which of the following statements is true? tcp is connection-oriented and is reliable; udp is not connection-oriented and is reliable. tcp is connection-oriented and is reliable; udp is not connection-oriented and is unreliable. tcp is not connection-oriented and is reliable; udp is not connection-oriented and is not reliable. tcp is connection-oriented and is unreliable; udp is not connection-oriented and is reliable.

Answers

Answer 1

Tcp protocol is correlation. It will only deliver information to customers that are waiting for it. While data is continually transferred, the connection is maintained using a three-way handshake protocol.

How does TCP function? What is it?

Often expressed as TCP/IP, TCP helps to communicate between a software application and the Internet Protocol. To transport data using TCP, an application does not require other means for sending data, such as packet breakage on the transmission media.

Why is the TCP port used?

Port numbers serve as universal standards for designating particular processes or categories of network services. Similar to how you would decide where to ship from and where to have something arrive before sending something abroad,

To know more about TCP visit:

https://brainly.com/question/27975075

#SPJ4


Related Questions

12- which permission, when applied to a directory in the file system, will allow a user to enter the directory?

Answers

The permission required to allow a user to enter a directory in the file system is "execute" permission.

When the execute permission is granted to a directory, it allows users to access and navigate into that directory. This permission enables the user to view the contents of the directory, such as files and subdirectories, and perform actions within it, such as opening files or accessing subdirectories.

Without the execute permission, even if a user has read or write permissions on the directory, they won't be able to enter and explore its contents. To summarize, granting the execute permission on a directory enables a user to enter and interact with the files and subdirectories within it.

Learn more about file permissions here:

https://brainly.com/question/31797464

#SPJ11

Convert the algebraic expression below to C++ statement Do not use the pow function. Ans = 5x^2 + 15k + y^-2

Answers

Answer:

The C++ statement for the given algebraic expression 5x^2 + 15k + y^-2 is ( ( 5 * ( x * x ) ) + ( 15 * k ) + ( 1 / ( y * y ) ).

Explanation:

To convert the given algebraic expression 5x^2 + 15k + y^-2 into the C++ statement without using the pow function is:

In the given algebraic expression, there are three expressions combined using the + operator.

The first algebraic expression is 5x^2.

Here, x has a power of 2, and 5 is multiplied by the result of x^2. x having the power of 2 means x is multiplied itself twice. The C++ statement for this algebraic expression is (5 * ( x * x)).

The second algebraic expression is 15k.

Here, 15 is multiplied by k. The C++ statement for this algebraic expression is (15 * k).

The third algebraic expression is y^-2.

Here, x has a power of -2. it means \(1/y^{2}\).  The C++ statement for this algebraic expression is (1/ (y * y).

The combination of all the three C++ statement is (5 * ( x * x)) + (15 * k) + (1/ (y * y).

Given a list of integers nums (assume duplicates), return a set that contains the values in nums that appear an even number of times. Exanples: nuns ={2,1,1,1,2}→{2}
nuns ={5,3,9]→{}
nuns ={8,8,−1,8,8}→{6,8}

[1 1 def get_evens(nums): 2 return:\{\}

Answers

The objective of the given task is to write a function that takes a list of integers as input and returns a set containing the values that appear an even number of times in the list. The function `get_evens` should be implemented to achieve this.

To solve the problem, the function `get_evens` needs to iterate through the given list of integers and count the occurrences of each value. Then, it should filter out the values that have an even count and return them as a set.

The function can use a dictionary to keep track of the counts. It iterates through the list, updating the counts for each value. Once the counts are determined, the function creates a set and adds only the values with an even count to the set. Finally, the set is returned as the result.

For example, given the list [2, 1, 1, 1, 2], the function will count the occurrences of each value: 2 appears twice, and 1 appears three times. Since 2 has an even count, it will be included in the resulting set. For the list [5, 3, 9], all values appear only once, so the resulting set will be empty. In the case of [8, 8, -1, 8, 8], the counts are 3 for 8 and 1 for -1. Only 8 has an even count, so it will be included in the set.

The function `get_evens` can be implemented in Python using a dictionary and set operations to achieve an efficient solution to the problem.

