what term does the osi model use that is different from the tcp/ip model uses to refer to frame, packet, and segment?

Answers

Answer 1

The OSI model uses the terms "Data Link Layer," "Network Layer," and "Transport Layer" to refer to the equivalent of a "frame," "packet," and "segment," respectively, in the TCP/IP model.

The OSI (Open Systems Interconnection) model and the TCP/IP (Transmission Control Protocol/Internet Protocol) model are two different networking models that describe the different layers of communication in a network.

In the OSI model, the terms used to refer to the equivalent of what is known as a "frame," "packet," and "segment" in the TCP/IP model are:

Frame: Data Link LayerPacket: Network LayerSegment: Transport Layer

Learn more about OSI: https://brainly.com/question/29738603

#SPJ4


Related Questions

Online retailers can and should encourage every customer to sign up for regular emails from the retailer. To avoid spam filters, retailers should Group of answer choices automatically send regular emails to all customers send emails to all customers except those who request to be taken off the email list provide a check box that is checked by default during the checkout process for customers to sign up for emails provide a check box that is unchecked by default during the checkout process for customers to sign up for emails ANS:DPTS:1

Answers

Answer:

Provide a check box that is checked by default during the checkout process for customers to sign up for emails

Explanation:

I've seen this used the most so I would go with this answer.

The way online retailers get you is by showing you a prechecked email subscription with an unchecked TOS agreement. Your attention is then focused on the TOS agreement and not the agreement for promotions sent to you via email.

Aking sense of the death, the social consolidation after a death occurs, and caring for the dying are all functions of the: Multiple choice question. Sociology of death. Determinants of death. Death system. Psychology of death

Answers

The Death System is responsible for understanding the death, the social consolidation after a death occurs, and caring for the dying as it is the functions of the Death System.

The Death System comprises funeral homes, hospitals, cemeteries, crematoria, and various other entities that work to address the needs of the dying, the deceased, and the bereaved.A good understanding of the Death System is critical since it will help in comprehending the ways in which death and dying can affect various sectors of society.

The sociology of death is the study of the social structure, processes, and culture that surrounds death and dying. The determinants of death are the factors that cause or contribute to an individual's death. The psychology of death is the study of the psychological and emotional responses to death and dying.

To know more about responsible visit:

https://brainly.com/question/28903029

#SPJ11

which of the following must be true to remotely wipe your phone? the phone must have the correct app downloaded. the phone must be turned on. the phone must be connected to the internet. the phone must be associated with an email account.

Answers

Answer: the phone must be connected to the internet

Explanation:

A two-cavity klystron operates at 5 GHz with D.C. beam voltage 10 Kv and cavity gap 2mm. For a given input RF voltage, the magnitude of the gap voltage is 100 Volts. Calculate the gap transit angle and beam coupling coefficient.

Answers

The gap transit angle and the beam coupling coefficient of the two-cavity klystron are given as below:Calculation of gap transit angle:The gap transit angle is given by the relation,θg = (2π × fg × L) / (vz)where fg is the operating frequency of the klystron, L is the length of the drift space, and vz is the axial velocity of the electron beam.

In this case, the operating frequency of the klystron is given as 5 GHz. The drift space length is calculated as follows:L = (d1 + d2 + 2a) = (2 × 0.01 + 0.002) m = 0.022 mwhere d1 and d2 are the lengths of the cavity resonators, and a is the cavity gap length. We know that the axial velocity of the electron beam can be calculated as,vz = (2 × e × DC voltage / m)^(1/2) = (2 × 1.6 × 10^-19 × 10 × 10^3 / 9.1 × 10^-31)^(1/2) = 2.67 × 10^7 m/swhere e is the electronic charge, DC voltage is the beam voltage, and m is the mass of the electron.

Therefore, the gap transit angle is given as,θg = (2π × 5 × 10^9 × 0.022) / (2.67 × 10^7)≈ 5.88 degrees.Calculation of beam coupling coefficient:The beam coupling coefficient is given by the relation,k = VG / Vbin which VG is the output voltage of the second cavity and Vb is the input voltage to the first cavity. VG can be calculated as follows:VG = QL × Vgwhere QL is the loaded Q-factor of the second cavity, and Vg is the gap voltage.In this case, Vg is given as 100 V.

