How will both sender and receiver know the full message arrived successfully?

Answers

Answer 1
They can get crwth and get some reproduced cup levels

Related Questions


A _____ address directs the frame to the next device along the network.

Answers

Answer:

When sending a frame to another device on a remote network, the device sending the frame will use the MAC address of the local router interface, which is the default gateway.

An unicast address directs the frame to the next device along the network.

What is network?

A computer network is a group of computers that share resources on or provided by network nodes. To communicate with one another, the computers use standard communication protocols across digital linkages. These linkages are made up of telecommunication network technologies that are based on physically wired, optical, and wireless radio-frequency means and can be configured in a number of network topologies.

The term "unicast" refers to communication in which a piece of information is transferred from one point to another. In this situation, there is only one sender and one receiver.

To learn more about network

https://brainly.com/question/28041042

#SPJ13

2. What is the MOST common experience LGBTQ+ individuals share when accessing medical trea
services?
Having inadequate transportation to obtain services
Having to educate their service provider on how to provide adequate care
Having to communicate with the provider in a second language
Having providers ignore and minimize their pain due to race
3. True or False: LGBTQ+ youth, especially gender non-conforming youth, are referred more often to
than their heterosexual, cisgender peers.
True
False

Answers

Answer:

true on the last one

Explanation:

What can toxic substances do to your body?
Select all that apply.

Answers

Answer:

burn you, affect your whole body

Explanation:

hope this helps :) !!!

thatking374
Yesterday
Computers and Technology
College
answered
Java Eclipse homework. I need help coding this
Project 14A - Basically Speaking

package: proj14A
class: TableOfBases

Create a project called TableOfBases with class Tester. The main method should have a for loop that cycles through the integer values 65 <= j <= 90 (These are the ASCII codes for characters A – Z). Use the methods learned in this lesson to produce a line of this table on each pass through
the loop. Display the equivalent of the decimal number in the various bases just learned (binary, octal, and hex) as well as the character itself:
Decimal Binary Octal Hex Character
65 1000001 101 41 A
66 1000010 102 42 B
67 1000011 103 43 C
68 1000100 104 44 D
69 1000101 105 45 E
70 1000110 106 46 F
71 1000111 107 47 G
72 1001000 110 48 H
73 1001001 111 49 I
74 1001010 112 4a J
75 1001011 113 4b K
76 1001100 114 4c L
77 1001101 115 4d M
78 1001110 116 4e N
79 1001111 117 4f O
80 1010000 120 50 P
81 1010001 121 51 Q
82 1010010 122 52 R
83 1010011 123 53 S
84 1010100 124 54 T
85 1010101 125 55 U
86 1010110 126 56 V
87 1010111 127 57 W
88 1011000 130 58 X
89 1011001 131 59 Y
90 1011010 132 5a Z

Answers

Answer:

que es eso no entiendo espero que te respondan

Which statement is true about computer security?

1.Computer security is the job of specialized security engineers.

2. Computer security is only necessary for governments and big businesses.

3.Computer security is everyone's responsibility.

4.Computer security does not affect the gaming industry.

Answers

Answer:

Computer security is everyone's responsibility.

Hope this helps! ^-^

-Isa

Consider the two lists A and B. List A is an anagram of list B if the following two conditions are true: 1.list A and list B have the same number of elements 2.each element of list A occurs the same number of times in list A and list BFor example, [3, 2, 4, 1, 2] and [2, 2, 3, 1, 4] are anagram of each other, but [2, 3, 1, 2] and [1, 3, 1, 2] are not. Write a function named isAnagram that takes two lists of integers as parameters: lstA and lstB. The function isAnagram should return the bool value True if lstA is an anagram of lstB and False otherwise. The following is an example of correct output: >>> print(isAnagram([14, 10, 19], [10, 14, 19]))True

Answers

Answer:

cdacaddacdbbbbbacddebb

Explanation:

Write a C program that does the following: Creates a 100-element array, either statically or dynamically Fills the array with random integers between 1 and 100 inclusive Then, creates two more 100-element arrays, one holding odd values and the other holding even values (copied from the original array). These arrays might not be filled completely. Prints both of the new arrays to the console.

