stateless file servers: a. require that each client request is self-contained, i.e., all information needed to locate the file and perform the requested operation is given. b. track which clients have exported volumes. c. are very secure. d. maintain states of all open files.

Answers

Answer 1

Stateless file servers require that each client request is self-contained, i.e., all information needed to locate the file & perform the requested operation is given.

What is file server?

In computing, a file server (or fileserver) is a computer connected to a network that offers a location for shared disc access, i.e. storage of computer files (such as text, image, sound, and video) that can be accessed by the workstations that can connect to the computer that shares the access through a computer network.

The term "server" draws attention to the machine's function in the conventional client-server architecture, where "clients" are the workstations that access the storage. The typical function of a file server is not to run programmes or carry out computations on behalf of its client workstations.

Learn more about file server

https://brainly.com/question/28141213

#SPJ4


Related Questions

The Decimal equivalent of the Hexadecimal number (50) is
computer

Answers

Answer:

80

Explanation:

(5x16^1) + (0x16^0) = 80

Sketch in a graph the course of the temperature of a refrigerator over time when it is opened for one minute. The temperature of the refrigerator was 4˚C before opening the door. Plot the time on the x-axis.

Answers

Refrigerators are generally regarded to operate best at temperatures about 37°F (3°C).

What is a temperature graph called?

A temperature of roughly 37°F (3°C) is considered suitable for refrigerators. The majority of uses, however, consider a temperature range of 33-40°F (0°C) to be safe. Foods can freeze when the temperature drops below 33°F, and they can deteriorate when the temperature rises to 40°F.

An annual temperature and precipitation chart for a specific location can be found in a climate graph. The figures on the left side of the chart are used to calculate temperature (oC). The graph shows the red dots that represent the average temperature for each month and the smooth red lines that connect the dots.

The fundamental climate of a place is depicted graphically in a climograph. The monthly average temperature and monthly average precipitation are the two variables that climatographs show data about.

To learn more about graph refer to:

https://brainly.com/question/19040584

#SPJ1

What's the smallest part of a computer

A microchip

A byte

A bit

A mouse click

Answers

Answer:

A byte

Explanation:

I just had that question on my quiz

A byte!
It can be referring to any sort of byte according to the question. (kilobyte would be pretty small)

Which of the following is not a natural resource

Answers

Explanation:

Hydro-electric energy is not a natural resource because people use turbines to convert the energy from moving water. Abiotic resources are those that come from non-living, non-organic material. Examples of abiotic resources include land, fresh water, air, rare-earth elements, and heavy metals including ores, such as gold, iron, copper, silver, etc.

A nonrenewable resource is a natural substance that is not replenished with the speed at which it is consumed. It is a finite resource. Fossil fuels such as oil, natural gas, and coal are examples of nonrenewable resources. ... Renewable resources are the opposite: Their supply replenishes naturally or can be sustained.

Wiliam would like to sort a list of items after the data is already entered
Which method is NOT an available sort option?
number
date
text
symbol

Answers

Answer symbol

Explanation:

Symbol is not an available sort option.

virtual conections with science and technology. Explain , what are being revealed and what are being concealed​

Answers

Some people believe that there is a spiritual connection between science and technology. They believe that science is a way of understanding the natural world, and that technology is a way of using that knowledge to improve the human condition. Others believe that science and technology are two separate disciplines, and that there is no spiritual connection between them.

What is technology?
Technology is the use of knowledge in a specific, repeatable manner to achieve useful aims. The outcome of such an effort may also be referred to as technology. Technology is widely used in daily life, as well as in the fields of science, industry, communication, and transportation. Society has changed as a result of numerous technological advances. The earliest known technology is indeed the stone tool, which was employed in the prehistoric past. This was followed by the use of fire, which helped fuel the Ice Age development of language and the expansion of the human brain. The Bronze Age wheel's development paved the way for longer journeys and the development of more sophisticated devices.

