The network layer in the Internet provides _________________.

a) comprehensive error and flow control.
b) limited error control, but no flow control.
c) comprehensive error control but limited flow control.
d) All of the choices are correct

Answers

Answer 1

The network layer in the Internet provides limited error control, but no flow control. The correct option is b) limited error control, but no flow control.

The network layer is responsible for routing packets through the Internet, handling IP addresses, and fragmentation. It provides limited error control using techniques such as checksums to detect corrupted packets, but does not offer flow control to manage the rate at which data is transmitted. Flow control is typically handled at the transport layer, which also provides more comprehensive error control through mechanisms like error correction, retransmission, and acknowledgements. Therefore, the correct option is b) limited error control, but no flow control.

Learn more about network layer visit:

https://brainly.com/question/29671395

#SPJ11


Related Questions

____ help one slide flow gracefully into the next during a slide show.

Answers

Transitions help one slide flow gracefully into the next during a slide show. Transitions are the effects that occur when moving from one slide to another.

They can include fading, sliding, or zooming effects that add a professional touch to your presentation. Using transitions can also help to keep your audience engaged and interested as you move through your presentation. It's important to choose transitions that are appropriate for the content of your slides and to use them consistently throughout your presentation. Too many or overly flashy transitions can be distracting and take away from the message you are trying to convey. With the right transitions, you can ensure a smooth and seamless flow throughout your presentation.

learn more about slide show here:

https://brainly.com/question/29898779

#SPJ11

q9. big o notations and runtime of algorithms: suppose you have the option of running three algorithms, alg1, alg2, alg3, with running times o(1000n ln n), o(n3), 300n2, respectively. which algorithm would you select (i.e., which one is the fastest according to big-oh analysis) to run on input instances with arbitrarily large sizes n?

Answers

Big O predicts how an algorithm's performance will change as the input size increases and uses this information to define the runtime necessary to carry out an algorithm. The runtime of your algorithm is not, however, indicated. Using time and space complexity, Big O notation evaluates your algorithm's effectiveness and performance.

What is Big O?A representation of an algorithm's worst-case complexity is Big O, commonly referred to as Big O notation. The complexity of an algorithm is described using algebraic language.Big O predicts how an algorithm's performance will change as the input size increases and uses this information to define the runtime necessary to carry out an algorithm. The runtime of your algorithm is not, however, indicated.Using time and space complexity, Big O notation evaluates your algorithm's effectiveness and performance.The hardware, OS, and CPU you utilise are a significant underlying component determining the effectiveness and performance of your software.When examining an algorithm's performance, however, you don't take this into account. What matters is the time and space complexity as a function of the amount of the input, not the other way around.

To Learn more About Big O Refer To:

https://brainly.com/question/29647434

#SPJ4

Big O uses this information to define the runtime required to execute an algorithm and predicts how an algorithm's performance will change as the input size grows.

However, your algorithm's runtime is not shown. Big O notation evaluates the efficiency and performance of your algorithm using time and space complexity.

Big O: What is it?

Big O, or Big O notation, is a representation of an algorithm's worst-case complexity. An algebraic language is used to describe an algorithm's complexity. Big O uses this information to define the runtime required to execute an algorithm and predicts how an algorithm's performance will change as the input size grows. However, your algorithm's runtime is not shown.

Big O notation evaluates the efficiency and performance of your algorithm using time and space complexity. The effectiveness and performance of your software are heavily influenced by the hardware, operating system, and CPU you use.

However, this is not taken into account when evaluating an algorithm's performance. The time and space complexity as a function of the quantity of input is what matters, not the other way around.

Learn more about Big O :

brainly.com/question/15691129

#SPJ4

Which of the following selectors will target this paragraph?

Paragraph 1


a) p
b) #firstP
c) p#firstP
d) all of the above

Answers

aaaaaaaaaaaaaaaaaaaaa

how do I make a table then print it with a graph in python? I am fine with using plugins.

Answers

To make a table and print it with a graph in Python, you can use the pandas library to create a DataFrame for the table.

What is python?

Python is a general-purpose, high-level programming language. Its design philosophy prioritizes code readability by employing significant indentation. Python is garbage-collected and dynamically typed.

