Which network protocol is used to handle delivery of information

Answers

Answer 1

Answer:

TCP

Explanation:

TCP stands for Transmission Control Protocol a communications standard that enables application programs and computing devices to exchange messages over a network. It is designed to send packets across the internet and ensure the successful delivery of data and messages over networks.


Related Questions

Computer science student Jones has been assigned a project on how to set up sniffer. What must he keep in mind as part of the process

Answers

Setting up a sniffer requires certain considerations to be taken into account, such as ensuring that the sniffer is being used legally, selecting the appropriate hardware and software for the task, and configuring the sniffer correctly to capture and analyze network traffic.

The use of a sniffer or packet analyzer can be subject to legal restrictions and ethical considerations, as capturing and analyzing network traffic may violate privacy laws or ethical norms. As such, Jones needs to ensure that the use of the sniffer is authorized and that he is aware of any legal or ethical considerations that may apply.

When selecting hardware and software for the sniffer, Jones should consider factors such as the intended use of the sniffer, the complexity of the network, and the level of analysis required. Different sniffer tools may be better suited for different tasks, such as capturing traffic on wired or wireless networks, analyzing specific protocols, or detecting security threats.

Once the hardware and software have been selected, Jones needs to configure the sniffer correctly to ensure that it is capturing the desired traffic and providing accurate results. This may involve setting filters to capture specific types of traffic, configuring the interface to ensure that packets are being captured properly, and adjusting the settings to optimize the performance of the sniffer.

To learn more about Sniffer, visit:

https://brainly.com/question/29872178

#SPJ11

In Database.cpp:
You do not have to implement the destructor.
Implement the function addStatePark(), which should dynamically create a new StatePark object and add a pointer to the object to the member vector stateParkList.
Implement the function addPassport(), which should dynamically create a new Passport object and add a pointer to the object to the member vector camperList.
Implement the function addParkToPassport(), which takes in two parameters camperName and parkName. The function should search the member vectors of the database for a match for both, then use the addParkVisited() function to add the park to the camper’s list of visited parks. If one and or both of the parameters are not found, do not make any changes to the database.

Answers

You do not need to implement the destructor in Database.cpp. However, you do need to implement the functions addStatePark(), addPassport(), and addParkToPassport().

The function addStatePark() should create a new StatePark object using dynamic memory allocation and add a pointer to the object to the member vector stateParkList.

The function addPassport() should also create a new Passport object using dynamic memory allocation and add a pointer to the object to the member vector camperList.

Finally, the function addParkToPassport() should take in two parameters, camperName and parkName, and search the member vectors of the database for a match for both. If a match is found, the function should use the addParkVisited() function to add the park to the camper’s list of visited parks. However, if one or both of the parameters are not found, no changes should be made to the database.

Learn more about dynamic memory allocation: https://brainly.com/question/15179474

#SPJ11

Identify the correct way to cite the careeronestop web page that lists the highest-paying occupations. careeronestop. us department of labor and the state of minnesota, 2013. “top 50 highest-paying occupations by median hourly wages.†web. 1 may 2013. “careeronestop.†us department of labor and the state of minnesota, 2013. “top 50 highest-paying occupations by median hourly wages.†web. 1 may 2013. “top 50 highest-paying occupations by median hourly wages.†careeronestop. us department of labor and the state of minnesota, 2013. web. 1 may 2013. top 50 highest-paying occupations by median hourly wages. “careeronestop.†us department of labor and the state of minnesota, 2013. web. 1 may 2013.

Answers

The correct citation for the careeronestop website's list of the highest-paying jobs is B. "Careeronestop," US Department of Labor and the State of Minnesota, 2013. Top 50 highest-paying occupations by median hourly salaries." Web. 1 May 2013.

What exactly is a citation?The last name of the author and the year of publication are used in APA in-text citations, for instance: (Field, 2005). Include the page number with any direct quotations, as in: (Field, 2005, p. 14). Use a paragraph number for sources without page numbers, such as websites and electronic books.A citation is known more colloquially as a "ticket." A citation is the same as a ticket, there is no distinction. In both situations, a police officer normally issues a written document in this manner. In some circumstances, a speeding camera may alert the authorities if you were breaking traffic regulations, and they may issue a citation.

To learn more about citation, refer to:

https://brainly.com/question/23310255

What is a PowerPoint slide?