The loaded Q-factor can be calculated as follows:QL = (2π × fg × L) / Rwhere R is the resistance of the second cavity. The resistance of the second cavity can be calculated as,R = (4Q^2 / RL)where Q is the unloaded Q-factor and RL is the loaded resistance of the second cavity. We know that the unloaded Q-factor is given as,Q = (ω × L) / (R0 × C)where R0 is the characteristic resistance of free space, and C is the capacitance of the second cavity. The capacitance of the second cavity can be calculated as,C = ε0 × A / dwhere ε0 is the permittivity of free space, A is the cross-sectional area of the second cavity, and d is the length of the cavity gap.

To know more about capacitance  visit:

https://brainly.com/question/31871398

#SPJ11

!! please help!!

What technique is used in this code to repeat the process for each value in the array?

a. pause blocks
b. a repeat loop
c. a for loop
d. an array block​

!! please help!! What technique is used in this code to repeat the process for each value in the array?a.

Answers

Answer:

C: A for loop.

Explanation:

The for loop is used to repeat a section of code known number of times.

Which term describes a network, network link, or channel located between the endpoints of a VPN?One-way functionHost-to-host networkSite-to-site networkIntermediary network

Answers

In summary, the term "Intermediary network" refers to the network, network link, or channel that exists between the endpoints of a VPN, enabling secure communication and data transmission between the VPN users or sites.

What term describes the network, network link, or channel between the endpoints of a VPN?

The term that describes a network, network link, or channel located between the endpoints of a VPN is "Intermediary network."

An intermediary network refers to the infrastructure or network components that facilitate the communication between the endpoints of a VPN (Virtual Private Network).

It acts as a middle layer or transit network through which the encrypted data travels between the VPN endpoints.

In the context of VPNs, an intermediary network can include various network elements such as routers, switches, gateways, and transmission lines.

These components ensure the secure and reliable transmission of data between the VPN endpoints while maintaining the privacy and integrity of the communication.

The intermediary network plays a crucial role in establishing the VPN tunnel and encrypting the data before transmitting it over the public or shared network infrastructure.

It helps create a secure and private communication channel between the VPN endpoints, allowing users to access resources and communicate securely over an untrusted network like the internet.

By utilizing encryption protocols and other security mechanisms, the intermediary network helps protect the confidentiality of the data being transmitted and safeguards it from unauthorized access or interception by external entities.

Learn more about Intermediary network

brainly.com/question/31450131

#SPJ11

An instance of ________ describes programming errors, such as bad casting, accessing an out-of-bounds array, and numeric errors. RuntimeException Exception Error Throwable NumberFormatException

Answers

An instance of Runtime Exception describes programming errors, such as bad casting, accessing an out-of-bounds array, and numeric errors.  

What is a runtime exception?

The Runtime Exception is known to be the parent class that is often seen  in all exceptions of the Java programming language that are known to crash or break down the program or application when they happen.

Therefore, An instance of Runtime Exception describes programming errors, such as bad casting, accessing an out-of-bounds array, and numeric errors.

Learn more about Runtime Exception from

https://brainly.com/question/3620278

#SPJ1

data from the hard drive reaches the cpu ___ than data from the ram.

Answers

Data from the hard drive reaches the CPU slower than data from the RAM.

When the CPU needs to access data, it first checks the faster memory hierarchy, starting with the cache and then the RAM. If the required data is not found in these faster memory locations, the CPU needs to fetch it from the slower storage devices, such as the hard drive. Accessing data from the hard drive involves mechanical movement and seeks, which significantly slows down the retrieval process compared to the near-instantaneous access of data from RAM.

The CPU's speed and performance heavily rely on the speed of data access from the RAM, which is much faster than accessing data from the hard drive. That's why modern systems utilize various levels of cache memory to store frequently accessed data closer to the CPU, minimizing the need to access slower storage devices like the hard drive.

Learn more about CPU's speed here:

https://brainly.com/question/31603044

#SPJ11

________ consists of all the electronic and mechanical parts used in computers.
(A) Hardware
(B) Software
(C) Program
(D) None of these

Answers

The correct option is (A) Hardware.

Hardware consists of all the electronic and mechanical parts used in computers. It encompasses everything that is physically present on a computer system, such as the CPU, RAM, hard drive, motherboard, keyboard, and mouse. It is the foundation on which software applications are built, providing the processing power, memory, and storage capacity needed to run software programs.

In computing, hardware is the collection of all the physical components that make up a computer system. This includes items such as the keyboard, mouse, monitor, CPU, hard drive, memory, and any other components that are necessary for a computer to function.

To know more about Hardware refer to:

https://brainly.com/question/3186534

#SPJ11

do earthquakes ever happen in Malaysia?​

Answers

The correct answer to this open question is the following.

