You have two routers that should be configured for gateway redundancy. the following commands are entered for each router. a(config)

Router A will serve as active router, and Router B will server as standby router.
If the preempted router fails and then recovers, it will send a coup message to return as the active router.

Answers

Answer 1

The main router will be Router A, and the backup router will be Router B. The preempted router will send a coup message to become the active router if it crashes and then recovers.

A first hop redundancy protocol (FHRP) is a computer networking standard that enables two or more routers to serve as backup for the default gateway used on a subnetwork. In the event that an active router fails, the backup router will typically take over the address within a few seconds. In reality, these protocols may be used to safeguard not only routers but also other services sharing a single IP address.

These protocols, in roughly chronological sequence of their inception, include:

Cisco's original, proprietary standard, known as HSRP, was created in 1998.

[3]

Virtual Router Redundancy Protocol (VRRP) is an open standard protocol, despite having a patent.

Cisco's HSRP was replaced with the Common Address Redundancy Protocol (CARP), a patent-free, unrestricted alternative.

Learn more about Router here:

https://brainly.com/question/14291670

#SPJ4


Related Questions

You have two Windows Server 2016 computers with the Hyper-V role installed. Both computers have two hard drives, one for the system volume and the other for data. One server, HyperVTest, is going to be used mainly for testing and what-if scenarios, and its data drive is 250 GB. You estimate that you might have 8 or 10 VMs configured on HyperVTest with two or three running at the same time. Each test VM has disk requirements ranging from about 30 GB to 50 GB. The other server, HyperVApp, runs in the data center with production VMs installed. Its data drive is 500 GB. You expect two VMs to run on HyperVApp, each needing about 150 GB to 200 GB of disk space. Both are expected to run fairly disk-intensive applications. Given this environment, describe how you would configure the virtual disks for the VMs on both servers.

Answers

The virtual disk configuration for the VMs on both servers in this environment is shown below.

In the Hyper V Test,

Since there will be two or three virtual machines running at once, each of which needs between 30 and 50 GB of the total 250 GB of disk space available,

What is virtual disks?

Setting up 5 virtual disks, each 50 GB in size.

2 VMs each have a 50 GB virtual drive assigned to them.

The above setup was chosen because running three VMs with various virtual disks assigned to them will not pose an issue when two or three VMs are running concurrently and sharing the same virtual disk. This is because the applications are disk-intensive.

To learn more about virtual disks refer to:

https://brainly.com/question/28851994

#SPJ1

Given this environment, the virtual disk configuration for the VMs on both servers is shown below. Because two or three VMs will be running at the same time, and each VM has disk requirements ranging from 30 to 50 GB of total disk space of 250 GB.

What is Hyper V Test?While there are several methods for testing new virtual machine updates, Hyper-V allows desktop administrators to add multiple virtual machines to a single desktop and run tests. The Hyper-V virtualization technology is included in many versions of Windows 10. Hyper-V allows virtualized computer systems to run on top of a physical host. These virtualized systems can be used and managed in the same way that physical computer systems can, despite the fact that they exist in a virtualized and isolated environment. To monitor the utilization of a processor, memory, interface, physical disk, and other hardware, use Performance Monitor (perfmon) on a Hyper-V host and the appropriate counters. On Windows systems, the perfmon utility is widely used for performance troubleshooting.

Therefore,

Configuration:

Creating 5 Virtual disks of 50 GB each.

1 virtual disk of 50 GB is assigned to 2 VM.

The above configuration is because since two or three VM will be running at the same time and using the same virtual disk will cause a problem since the applications are disk intensive, running three VMs with different virtual disks assigned to them, will not cause a problem.

For Hyper V App,

Two VM will run at the same time, and the disk requirement is 150 - 200 GB of 500 GB total disk space.

Configuration:

Creating 2 virtual disks of 200 GB each with dynamic Extension and assigning each one to a single VM will do the trick.

Since only two VMs are run here, the disk space can be separated.

To learn more about Hyper V Test, refer to:

https://brainly.com/question/14005847

#SPJ1

modern computer systems enable users to work with more than one program at the same time as a way to improve their efficiency. this technique is known as

Answers

Modern computer systems enable users to work with more than one program at the same time as a way to improve their efficiency. This technique is known as a) multitasking.

