norman is a network engineer. he is creating a series of logical networks based on different departments for a new branch office. although the physical locations of the computers for a particular department may be in different areas or on different floors of the building, they have to operate as if they are on a single physical network. norman's solution involves putting the accounting, engineering, and marketing computer nodes on different subnets. what sort of network topology does norman create?

Answers

Answer 1

Engineer for networks Norman. For a new branch office, he is building a number of logical networks based on several departments. Several computers are linked via a hub in a local area network (LAN).

What is network?

When two or more PCs are linked together and share resources without using a separate server computer, a network is created. An ad hoc connection can be a P2P network. a Universal Serial Bus was used to transfer files between two connected computers. Switches, one of the network's traffic controllers, typically operate at Layer 2. By utilising packet switching, they enable the connection of several devices in a LAN while reducing the collision domain.

To learn more about Norman from given link

brainly.com/question/29762402

#SPJ4


Related Questions

Which statement is most likely to be true of a self-driving vehicle rated at
automation level 2 (partial automation)?
A. The vehicle is mostly controlled by artificial intelligence.
B. The vehicle is completely controlled by a computer.
C. The driver's seat does not need to be occupied.
D. The vehicle may use artificial intelligence to stay in the correct
lane.

Answers

Answer:

i would select D.

Explanation:

D is definitely the correct answer.

a k-permutation of a multiset m is a sequence of length k of elements of m in which each element appears a number of times less than or equal to its multiplicity in m (an element's repetition number).

Answers

The ordered arrangements of k unique elements chosen from a set are known as k-permutations, or partial permutations, in the field of elementary combinatorics.

These are the permutations of the set when k is equal to the set's size. Assume A is a finite set and that :AN>0. Let M be the multiset that has "underlying set of elements" A and "multiplicity function". M is hence finite.

0k|M| should be an integer.

The set P(M,k) of all k-permutations of the elements from the multiset M is the subject of this inquiry.

As an illustration, if k=3 and M is the multiset 0,0,1,2, then P(M,k) contains the following 12 k-permutations: (0,0,1), (0,0,2), (0,1,0), (0,1,2), (0,2,0), (0,2,1), (1,0,0), (1,0,2), (1,2,0),(2,0,0),(2,0,1). (2,1,0)

Learn more about Permutation here-

https://brainly.com/question/1216161

#SPJ4

algo de La historia de los productos tecnologicos

Answers

Answer:

La tecnología se define como la suma de técnicas, habilidades, métodos y/o procesos utilizados y utilizados en la producción de bienes, productos o servicios, o para lograr objetivos clave de la investigación científica.

Precisamente, la tecnología se define como la aplicación del conocimiento científico con fines prácticos, especialmente en la producción industrial. Un significado secundario de la palabra se refiere al desarrollo de dispositivos y mecanismos con fines científicos y está directamente relacionado con las artes aplicadas, las ciencias aplicadas o la ingeniería. A veces se refiere a la metodología que caracteriza tal proceso. En los últimos años ha existido una tendencia a que el concepto se refiera únicamente a la alta tecnología y / o tecnología informática, aunque básicamente no se limita a estas áreas. Por ejemplo, tanto la Estación Espacial Internacional o una computadora pueden ser tecnología, también pueden ser un abridor de botellas estándar. A menudo, el objeto de la tecnología con beneficios prácticos no es el producto de la investigación científica, sino el resultado de un descubrimiento accidental.

Write the pseudocode that could be used for a program that will test if a
number is odd or even and print the result.
esult.

Answers

Here's an example of pseudocode that could be used for a program that will test if a number is odd or even and print the result:

1. Ask the user for an integer input and store it in a variable called "number."
2. Check if the number is divisible by 2 using the modulo operator (%).
3. If the result of the modulo operator is 0, print "The number is even."
4. If the result of the modulo operator is 1, print "The number is odd."

Here's an implementation of the pseudocode using Python:

```
number = int(input("Enter an integer: "))

if number % 2 == 0:
print("The number is even.")
else:
print("The number is odd.")
```

This program will ask the user to enter an integer and then check if it is even or odd using the modulo operator. If the number is even, it will print "The number is even." If the number is odd, it will print "The number is odd."