Although there are no options attached we can say the following.

Do earthquakes ever happen in Malaysia?

Yes, they do. And they are very frequent and high in intensity.

For instance, the Sabah earthquake in 2015.

On June 5, 2015, the region of Malaysia was hit by a strong earthquake, 6.0 of magnitude on the Ritcher scale. The telluric movement lasted 30 seconds and caused much destruction.

Experts and scientists confirm that this had been the strongest earthquake since the one presented in 1976.

to set up a file to perform file i/o, you must declare:

Answers

To perform file I/O in a programming language, you must declare a file object, which includes the file name, mode, and path.

The file object is a variable used to access the file data and perform operations such as reading, writing, or appending data to the file. In most programming languages, you can declare a file object using built-in functions or libraries specific to the language. For example, in Python, you can use the "open()" function to create a file object, specify the file name and mode (read, write, append), and specify the path if necessary. Once the file object is declared, you can perform operations on the file, such as reading data from it or writing data to it.

Learn more about programming language here;

https://brainly.com/question/23959041

#SPJ11

Early computing crash course computer science #1 paragraph

Answers

Answer:

But before we get into all that, we should start at computing’s origins, because although electronic computers are relatively new, the need for computation is not.So each bead on the bottom row represents a single unit, in the next row they represent 10, the row above 100, and so on.But if we were to add 5 more after the first 3 we would run out of beads, so we would slide everything back to the left, slide one bead on the second row to the right, representing ten, and then add the final 2 beads on the bottom row for a total of 12.So if we were to add 1,251 we would just add 1 to the bottom row, 5 to the second row, 2 to the third row, and 1 to the fourth row - we don’t have to add in our head and the abacus stores the total for us.Over the next 4000 years, humans developed all sorts of clever computing devices, like the astrolabe, which enabled ships to calculate their latitude at sea.As early computer pioneer Charles Babbage said: “At each increase of knowledge, as well as on the contrivance of every new tool, human labour becomes abridged.”

what is the most popular monitor​

Answers

Probably a television or a radio I guess

Which of these would make text on a slide difficult to read?
Ohigh contrast between text and background
Olow contrast between text and background
O a sans serif font
O a large font when the presentation is in a large room

Answers

Low contrast between your text and the background

[4] b.A sequential data file called "Record.txt" has stored data under the field heading RollNo., Name, Gender, English, Nepali Maths and Computer. Write a program to display all the information of male
students whose obtained marks in computer is more than 90.​

Answers

Answer:

Explanation:

Assuming that the data in the "Record.txt" file is stored in the following format:

RollNo. Name Gender English Nepali Maths Computer

101 John M 80 85 90 95

102 Jane F 85 80 75 92

103 David M 90 95 85 89

104 Mary F 75 90 80 94

105 Peter M 95 85 90 98

Here is a Python program that reads the data from the file and displays the information of male students whose obtained marks in computer is more than 90:

# Open the Record.txt file for reading

with open("Record.txt", "r") as file:

   # Read the file line by line

   for line in file:

       # Split the line into fields

       fields = line.strip().split()

       # Check if the student is male and has obtained more than 90 marks in Computer

       if fields[2] == "M" and int(fields[6]) > 90:

           # Display the student's information

           print("RollNo.:", fields[0])

           print("Name:", fields[1])

           print("Gender:", fields[2])

           print("English:", fields[3])

           print("Nepali:", fields[4])

           print("Maths:", fields[5])

           print("Computer:", fields[6])

           print()

This program reads each line of the "Record.txt" file and splits it into fields. It then checks if the student is male and has obtained more than 90 marks in Computer. If so, it displays the student's information on the console.

The program to display all the information of male students whose obtained marks in computer is more than 90. is in the explanation part.

What is programming?

Computer programming is the process of performing specific computations, typically through the design and development of executable computer programmes.

Assuming that the data in the "Record.txt" file is structured in a specific format and separated by commas, here is an example Python programme that reads the data from the file and displays information about male students who received more than 90 points in Computer:

# Open the file for reading

with open('Record.txt', 'r') as f:

   # Read each line of the file

   for line in f:

       

       # Split the line by commas

       data = line.split(',')

       # Check if the student is male and has obtained more than 90 marks in Computer

       if data[2] == 'M' and int(data[6]) > 90:

           # Display the information of the student

           print(f"Roll No.: {data[0]}\nName: {data[1]}\nGender: {data[2]}\nEnglish: {data[3]}\nNepali: {data[4]}\nMaths: {data[5]}\nComputer: {data[6]}\n")

Thus, in this program, we use the open() function to open the "Record.txt" file for reading.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ2

Group of programs are software

Answers

Answer:

yes it is

true

Explanation:

group of programs are software

Programming logic used when a program needs to change behavior based on user input or other circumstances is know as _________.

