Suppose P, Q and R are ISPs with respective CIDR address blocks (with bytes in decimal) 51.0.0.0/8, 52.0.0.0/8 and 53.0.0.0/8. P then has customers A and B, to which it assigns address blocks as follows:
A: 51.10.0.0/16
B: 51.23.0.0/16
C: 52.14.0.0/16
D: 52.15.0.0/16
Q has customers C and D and assigns them address blocks as follows:(a).♢ Give forwarding tables for P, Q and R assuming they connect to each other and to each of their own customers.
(b). Now suppose A switches from provider P to provider Q, and takes its address block with it. Give the changes to the forwarding tables for P, Q and R; the longest-match rule will be needed to resolve conflicts.

Answers

Answer 1

Address blocks as 52.14.0.0/16, IP addresses come in static and dynamic varieties .The words IPv4 and IPv6 refer to Internet Protocol versions 4 and 6, respectively.

To whom are IP address blocks assigned?The Internet Assigned Numbers Authority (IANA) and five regional Internet registries (RIRs) are in charge of managing the IP address space on a global scale and are in charge of assigning IP addresses to local Internet registries, such as Internet service providers (ISPs) and other end users, in their respective regions.IP addresses come in static and dynamic varieties.The words IPv4 and IPv6 refer to Internet Protocol versions 4 and 6, respectively. IPv6 is the newest version of Internet Protocol and is far more efficient and sophisticated than IPv4. Difference IPv4 and IPv6 are the two options. The address length for IPv4 is 32 bits.    

To learn more about Address blocks refer to:

https://brainly.com/question/14183962

#SPJ4


Related Questions

Difference between single dimensional array and double dimensional array​

Answers

A one-dimensional array keeps track of a single list of elements with the same data type. An array of various arrays, a list of multiple lists, or an array of numerous one-dimensional arrays are all stored in a two-dimensional array. It is a list that represents several data pieces.

Which is the best explanation for why tutorials are useful?

Answers

Answer:

Tutorials are important for your learning because you can:

Solve problems in a team, develop your group skills, and get to know your peers better (which may come in handy when picking group members for group projects) Prepare for and/or review midterms and exams. Clarify any concepts that you might not understand.

Explanation:

Hope it helps

A UI text element must be added to ______.an empty background container game objecta prefaba slot game objecta tray objecta canvas

Answers

Answer:

canvas

Explanation:

The answer to this question is that A UI text element must be added to a canvas. The canvas is that area that all the unity items (UI) have to be inside.

We insert the Text UI element when we move to the hierarchy of the scene from create we move to UI and then to text.

After all these have been done, we will get a text element which have been added in the Canvas region.

The Clean Air Act Amendments of 1990 prohibit service-related releases of all ____________. A) GasB) OzoneC) MercuryD) Refrigerants

Answers

Answer:

D. Refrigerants

Explanation:

In the United States of America, the agency which was established by US Congress and saddled with the responsibility of overseeing all aspects of pollution, environmental clean up, pesticide use, contamination, and hazardous waste spills is the Environmental Protection Agency (EPA). Also, EPA research solutions, policy development, and enforcement of regulations through the resource Conservation and Recovery Act .

The Clean Air Act Amendments of 1990 prohibit service-related releases of all refrigerants such as R-12 and R-134a. This ban became effective on the 1st of January, 1993.

Refrigerants refers to any chemical substance that undergoes a phase change (liquid and gas) so as to enable the cooling and freezing of materials. They are typically used in air conditioners, refrigerators, water dispensers, etc.

Answer:

D

Explanation:

Write a program that asks the user how many numbers will be entered and then has the user enter those numbers. When this is done, report to the user the position of the first 7 entered and the last 7 entered. By position we mean, for example, that if the first 7 is the 2nd number entered then its position would be 2.

Answers

Answer:

The program written in Python 3 is as follows;

The program does not make use of comments; however, see explanation section for detailed line by line explanation of the program

num = int(input("Number of Inputs: "))

mylist = []

userinput = int(input("Enter a digit: "))

i = 1

while i < num:

     mylist.append(userinput)

     userinput = int(input("Enter a digit: "))

     i += 1

   

try:

     first7 = mylist.index(7)+1

     print('The first position of 7 is ',first7)

     last7 = num - 1 - mylist[::-1].index(7)

     print('The last position of 7 is ',last7)

except:

     print('7 is not on the list')

Explanation:

This line prompts user for the number of inputs

num = int(input("Number of Inputs: "))

