Describe some of the differences between a client-server network system and an internet system?

Answers

Answer 1

In a client-server network system, there are distinct roles assigned to different devices. The client devices, such as computers or smartphones, request services or resources from the server device, which is typically a powerful computer.

The server fulfills these requests and provides the necessary data or functionality to the clients. The server manages the network, stores data, and processes information, while the clients rely on the server for these resources.

On the other hand, the internet system is a global network of interconnected networks. It enables communication and the sharing of resources between various devices worldwide. The internet is decentralized and does not rely on a single server.

To know more about network visit:

https://brainly.com/question/29350844

#SPJ11


Related Questions

1. Write a script that declares a variable and sets
it to the count of all students in the Students table that haven’t
graduated. If the count is greater than or equal to 100, the script
should di

Answers

The script retrieves the count of non-graduated students from the database and prints either "The number of undergrad students is greater than or equal to 100" or "The number of undergrad students is less than 100" based on the count.

To create a script that achieves the desired functionality, there is a need to assume the existence of a database and a Students table with the necessary columns. Additionally, we'll use SQL syntax to interact with the database. Here's an example script that performs the task:

import psycopg2

# Connect to the database

conn = psycopg2.connect(

   host="your_host",

   database="your_database",

   user="your_user",

   password="your_password"

)

# Create a cursor to execute SQL queries

cur = conn.cursor()

# Query to get the count of students who haven't graduated

query = "SELECT COUNT(*) FROM Students WHERE graduated = false;"

# Execute the query

cur.execute(query)

# Fetch the result

count = cur.fetchone()[0]

# Close the cursor and the database connection

cur.close()

conn.close()

# Check if the count is greater than or equal to 100

if count >= 100:

   print("The number of undergrad students is greater than or equal to 100")

else:

   print("The number of undergrad students is less than 100")

This script connects to a database using psycopg2, executes a query to count the number of students who haven't graduated from the "Students" table, and then prints a message based on whether the count is greater than or equal to 100 or not. It uses an inline conditional statement to determine which message to display.

Learn more about SQL syntax here:

https://brainly.com/question/31586609

#SPJ4

Your question is incomplete; most probably, your complete question is this:

Write a script that declares a variable and sets it to the count of all students in the

       Students table that haven’t graduated. If the count is greater than or equal to 100,

       the script should display a message that says, “The number of undergrad students is

       greater than or equal to 100”. Otherwise, it should say, “The number of undergrad

       students is less than 100”.

how often should unit diary entries be completed

Answers

The unit diary entries should be completed daily or after each unit of work. A Unit Diary is a diary for recording and recording all operations that occur in a unit.

It serves as a unit's official historical record of everything that occurs during a given period, and it is one of the most important resources available to a unit leader. To maintain the unit's historical record, Unit Diary Entries should be recorded regularly, if not daily. You should write and maintain a diary on a regular basis, which should include essential information such as maintenance logs, training and testing, and historical records of operations.

The following are the advantages of keeping a unit diary: Record of Unit History: The Unit Diary is a vital resource for historical information regarding the unit's accomplishments, problems, and activities during a given period. Communication and Coordination: The Unit Diary assists in the coordination of unit activities and serves as a communication channel between the unit commander and subordinate leaders. Documentation of training and testing:

The Unit Diary serves as a historical record of unit training and testing, including training objectives, results, and scores. Maintenance Logs: The Unit Diary should include maintenance logs, which should contain all maintenance and repair activities for the unit's equipment and vehicles.

know more about historical record here

https://brainly.com/question/1620128#

#SPJ11

Complete question is :

how often should unit diary entries be completed daily?

Page orientation is determined in Microsoft Word from the __________ tab

Answers

Answer:

Page orientation is determined in Microsoft Word from the Page Layout tab.

Explanation:

The Page Layout Tab holds all the options that allow you to arrange your document pages just the way you want them. You can set margins, apply themes, control of page orientation and size, add sections and line breaks, display line numbers, and set paragraph indentation and lines.

What is the term for the psychology, reasoning, and history behind a character's reactions in certain situations?

