when encountering an ipv4-only router, an ipv6 datagram is dropped. group of answer choices true false

Answers

Answer 1

When encountering an ipv4-only router, an ipv6 datagram is dropped. (False)

What is ipv4-only router?

The fourth version of the Internet Protocol is called Internet Protocol version 4 (IPv4) (IP). It is one of the foundational protocols of standards-based internetworking techniques used on the Internet and other packet-switched networks.

The first production-ready release of IPv4 was made available on the SATNET in 1982 and the ARPANET in January 1983. Even though Internet Protocol version 6 (IPv6), its successor, is still being deployed, the majority of Internet traffic is still routed using it today.

There are 4,294,967,296 (232) unique addresses available in the 32-bit IPv4 address space, but large blocks are set aside for specialized networking needs.

Learn more about IPv4

https://brainly.com/question/14204195

#SPJ4


Related Questions

Which action requires an organization to carry out a Privacy Impact Assessment?

A. Storing paper-based records
B. Collecting PII to store in a new information system
C. Collecting any CUI. including but not limited to PII
D. Collecting PII to store in a National Security System

Answers

Collecting PII to store in a new information system requires an organization to carry out a Privacy Impact Assessment.

What is Privacy Impact Assessment?
Privacy Impact Assessment
(PIA) is a process of examining how personal data is collected, used, stored, and shared by an organization. A PIA helps to identify and mitigate potential privacy risks to individuals and their personal information. It is an important tool for organizations to ensure that their data collection practices are compliant with applicable privacy laws and regulations. The PIA process includes analyzing the data flow from collection to storage, understanding the purpose of the data collection, and determining the privacy risks associated with the data. By conducting a PIA, organizations can identify and address potential privacy concerns, ensure that appropriate security measures are taken to protect personal data, and improve overall data management practices.

To learn more about Privacy Impact Assessment

https://brainly.com/question/14297557

#SPJ1

looking at CuboAI camera 's slogan or the sub-services on the homepage, you can simply determine that the level of this service is not the 14.0 service learned in emering topic on business information technologies

Answers

The first baby monitor that uses artificial intelligence (AI) to improve a baby's well-being, sleep, and memories. Cubo Ai safeguards your child's health from 0 to 5 years old.

Using A.I. recognition for features aimed at families, such as covered faces, danger zones, cry locations, and automatic photo capture.

The business believed that using a variety of cloud developments would give them an edge, so it first launched its infant monitoring system in a multi-cloud environment that included cloud storage.

Nevertheless, the team discovered that using various cloud platforms led to increased consumption because of the rising costs as the number of clients began to grow substantially in 2019.

In light of this, Cubo Ai decided to consolidate all of its cloud platforms. The company chose Cloud because of its versatility and intuitive cloud tools, as well as the extensive specialized support provided by the Cloud team and its partner CloudMile.

Cubo AI uses artificial intelligence to determine if a baby's face is covered or, alternatively, whether the infant has rolled over, and it also lets you see and record the child sleeping.

People may browse back over footage for up to 18 hours to check on a baby's sleep patterns and any annoyances. Additionally, the monitor can detect cries and alert people if a baby stands up, both of which we tracked down a special component.

Know more about artificial intelligence:

https://brainly.com/question/23824028

#SPJ4

JAVA
Use a forloop to print all of the numbers from 23 to 89 with 10 numbers on each line (the last line will have less than 10 numbers), Print one space
between each number
Hint- think about what values would be at the end of each line and what they have in common (think about modular division). You can then add an if
block inside your loop which prints a new line when one of these numbers is encountered

Answers

public class JavaApplication64 {

   

   public static void main(String[] args) {

       int count = 0;

       for (int i = 23; i <= 89; i++){

           if (count == 10){

               System.out.println("");

               count = 0;

           }

           System.out.print(i+" ");

           count += 1;

       }

   }

   

}

I hope this helps!

