a honeypot after any intrusion attempt is detected. attackers can identify such honeypots by examining specific tcp/ip parameters such as the round-trip time (rtt), time to live (ttl), and tcp timestamp. which is this technique?question 23 options:bait and switchfake apuser-mode linux (uml)snort inline

Answers

The technique described is "bait and switch." It redirects malicious network traffic to a honeypot by manipulating TCP/IP parameters like round-trip time, time to live, and TCP timestamp to identify attackers attempting intrusion.

Bait and switch is a defensive technique used in cybersecurity to redirect malicious network traffic towards a honeypot. A honeypot is a decoy system designed to gather information about attackers and their tactics. In this technique, specific TCP/IP parameters such as round-trip time (RTT), time to live (TTL), and TCP timestamp are manipulated to make the honeypot appear attractive to attackers. By examining these parameters, attackers can distinguish the honeypot from legitimate systems. Once an intrusion attempt is detected, the malicious traffic is redirected towards the honeypot, allowing security personnel to monitor and analyze the attacker's activities while keeping the actual production systems safe.

Learn more about identify here:

https://brainly.com/question/13437427

#SPJ11

Using the drop-down menu, identify characteristics of IDEs.
IDE refers to
for writing computer programs.
IDEs are a coordinated
IDEs provide developers with

Answers

Answer:

An integrated development environment

Computer software program-writing package

Interactive programming tools

Explanation:just took it on edge

Answer:

An integrated development environment

Computer software program-writing package

Interactive programming tools

Explanation:

Of the following, which three are the primary aspects of a project that a project manager must coordinate?

1. specifications
2. transportation
3. restrictions
4. cost
5. time

Answers

Answer:

1 , 4 ,5

Explanation:

IM in high school (freshmen) and I started using brainly when I was in middle school, haven't made much friends but im ok with who I have! Anyways question is abt career management!
In Stage 2, the Thinking stage, John would probably:

Research ways to quit smoking.
Switch over to nicotine gum or e-cigs.
Blame it on pollution in the air
Admit he has a problem, but put off doing anything.

Answers

Answer:

My Spring 2018 Sabbatical Project was to study techniques and ideas of classroom management. The result was a set of documents and resources that I am placing here in blog format to easily share with my colleagues and any other interested party.

Comments and questions are welcome, and I will respond as time allows. Feel free to share these posts.

Sincerely,

Tracy Johnston

Palomar College Mathematics Department

Answer:

The more sane thing that he should do is to research ways to quit smoking.

Explanation:

Smoking is not good for you, nor are e-cigs

Nicotine gum is just as addictive and is quite expensive

There really isn't much pollution in the air, mostly allergens

You gotta do something, you'll die if you keep smoking/vaping or whatever he is doing

Does Amazon have the right to sell personal data?

Answers

Amazon, like any other company, must comply with applicable privacy laws and regulations regarding the collection, use, and sale of personal data.

The rights of companies like Amazon to sell personal data are subject to legal and regulatory frameworks. In many countries, privacy laws exist to protect individuals' personal information and regulate how it can be collected, used, and shared. These laws typically require companies to obtain informed consent from individuals before collecting their personal data and to provide clear information about the purposes for which the data will be used.

The specific rights of companies to sell personal data can vary depending on the jurisdiction. In some cases, explicit consent may be required from individuals for the sale of their personal data. In other cases, companies may need to ensure that individuals have the ability to opt-out of the sale of their data. The laws may also impose obligations on companies to protect personal data from unauthorized access or misuse.

It is important to note that privacy laws and regulations are continually evolving, and they can differ significantly across jurisdictions. It is recommended to consult the specific privacy policies and terms of service of companies like Amazon to understand how they handle personal data and whether they have the right to sell it. Additionally, individuals have rights to access, correct, and delete their personal data, and they can exercise these rights by contacting the respective organizations or following the procedures outlined in their privacy policies.

Learn more about personal data here : brainly.com/question/29306848

#SPJ11

Other Questions
We think of ourselves as the most individualistic human beings in history and yet we...............in beehives containing hundreds of identical apartments.O a. livingO b.liveO c. is livingO d. lived How can you plot a point using its (x,y) coordinates? 9. The ability to breakdown and use food is called- Necesitas mi ayuda? So ____ Necesito Which of the following effects of the Second Great Awakening is illustrated in this passage?A. The religious gravitated to millenarianism. B. Women rose to positions of leadership. C. Membership in Baptist churches rose. D. It inspired social reform movements. A dough that twinkles had its origin here its not a star and it taste pretty near To test your hypothesis, the same fertilizer from the farm will be mixed into the water of one aquarium (experimental) and the other will be left alone (control). Each will be allowed to sit for several days in sunlight. Move the slider to see the results of the experiment. 2. Describe any significant differences you observe between the experimental and control aquariums. $2.50 per 5 cans, find the price per can. 8 7/8+(7 5/6 - 2 1/3)?I need it in its simplest form. Monica wants to invest $8600 in a savings account that pays 5. 2% simple interest. How long will it take for this investment to double in value? Round your answer to the nearest tenth What was the earliest life form on Earth?A. ProtistsB. BacteriaC. Viruses If f(x) = 2x - 3, find f(-2). A 210.00 g sample of water with an initial temperature of 29.0C absorbs 7,000.0 J of heat. What is the final temperature of the water?Note: Use C (capital C) for degrees Celsius when typing units. So it might look like 35C or 2.03 J/gC. Give your answer in 3 sig figs. PLEASE HELP ANSWER ASAP PLS frontline: spying on the home front Explain why people are building green roofs to live healthier lives. How is Claudius guilt revealed Act 3? Which actions often develop good character? Choose exactly 3 answers that are correct. living through difficult experiences having parental support making good decisions having negative role models According to your textbook, when quoting an Internet document during a verbal speech, a speaker should usually identify the:a) full address of the Web site for the document.b) author or sponsoring organization responsible for the document.c) search engine used to find the document.d) all of the above. There is not ___ furniture in Daves house. He moved two weeks ago. a ) much b ) a little c ) few d ) many The straight line has equation y=5x+6 Find an equation of the straight line perpendicular to L which passes through (-2,5)