The Benefits of Multitasking in Modern Computer Systems

In the digital age, multitasking has become an essential part of modern computer systems. This technology enables users to work efficiently and effectively by allowing them to work on multiple tasks and programs at the same time. With this capability, users can maximize their productivity and optimize their workflow. In this essay, we will discuss the advantages of multitasking in modern computer systems.

The primary benefit of multitasking is increased efficiency. By being able to work on multiple tasks simultaneously, users can save time and get more done in a shorter period. Additionally, multitasking can help users to stay organized, as they can keep track of multiple tasks and programs at the same time. Furthermore, multitasking can help users to be more productive, as they can quickly switch between tasks and complete them more quickly and efficiently.

Complete Question:

4) Modern computer systems enable users to work with more than one program at the same time as a way to improve their efficiency. This technique is known as _____.

a) multitasking.b) multi-methods.c) multiprocessing.d) multi-procedures.

Learn more about Computer sustems:

https://brainly.com/question/22946942

#SPJ4

How will I go about conducting the investigation on fake news

Answers

A person can go about conducting the investigation on fake news by:

Making personal researchMaking news verificationsComparing news with reputable outlets, etc

Fake news are those news or pieces of reporting which contains false information which is misleading to the general public.

With this in mind, it is important to verify information which you see anywhere and compare them to more reliable news outlet and also to make personal research which would be done without bias.

Read more here:

https://brainly.com/question/24560932

Could someone please tell me what is the error in my code?

I'm trying to write a code for finding the cube of a number using C programming.

Could someone please tell me what is the error in my code?I'm trying to write a code for finding the

Answers

I think you have to remove the semicolon at the end of line 15. From what I see, this is not a logic error, rather than a syntax error.

Looking at the error on the bottom, it's expecting a '(' before the '{'.

You are an intern at Lucerne Publishing.
The company needs to use multiple versions of Microsoft Oce on each machine in the editing department.
Which virtualization strategy should the company use?

Answers

Answer:

Microsoft Application Virtualization (App-V)

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

In cloud computing, virtualization can be defined as a process which typically involves creating a virtual storage device, servers, operating system, desktop, infrastructure and other computing resources. Thus, virtualization is considered to be a building block (foundational element) of cloud computing as it powers it.

In this scenario, multiple versions of Microsoft Office are required to be used on each machine in the editing department. Thus, the virtualization strategy which the company should use is Microsoft Application Virtualization (App-V).

Microsoft Application Virtualization (App-V) refers to a virtualization and streaming software acquired by Microsoft from Softricity on the 17th of July, 2006. It is designed to avail software developers the ability to run, update and deploy (stream) software applications remotely to end users.

This ultimately implies that, end users could use multiple versions of a software application such as Microsoft Office 2013, 2016, etc., on each machine without having to worry about physically installing them on their Windows computer systems.

In the report layout group the outline form puts the totals at the bottom of each group. true false

Answers

In the report layout group, the outline form puts the totals at the bottom of each group is true.

The report layout determines the appearance of the report. This report layout controls which data fields of the report data set appear, how they are organized, laid out, and more. Reports may have more than one layout, which can then be modified as needed. Example when there are multiple companies in the app, the layout is set on a per-company basis.

How do I run a report from a report layout?

The Report Layouts page appears and lists all the layouts currently available for all reports. In the Report Layouts list,

Select any layout for the reportSelect the Run Report action. On the report request page, select Send to > Microsoft Excel document (data only) Click OK

You can learn more about report layout here https://brainly.com/question/13438811

#SPJ4

Question 3 of 10
What is one advantage of video tutorials about maintenance and repairs?
O A. Video tutorials help you fix problems by doing the work for you.
O B. Sometimes, seeing a picture of the process is more helpful than
reading about it.
O C. Video tutorials are easier to make than written guides.
O D. Video tutorials cannot do the repair or maintenance for you.
SUBMIT
PREVIOUS​

Answers

Answer:

B. Sometimes, seeing a picture of the process is more helpful than  reading about it.

Explanation:

Video tutorials are a form of communication in which the instructions are given through video instructions. The users drive more information from video tutorials than written or audio. The visual and the auditory aids together helps in creating a better impact on the users. The video tutorial is more user friendly and can easily be controlled by the user. This helps in better understanding and analyzing the information.