To learn more about technology
https://brainly.com/question/25110079
#SPJ13

what is 14.10 to the tenth power​

Answers

what i remeber is that when your trying to figure out to the tenth power u have to multiply it like for example:\(3^{2}\)power would be 9 because u had to multiply 3, 2 times so i think the answer is 310,592,615,939.35/310,592,615,939.4

In the TV special ' How the Grinch Stole Christmas,' what three words best describe the Grinch?

Answers

Answer:

Stink, Stank, Stunk!

Explanation:

which osi model layer takes a large chunk of data from the application layer and breaks it into smaller segments?

Answers

The OSI model layer that takes a large chunk of data from the application layer and breaks it into smaller segments is the transport layer (layer 4).

The transport layer is responsible for providing end-to-end communication services and ensuring the reliable delivery of data. It takes the data from the application layer and breaks it into smaller segments called packets, which are then sent over the network. The transport layer also handles error correction and flow control to ensure that the data is delivered correctly and efficiently.

Examples of protocols that operate at the transport layer include TCP (Transmission Control Protocol) and UDP (User Datagram Protocol).

You can learn more about the OSI model at: brainly.com/question/30544746

#SPJ11

Barriers to communication _____. Select 3 options.

1. are just an issue on cross-cultural teams
2. are inevitable, and there is nothing you can really do to remove them
3. apply to all communications, not just cross-cultural
4. can be anything that prevents someone from receiving and understanding a message that is communicated
5. may include language and communication style

Answers

Answer:

3. apply to all communications, not just cross-cultural.

4. can be anything that prevents someone from receiving and understanding a message that is communicated.

5. may include language and communication style.

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties.

An effective communication can be defined as an act that typically involves conveying or disseminating information efficiently and effectively from an individual (sender) to another (recipient) without any redundancy. Thus, effective communication ensures that messages or information are transmitted properly, guarantees a feedback, lacks the use of harsh tones, ensures both parties are well understood, gives room for clarity etc.

Barriers to communication refers to anything that prevents the successful transmission, receipt and understanding of a message and they;

I. Apply to all communications, not just cross-cultural.

II. Can be anything that prevents someone from receiving and understanding a message that is communicated.

III. May include language and communication style.

One advantage of putting information into a database is that you can filter the data.
O True
O False

Answers

Answer:

True.

Explanation:

One of the purposes of databases is to allow data lookup through queries, which is basically filtering data, using efficient algorithms too.

Answer:

True

Explanation:

An assembly language programmer wants to use a right shift to
divide an 8-bit signed number (0xD7) by 2. Should s/he use a
logical right shift or an arithmetic right shift? Why?

Answers

The assembly language programmer should use an arithmetic right shift to divide the 8-bit signed number (0xD7) by 2 because it preserves the sign of the number, ensuring accurate division.

In this case, the assembly language programmer should use an arithmetic right shift to divide the 8-bit signed number (0xD7) by 2. The reason for this is that an arithmetic right shift preserves the sign of the number being shifted, while a logical right shift does not.

An arithmetic right shift shifts the bits of a signed number to the right, but it keeps the sign bit (the most significant bit) unchanged. This means that if the number is positive (sign bit is 0), shifting it to the right will effectively divide it by 2 since the result will be rounded towards negative infinity.

In the case of the signed number 0xD7 (which is -41 in decimal), an arithmetic right shift by 1 will give the result 0xEB (-21 in decimal), which is the correct division result.

On the other hand, a logical right shift treats the number as an unsigned value, shifting all bits to the right and filling the leftmost bit with a 0. This operation does not consider the sign bit, resulting in an incorrect division for signed numbers.

If a logical right shift is applied to the signed number 0xD7, the result would be 0x6B (107 in decimal), which is not the desired division result.

Therefore, to correctly divide an 8-bit signed number by 2 using a right shift, the assembly language programmer should opt for an arithmetic right shift to ensure the sign bit is preserved and the division is performed accurately.