Answers

The main answer to your question is "Conditional logic". Conditional logic is used when a program needs to change its behavior based on user input or other circumstances.

It is a fundamental concept in programming and refers to a set of statements that allow the program to make decisions based on certain conditions or criteria. These conditions can be based on user input, the value of a variable, or any other factor that the program can evaluate.

Conditional logic refers to the use of statements or expressions in a program that make decisions based on certain conditions. These conditions are usually represented by relational or logical operators, and they help the program determine which course of action to take depending on the input or other variables.

To know more about Program needs visit:-

https://brainly.com/question/30140437

#SPJ11

the most successful e-commerce solutions can be upgraded to meet unexpected user traffic because of their _____.

Answers

The most successful e-commerce solutions can be upgraded to meet unexpected user traffic because of their scalability.

Scalability refers to a system's ability to handle an increase in workload or user traffic without sacrificing performance or functionality. In the case of e-commerce solutions, scalability is essential as online stores can experience sudden surges in traffic due to sales, promotions, or other events. Therefore, having a scalable system allows businesses to expand their operations, accommodate more customers, and ultimately increase their revenue. This is why the most successful e-commerce solutions prioritize scalability and invest in infrastructure that can handle increased traffic and user demand.

learn more about e-commerce solutions here:

https://brainly.com/question/13167450

#SPJ11

PLEASE HELP! ILL GIVE BRAINLIEST!!!!!

PLEASE HELP! ILL GIVE BRAINLIEST!!!!!

Answers

Based on the above scenario, Redlan is supporting his company software.

What is customer support a software?

Customer support software is known to be a kind of unified channels that are often used by firms that helps a person to communicate with their customers and others.

Conclusively, Redlan is supporting his company software and he is acting in the capacity of customer support.

Learn more about  support software from

https://brainly.com/question/1538272

#SPJ1

write a short note on mail bombing​

Answers

Explanation:

A mail bomb is the sending of a massive amount of e-mail to a specific person or system. A huge amount of mail may simply fill up the recipient's disk space on the server or, in some cases, may be too much for a server to handle and may cause the server to stop functioning. In the past, mail bombs have been used to "punish" Internet users who have been egregious violators of netiquette (for example, people using e-mail for undesired advertising, or spam).

A robot is designed to deliver snacks to patients in the hospital, allowing nurses to spend more time on skilled care. The robot needs to be able to navigate the hallways, avoiding patients who may be walking or using wheelchairs. What element of sensors addresses this concern?

security


communication


mobility


power source

Answers

Answer:

mobility

Explanation:

since it needs to move around people and navigate the hallways

The answer would be


MOBILITY

you welcome

Are theese speeds considered slow? (I used Ookla Speedtest)
PING ms
5
DOWNLOAD Mbps
86.54
UPLOAD Mbps
98.21

Answers

Answer:

No

Explanation:

They are pretty solid speeds and 5ms for ping is relativley low. If youre planning a large download (100+ gigs) I still recomend giving it a few

hours

sheryl is explaining the osi model to new technicians at her company. she is trying to explain what protocols operate at the various layers of the osi model. at what layer of the osi model does tcp operate?

Answers

The Transport layer of the OSI model operates the TCP protocol. Correct answer: letter A.

The Transport layer of the OSI model is responsible for providing reliable end-to-end communication between two hosts. So, it is responsible for ensuring delivery, data sequencing and error control.

What does the OSI model consist of?

The OSI model consists of seven layers:

Physical Layer: Responsible for transmitting raw data bits over physical medium such as cables, radio waves, etc.Data Link Layer: Responsible for formatting and transmitting data frames, which are packets of data that have an address header and trailer attached.Network Layer: Responsible for managing and routing data packets from one network to another.Transport Layer: Responsible for reliable end-to-end delivery of data packets.Session Layer: Responsible for establishing, managing, and terminating communication sessions between two or more computers.Presentation Layer: Responsible for translating, encrypting, and compressing data so that it can be sent across the network.Application Layer: Responsible for providing services to end users, such as web browsing and file transfer.

