Ethernet network that connects a single client PC to a single server and label the locations of switches and transmission links. Provide a rationale for each part of your design, explaining the problem, approach, and why you made the choices you made.

Answers

Answer 1

In the network constructed, we need to use 3 switches to  be able to connect a single client PC to the single server. Therefore:

Connect server to switch 1        (225 m)Connect switch 1 to switch 2     (225 m)Connect switch 2 to switch 3    (225 m)Connect switch 3 to client PC   (225 m)

What is the network about?

The maximum distance for ethernet connection is known to be about 100 meters and it is one that is often used in the transmission speeds.

Note that when one has added to the network switches, the distance need to be increased to about 200 meters and thus about 900 meters of distance need to exist between the client PC and the server.

The Ethernet network need to be designed as:

Connect server to switch 1        (225 m)

Connect switch 1 to switch 2     (225 m)

Connect switch 2 to switch 3    (225 m)

Connect switch 3 to client PC   (225 m)

Note that Total distance covered = 225 + 225 + 225 + 225

                                                       = 900 meters

Therefore, In the network constructed, we need to use 3 switches to  be able to connect a single client PC to the single server.

Learn more about Ethernet from

https://brainly.com/question/16947988

#SPJ1

Ethernet Network That Connects A Single Client PC To A Single Server And Label The Locations Of Switches

Related Questions

1.1 Define what is a Big data and what is loT in detail? ​

Answers

The definition of big data is data that includes greater variety, coming in increasing volumes and with more velocity. This is also known as the three Vs. Put simply, big data is larger, more complex data sets, particularly from new data sources.

What is Lot and big data?

IoT and Big Data are two independent technologies that are indivisible from each other, to enable well-known technical advances. While the IoT would mostly collect data from physical objects through various sensors, Big Data would allow faster and more efficient warehouse and processing of this data.

What is big data?

The definition of big data is data that includes greater variety, arriving in increasing importance and with more velocity. This is also understood as the three Vs. Put simply, big data is larger, more complex data sets, particularly from new data sources.

To learn more about Big Data, refer

https://brainly.com/question/19049345

#SPJ9

Why multiprocessing operating system is more suitable for modern life?

Answers

Answer:

multiple processors and they are connected with the physical memory computer buses clocks and periprial devices the main objective of using a multiprocessor operating system is to increase the exclusion speed of the system and consume high computing power

Line formatting can be accomplished by using

Answers

Answer:

How can line formatting be accomplished?

To format line spacing:

Select the text you want to format. Selecting text to format.

On the Home tab, click the Line and Paragraph Spacing command. A drop-down menu will appear.

Move the mouse over the various options. A live preview of the line spacing will appear in the document. Select the line spacing you want to use.

The line spacing will change in the document.

Which term describes a Cloud provider allowing more than one company to share or rent the same server?

Answers

The term which describes a cloud provider allowing more than one company to share or rent the same server is known as Multitenancy

The term that describes a cloud provider allowing more than one company to share or rent the same server is known as Multitenancy.

What is a cloud?

A third-party business offering a cloud-based platform, infrastructure, application, or storage services is known as a cloud service provider.

Companies often only pay for the cloud services they use, as business demands dictate, similar to how a homeowner would pay for a utility like electricity or gas.

Data for each renter is separated and inaccessible to other tenants. Users have their own space in a multi-tenant cloud system to store their projects and data. Multi-tenant cloud system helps in the clouding of private and public sectors.

Thus, Multitenancy is the term used to describe a cloud service that permits many businesses to share or rent the same server.

To learn more about cloud, refer to the link:

https://brainly.com/question/27960113

#SPJ2

Write the Python code that will create a list with 50 elements. Populate (fill) the list using a
loop that will get an integer value from the user for each element in the list.