Complete the method/function so that it converts dash/underscore delimited words into camel casing. The first word within the output should be capitalized only if the original word was capitalized. Specifications Challenge.toCamelCase(str) given a string with dashes and underscore, convert to camel case Parameters str: String - String to be converted Return Value String - String without dashes/underscores and camel cased Examples str Return Value "the-stealth-warrior" "theStealthWarrior" "A-B-C" "ABC"

Answers

Answer:

I am writing a Python program. Let me know if you want the program in some other programming language.

def toCamelCase(str):  

   string = str.replace("-", " ").replace("_", " ")  

   string = string.split()

   if len(str) == 0:

       return str

   return string[0] + ''.join(i.capitalize() for i in string[1:])

   

print(toCamelCase("the-stealth-warrior"))

Explanation:

I will explain the code line by line. First line is the definition of  toCamelCase() method with str as an argument. str is basically a string of characters that is to be converted to camel casing in this method.

string = str.replace("-", " ").replace("_", " ") . This statement means the underscore or dash in the entire are removed. After removing the dash and underscore in the string (str), the rest of the string is stored in string variable.  

Next the string = string.split()  uses split() method that splits or breaks the rest of the string in string variable to a list of all words in this variable.

if len(str) == 0 means if the length of the input string is 0 then return str as it is.

If the length of the str string is not 0 then return string[0] + ''.join(i.capitalize() for i in string[1:])  will execute. Lets take an example of a str to show the working of this statement.

Lets say we have str = "the-stealth-warrior". Now after removal of dash in by replace() method the value stored in string variable becomes the stealth warrior. Now the split() method splits this string into list of three words the, stealth, warrior.

Next return string[0] + ''.join(i.capitalize() for i in string[1:])  has string[0] which is the word. Here join() method is used to join all the items or words in the string together.

Now i variable moves through the string from index 1 and onward and keeps capitalizing the first character of the list of every word present in string variable from that index position to the end.  capitalize() method is used for this purpose.

So this means first each first character of each word in the string starting from index position 1 to the end of the string is capitalized and then all the items/words in string are joined by join() method. This means the S of stealth and W of warrior are capitalized and joined as StealthWarrior and added to string[0] = the which returns theStealthWarrior in the output.

Complete the method/function so that it converts dash/underscore delimited words into camel casing. The

If the following pseudocode was coded and executed, what would display?
Declare String str = "a1b2c3d4"
Declare Integer index
Declare Integer num = 0
For index = 0 To length(str) - 1
If isDigit(str[index]) Then
Set num = num + index
End If
End For
Display num
Question options:
A)8
B)16
C)
D)28

Answers

If the following pseudocode was coded and executed:Adding these indices together gives a total of 16. Therefore, the correct answer is option B, 16.

Declare String str = "a1b2c3d4"

Declare Integer index

Declare Integer num = 0

For index = 0 To length(str) - 1

If isDigit(str[index]) Then

Set num = num + index

End If

End For

Display num

The output would be:10The code declares a string variable "str" and initializes it to "a1b2c3d4". It also declares integer variables "index" and "num" and initializes "num" to 0. The code then enters a "for" loop that iterates over each character in the "str" string. If the character at the current index is a digit, the code adds the index of that digit to the "num" variable. Finally, the code displays the value of the "num" variable.In this case, the digits in the string "str" are at indices 1, 3, 5, and 7.

To learn more about pseudocode click the link below:

brainly.com/question/14860404

#SPJ11

PLS HELP ILL GIVE BRAINLY) enter the answer) desktop publishing software enables users to create products for print or __________ distribution

Answers

Answer:

Electronic

Explanation:

Graphic designers must have the ability to BLANK teams and tasks to get the most efficient result

Answers

Answer: work

Explanation:

Work is the correct answer

A customer seeks to buy A new computer for private use at home. The customer primarily needs the computer to use the microsoft powerpoint application for the purpose of practising representation skills. As a salesperson what size hard disc would you recommend and why?

Answers

Answer:

I think 128GB of storage would be fine.

Explanation:

It sounds like this person he's only looking to do basic tasks as you would still have room to do other things.