Answer: B. Sometimes, seeing a picture of the process is more helpful than reading about it.

Explanation: took the quiz

Using the concepts from Chapter 3, explain how databases, data
warehourses, and data marts help the modern
organization.

Answers

Databases, data warehouses, and data marts play crucial roles in helping modern organizations effectively manage and utilize their data. They provide a structured and organized framework for storing, processing, and analyzing vast amounts of information, enabling businesses to make informed decisions and gain valuable insights.

Databases serve as the foundation for data management, allowing organizations to store and retrieve data efficiently. They provide a centralized repository where structured and organized data can be stored and accessed by various applications and users. Databases ensure data integrity, consistency, and security, while also enabling concurrent access and efficient data manipulation operations.

Data warehouses take the concept of databases further by providing a unified and integrated view of an organization's data from multiple sources. They consolidate data from different operational systems and transform it into a consistent and standardized format. Data warehouses enable complex analytics and reporting by providing historical and current data in a structured and optimized manner. This allows organizations to gain insights into trends, patterns, and correlations across their entire data landscape.

Data marts, on the other hand, are specialized subsets of data warehouses that focus on specific business areas or user groups. They provide a more targeted and tailored view of data, customized to meet the needs of specific departments or functions within the organization. Data marts enable faster and more focused analysis, as they contain pre-aggregated and pre-summarized data relevant to a particular area of interest. They help streamline decision-making processes and support business intelligence initiatives by delivering data in a more user-friendly and accessible manner.

In summary, databases, data warehouses, and data marts form the backbone of modern organizations' data management strategies. They ensure data is organized, accessible, and actionable, empowering businesses to make informed decisions, gain competitive advantages, and drive growth.

learn more about databases here:

https://brainly.com/question/30163202

#SPJ11

name two different colors used in the python program file window.name the type of program content that has each color ......

whoever answer this correct i will rate them 5 stars and a like .....
please urgent ​

Answers

In the Python program window, black is used for code and syntax, while white is used as the background.

How is this so?

1. Black  -  The color black is typically used for the program's code and syntax. It represents the actual Python code and includes keywords, functions, variables, and other programming constructs.

2. White  -  The color white is commonly used as the background color in the program window. It provides a clean and neutral backdrop for the code and makes it easier to read and understand.

Learn more about python program at:

https://brainly.com/question/26497128

#SPJ1

When it’s time to move out, your landlord inspects the property and claims you have damaged the apartment. She is keeping your security deposit. Will the renters insurance cover this loss?

Answers

Until you vacate, your landlord retains this money. The landlord has the right to withhold the security deposit if you mistreat the property or fail to pay rent.

I need to know how to get my security deposit refunded.

At the conclusion of your tenancy, you must speak with your landlord and request your security deposit. You must speak with the letting agency in place if your home is under their management. When requesting a refund of your deposit, it is recommended to write or email.

What percentage of the security deposit is there?

A security deposit of 10% of the total bill amount is withheld from the contractor's invoice and released when the defect liability period has passed.

To know more about security deposit visit:-  

https://brainly.com/question/29825161

#SPJ1

800,000= 180,000(P/AD, i,5) + 75,000(P/F,i,5) I want to find interest rate (i)
Would you let me know how to calculate this using Excel?

Answers

here is how to compute the above using Excel.

How to calculate the above

Open a new Excel spreadsheet and enter the following values in the cells:

Cell A1: 800,000 (Total amount)

Cell A2: 180,000 (Payment at the end of each period)

Cell A3: 75,000 (Payment at the beginning of each period)

Cell A4: 5 (Number of periods)

In cell A5, enter an initial guess for the interest rate (i). For example, you can start with 0.1 (10%).

In cell B1, enter the formula =A2*PMT(A5,A4,0) to calculate the present value of the periodic payments at the end of each period.

In cell B2, enter the formula =A3*PMT(A5,A4-1,0) to calculate the present value of the periodic payments at the beginning of each period.