Jill is interested in a career as a paramedic. She is trained to use medical equipment, she remains calm under pressure, and she has good bedside manner. Which career pathway would best fit Jill's interests and skills?

Answers

Answer:

Emergency and Fire management services

Explanation:

Paramedics are trained to respond to emergency situations faced by the public. These could include, fire incidents, accidents, or other emergency situations. Paramedics are trained to be calm under pressure, to use medical equipment, as well as to have good bedside manners as their jobs might require taking care of victims of various incidents at the spot of crisis, or in ambulances before they arrive the hospitals.

So, Jill is likely interested in a career in Emergency and Fire Management Services because she would require these skills to succeed in this field.

Answer:

Emergency and Fire management services

Explanation:

please help, its a missing assignment.

please help, its a missing assignment.

Answers

Answer:

I am sure it's this one:

That's one small step for man. One giant leap for mankind."

Explanation:

You work for ScreensRUs, a business that sends repair people to sites to fix damaged car windshields. Your employer provides company mobile phones, but you think it should provide smartphones instead. Write a memo outlining two reasons why the firm should upgrade its devices.

Answers

Answer:

tldr; treat this like a brief essay. some reasons would be "having a smartphone makes your job easier", "smartphones can make the job easier to do on the go".

Explanation:

hi there!

ok, so this should be pretty simple.  first, we should take a look at the issue in the scenario;  you're an employee for a company that relies heavily on technology to get your job done and send other employees to their customer's locations.  because of this, getting poor quality mobile phones would make your job a little bit harder to do.

to put this in a little bit of a better perspective, imagine that you're an employee in a store, and your job is to sweep the floor. however, your boss only gives you a dust pan and bad quality broom.  that'd make you wish that you had some better equipment to get your job done faster, right?

a memo is basically a written message in a business place; in modern days, they're usually emails, but back in the day they were letters and such.  for this assignment, treat this like an essay! however, be sure to be to-the-point.

now to answer the question; we've already covered one reason that you could use in the memo: "having a smartphone would make your job easier". now think about what else having a smartphone would do compared to a mobile company phone.  

here's an example of a memo!

good luck! hope this helped.

You work for ScreensRUs, a business that sends repair people to sites to fix damaged car windshields.

1)Which tool can you use to find duplicates in Excel?
Select an answer:
a. Flash Fill
b. VLOOKUP
c. Conditional Formatting
d. Concatenation
2)What does Power Query use to change to what it determines is the appropriate data type?
Select an answer:
a.the headers
b. the first real row of data
c. data in the formula bar
3)Combining the definitions of three words describes a data analyst. What are the three words?
Select an answer:
a. analysis, analyze, and technology
b. data, programs, and analysis
c. analyze, data, and programs
d. data, analysis, and analyze

Answers

The tool that you can use to find duplicates in Excel is c. Conditional Formatting

b. the first real row of datac. analyze, data, and programs

What is Conditional Formatting?

Excel makes use of Conditional Formatting as a means to identify duplicate records. Users can utilize this feature to identify cells or ranges that satisfy specific criteria, like possessing repetitive values, by highlighting them.

Using conditional formatting rules makes it effortless to spot repeated values and set them apart visually from the other information. This function enables users to swiftly identify and handle identical records within their Excel worksheets, useful for activities like data examination and sanitation.

Read more about Conditional Formatting here:

https://brainly.com/question/30652094

#SPJ4

Problem Description and Given Info You must complete the Bunny class in the bunny.java file) you are given below. To complete this simple class, you must define a public constructor method that takes two arguments, the first argument must be a String, and the second argument must be an int. The constructor must initializes the name and age fields with the argument values. HINTS Remember that a constructor method has the same name as its class Remember that a constructor method has no return type - not even void. Remember that you can (and should) sue the this keyword to access an object's instance fields. NOTE In general, fields instance variables should be declared to be private. However, for this Challenge the fields are declared as public LAB ACTIVITY 26.19.1: Class With Overloaded Constructor (Java) Individual Challenge public class Main { public static void main(String[] args) { Bunny myBunny = new Bunny("Flopsy", 2); Bunny yourBunny = new Bunny ("Benny", 9); myBunny.print(); yourBunny.print(); }}}

