Which of the following is NOT a characteristic of a wide area network (WAN)?

Answers

Answer 1

Answer:

WANs have a large capacity, connecting a large number of computers over a large area, and are inherently scalable. They facilitate the sharing of regional resources. They provide uplinks for connecting LANs and MANs to the Internet.13 Jul 2018


Related Questions

what features should you configure if you want to limit access to resources by users in a trusted forest, regardless of permission settings on these resources?

Answers

The features you should configure if you want to limit access to resources by users in a trusted forest, regardless of permission settings on these resources is selective authentication.

What is resources?

A system resource, often known as a resource in computing, is any real or virtual component with restricted availability within a computer system. Resources include all connected devices and internal system components. Files (concretely file handles), network connections, and memory spaces are examples of virtual system resources. Resource management refers to the process of managing resources, which includes both preventing resource leaks and dealing with resource conflict. Cloud computing makes use of computing resources to deliver services through networks.

To learn more about resources

https://brainly.com/question/27948910

#SPJ4

James wants to buy a pair of pants for $60.
When he went to the store he found that the
price was marked down by 20%. How much do
they cost now?

Answers

They cost 48. Used a calculator

Explain the simliparities or difference between a workbook , worksheet and spread sheet​

Answers

Answer:

Spreadsheet vs Workbook. Summary: Difference Between Spreadsheet and Workbook is that Spreadsheet software allows users to organize data in rows and columns and perform calculations on the data. ... While Workbook is consider as whole file that can contain bundle of worksheets in it.

Explanation:

mark brainlyist

what is true about the process of converting analog data into digital data?

Answers

Answer:

The process of converting analog data into digital data involves measuring the continuous analog signal and dividing it into discreet numerical values. The digitized data is then stored in binary format, allowing it to be processed by digital devices. This process results in a more precise and accurate representation of the original analog signal, but also results in the loss of some information during the quantization process.

what can accommodate most file formats? btw there are no answer choices

Answers

Answer:.doc and .docx - Microsoft Word file.

.odt - OpenOffice Writer document file.

.pdf - PDF file.

.rtf - Rich Text Format.

.tex - A LaTeX document file.

.txt - Plain text file.

.wpd - WordPerfect documen

Explanation:

which resource is nearly impossible to decrease once allocated in virtualization? answer ram storage nic cpu

Answers

RAM storage is nearly impossible to decrease once allocated in virtualization.

What is RAM for storage?A computer's short-term memory, or RAM (random access memory), is where the data that the processor is presently using is kept. RAM memory size is crucial for system performance since your computer can access RAM memory faster than data on a hard drive, SSD, or other long-term storage device.Random access memory, or RAM, is one of the most basic components of computers. RAM is a short-term memory pool where your computer keeps information it needs to access fast. RAM maintains information readily available so that your processor can swiftly access it and carry out urgent processing operations without first accessing long-term storage.

To learn more about RAM, refer to

https://brainly.com/question/13748829

#SPJ4

which command must you use at the command prompt to determine the names of the network interfaces (including the isatap interfaces) on a modern window computer

Answers

To determine the names of the network interfaces (including the ISATAP interfaces) on a modern Windows computer, you must use the command "ipconfig /all" at the command prompt. This will display detailed information about all network interfaces on your system.

Ipconfig is a command-line tool used in Windows operating systems to display information about the computer's network configuration, including IP address, subnet mask, default gateway, DNS server, and more. It is used to diagnose and troubleshoot network connectivity issues.

To use the ipconfig command, follow these steps:

Open the command prompt by pressing the "Windows key" + "R" and typing "cmd" in the Run dialog box.

Type "ipconfig" and press Enter. This will display the current network configuration information, including the IP address, subnet mask, and default gateway for all active network connections.

To display more detailed information, such as the DNS server addresses, type "ipconfig /all" and press Enter.

To release the current IP address assigned by the DHCP server, type "ipconfig /release" and press Enter. To renew the IP address, type "ipconfig /renew".

To display only the IP address of the computer, type "ipconfig | findstr /i "IPv4"" and press Enter.