Answers

There are a lot of factors in behavioral neuroscience. For starters, there are social-cultural influences and biological and psychological influences. You can operate on a social script ( an action made off of previously perceived scenarios)
Most teenagers operate off of social-cultural psychology, primarily because of propaganda on TV, family traditions, etc.
Psychological factors like cognition could serve as a trait for situations.
Biological traits like testosterone, bipolar disorder, etc. It can affect these situations.

________ are pieces of SQL code that are automatically run when changes are made to a database. ________ are pieces of SQL code that are automatically run when changes are made to a database. Triggers Data models HSMs SQL injections

Answers

Triggers are pieces of SQL code that are automatically run when changes are made to a database. They are used to enforce business rules, validate data, and maintain the integrity of the database.

Triggers can be written to execute before or after an insert, update, or delete operation. They can be used to perform actions such as logging changes, updating related tables, sending notifications, and enforcing constraints.

Data models are conceptual representations of a database that define the structure, relationships, and constraints of the data. They are used to design, communicate, and document the database schema.

Data models can be represented using various notations such as Entity-Relationship (ER) diagrams, Unified Modeling Language (UML), and Data Definition Language (DDL).

HSMs (Hardware Security Modules) are devices that provide secure storage and management of cryptographic keys and digital certificates. They are used to protect sensitive data and ensure the authenticity, integrity, and confidentiality of communications. HSMs can be integrated with databases to provide enhanced security and compliance.

SQL injections are a type of security vulnerability where malicious code is injected into a database query to gain unauthorized access to sensitive data or perform malicious actions.

They can be prevented by using parameterized queries, input validation, and proper error handling. Regular security audits and updates can also help mitigate the risk of SQL injections.

For more question on  Data Definition Language

https://brainly.com/question/30407588

#SPJ11

How do you constrain a background to only appear behind an elements content?

○ background-clip: content

○ background-clip: content-box

○ background-origin: content

○ background-origin: content-box​

Answers

Answer:

Background-origin: Content-box

Explanation:

On CSS, the background-clip command specifies to what extent the background color or image appears in relation to the padding or content of an element

When the setting is background-clip: content-box, where the background is applied in only behind the content of the element, such that the element's border and the element's padding do not have a background color. However, the background extends to the margin of the content.

When you write a program that stores a value in a variable, you are using ____ storage.

Answers

A program you have written that stores a value in a variable, then variable is using temporary storage.

When you write a program in any language such as C, C++, or python. You need to include the variable in the program that stores some values for calculation or storing the information. When the program gets executed, the value of the variable will store in computer memory, generally called RAM. As we all know that RAM is temporary storage memory. Because as you shut down the computer, the information stored in RAM will be erased.

Therefore, the variables that stores values in the variable use temporary storage. An example of temporary storage is RAM while the example of permanent storage is a Hard Disk, USB, etc.

You can learn more about RAM at

https://brainly.com/question/24688176

#SPJ4

A teacher is writing a code segment that will use variables to represent a student's name and whether or not the student is currently absent. Which of the following variables are most appropriate for the code segment? ​

Answers

Complete Question:

A teacher is writing a code segment that will use variables to represent a student's name and whether or not the student is currently absent. Which of the following variables are most appropriate for the code Segment?

Group of answer choices.

А. A string variable named s and a Boolean variable named a.

B. A string variable named s and a numeric variable named A.

С. A string Variable named studentName and a Boolean variable named isAbsent.

D. A string Variable named studentName and a numeric variable named absences.

Answer:

C. A string variable named studentName and a Boolean variable named isAbsent.

Explanation:

In Computer programming, a variable stores information which is passed from the location of the method call directly to the method that is called by the program.

In this scenario, teacher is writing a code segment that will use variables to represent a student's name and whether or not the student is currently absent.

Hence, the variables which are most appropriate for the code segment are a string variable named studentName and a Boolean variable named isAbsent.

Basically, the string variable named studentName would only accept or hold values that are alphabetic but not numerical value. Thus, the variable studentName would represent the name of a specific student.