This line declares an empty list

mylist = []

This line inputs the first number into the empty list

userinput = int(input("Enter a digit: "))

The italicized lines represent an iteration that allows user to input the numbers into the empty list.

i = 1

while i < num:

     mylist.append(userinput)

     userinput = int(input("Enter a digit: "))

     i += 1

The try-except is used to check the presence of 7 in the list

try:

This checks the first occurrence of 7

     first7 = mylist.index(7)+1

This prints the first occurrence of 7

     print('The first position of 7 is ',first7)

This checks the last occurrence of 7

     last7 = num - 1 - mylist[::-1].index(7)

This prints the last occurrence of 7

     print('The last position of 7 is ',last7)

The following is executed if there's no occurrence of 7

except:

     print('7 is not on the list')

See Attachments for sample runs

Write a program that asks the user how many numbers will be entered and then has the user enter those
Write a program that asks the user how many numbers will be entered and then has the user enter those

And office now has a total of 35 employees 11 were added last year the year prior there was a 500% increase in staff how many staff members were in the office before the increase

Answers

There were 5 staff members in the office before the increase.

To find the number of staff members in the office before the increase, we can work backward from the given information.

Let's start with the current total of 35 employees. It is stated that 11 employees were added last year.

Therefore, if we subtract 11 from the current total, we can determine the number of employees before the addition: 35 - 11 = 24.

Moving on to the information about the year prior, it states that there was a 500% increase in staff.

To calculate this, we need to find the original number of employees and then determine what 500% of that number is.

Let's assume the original number of employees before the increase was x.

If we had a 500% increase, it means the number of employees multiplied by 5. So, we can write the equation:

5 * x = 24

Dividing both sides of the equation by 5, we find:

x = 24 / 5 = 4.8

However, the number of employees cannot be a fraction or a decimal, so we round it to the nearest whole number.

Thus, before the increase, there were 5 employees in the office.

For more questions on staff members

https://brainly.com/question/30298095

#SPJ8

Type the correct answer in the box. Spell all words correctly.
To which type of domain does information on wikis belong?
The information on wikis belongs to the
domain.

Type the correct answer in the box. Spell all words correctly.To which type of domain does information

Answers

Answer:

.cc type of Domain

Explanation:

:)

Answer:

The information on wikis belongs to the public domain.

Explanation:

tutorials on edmentum

design the logic for a program that allows a user to enter a number. display the sum of every number from 1 through the entered number

Answers

Answer: int sum = 1, n;

do {cin>>n; sum+=n;}while (n!=0);

cout<<sum;

Explanation:

wite a short essay recalling two instance, personal and academic, of when you used a word processing software specifically MS Word for personal use and academic work

Answers

I often use MS Word for personal and academic work. Its features improved productivity. One use of MS Word was to create a professional resume. MS Word offered formatting choices for my resume, like font styles, sizes, and colors, that I could personalize.

What is MS Word

The software's tools ensured error-free and polished work. Using MS Word, I made a standout resume. In school, I often used MS Word for assignments and research papers.

Software formatting aided adherence to academic guidelines. Inserting tables, images, and citations improved my academic work's presentation and clarity. MS Word's track changes feature was invaluable for collaborative work and feedback from professors.

Learn more about MS Word  from

https://brainly.com/question/20659068

#SPJ1

You work at a print shop that produces marketing materials, and your manager asks you to install a new printer. The printer comes with two options for drivers. One uses PCL, and the other uses Postscript. Which driver is the best option and why

Answers

Since you work at a print shop that produces marketing materials, and your manager asks you to install a new printer. The drivers that is best is PCL, because it can be used in the office to print physical document while the Postcript can only be used for online document or pdf and since it is office job, PCL is the best.

What is PCL  printer?

PCL use depends on the device. This indicates that certain printed data, typically graphical data like fill areas, underlines, or fonts, is created by the drivers for this language by using the printer hardware. As a result, the print job can be processed by the computer fast and effectively. The production and processing of page data must then be finished by the printer.

Note that If you typically print from "Office" programs in general, use the PCL driver. If you wish to print PDFs more quickly or use professional DTP and graphics tools for the majority of your printing, pick the PostScript driver.

Learn more about printer driver from

https://brainly.com/question/14230829
#SPJ1

 A ………….. is a basic memory element in digital circuits and can be used to store 1 bit of information.

Answers

Answer:

A memory cell

Explanation: Research has proven that ;

The memory cell is also known as the  fundamental building block of computer memory.