To learn more about Ipconfig Here:

https://brainly.com/question/31309044

#SPJ11

List at least two questions you can use to help decide whether a website's information is trustworthy

Answers

Answer:

Questions (three) that can be used to decide whether a website's information is trustworthy are;

1) Who is or are the authors of the website

2) What type of information the website conveys

3) Why was the information published on a website

Explanation:

1) Who is or are the authors of the contents of the website including the authors credentials so as to ascertain whether the author is qualified with regards to the topic or topics written about on the website

2) What are the information presented on the website and the context the in which the information are presented

Are the articles in the website backed by a source, with hyperlinks, references or footnotes

3) Why was the on the website information created. Is the information to entertain, persuade, sell or inform

A student was asked to describe how a Huffman tree could be created for the string in Figure 2. Her response was: "I would count the number of times each character appears in the string and create a frequency table sorted alphabetically. For example, the letter S has the highest frequency in Figure 2. Next I would take the two characters with the highest frequencies and combine them into a new node. The new node would be added to the end of the frequency table. The two characters with the lowest remaining frequencies are now combined into a new node and the process is repeated until all the characters have been added to nodes and the tree created. " State four mistakes the student has made in her response

Answers

1. The student incorrectly listed the frequency table for the provided string. 2. The student left out instructions on how to handle ties in the frequency table. 3. The student failed to describe how to give binary codes to characters in the Huffman tree.

3. The student did not explain how to assign binary codes to the Huffman tree's characters. 4. The student left out the last step of utilising the created Huffman tree to encode the string. In total, the student's attempt to construct a Huffman tree had four errors. These omissions include failing to provide the proper frequency table, failing to address how ties should be handled, failing to describe how to assign binary codes to characters, and failing to bring up the string's final encoding phase. The two lowest frequency characters are combined to form a new node, and this process is repeated until only one root node remains, creating a Huffman tree. Characters are given binary codes based on the route taken from the root to the leaf node. The encoded text is then created by replacing each character in the Huffman tree with its appropriate binary code.

learn more about frequency table here:

https://brainly.com/question/28931302

#SPJ4

What is an example of information power?.

Answers

People are in a strong position if they have control over information that others need or want. Informational power can be demonstrated by having access to private financial records.

What is information power?

A person's ability to persuade others based on their understanding of information that is pertinent to the situation.

Expert power is the capacity for a worker, regardless of level of seniority, to demonstrate knowledge in a field or circumstance. One employee might have the expert power in a situation if, for instance, no one else in the department has any experience using a particular piece of software but that employee does.

Thus, People are in a strong position if they have control over.

For more information about Informational power, click here:

https://brainly.com/question/26217832

#SPJ1

"Caller ID" is the feature that displays the telephone number of the caller on the telephone of the person he or she calls. With Caller ID now routine and widely used, it might be surprising that when the service was first available, it was very controversial because of privacy implications. (a) What aspect of privacy (in the sense of Section 2.1.1) does Caller ID protect for the recipient of the call? What aspect of privacy does Caller ID violate for the caller? (b) What are some good reasons why a nonbusiness, noncriminal caller might not want his or her number displayed?

Answers

Answer: Provided in the explanation section

Explanation:

please follow this explanation for proper guiding.

(a)

i. What aspect of privacy does Caller ID protect for the recipient of the call?

* The beneficiary of the call utilizing the Caller ID highlight becomes more acquainted with who precisely the guest is, independent of the guest being a decent/terrible individual or authentic/ill-conceived call.  

* Depending on how the call went or wound up, i.e., the discussion, business, messages passed on, the beneficiary would have the option to act in like manner and suitably dependent on the guest and his message's respectability, habits, morals, demonstrable skill, or telephone decorums, and so forth.  

* Also, the beneficiary gets the alternative to choose how to manage the call even before him/her picking the call, when he/she comes to know who the guest is through Caller ID include, the beneficiary gets security by either separating the call, sending or diverting the call, recording the call, not noting the call, or in any event, blocking or announcing the number in any case. Along these lines, the beneficiary's security is ensured from various perspectives.

ii. What aspect of privacy does Caller ID violate for the caller?