Learn more about integers

brainly.com/question/30719820

#SPJ11

What three actions happen when you cloak a folder or file?

Answers

Answer:

A three actions happen when you cloak a folder or file is explained below in details.

Explanation:

You can cloak data and folders on the forgotten or local site. Cloaking eliminates cloaked data and folders from the subsequent actions:

Presenting Get, Check-In, and Check-Out executions

Producing reports

Getting newer local and newer forgotten files

Accomplishing sitewide executions, such as monitoring and modifying links

Synchronizing

Working with Asset panel contents

Refreshing templates and libraries

Using the data from Task 1, summarize the
percentage of PIP projects completed per each category and their
relative success rates as originally reported.

Answers

Task 1A: Calculate Count (1-3)

Step 1: Use the COUNTIF function to determine the number of projects 1-3. Enter the following cell ranges for Quality (B13:B62), Speed (C13:C62), and Costs (D13:D62).

Step 2: Apply the COUNTIF function with a criteria of "1" to each range separately.

In the Count column, the result should be as follows:

Quality (1): 29

Speed (2): 29

Costs (3): 26

Task 1B: Calculate Count (4-7)

Step 5: Use the COUNTIFS function to determine the number of projects 4-7. Depending on the combinations, use the following cell ranges: Quality (B13:B62), Speed (C13:C62), or Costs (D13:D62).

Step 6: Apply the COUNTIFS function with a criteria of "1" to the appropriate ranges.

In the Count column, the result should be as follows:

Quality & Speed (4): 12

Quality & Costs (5): 11

Speed & Costs (6): 16

Quality, Speed, Costs (7): 5

Task 1C: Calculate PIP Percentage

Step 9: Use the PIP Percentage column to divide each value in the Count column by 50 to determine the percentage for each category.

In the PIP Percentage column, the result should be as follows:

Quality (1): 58%

Speed (2): 58%

Costs (3): 52%

Quality & Speed (4): 24%

Quality & Costs (5): 22%

Speed & Costs (6): 32%

Quality, Speed, Costs (7): 10%

Task 1D: Calculate PIP Success

Step 10: Use the COUNTIFS function within the PIP Success column to determine the number of projects that were found successful. Depending on the combinations, use the following cell ranges: Quality (B13:B62), Speed (C13:C62), or Costs (D13:D62), as well as Results (H13:H62).

Step 11: Apply the COUNTIFS function with the appropriate ranges and a criteria of "1".

In the PIP Success column, the result should be as follows:

Quality (1): 1

Speed (2): 0

Costs (3): 2

Quality & Speed (4): 1

Quality & Costs (5): 2

Speed & Costs (6): 2

Quality, Speed, Costs (7): 1

Step 12: Divide the COUNTIFS function result in the PIP Success column by 50 to determine the success rate percentage.

In the PIP Success column, the success rate should be as follows:

Quality (1): 2%

Speed (2): 0%

Costs (3): 4%

Quality & Speed (4): 2%

Quality & Costs (5): 4%

Speed & Costs (6): 4%

Quality, Speed, Costs (7): 2%

These results provide the percentage of PIP projects completed per each category and the success rate attributable to each type of PIP effort, based on the BOD's confidential criteria.

Learn more about Rates here:

https://brainly.com/question/29781084

#SPJ11

Asia is selling bracelets to raise money for the school's band trip. She needs to determine how much she has already raised and how many more bracelets she must sell. Which response best explains why a computer would perform this task better than a human?

Computers can perform calculations at unbelievable speeds.
Computers can think creatively.
Computers can replicate human tasks.
Computers don't require sleep.

Answers

Note that where Asia is selling bracelets to raise money for the school's band trip and she needs to determine how much she has already raised and how many more bracelets she must sell, the response that best explains why a computer would perform this task better than a human is: "Computers can perform calculations at unbelievable speeds." (Option A)

What is the speed of the fastest computer?

Frontier, the fastest supercomputer on the TOP500 supercomputer list as of May 2022, with a LINPACK benchmark score of 1.102 ExaFlop/s, followed by Fugaku. The United States has five of the top ten, China has two, and Japan, Finland, and France each have one.

As of June 2022, China had 173 of the world's 500 most advanced and powerful, one-third more than its next competitor, the United States, which had an additional 128 supercomputers.