It stores one bit of binary information and it must be set to store a logic 1 (high voltage level) and reset to store a logic 0 (low voltage level).

Design a class named StockTransaction that holds a stock symbol (typically one to four characters), stock name, number of shares bought or sold, and price per share. Include methods to set and get the values for each data field. Create the class diagram and write the pseudocode that defines the class.
Design a class named FeeBearingStockTransaction that descends from StockTransaction and includes fields that hold the commission rate charged for the transaction and the dollar amount of the fee. The FeeBearingStockTransaction class contains a method that sets the commission rate and computes the fee by multiplying the rate by transaction price, which is the number of shares times the price per share. The class also contains get methods for each field.
Create the appropriate class diagram for the FeeBearingStockTransaction class and write the pseudocode that defines the class and the methods.
Design an application that instantiates a FeeBearingStockTransaction object and demonstrates the functionality for all its methods.

Answers

The class diagram and pseudocode for the StockTransaction class is given below

What is the class?

plaintext

Class: StockTransaction

-----------------------

- symbol: string

- name: string

- shares: int

- pricePerShare: float

+ setSymbol(symbol: string)

+ getSymbol(): string

+ setName(name: string)

+ getName(): string

+ setShares(shares: int)

+ getShares(): int

+ setPricePerShare(price: float)

+ getPricePerShare(): float

Pseudocode for the StockTransaction class:

plaintext

Class StockTransaction

   Private symbol as String

   Private name as String

   Private shares as Integer

   Private pricePerShare as Float

   Method setSymbol(symbol: String)

       Set this.symbol to symbol

   Method getSymbol(): String

       Return this.symbol

   Method setName(name: String)

       Set this.name to name

   Method getName(): String

       Return this.name

   Method setShares(shares: Integer)

       Set this.shares to shares

   Method getShares(): Integer

       Return this.shares

   Method setPricePerShare(price: Float)

       Set this.pricePerShare to price

   Method getPricePerShare(): Float

       Return this.pricePerShare

End Class

Read more about StockTransaction  here:

https://brainly.com/question/33049560

#SPJ1

Chris wants to view a travel blog her friend just created. Which tool will she use?

HTML
Web browser
Text editor
Application software

Answers

Answer:

i think html

Explanation:

Answer:

Web browser

Explanation:

I don't get the width and height part (PLEASE HELP WILL GIVE BRAINLIEST ANSWER)

I don't get the width and height part (PLEASE HELP WILL GIVE BRAINLIEST ANSWER)

Answers

Answer:

What they're saying is that the first two bytes (first two eight bit segments) tell you the width and height of the pattern.

In the example given, you'll notice that the first 16 digits are 00000100 00000100.  If you convert those to decimal, you'll see that those are both equal to four.

If instead the second block of eight bits was 00000111, the image height would then be seven.

Question 6 of 10
In the MakeCode micro:bit reaction speed test program, what will the events
you include in the first step detect?
OA. The user's preferences
OB. The user's input
OC. The user's skill level
OD. The user's age

Answers

In the MakeCode micro:bit reaction speed test program, the events that you include in the first step would detect: B. The user's input.

What is the MakeCode micro:bit?

In Computer technology, the MakeCode micro:bit can be defined as a programming software that is designed and developed by Microsoft Inc., in order to enable the measurement of a student’s reaction time and speed in completing a circuit path on a cardboard pad.

Additionally, the reaction time and speed of a student can be measured in both an undistracted and a distracted environment.

In order to take the measurement of a user's reaction speed, the first step is to prompt him or her to press the "A" button, which in this context can be categorized as an input from the end user to the MakeCode micro:bit.

Read more on MakeCode here: brainly.com/question/26855035

#SPJ1

what is a circular reference?Explain with an example​

Answers

Explanation:

Circular references also occur in spreadsheets when two cells require each other's result. For example, if the value in Cell A1 is to be obtained by adding 5 to the value in Cell B1, and the value in Cell B1 is to be obtained by adding 3 to the value in Cell A1, no values can be computed.

A circular reference in Excel occurs when a formula directly or indirectly refers to its own cell.

______ are single numbers or values, which may include integers, floating-point decimals, or strings of characters.
A(n) _____ is a group of scalar or individual values that are stored in one entity.
A(n) ____ is a data type that is assigned a true or false value by a programmer.
A(n) ____is a data type that can be assigned multiple values.

Answers

Scalar Values are single numbers or values, which may include integers, floating-point decimals, or strings of characters.

A(n) array is a group of scalar or individual values that are stored in one entity.