In cell B3, enter the formula =A1 - B1 - B2 to calculate the remaining balance.

In cell B4, enter the formula =RATE(A4, B2, B1) to calculate the interest rate.

Learn more about Excel Formula at:

https://brainly.com/question/29280920

#SPJ1

Are DoS and DDos tactics appropriate for legitimate organizations to use against others? What fallout is considered appropriate fallout should an attack be used on others? Explain your answer.

Answers

Answer:

They are inappropriate

fallouts: Access denial and data theft

Explanation:

Dos ( denial of service ) and DDos ( distributed denial of service ) are inappropriate for legitimate organizations to use against each other. because DOS or DDos attacks are attacks on the server of an organization by sending an unusual amount of traffic to the server, thereby denying the devices and users connected to the server access to the server.

Access denial and data theft are the fallouts associated with DOS  and DDos attacks

What is the minimum ethernet frame size that will not be discarded by the receiver as a runt frame?.

Answers

Answer:

64 bytes

Explanation:

Hypothesis testing based on r (correlation) Click the 'scenario' button below to review the topic and then answer the following question: Description: A downloadable spreadsheet named CV of r was provided in the assessment instructions for you to use for this question. In some workplaces, the longer someone has been working within an organization, the better the pay is. Although seniority provides a way to reward long-serving employees, critics argue that it hinders recruitment. Jane, the CPO, wants to know if XYZ has a seniority pay system. Question: Based on the salary and age data in the spreadsheet, find the value of the linear correlation coefficient r, and the p-value and the critical value of r using alpha =0.05. Determine whether there is sufficient evidence to support the claim of linear correlation between age and salary.

Answers

In the given scenario, with a sample correlation coefficient of 0.94, a p-value less than 0.01, and a critical value of 0.438, the null hypothesis is rejected.

The linear correlation coefficient (r) measures the strength and direction of a linear relationship between two variables.

Hypothesis testing is conducted to determine if there is a significant linear correlation between the variables.

The null hypothesis (H0) assumes no significant linear correlation, while the alternative hypothesis (Ha) assumes a significant linear correlation.

The significance level (α) is the probability of rejecting the null hypothesis when it is true, commonly set at 0.05.

The p-value is the probability of obtaining a sample correlation coefficient as extreme as the observed one, assuming the null hypothesis is true.

If the p-value is less than α, the null hypothesis is rejected, providing evidence for a significant linear correlation.

The critical value is the value beyond which the null hypothesis is rejected.

If the absolute value of the sample correlation coefficient is greater than the critical value, the null hypothesis is rejected.

This implies that there is sufficient evidence to support the claim of a linear correlation between age and salary, indicating that XYZ has a seniority pay system.

To know more about null hypothesis visit:

https://brainly.com/question/30821298

#SPJ11

The harm of stereotypes are likely to be aggravated in

Answers

Answer:

conflict situations

Answer:

B. Conflict situations

Hope this helps!

Explanation:

Use the factorial operation to evaluate 4!.
10
O 24
04
0 1

Answers

Answer:

24

Explanation:

factorial operation 4! = 4×3×2×1 = 24

DogRunner.java
/*
* Activity 1.2.4
*/
public class DogRunner
{
public static void main(String[] args)
{

}
}
public class Dog
{
public Dog(String name)
{
System.out.println("Hi! I am a dog. My name is " + name + ".");
}

public void sit()
{
System.out.println("OK! I am sitting.");
}

public void speak()
{
System.out.println("arf arf!");
}

public void walk(int num)
{
System.out.println("I love to walk for " + num + " minutes.");
}

public void walk(int num, String park)
{
System.out.println("I love to walk for " + num + " minutes and go to " + park + "!");
}

public void eat(String food)
{
System.out.println("I eat " + food + ".");
}

public void eat(String food, int num)
{
System.out.println("I eat " + food + " " + num + " times a day.");
}

public void eat(String food, double amount, int num)
{
System.out.println("I eat " + amount + " cups of " + food + " " + num + " times a day.");
}

public void setAge(int years)
{
System.out.println("I am " + years + " years old.");
}

public void setAge(int years, int months)
{
System.out.println("I am " + years + " years and " + months + " months old.");
}
public void setAge(double years)
{
System.out.println("I am " + years + " years old.");
}

public void play(String toy)
{
System.out.println("Oh boy! I get to play with my " + toy + "!");
}

}

Answers

Overriding only I’m pretty surehave a good day

Which one of these is an example of unnecessary debt?
A. You buy a perfectly good used car instead of an expensive new car
B. You buy your groceries on Friday instead of coupon Monday.
C. You charge clothes you don't really need on a high-interest store card.
D. You save up all year to take a great surfing vacation.

