in a network that requires high availability administrators often configure switches in a redundant topology ensuring that if one path to a destination is broken, another path can be used. there are two problems that must solved in this scenario. what are they?

Answers

Answer 1

Messages are broken up into packets and sent individually over the network to their destination when using packet switching.

The packets could follow several routes to their destination, so they could show up at the switch at any time. To determine the quickest route between two networks, the Routing Information Protocol (RIP) uses "hop count," which refers to the number of routers a packet must pass through. Algorithms are employed in dynamic routing to compute numerous potential routes and identify the optimum path for traffic to follow through the network. It employs link state protocols and distance vector protocols, two classes of sophisticated algorithms. Circuit switching is one of three frequently used switching methods. Switching of packets. Switching messages.

Learn more about network here-

https://brainly.com/question/13174503

#SPJ4


Related Questions

chad has written the majority of his code in scratch and is ready to start thinking of test cases to make sure that his program functions properly, and when issues arise, fix them. chad is also going to show his program to his classmate and ask for any feedback or changes he could add to make his program better. this process is known as what?

Answers

The process is known as Iterative Development Process.

What is the meaning of Iterative process?

A project, product, or initiative is built, improved, and refined through the iterative process. The iterative development method calls for teams to produce, test, and rewrite until they are happy with the final product. An iterative approach can be compared to a trial-and-error methodology that advances your project toward its eventual goal.

Iterative processes are a key component of agile project management and lean techniques, although they may be used by any team, not only those that use agile approaches. You will make adjustments to your design, product, or project over the course of the iterative process until you and your team are happy with the project's final deliverable.

To learn more about iterative process, use the link given
https://brainly.com/question/26995556
#SPJ1

Every hour during the workday, your employee checks a constantly-updated spreadsheet that tracks how many items are sold; each hour of the workday, the total number of items for a column are entered as a negative number. At the end of each workday, the employee calculates the total remaining by adding the starting total stock (in row B) and the 12 rows representing sales—this is entered into a separate spreadsheet, the new total goes into row B, and the remaining data is cleared.

You want to set up a spreadsheet that, during that hourly check, lets the employee quickly look at a single cell for each of the five columns representing items you sell and see whether your remaining stock, after your deliveries for the sales that day, would be below 50 units, so you know whether to order more.

Answers

Worksheet: A worksheet is a grid of rows and columns into which data is entered. In many spreadsheet programs (including Microsoft Excel), a single file called a “workbook” can house many worksheets.

What cell for each of the five columns representing items?

Using information from a specified column in the same row, this method looks for a value in the left-most column and compares it to information there. A sorted or unsorted table's data can be found using VLOOKUP.

Therefore, When data is listed in columns, the VLOOKUP or Vertical Lookup function is utilized.

Learn more about columns here:

https://brainly.com/question/8648913

#SPJ1

the administrator at ursa major solar has created a custom report type and built a report for sales operation team. however, none of the user are able to access the report. which two options could cause this issue?

Answers

Since none of the user are able to access the report, the two options that could cause this issue include the following:

The custom report type is in development.The user’s profile is missing view access.

What is a DBMS software?

DBMS software is an abbreviation for database management system software and it can be defined as a software application that is designed and developed to enable computer users to create, store, modify, retrieve and manage data (information) or reports in a database.

In this scenario, we can reasonably infer and logically deduce that the most likely reason the end users (customers) were not able to access the report is because their profile is missing view access or the custom report type is still in development.

Read more on database here: brainly.com/question/13179611

#SPJ1

Complete Question:

The administrator at Ursa Major Solar has created a custom report type and built a report for sales operation team. However, none of the user are able to access the report.

Which two options could cause this issue? Choose 2 Answers

The custom report type is in development.

The user’s profile is missing view access.

The org has reached its limit of custom report types.

The report is saved in a private folder

by default, the count function uses the distinct keyword when counting the values contained in a column. (true or false?)

Answers

the count function uses the distinct keyword when counting the values contained in a column is False.