* Even however as it were, in fact it distinguishes, confirms, and validates the guest demonstrating he/she is who he/she professes to be. In any case, the guest ID highlight or innovation unveils numerous information and data about the guest, for example, his accurate phone number or PDA number, nation code, the specific phone or versatile transporter organize he/she is utilizing, and so on., as this data may make dangers the guest's security, (for example, character burglaries or just assailants caricaturing others utilizing this current guest's data), classification, it might cause accessibility issue for the guest as when the guest is besieged with ill-conceived calls, spam, and undesirable calls, there are chances their telephone numbers could and would be imparted to many advertising and selling organizations or industry without the guest's assent, there are chances somebody focusing on the guest may tap or wire his/her significant, basic business, social, expert, individual, or private calls for touchy data to assault them and abuse the bantered data. The guest certainly loses his/her secrecy, opportunity, directly for discourse, security, and wellbeing when passing on messages over the call when they know there could be somebody tapping or recording the call, or even the beneficiary may abuse the guest's character and his/her passed on data.  

* Hence, the guest doesn't get the opportunity from reconnaissance i.e., from being followed, followed, watched, and spying upon by trouble makers.  

* The guest would lose the control of their data on how it would be put away or utilized.  

* The guest probably won't get opportunity from interruptions.

(b).  What are some good reasons why a non-business, non-criminal caller might not want his or her number displayed?

* A non-business and a noncriminal guest would need to enjoy typical, common, and regular exercises; mingle and do his/her own day by day close to home, private, and public activities' assignments, occupations, occasions, social occasions, correspondences, individuals organizing, and so on., without making any whine about things, exposure stunts, without causing anyone to notice tail, screen, follow, question, or explore the guest superfluously except if the guest has enjoyed, asked, stated, discussed, or passed on any message that is unlawful, exploitative, wrongdoing, and culpable.  

* Such a guest would need total or most extreme namelessness, as to them, guest ID innovation just uncovers their own and private life exercises, correspondences, and so forth., to others to pass judgment on them, question them, and later cross examine and research them on their interchanges.  

* Such guests for the most part search for security in general.  

* Specifically, such guests need classification of their calls, discussions, messages, call logs, and so forth.  

* The beneficiary on occasion may get the guest's private unlisted number without the guest's assent or authorization.  

* The beneficiary may utilize the guest's telephone number and name to get a lot other data about him/her, which the beneficiary should, that would incorporate the guest's location (area) through an opposite catalog or just turning upward in any phone registry.  

* The beneficiary might not have any desire to talk, mingle, or work with the guest in view of the area (address), ethnicity (from the name), race, or district the guest is from.  

Jack is a forensic specialist who wants to examine a network router for potential evidence in a case. What is the first step he should take to safely examine the router

Answers

The step that can be carried by Jack for the safe examination of the router as the case evidence is connecting the router to the network.

What is a network router?

The network router is given as the connection between the two networks that mediate the delivery of the packed information.

The safety of the router in the forensic evidence is important as the incorrect connection resulting in corruption and deletes all the data.

Being the specialist, to check the router, the first step to be followed by Jack was connecting the router to the network.

Learn more about routers, here:

https://brainly.com/question/15851772

#SPJ1

Exercise 2. 4. 8: Greetings and Salutations5 points

Write a class called Salutations that prints various greetings and salutations.


The class should have one instance variable, a String called name to represent the person to whom the salutations are directed.


The class should have the following methods


A constructor that takes a String to initialize name with

public void addressLetter()

public void signLetter()

public void addressMemo()

public void signMemo()



addressLetter should print "Dear name", where name is replaced by the value of the instance variable name

signLetter() should print

"Sincerely,

name"

where name is replaced by the value of the instance variable name

addressMemo should print "To whom it may concern"

signMemo should print

"Best,

name

where name is replaced by the value of the instance variable name

Answers

Below is the implementation of the "Salutations" class in Java that meets the provided requirements:

public class Salutations {

   private String name;

   public Salutations(String name) {

       this.name = name;

   }

   public void addressLetter() {

       System.out.println("Dear " + name + ",");

   }

   public void signLetter() {

       System.out.println("Sincerely,\n" + name);

   }

   public void addressMemo() {

       System.out.println("To whom it may concern");

   }

   public void signMemo() {

       System.out.println("Best,\n" + name);

   }

   public static void main(String[] args) {

       Salutations salutations = new Salutations("John Doe");

       salutations.addressLetter();

       salutations.signLetter();

       salutations.addressMemo();

       salutations.signMemo();