Also, the Boolean variable named isAbsent would accept values that are either "True" or "False" because it works on the principle of Boolean logic (0 for false and 1 for true).

explain the basic operations of a computer system​

Answers

Answer:

OPERATING ON INSTRUCTIONS GIVEN AND HOW IT IS GIVEN

A company gives out bonuses based on the amount of income generated by their sales representatives per month. Once the income is greater than $5000 a bonus of 10% of the generated income is given to the employees. Read the income generated and print the bonus

Answers

The code block which calculates the bonus amount earned based on sales is written thus in python 3 ;

income = eval(input("Enter generated income : "))

#takes input for the amount of income made

bonus = 0

#initialize the bonus amount

if income > 5000 :

#if the income earned is greater than 5000

bonus = (0.1 * income)

#bonus earned is 10%

print("Your bonus is :", bonus)

#display bonus

A sample run of the program is attached.

Learn more : https://brainly.com/question/15437930

A company gives out bonuses based on the amount of income generated by their sales representatives per

which popular programming language is well-known for executing its target programs on a virtual machine?

Answers

Answer: Java

Explanation: According to Quizlet it is.

Write a program 10 enter 3 number and find smallest.​

Answers

\(10 + 3 = 13\)

\(13 - 10 = 3\)

Inputs should be blue colored font and should have ________ only. Process and outputs should be in black colored font and have _______ only.

Answers

Inputs should be blue colored font and should have hardcoded number only. Process and outputs should be in black colored font and have formulas only.

What does input implies?

Input refers to any data that is given to a computer or software application. Data input refers to the process of entering information into a computer because the information delivered is also regarded as data.

What does Output implies?

The output is how the computer presents the results of the process, such as text on a screen, printed materials, or sound from a speaker.

What is a hardcoded number?

Software developers may hardcode a distinct serial number directly into a program as a digital rights management technique. Or a public key is frequently hardcoded, resulting in DRM that is impossible to produce a keygen for.

What is DRM?

Copyrights for digital media can be secured through the use of digital rights management (DRM). This strategy makes use of tools that restrict the duplication and utilization of works protected by copyright as well as proprietary software.

Note that, process and outputs should be in black font with just formulas, while inputs should be in blue font with only hardcoded numbers.

Learn more about input click here:

https://brainly.com/question/20489800

#SPJ4

in a basic program with 3 IF statements, there will always be _________ END IIF's.
a)2
b)3
c)4

Answers

Answer:

c)4

Explanation:

Hope it could helps you

Which of the following expressions evaluate to 3.5 2
I (double) 2 / 4 + 3 II (double) (2 / 4) + 3 III (double) (2 / 4 + 3) A I only
B Ill only C I and II only D II and III only
E I,II, and III

Answers

The expression that evaluates to 3.5 is option A, I only.

To understand why, we need to follow the order of operations. In option I, we first divide 2 by 4, which gives us 0.5. Then we double that, which gives us 1. Finally, we add 3 to 1, which gives us 4. Option II first divides 2 by 4, which again gives us 0.5.

However, before doubling that, we add 3 to it, which gives us 3.5 when we finally double it. Option III looks similar to II, but we have to remember that division comes before addition, so we first add 2/4 and 3, which gives us 3.5. Then we double that, which gives us 7.

Therefore, the correct option is 3.5 is option A, I only.

Learn more about programming:https://brainly.com/question/23275071

#SPJ11

Your question is incomplete but probably the complete question is:

Which of the following expressions evaluates to 3.5?

I. (double) 2 / 4 + 3

II. (double) ( 2 / 4 ) + 3

III. (double) ( 2 / 4 + 3 )

A. I only

B. II only

C. I and II only

D. II and III only

E. I, II, and III

Fill in the blanks to complete the “countdown” function. This function should begin at the “start” variable, which is an integer that is passed to the function, and count down to 0. Complete the code so that a function call like “countdown(2)” will return the numbers “2,1,0”.