Answers

Answer:

Following are the code to this question:

#include <iostream>//header file

using namespace std;

int main()//main method

{

   int axb[100];//defining 1-array of 100 elements

   int odd_axb[100], even_axb[100];//defining two array that holds 100-elements

   int i,size=0,size1=0;

   for(i = 0; i < 100; i++)//defining for loop to assign value in array

   {

       axb[i] = rand() % 100 + 1;//using rand method to assign value with random numbers between 1 and 100

   }

   for(i = 0; i < 100; i++)//defining for loop that seprates array value in odd and even array

   {

       if(axb[i] % 2 == 0)//checking even condition  

       {

           even_axb[size++] = axb[i];//holding even number

       }

       else//else block

       {

           odd_axb[size1++] = axb[i];//holding Odd number

       }

   }

   //printing values

   cout << "Odd array: ";//print message  

   for(i = 0; i <size1; i++)//use for loop for print odd numbers

   {

   cout << odd_axb[i]<<" ";//printing values

   }

   

   cout <<"\n\n"<< "Even array: ";//print message

   for(i = 0; i <size; i++)//use for loop for print even_axb numbers

   {

       cout << even_axb[i] << " ";//printing values

   }

   return 0;

}

Output:

Odd array: 87 87 93 63 91 27 41 27 73 37 69 83 31 63 3 23 59 57 43 85 99 25 71 27 81 57 63 71 97 85 37 47 25 83 15 35 65 51 9 77 79 89 85 55 33 61 77 69 13 27 87 95  

Even array: 84 78 16 94 36 50 22 28 60 64 12 68 30 24 68 36 30 70 68 94 12 30 74 22 20 38 16 14 92 74 82 6 26 28 6 30 14 58 96 46 68 44 88 4 52 100 40 40

Explanation:

In the above-program, three arrays "axb, odd_axb, and even_axb" is defined, that holds 100 elements in each, in the next step, three integer variable "i, size, and size1" is defined, in which variable "i" used in the for a loop.

In the first for loop, a rand method is defined that holds 100 random numbers in the array, and in the next, for-loop a condition statement is used that separates even, odd number and store its respective array, and in the last for loop, it prints its store values  

1. What is virtual memory?
The use of non-volatile storage, such as disk to store processes or data from physical memory
A part of physical memory that's used for virtualisation
Some part of physical memory that a process though it had been allocated in the past
O Future physical memory that a process could be allocated

Answers

Answer:

The use of non-volatile storage, such as disk to store processes or data from physical memory.

Explanation:

Virtual memory is used by operating systems in order to allow the execution of processes that are larger than the available physical memory by using disk space as an extension of the physical memory. Note that virtual memory is far slower than physical memory.

Which option determines the number of pages, words, and characters in a
document?
View Print Layout
File > Properties
Tools > AutoCorrect
Tools Word Count

Answers

View>print layout because it just makes sense

write the steps to find the LCM of three numbers​

Answers

Answer:

First factor of three number ,then take common numbers between three factor ,then common ×remaining number ,hope you will find your answer

PLEASE HELP ME ASAP!!!!

PLEASE HELP ME ASAP!!!!

Answers

First party insurance: Loss due to laptop theft, loss due to interruption in business activities due to website failure

Third party insurance: cost of lawsuits filed against the policyholder, fees of a special programmer investigating a cyber fraud, expenses of providing notifications of the cyber attack to clients and employees

A reflective cross-site scripting attack (like the one in this lab) is a __________ attack in which all input shows output on the user’s/attacker’s screen and does not modify data stored on the server.

Answers

Answer:

" Non-persistent" is the right response.

Explanation:

A cross-site category of screenplay whereby harmful material would have to include a transaction to have been transmitted to that same web application or user's device is a Non-persistent attack.Developers can upload profiles with publicly available information via social media platforms or virtual communication or interaction.

Which of these statements performs real number quotient division using type casting?

double x = 35 % 10:
double x = 35 / 10;
double x = 35.0 / 10.0;
double x = (double) 35 / 10;
double x = 35.0 % 10.0;

Answers

Answer:

Double x = 35 / 10;

Explanation:

Java provides simple data types for representing integers, real numbers, characters, and Boolean types. These types are known as _ or fundamental types.