Answers

c. you charge clothes you don’t really need on a high-interest store card

hope this helps :)

An example of unnecessary debt is when you change your clothes and don't really need on a high-interest score. Thus option C is correct.

What is unnecessary debt?

An unnecessary debt can be caused by a variety of issues such as expensive life events, having children, or moving to a new house. It may also be due to poor money management. The debt is due to those things that are not needed and hence are unnecessary.

Find out more information about unnecessary debt.

brainly.com/question/3566270

(I WILL PUT BRAINLIEST)Yuri wants to assign a task to his co-worker. He clicked the Task button to enter the subject, start date, and end date for the task. Then he clicked the Details button to add the number of hours needed for the task. Yuri clicked Save & Close to complete the assignment, but his co-worker did not receive the task. Which best explains Yuri’s error?

He cannot assign a task to an individual co-worker.
He should have entered the hours needed in the Task area.
He entered the wrong subject name in the Task area.
He did not add his co-worker’s information before saving the task.

Answers

Answer:

it seems that yuri didnt enter his co-workers information before saving the task

What does split mean in coding?

Answers

Answer:

In programming, the split function is a string method that is used to divide a string into a list of substrings, based on a specified delimiter. The delimiter can be a single character, a string, or a regular expression.

For example, consider the following string:

"Hello, how are you today?"

We can use the split function to divide this string into a list of substrings based on the space character, like this:

sentence = "Hello, how are you today?"

words = sentence.split(" ")

print(words)

The output of this code will be:

['Hello,', 'how', 'are', 'you', 'today?']

Note that the delimiter is not included in the returned substrings.

Explanation:

One disadvantage of online information sharing is that:
A. search engines do not help people find solid information.
B. we all have to learn how to cite information.
C. it can spread harmful scams or false information.
D. it cannot improve how we get or send information.

Answers

Answer: C

Explanation:

One disadvantage of online information sharing is that it can spread harmful scams or false information. Thus, the correct option for this question is C.  

What are the disadvantages of online information?

The disadvantages of online information are as follows:

They significantly cause addiction and distractions.It steals personal information and is used for identity theft.It also spreads harmful scams or false information.

According to the context of this question, online information typically improves how we get or send information. This mechanism generally enhances the advantages of online information. While the disadvantage of sharing online information is that it can spread harmful scams or false information.

Therefore, the correct option for this question is C.  

To learn more about Online information, refer to the link:

https://brainly.com/question/14042779

#SPJ5

What is the output of the sum of 1001011 and 100011 displayed in hexadecimal?

Answers

Answer:

\(1001011_2\)    \(+\)   \(100011_2\)   \(=\)    \(6E_{hex}\)

Explanation:

Required

\(1001011_2 + 100011_2 = []_{16}\)

First, carry out the addition in binary

\(1001011_2\)    \(+\)   \(100011_2\)   \(=\)    \(1101110_2\)

The step is as follows (start adding from right to left):

\(1 + 1 = 10\) --- Write 0 carry 1

\(1 + 1 + 1(carry) = 11\) ---- Write 1 carry 1

\(0 + 0 + 1(carry) = 1\) ---- Write 1

\(1 + 0 = 1\) --- Write 1

\(0 + 0 = 0\) ---- Write 0

\(0 + 0 = 0\) ---- Write 0

\(1 + 1 = 10\) --- Write 0 carry 1

No other number to add ; So, write 1 (the last carry)

So, we have:

\(1001011_2\)    \(+\)   \(100011_2\)   \(=\)    \(1101110_2\)