Answers

Answer:

Check the code down below

Explanation:

You can use this code:

for i in range(5,-1,-1):

print(i)

This will print:

5

4

3

2

1

0

5 is changeable by the way!

The complete the “countdown” function. This function should begin at the “start” variable, which is an integer that is passed to the function, and count down to 0 is in the explanation part.

What is programming?

The process of creating a set of instructions that tells a computer how to perform a task is known as programming.

Computer programming languages such as JavaScript, Python, and C++ can be used to create programs.

Here is the code to complete the “countdown” function:

def countdown(start):

   for i in range(start, -1, -1):

       print(i, end=",")

The countdown function takes an integer start as an argument and counts down from start to 0 using a for loop.

The range function is used to generate an integer sequence from start to 0, with a step size of -1. (i.e., counting backwards).

Thus, each integer in the sequence, separated by commas, is printed using the print function.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ2

In the course of their current project, a data analyst uses a query to retrieve and request information. Which of the following is a third option they can use a query for? a) Collecting data b) Updating data c) Deleting data​

Answers

In the course of their current project, the third option a data analyst can use a query for is updating data. The right option is b)

In addition to retrieving and collecting data, data analysts often need to update existing data to reflect changes or modifications. Queries provide a powerful tool for modifying data in a database or dataset efficiently and accurately.

By constructing an appropriate update query, data analysts can specify the desired changes to be made to the data. This can involve altering specific values, adding or removing records, or updating multiple records simultaneously based on specified conditions. Update queries enable data analysts to make targeted modifications to ensure the accuracy, integrity, and relevance of the data they are working with.

With the ability to retrieve, collect, and update data using queries, data analysts have a comprehensive set of tools to manipulate and manage data effectively throughout their projects.

Learn more about update query here:

https://brainly.com/question/30175860

#SPJ11

The /home/gshant/smp directory contains several files. The directory and files need to be removed. The current working directory is /home/gshant. What would you enter at the command prompt to remove the smp directory and all the files it contains?

Answers

Explanation:

Whenever a user types in a command at the command line that is not built into the shell or that does not include its absolute path and then presses the Enter key, the shell searches through those directories, which constitute the user's search path, until it finds an executable file with that name.

The ____ button can be used to display the values from the final record in the data source

Answers

The Last Record button can be used to display the values from the final record in the data source. The Last Record button is located in the Data tab in the Controls group.

The button resembles a small square with an arrow pointing downwards. When you click the Last Record button, it takes you to the final record in the database table or query and displays all the data for that record.

The Last Record button is not the same as the End button, which takes you to the end of the current record but not the final record. The Last Record button is also different from the Last Record navigation bar in Microsoft Access, which displays the final record in a table or query in the lower half of the window.

To know more about source visit:

https://brainly.com/question/2000970

#SPJ11

an application programming interface (api) for a website tells you how to group of answer choices navigate the site download data from the site use jsonp to get data from the site use ajax to get data from the site

Answers

An application programming interface (api) for a website tells you how to option A: navigate the site.

What is the purpose of an API (application programming interface)?

Application Programming Interface, or API, is a software bridge that enables communication between two applications. You utilize an API every time you use a mobile app like Face book, send an instant message, or check the weather.

Companies can make the data and functionality of their applications available to internal company departments as well as to external third-party developers and business partners through the use of application programming interfaces, or APIs.

Therefore, Application Programming Interface is referred to as API. An application programming interface for the Web is known as a Web API. A browser's capabilities can be increased by using a browser API. A server API can increase a web server's capabilities.

Learn more about application programming interface from

https://brainly.com/question/15059067
#SPJ1

THe code language is Python 3.

Write a program that contains a function that takes in a 2D list and an integer as parameters. The integer represents the limit of the values inside the list. The function should change any value in the list that is greater than that limit to be equal to limit, and any values less than -limit to be equal to -limit. For example, if the limit is 200, it should change 250 to 200, it should change -300 to -200, and leave any values between -200 and 200 unchanged. Finally, the function should print the resulting list. Ask the user for 25 integers, put them in a 5x5 list, ask the user for the limit, then call the function and output the result.