Answers

To complete the Bunny class as described, you should define a public constructor with a String and int parameter, initializing the name and age fields. Here's the Bunny class code in Java:

```java
public class Bunny {
   public String name;
   public int age;

   public Bunny(String name, int age) {
       this.name = name;
       this.age = age;
   }

   public void print() {
       System.out.println("Name: " + name + ", Age: " + age);
   }
}
```

With this implementation, your provided Main class will create two Bunny instances and print their details as expected.

Learn more about Constructor: https://brainly.com/question/11879901

#SPJ11

Convert to different number system as mentioned.(17)10=(?)2​

Answers

“convert to a different number system as mentioned” there was no number system mentioned, but if you are just trying to find 17 * 10 = x * 2

all you need to do is find that 17 * 10 = 170 and 170/2 is 85 so

17 * 10 = 85 * 2

Which gateway can be used to provide internet access to an Oracle Cloud infrastructure compute instance in a private subnet

Answers

A NAT Gateway enables internet access for Oracle Cloud infrastructure compute instances in private subnets by providing translation between private and public IP addresses. This allows the instances to access resources on the internet while maintaining security and control.

The gateway that can be used to provide internet access to an Oracle Cloud infrastructure compute instance in a private subnet is called a NAT Gateway.

A NAT Gateway allows instances in a private subnet to access the internet while keeping them protected from inbound connections. It acts as a middleman between the private subnet and the public internet, translating the private IP addresses of the instances into public IP addresses.

Here's a step-by-step process of how to set up a NAT Gateway:

1. Create a NAT Gateway in the same Availability Domain as the private subnet.
2. Configure the NAT Gateway with an Ephemeral Public IP or assign it an Elastic IP (EIP) for persistent connectivity.
3. Create a route rule in the route table associated with the private subnet, directing traffic with a destination of 0.0.0.0/0 to the NAT Gateway.
4. Update the security list of the private subnet to allow outbound internet traffic.

By following these steps, the compute instances in the private subnet will have internet access through the NAT Gateway.

In summary, a NAT Gateway enables internet access for Oracle Cloud infrastructure compute instances in private subnets by providing translation between private and public IP addresses. This allows the instances to access resources on the internet while maintaining security and control.

To know more about IP addresses, visit:

https://brainly.com/question/33723718

#SPJ11

Which computer component is primarily responsible for converting input (data) into meaningful output (information)

Answers

The computer component that is primarily responsible for converting input (data) into meaningful output (information) is called; Central Processing Unit (CPU)

Central Processing Unit

When using a computer, it is based on the principle of garbage in, garbage out acting on specific programmes.

Now, when we give the computer an information in terms of an input, the component that will convert it into meaningful output (information) is called Central Processing Unit(CPU).

Read more about CPU (Processor) at; https://brainly.com/question/1702243

Which are true about using artificial intelligence? Select 2 options.

The user will always be able to figure out the computer's strategy.

The computer reaches a maximum level of skill.

Full implementation of AI is very complex.

The computer changes its performance based on experience.

The goal is that the computer will always win.

Answers

Answer:

Full implementation of AI is very complex, The computer changes performance based on experience

Explanation:

It's right, trust me.

Full implementation of AI is very complex, The computer changes performance based on experience. Thus, option C is correct.

What is artificial intelligence (AI)?

One of the requirements of a computer that can support artificial intelligence (AI) is that it should be able to deal with new situations based on previous learning. Artificial intelligence is when engineers try to discover different ways that they can use computers to perform tasks that a person otherwise would.

By doing this they are stimulating a computer to mimic these tasks and one day replace humans with certain activities with a robot. Even though the initial cloud computing services are just a decade old, a wide range of businesses, from small startups to multinational firms, government entities to non-profits, are already adopting the technology.

Therefore, Full implementation of AI is very complex, The computer changes performance based on experience. Thus, option C is correct.