Pandas, matplotlib, and plotly are some Python libraries that can be used to create tables and graphs. Here's an example of how to use pandas to create a table and then plot it with matplotlib:

import pandas as pd

import matplotlib.pyplot as plt

# create a sample table

data = {'name': ['John', 'Sara', 'Mike', 'Lisa'],

       'age': [25, 30, 28, 33],

       'salary': [50000, 60000, 55000, 65000]}

df = pd.DataFrame(data)

# display the table

print(df)

# plot the salary data as a bar chart

plt.bar(df['name'], df['salary'])

plt.xlabel('Name')

plt.ylabel('Salary')

plt.title('Employee Salaries')

plt.show()

Thus, in this example, we first import the pandas and matplotlib libraries. We then create a sample table using a Python dictionary and the pandas DataFrame function.

For more details regarding Python, visit:

https://brainly.com/question/30427047

#SPJ1

A common source of user misunderstanding and subsequent calls to help desks is poorly designed ____performance problema system burn in testuser documentation.

Answers

A common source of user misunderstanding and subsequent calls to help desks is poorly designed user documentation.

User documentation refers to any written or visual materials that provide information and guidance to users of a software system, hardware device, or other product.

Well-designed user documentation should be clear, concise, and easy to understand, with step-by-step instructions and visuals where appropriate.

However, poorly designed user documentation can lead to confusion, frustration, and mistakes on the part of users, which can result in calls to help desks or other forms of technical support. This can be especially true for complex software systems or products with many features or settings.

Other factors that can contribute to user misunderstanding and calls to help desks include poor system performance, such as slow response times or crashes, and problems with hardware components, such as malfunctioning devices or compatibility issues. Burn-in testing, which is a type of stress testing that is designed to identify potential hardware problems before a system is deployed, can help to minimize these types of issues.

Learn more about documentation here:

https://brainly.com/question/14096715

#SPJ11

What is the definition of Graphic AIDS?.

Answers

Any image that helps you, the reader, understand the text that the visual aid is accompanied with is referred to as a visual graphic or graphic aid.

Too frequently, readers lazily scan or entirely ignore graphs, diagrams, charts, and tables. Grid graphs, tables, bar charts, flow charts, maps, pie diagrams, and drawings and sketches are the most popular. Relationships are displayed using grid graphs. A visual aid should always be used in conjunction with preparation to interest the audience, improve their comprehension of your message, elicit an emotional response, and assist you in communicating it effectively. Charts, diagrams, graphs, maps, flashcards, posters, images, photos, booklets, folders, pamphlets, cartoons, and comics are examples of graphic aids.

Learn more about graphic here-

https://brainly.com/question/1169945

#SPJ4

a user cannot delete one of their files but is able to delete other files in their directory. john, a system administrator, is attempting to troubleshoot this issue. what command should he use first on the file?

Answers

The first command John should use is the ls -l command to check the file's permissions and ownership.

The output of this command will show the file permissions and the owner of the file. John can check whether the user has the appropriate permissions to delete the file or if the file ownership needs to be changed. If the file is owned by another user or group, John may need to change the ownership of the file to the user who wants to delete it. If the file permissions are incorrect, John may need to use the chmod command to modify the permissions of the file so that the user can delete it.

You can learn more about command at

https://brainly.com/question/31624655

#SPJ11

. (10 pts) describe how packet loss can occur at input ports. describe how packet loss at input ports can be eliminated (without using infinite buffers).

Answers

Packet loss at input ports occur due to congestion at the input port buffer. In cases where data is being sent at a higher rate than the buffer, packets start to queue up which causes congestion. When the buffer at the input port fills up completely, the new incoming packets are dropped thus leading to packet loss.

The following are some of the causes of packet loss at input ports:Overloading at the input port buffer: When the incoming traffic rate is higher than the buffer rate, packets may start queuing up which leads to congestion at the input port buffer. When the buffer is filled up, new incoming packets are dropped leading to packet loss. The buffer may be small or data may be coming in at a faster rate than the buffer can handle.Insufficient link capacity: If the link capacity of the incoming traffic is lower than the rate at which packets are arriving, the buffer may start dropping packets. The packets are dropped because the link can’t handle the rate at which the data is being sent, which leads to congestion at the input port buffer.Overprovisioned Links: Overprovisioned links can lead to packet loss because the input port will not be able to handle the rate of incoming data.