Answers

Answer:

A PowerPoint is a presentation program to show a specific topic per slide

a PowerPoint SLIDE is just one part of for example 1 out of 10 slides

for example, if you were asked to do a PowerPoint for a project you'll probably do 20 slides and put a lot of work and detail into making this PowerPoint for a good grade so you don't fail a school year

the most common protocol suite used today for local area networkjs (lans) as well as the interet is

Answers

 The most common protocol suite used today for local area networks (LANs) as well as the Internet is the TCP/IP protocol suite.

The TCP/IP (Transmission Control Protocol/Internet Protocol) protocol suite is the foundation of modern networking. It is widely used for communication and data transfer in both LANs and the Internet. The TCP/IP protocol suite consists of a collection of protocols that define how data is transmitted, routed, and received over networks.
TCP/IP provides a set of standardized protocols that enable devices to connect and communicate with each other. It includes protocols such as IP (Internet Protocol), TCP (Transmission Control Protocol), UDP (User Datagram Protocol), ICMP (Internet Control Message Protocol), and many others.
The flexibility, scalability, and compatibility of the TCP/IP protocol suite have made it the de facto standard for networking. It allows different devices and networks to interoperate seamlessly, enabling the Internet and facilitating communication across a wide range of devices and platforms.
In summary, the TCP/IP protocol suite is the most common and widely used protocol suite for both LANs and the Internet, providing the necessary protocols for communication and data transfer in modern networking.

learn more about local area network here

https://brainly.com/question/13267115



 #SPJ11

The relationship between the cost of ______ expenses and a company's inventory is the ______

Answers

The relationship between the cost of operating expenses and a company's inventory is the cost of goods sold (COGS). COGS is a critical financial metric that represents the cost of the products or services that a company sells to generate revenue.

It includes the cost of materials, labor, and overhead expenses associated with producing and delivering the goods or services.The cost of goods sold is calculated by subtracting the cost of goods sold at the beginning of the period from the cost of goods manufactured or purchased during the period, and adding any additional costs incurred in producing or acquiring the goods, such as freight or import duties. The resulting figure is the cost of goods available for sale, from which the cost of goods sold is then subtracted to arrive at the gross profit.The cost of goods sold is a critical factor in determining a company's profitability, as it directly affects the gross profit margin. A high COGS relative to revenue can indicate inefficiencies in the production process, whereas a low COGS can indicate cost-effective operations. Therefore, managing the cost of goods sold is crucial to improving a company's profitability and financial performance.

To learn more about operating click the link below:

brainly.com/question/6689423

#SPJ4

What do Cc and Bcc stand for?
O Clear Copy and Binary Clear Copy
O Counter Claim and Best Counter Claim
O Crystal Clear and Binary Crystal Clear
O Carbon Copy and Blind Carbon Copy

Answers

Carbon copy and Blind carbon copy
Its Carbon Copy and Blind Carbon Copy.
Thank You!

another way to express an algorithm is with pseudocode. true or false

Answers

True. Pseudocode is a method of expressing an algorithm using a combination of natural language and programming language-like constructs.

It is not tied to any specific programming language syntax and allows for a more informal and readable representation of an algorithm's logic.

Pseudocode is often used in the early stages of software development as a means of planning and describing the steps and logic of a program before actual coding takes place.

It serves as a communication tool between developers and can be easily understood by both technical and non-technical individuals. Pseudocode typically employs keywords, control structures, and variable names to outline the sequence of operations and decision-making processes within an algorithm.

Its purpose is to provide a clear and concise representation of the algorithm's logic, making it easier to understand and implement in actual code.

learn more about Pseudocode here:

https://brainly.com/question/13208346

#SPJ11

10. A loop statement is given as:
for(i=10;i<10;i++)
{
Statement
}
For how many times will the given loop statement be executed:
(a) none
(b) 1 time
(c) 10 times (d) infinite​

Answers

Answer: a. None

Explanation:

The loop will not run as the condition always returns false.

i=10 and the condition given: i<10 which is false always. So, the loop will not run.

an instance of a relation group of answer choices is dynamic is static is serializable is never empty

Answers

An instance of a relation group of answer choices can be either dynamic or static. An instance of a relation group can be dynamic or static, can be serialized for storage or transmission, and is never empty.

1. Dynamic: In a dynamic relation group, the answer choices can change or be modified during the course of the program. This means that the answer choices can be added, removed, or updated based on certain conditions or user interactions.
2. Static: In a static relation group, the answer choices remain fixed and do not change during the program execution. The answer choices are predetermined and cannot be modified during runtime.