To learn more about cloud computing, refer to the link:

brainly.com/question/29737287

#SPJ3

Tamimi Markets has a great new customer appreciation program with the name ""Tamimi Rewards"" (https://tamimimarkets.com/). These programs collect purchasing data and build consumer profiles. How can supermarkets such as Tamimi use these data to create value for the firm and consumers? Discuss.

Answers

Supermarkets like Tamimi can leverage the data collected through customer appreciation programs like Tamimi Rewards to create value for both the firm and consumers. Here's a step-by-step explanation of how this can be achieved:


By analyzing the purchasing data and consumer profiles, Tamimi can tailor personalized offers and promotions to individual customers. For example, they can send targeted discounts on products that a particular customer frequently buys or offer coupons for items similar to those the customer has previously purchased.

In conclusion, by utilizing the data collected through customer appreciation programs, supermarkets like Tamimi can create value for both the firm and consumers. Personalized offers, improved customer experience, loyalty programs, optimized inventory management.

To know more about Supermarkets visit:

https://brainly.com/question/32798381

#SPJ11

Difine Mainframe Computer~






\( \: \: \)
Thnx ~~​

Answers

Answer:

mainframe computer, informally called a mainframe or big iron, is a computer used primarily by large organizations for critical applications like bulk data processing for tasks such as censuses, industry and consumer statistics, enterprise resource planning, and large-scale transaction processing.

In this exercise, we have to use computer knowledge to define mainframe, so it is an integrated computer platform capable of processing large volumes.

What is a Mainframe Computer?

Mainframe is an integrated computer platform capable of processing large volumes of information in short periods of time. Currently, these platforms offer services to thousands of users through numerous terminals – directly connected or networked – using modern and flexible software.

See more about mainframe at brainly.com/question/5563113

The average external fragmentation is:
Select one:
a. It is twice the block size
b. It is 1/2 the total space minus the allocated space
c. It is 1/2 the block size
d. None of the other answers

Answers

The average external fragmentation is 1/2 the total space minus the allocated space that is in option b, as external fragmentation is a phenomenon that occurs in memory allocation when the free memory space is broken up into small segments over time due to the allocation and deallocation of different-sized memory blocks.

The average external fragmentation can be defined as the average amount of wasted memory per allocated block due to the fragmentation. This value can be calculated by subtracting the total amount of memory allocated from the total amount of memory available and then dividing the result by the number of allocated blocks.

Learn more about fragmentation here.

https://brainly.com/question/15734390

#SPJ4

You cannot remember the address of Kayah’s website. What type of tool will help you
locate/find it by typing in keywords to look for it?

Answers

Answer:

A search engine

Explanation:

View the pdf

The _________ file system manages metadata information. Metadata includes all of the file-system structure except the actual data (or contents of the files). The ________ file system manages the directory structure to provide the file-organization module with the information the latter needs, given a symbolic file name. It maintains file structure via file-control blocks

Answers

The metadata file system manages metadata information. Metadata includes all of the file-system structure except the actual data (or contents of the files). The directory file system manages the directory structure to provide the file-organization module with the information the latter needs, given a symbolic file name. It maintains file structure via file-control blocks

The metadata file system is responsible for storing information about files such as file size, creation date, and permissions. The directory file system manages the directory structure and provides the file organization module with information. The directory file system uses file-control blocks to maintain the file structure and keep track of where files are located within the directory tree. Both the metadata file system and directory file system work together to ensure that content is loaded and accessed efficiently.

Learn more about metadata and directory file systems:https://brainly.com/question/14960489

#SPJ11

The metadata file system manages metadata information. Metadata includes all of the file-system structure except the actual data (or contents of the files). The directory file system manages.

the directory structure to provide the file-organization module with the information the latter needs, given a symbolic file name. It maintains file structure via file-control blocks The metadata file system is responsible for storing information about files such as file size, creation date, and permissions. The directory file system manages the directory structure and provides the file organization module with information. The directory file system uses file-control blocks to maintain the file structure and keep track of where files are located within the directory tree. Both the metadata file system and directory file system work together to ensure that content is loaded and accessed efficiently.