Learn more about computing speed:
https://brainly.com/question/2072717
#SPJ1

Cuál es la dirección de la última fila y columna de excel

Answers

Answer:

XFD 1,048,576.

Explanation:

Excel es un programa de Microsoft por el cual se generan bases de datos y planillas de cálculo, que permiten al usuario desarrollar registros contables referidos a sus distintas actividades comerciales, laborales o de otra índole, así como también realizar cálculos matemáticos y operaciones lógicas a través de distintas fórmulas. En la actualidad, el programa tiene un máximo de 16.384 columnas y 1.049.576 filas, con lo cual la ultima fila y columna de una hoja de cálculo será XFD 1.048.576.

How do i fix this? ((My computer is on))

How do i fix this? ((My computer is on))

Answers

Answer:

the picture is not clear. there could be many reasons of why this is happening. has your computer had any physical damage recently?

Answer:your computer had a Damage by u get it 101 Battery

and if u want to fix it go to laptop shop and tells him to fix this laptop

Explanation:

Write a formula that would return a TRUE result if the sum of the first five numbers in a column of data are negative

Answers

Answer:

Hhgfchhgfhhgffxfghh

Explanation:

Tggh

Which of the following is the correct binary representation of the number 2?
0
110
10
101

Answers

Answer:

10

Explanation:

To convert decimal to binary, you just count like normal, but instead of regrouping when adding 1 when you reach 9, you regroup when you reach 1.

in this case, you would count like this:

0

1

10

What technology that was developed in the early 1880s was used for both mining reclaiming land in the california delta?.

Answers

The technology that was developed in the early 1880s ,that was used for both mining reclaiming land in the california delta is hydraulic mining.

A type of mining known as hydraulic mining involves moving silt or displacing rock material with the help of high-pressure water jets. The resulting water-sediment slurry from placer mining for gold or tin is sent through sluice boxes to extract the gold. Kaolin and coal mining both use it.

Ancient Roman practices that employed water to remove soft subsurface minerals gave rise to hydraulic mining. Its contemporary form, which makes use of pressured water jets generated by a nozzle known as a "monitor," was developed in the 1850s in the United States during the California Gold Rush. Despite being effective in extracting gold-rich minerals, the process caused significant environmental harm due to increased flooding and erosion as well as sediment blocking water ways and covering farmland.

To know more about hydraulic mining click here:

https://brainly.com/question/13970465

#SPJ4

you have recently purchased a third-party application and installed it on your workstation. however, after doing some maintenance work on the users and groups on your windows system, the application begins to display error messages each time you try to run it. what is the most likely cause of the issue?

Answers

A group that's been created by a third-party program was deleted in accordance with the information provided in the question.

Windows is a form of software, right?

Programs such Windows, macOS, Linux, and iOS are examples of system software.  When a device starts up, computers are loaded in RAM and given access to the disk drive.

Windows employs C or C++?

For people who are interested in such matters: If Windows is built in C or C++ is a common question. The answer is that, despite NT's Object-Based design, Windows is almost entirely built in "C" like most operating systems. Why? The memory footprint and overhead associated with code execution that C++ adds are costs.

To know more about windows visit:

https://brainly.com/question/13502522

#SPJ4

When you accelerate to avoid a collision which step of the IPDE process are you using?

Answers

The step of the IPDE process that should be used When you accelerate to avoid a collision is an execute.

In the term of computer and technology, IPDE stands for Identify, Predict, Decide, and Execute.  IPDE process or IPDE strategy also should be used in off-road driving. IPDE process including several activities, such as Identify any objects or conditions that may cause you trouble while driving and also Predict activity through what results might occur when you encounter the object or condition. IPDE has a function to help us to provides a means of arriving at the diagnosis of major categories.

Here you can learn more about IPDE https://brainly.com/question/2624496

#SPJ4

What is a benefit of being a member of a professional organization?

Answers

Answer: A benifit of being a member of a proffesional organzation is you can refresh your knowledge by acquiring new skills through workshops, seminars, and conferences.