Learn more about assembly language:

https://brainly.com/question/30299633

#SPJ11

Adjust the code you wrote for the last problem to allow for sponsored olympic events. Add an amount of prize money for Olympians who won an event as a sponsored athlete.

The Get_Winnings(m, s) function should take two parameters — a string for the number of gold medals and an integer for the sponsored dollar amount. It will return either an integer for the money won or a string Invalid, if the amount is invalid. Olympians can win more than one medal per day.

Sample Run 1
Enter Gold Medals Won: 1
For how many dollars was your event sponsored?: 5000
Your prize money is: 80000
Sample Run 2
Enter Gold Medals Won: 2
For how many dollars was your event sponsored?: 25000
Your prize money is: 175000
Sample Run 3
Enter Gold Medals Won: 3
For how many dollars was your event sponsored?: 15000
Your prize money is: 240000
Sample Run 4
Enter Gold Medals Won: 4
For how many dollars was your event sponsored?: 1
Your prize money is: 300001

Answers

Here's the adjusted code that takes into account sponsored Olympic events and prize money for Olympians who won an event as a sponsored athlete:


The Program

d. ef  G e t _ W i n ni n gs(m, s):

   if  n o t   m  .  i  s d i gi t ( )   o r in t ( m) < 0:

       return "Invalid"

   else:

       nu m _ m e d a l s   =   i n t ( m )

       prize_money = 80 00 0 *n u m _ m e dals

       if  n u m _ m e da l s > 1:

           prize_money += 40 0 0 0 * ( n um _ medals-1)

       prize_money += s

       return prize_money

medals = input("Enter Gold Medals Won: ")

sponsored_amount = int(input("For how many dollars was your event sponsored?: "))

print("Your prize money is:", Get_Winnings(medals, sponsored_amount))

In this adjusted code, the Get_Winnings function takes two parameters: m for the number of gold medals won, and s for the number of dollars sponsored for the event. The prize money is calculated based on the number of medals won and the sponsored amount, using the same formula as in the previous problem.

To include the sponsored amount, the prize_money variable is increased by s. This assumes that the sponsored amount is added to the total prize money won by the athlete, rather than being a separate prize.

The main code block prompts the user for the number of gold medals won and the sponsored amount and then calls the Get_Winnings function with those values. The resulting prize money is printed on the console.

Note that in the sample runs, the prize money seems to be calculated based on the number of gold medals won, rather than the total number of medals won. If that is not the desired behavior, the prize money calculation can be adjusted accordingly.

Read more about programs here:

https://brainly.com/question/26134656

#SPJ1

Can you guys please help me? ;-;

Can you guys please help me? ;-;

Answers

A foul in sports such as basketball is an illegal personal contact with an opponent

A group of users can perform certain operations on a shared workbook. Which option helps them to update and track changes in the shared workbook?
a. add
b. edit
c. delete
d. view

Answers

Microsoft Excel's shared workbooks are available to a group of users, and they are capable of making modifications to them. The following option helps them in updating and tracking changes in a shared workbook:Option B: Edit.Shared workbooks make it easier for a group of users to perform operations on an Excel file.

You can share a workbook with other people on your team to allow them to make changes and add content to the workbook, without needing to copy and paste data from one workbook to another.A shared workbook in Microsoft Excel is a document that can be edited by multiple people at the same time. The changes made by each person are highlighted in a different color, so it's easy to see who made what changes and when. The Edit option helps users to make changes to the shared workbook. All the changes made by users will be tracked and recorded. This option allows multiple users to make changes to a shared workbook at the same time.Excel tracks all changes made to a shared workbook and displays them in a list. This helps users see what changes have been made, by whom and when. Excel also provides an option to accept or reject the changes made by users, allowing you to keep control over the data in your workbook.