What is count function?

The COUNT function counts the number of arguments in the list as well as the number of cells that contain numbers. Get the number of entries in a number field that is part of a range or array of numbers by using the COUNT function.

If we want to keep track of the number of cells in a particular range, it is helpful as a financial analyst when analyzing data.

Formula:

=COUNT(value1, value2,...)

Where:

Value1 is the initial item, cell reference, or range for which we want to count numbers (mandatory argument).

Value2... (optional parameter) - We can specify up to 255 extra items, cell references, or ranges to count numbers in.

Keep in mind that this function will just count numbers and disregard all other input.

Learn more about count function click here:

https://brainly.com/question/2945487

#SPJ4

a software engineer is building a web application about popular music and wants to display aggregated data about recent hits. in order to retrieve that data, the engineer would likely use a(n) . api traditional application markup language graphical user interface

Answers

In order to retrieve the data about popular music, the engineer would most likely use an: API.

What is an API?

API is an abbreviation for application programming interface and it can be defined as a software application intermediary or computing interface that comprises tools, set of executable codes, and protocols that is designed and developed to help software applications and computers to function properly, as well enable the exchange and retrieval of data from a database.

In Computer technology, an application programming interface (API) allows a computer network device and a cloud-based server or two cloud-based servers to share data and functionality within the cloud.

In conclusion, we can logically deduce that this software engineer would most likely use an application programming interface (API).

Read more on API here: brainly.com/question/28090326

#SPJ1

what will you select on the transitions tab in the timing group to advance to the next slide upon clicking ?

Answers

The correct answer is to select on the transitions tab in the timming group to advance to the next slide upon clicking is on Mouse Click check box.

A check box, selection box, or tick box is a small interactive box that can be toggled by the user to indicate an affirmative or negative choice. It is frequently found in HTML input forms, dialog boxes, and in the GUIs of applications and operating systems.To advance the slide when you click the mouse, in the Timing group, select the On Mouse Click check box. To advance the slide after a specified time, in the Timing group, enter the number of seconds that you want in the After box.

to learn about Mouse Click check box click the link below:

brainly.com/question/15521504

#SPJ4

verses and choruses based on the same music are an example of which formal type? group of answer choices simple verse simple verse-chorus contrasting verse-chorus aaba

Answers

Simple verse-chorus compositions have choruses and verses that are based on the same musical material.

What is simple verses-chorus type?The verse and chorus of a straightforward verse-chorus song (like "All About That Bass") have the same harmonic progression. In a contrasting verse-chorus structure like "We Are the World," the verse and chorus chord progressions are different.While the melody and lyrics may change from section to section, the simple verse structure uses the same chord changes throughout the entire song. Even rap and contemporary pop music use the simple verse format, as do the blues and early rock and roll. Everything from "Johnny B. Goode" by Chuck BerryVerse-repeating form, chorus form, AAA song form, or one-part song form are other names for the song structure known as strophic form, in which all verses or stanzas of the text are performed to the same melody.

To learn more about simple verses-chorus refer to :

https://brainly.com/question/14430045

#SPJ4

Which file format produces smaller files by eliminating some information from the file?.

Answers

Answer:

JPEG

Explanation:

i dont have one but thats the answer:)

which windows server 2016 technology allows several network interfaces to work together in a group effort to provide load balancing and fault tolerance?

Answers

The windows server 2016 technology that allows several network interfaces to work together in a group effort to provide load balancing and fault tolerance is NIC Teaming.

In order to boost performance and reliability, NIC teaming is a technology that enables you to combine numerous physical network adapters into a single interface (also known as interface bonding). Through link aggregation (sending traffic over numerous network adapters) and fault tolerance, it offers these advantages (dynamic network reconfiguration of functional NICs if one or more links fail).

The Server Manager tool, which comes with Windows Server on Desktop Experience (GUI) installs, and is found in the application's Local Server area, is where NIC Teaming configuration is done.