Answers

Answer: N = 5ar = [0]*Nprint(ar)


Output[0, 0, 0, 0, 0]

Explanation: Python provides many ways to create 2-dimensional lists/arrays. However one must know the differences between these ways because they can create complications in code that can be very difficult to trace out. Let’s start by looking at common ways of creating a 1d array of size N initialized with 0s.

write the order of tasks that each person completes in order to make mashed potatoes in the shortest time. in order to format your answer, write the sequence of tasks each person does, with commas between tasks of one person, and semicolons between task lists of different people. for example, if you submit 0,1,2,4;3,5, person 0 will do tasks 0, 1, 2, and 4 (in that order), and person 1 will do tasks 3 and 5 (in that order). this will take 33 minutes total. you may add spaces, and order the task lists in any order. for example, the autograder will consider the above answer as equivalent to the submission 3,5;0,1,2,4 and the submission 0, 1, 2 ,4 ;3 ,5

Answers

To make mashed potatoes in the shortest time, the tasks can be divided among multiple people. Here is one possible distribution of tasks:

Person 1: Peel and chop potatoes, Boil water, Drain potatoes, Mash potatoesPerson 2: Set the table, Prepare butter and milk, Season mashed potatoe Person 3: Make gravy, Serve mashed potatoes and gravyThe sequence of tasks for each person can be represented as follows:Person 1: Peel and chop potatoes, Boil water, Drain potatoes, Mash potatoesPerson 2: Set the table, Prepare butter and milk, Season mashed potatoesPerson 3: Make gravy, Serve mashed potatoes and gravyNote: The order of the task lists can be rearranged, and spaces can be added for clarity. The autograder will consider answers with equivalent task sequences as correct.

To know more about tasks click the link below:

brainly.com/question/32317663

#SPJ11

Provide an example by creating a short story or explanation of an instance where availability would be broken.

Answers

Incomplete/Incorrect question:

Provide an example by creating a short story or explanation of an instance where confidentiality would be broken.​

Explanation:

Note, the term confidentiality refers to a state or relationship between two parties in which private information is kept secret and not disclosed by those who are part of that relationship. Confidentiality is broken when this restricted information is disclosed to others without the consent of others.

For instance, a Doctor begins to share the health information of a patient (eg a popular celebrity, etc) with others such as his family members and friend

s without the consent of the celebrity.

virtual conections with science and technology. Explain , what are being revealed and what are being concealed​

Answers

Some people believe that there is a spiritual connection between science and technology. They believe that science is a way of understanding the natural world, and that technology is a way of using that knowledge to improve the human condition. Others believe that science and technology are two separate disciplines, and that there is no spiritual connection between them.

What is technology?
Technology is the use of knowledge in a specific, repeatable manner to achieve useful aims. The outcome of such an effort may also be referred to as technology. Technology is widely used in daily life, as well as in the fields of science, industry, communication, and transportation. Society has changed as a result of numerous technological advances. The earliest known technology is indeed the stone tool, which was employed in the prehistoric past. This was followed by the use of fire, which helped fuel the Ice Age development of language and the expansion of the human brain. The Bronze Age wheel's development paved the way for longer journeys and the development of more sophisticated devices.

To learn more about technology
https://brainly.com/question/25110079
#SPJ13

What is logical operator in a basic? Mention its types and explain one of them with its truth table?






Answer this for 20 points pls ​

Answers

Answer:

This indicates an or operation in a logical expression.

Types: And, or and not.

It’s and, or , not logic gates.

Carol is working on her family farms to produce better variety of crops which have higher yields which process should carol use to create a better variety of crops?

Answers

Answer:

Genetic engineering

Explanation:

Answer:

B - Crop Rotation

Explanation:

How has technology impacted and affected the customer service
industry? Be informative and provide examples.

Answers

Technology has transformed the customer service industry by improving communication, enabling self-service options, personalizing experiences, automating processes, providing omnichannel support, and leveraging data-driven insights. Businesses that embrace technology in their customer service strategies can enhance customer satisfaction, loyalty, and overall business performance.