A(n) user-defined type is a data type that is assigned a true or false value by a programmer.

A(n) abstract data type is a data type that can be assigned multiple values.

Answer:

they were so right and deserve brainlyist

Explanation:

Compare the memory efficiency of four different styles of instruction sets. The architecture styles are the following:

Accumulator: All operations use the accumulator register. Operands come from the accumulator and/or memory and the result of most operations is stored in the accumulator.
Memory-memory: All three operands of each instruction are in memory.
Stack: All operations occur on top of the stack. Only push and pop access memory, and all other instructions remove their operands from the stack and replace them with the result. The implementation uses a stack for the top two entries; accesses that use other stack positions are memory references.
Load-store: All operations occur in registers, and register-to-register instructions have three operands per instruction.

Answers

Compare the memory efficiency of four different styles of instruction sets. The architecture styles are the following:

Accumulator: All operations use the accumulator register. Operands come from the accumulator and/or memory and the result of most operations is stored in the accumulator.

Memory-memory: All three operands of each instruction are in memory.

Stack: All operations occur on top of the stack. Only push and pop access memory, and all other instructions remove their operands from the stack and replace them with the result. The implementation uses a stack for the top two entries; accesses that use other stack positions are memory references.

Load-store: All operations occur in registers, and register-to-register instructions have three operands per instruction.Compare the memory efficiency of four different styles of instruction sets. The architecture styles are the following:

Accumulator: All operations use the accumulator register. Operands come from the accumulator and/or memory and the result of most operations is stored in the accumulator.

Memory-memory: All three operands of each instruction are in memory.

Stack: All operations occur on top of the stack. Only push and pop access memory, and all other instructions remove their operands from the stack and replace them with the result. The implementation uses a stack for the top two entries; accesses that use other stack positions are memory references.

Load-store: All operations occur in registers, and register-to-register instructions have three operands per instruction.Compare the memory efficiency of four different styles of instruction sets. The architecture styles are the following:

Accumulator: All operations use the accumulator register. Operands come from the accumulator and/or memory and the result of most operations is stored in the accumulator.

Memory-memory: All three operands of each instruction are in memory.

Stack: All operations occur on top of the stack. Only push and pop access memory, and all other instructions remove their operands from the stack and replace them with the result. The implementation uses a stack for the top two entries; accesses that use other stack positions are memory references.

Load-store: All operations occur in registers, and register-to-register instructions have three operands per instruction.

please mark me as brainliest.............

follow me.............

.

Which operation will remove the originally selected information?
O Duplicate
O Copy
O Paste
O Cut

Answers

Answer:

D. the cut command

Explanation:

The acquisition of knowledge is learning true or false

Answers

Answer:

True

Explanation:

How would you spend your days if you had unlimited resources?

Answers

The ways that I spend my days if you had unlimited resources by helping the needy around me and living my life in a Godly way.

Are all human resources unlimited?

Human wants are said to be consistently changing and infinite, but the resources are said to be always there to satisfy them as they are finite.

Note that The resources cannot be more than the amount of human and natural resources that is available and thus The ways that I spend my days if you had unlimited resources by helping the needy around me and living my life in a Godly way.

Learn more about unlimited resources from

https://brainly.com/question/22964679

#SPJ1  

9. They are normally made of huge steel towers.
a. Transmission Lines
c. Distribution Substation
b. Transmission Substation
d. Distribution Lines

10. Voltage reduction is done through a attached through pole,
a. Transmission Transformer c. Distribution Substation . . b.DistributionTransfont
d. Disttid tihines​

Answers

Answer:

9. a (Transmission Lines )

10.a (Transmission Transformer)

The thing that are normally made of huge steel towers is a. Transmission Lines, option A is correct.

Voltage reduction is done through a attached through pole, a. Transmission Transformer, option A is correct.

What is Voltage reduction?

Voltage reduction has emerged as another tool utilities can use to lower demand, usually without the customer's knowledge. Yet, only the load's resistive part reacts to the drop in voltage by lowering aggregate demand.

Several electric utilities regularly use voltage reduction as a tool for energy conservation and as a way to lower system peak demand during emergency situations or, in some cases, during daily peak load periods.

Learn more about Voltage reduction at;

https://brainly.com/question/28164474

#SPJ3

The marketing company era marks the time when companies realized they needed to switch from just trying to sell
products to actually trying to satisfy the needs of customers.
True
False

Answers

Answer:

False

Explanation:

I hope this is right

Task 2:
The Car Maintenance team wants to add Tire Change (ID: 1)
maintenance task for all cars with the due date of 1 September,
2020. However, the team also wants to know that if an error occurs
the updates will rollback to their previous state. Create a script for
them to first add all tasks and then rollback the changes.