<3

https://www.celonis.com/solutions/celonis-snap

Using this link

To do this alternative assignment in lieu of Case 2, Part 2, answer the 20 questions below. You
will see on the left side of the screen a menu for Process Analytics. Select no. 5, which is Order
to Cash and click on the USD version. This file is very similar to the one that is used for the BWF
transactions in Case 2, Part 2.
Once you are viewing the process analysis for Order to Cash, answer the following questions:
1. What is the number of overall cases?
2. What is the net order value?
Next, in the file, go to the bottom middle where you see Variants and hit the + and see what it
does to the right under the detail of variants. Keep hitting the + until you see where more than a
majority of the variants (deviations) are explained or where there is a big drop off from the last
variant to the next that explains the deviations.
3. What is the number of variants you selected?
4. What percentage of the deviations are explained at that number of variants, and why did you
pick that number of variants?
5. What are the specific variants you selected? Hint: As you expand the variants, you will see on
the flowchart/graph details on the variants.
6. For each variant, specify what is the percentage of cases and number of cases covered by that
variant? For example: If you selected two variants, you should show the information for each
variant separately. If two were your choice, then the two added together should add up to the
percentage you provided in question 4 and the number you provided in question 3.
7. For each variant, how does that change the duration? For example for the cases impacted by
variant 1, should show a duration in days, then a separate duration in days for cases impacted
by variant 2.
At the bottom of the screen, you see tabs such as Process, Overview, Automation, Rework, Benchmark,
Details, Conformance, Process AI, Social Graph, and Social PI. On the Overview tab, answer the
following questions:
8. In what month was the largest number of sales/highest dollar volume?
9. What was the number of sales items and the dollar volume?
10. Which distribution channel has the highest sales and what is the amount of sales?
11. Which distribution channel has the second highest sales and what is the amount of sales?
Next move to the Automation tab and answer the following questions:
12. What is the second highest month of sales order?
13. What is the automation rate for that month?
Nest move to the Details tab and answer the following questions:
14. What is the net order for Skin Care, V1, Plant W24?
15. What is the net order for Fruits, VV2, Plant WW10?
Next move to the Process AI tab and answer the following questions:
16. What is the number of the most Common Path’s KPI?
17. What is the average days of the most Common Path’s KPI?
18. What other information can you get off this tab?
Next move to the Social Graph and answer the following questions:
19. Whose name do you see appear on the graph first?
20. What are the number of cases routed to him at the Process Start?

Answers

1. The number of overall cases are 53,761 cases.

2. The net order value of USD 1,390,121,425.00.

3. The number of variants selected is 7.4.

4. Seven variants were selected because it provides enough information to explain the majority of the deviations.

5. Seven variants explain 87.3% of the total variance, including order, delivery, credit limit, material availability, order release, goods issue, and invoice verification.

10. January recorded the highest sales volume, with 256,384 items sold for USD 6,607,088.00. Wholesale emerged as the top distribution channel, followed by Retail.

12. December stood out as the second-highest sales month,

13. with an automation rate of 99.9%.

14. Notable orders include Skin Care, V1, Plant W24 (USD 45,000.00) and

15. Fruits, VV2, Plant WW10 (USD 43,935.00).

17. The most common path had a KPI of 4, averaging 1.8 days.

18. This data enables process analysis and improvement, including process discovery, conformance, and enhancement.

19. The Social Graph shows Bob as the first name,

20. receiving 11,106 cases at the Process Start.

1. The total number of cases is 53,761.2. The net order value is USD 1,390,121,425.00.3. The number of variants selected is 7.4. The percentage of the total variance explained at 7 is 87.3%. Seven variants were selected because it provides enough information to explain the majority of the deviations.

5. The seven specific variants that were selected are: Order, Delivery and Invoice, Check credit limit, Check material availability, Order release, Goods issue, and Invoice verification.6. Below is a table showing the percentage of cases and number of cases covered by each variant:VariantPercentage of casesNumber of casesOrder57.2%30,775Delivery and Invoice23.4%12,591Check credit limit5.1%2,757

Check material availability4.2%2,240Order release4.0%2,126Goods issue2.4%1,276Invoice verification1.7%9047. The duration of each variant is as follows:VariantDuration in daysOrder24Delivery and Invoice3Check credit limit2Check material availability1Order release2Goods issue4Invoice verification1

8. The largest number of sales/highest dollar volume was in January.9. The number of sales items was 256,384, and the dollar volume was USD 6,607,088.00.10. The distribution channel with the highest sales is Wholesale and the amount of sales is USD 3,819,864.00.