Technology has had a significant impact on the customer service industry, revolutionizing the way businesses interact with their customers and enhancing overall customer experience. Here are some key ways technology has affected the customer service industry:

Improved Communication Channels: Technology has introduced various communication channels that allow customers to connect with businesses more conveniently. For example, the rise of email, live chat, social media platforms, and chatbots has enabled customers to reach out to businesses in real-time, get instant responses, and resolve issues efficiently.

Self-Service Options: Technology has empowered customers with self-service options, reducing the need for direct customer support. Customers can now access knowledge bases, FAQs, online forums, and video tutorials to find answers to their queries and troubleshoot common issues independently.

Personalization and Customization: Advanced technologies, such as artificial intelligence (AI) and data analytics, have enabled businesses to collect and analyze customer data. This data helps in personalizing customer experiences, offering tailored recommendations, and anticipating customer needs. For example, personalized product recommendations on e-commerce websites based on previous purchases or browsing history.

Automation and Efficiency: Technology has automated various customer service processes, leading to increased efficiency and faster response times. Businesses now utilize automated ticketing systems, chatbots, and AI-powered voice assistants to handle routine inquiries, process transactions, and provide instant support. This automation frees up human agents to focus on more complex customer issues.

Omnichannel Support: With technology, businesses can provide seamless customer service across multiple channels. Customers can initiate a conversation on one channel, such as social media, and seamlessly transition to another channel, like phone or email, without having to repeat information. This omnichannel approach ensures a consistent and integrated customer experience.

Data-driven Insights: Technology allows businesses to gather and analyze vast amounts of customer data, providing valuable insights into customer preferences, behaviors, and pain points. This data helps in identifying trends, making informed business decisions, and improving customer service strategies.

Examples of technology in customer service include:

Customer Relationship Management (CRM) systems that store and manage customer information, interactions, and preferences.

Voice recognition and natural language processing technologies used in voice assistants and chatbots for more accurate and efficient customer interactions.

Social media monitoring tools that track brand mentions, customer feedback, and sentiment analysis to address customer concerns and engage in proactive communication.

Virtual reality (VR) and augmented reality (AR) technologies that enable immersive product demonstrations, virtual tours, and remote troubleshooting.

To know more about customer service visit :

https://brainly.com/question/13208342

#SPJ11

what analysis modeling approach includes use cases and user stories? cse 460

Answers

The analysis modeling approach that includes use cases and user stories is the Agile approach.

The Agile approach is a popular and iterative software development methodology that emphasizes flexibility, collaboration, and responsiveness to change. It promotes frequent iterations and continuous feedback, allowing for the development of high-quality software that meets customer requirements.

One of the key components of the Agile approach is the use of use cases and user stories for analysis and modeling. Use cases describe the interactions between system components and actors, capturing the functional requirements from a user's perspective. They provide a detailed narrative of how a user interacts with the system and the expected behavior or outcome.

User stories, on the other hand, are concise and informal descriptions of a software feature from the user's point of view. They focus on capturing the "who," "what," and "why" of a feature, often in the form of a simple sentence or statement. User stories help prioritize development efforts, provide context for the development team, and facilitate collaboration and understanding between stakeholders.

By employing use cases and user stories, the Agile approach enables software development teams to better understand user needs, prioritize requirements, and deliver incremental value. These modeling techniques encourage active involvement from stakeholders, promote effective communication, and ensure that the development process remains aligned with user expectations.

Learn more about Agile approach

brainly.com/question/31322295

#SPJ11

_____ is data and instructions entered into the memory of a device.

Answers

Answer:storage

Explanation: this is the answer b/c any data that enters the memory of a computer is STORAGE


( hope this helped )

True or False. FTP encrypts usernames and passwords before sending them across the Internet. unix

Answers

The given statement " FTP encrypts usernames and passwords before sending them across the Internet. " is false because FTP does not encrypt usernames and passwords before sending them across the Internet.

FTP (File Transfer Protocol) transmits this information in plain text, which means that it is susceptible to interception and unauthorized access by malicious individuals. This lack of encryption poses a significant security risk, as sensitive login credentials can be easily intercepted and exploited.