Answers

Assuming a person have a database table  that is said to be named "MaintenanceTasks" with  also a said columns "ID", "TaskName", "DueDate", as well as "CarID", the code attached can be used to add the Tire Change maintenance task.

What is the script  about?

The above  script is one that tend to make  use of  a SQL transaction to be able to make sure that all changes are said to be either committed or they have to be rolled back together.

Therefore, The IFERROR condition  is one that checks for any errors during the transaction, as well as if an error is know n to have take place, the changes are said to be rolled back.

Learn more about script from

https://brainly.com/question/26121358

#SPJ1

Task 2:The Car Maintenance team wants to add Tire Change (ID: 1)maintenance task for all cars with the

PLEASE FILL IN THE BLANK

With a bit depth of __ I can support 8 grayscale variations of black and white images.

Answers

Answer:   Thre correct answer is 3 bit

Explanation:

Using binary, a 3-bit value can support 8 variations in grayscale:

1   000

2   001

3   010

4   011

5   100

6   101

7   110

8   111

what is a Computer ?and it's demerits​

Answers

Answer:

Computer has making human life faster because of its incredible speed,Accuracy and storage, with which human can save anything and search it out easily when needed. We can say computer a versatile machine because it is very flexible in performing their jobs.

Answer:

Computer is an electronic device which takes the raw data and instructions as an input and process it and give the meaningful resut as an output.

Explanation:

Demerits of computer :

Carpal tunnel and eye strain

Depression

Waste our time

create a powerpoint presentation on various e commerce websites. compare them and write which one is your favourite and why

Answers

The e-commerce websites created for online shopping are shown on this slide, along with how customers may utilize them to compare prices and make purchases and PPT.

Thus, By providing information via various website services, you can raise audience engagement and knowledge. Internet stores Ppt Images and Graphics.

You can deliver information in stages using this template. Using this PPT design, you may also show information on products, exclusive discounts, and strong online websites. This style is entirely changeable, so personalize it right away to satisfy the demands of your audience.

A lousy PowerPoint presentation can detract from the excellent content you're providing with team stakeholders because of poor color choices or unclear slides.

Thus, The e-commerce websites created for online shopping are shown on this slide, along with how customers may utilize them to compare prices and make purchases and PPT.

Learn more about PPT, refer to the link:

https://brainly.com/question/31676039

#SPJ1

What allows a person to interact with web browser software?
O user interface
O file transfer protocol
O networking
O URLS

Answers

Answer:

user interface

Explanation:

Which of the following statements is TRUE of a peer-to-peer network?
A. Different parties have very different opinions on what can and can’t be shared through a peer-to-peer network.
B. In a peer-to-peer network, all files being shared are kept on one server. Anyone who wants to access one of those files can get it directly from the server.
C. A peer-to-peer network can create heavy traffic and makes download times increase significantly.
D. Creating a directory of which computers have certain files is an acceptable practice.

Answers

Answer:

A. Different parties have very different opinions on what can and can’t be shared through a peer-to-peer network.

Explanation:
CORRECT
Choice 'A' is very true.
There have been many arguments and court cases over what content can and cannot be shared through a peer-to-peer network. Users of these networks often argue that free speech allows us to share whatever we want online. Content creators on the other hand frequently sue for copyright infringement.


INCORRECT
Choice 'B' is describing a centralized system, not a peer-to-peer network. In a peer-to-peer network, there is no central location of files. Files are transferred directly from one computer to another without a middleman.

Choice 'C' is also not true of peer-to-peer networks. These networks are actually much more efficient than centralized systems because there is no large server holding all the files. It takes less time to download files from a peer-to-peer network because there is no centralized source of information and files.

Choice 'D' is also false; this was decided in the court case about Napster, one of the first large peer-to-peer networks. Having a centralized directory of who has which files is not considered free speech.

The peer-to-peer network is said to have varying views that form the basis of what can and cannot be shared. Thus, option A is correct.

What is a peer-to-peer network?

A peer-to-peer network is given as the connection of the computers that are linked with the following same responsibilities and permissions.

The network is said to have varying views. Many debates and court cases have erupted over what content can and cannot be shared over a peer-to-peer network.

Users of these sites frequently argue that freedom of speech allows us to share whatever we want on the internet.On the other hand, content creators frequently file copyright infringement lawsuits.