   }

}

Below is the implementation of the "Salutations" class in Java that meets the provided requirements:

java

Copy code

public class Salutations {

   private String name;

   public Salutations(String name) {

       this.name = name;

   }

   public void addressLetter() {

       System.out.println("Dear " + name + ",");

   }

   public void signLetter() {

       System.out.println("Sincerely,\n" + name);

   }

   public void addressMemo() {

       System.out.println("To whom it may concern");

   }

   public void signMemo() {

       System.out.println("Best,\n" + name);

   }

   public static void main(String[] args) {

       Salutations salutations = new Salutations("John Doe");

       salutations.addressLetter();

       salutations.signLetter();

       salutations.addressMemo();

       salutations.signMemo();

   }

}

In the above class, we have an instance variable called "name" of type String, which represents the person to whom the salutations are directed. The class has a constructor that takes a String argument to initialize the "name" variable.

The class also includes the following methods as specified:

The "addressLetter" method prints "Dear name", where "name" is the value of the instance variable.

The "signLetter" method prints "Sincerely," on one line and then prints the "name" on the next line.

The "addressMemo" method prints "To whom it may concern".

The "signMemo" method prints "Best," on one line and then prints the "name" on the next line.

To test the functionality of the "Salutations" class, a "main" method is included that creates an instance of the class with a sample name "John Doe". It then calls the different methods to demonstrate the expected output.

Executing the main method will result in the following output:

Dear John Doe,

Sincerely,

John Doe

To whom it may concern

Best,

John Doe

Each method performs its respective task as described, utilizing the instance variable "name" in the output statements.

For more questions on Java

https://brainly.com/question/31569985

#SPJ11

What security trade-offs or options should an administrator consider when confronted with a potentially extraneous service, such as FTP or SMTP, running on a web server? *

Answers

FTP or File Transfer Protocol was never designed to be hack-safe. Files exchanged using FTP are not encrypted. Hence, this service is susceptible to various kinds of security risks such as spoofing, sniffing, etc.

What tradeoff must the Administrator consider when using FTP?

Although the FTP is insecure, it is a very fast way of transferring files.

When the connection is lost during file transfer, it is possible to resume such a transfer.

It also allows for queuing, scheduling, uploading, and downloading of files.

The full meaning of SMTP is Simple Email Transfer Protocol.

Learn more about FTP and SMTP at:

https://brainly.com/question/17506968

https://brainly.com/question/14396938

You have determined a need for a book class and a page class in your program. which relationship is most appropriate between these classes?

Answers

The most appropriate relationship between the Book class and the Page class in your program is a composition relationship.

In composition, the Book class would contain an instance variable of the Page class, indicating that a Book is composed of Pages. This means that the existence of a Book depends on the existence of its Pages.

For example, consider a library management system. A Book class would have attributes like title, author, and genre. Each Book object would also contain a Page object, representing the pages within the book. Without the Pages, the Book would be incomplete.

By using composition, you can easily manage and manipulate the Pages within a Book, such as adding or removing pages, accessing specific pages, or updating page content.

Composition is a strong relationship where the lifetime of the contained object (Page) is tied to the lifetime of the container object (Book). It allows for code reusability and flexibility.

In summary, the most appropriate relationship between the Book class and the Page class is composition, where a Book contains a Page object. This ensures that a Book cannot exist without its Pages and allows for efficient management of page-related operations.

To know more about appropriate visit:

https://brainly.com/question/9262338

#SPJ11

What is the use of comma and semicolon with print statement ?​

Answers

Answer:

The use of a comma and semicolon with print statement tells the computer that the program or specific line is ending.

Explanation:

So for example, with a python program if you write print("Hello, World"); the semicolon tells the computer that, that command ends at the semicolon.


Help!!! Photography class!! ASP

Which of the following represents aperture priority mode?
Select all that apply.
Α.
The photographer needs to select the value of aperture manually.
B.
The camera determines the value of aperture automatically.
С
The camera determines the value of shutter speed automatically.
D
The photographer needs to select the value of shutter speed manually.

Answers

Answer:

D.