Answers

Answer:

"

integers = []

for _ in range(50):
   userInput = int(input("Input an integer: "))

   integers.append(userInput)

"

Explanation:

So there is a very useful object or class in python that is called range, and this is primarily used to traverse certain values using a for loop. The syntax is defined as:

"range(start, stop, increment)"

where start is included, stop is excluded, and increment is how much the value increases after each iteration, although it is an optional value, just like stop"

So if you simply do:

"range(a)"

the start value will default to 0

the end value will be equal to "a"

the increment will default to 1

If you provide the following values:

"range(a, b)"

start will be equal to "a"

end value will be equal to "b"

increment will default to 1

If you provide all three values as such:

range(a, b, c)

start, end, and increment will be assigned to the variable values in their respective order.

You don't need to know all these 3 cases for this example, but it's best ton know in case you need to do something similar but slightly different in the future.

So, since we want to fill a list with 50 elements, and we want user input, we can loop a code 50 times and ask them to input an integer value and then append it to the list.

To run a piece of code 50 times, we can simply do:

"

for _ in range(50)

"

the "_" variable will be assigned to numeric values from 0-49 (50 is excluded), so it will run 50 times. I named it "_", because we really don't need these numeric values, we just need the for loop so we can have the code run 50 times.

So the next thing to do is initialize an empty list which we will append values to. This can simply be done by writing:

"

integers = []

"

and the variable name can really be anything (besides keywords), but I think it's the most appropriate given the context

So in the for loop, we want to ask for input using the input function, which asks the user for input, and then returns the input they input. Using this, we want to convert it to an integer using int (this is technically not a function, it's a class, you may learn about this more later if you haven't but it's not necessary to know for now), which converts strings to integers.

So using this we get the following code:

"

integers = []

for _ in range(50):
   userInput = int(input("Input an integer: "))

   integers.append(userInput)

"

the variable isn't necessary and you could just directly do

"

integers.append(int(input("Input an integer: ")))

"

but it's really for somewhat better readability, but both are equally valid, since the second statement isn't really to complicated.

One thing to note, is if the user inputs a non-integer string, the code will raise an error.

   

I need this problem solved in C++ progamming

Answers

Using the knowledge in computational language in C++ it is possible to write a code that prompt user for a file name and read the data containing information for a course, store and process the data

Writting in C++ code:

#include<iostream>

#include<cstring>

#include<fstream>

using namespace std;

struct Student{

string lastName,firstName;

char subject;

int marks1,marks2,marks3;

};

char calcGrade(double avg){

char grade;

if(avg>=90.0&&avg<=100.0)

grade='A';

else if(avg>=80&&avg<=89.99)

grade='B';

else if(avg>=70&&avg<=79.99)

grade='C';

else if(avg>=60&&avg<=69.99)

grade='D';

else

grade='E';

return grade;

}

int main(){

char inFilename[20],outFilename[20];

int noOfRec,i,sum,count;

double avg,classAvg;

char grade;

cout<<"Please enter the name of the input file: ";

cin>>inFilename;

cout<<"Please enter the name of the output file: ";

cin>>outFilename;

ifstream ifile;

ifile.open(inFilename);

ofstream ofile;

ofile.open(outFilename);

if(!ifile){

cout<<inFilename<<" cannot be opened";

return -1;

}else{

ifile>>noOfRec;

struct Student s[noOfRec];

for(i=0;i<noOfRec;i++){

ifile>>s[i].lastName,s[i].firstName,s[i].subject,s[i].marks1,s[i].marks2,s[i].marks3;

}

if(!ofile){

cout<<outFilename<<" cannot be opened";

}else{

ofile<<"Student Grade Summary\n";

ofile<<"---------------------\n";

ofile<<"ENGLISH CLASS\n";

ofile<<"Student name\tTest Avg\n";

sum=0;

count=0;

classAvg=0.0;

for(i=0;i<noOfRec;i++){

if(s[i].subject=='E'){

avg=(s[i].marks1+s[i].marks2+s[i].marks3)/3;

grade=calcGrade(avg);

ofile<<s[i].firstName<<" "<<s[i].lastName<<"\t"<<avg<<"\t"<<grade<<"\n";

sum+=avg;

count+=1;