Overcoming packet loss at input portsThere are several methods of reducing packet loss at input ports. Here are some of the ways to reduce packet loss at input ports:RED (Random Early Detection) drops packets before the buffer fills up: RED has a better performance than WRED. When a packet arrives, the queue’s length is checked, if the length is above a certain threshold, the packet is dropped with a probability that increases as the queue length increases.Fair Queuing: Packets are divided into small flows, and each flow is assigned a queue. The number of packets in each queue is monitored and packets are dropped when they exceed the maximum queue length. It reduces packet loss by preventing a single large flow from congesting the buffer.TCP Window Size: The TCP window size can be reduced so that packets are not sent at a rate higher than what the buffer can handle. The disadvantage of reducing the TCP window size is that it reduces the overall throughput of the network. Explanation:Packet loss can occur at input ports when congestion occurs at the input port buffer.

To know more about incoming visit :

https://brainly.com/question/32332333

#SPJ11

Use a for loop to print all of the numbers from 23 to 89, with 10 numbers on each line (the last line will have less than 10 numbers). Print one space between each number.
Hint - think about what values would be at the end of each line and what they have in common (think about modular division). You can then add an if block inside your loop which prints a new line when one of these numbers is encountered
Programming language: Java

Answers

public class MyClass {

   public static void main(String args[]) {

       int count = 0;

     for (int i = 29; i < 90; i++){

         if (count == 9){

             System.out.println(i);

             count = 0;

         }

         else{

             System.out.print(i + " ");

             count++;

         }

         

     }

   }

}

I hope this helps!

Loops are used for operations that are to be performed repeatedly.

The for loop in Java is as follows:

for(int i = 23; i<=89; i++){

     System.out.print(i+" ");

     if(i%10==2){

         System.out.println();

     }

 }

The flow of the program segment is as follows:

//This iterates from 23 to 89

for(int i = 23; i<=89; i++){

//This prints all numbers from 23 to 29

     System.out.print(i+" ");

//The following if condition prints a line, after 10 numbers have been printed

     if(i%10==2){

         System.out.println();

     }

 }

See attachment for complete program and the sample run

Read more about similar programs at:

https://brainly.com/question/19309140

Use a for loop to print all of the numbers from 23 to 89, with 10 numbers on each line (the last line

who got houseparty and tryna play uno

Answers

Answer:

awww shiiiii yessss

Use nested for-loops to have the turtle draw a snowflake of polygons. Use the variable turnamount to turn after each shape and the variable n for the sides of the polygon

Answers

An interlocking loop is referred to as nested loop . These are frequently utilized while working in two dimensions, such as when printing stars in rows and columns.

How do two for loops that are nested work?

An inner loop encloses the body of an outer loop, creating a nested loop. In order for this to operate, the inner loop must be triggered by the outer loop's initial pass in order to begin working. The inner loop is then reactivated during the second transit of the outer loop.

The for loop may be nested, right?

For loops that are nested are placed inside of one another. With each outer loop iteration, the inner loop is repeated.

To know more about nested for-loops visit :-

https://brainly.com/question/13971698

#SPJ4

identity the advantages and disadvantages of the types of computers​

Answers

There are three sorts of computers based on their data handling capabilities: The analog computer. Computer that is digital. Computer hybrid. There are both benefits and drawbacks of using a laptop computer.

What are the benefits and drawbacks of computers?Nowadays, computers play an important part in human life. One of the most significant advantages of computers is their remarkable speed, which allows humans to complete tasks in a matter of seconds. The cost/stores are enormous - the amount of knowledge it is a coffee cost solution. A person can save a lot of data on a coffee budget. It is extremely speedy and allows us to do our work in record time. Stores Massive Datasets: Computers have the ability to store a significant amount of data. It is capable of storing files, documents, photos, and movies. Accur A disadvantage is defined as an unpleasant condition or something that puts someone in an undesirable situation.

To learn more about computers, refer to:

https://brainly.com/question/21474169

#SPJ4

Can covering up your laptop's camera with a sticky note damage it? I see some articles saying not to cover it and some to cover your camera.

Answers

Answer and Explanation:

I have a sticky note in front of my camera, just don't put the sticky part on the camera,

Bend it so that part of the sticky note is covering that top portion of your laptop, while also not covering your actually screen.

This makes sure that no one sees you if they were to hack into your camera with you knowing/not knowing

#teamtrees #PAW (Plant And Water)

digital camcorders are similar to conventional camcorders. a. analog b. manual c. electronic d. binary

Answers

Digital camcorders are similar to electronic camcorders. The correct answer is option c.

What are digital camcorders?