Additionally, a relation group can also be serializable. This means that it can be converted into a format that can be easily stored or transmitted, such as a file or a network stream. Serializable objects can be saved to disk, sent over the network, or used for future reference.Lastly, an instance of a relation group is never empty. It always contains at least one answer choice. The purpose of a relation group is to provide a set of choices for the user to select from, so it must have at least one option available.

To know more about transmission visit:

https://brainly.com/question/33285572

#SPJ11

Choose the term that makes the sentence true.
When you enlarge a raster image, the painting program uses ___
to add the needed pixels.

Answers

When you enlarge a raster image, the painting program uses interpolation to add the needed pixels.

What is Interpolation?

Interpolation is a technique used by painting programs to add pixels to an image when it is enlarged, by estimating the color values of the new pixels based on the color values of existing pixels.

Hence, it can be seen that when making an image edit and you want to make an enlargement of a raster image, there is the use of interpolation to add the needed pixelation.

Read more about interpolation here:

https://brainly.com/question/18768845

#SPJ1

Type the correct answer in the box. Spell all words correctly.
Natasha came across a website that had a building image, where each window in the building was clickable. She clicked on one of the windows,
Upon clicking the link information was sent to another computer. This computer processed the information and returned the appropriate page
about a window. Which attribute is used in this case to identify the type of image map?
The
attribute is used in this case to identify the type of image map.

Answers

Answer:

Redirection

Explanation:

This is something called redirection, you can sometimes get paid for it, or just some sort of reward, sometimes even a virus scanner.

Answer:

The  ismap  attribute is used in this case to identify the type of image map.

Explanation:

Using ismap indicates to your browser that the link is processed by another computer (server). Once the server processes the information about the link, it returns the appropriate page.

what is a massively parallel processing computer system? how is grid computing different from such a system? how are they similar and how are they different?

Answers

A massively parallel processing (MPP) computer system is a type of computer architecture designed to process large amounts of data in parallel by using multiple processors or computing nodes.

In an MPP system, each processor or node works on a different portion of the data simultaneously, allowing for high-performance computing and efficient processing of complex tasks. MPP systems typically have a high degree of interconnectivity between processors to facilitate communication and data exchange.

Grid computing, on the other hand, refers to a distributed computing model where resources from multiple independent systems or organizations are combined to form a virtual supercomputer. In grid computing, the focus is on sharing computing resources such as processing power, storage, and network bandwidth across different locations and administrative domains. Grid computing enables the utilization of idle resources from multiple systems to handle large-scale computing tasks.

Similarities between MPP and grid computing:1. Parallel Processing: Both MPP and grid computing leverage parallel processing techniques to improve computational performance.

2. Scalability: Both systems offer scalability by allowing the addition of more computing resources to handle larger workloads.

Differences between MPP and grid computing:1. System Architecture: MPP systems are typically designed with tightly coupled processors or nodes within a single system, while grid computing involves connecting distributed resources across multiple systems and locations.

2. Ownership and Control: In MPP systems, the hardware and software resources are owned and controlled by a single organization, whereas in grid computing, resources are typically SHAREd among multiple organizations or entities.3. Resource Sharing: MPP systems are dedicated to a specific organization or task, with resources exclusively used for internal purposes. In contrast, grid computing involves sharing resources across multiple users and organizations, enabling collaborative computing and resource pooling.

In summary, MPP systems are high-performance computing architectures designed for parallel processing within a single system, while grid computing focuses on resource sharing and collaboration across distributed systems and organizations. Both approaches aim to improve computational performance but differ in their architecture, ownership, and resource sharing models.

Learn more about massively parallel processing (here:

https://brainly.com/question/14971914

#SPJ11

DECLARE SUB seri()
CLS
CALL seri
END
SUB seri
a$="SCIENCE"
b=LEN(a$)
FOR I=1 TO 4
PRINT TAB(i); MID$(a$, i, b)
b=b-2
NEXT i
END SUB. ​

Answers

This is a BASIC program that defines and calls a subroutine named "seri" which prints out the word "SCIENCE" in a series of shortened versions on each line.

Here is a breakdown of what the code does:

The first line declares the subroutine "seri".

The second line clears the screen.

The third line calls the "seri" subroutine.

The "seri" subroutine starts by assigning the string "SCIENCE" to the variable "a$".

The length of the string "a$" is assigned to the variable "b".

The subroutine then enters a loop that will run 4 times, with the loop variable "I" starting at 1 and increasing by 1 each time.

Inside the loop, the subroutine prints out a tab character followed by a shortened version of the string "a$".