}

}

classAvg=sum/count;

ofile<<"\n\t\tClass Average\t\t"<<classAvg<<"\n";

ofile<<"---------------------\n\n";

ofile<<"HISTORY CLASS\n";

ofile<<"Student name\tTest Avg\n";

sum=0;

count=0;

classAvg=0.0;

for(i=0;i<noOfRec;i++){

if(s[i].subject=='H'){

avg=(s[i].marks1+s[i].marks2+s[i].marks3)/3;

grade=calcGrade(avg);

ofile<<s[i].firstName<<" "<<s[i].lastName<<"\t"<<avg<<"\t"<<grade<<"\n";

sum+=avg;

count+=1;

}

}

classAvg=sum/count;

ofile<<"\n\t\tClass Average\t\t"<<classAvg<<"\n";

ofile<<"---------------------\n\n";

ofile<<"MATH CLASS\n";

ofile<<"Student name\tTest Avg\n";

sum=0;

count=0;

classAvg=0.0;

for(i=0;i<noOfRec;i++){

if(s[i].subject=='M'){

avg=(s[i].marks1+s[i].marks2+s[i].marks3)/3;

grade=calcGrade(avg);

ofile<<s[i].firstName<<" "<<s[i].lastName<<"\t"<<avg<<"\t"<<grade<<"\n";

sum+=avg;

count+=1;

}

}

classAvg=sum/count;

ofile<<"\n\t\tClass Average\t\t"<<classAvg<<"\n";

ofile<<"---------------------\n\n";

ifile.close();

ofile.close();

}

}

See more about C++ code at brainly.com/question/19705654

#SPJ1

You get in your car after work and turn
on the radio. What type of communication does the
radio use?

Answers

Answer:

Radio Waves

Explanation:

Pretty self-explanatory.

Radio is a technology that uses radio waves for signaling and communication. Between 30 hertz (Hz) and 300 gigahertz, radio waves are electromagnetic waves (GHz).

What is the process of radio communication?

Electromagnetic waves are sent and received by radio equipment to operate. An extremely fast-moving electrical current is what makes up the radio signal. This field is broadcast by a transmitter using an antenna; a receiver picks up the field and converts it to the audio heard on the radio.

Radio technology is the transmission and reception of communication signals made of electromagnetic waves that bounce off the ionosphere or a communications satellite or pass through the air in a straight line.

Modern technology uses radio waves for a wide range of purposes, including broadcasting, radar and radio navigation systems, fixed and mobile radio communication, wireless computer networks, and communication satellites.

Learn more about Radio waves here:

https://brainly.com/question/21995826

#SPJ2

______ uses the internet to shift activities from the user's computer to computers on the internet.

Answers

Answer:

internet

Explanation:

this is called networking

John is directing a television series. He has to shoot a scene that presents the lead character in a dominating and commanding position. What shooting technique should he use?
A.
low angle
B.
high angle
C.
Dutch tilt
D.
front angle

Answers

answer is high angle so it hits better lighting

What would be an ideal scenario for using edge computing solutions?

Answers

An ideal scenario for using edge computing solutions is when there is a  bad network connection  with IoT devices .

What is Edge computing ?

Edge computing can be regarded as the process that involves the  analyes as well as the, and storage of data closer to where it is generated .

This is been done to  enable rapid analysis and response in the process that is been used by some companies  to have consolidated operations , hence, An ideal scenario for using edge computing solutions is when there is a  bad network connection  with IoT devices .

Learn more about edge computing solutions on:

https://brainly.com/question/23858023

#SPJ1

What is a use case of factorization in quantum computing?

Answers

Answer:

Shor's algorithm is a quantum computer algorithm for finding the prime factors of an integer. It was developed in 1994 by the American mathematician Peter Shor. . The efficiency of Shor's algorithm is due to the efficiency of the quantum Fourier transform, and modular exponentiation by repeated squaring.

The main components of a computer ar a hardware and software b) disc and monitor c) system and unit d) communication devices. ​

Answers

Option A is the main component

TensorFlow and Pytorch are examples of which type of machine learning platform?

Answers

TensorFlow and Pytorch are examples of Supervised Machine Learning (ML), in addition, both support Artificial Neural Network (ANN) models.

What is a Supervised Machine Learning?