Next, convert \(1101110_2\) to base 10 using product rule

\(1101110_2 = 1 * 2^6 +1 * 2^5 + 0 * 2^4 + 1 * 2^3 + 1 * 2^2 + 1 * 2^1 + 0 * 2^0\)

\(1101110_2 = 64 +32 + 0 + 8 + 4 + 2 + 0\)

\(1101110_2 = 110_{10}\)

Lastly, convert \(110_{10}\) to hexadecimal using division and remainder rule

\(110/16 \to 6\ R\ 14\)

\(6/16 \to 0\ R\ 6\)

Write the remainder from bottom to top;

\(110_{10} = 6(14)_{hex}\)

In hexadecimal

\(14 \to E\)

So, we have:

\(110_{10} = 6E_{hex}\)

Hence:

\(1001011_2\)    \(+\)   \(100011_2\)   \(=\)    \(6E_{hex}\)

You are creating a story map about Mexico. After configuring the web app template, you launch the app to test it. When the app opens, the map is zoomed to the whole world, instead of to Mexico. What actions will fix the problem

Answers

Nbdjsksjsidjdjwkwejd

explain the computer according to size​

Answers

On the basis of size there are four types of computer. They are minicomputer, micro computer, mainframe computer and super computer. Super computer is the fastest, most expensive, big in size, and most powerful computer that can perform multiple tasks within no second. Mini Computers are medium sized computer.

HELP ME!!! I WILL GIVE BRAINLY THINGY!!!

What does the code if (num2==50){ do?

Answers

Answer:

What subject is this?

Explanation:

is this math ?????????????????????

you have three sites: boston, chicago, and los angeles. you have created site links between boston and chicago and between chicago and los angeles with the default site link settings. what do you need to do to make sure replication occurs between boston and los angeles?

Answers

To ensure replication occurs between Boston and Los Angeles, given that there are site links between Boston and Chicago and between Chicago and Los Angeles with default site link settings, you need to follow these steps:

1. Confirm that the site links between Boston and Chicago and between Chicago and Los Angeles are functional and properly configured. This means that the default site link settings, such as cost and replication interval, are in place and suitable for your organization's needs.

2. Make sure that Active Directory Domain Services (AD DS) is installed and running on domain controllers in each of the three sites. This ensures that replication can occur between all sites.

3. Verify that the Knowledge Consistency Checker (KCC) is operational. KCC automatically creates replication connections between domain controllers within the same site and across different sites, based on the site link topology.

4. Ensure that the Bridgehead Servers in each site are designated and functional. These servers are responsible for replicating information between sites, which will allow replication between Boston and Los Angeles through the intermediate site of Chicago.

5. Monitor the replication health and performance by using tools such as Active Directory Replication Status Tool and the Repadmin command-line tool. This will help you detect any issues or bottlenecks in the replication process and take corrective actions if necessary.

By following these steps, you can ensure that replication occurs between Boston and Los Angeles using the existing site links with default settings.

Learn more about AD DS here:

https://brainly.com/question/28788171

#SPJ11

Lisa intends to use the Hide command on a column in her spreadsheet. How are the cells in this column affected by this command?
A) The data in all of the cells is deleted.
B) The data in only some of the cells is deleted.
C) The cells can no longer be referenced in functions or formulas.
D) The cells can still be referenced in functions or formulas.

Answers

Answer:

D

Explanation:

Answer:

D Because it's all about the functions

computer cannot do anything without instructions true or false

Answers

Answer: True

Explanation:A computer (specifically the CPU, or central processing unit, within the computer system) needs instructions in order to do even the simplest things. Without instructions, it can't do anything. Just to boot your computer requires executing many many instructions.

Hope it helps✌✌

Assume that a dictionary called zip_dictionary has already been created and filled that maps a zip code (an integer) to the corresponding location (a string). write code that assigns the location for zip code 90028 to the variable location.