You will then be presented with a screen that lists all of the available network adapters on the right and any configured Teams on the left after choosing the NIC Teaming option under the Local Server tab.

To know more about NIC Teaming click here:

https://brainly.com/question/14927034

#SPJ4

a technician notices that a program that is listed in the registry of a windows computer is not found on that computer. what is a possible solution to the problem?

Answers

If a program that is listed in the registry of a windows computer is not found on that computer then Reinstall the application.

What is computer application ?A computer software package known as an application, sometimes known as an application program or application software, performs a particular task either directly for the end user or, in some situations, for another application.Applications might consist of a single program or a collection of programs.A specific task-enabling software program is known as an app.Applications for mobile devices are frequently referred to as mobile apps, whilst those for desktop or laptop computers are occasionally referred to as desktop applications.When you launch an application, the operating system lets it run until you close it.

To learn more about applications.  refer,

https://brainly.com/question/24264599

#SPJ4

which statement describes a characteristic of the sas automatic variable error ? a. the error variable maintains a count of the number of data errors in a data step. b. the error variable is added to the program data vector and becomes part of the data set being created. c. the error variable can be used in expressions in the data step. d. the error variable contains the number of the observation that caused the data error.

Answers

Option c is correct. The statement that describes a characteristic of the SAS automatic variable error is the error variable can be used in expressions in the data step.

When a session is launched, SAS automatically creates automatic variables, which are system variables. Automatic macro variables and automatic DATA step variables are both created by SAS. The system-generated variables that are formed when the DATA step is executed have the names of automated variables reserved for them. It is advised against using names in your own apps that begin and conclude with an underscore.

The DATA step or DATA step statements can automatically create variables. However, they are not output to the data set that is being created; instead, they are added to the program's data vector. From one iteration of the DATA step to the next, the values of automatic variables are kept rather than being set to missing.

To know more about DATA click here:

https://brainly.com/question/18761322

#SPJ4

the punchdown tool without a cutoff blade is used . select one: a. for all utp terminations b. when a wire bridges two terminals c. only with 110 punchdown blocks d. when the wire is pre-stripped

Answers

Shielded and Unshielded cabling systems are the two main network cable technical types used in copper structured cabling systems at all levels.

Since the earliest cabling standards were established, both forms have existed. Germany, Austria, Switzerland, and France were early adopters of shielded cabling utilizing shielded cable, while the rest of the globe swiftly embraced U/UTP. Although both systems function flawlessly at 1 Gigabit Ethernet data speeds, shielded systems perform better because they can consistently sustain higher frequency transmission at greater data rates like 10G. The four twisted pairs of the S/FTP structure each have a layer of aluminum foil shielding to shield the transmission signal in addition to the braided foil shield.

Learn more about transmission here-

https://brainly.com/question/14725358

#SPJ4

which type of title search method only goes back as far as when the last title search was performed and assumes the last search was done accurately, legally, and that any issues were resolved?

Answers

Torrens system is the type of title search method that only goes back as far as when the last title search was performed and assumes the last search was done accurately, legally, and that any issues were resolved.

What is Torrens system?

Torrens title is a system for land registration and transfer that involves a state creating and maintaining a register of land holdings that serves as the conclusive proof of ownership for both the proprietor listed on the register and all other recorded interests.

Therefore, The Torrens System operates under the "title by registration" principle as opposed to "registration of title." Instead of purchasing land and later registering it, a buyer can only receive a title if it has already been registered. Each piece of land is given a specific number and title in the registry to identify it.

Learn more about Torrens system from

https://brainly.com/question/29359982
#SPJ1

On the uofa catcard, your personal signature is what type of authentication control?.

Answers

On the UofA CatCard, your personal signature is the "something you are" type of authentication control.

In digital terms, authentication controls are access controls for systems that check to see if a user's credentials match the credentials in a database of authorized users. By doing this, authentication controls assure secure access to systems. A personal signature is a type of authentication control that refers to a digital signature used to validate the authenticity of users, messages, or documents.