Explanation:

Typically represented by a capital A (or sometimes Av, short for Aperture Value) on the camera mode dial, aperture priority allows the photographer to dial in this specific exposure setting—the ƒ-stop—and asks the camera to calculate the correct corresponding shutter speed in the instant before the shutter is released.

Que compone una maquina Rube Goldberg (operadores mecánicos- maquinas simples – mecanismos)

Answers

Answer:

dominoes, fans, PVC pipe, magnets, duct tape, marbles, cups or bowls, miniature toy cars, paper towel tubes, string.

------------------------------------------------------------------------------------------------------------

dominó, abanicos, tubos de PVC, imanes, cinta adhesiva, canicas, tazas o cuencos, carros de juguete en miniatura, tubos de toallas de papel, cuerdas.

Explanation:

When is it appropriate to restore from a system image?

Answers

Answer:

When should I use system image Recovery?  

As long as you have created a system image of your hard disk, you can use the System Image Recovery tool from the Recovery Drive to restore your entire system in the event of a hard disk failure.

Explanation:

The database of viruses that an antivirus software scans for is called​

Answers

Answer:

The anti virus scanner is the answer.

Multifactor authentication requires you to have a combination of:_______

Answers

The correct answer is Multifactor authentication requires you to have a combination of two or more of the following factors: something you know, something you have, or something you are.

"Something you know" refers to a secret or personal information, such as a password, PIN, or answers to security questions. This factor confirms that the user has knowledge of specific information that only they should know "Something you have" refers to a physical object that is in the user's possession, such as a smart card, token, or mobile device. This factor confirms that the user has access to a specific object that only they should have. Something you are" refers to a biometric factor, such as a fingerprint, facial recognition, or voice recognition. This factor confirms the user's unique physical characteristics that are difficult to forge or replicate. By combining two or more of these factors, multifactor authentication provides an extra layer of security beyond just a username and password. It helps to protect against unauthorized access, identity theft, and other security threats.

To learn more about Multifactor authentication click on the link below:

brainly.com/question/14437331

#SPJ4

HTTP https CSS JavaScript and HTML are types of coding and formatting behind web pages true or false?

Answers

Answer:

True

Explanation:

In order to be able to run a webpage successfully, there are various coding and formatting that are required and can considered necessary.

They are:

a) Hypertext Transfer Protocol(HTTP): This is a protocol that is made use of on webpages. It is used to determine the information or data that is collected and transmitted through webpages. The commands that are programmed on webpages are modified by this protocol. The data or information that can be transmitted using HTTP includes: Pictures, Video or Audio recordings e.t.c.

b) Hypertext Transfer Protocol Secure(HTTPS) : This is an advanced or modified form of HTTP. The difference between them is HTTPS is more secure than HTTP. HTTPS is defined as a more secured protocol thorough which data or information can be transmitted from one webpage to another. HTTPS make used of an encrypted type of security during data transmission.

c) Cascading Style (CSS): It is a computer language technology that helps to define and modify the way a webpage looks like. Cascading Style can be defined as a formatting style that deal with the fonts, colour , layout of a webpage.

d) JavaScript :This is a programming language that is used on webpages. It is a set of coding that has commands embedded insided that is written to make webpages more interactive and fun for the users of the Internet.

e)Hypertext Markup Language (HTML): This is what is used to create webpages on the internet. Hypertext Markup Language defines what a webpage actually looks like which involves, the written document on the webpage

Answer:

true 100 percent true

Explanation:

its the truuth its the truuuth its the truuuuuuuth
yea aa

deacon has observed that the switch is broadcasting all packets to all devices. he suspects it is the result of an attack that has overflowed the switch mac address table. which type of attack is this?

Answers

An attack that overflows the switch MAC address table to broadcast all packets to all network devices is called: MAC flooding attack.

Cybersecurity refers to the preventive practice adopted for the protection of computers, software applications (programs), servers, networks, and data from unauthorized access, attack, potential theft, or damage, through the use of the following;

Frameworks.A body of technology.Policies.Processes.Network engineers.

A media access control (MAC) flooding attack can be defined as a type of cyber attack that overflows a switch's MAC address table, so as to broadcast all packets to all network devices.

In conclusion, a media access control (MAC) flooding attack compromises the data integrity and security of a network switch through the use of fake MAC addresses.