Answers

To assign the location for zip code 90028 to the variable `location` using the given `zip_dictionary`, you can use the following code:
location = zip_dictionary[90028]


This code retrieves the value associated with the key `90028` from the `zip_dictionary` and assigns it to the variable `location`. This code makes use of the .get() method in Python dictionaries. The .get() method takes a key (in this case, the integer 90028 representing the zip code) and returns the corresponding value (in this case, the string representing the location) from the dictionary. If the key is not found in the dictionary, the .get() method returns None by default. So in this case, location will be assigned the string corresponding to the zip code 90028 if it exists in the zip_dictionary, or None if it doesn't.

To learn more about key; https://brainly.com/question/24906199

#SPJ11

The average value in a data set is referred to as the mode, mean or median

Answers

Answer:

Mean

Explanation:

Answer:

the mean

Explanation:

median is the middle and mode is most frequent

Other Questions
This plane, also known as the midline, divides the body into equal left and right halves NEED HELP NOW! SOLVE THE INEQUALITY: -r/3 6The r/3 is not division.. its a fraction. thxAlso.. once one person has answered... please don't answer more... i don't want ore than 10 points taken away. thank you so much What was happening in England during the late 1680's? There are two squares, one with sides 3 feet long, and one with sides 6 feet long. How much bigger are the perimeter and area of the larger square? How are the factors related? When a negotiator adopts a win-lose orientation in which one party necessarily loses when the other party gains, they are using the ________ approach... 32g of sodium reacts with 4.0mols of hydrogen chloride. What volume of hydrogen gas forms? How did Athenians live a more varied lifestyle than Spartans freya thinks of a numbershe multiplies the number by 2 and then subtracts 10the result is 50what number did freya think of? X0123P(x).02.65.26.07Find the probability that a family owns:Exactly 2 refrigerators is: ___P(3) = ____P( < 1) = ____P( 2) = ____P (>2) = ____ Two vertical angles have a sum of their measures that is 60 degrees.What is the measure of each angle? Select the answer corresponding to the correctly written sentence. (3 points)Group of answer choicesA) Jim's math class ran from 8 a.m. to 10 a.m.B) Jim's math class ran from 8-10 a.m.C) Jim's math class ran from eight to ten a.m.(none of the above) 3 Based on the claims in the article, the author points out,"Indigenous Mexicans rarely appear in media" becauseO A. media portrayals is an important indicator of agroup's status in a society.O B. indigenous Mexicans do not care aboutmainstream Mexican media.O C. the media reflects the audience.O D. indigenous Mexicans are important to Mexicanculture in general. brice is going to purchase a hi-def, flat-screen tv. he has decided on everything except the screen size. the unit with the 42-inch screen costs $600 while the unit with the 47-inch screen costs $750. in making this decision, which concept should brice use? is cultural ethics is neither true nor false Which of the following is an example of a denomination in the United States?a. an Amish churchb. the Episcopalian religionc. a storefront church in an inner-city communityd. Jehovah's Witnesses [1] I am interested in history. [2] I decided to read the Declaration of Independence.Which of the following options shows the best revisions of sentences 1 and 2 to create sentence variety withoutcombining the sentences?o I decided to read the Declaration of Independence. I am quite interested in history.I am interested in the Declaration of Independence. I decided to study history,History interests me. I decided to read the Declaration of Independence.History interests me. The Declaration of Independence is something I decided to read. Read the passage below from The First Men in the Moon.To the north-east some isolated watering-place was visible, a row of gaunt lodging-houses, the tallest things that I could see on earth, dull dabs against the brightening sky. What strange men can have reared these vertical piles in such an amplitude of space I do not know. There they are, like pieces of Brighton lost in the waste.Which words from this description of the setting help the reader infer the overall mood of Mr. Bedfords return?north-east, vertical, rowbrightening, sky, tallestgaunt, dull, wastestrange, lost, I do not know In biological macromolecules like proteins, the hydrophobic residues tend to clump together in the interior of the folded structure. What is the best explanation for why this occurs Enter the equation of the line in slope-intercept form.The line parallel to y =74x + 4 that passes through (8, 0).The equation of the line that passes through (8, 0) is y = . Look at the image and choose the best answer to the following question.Qu'est-ce qu'il falt?A. Il met le code postal sur l'enveloppe.B. Il pse une enveloppe.C. Il met la lettre dans l'enveloppe.D. Il met l'adresse sur l'enveloppe.