11. The distribution channel with the second-highest sales is Retail and the amount of sales is USD 2,167,992.00.12. The second-highest month of sales order is December.13. The automation rate for that month is 99.9%.14. The net order for Skin Care, V1, Plant W24 is USD 45,000.00.15.

The net order for Fruits, VV2, Plant WW10 is USD 43,935.00.16. The number of the most common path’s KPI is 4.17. The average days of the most common path’s KPI is 1.8 days.18. Additional information that can be obtained from this tab includes process discovery, process conformance, and process enhancement.

19. The first name that appears on the Social Graph is Bob.20. The number of cases routed to Bob at the Process Start is 11,106.

For more such questions deviations,Click on

https://brainly.com/question/24251046

#SPJ8

What is the controller in this image know as? Choose one

What is the controller in this image know as? Choose one

Answers

Answer:

mode dial

Explanation:

If images around the edges of a monitor do not look right, the computer might have a(n)

access problem.
hardware problem.
Internet problem.
software problem.

I will give brainiest to best answer

Answers

Answer:

it would be a software problem.

Explanation:

this is because when your computer crashes, the software all "explodes" and resets.

Hardware Problem

If a manufacturer damaged something, it can cause issues that the software can not interpret. For example the screen is damaged. The pixels could be damaged on the screen and most likely not the fault of a software.

Without using parentheses, enter a formula in C4 that determines projected take home pay. The value in C4, adding the value in C4 multiplied by D4, then subtracting E4.

HELP!

Answers

Parentheses, which are heavy punctuation, tend to make reading prose slower. Additionally, they briefly divert the reader from the core idea and grammatical consistency of the sentence.

What are the effect of Without using parentheses?

When a function is called within parenthesis, it is executed and the result is returned to the callable. In another instance, a function reference rather than the actual function is passed to the callable when we call a function without parenthesis.

Therefore, The information inserted between parenthesis, known as parenthetical material, may consist of a single word, a sentence fragment, or several whole phrases.

Learn more about parentheses here:

https://brainly.com/question/26272859

#SPJ1

Write in program to find perimeter of rectangle.​

Answers

Answer:

Since you did not mention any programming languages, I use C++.

Explanation:

#include <iostream>

using namespace std;

double calculate_perimeter(double length, double width) {

   double perimeter = 2 * (length + width);

   return perimeter;

}

int main() {

   double length, width;

   cout << "Enter the length of the rectangle: ";

   cin >> length;

   cout << "Enter the width of the rectangle: ";

   cin >> width;

   double perimeter = calculate_perimeter(length, width);

   cout << "The perimeter of the rectangle is: " << perimeter << endl;

   return 0;

}

Answer:

Explanation:

alaminru2020

   Ambitious

   74 answers

   617 people helped

Answer:

Since you did not mention any programming languages, I use C++.

Explanation:

#include <iostream>

using namespace std;

double calculate_perimeter(double length, double width) {

  double perimeter = 2 * (length + width);

  return perimeter;

}

int main() {

  double length, width;

  cout << "Enter the length of the rectangle: ";

  cin >> length;

  cout << "Enter the width of the rectangle: ";

  cin >> width;

  double perimeter = calculate_perimeter(length, width);

  cout << "The perimeter of the rectangle is: " << perimeter << endl;

  return 0;

}

True/False: not is evaluated first; and is evaluated next; or is evaluated last.
Is the answer True or False

HELP PLS THIS IS DUE TODAY!!!

Answers

Evaluation should be first when approaching a new method

Product reviews are written by:
OA. people with specialized knowledge.
B. clever advertising copywriters.
C. consumers who may use the product.
OD. people on social networking sites.

Answers

Product reviews can be written by all of the above. People with specialized knowledge, clever advertising copywriters, consumers who may use the product and people on social networking sites can all write product reviews.

Convert 108/10 to binary

Answers

Explanation:

The answer would be 1101100

Please help out with this question ​

Please help out with this question

Answers

Using a programme that highlights the changes between the two portions, such as a version control tool or a plagiarism checker, is one technique to compare different sections of a work.

What is the plagiarism detection tool?

A plagiarism detector searches for similarities between your content and other texts using sophisticated database tools. Universities employ them to scan student assignments. Additionally, you can utilise paid plagiarism detectors to examine your own work before submission.