Machine learning (ML) is a subcategory of artificial intelligence that refers to the process by which computers develop pattern recognition or the ability to continually learn or make predictions based on data, and then make adjustments without being specifically programmed to do so.

In the supervised machine learning, the computer is given a labeled dataset that allows it to learn how a human does a task. This is the least complex model as it attempts to replicate human learning.

see more about computing at: brainly.com/question/2175764

#SPJ1

Which statement about broadcasting a slideshow online is true?

All transitions are properly displayed to the audience when broadcasting online.
Broadcasting a slideshow online is not an option for most PowerPoint users.
Third-party desktop sharing software must be used to broadcast online.
PowerPoint has a free, built-in service for broadcasting online.

Answers

The statement about broadcasting a slideshow online that is true is D. PowerPoint has a free, built-in service for broadcasting online.

What is a Slideshow?

This refers to the presentation feature in a presentation-based system or software that makes use of images, and diagrams moving sequentially in a pre-timed manner.

Hence, we can see that based on the broadcast of slideshows online, one can see that the true statement from the list of options is option D which states that PowerPoint has a free, built-in service for broadcasting online.

Read more about slideshows here:

https://brainly.com/question/23427121

#SPJ1

1,2,3,4,5,6,7,8,9,10 – Best case - Sorted in ascending order
10,9,8,7,6,5,4,3,2,1 – Worst case - Sorted in reverse order
1,3,2,5,4,7,9 ,6,8,10 – Avg case – numbers are in random order

For the given numbers, please use the following algorithms (bubble sort, insertion sort & selection
sort) to sort in ascending order. Please also find out number of comparisons and data movements
for each algorithm. Based on comparisons and data movements please rate algorithm for each input
case.

Answers

Using the knowledge in computational language in python it is possible to write a code that from a random number draw creates an order of increasing numbers

Writting the code in python:

def shellSort(array, n):

   # Rearrange elements at each n/2, n/4, n/8, ... intervals

   interval = n // 2

   while interval > 0:

       for i in range(interval, n):

           temp = array[i]

           j = i

           while j >= interval and array[j - interval] > temp:

               array[j] = array[j - interval]

               j -= interval

           array[j] = temp

       interval //= 2

data = [10,9,8,7,6,5,4,3,2,1]

size = len(data)

shellSort(data, size)

print('Sorted Array in Ascending Order:')

print(data)

See more about python at brainly.com/question/18502436

#SPJ1

What are the two most desired characteristics of a cellular network?

Answers

A cellular communication system consists of four major components—namely, a public switched telephone network (PSTN), a mobile telephone switching office (MTSO), cell sites with antenna systems, and mobile subscriber units (MSU).

There are four main parts that make up a cellular communication system: mobile subscriber units (MSUs), public switched telephone network (PSTN), and mobile telephone switching office (MTSO) (MSU).

What desired characteristics of a cellular network?

No direct mobile to mobile communication exists; all communication takes place between a mobile and a base station. Within each base station's cell, which is a specific geographical area, there is a dedicated set of radio channels or frequencies.

These networks are becoming used for purposes other than entertainment and phone calls as cellular devices become more and more common.

Cellular networks are high-speed, high-capacity voice and data communication networks that can handle cellular devices and have increased multimedia and seamless roaming capabilities.

Therefore, The ability of a cellular network to reuse frequencies to boost capacity and coverage is its major feature.

Learn more about cellular network here:

https://brainly.com/question/27960045

#SPJ2

Several users on the second floor of your company's building are reporting that the network is down. You go to the second floor to investigate and find that you are able to access the network. What troubleshooting step should you take next?

Answers

The troubleshooting step that you should take next is to Question User.

What is Troubleshooting?

This refers to the diagnostics that is run on a computer program or system in order to find the problem that is causing it to malfunction or misbehave.

Hence, we can see that based on the fact that several users on the second floor of your company's building are reporting that the network is down and go to the second floor to investigate and find that you are able to access the network, the troubleshooting step that you should take next is to Question User.

Read more about troubleshooting here:

https://brainly.com/question/13818690

#SPJ1

What are authorization rules?