Sheryl is explaining the OSI model to new technicians at her company. She is trying to explain what protocols operate at the various layers of the OSI model. At what layer of the OSI model does TCP operate?

A. Transport

B. Application

C. Network

D. Data link

Learn more about the OSI model:

https://brainly.com/question/15901869

#SPJ4

Write a program that reads the contents of the two files into two separate arrays, or ArrayLists. The user should be able to enter a boy’s name, a girl’s name, or both, and the application will display messages indicating whether the names were among the most popular

GirlsNames. Txt- This file contains alist of the 200 most popular names given to girls born in the US for the years 200 through 2009BoysNames. Txt- This file contains alist of the 200 most popular names given to boys born in the US for the years 200 through 2009

Answers

The add and delete actions on the Linked List have a fixed processing time. Therefore, using Linked List is preferable for manipulation.

What two files into two separate arrays, or Array Lists?

If searching is a more frequent operation than add and delete, it is preferable to use an arraylist since it provides constant time for search operations.

Because it is dynamic, Array List is, in essence, more adaptable than a simple native array. When necessary, it can self-grow, which the original array cannot do.

Therefore, In addition, you can remove elements from an array list, which is not possible with native arrays.

Learn more about Array Lists here:

https://brainly.com/question/27768587

#SPJ1

the server encountered an internal error or misconfiguration and was unable to complete your request.

Answers

Error 404 - didn’t found

Which of the following is NOT a Linux/Unix file or disk management command? a. cfdisk b. xfsdump c. tar d. xterm. d. xterm.

Answers

D. xterm is NOT a Linux/Unix command for managing files or disks.

How do I mount a virtual drive into the file system in Linux?

Enter the following command to manually add the virtual disc drive at the Linux command prompt: echo /proc/scsi/scsi the command "scsi add-single-device host chan id lun." Use the following information to better understand the parameters for the command: host is the host ID. Chan is the name of the SCSI bus.

A Linux file system is a logical grouping of files on a partition or disc drive. A partition in memory is a section of memory that holds a certain collection of data. There might be several memory divisions in our system. Typically, every partition has a file system.

To know more about Linux command, refer:

brainly.com/question/28901720

#SPJ4

What is an easy and accurate way that a graphic designer can increase the size of a digital shape while keeping the ratio of height to width the same?
First make the height taller, and then drag the width by using one’s eyes to try to make sure the proportions stay the same.
Hold the key, such as Shift, that the program uses to make sure all dimensions are adjusted while dragging just one side.
Open the shape’s properties window, and type the height value multiplied by 2 and the width value multiplied by 3.
First convert the shape into a photo file, and then digitally manipulate it in a program such as Adobe Photoshop.

Answers

Answer:

Open the shape’s properties window, and type the height value multiplied by 2 and the width value multiplied by 3.

Explanation:

Answer: A resolution independent, vector graphics and illustration application used to create logos, icons, drawings, typography and complex illustrations for any medium.

explanation:

because it is what it is

you have been contracted to set up a network for a small business. the company currently has 100 users, and they are looking to expand. they want to use microsoft exchange server for their e-mail and shared calendar feature what version of windows server would you suggest that they purchase?

Answers

More than 100 users are allowed when using Windows Server 2016 Essentials installed.

Small businesses with up to 25 users and 50 devices can start out with Windows Server Essentials as their first server. You can now use Windows Server 2016 Essentials Experience role installed for organizations with more than 100 devices.

The Windows Server Essentials Experience role in Windows Server 2016 gives you access to all the features available in Windows Server Essentials, such as Remote Web Access and PC backup, without being constrained by the locks and restrictions that are present in Windows Server Essentials.

Additionally available and by default turned on is this server role in Windows Server Essentials.

Depending on your network environment, you can install and configure Windows Server Essentials using either Windows Server 2016 or Windows Server Essentials, both of which come pre-installed with the Windows Server Essentials Experience role.

To learn more about  Windows Server 2016 click here:

brainly.com/question/27974929

#SPJ4

How might knowing Earth's position relative to the center of the milky way help you to make a map of the milky way?

Answers

Answer:

That observation indicates that our Milky Way Galaxy is a flattened disk of stars, with us located somewhere near the plane of the disk. ... "The position of the sun in the Milky Way can be further pinned down by measuring the distance to all the stars we can see.Explanation:

How do I add winning conditions to this rock paper scissors code in python? Please keep it simple as I am not allowed to include code we have not learned yet.

import random
choice = input("Enter Rock(R), Paper(P), or Scissors(S): ")
computer = random.randint(1, 3)
if computer == 1:
print("Computer played R.")
elif computer == 2:
print("Computer played P.")
else:
print("Computer played S.")