In the context of the given question, your personal signature on the UofA CatCard presents a "something you are" type of authentication control. This actullay represnts a biometric verification method that enables the "something you are" factor of authentication.

You can leanr more about authentication control at

https://brainly.com/question/28902426

#SPJ4

which of the following measures makes your wireless network invisible to the casual attacker performing war driving? answer use a form of authentication other than open authentication. disable ssid broadcast. implement wpa2 personal. change the default ssid.

Answers

Disabling the ssid broadcast makes your wireless network invisible to the casual attacker performing war driving.

Define war driving.

War driving is the practice of using a laptop or smartphone to look for Wi-Fi wireless networks while traveling. On the internet, there is free war driving software. The same strategy is used, but with alternative forms of mobility, in war biking, war cycling, warwalking, and similar activities.

The goal of war driving, often referred to as access point mapping, is to locate Wi-Fi networks that are easily exploitable and are hence susceptible. The practice of war driving is not new.

To learn more about war driving, use the link given
https://brainly.com/question/4360207
#SPJ1

when hackers gain access to a database containing your personal private information, this is an example of:

Answers

Answer: Breach, database breach.

Explanation:

you are working as a security admin in an enterprise. while you were analyzing different password attacks, you found that whenever an individual user's password gets cracked, another user with the same password residing in the same password digest file also has their account compromised. how should you prevent this from happening in the future?

Answers

To prevent from this different password attacks in the future You should add salt to the password before hashing.

Why is it called salt in hashing?

Prior to hashing a password, extra information is added to a string called a salt. It is comparable to adding table salt to meals in that it alters and enhances the cuisine, hence the name "salt."Random bits are added to each password instance before it is hashed to provide a cryptographic salt. Even when two users select the identical passwords, salts provide distinct passwords. By requiring attackers to recompute hash table attacks using the salts for each user, salts help us prevent hash table attacks.An attacker can use hash tables to steal passwords and compromise accounts if there is a system-wide salt. Instead, every password made for a user should be individually hashed and salted.

To learn more about salted passwords refer :

https://brainly.com/question/15081762

#SPJ4

suppose a turing machine uses a one-sided infinite tape, but each tape cell is a stack (like an infinite amount of infinite stacks). writing to a certain position on the tape pushed the character onto the respective stack, reading pops the top-most character off the respective stack. is such a machine less, equally or more powerful than a regular turing machine?

Answers

The Turing machine is more powerful since the stacks allow us to compress the number of memory cells needed, thus the Turing machine is faster when it wants to access certain fields.

What is a Turing machine?

A Turing machine is an abstract machine that manipulates symbols on a strip of tape in accordance with a set of rules. A Turing model is the mathematical model of computation. A head that reads the input tape is what it consists of the Turing machine's state and is kept in a state register.

The model is straightforward, but it can implement any computer algorithm. Turing machines are straightforward, abstract computation tools designed to assist in examining the scope and bounds of what can be computed.

To learn more about a Turing machine, use the link given
https://brainly.com/question/28026656
#SPJ1

3. what is the main purpose of certification? in the united states, what are the different types of certification? explain the different phases. what is cset? what is atos?

Answers

The goal of certification is to show that certain requirements have been satisfied. International standards are typically the foundation of the requirements.

System, product, and employee certification are the three key industries that are differentiated by certification. The goal of certification is to show that certain requirements have been satisfied. International standards are typically the foundation of the requirements. For instance, SFS-EN ISO 9001, a general quality management standard, is utilized as a prerequisite for the certification of quality management systems in organizations. No matter the size, nature, or scope of the organization, or the nature of the goods and services offered, it can be applied to all kinds of operations.

Atos, a company with 112,000 workers and around €11 billion in yearly revenue, is a world leader in digital transformation. The Group offers customized end-to-end solutions for all industries in 71 countries, making it the European leader in cybersecurity, cloud computing, and high performance computing.