Digital camcorders are electronic devices that store videos and audio in a digital format. Digital camcorders are similar to electronic camcorders. Digital camcorders are devices that allow for the capture of still and moving images in digital form. It records videos on digital video tape or memory cards.

Electronic camcorders are recording devices that use solid-state memory or digital video tape to record video and audio data. They capture audio and video signals electronically, which are then stored in digital format. Some electronic camcorders have built-in hard drives, while others use removable media such as flash memory cards or tapes. Electronic camcorders are similar to digital camcorders since both utilize digital technology.

Learn more about Digital camcorders here: https://brainly.com/question/10944268

#SPJ11

You have decided to edit your photos using the RAW file. What are some benefits of working with the RAW format? Select all that apply.

RAW files are processed, making it easier to edit
The images are already optimized
More color options when editing
More control over adjusting the White Balance

Answers

Since you have decided to edit your photos using the RAW file, the  benefits of working with the RAW format is option d: More control over adjusting the White Balance.

What are the benefits of using RAW?

One of the biggest advantages of RAW is the ability to restore shadows and highlights during post-processing without adding the granular noise typically associated with high ISO settings. If you have significantly overexposed or underexposed, RAWs are fairly forgiving.

Therefore, it has Better detail and dynamic range as you can capture more detail and a wider dynamic range from your camera sensor because to RAW's vastly increased image information.

Learn more about RAW format from

https://brainly.com/question/27977505
#SPJ1

When Jimmy Fallon is outside the White House, his persona is mostly O A. humble O B. stern O c. gloomy O D. wild​

Answers

Answer:

a

Explanation:

blogs may refer to any kind of communication over the internet is true​

Answers

Answer:

Yes It's true but You forgot email

Explanation:

this text command defines how text will appear

Answers

In programming, the text command is not a specific command, but rather a term used to refer to a wide range of commands and functions that manipulate or display text.

What is a text command?

Text commands may include functions for formatting, searching, replacing, and displaying text within a program or on a screen. These commands may be used in a variety of programming languages, including C, as you mentioned.

In C, for example, there are many standard library functions that can be used to work with text. Some of the most commonly used functions for working with text in C include:

printf(): used to display formatted text on the screen or in a file

scanf(): used to read formatted text from the keyboard or a file

strcpy(): used to copy one string of text to another

strcmp(): used to compare two strings of text to determine if they are equal

strlen(): used to determine the length of a string of text

Overall, text commands are a crucial part of programming and are used extensively in applications that involve working with text data.

Learn more about text on:

https://brainly.com/question/20169296

#SPJ1

integer usernum is read from input. write a while loop that reads integers from input until an integer that is greater than or equal to 10 is read. then, find the sum of all integers read. the integer greater than or equal to 10 should not be included in the sum.

Answers

To solve this problem we need to use a while loop to read integers from input until an integer greater than or equal to 10 is read, and then find the sum of all the integers read (excluding the integer greater than or equal to 10).

To solve this problem, we need to first read the integer usernum from input. Then, we need to create a while loop that continues to read integers from input until an integer greater than or equal to 10 is read. Within the while loop, we will also calculate the sum of all the integers that are read, excluding the integer greater than or equal to 10.

Here's some sample code to illustrate this:

```
usernum = int(input("Enter an integer: "))
sum = 0
while usernum < 10:
   sum += usernum
   usernum = int(input("Enter another integer: "))
print("The sum of the integers is:", sum)
```

In this code, we start by reading the integer usernum from input using the `input()` function and converting it to an integer using the `int()` function. We also initialize a variable called `sum` to 0, which we will use to keep track of the sum of all the integers read.

Next, we create a while loop that continues to execute as long as the value of `usernum` is less than 10. Within the loop, we add the value of `usernum` to the `sum` variable and then read another integer from input using the `input()` and `int()` functions. This process continues until an integer greater than or equal to 10 is read, at which point the loop terminates.

Finally, we print out the sum of all the integers that were read (excluding the integer greater than or equal to 10) using the `print()` function.

In summary, to solve this problem we need to use a while loop to read integers from input until an integer greater than or equal to 10 is read, and then find the sum of all the integers read (excluding the integer greater than or equal to 10).

Learn more about integer usernum here:

https://brainly.com/question/21661364

#SPJ11

Anyone can answer this for me??

Anyone can answer this for me??