The MID$ function is used to extract a substring from the original string starting at position "i" and continuing for "b" characters.

This means that on the first iteration of the loop, the substring "SCIENCE" will be printed out, but on subsequent iterations the substring will be shorter.

The variable "b" is then decreased by 2, so that each iteration of the loop prints a shorter substring than the previous one.

Once the loop has completed, the subroutine ends.

Read more about BASIC program here:

https://brainly.com/question/26134656

#SPJ1

2. Describe a situation in which the add operator in a programming language would not be commutative.

Answers

The add operator in a programming language would not be commutative when dealing with concatenation of strings.
For example, "Hello" + "World" is not the same as "World" + "Hello".

In programming, the add operator (+) is typically used to perform addition between numerical values. However, the add operator can also be used for concatenation of strings. In this scenario, the add operator is not commutative. This means that the order in which the strings are added together matters.
For example, consider the strings "Hello" and "World". If we concatenate them using the add operator, we get "HelloWorld". However, if we switch the order and concatenate "World" and "Hello", we get "WorldHello". These are not the same string, and thus the add operator is not commutative in this situation.

This is because when we concatenate strings, we are essentially appending one string to the end of another. The order in which we append them changes the resulting string, and therefore the add operator is not commutative when dealing with string concatenation.

Learn more about concatenation here:

https://brainly.com/question/30402466

#SPJ11

create a square object that has the following methods 0 pts this criterion is linked to a learning outcomeconstructor (int x, int y /*pixel coordinates of the upper left corner of the square) 5 pts this criterion is linked to a learning outcomevoid draw() // draws the square at the given coordinates showing the remaining sides 5 pts this criterion is linked to a learning outcomeremoveside (side s) // causes the corresponding side in the square to disappear (painted black) 5 pts this criterion is linked to a learning outcomehastop() hasbottom() hasleft() hasright() // each method returns bool indicating if square has corresponding side 5 pts

Answers

Here's an example implementation of a square object in Java that meets the specified requirements:

public class Square {

   private int x; // x-coordinate of upper left corner of square

   private int y; // y-coordinate of upper left corner of square

   private int sideLength; // length of each side of square

   private boolean top = true; // whether the top side of the square is visible

   private boolean bottom = true; // whether the bottom side of the square is visible

   private boolean left = true; // whether the left side of the square is visible

   private boolean right = true; // whether the right side of the square is visible

   public Square(int x, int y, int sideLength) {

       this.x = x;

       this.y = y;

       this.sideLength = sideLength;

   }

   public void draw() {

       // Draw the square with remaining sides

       // The specific implementation may vary depending on the programming environment used

   }

   public void removeSide(Side s) {

       switch (s) {

           case TOP:

               top = false;

               break;

           case BOTTOM:

               bottom = false;

               break;

           case LEFT:

               left = false;

               break;

           case RIGHT:

               right = false;

               break;

       }

   }

   public boolean hasTop() {

       return top;

   }

   public boolean hasBottom() {

       return bottom;

   }

   public boolean hasLeft() {

       return left;

   }

   public boolean hasRight() {

       return right;

   }

   public enum Side {

       TOP,

       BOTTOM,

       LEFT,

       RIGHT

   }

}

Explanation:

This implementation uses a boolean flag for each side of the square to indicate whether it is visible or not. The removeSide method takes a Side enum parameter to specify which side should be removed. The hasTop, hasBottom, hasLeft, and hasRight methods return the corresponding boolean flags for each side. The draw method would be responsible for rendering the square with the remaining sides using the specified pixel coordinates and side length.

To get a similar answer on JAVA:

https://brainly.com/question/29897053

#SPJ11

question 8 a local area network (lan) uses category 6 cabling. an issue with a connection results in a network link degradation and only one device can communicate at a time, but information can still go in either direction. what is the connection operating at?

Answers

The connection is operating at Half Duplex because when network link degradation happens only one device can communicate at a time, but information can still go in either direction in which the local area network (LAN) uses category 6 cabling.

What is Local Area Network (LAN)?

A local area network (LAN) is a group of devices that are connected in a single physical location, such as a building, office, or home. A LAN can be small or large, ranging from a home network with one user to an enterprise network in an office or school with thousands of users and devices.

A LAN's defining feature, regardless of size, is that it connects devices in a single, limited area. A wide area network (WAN) or metropolitan area network (MAN), on the other hand, covers a larger geographical area. Many LANs are linked together by WANs and MANs.