The CSET exam series (California Subject Examinations for Teachers) was developed by the California Commission on Teacher Credentialing (CTC) for aspirant teachers who want to obtain a teaching license in the state. To make sure candidates have the abilities to instruct in a public school setting, an exam was created.

To know more about computing click here:

https://brainly.com/question/15707178

#SPJ4

les agrees to install a new hard drive and software on marilee's computer in exchange for four of her used textbooks. after he installs the hard drive, les says he won't install the software unless marilee gives him two more books. what legal position are the parties in now?

Answers

Marilee can sue for breach of contract, because Les had a preexisting duty to do all of the work.

What is hard drive ?

The physical device that houses all of your digital stuff is a hard disk. Digital stuff that is kept on a hard drive includes your papers, photos, music, videos, applications, application preferences, and operating system. There are internal and external hard drives.

What is software?

Software is a collection of instructions, data, or computer programs that are used to run machines and carry out particular activities. It is the antithesis of hardware, which refers to a computer's external components. A device's running programs, scripts, and applications are collectively referred to as "software" in this context.

What does running program means?

Double-click the executable file or the shortcut icon pointing to the executable file on Windows to start the program. If you find it difficult to double-click an icon, you can highlight it by clicking it once and then using the Enter key on the keyboard.

Learn more about hardware and software click here:

https://brainly.com/question/24231393

#SPJ4

a technician has successfully removed malware from a pc and finds that when the system is rebooted error messages are displayed about missing and corrupt system files. what utility can the technician use to replace or fix any corrupted system files?

Answers

The utility that the technician can use to replace or fix any corrupted system files is SFC.

SFC is used to examine and fix any corrupted system files to ensure their integrity. The executable utility might aid in registry data repair. A feature of contemporary Windows operating systems like Windows 10, Windows 8, Windows 7, and Vista is System File Checker.

If the SFC used by the technician identifies problems with the system settings, it restores the specific configuration by setting it back to default. Another factor is that most Windows problems are caused by corrupted system files. SFC automatically fixes other Windows-related errors that are anticipated to cause any inconvenience now or in the future, even if it doesn't find any damaged files. 

Learn more about corrupted system files here: https://brainly.com/question/28111651

#SPJ4

15) an object-oriented database structures the information into multidimensional data cubes. (1 point) true false

Answers

It is FALSE to state that an object-oriented database structures the information into multidimensional data cubes.

What are multidimensional data cubes?

A multidimensional data cube generally aids in the storage of vast volumes of data by utilizing a multidimensional array. It improves its efficiency by maintaining an index for each dimension. As a result, of is multi-dimensionality, it can obtain data quickly.

An object-oriented database (OOD) is a database system that can handle sophisticated data objects, such as those found in object-oriented programming languages. Everything in object-oriented programming is an object, and many objects are highly complicated, with various characteristics and actions.

Learn more about object-oriented database:
https://brainly.com/question/28298014
#SPJ1

you need to recommend an iaas solution that allows all virtual machines (vms) to communicate with each other by default. what should you do?

Answers

A company can run an operating system that functions like a totally other computer in an app window on a desktop thanks to virtual machines (VMs).

What is VMs in virtual machine?A system virtual machine (VM) is a completely virtualized environment running its own OS and housed on a physical server. The VM utilizes some of the physical resources of the host yet offers a full environment for running programs and services much like a physical machine without the added overhead.VMs are IAAS (Infrastructure as a Service) because you can control what operating system and software are installed on them.The Digital Equipment Corporation's (DEC) older mid-range PCs use the VMS (Virtual Memory System) operating system. VMS was created in 1979 as a new operating system for DEC's VAX computer, which was the PDP-11's replacement.A virtual machine is a computer file that functions like a real computer. These files are generally referred to as images.

To Learn more About  virtual machines Refer to:

https://brainly.com/question/27939176

#SPJ4

Let's say you wanted to make an American Football game. What is an example of a legal issue you'd have to watch out for?

Answers

Answer:

Personal injury.