Answers

answer:

Vincent Van Gogh’s most popular painting, The Starry Night was created by Van Gogh at the asylum in Saint-Rémy, where he’d committed himself in 1889. Indeed, The Starry Night seems to reflect his turbulent state of mind at the time, as the night sky comes alive with swirls and orbs of frenetically applied brush marks springing from the yin and yang of his personal demons and awe of nature.

Explanation:

baste in my boook

What is the missing word?
if numA< numB: # line 1
numX = numA # line 2
numA > numB: # line 3
numX = B # line 4

Answers

Answer:

The answer is elif

Explanation:

I got it right in the assignment

The missing word in the given statement is as follows:

if numA< numB: # line 1

        numX = numA # line 2

        elif numA > numB: # line 3

        numX = B # line 4.

What is Elif?

Elif may be characterized as a short "else if" function. It is used when the first if statement is not true, but you want to check for another condition. If the statement pairs up with Elif and the else statement in order to perform a series of checks.

According to the context of this question, if-elif-else statement is used in Python for decision-making i.e the program will evaluate the test expression and will execute the remaining statements only if the given test expression turns out to be true. This allows validation for multiple expressions.

Therefore, The missing word in the given statement is Elif.

To learn more about Elif function in Python, refer to the link:

https://brainly.com/question/866175

#SPJ5

What different mechanisms could make the grain crusher work?

Answers

The post-cyclic behavior of biogenic carbonate sand was evaluated using cyclic triaxial testing through a stress control method under different confining pressures between 50 to 600 kPa

People who connect one network to another within the company or even across organizations are A. central connectors. B. boundary spanners. C. external specialists. D. peripheral specialists.

Answers

People who connect one network to another within the company or even across organizations are boundary spanners.  

People who serve as ambassadors to linking information and communications on informal networks within different department in an organisation and with other organisations or personnel  far and near for the good of their organisation are called Boundary Spanners.

The importance of Boundary  spanning in organisation includes

Exchange of expertise informationNurturing of connections with people from different part s of the world.Improved innovation in businesses

See more here: https://brainly.com/question/14728967

PLEASE BE CONFIDENT ABOUT YOUR ANSWER


Which of the following statements is FALSE?
the value of the ID attribute....

a. may not start with a number
b. must be unique within each document
c. must not start with a special character
d. should be lowercase?

Answers

Answer: d. should be lowercase.

Explanation:

ID attributes are case sensitive for the most part - DOM and Java Script - which means that the ID attribute does not always have to be lowercase.

It can be uppercase as well. ID attributes can also start with a number and as of HTML 5 can start with a special character as well. Finally, the ID attribute must always be unique within each document.

Answer:

d. should be lowercase?

Explanation:

Hope this helps

30points!!!! Plz answer quickly
Select the correct answer.
What should be the ideal position of the image in a video if it is the main feature of the video?
A. bottom
B. right
C. left
D. center

Answers

Answer:

center

Explanation:

that is the focal point

Answer:

D

Explanation:

since it's the main feature of the video it would be best to put it on the center so that all focus is on it because if you put it in the corner or another position it won't be the main feature and definitely not the center of attraction.

I hope you understand.and sorry if it's wrong

can you help me with my homework what should i do

can you help me with my homework what should i do

Answers

Answer:

what is matter and two examples

embedded software usually runs only during the boot process of a device. t or f

Answers

"Embedded software typically only operates during a device's boot phase." This claim is untrue.

The process of booting up, which a embedded system goes through between turning on the power and loading apps, is straightforward in theory but frequently more difficult in practice. Although the primary function of a bootloader is to load the operating system, software and hardware engineers have distinct perspectives on this process.

The concept of the system-boot process may be straightforward, but when you take into account different implementation alternatives, it gets complicated. An example of a well-known case study of a traditional boot sequence is Windows XP. The processor can receive post-reset configuration data via a variety of hardware and software methods. Different starting and kernel-code sizes, read- and write-performance requirements, and other factors are taken into account by primary and secondary boot options. A potent open-source technology called U-Boot (Universal Boot Loader) should be taken into account in Linux-based architectures.