To learn more about Local Area Network (LAN), visit: https://brainly.com/question/24260900

#SPJ1

What are the main differences between an analog recording and a digital recording?

Answers

Answer: Recording an album with analog technology can require a whole studio full of equipment, but with digital recording technology, it's possible to record a whole album in a bedroom on a laptop. And whereas analog technology can wear out or be damaged, digital media can last for an indefinite length of time.

Explanation:

which characteristics support an agile mis infrastructure?

Answers

Answer:

The agile MIS infrastructure includes accessibility, availability, flexibility, performance, portability, reliability, scalability and usability. :)

every complete c++ program must have a

Answers

Every C++ program must have a special function named main.

What is program?

Program is defined as a series of instructions written in a programming language that a computer may follow. Finding a set of instructions that will automate a task's completion on a computer is the goal of programming, which is frequently done to solve a specific problem.

The statements inside of main are executed one after the other when the program is run. A textbfmain function main function is a requirement for all C++ programs. It cannot be skipped because it serves as the program's entry point in C++.

Thus, every C++ program must have a special function named main.

To learn more about program, refer to the link below:

https://brainly.com/question/11023419

#SPJ1

In a singly linked list with a dummy head reference, which method has a time efficiency of O(1)?

Answers

In a singly linked list with a dummy head reference, there are various methods available for operations such as insertion, deletion, and traversal.

These operations have different time complexities and their efficiency depends on the implementation of the linked list.
A singly linked list with a dummy head reference is a type of linked list where the first node in the list is a dummy node that acts as a placeholder.

This dummy node has no actual data but only serves to simplify the implementation of the linked list.
Among the methods available for a singly linked list with a dummy head reference, there is one method that has a time efficiency of O(1), which is the insertion of a new node at the beginning of the list.

This method involves creating a new node with the data to be inserted and making it the new head of the linked list.
To insert a new node at the beginning of the linked list, the following steps can be taken:
1. Create a new node with the data to be inserted.
2. Set the next pointer of the new node to the current head of the linked list.
3. Set the dummy head reference to point to the new node.
This method is efficient and useful for implementing algorithms that require quick insertion of new data into the linked list.

For similar question on singly linked:

https://brainly.com/question/31083608

#SPJ11

pls help
Question 2 (1 point)
True or false: when you use someone's copyrighted work in something you are
selling, you only have to cite them.

Answers

The given statement of copyrighted work is false.

What do you mean by copyright?

A copyright is a type of intellectual property that grants the owner the exclusive right to copy, distribute, adapt, display, and perform a creative work for a specific period of time. The creative work could be literary, artistic, educational, or musical in nature. The purpose of copyright is to protect the original expression of an idea in the form of a creative work, not the idea itself. A copyright is subject to public interest limitations, such as the fair use doctrine in the United States.

When you use someone's copyrighted work in something you are selling, you must get their permission first.

To learn more about copyright

https://brainly.com/question/357686

#SPJ13

Please help me on this it’s due now

Please help me on this its due now

Answers

Answer:

All of the above because all the other factors are needed to be considered

device management principles are changing rapidly to accommodate cloud computing. T/F?

Answers

Note that it is TRUE to state that device management principles are changing rapidly to accommodate cloud computing.

What is device management?

Device management techniques are quickly evolving to support cloud computing.

Cloud computing ushers in new paradigms for device administration, such as remotely controlling devices, centralizing management via cloud-based platforms, and exploiting virtualization technologies.

The transition to cloud computing necessitates the creation of new methodologies and tools for managing devices in a cloud-based environment, resulting in changing device management concepts.

Learn more about device management:
https://brainly.com/question/11599959
#SPJ1

What separator page file is used with PostScript-only printers and prints a separator page at the beginning of each documen

Answers

Answer:

Sysprint.sep

where are the files stored that contain information for all of the time zones that could be recognized by a linux operating system?

Answers

The files are stored in urs/share/zoneinfo, that contain information for all the time zones that could be recognized by a Linux operating system.

What is Linux operating system?Linux is an operating system, just like Windows, iOS, and macOS.In truth, Linux is the operating system that runs one of the world's most widely used platforms, Android. A desktop or laptop's operating system is a piece of software that controls all the hardware resources connected to it. Simply explained, the operating system controls how your software and hardware communicate with one another. The operating system (OS) is necessary for the software to run.