Explanation:

With a bunch of people running around on a field with a goal of slamming into each other, bodily injury becomes a relevant liability.

what defense mechanism should be included in the csuf it system to detect the existence of this malicious code? discuss one mechanism in the server system and one mechanism in the campus network

Answers

Invading software known as malware is created specifically to harm and incapacitate computers and computer systems. The term "malicious software" often shortened to "malware."

What is malicious software and types?Any program or file that purposefully hurts a computer, network, or server is known as malware, or malicious software. Computer viruses, worms, Trojan horses, ransomware, and spyware are examples of malware.The easiest kind of malware to spot are these: virus-laden software. malware worms. malicious trojans.Malware attacks, password attacks, phishing attacks, and SQL injection attacks are the various kinds of cyber-attacks.Secure Remote Desktop Protocol (RDP) and other dangerous services. Make data backups that aren't online. Educate and train end users on phishing and social engineering.Top malware strains in 2021 included ransomware, banking Trojans, information thieves, and remote access Trojans (RATs).

To Learn more About malicious software Refer to:

https://brainly.com/question/399317

#SPJ4

if you have recently installed a package and run the update command to update the package, what is the likely outcome?

Answers

The domain and hostname of a machine can be viewed or modified using the Linux hostname command. Additionally, it may verify a computer's IP address

Red Hat Enterprise Linux uses YUM as its main package management tool for setting up, deleting, and managing software packages. When installing, upgrading, and uninstalling software packages, YUM resolves dependencies. YUM may handle packages from either the system's installed repositories or from. For Linux systems using RedHat Package Manager (RPM), YUM (Yellowdog Updater Modified) is an open-source command-line and graphical package management tool. On a system, it makes it simple for users and system administrators to install, update, remove, or search software packages.

Learn more about software here-

https://brainly.com/question/16011753

#SPJ4


Anna wants to modify the table her partner created in their shared word-processing document. She wants the whole table to have a light blue background.
Which option would allow Anna to make the modification?


Answers

Following are the steps to want the whole table on a light blue background:

1)First select the entire table with the help of the mouse

2)Go to the design which is next to the insert option

3)Select the "Shading" which almost looks similar to the fill color icon

4)Choose the color -light blue

How you can colour in ms word?

It's very simple in MSword, the whole table color into light blue can be changed the borders can also be changed and the thickness can also be selected accordingly. As we know coloring is the most favorite part of everyone following the above simple steps can help you in changing the background of a table.

To know more about Coloring in ms word please follow the link below:

https://brainly.com/question/18992501

#SPJ1

Answer:

its table properties / table tools format

Explanation:

i did the quiz on k12

write a c program that allows the user to encode a text file using the huffman code tree created. your program must be able to encode a file and decode it

Answers

If the bit stream being compressed is 0001, the decompressed output could be "cccd," "ccb," "acd," or "ab."

A lossless data compression algorithm is Huffman coding. Input characters are given variable-length codes, the lengths of which are determined by the frequency of the matching characters. The character used the most often is given the smallest code, and the character used the least often is given the largest code.

The variable-length codes (bit sequences) assigned to input characters are Prefix Codes, which means that no other character will have a code that is the prefix of the code assigned to that character. This is how Huffman Coding ensures that the generated bitstream cannot contain any ambiguities during decoding.

To know more about Huffman click here:

https://brainly.com/question/18994486

#SPJ4

which file organization is the best option for a random and discrete retrieval of a single record? group of answer choices hashing sequential bitmap indexing

Answers

The file organization that is best option for a random and discrete retrieval of a single record is hashing sequential bitmap indexing.

There are various documents in the File. Our ability to access the records depends on the main key. The sort of file organization that was employed for a particular group of records can influence the type and frequency of access.

A logical relationship between numerous records is file organization. This technique specifies the mapping of file records to disk blocks.

Block placement on the storage media is referred to as file organization, which describes how the records are stored.

Utilizing many files and storing only one fixed length record in each file is the first method of mapping the database to the file. Another strategy is to organize our files.