"Caller ID" is the feature that displays the telephone number of the caller on the telephone of the person he or she calls. With Caller ID now routine and widely used, it might be surprising that when the service was first available, it was very controversial because of privacy implications. (a) What aspect of privacy (in the sense of Section 2.1.1) does Caller ID protect for the recipient of the call? What aspect of privacy does Caller ID violate for the caller? (b) What are some good reasons why a nonbusiness, noncriminal caller might not want his or her number displayed?

Answers

Answer: Provided in the explanation section

Explanation:

please follow this explanation for proper guiding.

(a)

i. What aspect of privacy does Caller ID protect for the recipient of the call?

* The beneficiary of the call utilizing the Caller ID highlight becomes more acquainted with who precisely the guest is, independent of the guest being a decent/terrible individual or authentic/ill-conceived call.  

* Depending on how the call went or wound up, i.e., the discussion, business, messages passed on, the beneficiary would have the option to act in like manner and suitably dependent on the guest and his message's respectability, habits, morals, demonstrable skill, or telephone decorums, and so forth.  

* Also, the beneficiary gets the alternative to choose how to manage the call even before him/her picking the call, when he/she comes to know who the guest is through Caller ID include, the beneficiary gets security by either separating the call, sending or diverting the call, recording the call, not noting the call, or in any event, blocking or announcing the number in any case. Along these lines, the beneficiary's security is ensured from various perspectives.

ii. What aspect of privacy does Caller ID violate for the caller?

* Even however as it were, in fact it distinguishes, confirms, and validates the guest demonstrating he/she is who he/she professes to be. In any case, the guest ID highlight or innovation unveils numerous information and data about the guest, for example, his accurate phone number or PDA number, nation code, the specific phone or versatile transporter organize he/she is utilizing, and so on., as this data may make dangers the guest's security, (for example, character burglaries or just assailants caricaturing others utilizing this current guest's data), classification, it might cause accessibility issue for the guest as when the guest is besieged with ill-conceived calls, spam, and undesirable calls, there are chances their telephone numbers could and would be imparted to many advertising and selling organizations or industry without the guest's assent, there are chances somebody focusing on the guest may tap or wire his/her significant, basic business, social, expert, individual, or private calls for touchy data to assault them and abuse the bantered data. The guest certainly loses his/her secrecy, opportunity, directly for discourse, security, and wellbeing when passing on messages over the call when they know there could be somebody tapping or recording the call, or even the beneficiary may abuse the guest's character and his/her passed on data.  

* Hence, the guest doesn't get the opportunity from reconnaissance i.e., from being followed, followed, watched, and spying upon by trouble makers.  

* The guest would lose the control of their data on how it would be put away or utilized.  

* The guest probably won't get opportunity from interruptions.

(b).  What are some good reasons why a non-business, non-criminal caller might not want his or her number displayed?

* A non-business and a noncriminal guest would need to enjoy typical, common, and regular exercises; mingle and do his/her own day by day close to home, private, and public activities' assignments, occupations, occasions, social occasions, correspondences, individuals organizing, and so on., without making any whine about things, exposure stunts, without causing anyone to notice tail, screen, follow, question, or explore the guest superfluously except if the guest has enjoyed, asked, stated, discussed, or passed on any message that is unlawful, exploitative, wrongdoing, and culpable.  

* Such a guest would need total or most extreme namelessness, as to them, guest ID innovation just uncovers their own and private life exercises, correspondences, and so forth., to others to pass judgment on them, question them, and later cross examine and research them on their interchanges.  

* Such guests for the most part search for security in general.  

* Specifically, such guests need classification of their calls, discussions, messages, call logs, and so forth.  

* The beneficiary on occasion may get the guest's private unlisted number without the guest's assent or authorization.  

* The beneficiary may utilize the guest's telephone number and name to get a lot other data about him/her, which the beneficiary should, that would incorporate the guest's location (area) through an opposite catalog or just turning upward in any phone registry.  

* The beneficiary might not have any desire to talk, mingle, or work with the guest in view of the area (address), ethnicity (from the name), race, or district the guest is from.  

How would you describe the relationship between blocks of code and commands?

Answers

Code and Commands have similar programs coding has only one thing to do or done but commands can be told anytime by an input device.