Explanation:

1. as a computer engineer, briefly explain any two types of CPU scheduling mechanisms available in modern operating systems
2. Discuss any two scheduling algorithms available in an operating system

Answers

1 Two types of CPU scheduling mechanisms available in modern operating systems are:

a) Preemptive Scheduling:

b) Non-preemptive Scheduling

Two scheduling algorithms available in operating systems are:

a) Round Robin Scheduling

b) Priority Scheduling:

a) Preemptive Scheduling: In preemptive scheduling, the operating system interrupts a running process and moves it back into the ready queue in order to allow another process to execute. This is done at regular intervals or when higher priority processes arrive. Preemptive scheduling ensures that no single process can monopolize the CPU for an extended period of time.

b) Non-preemptive Scheduling: In non-preemptive scheduling, a running process must voluntarily release the CPU by either blocking itself or completing its execution before another process can execute. This type of scheduling is also known as cooperative scheduling because each process cooperates by releasing the CPU when it's done with its work.

Two scheduling algorithms available in operating systems are:

a) Round Robin Scheduling: In round-robin scheduling, each process is given a fixed time slice or quantum within which it must complete its execution. If the process completes its execution within the allotted time, it is moved to the end of the ready queue. If the time slice expires and the process is not complete, it is preempted and moved to the end of the ready queue.

b) Priority Scheduling: In priority scheduling, each process is assigned a

priority level based on factors like its importance or resource requirements. The process with the highest priority is given access to the CPU first. If two or more processes have the same priority, they can be scheduled using other algorithms, such as round-robin. This algorithm is useful in situations where some processes are more important than others, such as real-time systems.

Learn more about CPU  here:

https://brainly.com/question/21477287

#SPJ11

What is the coordinate plane?

What is the coordinate plane?

Answers

Answer:

The 3rd

Explanation:

The Coordinate plane consists of four quadrants and... its defined by the X and Y axis

C because you graph your coordinates with the x-axis and the y-axis

Write a structured algorithm that prompts the user to input the name and price of an item and the quantity purchased. It should print the name, price, quantity and amount due.

Answers

Answer:

The algorithm is as follows:

input name

input price

input quantity

amount = price * quantity

print name

print price

print quantity

print amount

Explanation:

The next three lines get input for product name, price and quantity bought

input name

input price

input quantity

This calculates the amount

amount = price * quantity

The next four lines print the product name, price, quantity bought and the calculated amount

print name

print price

print quantity

print amount

In the tcp/ip model, what layer is considered so simple that it is ignored entirely?

Answers

In the tcp/ip model, what layer is considered so simple that it is ignored entirely is the Physical layer.

What is the Physical layer of tcp/ip model?\

The Physical Layer is known to be called the smallest or the lowest layer of the TCP/IP model.

Note that it is one that helps to handle  data in the form of bits and this  layer helps to deal with the host to host communication in any given network.

Therefore, In the tcp/ip model, what layer is considered so simple that it is ignored entirely is the Physical layer.

Learn more about tcp/ip model from

https://brainly.com/question/17387945

#SPJ1

In the TCP/IP model, what layer is considered so simple that it is ignored entirely? a. Physical b. Data Link c. Application d. Network

Assuming that all functional dependencies are apparent in this data, which of the following are true?
1. ProjectID → EmployeeName
2. ProjectID → EmployeeSalary
3. (ProjectID, EmployeeName) → EmployeeSalary
4. EmployeeName → EmployeeSalary
5. EmployeeSalary → ProjectID
6. EmployeeSalary → (ProjectID, EmployeeName)

Answers

ProjectID and EmployeeName are functionally dependent on EmployeeSalary, but EmployeeSalary is not functionally dependent on ProjectID, EmployeeName, or the combination of ProjectID and EmployeeName.