Learn more about metadata file here:

brainly.com/question/14960489

#SPJ11

Brainliest if right please answer

Brainliest if right please answer

Answers

Answer:

b

Explanation:

hope it's helps you greatly :>

pls solve the problem i will give brainliest. and i need it due today.

pls solve the problem i will give brainliest. and i need it due today.

Answers

Answer:

1024

Explanation:

by the south of north degree angles the power of two by The wind pressure which is 24 mph equals 1024

How do I find a back door password on my computer?

Answers

Answer: It depends what you mean by "backdoor" if you mean "how do I change my password", than use cmd.

Explanation:

CMD (also known as Command Prompt) is a very powerful program used for Windows (assuming your using a windows). To change or disable any account on your computer use the following commands...

Change Password: net user <username> <password>

PRESS ENTER

Disable/Enable an account: net user <username> /active:<yes/no>

Be aware that if you disable all accounts on your computer you will not be able to access your computer. So use this command with caution. Should you decide to use command prompt, and you cannot gain access to an account, just go into recovery mode, and turn an unactive account active. Should you lose a password to your account, the recovery mode for your computer can work with this too.

If this does not answer your question, please let me know, and I will help you out.

Remember that there is no true way to protect your account without downloading 3rd-party programs that monitor your computer. But using cmd if someone gains access to your account, will always work. This will also allow you to gain access to the built-in Administrator account that if you have any problems on your main account, the built-in Administrator account should be used to fix any said issues.

where is the smart paging file located on a windows server by default?

Answers

The smart paging file on a Windows server is located by default in the system drive, which is usually the C drive. The smart paging file, also known as the pagefile or virtual memory, is a file that is used by the operating system as a temporary storage area for data that cannot fit in physical memory (RAM).

The Smart Paging File is a feature in Windows Server used to support virtual machines when they require additional memory resources. By default, the Smart Paging File is located in the virtual machine's configuration folder on the Windows Server. This folder is typically found at the following path: "C:\ProgramData\Microsoft\Windows\Hyper-V," but it may differ depending on your system's configuration and storage preferences. To ensure smooth operation of your virtual machines, it is essential to keep track of and manage the Smart Paging File's location and size.

When the system runs out of physical memory, it uses the smart paging file as a backup to store data temporarily.
The size of the smart paging file is determined by the operating system based on the amount of physical memory installed on the system. In most cases, it is recommended to leave the smart paging file settings at their default values. However, if you need to optimize the performance of your Windows server, you may consider adjusting the size of the smart paging file.
It is important to note that the location of the smart paging file can be changed manually by the system administrator. This can be done through the Advanced System Settings dialog box in the System Properties control panel. However, changing the location of the smart paging file should only be done by experienced system administrators who have a good understanding of the impact of such changes on the performance of the server.

Learn more about Windows server here-

https://brainly.com/question/30402808

#SPJ11

how do you play pokemon go

Answers

Download the app and make an account hope this helps!

Answer:

download the app then tap your screen for the rest of your life

(And I'm being serious)

The arrow next to All Programs indicates _____.

A. The importance of the item
B. That this was the most recently used item
C. The presence of a submenu
D. that this item cannot be selected
NEED HELP FAST!

Answers

Answer:

c is the answer.

Explanation:

Answer:

C - Presence of a submenu

Explanation:

got it right, computer class edge 22

TRUE/FALSE. in computer-based training settings, trainees receive a seminar presentation at their computers.

Answers

True, in computer-based training settings, trainees receive a seminar presentation at their computers.

This type of training allows individuals to learn at their own pace and access the information remotely, making it convenient and flexible for various learning styles. In a CBT seminar, trainees can access the seminar presentation at their own pace and convenience, and can review and repeat sections as needed. Computer Based Training  also allows for the integration of assessments and feedback, enabling trainers to evaluate trainee performance and provide personalized support and guidance. Overall, CBT can be an effective and efficient way to deliver training content to large numbers of trainees in a flexible and scalable manner, while also enabling trainers to track and evaluate trainee progress and performance.

Learn more about computer:https://brainly.com/question/24540334

#SPJ11

100 POINTS!!!!!!!!
To safeguard against losses of computer equipment and important information, businesses should train their employees about _____. Select 3 options.