A camera detector has an array of 4096 by 2048 pixels and uses a colour depth of 16.
Calculate the size of an image taken by this camera; give your answer in MiB.

Answers

The size of an image taken by this camera is approximately 16 MiB.

How to calculate the size of an image?

To calculate the size of the image taken by the camera, we need to know the total number of bits in the image.

The number of pixels in the image is:

4096 pixels × 2048 pixels = 8,388,608 pixels

The colour depth is 16, which means that each pixel can be represented by 16 bits. Therefore, the total number of bits in the image is:

8,388,608 pixels × 16 bits per pixel = 134,217,728 bits

To convert bits to mebibytes (MiB), we divide by 8 and then by 1,048,576:

134,217,728 bits ÷ 8 bits per byte ÷ 1,048,576 bytes per MiB = 16 MiB (rounded to two decimal places)

Learn more about cameras at:

https://brainly.com/question/26320121

#SPJ1

The most common cause of foodborne illness is

Answers

Answer:

Food posioning

Explanation:

According to the Food and Drugs Administration (FDA), the most common cause of foodborne illness is food poisoning.

What is a foodborne illness?

A foodborne illness can be defined as a type of disease that is generally caused due to the consumption of a contaminated food or any food material that has been poisoned.

According to the Food and Drugs Administration (FDA), the most common cause of foodborne illness around the world is food poisoning such as when bacteria and other pathogens grow on a food.

Read more on food poisoning here: https://brainly.com/question/27128518

#SPJ2

is a variable a number

Answers

A variable is a symbol standing for a unknown numerical value. Such as “x” and “y”

Answer:

No

Explanation:

A variable is like a symbol like a letter, that it used to describe a number.

the media playback was aborted due to a corruption problem or because the media used features your browser did not support.

Answers

Media playback has stopped playing because corruption issues or media feature being used is not supported by the browser." Reasons for this may be: Browser problem. Poor internet connection. Website plugins not supported by browsers cached data.

How do I enable media playback?

Type chrome://flags in the address bar. Now, type Global Media Playback Control in the search bar. Once the option appears, click on the box placed right in front of it and choose Enable option.

How can I fix media playback errors?

Try another media player.

Check and get the codec pack you need. Check and update your system's display driver.

Run a troubleshooting scan.

Change the power plan settings in Control Panel.

Repair the video with VLC Media Player.

Repair video with professional software

To learn more about playback visit:

https://brainly.com/question/28200239

#SPJ4

A programmable machine can:

Answers

Answer:

Either be an embedded system, or a general purpose system.

Help please this is my last assignment of the year

Help please this is my last assignment of the year

Answers

Answer:

the answer is in the website that are there

to work with install images (.wim files), you use the command.

Answers

To work with install images (.wim files), you use the Dism command.

The Dism command is a command-line tool that can be used to manage Windows images. It can be used to mount, modify, and create images. To work with install images, you can use the following Dism commands:

Mount - Mounts an image file so that it can be accessed.

Unmount - Unmounts an image file.

Apply - Applies an image to a computer.

Export - Creates a copy of an image file.

Update - Updates an image file.

For example, to mount the install image file install.wim, you would use the following command:

dism /mount-wim /wimfile:install.wim /index:1 /mountdir:c:\

This command would mount the image file install.wim at the location c:\. You can then use other Dism commands to modify the image.

To unmount the image, you would use the following command:

dism /unmount-wim /mountdir:c:\

This command would unmount the image file from the location c:\.

To apply the image to a computer, you would use the following command:

dism /apply-wim /wimfile:install.wim /index:1 /applydir:c:\

This command would apply the image file install.wim to the computer at the location c:\.

To create a copy of an image file, you would use the following command:

dism /export-image /sourcewim:install.wim /sourceindex:1 /destinationimage:c:\new-install.wim

This command would create a copy of the image file install.wim at the location c:\new-install.wim.

To update an image file, you would use the following command:

dism /update-wim /sourcewim:install.wim /sourceindex:1 /update:c:\update.cab

This command would update the image file install.wim with the contents of the file c:\update.cab.

The Dism command is a powerful tool that can be used to manage Windows images. It can be used to mount, modify, create, and apply images.