As a result, FTP is considered to be an insecure protocol for transferring sensitive data. It is recommended to use more secure alternatives such as FTPS (FTP over SSL/TLS) or SFTP (SSH File Transfer Protocol) that provide encryption and ensure the confidentiality of usernames, passwords, and other data transmitted during the file transfer process.

You can learn more about FTP (File Transfer Protocol) at

https://brainly.com/question/30725806

#SPJ11

Other Questions
What are positive shapes -1=5+x/6 step by step Income Statement Nicholas Health Systems recently reported an EBITDA of $46.0 million and net income of $23.7 million. It had $6.0 million of interest expense, and its federal tax rate was 21% (ignore any possible state corporate taxes). What was its charge for depreciation and amortization? Enter your answer in dollars. For example, an answer of $1.2 million should be entered as 1,200,000. Round your answer to the nearest dollar. $ how the location of Constantinople and the Byzantine Empire affected their development? Help I need this to be answered pls help In the segment below, QV = 23. QT = 8. TR = RS = SV. the interest on a 6%, 60-day note for $5,000 is $300. true or false insightful reasoning for why substance abuse is happening. 6.1.5: Function definition: Volume of a pyramid.Define a function calc_pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyramid with a rectangular base.Sample output with inputs: 4.5 2.1 3.0Volume for 4.5, 2.1, 3.0 is: 9.45Relevant geometry equations: Volume = base area x height x 1/3 Base area = base length x base width. learning task 5:Need help pls for tomorrow :( This is the architectural plan for a fenced-in garden.The shaded region represents an area for trees.If the rest of the garden is planted with flowers, how much area is covered with flowers? Read the following email:To: Rob WallaceFrom: Jon Cook For CongressHi Rob,You know Im not the type to whine about the lame political attacks but there was a line in my opponents latest ad that I cant let go when he attacked the people who contribute to my campaign. Good people. People like you.Im proud to say that the majority of my support comes from small-dollar donations. Not from special interests like Big Pharma, the oil industries, or Wall Street fat cats. I believe government should serve the needs of citizens, not corporations.My opponent is running scared and it shows, but I still need your help to get our message out. Please, join the 847 supporters who have already chipped in this week to FLIP DISTRICT 4!Thanks Rob. Together, we win!JonWhich of the answers below is the best description of the cultural context of the reading?The author is Jon Cook and he is asking Rob Wallace for money so that he can run for Congress in District 4.The author of the email is asking the recipient for money.A Congressional candidate wants to raise money from regular people only.A Congressional candidate says he will support citizens over big business in order to encourage people to give money to his campaign. In a solid paragraph at least 3-5 sentences, what party system do you think is the best for the United States? Noparty, one party, two-party, or multi-party? Explain in detail with examples. What event established the principle that individuals are accountable for their actions even during time of war? founding of United Nations Nuremberg Trials Potsdam Conference Berlin Airlift. Please help! IXL math problem a public health nurse is teaching the community about health promotion. which information should the nurse include for innate immunity? innate immunity is gained: The True Confessions of Charlotte Doyle is written in A. third-person narrativeB. second-person narrativeC. third-person limited narrativeD. first-person narrative Put the equation in function form (solve for y):-3x + 2y = 6 how do you create your own goal in terms of career Read the biography and memoir excerpts below. Biography: When Wilbur was eleven and Orville seven, their father bought them a toy helicopter that sparked their interest in flight. Memoir: Late in the autumn of 1878, our father came into the house one evening with some object partly concealed in his hands, and before we could see what it was, he tossed it into the air. If the information contained in the biography were written directly by the author, which would be a likely example of the wording? A. When the boys were young, their dad bought them a toy helicopter. B. A toy helicopter purchased by the boys dad in 1878 sparked their flying dreams. C. It was the helicopter our father purchased that really encouraged us to learn to build a flying machine. D. When our father came into the house with a hidden present, we watched closely until he threw it into the air and it didnt fall.