A. not using unknown devices

B. securing unattended equipment

C. avoiding natural disasters

D. monitoring colleagues

E. not using free WiFi

Answers

Answer:

A, B and E

Explanation:

Option A is a correct choice, this is because using an unknown device and connecting it to a network may cause malware to spread on the network or allow a third party unauthorised access to the network.

Option B is also very important because it means that no equipment will be tampered with, keeping it secure is essential.

Option C is not correct as it is simply not possible.

Options D and E are, in my opinion, both correct but I would see how option E is more viable than option D.

Option E is a method hackers use to gain access or data from devices, they do this by making a network that is free and open to everyone and when a device connects, all the data is routed through that network and the person who created it (this is called a man in the middle attack).

Hope this helps!

A video conferencing application isn't working due to a Domain Name System (DNS) port error. Which record requires modification to fix the issue?

Answers

Answer:

Service record (SRV)

Explanation:

Service records (SRV record) are data records stipulating specifications of the DNS such as the port numbers, servers, hostname, priority and weight, and IP addresses of defined or cataloged services servers.

The SRV record is the source of information and the search site about the

location of particular services as such an application i need of such services will look for a related SRV record

A configured SRV is the source of the ports and personal settings for a new email client, without which the parameters set in the email client will be incorrect.

l
What do we call a statement that displays the result of computations on the screen?
ОА.
result statement
ов.
screen statement
OC output statement
OD
answer statement
OE.
input statement

Answers

Answer:

Output statement. The others do not make sense.

Please interpret the below results of Regression, Anova & Coefficients.

H1: There is a significant relationship between sales training and salesforce performance.

H2: There is a significant relationship between training program approaches and salesforce performance.

Answers

The results of the regression, ANOVA, and coefficients analysis suggest that there is a significant relationship between sales training and salesforce performance (H1), as well as between training program approaches and salesforce performance (H2).

The regression analysis indicates that there is a significant relationship between the independent variable (sales training or training program approaches) and the dependent variable (salesforce performance). The ANOVA results suggest that there is a statistically significant difference between the groups being compared, indicating that the independent variable has an effect on the dependent variable. Finally, the coefficients analysis provides information on the strength and direction of the relationship between the variables.Overall, these results support the hypotheses that there is a significant relationship between sales training and training program approaches and salesforce performance. This information can be used to make informed decisions about how to improve sales performance through effective training programs.

I'm happy to help you interpret the results of Regression, Anova, and Coefficients related to your hypotheses.  To determine if there is a significant relationship between the variables in H1 and H2, you need to look at the p-values of the coefficients in the regression analysis. If the p-values are less than 0.05, it indicates a significant relationship.
Perform a regression analysis using sales training and training program approaches as independent variables, and salesforce performance as the dependent variable. Check the p-values of the coefficients for sales training and training program approaches in the regression results.Interpret the results for each hypothesis:- For H1: If the p-value for the sales training coefficient is less than 0.05, it suggests a significant relationship between sales training and salesforce performance. Otherwise, there is no significant relationship. For H2: If the p-value for the training program approaches coefficient is less than 0.05, it indicates a significant relationship between training program approaches and salesforce performance. Otherwise, there is no significant relationship.Remember to include the actual p-values and results in your interpretation.

To know more about  training program visit:

https://brainly.com/question/29561931

#SPJ11

make sure to address the following issues/questions in your response: 1) identify and quantify the existing output gap, 2) identify and quantify the appropriate change in government spending for policy 1, 3) identify and quantify the appropriate changes in taxes for policy 2, and 4) identify and quantify the appropriate changes in government spending and taxes for policy 3.

Answers

The multiplier effect is a theory that claims that government expenditure on economic stimulus promotes private spending, which further stimulates the economy.

What Is the Multiplier Effect?The multiplier effect is a theory that claims that government expenditure on economic stimulus promotes private spending, which further stimulates the economy.The basic tenet of the theory is that government expenditure increases household income, which boosts consumer spending. The economy is then further stimulated as a result of rising business revenues, output, capital expenditures, and employment.The multiplier effect should eventually result in a rise in the overall gross domestic product (GDP) that is higher than the increase in government spending, according to theory.  A higher national income is the end result.