Answers

An authorization rule specifies the policy that applies to an object and that is based on various conditions, such as context and environment. Each authorization rule has a unique name and can be applied to multiple objects in a domain.

How the (i)?? Help me to slove this

Answers

Answer:

#include <fstream>

 ifstream inFile("bookBorrower.txt");

 ofstream outFiles ("overPayment.txt");

Explanation:

fstream has ifstream and ofstream for input and output, respectively.

13. Document the purpose of the
Managed pipeline mode settings.

Answers

The purpose of the Managed pipeline mode settings is to enable backward compatibility.

What is a Managed Pipeline?

This refers to the process that is in use in most CMS systems to process and direct sales that would be made at a later date.

Hence, we can see that when using a managed pipeline, the mode settings have the function to enable backward compatibility and the queue length can be set by using the "Queue Length" option

Read more about backward compatibility here:

https://brainly.com/question/13684627

#SPJ1

Convert the following number of decimal to hexadecimal (10110)

Answers

Answer:277E

Explanation:

The graphic representation below will clarify how it unfolded.

What would be the most professional choice of words for your response:

A. THIS WASN’T FOR ME.

B. Please stop spamming me with these messages for my coworker.
C. I wanted to help you protect my coworker’s privacy by letting you know I received this message intended for her.


the answer is C. ur welcome

Answers

The professional choice of words for response is I wanted to help you protect my coworker’s privacy by letting you know I received this message intended for her.

Check more about writing below.

What is “Word Choice” in Writing?

'Word Choice” in writing is known to be a term that connote the ways or the usage of words that is said to be effective and precise use of language.

This is one that often conveys information and it also tends to enlighten the reader.

Note that option C is correct because it is best and most professional way to respond to a statement.

Hence, The professional choice of words for response is I wanted to help you protect my coworker’s privacy by letting you know I received this message intended for her.

Learn more about word choices from

https://brainly.com/question/1619714

#SPJ1

Write a program to demonstrate circular linked list with operations using pointers – insert
(beginning, end, middle), delete (beginning, end, middle),view)

Answers

A program to demonstrate circular linked list with operations using pointers is:

struct Node *addToEmpty(struct Node *last, int data)

{

   // This function is only for empty list

   if (last != NULL)

     return last;

 

   // Creating a node dynamically.

   struct Node *temp =

         (struct Node*)malloc(sizeof(struct Node));

 

   // Assigning the data.

   temp -> data = data;

   last = temp;

   // Note : list was empty. We link single node

   // to itself.

   temp -> next = last;

 

   return last;

}

What is a Circular Linked List?

This refers to the type of linked list in which the first and the last nodes are also joined together other to form a circle

Read more about circular linked list here:

https://brainly.com/question/12974434

#SPJ1

A help desk technician determines that a user's issue is caused by a corrupt file on their computer. Which is the FASTEST way to transfer a good file to the computer?

Answers

The FASTEST way to transfer a good file to the computer is to  use the C$ administrative share to copy the file.

What is C$ administrative share?

The c$ share is known to be a kind of an administrative share that is often known to be the cluster or SVM administrator  that a person can be able to can use to be able to go through and manage the SVM root volume.

Note that The characteristics of the c$ share are the path for this kind of admin. share is known to be always the path to the SVM root volume and it is one that a person cannot modify.

Hence, based on the above, the The FASTEST way to transfer a good file to the computer is to  use the C$ administrative share to copy the file.

Learn more about file share from

https://brainly.com/question/15267859

#SPJ1

If you had to tell that employee why it was not a good idea to send that e-mail, which of the following would you mention? (select all that apply)
The language was not professional.
The e-mail was not work-related.
The e-mail did not include an appropriate greeting.
The e-mail shows that the employee has been surfing the Internet instead of working.

the answers are A,B, and D. thats the only way I can give the answers on brainly.

Answers

The options that need to be mentioned are:

The language was not professional.The e-mail was not work-related.The e-mail shows that the employee has been surfing the Internet instead of working.

Check more about email below.

What is non work email?

In Email Management Guidelines, the term non-work related emails are known to be “those that are not related to either private or government business.