Assuming that all functional dependencies are apparent in this data, the following are true:

ProjectID → EmployeeName: ProjectID is functionally dependent on EmployeeName, meaning each ProjectID uniquely identifies a single EmployeeName.ProjectID EmployeeSalary: ProjectID is functionally dependent on EmployeeSalary, meaning each ProjectID uniquely identifies a single EmployeeSalary.(ProjectID, EmployeeName) → EmployeeSalary: EmployeeSalary is functionally dependent on (ProjectID, EmployeeName), meaning each combination of ProjectID and EmployeeName uniquely identifies a single EmployeeSalary.EmployeeName → EmployeeSalary: EmployeeSalary is not functionally dependent on EmployeeName, meaning one EmployeeName may correspond to more than one EmployeeSalary.EmployeeSalary → ProjectID: ProjectID is not functionally dependent on EmployeeSalary, meaning one EmployeeSalary may correspond to more than one ProjectID.EmployeeSalary → (ProjectID, EmployeeName): (ProjectID, EmployeeName) is not functionally dependent on EmployeeSalary, meaning one EmployeeSalary may correspond to more than one combination of ProjectID and EmployeeName.

Learn more about functional dependencies: https://brainly.com/question/27595312

#SPJ11

Which of the following statements is true regarding Bell Labs? Select 3 options. They were responsible for developing the first mechanical computer, called the Analytical Engine. They developed the first cross country network to connect academic institutions. They are credited with creating the Unix operating system and solar cells. Work from their researchers resulted in nine Nobel prizes. Researchers from Bell Labs are responsible for the invention of the transistor.

Answers

Answer:

Researchers from Bell Labs are responsible for the invention of the transistor.

They are credited with creating the Unix operating system and solar cells. Work from their researchers resulted in nine Nobel prizes.

Explanation:

The statements is true regarding Bell Labs are; They are credited with creating the Unix operating system and solar cells. Work from their researchers resulted in nine Nobel prizes.

What is UNIX?

UNIX is simply an operating system developed by Bell Laboratories in the 1960s. Ever since then, it has been constantly worked upon and developed.

UNIX is an operating system because it is a suite of programs capable of making a computer to function.

Thus considered to be a stable, multi-user, and multi-tasking system for both desktops and laptops and even servers.

The statements is true regarding Bell Labs are; They are credited with creating the Unix operating system and solar cells.

- Work from their researchers resulted in nine Nobel prizes.

- Researchers from Bell Labs are responsible for the invention of the transistor

Learn more about UNIX;

https://brainly.com/question/14751939

#SPJ2

List component features affected by Program changes and development.

Answers

Program changes and development can affect various components of a software system, depending on the nature of the changes being made.

Here are some common components and features that may be impacted:

User Interface:

Any changes to the functionality of the software will likely require changes to the user interface to reflect the new features or to optimize the user experience.

Database:

Changes to the program may require changes to the database schema or data structures, which may affect the performance, scalability, and reliability of the system.

Application Programming Interfaces (APIs):

Changes to the program may require changes to the APIs used to access or communicate with the system, which may affect the integrations with other software systems.

Security:

Any program changes may impact the security of the system, and it may be necessary to update security protocols, encryption methods, or access control mechanisms.

Performance:

Changes to the program may have an impact on the performance of the system, and it may be necessary to optimize code or scale hardware resources to ensure optimal performance.

Documentation:

Changes to the program may require updates to the documentation to reflect the new features, requirements, or changes to the software system.

Testing:

Changes to the program may require changes to the testing protocols to ensure that the new features and changes work as intended and do not negatively impact other components or features of the system.

For similar questions on Components

https://brainly.com/question/28498043

#SPJ11

Which filter enhances the color contrast around the edges of an image?

Answers

To increase the appeal of an image or video, edge enhancement is a type of image processing filter that increases the border contrast (apparent sharpness).

What is edge enhancement?Border Enhancement: This function tries to give the picture a little more sharpness. That is true, but excessive sharpening can also result in artefacts, such as a "halo effect" around the margins. Most of the time, this should be omitted. The human eye can distinguish shapes and outlines in low light, but it cannot distinguish finer details because it cannot see edges of objects in higher contrast (edge enhancement).At first look, this might appear to have more detail, but in reality it hides fine detail, and excessive sharpening can give objects a halo. Therefore, turn it way down or off entirely.

To learn more about edge enhancement, refer to:

https://brainly.com/question/29451683

What is an Edge Location used for in an AWS region?
a. CloudFormation
b. RDS
c. S3
d. CloudFront

Answers

d. CloudFront. CloudFront  is an Edge Location used for in an AWS region. Edge locations are used by CloudFront, a content delivery network (CDN) service provided by AWS.  