To learn more about command, visit here:

https://brainly.com/question/25243683

#SPJ11

Which of the following is an example of an application ?

Which of the following is an example of an application ?

Answers

The third one I think
The 3rd one cause all the others are brands pretty much

Which of the following allows users to add, change, delete, or retrieve data in a database?
Attribute generation
Report generation tools
Data dictionary
Query wizard tool
Data manipulation language

Answers

The correct answer is Data manipulation language of the following allows users to add, change, delete, or retrieve data in a database.

A database may have data added, deleted, and updated using a computer programming language known as a DML (data manipulation language). A DML often functions as a sublanguage of a more complex database language, such as SQL, and includes some of the latter language's operators. Relational database language that complies with ISO/ANSI standards is SQL. Data definition and manipulation are both possible with the help of SQL.Data is inserted into a table using it. A table's existing data is updated using UPDATE. Delete records from a database table using the DELETE command.

To learn more about Data manipulation language click the link below:

brainly.com/question/13014025

#SPJ4

WD9102 Apply a shape style.

Answers

If you want to apply a shape style, you must require to tap on the Format tab followed by clicking the More drop-down arrow in the Shape Styles group.

How to know the actual or real style of shape?

To know the actual or real style of shape, go to the Drawing Tools menu in the ribbon. Then, Click on the Format tab. Observe the Shape Styles grouping of commands. Here, you will see three icons on the right side, they are Shape Fill, Shape Outline, and Shape Effects.

After clicking the More drop-down arrow in the Shape Styles group, a complete menu of styles will appear in front of you on the screen. Choose the style you want to use. The shape will appear in the selected style.

Therefore, the process of applying shape style is well described above.

To learn more about Word Shape styles, refer to the link:

https://brainly.com/question/938171

#SPJ1

The ______ goal is to design an enterprise-wide database based on a specific data model but independent of physical-level details.

Answers

The conceptual design goal is to design an enterprise-wide database based on a specific data model but independent of physical-level details.

The ultimate goal is to design an enterprise-wide database based on a specific data model but independent of physical-level details. This means that the focus is on creating a conceptual framework for the database, rather than getting bogged down in  of how the database will actually be implemented. By designing a database in this wathe technical detailsy, it can be more easily adapted and modified as business needs change, without having to worry about how those changes will affect the underlying technology.Conceptual design creates a strategy to transform a concept or idea into visual media. It's the underpinning of a successful design process, and no project can start without it. Conceptual design relates to concept art, or artwork expressing a creator's idea of how a completed project may look.

learn more about conceptual design here:

https://brainly.com/question/13437320

#SPJ11

what is the main purpose of the circulatory system

Answers

The network of blood vessels and the heart that carries blood throughout the body. This system helps tissues get the right amount of nutrients, oxygen, and waste disposal.

The most important component of the circulatory system?

The primary function of the circulatory system is to carry oxygen, nutrients, and hormones to the muscles, tissues, and organs throughout the body. Another role of the circulatory system is to remove waste from cells and organs so that your body can eliminate it.

What is the primary goal of this quiz about the circulatory system?

The circulatory system's job is to provide nutrients and oxygen to body cells while returning carbon dioxide and oxygen-poor blood to the heart and lungs.

To know more about circulatory system visit:-

https://brainly.com/question/29259710

#SPJ4

You carried out a PERT analysis of a very large activity-event network using only slightly skewed or symmetric beta distribution models for the activity durations. Your analysis yields a mean duration of 56.2 time units for the critical path with a variance of 3.4. What is your best estimate of the probability of successful project completion in 57 time units or less? Provide your answer as a number between 0 and 1 with 3 decimals (3 digits after the decimal point, for example: 0.123).

Answers

PERT (Program Evaluation and Review Technique) is a network analysis technique commonly used in project management.

It is particularly useful when there is a high level of uncertainty surrounding the duration of individual project activities. PERT uses probabilistic time estimates, which are duration estimates based on using optimistic, most likely, and pessimistic estimates of activity durations, or a three-point estimate.