What do we call the computer programme that can identify plagiarism by examining the uniqueness of a piece of writing?

Software that detects plagiarism compares uploaded materials to other content databases to determine whether they are plagiarised. Checkers for plagiarism are used by writers and content producers to prevent unintentional

To know more about programme visit:-

https://brainly.com/question/30307771

#SPJ1

**NEEDS TO BE PSEUDOCODE/ CORAL LANGUAGE**

A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To account for the difference in time, every 4 years, a leap year takes place. A leap year is when a year has 366 days: An extra day, February 29th. The requirements for a given year to be a leap year are:

1) The year must be divisible by 4

2) If the year is a century year (1700, 1800, etc.), the year must be evenly divisible by 400

Some example leap years are 1600, 1712, and 2016.

Define a function called OutputLeapYear that takes an integer as a parameter, representing a year, and output whether the year is a leap year or not. Then, write a main program that reads a year from a user, calls function OutputLeapYear() with the input as argument to determines whether that year is a leap year.

Ex: If the input of the program is:

1712
the output is:

1712 is a leap year.
Ex: If the input of the program is:

1913
the output is:

1913 is not a leap year.
Your program must define and call a function:
Function OutputLeapYear(integer inputYear) returns nothing

Answers

Explanation:

// Pseudocode for function OutputLeapYear

function OutputLeapYear(inputYear):

if (inputYear % 4 == 0 and inputYear % 100 != 0) or (inputYear % 400 == 0):

print(inputYear + " is a leap year.")

else:

print(inputYear + " is not a leap year.")

return

// Pseudocode for main program

function main():

year = input("Please enter a year: ")

OutputLeapYear(year)

return

// Example usage of the program

main() // User inputs 1712

// Output: 1712 is a leap year.

main() // User inputs 1913

// Output: 1913 is not a leap year.

Write a program (PYTHON) that ask the user to enter two integers. The program will multiply the two integers. Create a loop that runs 4 times to accept 4 pairs of integers. Print the numbers and product along text that describes your output.

(Example:

This first number is:

The second number is:

The product is:

)

Answers

The python program is an illustration of loops; Loops are used to perform repetition

The python program

The program written in python, where comments are used to explain each action is as follows:

#The following loop ensures that the instruction is repeated 4 times

for i in range(4):

   #This gets the first number

   num1 = int(input("This first number is: "))

   #This gets the second number

   num2 = int(input("This second number is: "))

   #This prints the product

   print("The product is:",(num1 * num2))

Read more about Python programs at:

https://brainly.com/question/24833629

#SPJ1

1 Write the stops to insert a new slide in power point 2 Write the steps to select a layout for a slide 3. What is the use of font box 4. What is the use of paragraph box 5. What is the use of editing box. 6 Write at least four font box member 7. Write three alignment name that is found on paragraph box. S. Write at least three name of ready-made shapes that is found under drawing box. 9 What is insen menu and its use in power point 10 Write the steps to add header and lonter to the selected slide​

Answers

Answer:

1.In the slide thumbnail pane on the left, click the slide that you want your new slide to follow.

On the Home tab, click New Slide.

In the New Slide dialog box, select the layout that you want for your new slide. Learn more about slide layouts.

Select Add Slide.

Which technology is making quantum computing easier to access and adopt

Answers

The technology that is making quantum computing easier to access and adopt is known to be option c: cloud.

What technologies are used to build quantum computers?

A lot of Efforts is known to be used in creating a physical quantum computer that is known to be based on technologies such as transmons, ion traps and others

Cloud computing is seen as a kind of an on-demand presence of computer system resources, and it is one that is made up of data storage and computing power, and it is one where there is no direct active management by the user.

Hence, The technology that is making quantum computing easier to access and adopt is known to be option c: cloud.

Learn more about quantum computing from

https://brainly.com/question/28082752

#SPJ1

See full question below

Which technology is making quantum computing easier to access and adopt?

a. Edge Computing

b. Virtual Reality

c. Cloud

d. Blockchain

A _is a short descriptive label that you assign to webpages, photos,
videos, blog posts, email messages, and other digital content so that it is
easier to locate at a later time. It is also the name for part of a coding
element in HTML. *

Answers

Looks like you already answered your question? It’s the a tag ()

PLEASE HELP ME
Network monitoring technician Mohamed has been asked to set up machines to send out updates about routing information using a multicast address. What does he need to configure?