Popular Linux distributions include:

LINUX MINTMANJARODEBIANUBUNTUANTERGOSSOLUSFEDORAELEMENTARY OSOPENSUSE

To learn more about Linux operating system, refer to

https://brainly.com/question/12853667

#SPJ1

List 5 applications for working with text

Answers

Answer:

TTSReader, Go2PDF, Free File Merge, Batch Text File Editor

Explanation:

Where do you stand on the controversial encryption issue? Should governments like the United States be allowed to have an escrowed key to all encrypted communications? Is unfettered encryption a good thing for cyberspace?

Answers

Where you stand on the controversial encryption issue depends on your point of view.

Some people believe that the government should have an escrowed key to all encrypted communications to prevent terrorism and other criminal activities. Others believe that unfettered encryption is a good thing for cyberspace and that the government should not be able to access private communications.

Encryption is a crucial part of cybersecurity and is used to protect sensitive information. It can also be used to prevent cyberattacks and data breaches. However, encryption can also be used by criminals to hide their activities and communications from law enforcement agencies and the government.

Encryption can make it difficult for the government to track down terrorists and other criminals. However, giving the government a backdoor to encrypted communications could also lead to abuse of power and violations of privacy rights.

Learn more about encryption at

https://brainly.com/question/31375565

#SPJ11

What is 7/12 simplified?

Answers

Answer:

7 12

Explanation:

Raul needs to ensure that when users enter an order into the tblOrders, the shipping date is at least two days after

the order date on the data entry. Which option should he use?


O input mask

O record validation

O form validation

O expression builder

Answers

Answer:

input mask

Explanation:

Microsoft Access is a database application used to stored data. It is a relational database with rows and columns of data tables in its database.

Data validation is a tool in Access used to put a constraint on how data is entered in the table. The input mask is a data validation type that forces users to enter data in a specified format for a given field or column.

Answer:

A

Explanation:

Other Questions
give a brief account of the difference between stochastic processes and a martingale processes PLEASE HELP ASAP!!!!!!!!!!!! Which hormone may be low in exercising women due to low energy intake, which can result in decreased bone formation?. In a simple closed economy, all investment spending must come from: Group of answer choices savings. money creation. debt issuance. foreign borrowing. Solve the equation below (2-9)(+8) Which word from the passage is an appeal to pathos?a love b ic hered pause Quick easy question To what extent is the description of Chris leadership as cross country ski team captain similar to his final odyssey down into the wild in this problems you will consider paths on the integer grid that start at (0,0) in which every step increments one coordinate by 1 and leaves the other unchanged. a) (4 points) how many such paths are there from (0,0) to (85, 65)? The early signs of urban life in Mesopotamia are associated with an art form named after the Sumerian city of Uruk. Which is the art form? Calculate the lifetime of a 15 MSunstar.The lifetime in of 15 MSun star in years is______ natalia is a freelance writer. she takes short-term assignments from various publishers in which they pay her to write articles for their publications. she does not work as an employee of any one publisher, but rather as a contingent worker. natalia is part of the economy. multiple choice question. underground gig globalized digital need help? review these concept resources. Classes are canceled due to snow, so you take advantage of the extra time to conduct some physics experiments. You fasten a large toy rocket to the back of a sled, and take the modified sled to a large, flat, snowy field. You ignite the rocket, and observe that the sled accelerates from rest in the forward direction at a rate of 13.5 m/s2 for a time period of 3.30 s. After this time period, the rocket engine abruptly shuts off, and the sled subsequently undergoes a constant backward acceleration due to friction of 6.15 m/s2.After the rocket turns off, how much time does it take for the sled to come to a stop?By the time the sled finally comes to a rest, how far has it traveled from its starting point? Nitrogen gas reacts with oxygen gas to form dinitrogen tetroxide. When the equation is written and balanced, the sum of the coefficients is __________. which medication would a nurse anticipate providing teaching about for an adolescent with dysmennorhea At 1:00 p.m. an airplane left the local airport and flew due east at 300 mi/h. At 3:00 p.m. a second plane left the same airport and flew due north at 400 mi/h. Assuming the curvature of the earth is negligible, how many miles apart are the planes at 8:00 p.m.? SECTION B: SUMMARY QUESTION 2: SUMMARISING IN YOUR OWN WORDS Refer to TEXT B below. Imagine that as an employee of Microsoft you have been tasked with explaining to a group of ne employees the concept of hands free technology You are required to do the following a political candidate has asked you to conduct a poll to determine what percentage of people support him. if the candidate only wants a 4% margin of error at a 99% confidence level, what size of sample is needed? when finding the z-value, round it to four decimal places. Anyone know how to do this? Which of the following is a linear function?