To know more about Microsoft visit:

https://brainly.com/question/2704239

#SPJ11


Stephen is slowing down as he approaches a red light. He is looking in his mirror to switch lanes and misjudges how close Keisha's car is, rear-ending her car. When
they get out and assess the damage, Keisha's bumper will need to be replaced. What type(s) of insurance could Stephen use to cover this accident? Explain.
Krisha had some discomfort in her neck at the time of the accident but thought it was minor and would go away. A week or so after the accident, Keisha finally goes
What t) of insurance could Keisha use to cover this accident?

Answers

The type of insurance that Stephen could use to cover this accident is known as liability coverage

What t) of insurance could Keisha use to cover this accident?

The insurance that Keisha could use to cover this accident is personal injury protection.

In the case above, The type of insurance that Stephen could use to cover this accident is known as liability coverage as damage was one to his property.

Learn more about Property Damage from

https://brainly.com/question/27587802

#SPJ1

Which of the following correctly describe cell
protection in spreadsheet software? Choose all
that apply.
O Cell protection is a security feature used to
limit changes and visibility of data.
The contents of an unlocked cell cannot be
modified.
By default, cells are locked and not hidden.
Once activated, cell protection is guaranteed.

Answers

With worksheet protection, you may restrict user access to only specific areas of the sheet, preventing them from editing data. Worksheet-level protection is not meant to be a security feature.

What does Excel's cell protection mean?

Lock Particular Cells, After locking the cell, you must password-protect your document. In Excel, you must first unlock all of the cells before locking any particular cells. Choose every cell.

What are Excel's three protection options?

The three basic methods for securing an Excel sheet against theft or limiting modification options are: encrypting the workbook using Microsoft Excel's password protection feature; exporting the Excel workbook to a PDF file; and securing the workbook with a structural password.

to know more about spreadsheet software here:

brainly.com/question/1383473

#SPJ1

Answer: A & C

Explanation:

why are my images blocked on brainly

i just see gray and on every avatar and image

Answers

Answer:

they are not its just that people haven't changed their profile picture. i haven't yet lol

Explanation:

Answer:

Mines the same way.

Explanation:

Which type of motherboard expansion slot sends data one bit at a time over a serial bus?

Answers

PCIe type of motherboard expansion slot sends data one bit at a time over a serial bus.

Hence, option C is correct answer.

Why would a motherboard be used?

The circuit board determines the kinds of storage devices, memory modules, and graphics cards (among other expansion cards) that can connect to your Computer. It also distributes electricity from your power supply and links all of your hardware to your processor.

What does a PCIe do?

High-speed input output (HSIO) component connections are made via the PCIe, or peripheral component interconnect express, interface standard. Every motherboard for a high-performance computer contains a number of PCIe slots that can be used to add SSD (solid-state drive) add-on cards, RAID cards, GPUs, and WiFi cards.

Learn more about the Motherboard here: https://brainly.com/question/27851911

#SPJ1

NOTE: The given question is incomplete on the portal. Here is the complete question.

QUESTION: Which type of motherboard expansion slot sends data one bit at a time over a serial bus?

(A) RAM

(B) PCI

(C) PCIe

(D) PATA.

if a router us unable to find a valid ios image in other locations, what is the default last resort location for loading an ios?

Answers

If a router is unable to find a valid IOS (Internetwork Operating System) image in other locations such as Flash memory or a TFTP server, then the default last resort location for loading an IOS is the ROM (Read-Only Memory) on the router itself.

The ROM contains a limited version of the IOS known as the bootstrap program or boot loader, which can be used to recover a router that has lost its IOS image or has encountered a catastrophic failure.

The boot loader provides basic functionality such as initializing the hardware, loading the IOS image from the default location (ROM), and starting the router. Once the IOS is loaded into memory, the router can begin forwarding packets between networks. It is important to keep in mind that the IOS image stored in ROM is a limited version and does not contain all the features and functionality of a full IOS image stored in Flash memory or on a TFTP server. Therefore, it is recommended to always have a backup copy of the IOS image stored in a safe location in case of emergencies.