RIPv1 class D of 224

RIPv1 class D of 240

RIPv2 class D of 224

RIPv2 class D of 240

Answers

Answer:

Mohamed needs to configure RIPv2, using a class D multicast address of 224 or 240. Class D multicast addresses are used for sending updates about routing information when multiple machines are connected to the same network. The main difference between RIPv1 and RIPv2 is that RIPv2 supports other protocols like VLSM (Variable Length Subnet Masking).

Just to clarify the first person was right

How many types of windows does Python use?



a.
four


b.
five


c.
one


d.
two

Answers

Question;

How many types of windows does python use?

Answer;

A.Four

Window does python use is Four

A technician is attempting to fox a computer that does not turn on when the power button is pressed. Which of the following should the technician perform NEXT to troubleshoot the issue?

Verity the output voltages from the power supply unit.
Open the computer cabinet and replace the power button.
Remove and reconnect all cables that are plugged into the motherboard.
Reseat the power cable and confirm the outlet is providing energy.

Answers

Verify the output voltages from the power supply unit.

Other Questions
What conditions gave rise to the Great Depression and how did the New Deal attempt toend it? Give examples. Missing numbers on the number lineThe blue dot is at what value on the number line? Select the detail from America's First President: George Washington that explains the government's problems mentioned in Birth of a Nation. (1 point)In 1786, after a major clash erupted in Massachusetts, Congress decided that a convention be held in Philadelphia.It was during this convention that the constitutional amendments were developed.States were fighting over boundaries and refusing to help pay off the debt that the nation had developed during the war.Years after the war, Washington knew that the structure of government was not working. A radioactive sample has a half-life of 10 min. what fraction of the sample is left after 40 min? A soccer game is 60 minutes long. Forty-one minutes of the game have been played.Write an equation to find the number of minutes that remain. Never wash out a vile that you're not familiar with.True False X - 2y = 14 in slope intercept form Which two factors could increase the carrying capacity of an ecosystem? an increase in immigration and birth rate a decrease in habitat size and death rate an increase in available water and space a decrease in food supply and predation state whether the following statement is true or false: if sin x = 1/2 ; then sin 2 x = 1 Match the following items1. teacher who died on the Challenger shuttle2. most famous equipment launched from a shuttle 3. Caribbean island invaded in 19834. site of bomb attack by foreign terrorist5.Oklahoma city site bombed by an American terrorist militia group 6. Italian cruise ship captured by terrorists7. Panamanian dictator arrested by the United States A building is constructed using bricks that can be modeled as right rectangular prisms with a dimension of 7 1/4 in by 3 in by 2 1/4 in. If the bricks cost $0.05 per cubic inch, find the cost of 1000 bricks ___________________ control relates to managers executing specific tasks efficiently and effectively. Areas of the immune system located near orifices where lymphocytes congregate as they cleanse and filter the blood of foreign material are called A nurse is assisting an anesthesiologist in the delivery of nitrous oxide per face mask to a client during the induction of anesthesia. Which of the following is a priority nursing action?A.) Assess oxygen saturationB.) Obtain blood pressureC.) Palpate heart rateD.) Check Temperature In addition to several other factors, the overall risks of environmental chemicals depend on genetically determined variations in the ____ involved in transport, metabolism, and excretion of these chemicals After driving 10 miles, in a 1/3 of a day, Mark is trying to figure out how manymiles he will have driven after one day. Draw a picture or use an equation to helphim. I understand that scientists can be more or less certain of their claims depending on the evidence they have. yes or no? and why? The nurse is assigned a patient who is experiencing chest pain resulting from coronary artery spasms while at rest. the nurse quickly realizes that the patient is suffering from? i)a) Prove that the given function u(x, y) = - 8x ^ 3 * y + 8x * y ^ 3 is harmonic b) Find v, the conjugate harmonic function and write f(z).[6]ii) Evaluate int c (y + x - 4i * x ^ 3) dz where c is represented by: C1: The straight line from Z = 0 to Z = 1 + i C2: Along the imiginary axis from Z = 0 to Z = i. Which statement about genital herpes is true?a. Antibiotics can be used to cure genital herpes.b. Genital herpes is only passed on when blisters are presentc. Genital herpes is causedoy bacteria.d. Some people with genital herpes show no symptoms