These estimates help to identify the likelihood of meeting project deadlines and can assist project managers in developing effective project schedules and resource allocation plans. Overall, PERT is an important tool for managing complex projects with uncertain activity durations.

To know more about project management, refer to the link:

brainly.com/question/4475646#

#SPJ4

What refers to the way players get personally involved in a game, with the ability to influence the outcome?
ludonarrative
interactive fiction
participant observation
player agency

Answers

Answer:

player agency

Explanation:

Answer:

I think it's player agency

Explanation:

Player Agency: The player's ability to impact the story through the game design or gameplay

Match the five traits to their descriptions. word choice Sentences flow naturally from one idea to the next. 슈 conventions The writing is structured in a way appropriate to the topic and purpose. voice Spelling, grammar, and other rules are followed sentence fluency Precise terms enliven the text. organization A sense of the writer's personality comes through. any help​

Match the five traits to their descriptions. word choice Sentences flow naturally from one idea to the

Answers

Answer:

organization goes to "the writing is structured..."

word choice goes to "precise terms..."

voice goes to "a sense of the writer's..."

sentence fluency goes to "sentences flow naturally..."

conventions goes to "spelling, grammar..."

Answer:

yw

Explanation:

Match the five traits to their descriptions. word choice Sentences flow naturally from one idea to the

true or false? in-stream video ads do not appear within video content and typically use space reserved for a display ad on a website or app.

Answers

False. In-stream video ads do appear within video content, typically before, during, or after the main video. They are different from display ads, which usually use space reserved for banners or images on a website or app.

In-stream video ads appear within video content, typically before, during, or after the main video content. They are designed to be seamlessly integrated into the video experience and are often skippable after a few seconds. In contrast, display ads are static or animated ads that appear alongside or within content, such as on a website or app.It is important to note that there are different types of video ads, such as pre-roll, mid-roll, post-roll, and overlay ads, each with their own placement and timing within the video content. However, all in-stream video ads are designed to appear within the video content itself, not in the space reserved for display ads.

Learn more about  stream here

https://brainly.com/question/14012546

#SPJ11

False.

The statement "in-stream video ads do not appear within video content and typically use space reserved for a display ad on a website or app" is false.

In-stream video ads are a type of online video advertisement that are designed to appear within video content. Unlike display ads, which appear as banners or pop-ups on websites or apps, in-stream ads are shown within a video player or streaming service. They can appear at the beginning, middle, or end of the video, and are typically skippable after a few seconds. In-stream ads are effective because they allow advertisers to target their message to a captive audience that is already engaged with video content. They are commonly used by marketers to build brand awareness, promote products or services, and drive website traffic.

Learn more about ads:

https://brainly.com/question/14227079

#SPJ11

What happens if a computer lags too much?

Answers

Answer: Hope This Helps!

Explanation:

This mainly happens when your OS is trying to update or send data to the data center and installed software is downloading or uploading data in the background. Also, it can be the hard disk is probably just too old. You can replace an old hard drive. In fact, it’s recommended before lagging is replaced by the blue screen of death. A new hard disk drive won’t cost a lot of money. Also, it can be that you touched a notification that popped up on your computer and it downloaded a virus which you have to go to a tech to fix if you dont have anti virus protector. And if it keeps going that means it can overheat or just breakdown and never work again.

Which two characters do you use to tell the command that you are finished providing options and that the remaining data on the command line is arguments

Answers

Answer:

Two hyphen-minus characters (- -)

Explanation:

Using two hyphen-minus characters only, tend to recommend that the rest of the data are arguments and should not be treated as alternatives.

Hence, in this situation, the two characters a user will use to tell the command that a user is complete giving options and that the rest of the data on the command line is arguments is known as "two hyphen-minus characters (- -)"

Sarah is annoyed that three boxes pop up when she clicks on a link on a webpage. Which language is most likely responsible for creating these pop-ups

Answers

If Sarah is annoyed that three boxes pop up when she clicks on a link on a webpage, the language that is most likely responsible for creating these pop-ups is JavaScript. JavaScript is a programming language that is used to add interactivity to webpages by creating dynamic effects and adding functionality.