Answers

Answer:

You wanted simple, but i dodn't know how simple you wanted so I kept it as simple as possible, don't blame me if theres a bug.

Explanation:

import random

choice = input("Enter Rock(R), Paper(P), or Scissors(S): ")

computer = random.randint(1, 3)

if computer == 1 and choice == "R":

   print("Computer played Rock.")

   print("Tie")

elif computer == 2 and choice == "P":

   print("Computer played Paper.")

   print("Tie")

elif computer == 3 and choice == "S":

   print("Computer played Scissors.")

   print("Tie")

elif computer == 1 and choice == "S":

   print("Computer played Rock.")

   print("You Lose")

elif computer == 2 and choice == "R":

   print("Computer played Paper.")

   print("You Lose")

elif computer == 3 and choice == "P":

   print("Computer played Scissors.")

   print("You Lose")

elif computer == 1 and choice == "P":

   print("Computer played Rock.")

   print("You Win")

elif computer == 2 and choice == "S":

   print("Computer played Paper.")

   print("You Win")

elif computer == 3 and choice == "R":

   print("Computer played Scissor.")

   print("You Win")

Other Questions
Which verbs never use the "a" personal?1. tener 2. llevar 3 .ser 4. escuchar WALLAHI HELP ME PLESEE WALLAHI HELP ME PLEASE I BEG ANYONE Identify the fallacies of relevance committed by the following arguments, giving a brief explanation for your answer. If no fallacy is committed, write "no fallacy". Surely you welcome the opportunity to join our protective organization. Think of all the money you will lose from broken windows, overturned trucks, and damaged merchandise in the event of your not joining. Help Asha balance the following equation by completing the equation with the correct numbers:__H2 + __O2equation __H2O List the functions of a lubricant in a sliding contactbearing Which is the most effective way for countries to cooperate when sharing natural resources?deciding which country will control the resourceslimiting their interactions to restrict the use of resourcessigning an agreement that outlines the use of resourcespledging military support over the protection of the resources Which values represent the independent variable? (2, 4), (3, 2), (1, 0), (5, 5) A. {2, 3, 1, 5} B. {4, 2, 0, 5} C. {2, 4, 3, 2} D. {2, 1, 0, 5} Please select the best answer from the choices provided A B C D Which line is parallel to the line y=5x7? O y=5x+7O y=5x+8 O y=(1/5)x7O y=(1/5)x+8O y=3x7 O y=5 un automvil que se desplaza en una pista recta aumenta su velocidad de 15 m/s a 45 m/s utilizando para ello unpo de 10 segundos. Consideremos que la aceleracin fue uniforme, calcula:aceleracin en dicho tiempo. How does the average daily water consumption per person in the united states compare to other countries? After learning so much about how art and culture are connected, it is time to explore different cultural pieces of art.I WILL GIVE BRAINLISTFor this activity, you will search online and find a piece of art from four different cultures. You will need to copy or screenshot the four pieces of art that you decide on, and insert them into your written assignment.You may choose any type of art from any culture that you like, but please keep in mind the appropriateness of your choices.One you have selected your four pieces of art, you will answer several questions about each one and briefly discuss the piece.Questions and points to discuss for each piece of art:What culture is your piece of art from?Why did you choose this piece?What does this piece tell you about the culture?Think daily life, food, celebrations and rituals, nature, and overall lifestyle.How is this piece of art different from the rest of your choices? Input Quantities The most desirable output quantity for the firm clearly depends on how costs change as output varies. First, discuss the three types of cost ... how the above cartoon depicted a realignment from a Democratic system ofgovernment to a Republican system during the third political party system. {5, 3, 1, -1, ...} find a18 Math Tutor Pay: $11.44 per hour they work 13 hourshow much do they get paid in a-per week per monthper year Which of the following leads to a higher rate of effusion?Answers: 1. Reduced temperature2. Lower molar mass3. Slower particle movement4. Cooler gas sample Question 10 (1 point)Why do writers use verb and non phrases? the check in spanishValeLa genteuna mesa librela cuentabuen provechoun montonun refrescogenial What is the measure of arc QR? What did the Missouri Compromise of 1820 do?A It made slavery illegal in new states north of the 36th parallel.B It abolished slavery in Mexico.C It took lands from Mexico in the Southwest.D It annexed Texas as part of the United States.