Note that if one is sent this email during working hours, one is obligated to live it and not open it.

Hence, The options that need to be mentioned are:

The language was not professional.The e-mail was not work-related.The e-mail shows that the employee has been surfing the Internet instead of working.

Learn more about email from

https://brainly.com/question/24688558

#SPJ1

In python please.
You are in process of writing a class definition for the class Book. It has three data attributes:
book_title, book_author, and book_publisher. The data attributes should be private.
In Python, write an initializer method that will be part of your class definition. The attributes
will be initialized with parameters that are passed to the method from the main program.
Note: You do not need to write the entire class definition, only the initializer method

Answers

Answer:

class Book:
   def __init__(self, book_title, book_author, book_publisher):

       self.__book_title = book_title

       self.__book_author = book_author

       self.__book_publisher = book_publisher

Explanation:

Python kind of haves private data attributes, although technically they don't.

Take for example the following code:

"

class A:

   def __init__(self):

       self.__privateAttribute = 0

x = A()

print(x.__privateAttribute)

"

all this really does is rename the variable name, and if you run the following code:

print(dir(x))

it will print the attributes of "x" which include "_A__privateAttribute" which is the attribute that was initialized.

Anyways getting that out of the way, you need to now about the __init__ method, which runs each time you initialize a new instance of the class. It's a way of setting up some necessary values that will be used in the objects methods (the functions inside the class)

So, because we simply cannot know what the book_title, book_author, and book_publisher are (since they vary book to book...), we take them as arguments using the __init__ method, and then initialize their values in their.

"

class Book:
   def __init__(self, book_title, book_author, book_publisher):

       self.__book_title = book_title

       self.__book_author = book_author

       self.__book_publisher = book_publisher

"

I just realized I completely forgot to even mention what the "self" variable stands for. Whenever you initialize a variable, or call a method from an instance of the class, the first argument passed will be the instance of the class. Take for example the following class

"

class A:

   def __init__(self, b):
       self.b = b

   def printB(self):
       print(self.b)

def printB(self):

   print(self.b)

c = A(3)

d = A(4)

c.printB()

printB(c)

d.printB()

printB(d)

"

The two lines

c.printB() and printB(c) are the same exact thing, the only difference is when you call c.printB(), you automatically pass the "c" as the first argument, and the same thing for d.printD(), it's implicitly passed whenever you call a method from an instance of the class.

The SQL SELECT built-in function COUNT ____.

Answers

The SQL SELECT built-in function COUNT none of the above options.

What is a SELECT query?

A select query is known to be a kind of a database object that depicts the information that is shown in Datasheet view.

Note that A query does not save data, it shows data that is saved in tables.  The SELECT statement is known to be one that is often used to select data from what we call a database.

Hence, The data returned is said to be saved in a result table, known to be the result-set.

Based on the above, the SQL SELECT built-in function COUNT none of the above options.

Learn more about  SQL SELECT from

https://brainly.com/question/10097523

#SPJ1

Jessica is training to be a cinematographer. It is her first experience shooting a scene. Where do you think she should focus the camera?
A.
focus on the subject’s expressions
B.
focus on the subject’s face
C.
focus on the subject’s eyes
D.
focus on the subject’s body language

Answers

It should be all of the above

What three files do you need to perform a mail merge in a word document

Answers

The three files do you need to perform a mail merge in a word document are:

the main documentthe data source the merged document

What are the files needed for mail merge?

They includes:

The Document types.The Letters that is made up of a personalized greeting. The Email of which each recipient's address is the key address on the to line, etc.

Hence, The three files do you need to perform a mail merge in a word document are:

the main documentthe data source the merged document

Learn more about mail merge from

https://brainly.com/question/17731136

#SPJ1

Enterprise software is designed for organizations to __________.

Answers

Answer:

The goal of enterprise software is to enable the activities of large organizations, supporting a wide range of different user roles.