These locations are geographically distributed data centers that help reduce the latency of content delivery by caching data closer to end-users. When a user requests content from an AWS region, the request is routed to the nearest edge location, which then delivers the cached content from the location instead of going all the way back to the origin server. This results in faster content delivery and a better user experience. Edge locations also provide additional security features such as distributed denial of service (DDoS) protection and AWS WAF (Web Application Firewall) integration.

learn more about AWS here:

https://brainly.com/question/30582583

#SPJ11

Select the correct answer.
Jack is part of the software quality assurance team in a company. Which activity should Jack perform as a part of software quality assurance?
O A.
billing
ОВ.
recruiting
OC.
testing
OD
installing
O E.
accounting

Answers

Answer:

E

Explanation:

James entered into a public cloud computing arrangement without reviewing the standard contract carefully. What problem is he most likely to face as a result?
a) Unexpected cloud downtime
b) Insufficient storage capacity
c) Inadequate data security
d) Inflexible pricing structure

Answers

Unexpected cloud downtime  is the most likely to face as a result.

Thus, A disruption in cloud-based services is known as cloud downtime. The migration of more businesses to the cloud means that any disruption in cloud services might be expensive.

According to Gartner, the average cost of cloud downtime is $300,000 per hour. Major cloud service companies appear to routinely report disruptions. These interruptions can endure for a few hours or several days. Three outages affected AWS in a single month in 2021.

An outage of any length can have a negative impact on the bottom line for businesses that are still working to incorporate cloud technology into their business strategy.

Thus, Unexpected cloud downtime  is the most likely to face as a result.

Learn more about Downtime, refer to the link:

https://brainly.com/question/28334501

#SPJ4

An IF statement inside the true block of another IF statement is called:

A. it is not possible to put an IF statement inside the block of another IF statement
B. a relational operator
C. a nested IF statement
D. a branched IF statement
E. a conditional operator

Answers

Answer:

C. a nested IF statement

Explanation:

Anytime something is contained within another of itself, it's referred to as being "nested".

if (true)

{

     if(true)

     {

       

     }

}

Describe three computer system problems that could harm people and propose ways to avoid the problems

Answers

Three computer system problems that could harm people are data breaches, system failures, and software bugs.

To avoid data breaches, organizations should implement strong cybersecurity measures such as encryption and access controls. System failures can be mitigated by implementing redundant systems and disaster recovery plans. Software bugs can be minimized through thorough testing and code reviews. Regular maintenance, monitoring, and user education are essential to prevent and address these issues proactively. By prioritizing security, reliability, and best practices, the potential harm to people can be significantly reduced, ensuring the safety and well-being of individuals who interact with computer systems.

learn more about computer system problems  here:

https://brainly.com/question/24094064

#SPJ11

there is no html element or css style for rounded corners, but you can simulate the effect using ____ and a web table.

Answers

The images are typically small squares or circles that are colored the same as the background color of your web page. You then position these images at the corners of your table cells, creating the illusion of rounded corners.

This method is not as efficient as using an HTML or CSS element specifically designed for rounded corners, but it can achieve the desired effect. However, it is worth noting that this method can be time-consuming and result in longer code.

To simulate rounded corners in a web table, you can use the CSS property "border-radius" along with a web table element. This will create the desired effect without needing a specific HTML element or style dedicated to rounded corners.

To know more about web table visit:-

https://brainly.com/question/31541816

#SPJ11

network has 20 nodes and 50 links. how what is the size of the routing table (number of entries) for link state routing? for distance vector routing? assume no external connectivity (isolated network).

Answers

In a network with 20 nodes and 50 links, the size of the routing table for link state routing and distance vector routing will differ.

For link state routing, each node maintains a complete view of the network topology, which includes information about all nodes and links in the network. Therefore, the size of the routing table for link state routing will be proportional to the number of nodes in the network. In this case, there are 20 nodes, so each node will need to store information about the other 19 nodes in the network. This results in a routing table size of 20 x 19 = 380 entries.For distance vector routing, each node only maintains information about its directly connected neighbors and the distance to each destination in the network. Therefore, the size of the routing table for distance vector routing will be proportional to the number of links in the network. In this case, there are 50 links, so each node will need to store information about the other 19 nodes via their respective links. This results in a routing table size of 50 x 19 = 950 entries.