Thus, option A is correct.

Learn more about peer-to-peer networks, here:

https://brainly.com/question/1172049

#SPJ2

Press CTRL+W to save the document.
True
False

Answers

Answer:

False.

Explanation:

Pressing CTRL+W will close the current tab or window. To save a document, you can use CTRL+S or go to File > Save.

Answer:

False

Explanation:

Pressing CTRL+W closes the current window or tab in most applications, but it does not save the document.

Other Questions
How does the system of checks and balances promote a limited government? AgI + KNO3 what type of reaction is this A patient presents to the vascular lab with right arm and leg weakness and paresthesia, dysphasia, and amaurosis fugax in his left eye. A carotid duplex exam is performed. What would you expect to find on this exam based on the patient's symptoms Canadian rivers east of the Continental Divide flow toward the __________.A.Arctic OceanB.Pacific OceanC.Atlantic OceanD.Gulf of MexicoPlease select the best answer from the choices providedABCD Next, youll test your hypothesis by examining the reaction times of vinegar and baking soda in boiling water using four different concentrations of the reactants. Youll vary the concentrations by using tablespoon (7.5 milliliters), 1 tablespoon (15 milliliters), tablespoons (22.5 milliliters), and 2 tablespoons (30 milliliters) of water. Note that you will use the same amounts of vinegar and baking soda for each trial.Gather all the materials, and proceed with these steps:Boil at least 1 cup (240 milliliters) of water on a stove, on a hot plate, or in a microwave oven.Measure and record the actual temperature of the water.Measure the required amount of boiling water into the cup.Add teaspoon (1.5 grams) baking soda to the water, and stir until it is dissolved. The resulting solution will be clear.Measure out 1 tablespoon (15 milliliters) of vinegar, but do not pour it into the cup yet.Very quickly, do all of the following:a. Pour the measured vinegar into the cup.b. Start the stopwatch.c. Stir or carefully swirl the substances in the cup.The chemical reaction will produce bubbles. Youll be able to see the bubbles and hear them pop. Watch and listen for when the reaction stops. When it looks and sounds like it has finished, stop the stopwatch.Record the reaction time in the data table.Discard the solution down the drain, and rinse the cup.Repeat this procedure, doing three trials at each concentration. Record the average temperature and reaction time for each set of the three trials. Read this math review for a refresher on finding averages. 12. How will the temperature change in a room with an open refrigerator door, once equilibrium is established complete whatever is one that page...dont just write anything John Adams has a $95,000 adjusted gross income from Apple Corp. and allowable itemized deductions of $7200. Mary Eve has a $75,000 adjusted gross income and $3000 of allowable itemized deductions. Compute the total tax they would pay as unmarried individuals. Then compute their tax as a married couple filing a joint return. Someone please help me on both the questions!!! Please help me so I can get a better grade!!!! Four car rental companies charge a deposit plus a fee for each day an economy car is rented. Total Charge ($) Days Rented13Company A140270Company B105215Company C110210Company D100190 Which company charges the lowest deposit? Briannas pet lizard measures 15 centimeters long. Her goldfish measures 127 millimeters long. How many centimeters longer is Briannas lizard than her goldfish? The graph of y = x^2 is translated 6 units upward What are 5 different ways to represent the number 329.01. Justify your work by showing how your representation mathematically represents the target number. Demonstrate your understanding of our work-in-place value. NEED HELP NOW. I WILL BRAINLIEST A composite material product consists of an aluminum metal matrix reinforced by a 15% volume fraction of graphite fiber. Use the given properties of aluminum and graphite to determine:1. The density of the composite.2. The Mass fractions of the aluminum and graphite3. The transverse Youngs modulus of the aluminum/ graphite composite.4. The axial Youngs modulus of the aluminum/ graphite composite.5. Compare the results of the transverse and axial Youngs modulus of the pure aluminum alloy with the results of the transverse and axial Youngs modulus of the composite found in 3 and 4 and give the improvement or reduction percentages.Given: Aluminum rhom = 0.0027 g / mm3, E1m = E2m = 70 GPaGraphite rhof= 0.0018 g / mm3, E1f =220 GPa, E2f = 20 GPa how do ectotherms primarily control their body temperature? In the measurement of the length of a cylinder, the main scale reading of a vernier caliper is 2.8 cm, the vernier reading is 4, and the least count of the vernier is 0.01 cm. Find the reading of the length of the cylinder. can you help me with this What is this trying to ask me ???