Other Questions
The formula for __________________________ is x = t e or raw score (x) equals the true score (t) plus error (e). When appraising a 2-4 unit residential property, an appraiser would measure and use _______________ area. A child complains that she is unable to flex her hip or straighten her knee after she had an appendectomy. Which nerve may have been anesthetized during the surgery? Estelle enters into a contract to buy 132 acres from Desmond to subdivide and sell in quarter-acre lots for Country Acres, a residential development. If Desmond breaches the contract, Estelle's remedy would most likely be This organization is developing an international code of conduct for professional accountant:__________ In the word search below are the names of several pieces of lab equipment. As you find each piece of equipment, record its name on the list. There are only 13 words out of the listBunsen burner,Pipestem triangle, Evaporating dish, Beaker, Utility clamp,Iron ring, Mortar and pestle, Crucible and cover, Gas bottle, Saftey goggles,Corks, Watch glass, Erlenmeyer flask, Wire gauze, Pipet, Buret,Triple beam balance, Test tube rack, Funnel, Scoopula,Well plate, Wire brush,File,Wash bottle, Graduated cylinder,Thanks Sodium hydroxide and water will react at room temperature. what does this indicate about its activation energy? How does xm satellite deter nonsubscribers from listening to its transmissions? Does this make the radio programing a private good or public good? Explain why. What do the psychoanalytic and behavioral/social learning approaches to personality have in common? A student is completing a research-based informative essay on the history of presidential campaigns. Which stepstake place in the prewriting stage? Select three options.O The student cites an article about how the first political campaigns were funded0 The student analyzes the writing prompt to establish a purpose for writing.D The student edits the writing and uses MLA formatting to properly cite evidence.O The student creates an outline with topics, reasons, and supporting evidence.O The student synthesizes information from articles about Abraham Lincoln's campaign.Mark this and returnSave and ExitNext Confucius's ideal society would live according to the ideals of the select one: a. five great relationships. b. four noble truths. c. seven sacraments. d. five k's. In the power function f(x) = -2x, what is the end behavior of f(x) =-2x^3 as x goes to [infinity]? Security __________ are the areas of trust within which users can freely communicate. a. rectangles b. domains c. perimeters d. layers Use the maps below to answer the following question. Image of two maps side by side. The map on the left shows a map of North America showing different cultural regions. In the south there is Mesoamerica. Above Mesoamerica is the Southwest. Along the Pacific Coast is the Pacific Northwest. Beside the Pacific Northwest and in the center of what is now the United States there is the Great Plains, Great Basin, and Plateau. On the eastern side of the continent is the Eastern Woodlands. In the North, there is the Subarctic and the Arctic. The map on the right shows a map with legend and text: Rocky Mountains, Great Plains, Great Lakes, Appalachian Mountains, Mississippi River, Mountains, Grass & Pacific Ocean, Atlantic Ocean, and Gulf of Mexico.Based on these two maps, the Appalachian Mountains are located in which of the following Native American cultural regions? Plains Northeast Northwest Great Basin The functions f(x) = (x 1)2 5 and g(x) = (x 2)2 3 have been rewritten using the completing-the-square method. apply your knowledge of functions in vertex form to determine if the vertex for each function is a minimum or a maximum and explain your reasoning. In the short-run which form of inflation is caused by a decrease in the supply curve or an increase in wages? Im really confused on this problem., pls help me! PLEASE NEED ASAP!!!!Read the passage below from Marigolds and answer question.Miss Lotties house was the most ramshackle of all our ramshackle homes. The sun and rain had long since faded its rickety frame siding from white to a sullen gray. The boards themselves seemed to remain upright not from being nailed together but rather from leaning together, like a house that a child might have constructed from cards. A brisk wind might have blown it down, and the fact that it was still standing implied a kind of enchantment that was stronger than the elements. There it stood and as far as I know is standing yeta gray, rotting thing with no porch, no shutters, no steps, set on a cramped lot with no grass, not even any weedsa monument to decay.This description of Miss Lotties home is an example of which type of setting?timeweatherplacesocial condition b) The diameter of a circular coin is 1.14 cm. How many coins of the same size are required to place in a straight row to cover 2.85 m length (without leaving any gap between each coin) If mark has 88 apples 31 bananas 41 oranges what percent of marks fruit is yellow