To learn more about distance  click on the link below:

brainly.com/question/30228170

#SPJ11

Write the technical terms for each of the following:
a. The use of the Internet to buy and sell goods and services.
b. Voice communication through the Internet. C. A program that allows the user to log into a remote computer on the Internet as a user on that system.
d. High speed digital communication network evolving from existing telephony.
e. Software that is used for surfing information through the Internet.​

Answers

Explanation:

network" (and any subsequent words) was ignored because we limit queries to 32 words.

Other Questions
draw the structural formula for acetylene, c2h2, and state the type of bonds in an acetylene molecule. question 31 options: a) 2 single bonds and 1 triple bond b) 2 single bonds and 1 double bond c) 1 single bond and 2 double bonds d) 3 single bonds e) none of the above Question 33(Multiple Choice Worth 2 points)A student is concerned about background radiation that she is exposed to. She claims that nuclear power plants have caused background radiation, and that if theyhad not been built, she would not be exposed to radioactivity. Is she correct? Why or why not?Yes, because power plants are the primary source of background radiation.Yes, because radioactivity does not exist in nature.No, because background radiation exists only in outer space.No, because background radiation comes from naturally occurring substances such as isotopes when do the actions of a text usually take place? What is the yen yang theory of health Explain what makes one atom different from another ato How does the resolution of the story develop the theme?AEmma was able to make herself cry with hard work and dedication.BEmma finally realized she didn't need anyone else to be successful.CEmma concluded that her father was just as supportive as her mother.D Emma understood that it was not right for her to be angry with her mother.A No questions just need a friend! After the reaction mixture is added to the top of the silica gel column, the instructions state: "Open the stopcock and drain the column until the meniscus is just above the top layer of the material. Add another 0.5 mL of solvent and repeat the process toensure that all of the desired products are adsorbed onto the silica gel. This process ensures that none of the desired products are dissolved in solution above the column."Why is this procedure important? How would the TLC plates look different than your prediction in Q1 if a student skipped this step? Can anyone get the answer with an explanation i dont understand it how did the early man explain the world around them A line segment connecting 2 points on the circle and passes through the center? a rabbit myxoma virus was introduced to australia to kill introduced rabbit species and was 99.8% effective within the first years, but the mortality rate dropped to 70-95%. this parasite-host relationship may be a result of: If 30 articles costrs 300,then the cost of 1 article is _____ can you solve this for me Convert200516Convert 200pi/16 from radians to degrees. Then find the coterminal angle what would be between 0 and 360 degrees. Finally give the sin of this angle.You answer will have 3 parts:-The original angle converted to degrees, showing the steps used.-The coterminal angle that is between 0 and 360 degrees, showing the steps used.-The sin of this angle. Prosificacion del poema de la culpa de Jos ngel Buesa What is -8/7 time -8/7 equal Wedding cost estimation: Given the following information, calculate the estimated costs for a wedding with 250 guests and a bridal party of six, using the methods indicated. Show your work. Note that members of the bridal party are already counted as guests, you don't need to add them twice. 1. Parametric estimate 2. Bottom-up estimate 3. Analogous cost estimate 4. You will probably notice some differences in the estimated values. Are these differences significant? What might cause the differences? If you were estimating a significant project in the future, which method(s) would you use and why? 5. Your mother points out you should probably have valet parking, which will cost $500. Which estimate(s) will change? Wedding Cost Estimates: Groom's brother's wedding, last year, 175 guests, similar venue and style: $20,300 Catering: $65 per person Photographer: $1,500 Rental of hall: $500 Clothing, bride: $2,000 Clothing, groom: $750 Flowers: $800 Other dcor items: $500 Cake: $500 Gifts for bridal party: $80 each Wedding planner: $2,000 Wedding planner's estimate of typical cost for this kind of wedding: $10,000 plus $75 per guest A rectangle has a length of 2 6 and width of 6 . Find the perimeter of the rectangle. mrs. johnson leaves on a trip planning to travel 24 mph.how fast must his son james travel to overtake himin 5 horus, if he starts 2.5 horus after his father?