To know more about file organization click here:

https://brainly.com/question/28269702

#SPJ4

what is process modeling? multiple choice an illustration of the movement of information between external entities and the processes and data stores within the system software suites that automate systems analysis, design, and development a formal, approved document that manages and controls the entire project a graphic representation of the processes that capture, manipulate, store, and distribute information between a system and its environment

Answers

Option 4 is correct. The graphical representation of business processes or workflows is called process modeling.

Similar to a flow chart, each stage of the process is broken down into its component parts to provide a complete picture of the tasks involved in the process as they relate to the business environment. By providing data-driven visual representations of the most important business processes, business process modeling provides organizations with an easy approach to comprehend and optimize workflows. The different business processes that underpin most organizations' day-to-day operations are generally pretty well understood. Data modeling is the technique of utilizing words and symbols to describe the data and how it flows to create a streamlined picture of a software system and the data pieces it includes.

Learn more about operating here-

https://brainly.com/question/18095291

#SPJ4

Other Questions
manufacturers start work on their new lines anywhere between 3 to 12 months before presentation to retail buyers. group of answer choices Write an SQL statement to display for every restaurant the name of the restaurant (where the name of the restaurant consists of more than 10 characters) and for every category of menu item its description (catdesc). Furthermore, display the average; cheapest or lowest; and highest or most expensive price of all menu items in that category at that restaurant. Use single row functions to format all the prices. The average price must be padded; the cheapest price must be rounded; but the highest price must not be rounded. Display only those menu items of which the average item price is more than R40. Sort your results according to the restaurant names and for every restaurant from the most expensive average menu item to the cheapest average menu item. Display your results exactly as listed below. companies that are created by congress to provide a public good or service to citizens because a private enterprise cannot provide that good or service profitably are known as . tom is a new student at his university. during the first week of classes, he notices a fellow student from one of his classes getting on a bus. tom decides to follow the student and discovers that this bus takes him right to the building where his class meets. this best illustrates what kind of conformity? what are the importance of using language and literature through reliving the past and embracing the future? Identify the function shown in this graph. 3 17 3 2 12 1 1 2 3 4 5 A. y=-3x +3 B. y = -3x-3 PLEASE HELP ME ANSWER THIS I WILL GIVE 30 POINTS AND A BRAINLYEST PLEASE HELP! WILL GIVE BRAINLIEST! The radius of Earth's moon is about 173,700,000 cm. Which of the following is the number in scientific notation?1Points""Earth's moon What do you think of the government's policy of assigning more handicaps to some people thanothers? How do the handicaps enforce sameness rather than equality graff, incorporated, has sales of $44,130, costs of $14,190, depreciation expense of $3,190, and interest expense of $2,330. the tax rate is 21 percent. what is the operating cash flow, or ocf? (jk1)j when j=4 and k=0.9 . A company wants to use the allowance method to account for bad debts. You are assigned to explain to the company the different ways it can use to estimate bad debts. the subway in mexico city is very reliable. it arrives in the station every 3 minutes. kimani enters the station just as a train is pulling out. kimani sits down on a bench and reads his paper. he occasionally looks for the train a few minutes into his wait. as time goes by, he looks down the tunnel for the train more frequently. this slowly increasing pattern of behavior seen under fixed-interval schedules is called a . 30 years ago zoe was 2/3 as old as luke, 18 years ago zoe was 5/6 as old as luke how old are they now Write a paragraph in which you analyze the constitutional powers of the President. Consider the following: the powers granted by the Constitution; why the Framers established each of these as presidential powers in the Constitution; and how these powers differ from those of a despot or monarch. 18. How does theproduct change when one of the factors ina multiplication problem is doubled? Givetwo examples to support your conclusion. I need help with this questuon Name the Inequalities where in the region can the great plains be found a pregnant patient with anemia has been prescribed an iron supplement. the nurse determines that the patient is also using antacids for heartburn and advises the patient to discontinue this practice. which rationale supports this instruction to the patient?