Know more about Embedded software:

https://brainly.com/question/26422781

#SPJ4

What kind of software would you recommend a company use if its employees are receiving e-mails that are potentially hazardous ?
O Anti-spam software
O Bot software
O Microsoft Project
O Trojan software

Answers

Answer:

Microsoft project

Explanation:

I'm smart

Java Coding help please this is from a beginner's class(I AM DESPERATE)
The info is added in the picture

Java Coding help please this is from a beginner's class(I AM DESPERATE)The info is added in the picture

Answers

Answer:

import java.io.File;

import java.io.FileNotFoundException;

import java.util.*;

class Main {

 public static void main(String[] args) {

 try {

  Scanner scanner = new Scanner(new File("scores.txt"));

     int nrAthletes = scanner.nextInt();

     ArrayList<String> athletes = new ArrayList<String>();

     int winnerIndex = 0;

     Double highestAverage = 0.0;

     

  for(int i=0; i<nrAthletes; i++) {

       // Get the name of the athlete as the first item

       String athleteName = scanner.next();

       athletes.add(athleteName);

       

       // Start collecting scores

       ArrayList<Double> scores = new ArrayList<Double>();        

       while(scanner.hasNextDouble()) {

         scores.add(scanner.nextDouble());

       }

       

       // Remove lowest and highest

       scores.remove(Collections.min(scores));

       scores.remove(Collections.max(scores));

       

       // Calculate average

       double sum = 0.0;

       for(double score: scores) {

         sum += score;

       }

       Double averageScore = sum / scores.size();

       // Keep track of winner

       if (averageScore >= highestAverage) {

         highestAverage = averageScore;

         winnerIndex = i;

       }

       

       // Output to screen

      System.out.printf("%s %.2f\n", athleteName, averageScore );

  }

     // Output winner

     System.out.printf("Winner: %s\n", athletes.get(winnerIndex) );

  scanner.close();

 } catch (FileNotFoundException e) {

  e.printStackTrace();

 }

 }

}

Explanation:

Of course this code lacks error handling, but it shows an approach using the scanner object and array lists.

use humorous and monster in a sentence.

Answers

Answer: Here are a few...

1) The monstrous elephant trampled through the jungle crushing everything in its path.

2) Because it was so monstrous, the maid often got lost in the massive home she cleaned.

3) Monstrous amounts of foods are needed to feed the hundreds of refugees who showed up at the soup kitchen.

Explanation:

I hope this helps :D

Other Questions
Explain the public attitude the dealers had toward kino and his ""pearl of the world""? why was it different than their private attitude (what they thought behind kinos back)? in what way does the envelope address differ from the inside address in capitalization a small steel bead (d = 0.1 mm, rhos = 7900 kg m-3) is released in a large container of fluid. when the gravitational and drag forces on the bead balance, the drag force can be expressed as: Decide if each value is a solution of the inequality 2y 8.YSolution? ?2Y?3?4Y?5Y?6 y? + yy - 2y ?4y + 4Find the simplified quotient.y? 4y + 4y(+ 1) (-2)(-2)YO-2) 4(y + 1)4(y + 1) y(+1)(y-2)6-2) 0-2)OY(+1) 419 + 1)y0-2) (-2)(-2) a reduction in tax rates may result in individuals working more and an increase in real gdp. a tax cut evaluated using ___ would predict greater costs than ___. how many moles are in 3.14 x 10^25 particles of tin? Explain how you will find the height of the tree Rewrite each expression using properties 2(x + 4) - 3(x -5) PLEASE ANSWER ASAP!The formula for kinetic energy is KE = 1/2mv2. If you increase the velocity of an object by 1 m/s, describe the responding change in kinetic energy. The nurse instructs the patient discharged on anticoagulant therapy toA. limit intake of vitamin C.B. report symptoms of nausea to the physician.C. have blood drawn routinely to check electrolytes.D. be aware of and report signs or symptoms of bleeding. PLEASE HELP PLEASE I WILL GIVE BRAINLIEST Write your answer as a fraction in simplest form.6+(434)+(218) HELP ASAP PLEASE EXPLAIN PLEASE Thunder is heard 7.2 seconds after a bolt of lightning is observed. if the speed of sound is 349 m/s, how far away did the lightning strike? can some one plzz help me?? What are the 5 most important Bill of Rights? list three (3) criteria for acute care treatment for a client diagnosed with anorexia nervosa. 100 points Explainer: What is NATO, and what is its role in the Russia-Ukraine crisis? Newsela article Questions: Russia and Ukraine describe how their history with one another is tied to whats currently going on today. Question 2: what role does NATO play in the war between Ukraine and Russia? Cite one thing from the article to support your inference. find the equation of the plane parallel to the line =2 (4 7 8) and containing the points (8,7,7) and (7,5,9).