Read more: https://brainly.com/question/24112967

A business is having trouble keeping up with the competition. They cannot
respond to their customers like the competition. Which type of system will
likely be able to help them solve this issue?
A. Transaction processing system
B. Management communication system
C. Management information system
D. Decision support system
SUBMIT

Answers

Answer:

B.

Explanation:

Answer:

d is the answer

Explanation:

we know that the business cannot keep on with the competition ( for whatever reason )

Since the cannot respond to them let us figure out what option is:

A transaction processing system is a software system that supports transaction processing.

A management communication system is by which information is passed between the managers and employees within a business, or between the business itself and outsiders.

A management information system is a system that provides managers with the necessary information to make decisions about an organization's operations

A decision support system is a, computer program application used to improve a company's decision-making capabilities

Making a descision support system accurate to the problem

D being the answer

what is the name of the first practical asymmetric cryptosystem that was created?

Answers

Answer:

I think the name is RSA

Does public domain status allow the user of the material unrestricted access and unlimited creativity and can it be used freely by anyone

Answers

Yes, public domain material can be used freely by anyone without restriction, including for commercial purposes. Public domain material is not protected by copyright and does not require attribution. However, it is always good to verify the public domain status of a work before using it, as the laws around public domain can vary by jurisdiction.

Why operating system is important software for computer. give any five reasons.

Answers

Answer:

The description of the discussion is summarized throughout the explanation segment elsewhere here.

Explanation:

The operating quality would be an essential technology running on a computer. It maintains the recent memories but instead mechanisms including its desktop, along with all the latter's hardware as well as software components.  Perhaps it facilitates communication with your device without learning how to read your device's dialect.  

Given a function definition:
void CalcVal(int a, int b, int c)
b is assigned with what value during this function call:
CalcVal(42, 55, 77);
Group of answer choices
a 55
b 164
c 77
d 42

Answers

In this case, the function will take the values 42 and 130 as its parameters, add them together, and return the result (172). We can then assign this result to a variable called "result" and use it elsewhere in our code.

A function definition is a block of code that specifies what a particular function does. It typically includes a name for the function, a list of parameters that the function expects to receive, and the code that should be executed when the function is called.

For example, let's say we want to define a function called "add_numbers" that takes two parameters (x and y) and returns their sum. We could define this function in Python like this:

```
def add_numbers(x, y):
   return x + y
```

In this case, the function name is "add_numbers", and it takes two parameters (x and y). The code inside the function simply adds the values of x and y together and returns the result.

When we want to use this function in our code, we can simply call it by name and pass in the values we want to add. For example:

```
result = add_numbers(42, 130)
```
To learn more about : function

https://brainly.com/question/179886

#SPJ11

Which of the following Information Technology career fields generally requires the lowest level of education for an entry-level position? Information Services and Support Network System Administration Programming and Software Development Interactive Media

Answers

Answer:

The Information Technology career fields that generally requires the lowest level of education for an entry-level position would be Information Services and Support.

Explanation:

Answer:

A - Information Services and Support

Explanation:

I just did it

you have implemented a qos model where each application must request network resources. the router will approve or deny the request based on available resources. which qos model is being used?

Answers

There are three models for implementing QoS: Best Effort, Integrated Service, Differentiated Service.

Quality-of-Service (QoS) refers to differentiating performance based on application or network operator requirements, or providing predictable or guaranteed performance for applications, sessions, or traffic aggregation. Refers to the desired traffic control mechanism. The fundamental phenomenon of QoS is meant to relate to delay and loss of different types of packets.

Quality of Service (QoS) is a set of technologies that work within a network to ensure that high-priority applications and traffic can run in the face of limited network capacity. QoS technologies accomplish this by providing differentiated treatment and capacity allocation for specific flows of network traffic. QoS helps reduce network congestion by shutting down or throttling low-priority traffic during peak hours and using application-specific traffic routing to reduce congestion in critical sectors of the network.

The five main categories of tools used to implement QoS are: Classification and labeling. Congestion management. Avoid traffic jams. policing and shaping.

There are six categories of QoS technologies.

Classification, marking, monitoring, shaping, congestion avoidance and queuing. 