It can be used to create pop-ups, among other things.Javascript is used to create pop-ups when a user clicks on a link on a webpage. These pop-ups may be used for various purposes, such as displaying additional information, alerting users to important information, or requesting user input.

They are typically small windows that appear on top of the webpage, and they can be closed by clicking on a button or a link within the pop-up. JavaScript can be used to create pop-ups with a wide range of features, such as animations, sound effects, and custom graphics.

To know more about boxes pop visit:

https://brainly.com/question/30850764

#SPJ11

describe how you would open a new open word processing document

Answers

Answer:

open the program by clicking on the icon or finding it in your program. Once you have opened it you can either use the blank page that has opened or you can go to the file tab and click new word document or new document.

Explanation:

Other Questions
How were the New England colonies economically different from both theMiddle and Southern colonies?A. They used less slave labor than the other colonies.B. They grew more cash crops than the other colonies.C. They had more indentured servants than the other colonies.D. They built larger plantations than the other colonies. -10x + y = 4 help i need the steps on how to solve this pls What equals 4 tens and 6 ones The distance from Earth to the North Star is about 430 light-years. Which of the following statements describes why scientists use the light-year unit to measure distance in space?A.) A light-year is very small and distance in space are very smallB.) A light-year unit is very small and the distance in space are very largeC.) A light-year unit is very large and distance in space are very smallD.) A light-year unit is very large and distance in space are very large it normally takes 5 farm workers 6 days to harvest a crop. The farmer thinks it will rain and he wants the crop to be harvested in 2 days. How many workers will he need to do this(NOTE:PLEASE RIGHT THE EXPLANATION) If the product of two numbers is 14 and one of the numbers is 3 1/2 times the other, then what is the sum of the two numbers? Consider the integral28 (3x2+2x+5)dx(a) Find the Riemann sum for this integral using left endpoints andn=3.L3(b) Find the Riemann sum for this same integral, using right endpoints andn=3.R3=___ What is your vision of the Learner Government in 3 years' time? Martin uses 5/8 of a gallon of paint to cover 4/5 of wall. What is the unit rate at which Martin paints in walls per gallon An organism can utilize citrate as its sole carbon source and ammonium salts as its sole nitrogen source. What change would you expect to see in a citrate slant inoculated with this organism? Which risk assessment category designates a space where procedures create the most danger to a patient? An old lady becomes blind . Calls in a doctor . Agrees to pay large fees if cured Doctor comes daily.. Starts stealing one piece of furniture daily . Delays the cure At last cures her . Demands his fees lady refuses to pay, saying cure is not complete.Doctor Objects lady says sight not restored as she cannot see all her furniture . Moral. Raymond needs to cover the entire surface area of the square based pyramid with paper what is the minimum amount of paper he will need HURRY I HAVE 30 Minutes left !!!!Which option supports the following statement?The orbit and distance of a satellite dictate the kind of data that will be collected.Lower altitudes provide detailed data for large geographic areas.Lower altitudes provide detailed data for small geographic areas.A sun-synchronous orbit can obtain data on the same area at multiple times of day.A polar orbit can obtain data under constant sunlight. Suppose 0.50 L of a HNO3 solution has a pH of 3.30. How many moles of HNO3 must have been initially dissolved in the solution?a.2.5x10-4 molesb.5.0x10-4 molesc.1.7x10-3 molesd.1.0x10-3 molese.1.8x10-2 moles give at least five problems solving about area of a sector of a circle.five example of arc lengthfixe example or arc of a circle An annual percentage rate, or APR, represents how muchinterest is paid over a year.interest is paid over many years.principal is paid over a yearprincipal is paid over many years. What were the important figures and achievements of Egypts Old and Middle Kingdoms? tot Which of the following is not a property of water?O A. ability to moderate temperaturesO B. ability to adhere to other substancesO c. ability to contract upon freezingO D. ability to dissolve a wide variety of substances I know when a hot surface is touch receptors in the hand send a signal to the nervous system the nervous system then sent a signal to the musculine and the arm to contract and move the hand from the hot surface which of these best describes this example