To know more about router click this link -

brainly.com/question/32128459

#SPJ11

In addition to the format commands that are found in the ribbon, which option is available for more extensive formatting?

A: Fix Cells dialog box
B: Format Cells dialog box
C: Format dialog box
D: Quick Access tool bar

Answers

i think it would prolly be d

Answer:

A

Explanation:


Select the correct answer from each drop-down menu.
Jeff writes a blog on digital photography. His most recent post was about visual artifacts. Identify the visual artifacts in the sentences below.
. A visual artifact of digital projectors is called
An inappropriate color difference in an image is called

Answers

Answer:

Screen-door effect

Explanation:

Answer:

An inappropriate color difference in an image is called: image noise

A visual artifact of digital projectors is called: fixed-pattern noise

Explanation:

trust me

Don is creating a very long document, and he would like to create an introductory page that contains the title of the document and the name of the author along with the date.

Answers

Answer:

This is a very good choice, to do so Don can insert a cover page. He can go to the options menu, pick the "insert" lash, and then to the "pages" square in the far left of the toolbox. There he will find a "cover page" section that will automatically add a cover page at the beginning of the document.

Explanation:

The reasons for this answer are that in the first place, it is very difficult to go o the first page of the document and move everything down because the format would be lost. Then, he would require to edit everything. It would also result in the same in case he only added a white page and started writing. So he needs a specific object that wouldn't damage the format if edited on the first page.

explain at least three important events during the first generation of programming language?

Answers

Answer:

Python, Ruby, Java, JavaScript, C, C++, and C#.

Explanation:

A programming language is a type of written language that tells computers what to do. Examples are: Python, Ruby, Java, JavaScript, C, C++, and C#. Programming languages are used to write all computer programs and computer software.

Which two statements describe features of an IPv4 routing table on a router? (Choose two.)​
a. Directly connected interfaces will have two route source codes in the routing table: C and S.
b. If there are two or more possible routes to the same destination, the route associated with the higher metric value is included in the routing table.
c. The netstat -r command can be used to display the routing table of a router.​
d. The routing table lists the MAC addresses of each active interface.
e. If a default static route is configured in the router, an entry will be included in the routing table with source code S.

Answers

It is configured to forward packets to a specific next-hop address or interface. This entry is represented with the source code "S" in the routing table.

The two statements that describe features of an IPv4 routing table on a router are:

a. Directly connected interfaces will have two route source codes in the routing table: C and S.

e. If a default static route is configured in the router, an entry will be included in the routing table with source code S.

Explanation:

a. Directly connected interfaces will have two route source codes in the routing table: C and S. The "C" source code indicates that the route is directly connected, meaning it is connected to the router's interface. The "S" source code indicates that the route is a static route manually configured on the router.

e. If a default static route is configured in the router, an entry will be included in the routing table with source code S. A default static route is a route that is used when there is no specific route available for a destination.

It is configured to forward packets to a specific next-hop address or interface. This entry is represented with the source code "S" in the routing table.

learn more about code here: brainly.in/question/30852876

#SPJ11

Write a design brief including a problem statement, criteria, and constraints.

PLease hurry it is due today!!!

Answers

Enjoy, It's one of my old ones!  <3

Write a design brief including a problem statement, criteria, and constraints.PLease hurry it is due

he core networks are generally comprised of fixed-line networks with switches, routers and servers. For the same reason as in Question 3, they need to be left running all the time to provide the service level agreement (SLA). However, there are some opportunities to reduce the energy consumption in the core network while keeping them running. a) Describe at least 2 methods that can be used to reduce the energy consumption in the core network, including the routing algorithm. (4 marks) b) A benchmarking model can be used to evaluate the energy cost of networking devices in the core network, to predict and compare the energy consumption of networking equipment via software tools, i. ii. Describe one of the benchmark schemes available in the literature. (2 marks) Identify at least 4 of the main parameters that should be measured and explain why these are important. (2 marks) Evaluate the accuracy of such a benchmark scheme. (2 marks)

Answers

a) Methods to reduce the energy consumption in the core network are as follows: Packet switching: This method sends the data in packets, and it is more efficient than sending the data in a whole.