Know more about QoS here:

https://brainly.com/question/17311583

#SPJ4

Other Questions
The table below provides information about several mineral samples that were used during an investigation.mineral, color, streak, luster, hardness, apatite, pale, green, white, glassy, 5, halite, gray, white, glassy, 2.5, calcite, light, green, white, glassy, 3, feldspar, gray, white, glassy, 6,Students were given a mineral sample to identify, and they made several observations about the sample. The mineral was green and made a white streak on a streak plate. It also had a glassy luster. The students were able to scratch the mineral with a sample of fluorite. Because of this, they determined that the mineral had a hardness of less than 4. The students summarized this information in the table below.student, observations, color, green, streak, white, luster, glassy, hardness, less, than, 4,Based on these observations, what is the identity of this mineral sample?ApatiteHaliteCalciteFeldspar Ms. Augello is making tie-dyed shirts with her students. Each gallon of hot water needs 2/3 cup of dye. If Ms. Augello has 5 1/4 cups of dye, how many batches of solution will she be able to make? Find the surface area of a square pyramid with side length 3 mi and slant height 3 mi.explain your answer too please Jack bought 5 pounds5 \text{ pounds} 5 pounds 5, start text, space, p, o, u, n, d, s, end text of Halloween candy. He gave out 3 pounds3\text{ pounds} 3 pounds 3, start text, space, p, o, u, n, d, s, end text of the candy to trick or treaters and ate 10 ounces10\text{ ounces} 10 ounces 10, start text, space, o, u, n, c, e, s, end text of the candy. How many ounces of Halloween candy does Jack have left? The of a note is the amount that the signer of a note agrees to pay back when it matures, not including interest. can u please help me how have people adapted to the grasslands of the great plains region? Ying and Michael are married fling jointly taxpayers with earned income and I of 23.200 in 2021 They have two children agen 3 and 5. All members of the family have Social Security numbers, are usor de inter in the United States a year Ying had 5820 of tax withheld from her wages during the year. Michael did not work. Ying and Michael can claim the Easthey meet with for taxpayers with a qualifying child Based on earned income of $23.200. fiting jointly with two qualifying children their per the 2021 NOTE: YOU CAN USE THE EIC ASSISTANCE TOOL IN INTERNET 4,000 2.800 5,980 24,000 Based on the prompt, what is your purpose for writing?O to inform readers about eighteenth-century Irelandto describe the most important ideas in Swift'sessay and explain his reason for writingto make an argument about whether or not satire iseffective By the 1800s, it took (1a. 6 months/1b. 5-8 months/1c. One yr) for ships to sail across the atlantic ocean. This increased speed reduced middle passage death rates. Sanitary conditions also improved as slave traders took (2a. Better care of the captured africans/2b. Time out to treat sick slaves/2c. Some of the slaves as part of their crew). This change was not done out of care for enslaved africans but from a desire to get a better price for them when they were sold Van purchased a DVD player on sale. The initial price was $ 154.30 The price after the discount was $ 132.17 What was the percent of decrease (discount rate)? What is the MOST LIKELY reason the author uses a first-person narratorin the passage?A)He wanted to include a surprise ending.B)The poem is about his personal feelings.The poem is about relationships and family.D)He wanted to include his father's perspective. through a comprehensive manner (adequate justifications required). a) What are the main parameters affecting pressure drop in a production well? Briefly describe them. b) What is the pressure traverse curve? What are its applications? c) What are the main flow regimes in vertical pipes? Briefly describe them. Find 95% of 3000 kilograms. You roll a 16-sided die (having values 1-16 on its faces).What is the probability that the value of the roll will be a 6?O2/1610/16O 1/1606/16 A mass of 0.450 kg rotates at constant speed with a period of 1.45 s at a radius of R = 0.140 m . What is the rotation period for a mass of 0.550 kg at the same radius? You are to conduct online research and discuss TWO (2) latest trends in Operations Management arising in the 21st century. [200 10% words] [You are encouraged to seek help or clarification from your instructor on this question.] (20 marks) what lesson is this? Find the missing value to the nearest hundredth. cos (______) = 3/7A. 64.62 degreesB. 1.12 degreesC. Not possible The bike store marks up the wholesale cost of all of the bikes they sell by 30%. Andre wants to buy a bike that has a price tag of $125. What was the cost of this bike before the markup?