To Learn more About  multiplier effect refer to:

https://brainly.com/question/13440595

#SPJ4

Other Questions
you estimate that a used car will cost $8,250, the actual cost was $7,500, find the percent error after taking a bite of pizza, sensory receptors are stimulated in your mouth. what is the order of information flow that results? Is Phoebe a boy or girl in Ghostbusters?. This chapter described various situations that emphasize the need for controls. In the first sce- nario presented, a furniture store sells merchandise on credit. Based on the descriptions of controls given in this chapter, identify the various controls that should be implemented in the furniture store system to ensure that corrections to customer bal- ances are made only by someone with the correct authorization. In the second scenario illustrating the need for controls, an accounts payable clerk uses the system to write checks to suppliers. Based on the information in this chapter, what kinds of controls would you implement to ensure that checks are written only to valid suppliers, that checks are written for the correct amount, and that all payouts have the required authorization (6m-7)x4. Please help meeee Why are corporate and political criminal treated so much differently in the U.S. than are conventional criminals? define double fertilisation in breif with example ?? 1. Find two complementary angles if the measure of the large angle is 14 degrees more than the measure of the smaller angle.2. The measure of the smallest angle of a triangle is one-third the measure of the largest angle. The measure of the second angle is 37 degrees less than the measure of the largest angle. Find the measure of the angles of the triangle.3. The perimeter of a small rectangular garden is 9 feet. If the length is twice the width, find the width and length of the garden.4. Two bikers, Jose and Luis, start at the same point at the same time and travel in opposite directions. Jose's average speed is 2 miles per hour more than that of Luis, and after 5 hours the bikers are 70 miles apart. Find the average speed of each biker.5. Two boats leave a port at the same time, one going north and the other traveling south. The northbound boat travels 14 mph faster than the southbound boat. If the southbound boat is traveling at 53 mph, how long will it be before they are 1320 miles apart?6. The perimeter of a rectangular garden is 92 yards. The width of the garden is five yards less than twice the length. (a) Find the length and width of the garden. (b) What is the area of thegarden?7. An athlete knows that when she jogs along her neighborhoodgreenway, she can complete the route in 14 minutes. It takes 28 minutes to cover the same distance when she walks. If her jogging rate is 5 mph faster than her walking rate, find the speed at which she jogs. list three important about the gods and goddesses of ancient Greece. can you hurry, please A man pulled a food cart 4. 5 m to the right for 15 seconds. What is the average speed of the food cart to the nearest tenth of a m/s In Desert Exile, which phrase best describes how Uchida's family feels when they hearthat their father will be "coming home"? Magsb816 im waiting for you! According to Gandhi what is the worst form of violence and how does education and job skills play a role? what would you have done if you had a friend that couldn't stop with their month long pity party long enough for you to tell them that you are struggling so hard with so much and you have no idea how to deal with it. would you have gone off on them and stopped the friendship like i did, of would you have taken a different approach.also i hope you all are having a good day Part a:which of the following identifies a central idea of the text? a recent nursing graduate has not performed a dressing change on a central catheter for several months and is unsure of how to correctly perform this. the nurse should refer to the: air enters the compressor of a regenerative gas turbine cycle, at 310 k and 100 kpa, and is compressed to 900 kpa and 650 k. the regenerator has an efficiency of 80%, and air enters the turbine at 1,400 k. for a turbine efficiency of 90%, determine: at time t9, is the rate of the forward reaction greater than, less than, or equal to the rate of the reverse reaction? justify your choice. According to O*NET, what are common tasks performed by Veterinarians? Check all that apply.advising animal ownersoperating equipmenttreating sick or injured animalsfeeding and watering farm animalsexamining animalstraining animals Kayla and Josh are watching marathons of their favorite TV show. Episodes of Kayla's show are 120 minutes long, while episodes of Josh's show are 135 minutes long. If they start their TV binge at the same time, how many minutes will it be before they start another episode at the same time?