The routing algorithms used in the packet switching method include shortest path, flooding, and broadcast. Therefore, this method reduces the energy consumption of the core network due to its routing algorithms.

Enhanced network architecture: It measures the effect of network architecture on the energy consumed.

The accuracy of the benchmark scheme is good because the benchmark model is used to determine the energy consumed by a device in the laboratory.

The laboratory tests and results are evaluated and published in peer-reviewed journals, which increases the benchmark scheme's accuracy.

To know more about network visit :

https://brainly.com/question/1167985

#SPJ11

Company B is setting up commercial printing services on their network. Which of these are advantages of centrally managed commercial printers? Check all that apply.

Answers

Answer:

Centralized management of printing activities, allowing administrators to manage all print devices using a network.

Explanation:

The advantages of centrally managed commercial printers are:

Printers can be easily created and deployed in virtual sessions such as Citrix or VMwareCentralized management of printing activities, allowing administrators to manage all print devices using a network.Reduces the number of printer related issues thereby increasing productivity.It provides a way of keeping record those who are printing and what have been printerAll print related jobs can be easily managed from a central controlled network.Increased security as a print server allows you to total control over who can print what and where High availability and redundancy due to pooling of printers Easily customize printer profile

which medium requires a ground on the support before applying paint?

Answers

Answer: yo

Explanation: mom

as a security analyst, you suspect a threat actor used a certain tactic and technique to infiltrate your network. which incident-response framework or approach would you utilize to see if other companies have had the same occurrence and what they did to remedy it

Answers

The incident-response framework or approach would you utilize to see if other companies have had the same occurrence and what they did to remedy it is a communication plan with stakeholders. The correct option is A.

What is security?

Any business or organization must prioritize security. We transmit the data to the recipient in a highly secure manner to prevent unauthorized access.

The security specialist must ensure that the reply came from the security specialist to the leader of the accounting team with the aid of message encryption and digital signatures, and the specifics of the reply must be kept a secret.

Therefore, the correct option is A, a Communication plan with stakeholders.

To learn more about security, refer to the link:

https://brainly.com/question/28070333

#SPJ1

The question is incomplete. Your most probably complete question is given below:

Communication plan with stakeholders

Cyber Kill Chain

Mitre Attack

Diamond Model of Intrusion Analysis

Other Questions
Setting goals is an integral part of being successful in your own development, including your career path. To help you stay on track throughout your college program, and develop your career for after Convocation, we're going to set 4 goals! Task: Review the criteria for S.M.A.R.T. goals that we went over in class. Independently, create 4 S.M.A.R.T. goals for yourself. Each goal should include enough detail to clearly articulate the S.M.A.R.T. elements! 1 goal for this semester (within 4 months) 1 goal for personal development (not school or work-related) 1 goal for Term 4 1 goal for after Convocation (Long Term) What is the normal average heart rate for adults? A backpack is on sale for 30% off. If the sale price is $15.75, what is the original price to the nearest cent? which expression is equivalent to 15 x^3 z^5/ 3 x^7 z^-5A 12/x^10B 5x^4C 5(x/z)^10D 5(z/x)^10E 12(z/x)^10 the research tool showing the relatives known by an individual or "ego" is a(n) Which signal word shows effect?consequentlyon account ofbecauseone reason for A pendulum's first swing has an arc of 36 inches. As the pendulum swings back and forth, the arc length for each successive swing is 95% of the previous swing. If this pattern continues, at which swing of the pendulum will the length of the arc be less than 27 inches? A. 5th B. 6th C. 7th D. 9th adaptation of nerve cell [ blank ] refers to the care of your body and the way your body functions. What can be 100% guaranteed with matrilineal descent as opposed to patrilineal descent? Michelle works at a beauty salon. last month she received an average tip of $9 from her 88 clients. what was her tip income for a month? consider a sequence of random variables y1,y2,.... where each yi is bernoulli. random variable x equals the value of i such that y i$$ is the first y with value 1. the random variable x is give a real life example pls Give sample situation for each where Z-test and T-test is being used in Civil Engineering -20 = 2(n=3)What is the variable n?PLEASE SOLVE QUICK the taxable resources of a government jurisdiction are known as The area of a rectangular hotel room is 260 square feet. The perimeter is 66 feet. What are the dimensions of the room?____ feet by ____feet 1. Using ethanol as a solvent in today's synthesis produces an ether as a side product. Predict this product and propose a mechanism for its formation. 2. Treating ethers with hydrobromic acid (HBr) cleaves the ethers into two alkyl bromides. Using the ether product you predicted in question 1. deduce the identity of both of the alkyl bromide products produced when it is treated with HBr. Draw the two mechanisms for their formation 1. The little boy became drowsy as the day turned into night. The word drowsy means a. Active b. Tired c. Energetic d. Desperate2. In the following sentence, identify the dependent clause: Squid ink is the common ingredient, and it must be used in the dish, if the contestant is to win the Iron Chef America competition. a. Squid ink is the common ingredient b. It must be used in the dish c. if the contestant is to win the Iron Chef competition3. Please refer to Story A1 and answer the following question. Which of the following words would best fit into the blank in the final sentence of the passage? a. Scapegoat b. Hero c. Leader d. Victim4. Please refer to Story A1 and answer the following question. Based on the description of the settling of the novel Sulam which of the following adjectives would most likely describe the behavior of many of its residents? a. Furtive b. Suspicious c. Eccentric d. Unkempt5. Select the item that is a sentence fragment. a. Purdue offers many majors in engineering. b. Coach Dietz exemplified this behavior by walking off the field in the middle of a game. c. I need to find a new roomate. d. Which is why we believe the proposed amendments should be passed.6. Please refer to Story A3 and answer the following question. The sighting of the pony-rider is told from which viewpoint? a. A person sitting on a porch b. A passenger inside a stagecoach c. A passenger in a hot air balloon d. A person picnicking7. Select the item that is a complete sentence. a. Such as electrical, chemical, and industrial engineering. b. Leaving her team at a time when we needed her. c. Because the one I have now isn't working out too well. d. The current city policy on housing is incomplete as it stands.8. The people watched with awe as the eagle flew above them. The word awe means a. Anger b. Calm c. Terror d. Wonder9. Please refer to Story A3 and answer the following question. Which of the following is not supported by the passage? a. The mail was strapped in a pouch under the rider's thighs. b. The rider rode great distances to deliver the mail. c. People did not care about the Pony Express rider. d. Usually eighty pony riders were in the saddle at any given time10. Verb tense is a characteristic that tells the reader or listener a. The time period the verb is describing b. Clues to the meaning of the verb c. The action that the subject is doing d. The action that is being done to the subject11. The point of view in which the author knows what every character is thinking at all times is called a. First person b. Third person limited c. Third person omniscient d. None of the above12. Please refer to Story A3 and answer the following question. Based on the tone of the passage, which of the following words best describes the author's attitude toward the Pony Express rider? a. Indifference b. Fear c. Bewilderment d. Excitement13. Select the item that is a sentence fragment. a. Purdue offers many majors in engineering. b. Coach Dietz exemplified this behavior by walking off the field in the middle of a game. c. Which is why we believe the proposed amendments should be passed. d. I need to find a new roommate.14. One function that a topic sentence does NOT perform is a. It states one of the main points in the discussion b. It tells the reader what the paragraph is about c. It has two parts: topic and point of the essay. d. It helps the writer write the paragraph by controlling what is put into it Helppp meee please!! A friend of yours is a home builder. She has offered to buy you tickets to a sold-out concert in exchange for footage from your sUAS of the construction site. Which of the following is TRUE: