A user has multiple web pages open and is using email. Which layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for sorting the data to send email and web pages to the appropriate location

Answers

Answer 1

Answer: Transport layer

Explanation: The Transmission Control Protocol / Internet Protocol both combine to aid aod transmission of data through the internet. While the Transmission control protocol handles the establishment and Maintainace of network connection through applications , the Internet Protocol handles how the established data is being sent. The Transmission Control Protocol is forms a part of the transport layer which aids in the data transmission m ensuring that data is sent to the correct source. The transport layer is able to avoid errors as it ensures that established c is nnectio is maintained until data exchange is complete.


Related Questions

Your computer science teacher asks you to sample a black and white image that is 4" x 6". How would you sample the image to provide a good digital approximation using the pixelation widget? What sample size would you use? How would your decision affect the digital representation?

Answers

Answer:

The largest dimensions we can make of an image with the pixelation widget is 255*255.

When an image is resized, the number of pixels in the image may be reduced or increased, which causes the image to be resampled. Resampling changes the file size.

Explanation: This is all I could find. I hope its helps Sorry.

The sample size that would provide a good digital approx. will be  255 x 255

When resizing images using the pixelation widget, the pixels of the image will either reduce or increase and the reduction/increase in the pixels will have an effect ( blurry effect ) on the image when viewed by the user.  also

when an image is resized the size of original size is either larger or smaller than the resampled image.

Hence to provide a good digital approx. using the pixelation widget from an image 4" x 6" is by using a sample size of 255 x 255

Note : A picture showing the effect of pixelation is attached below

learn more : https://brainly.com/question/19038576

What do you mean by Bandwidth? Pls give full explanation

Answers

Answer:

In computing, bandwidth is the maximum rate of data transfer across a given path. It can be characterized as network bandwidth, data bandwidth, or digital bandwidth.

Explanation:

What type of camera is a cell phone camera? A.) DSLR B.) manual C.) compact D.) zoom

Answers

Answer:

The correct option is;

D.) Zoom

Explanation:

The six types of camera found on smart phones includes the monochrome, macro camera, ultra-wide camera, periscope zoom camera, the main phone camera, and the depth sensor camera

The zoom cameras on smart phones can be found mainly in the top range models of smart phones due to the costs of the camera components including the sensor.

Smart phones also have digital zooming that make use of the high mega pixels that come with the phone.

ou have spent the last two hours creating a report in a file and afterwards you use cat to create a new file. Unfortunately the new file name you used was the same as the name you used for the report, and now your report is gone. What should you do next time to prevent this from happening

Answers

Answer:

The answer is "Set -o noclobber command before starting."

Explanation:

Whenever this prevent is happening we set the -o noclobber command, this command( -o noclobber ) is used to prevents its > driver to overwrite system files.  Or whenever the user may want to violate their file in certain cases. For this case, users can use > instead of just turn  -o noclobber off! Push the formal file.

The application layer process that sends mail uses __________. When a client sends email, the client process connects with a server process on well-known port __________. A client retrieves email, however, using one of two application layer protocols: ________ or ________. With ________, mail is downloaded from the server to the client and then deleted on the server. The server starts the __________ service by passively listening on TCP port __________ for client connection requests. However, when a client connects to ta server running __________, copies of the messages are downloaded to the client applications. The original messages are kept on the server until they are manually deleted.

Answers

Answer:

1. SMTP.

2. 25.

3. POP.

4. IMAP.

5. POP.

6. POP.

7. 110.

8. IMAP-capable server.

Explanation:

The application layer process that sends mail uses Simple Mail Transfer Protocol (SMTP). When a client sends email, the client process connects with a server process on well-known port 25. A client retrieves email, however, using one of two application layer protocols: Post Office Protocol (POP) or Internet Message Access Protocol (IMAP). With POP, mail is downloaded from the server to the client and then deleted on the server. The server starts the POP service by passively listening on TCP port 110 for client connection requests. However, when a client connects to a server running IMAP, copies of the messages are downloaded to the client applications. The original messages are kept on the server until they are manually deleted.

An IP subnetting design requires 200 subnets and 120 hosts/subnet for the largest subnets, and requires that a single mask be used throughout the one private IP network that will be used. The design also requires planning for 20 percent growth in the number of subnets and number of hosts/subnet in the largest subnet. Which of the following answers lists a private IP network and mask that, if chosen, would meet the requirements?a. 10.0.0.0/25b. 10.0.0.0/22c. 172.16.0.0/23d. 192.168.7.0/24

Answers

Answer:

b. 10.0.0.0/22

Explanation:

Variable length subnet masking is a concept in networking that helps minimize wasting of Ipv4 ( IP version 4) network addressing. It takes a networking address and splits it to variable length.

The question above requires 120 hosts and a future host update of 20%, which is 144 hosts and a subnet of the same address of 200 to 240 in update. The host octet of the network address is totally used, which gives 254 hosts, that is extract 110 hosts. This can be further subnetted.

The two bits from the third octet is used for subnetting to give over 240 subnet mask.

Select the correct answer. In which area is composing for games similar to composing for movies?
A. royalties earned
B. success of song-based soundtracks
C. usage of audio software for mixing and editing
D. spotting sessions

Answers

I believe the answer is c, hope this helps

Answer:

c

Explanation:

cuz im jus right

You have a scenario where you need to disable the guest network on your wireless router. You try to log in, but your password does not work. After several attempts, you realize that you forgot your password. What can you do?

Answers

Answer:

Reset the router by holding down the reset button for 30 seconds. The reset button can be located in the back or bottom area of the router. The function of the reset button is to turn restore the wireless router to default factory setting such that customized settings including the DNS, the static IP address setup, stored personal passwords DHCP parameter settings port forwarding and routing settings are erased.

Explanation:

You are generating a derivatively classified piece of information and are looking for information in a classified database. While you are searching, you find a piece of information that is extremely helpful. It appears to include all of the classification markings including portion, banner, and classification authority block. Is this information authorized for use as a source of derivative classification?

Answers

Answer:

Yes

Explanation:

A classified information is piece of information that is hidden from public eyes as it could threaten national security if exposed

A derivatively classified piece of information is a piece of information document that extracts information from a classified information source and incorporates this information into the document. These classified documents bear classification markings which are used to show that the information is classified and give instructions on handling and dissemination. A derivative classifier is one who develops classified information using authorized classified information sources

Section 1.4 of Executive Order 13526 lists categories of information eligible for classification

Which of the following statements are true of software engineers? Check all of the boxes that apply. They are responsible for writing programming code. They are usually strong problem-solvers. They spend most of their work hours running experiments in a laboratory. They must hold advanced degrees in computer science.

Answers

Answer:

First two statements: yes. Last two: not so much.

But many of the better ones do have advanced degrees, but some don't.

The laboratory statement is silly; they sit behind a set of screens figuring out stuff and writing code.

It should be noted that statements are true about software engineers are;

They are responsible for writing programming code. They are usually strong problem-solvers.

Software engineering can be regarded as branch of computer science which is responsible for the development as  well as the building of computer softwares, these could be applications software or system software.

The engineers that carry out this process is referred to as software engineers and they are responsible for responsible for writing programming code.

We can conclude that software engineers are strong problem-solvers.

Learn more about software engineer at:https://brainly.com/question/25757629

A system has defined specifications that describe how signals are sent over connections. Which layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model provides this function

Answers

Answer:

"Transport" is the correct answer.

Explanation:

Two platforms resemble the transport layer: TCP, as well as UDP. This same different network IP protocol continues to provide a sequence number to the target server from some kind of destination node. That whenever a server user requests to another server, that indicates the enslaved person delivers a response to a network interface.

So that the above would be the correct approach.

The game begins with the player having 20 POINTS

The player rolls 2 six sided dice and the sum of faces on the two dice are calculated. That’s called the players POINT.

If the POINT is a 7 or 11, the player wins his POINT

If the POINT is a 2, 3, or 12, the player loses his POINT

If the POINT is anything else, then the game continues by the player rolling the two dice again and again recording and checking the sum until

The player makes his point (The sum of his dice roll equals his POINT value) and then he wins his POINT

The player rolls a 7 and then he loses his POINT.

The player is considered a winner if he can acquire 60 POINTS and is considered a loser when he runs out POINTS

After the program has finished, display the total number of rolls of the dice that were made in the entire game.
In need for python file grade 11 work

Answers

Answer:

Following are the code to this question:

import random#import package for using random method  

def rolling_dice(): #defining method rolling_dice that uses a random number to calculate and add value in dice1 and dice2 variable

   dice1 = random.randint(1,6)

   dice2 = random.randint(1,6)

   return dice1 + dice2

def rolling(): # defining method rolling

   n_roll = 0  # defining num variable that initial value that is 0.

   p = 20 # defining variable p for looping, that points in between 1 and 59

   while p > 0 and p < 60: # defining loop that counts value dice value two times  

       d = rolling_dice()#defining d variable that hold method value

       n_roll+= 1 #defining n_roll that increment n_roll value by 1

       if d == 7 or d == 11:# defining if block that uses the d variable that checks either 7 or 11, player won d in p variable

           p+= d   # use p variable that adds d variable

       elif d == 2 or d == 3 or d == 12:#defining elif block to that checks d variable by using or operator  

           p-= d#defining d variable that decreases d variable variable

       else: # defining else block

           p1 = d # using p1 variable that store d value  

           while True:# defining loop that calculates values

               d = rolling_dice()#defining d variable that holds method values

               n_roll += 1 #increment the n_roll value by 1

               if d == 7:#defining if block that checks d value equal to 7

                   p -= p1#subtract the value of p1 in p variable  

                   break # exit loop

               elif d == p:#defining elif block to check d value is equal to p

                   p += p1#adds the value of p1 in p variable  

                   break#using break keyword

   if p<= 0:#defining if block that checks p-value is less then equal to 0  

       print('Player lost')#using print method

   elif p>= 60:#defining else block that checks p-value is greater than equal to 60

       print('Player won')#using print method to print the value

   print('number of dice rolls:', n_roll)#use print method to print n_rolls value

rolling()

Output:

Player lost

number of dice rolls: 38

Explanation:

In the above-given python code, a method "rolling_dice" is declared, inside the method two-variable "dice1 and dice2" is declared, that uses the random method to calculate the value in both variable and use the return keyword to add both values.

In the next step, another method the "rolling"  is declared, inside the method "n_roll and p" is declared that assigns the values and use the two while loop, inside the loop if block is defined that calculates the values. In the next step, a condition block is used that stores value in the p variable and use the print method to print the "n_roll" value.  

________is a nickname for social media tools which allows users to contribute content easily and to easily connect to each other. Instant Messaging Web 2.0 Cognitive surplus QR codes

Answers

Answer:

Web 2.0

Explanation:

The term that is being defined here is known as Web 2.0. As mentioned in the question this term refers to any and all social platform websites that emphasize user-generated content, ease of use, participatory culture, and interoperability for end users. Some examples of Web 2.0 features would be social media sites like FB, blogs, wikis, video sharing sites, image sharing sites, etc.

You are replacing the toner cartridge for an old laser printer. You are concerned that several internal components are reaching their maximum age based on the printer's page count, and you need to replace the parts. However, you also know that certain components are included with the toner cartridge. You do not want to replace any components that are included in the toner cartridge. Which components are normally included in the cartridge

Answers

Answer:

The answer is "It is the photosensitive drum, that is electrostatically charged by the toner".

Explanation:

The laser printer uses the drum, which is also called a selenium-sensitive metal roller bearing. Its electrical circuit, which is mostly on the container, has been placed mostly on the printing business but instead, with exception of text a laser scans the ride cymbal 's surface.

In traditional printers, its electromagnetic loading wheel placed in addition to a drum.It rotates a picture-sensitive rotating disc, which would carry an electrical force on its substrate and while in the dark.

A small group of travelers is meeting inside an ancient building, and the travelers need access to the Internet using their mobile devices. However, the group is in an area where Wi-Fi Internet is not available and cellular coverage is intermittent. One of the travelers has an unlimited cellular data plan and a strong consistent signal. Which of the following methods would most likely be implemented to provide Internet service to the group?a. Cell phone tetheringb. Satellite Internetc. Mobile hotspotd. Cell phone tethering

Answers

Answer:

c. Mobile hotspot

Explanation:

A mobile hotspot is a hotspot that is to be activated by turning on the WiFI hotspot. It is used to share the cellular data to the laptop, computer system and the mobile devices who do not have an internet connection

Since in the question, it is mentioned that the one traveler has an unlimited cellular data plan and a consistent strong signal

So the mobile hotspot should be used to provide internet service to the group.

You have just purchased a motherboard that has an LGA 1156 socket for an Intel Pentium processor. What type of memory modules will you most likely need for this motherboard? A. DIP B. SIMM C. DIMM D. SODIMM

Answers

Answer:

The answer is "Option C"

Explanation:

The term DIMM  stands for the Dual In-Line Memory Module, which is a kind of memory, that is used in computers.  It is a small board of flash memory that uses the 64-bit memory bus because the SIMM has only a 32-bit path. It enables DIMMs to simultaneously transfer more information, and the wrong choices can be defined as follows:

In choice A, It is used in sockets, that's why it is wrong. In choice B, It is wrong because it is used in 32 bits only. In choice D, It is wrong because it is used in the expansion of memory.  

can anyone please help me with this

Answers

Answer:

This should do it. I assume the alignment of the numbers is not important?

<!DOCTYPE html>

<html>

<head>

<style>

table {

 border-collapse: collapse;

 font: 15px Verdana;

 font-weight: bold;

}

table, td {

 border: 1px solid black;

}

td {

 width: 80px;

 height: 80px;

 text-align: center;

}

</style>

</head>

<body>

<table>

 <tr>

   <td>1</td>

   <td>2</td>

   <td>3</td>

   <td>4</td>

 </tr>

 <tr>

   <td colspan="2">5</td>

   <td>6</td>

   <td rowspan="2">7</td>

 </tr>

 <tr>

   <td>8</td>

   <td>9</td>

   <td>10</td>

 </tr>

</table>

</body>

</html>

In a batch operating system, three jobs JOBI, JOB2, JOB3 are submitted for ex- ecution. Each job involves an I/O activity, a CPU time, and another 1/0 activity. JOB1 requires a total of 21 ms, with 3 ms CPC time. JOB2 requires 29 ms total time with 5 ms CPU time. JOB3 requires 14 ms total time with 4 is CPU time. 3.1 What will be the CPU utilisation for uniprogramming? Write down all interme diate steps. 3.2 What will be the CPU utilisation for multiprogramming? Write down all inter- mediate steps

Answers

Answer:

The answer to this question can be defined as follows:

In option 1, the answer is "18.75%".

In option 2, the answer is "33%".

Explanation:

Given:

JOB 1-Time of the CPU = 3ms, rest = 18ms, sum = 21  

JOB 2-Time of the CPU = 5ms, rest = 24ms, sum  = 29    

JOB 3 -Time of the CPU =4ms, rest = 10ms, sum = 14  

In option 1:

whenever the job has also been allocating the system, in the uni-programs system, which looks at the CPU until it is complete.  

Formula:

[tex]\text{Utilization of CPU} =\frac{ \text{total time of CPU} }{ \text{full real time}}[/tex]

                              [tex]=\frac{(3+5+4)}{(21+29+14)}[/tex]

                              [tex]=\frac{12}{64}\\\\= 0.1875\\\\=18.75%[/tex]

In option 2:

However, if any software is interested in other operations like I / o, it can assign to the CPU Processor to others Systems and other software may be carrying out I / o operations there while the processor is with any other application.

Formula:

[tex]\text{Utilization of CPU} =\frac{ \text{total time of CPU} }{ \text{full real time}}[/tex]

                              [tex]=\frac{12}{36}\\\\=\frac{1}{3}\\\\=.33\\\\= 33 \%[/tex]

write a python program to calculate the compound interest

Answers

Answer:

initialPrincipal = float(input("Please enter your initial principal:"))

interestRate = float(input("Please enter your interest rate:"))

timePeriod = float(input("Please enter your number of times interest applied per time period:"))

elapsedPeriod = float(input("Please enter your number of time period elapsed:"))

finalAmount = initialPrincipal*(1 + interestRate/timePeriod)^(timePeriod*elapsedPeriod)

print("Your final amount would be:", finalAmount)

Could Anyone help me with these two questions?

Answers

Answer:1st is b

2nd is d

Explanation:

Assume that strike Counter has already been declared to be a "pointer to int". Assume further that strike Counter has been initialized -- its value is the address of some int variable. Write a statement that adds 22 to the value of the variable that strikeCounter is pointing to.

Answers

Answer:

The statement to this question can be defined as follows:

*strike_Counter =*strike_Counter +22;//adds  value 22 in *strike_Counter

Explanation:

In the given question, it is already defined, that "strike_Counter" is an integer pointer variable, which means, it only holds the integer value in its address memory.

In the next step, it is defined, that it adds the value "22" in its variable, and for this, we declare the statement in the answer section, which adds the value.  

for example, if in the "strike_Counter" variable holds the integer value, that is 5 and after adding the 22 it will become 27.    

Display all the natural numbers from 1 to 100 that are exactly divisible by 3 and 7 using FOR … NEXT. Without using Mod

Answers

Answer:

FOR i% = 1 TO 100

 IF ((i%\3) = i%/3) AND ((i%\7) = i%/7)  THEN

   PRINT i%

 END IF

NEXT i%

Explanation:

Of course using MOD would be cleaner, but another way to check if a number is integer divisable is to compare the outcome of an integer division to the outcome of a floating-point division. If they are equal, the division is an integer division.

The program outputs:

21

42

63

84

if your computer is gliching what do you do to stop it and some times it turnes off what do you do

Answers

Answer:

You can take it to the shop to fix it since it happens often ig

Explanation:

I Hope This Helps bro

in object oriented programming what is a constructor?

a. the attributes that allow a programmer to imagine a new object
b. the behaviors that allow a programmer to design a new object
c. the code that allows a programmer to create a new object
d. the template that allows a programmer to modify a new object

Answers

Answer:

The answer is A.

Answer:

A. the attributes that allow a programmer to imagine a new object

Explanation:

Got the answer right on the test!

Difference between switch case and if else statement.​

Answers

Answer:

SWITCH CASE:

STATEMENT WILL BE EXECUTED IS DECIDED BY USER.

SWITCH STATEMENT EVALUATES ONLY CHARACTER OR INTEGER VALUE.

IT USING SINGLE EXPRESSION FOR MULTIPLE CHOICES.

IF - ELSE STATEMENT.

STATEMENT WILL BE EXECUTED DEPEND UPON THE OUTPUT OF THE EXPRESSION INSIDE.

IF THE STATEMENT EVALUATES INTEGER, CHARACTER, POINTER OR FLOATING- POINT TYPE OR BOOLEAN TYPE.

IF USING MULTIPLE STATEMENT FOR MULTIPLE CHOICES.

HOPE IT HELP....

What are the Typical application
of mini computer​

Answers

Answer:

calls, messages, photos, emails

Explanation:

as in mobile phones

Answer:Minicomputers are used for scientific and engineering computations, business-transaction processing, file handling, and database management, and are often now referred to as small or midsize servers.

Explanation:

Your company has assigned you to revise 22 scripts. Since you use the vi editor, how can you set it to automatically display lines as numbered so it is easier for you to work on these revisions

Answers

Answer:

To enable VI editor automatically display lines as numbered, the following steps must be taken:

Step 1: Press the Escape key to exit the insert or append mode.

Step 2. Press the colon key to trigger the cursor. The cursor will appear at the lower-left position of the screen next to a : prompt.

The Next step is to type the following command: set no number hit the enter button to execute the command. This will trigger a column of sequential line numbers will appear at the left side of the display. Each line number references the text located directly to the right of it.

Step 3: To enable this to happen automatically, the appropriate set statement as a line in must be inserted a file in your home directory named .exrc

Cheers!

Discuss three ways in which errors can arise in developing and executing linear optimization models in business situations, and indicate some of the business consequences of such errors. Explain how analytics professionals can help to prevent such errors.

Answers

Answer:

The following are the three-way, in which errors arise and, the process to solve them.

Explanation:

The mistake is something you did, that could not be incorrect. It may consider errors when creating and implementing simulation models in business situations because of some procedure problems. It is not because of bemusement and a few of the other error types were also acceptable even though the correction is affordable.

Type 1 error:  This type of error arises due to limited accuracy issues, in this the gadgets or devices used for the simulation study, quantitative measurements. These errors Often simplified in expectations. It is a concept for analysis, in which experts firstly understand this kind of mistake.  Type 2 error:  These errors may occur due to inaccuracy. If another analytic method behaves differently for two analysts. It tends to cause errors, that are unrecognized by no pre-defined methods for fixing those errors. Type 3 error:  These issues can be reduced by the improper selection of software, and in the implementation period, it can consider this sort of error due to the failure of system integration tools.

state the function of font group in the home tab​

Answers

Explanation:

This group provides access to all the Character Formatting commands.

IPv6 can use a DHCPv6 server for the allocation of IPv6 addressing to hosts. Another IPv6 addressing option utilizes the IPv6 Neighbor Discovery Protocol (NDP) to discover the first portion of the IPv6 address (network prefix) from local routers, and the host can create its own host ID. What standard is commonly used by an IPv6 host to generate its own 64-bit host ID

Answers

Answer:

Following are the answer to this question.

Explanation:

It is a mechanism, that is also known as EUI-64, which enables you an automatic generation of its specific host ID. It using the device on the 48-bit MAC address, which helps to construct the special 64-bit host ID. It also helps you to build a DHCP-type IPv6 network, that's why we can say that the above-given standard is widely used to create a 64-bit host ID on IPv6 servers.

Other Questions
After years of maintaining a steady population of 32,000, the population of a town begins to grow exponentially. After 1 year and an increase of 8% per year, the population is 34,560. Which equation can be used to predict, y, the number of people living in the town after x years? (Round population values to the nearest whole number.) y = 32,000(1.08)x y = 32,000(0.08)x y = 34,560(1.08)x y = 34,560(0.08)x Bias can _____ be completely eliminated. a) always b)sometimes c) never Activity In this activity, you will analyze the themes, and context of Jane Austens novel Pride and Prejudice. Part A Using the table below, describe the various characters and their perspectives in the story. Type one to three traits in each box. In the column labeled Evidence from the Text, enter quotations from the excerpt to support your descriptions. help please I need help :( Give another name plane L algebraic expression twice the difference of a number and 5. with x being "a number" UAAR is planning to build in house software similar to Zoom Application. University Authorities contact with you in order to provide best solution with in limited time and limited resources in term of cost.Describe the roles, Artifacts and activities, keeping in view Scrum process model.Compare and contract your answer with scrum over XP for development of above mention system. Justify your answer with the help of strong reasons, why you choose scrum model over XP model. How scrum is more productive for project management. Furthermore, highlight the shortcoming of XP model. A car moving at 36 m/s passes a stationary police car whose siren has a frequency of 500 Hz. What is the change in the frequency (in Hz) heard by an observer in the moving car as he passes the police car? (The speed of sound in air is 343 m/s.) The advantage of a hydraulic lever is A : it transforms a small force acting over a large distance into a large force acting over a small distance. B : it transforms a small force acting over a small distance into a large force acting over a large distance. C : it allows you to exert a larger force with less work. D : it transforms a large force acting over a large distance into a small force acting over a small distance. E : it transforms a large force acting over a small distance into a small force acting over a large distance. Let $DEF$ be an equilateral triangle with side length $3.$ At random, a point $G$ is chosen inside the triangle. Compute the probability that the length $DG$ is less than or equal to $1.$ Here can somebody help me with this problem 2. A cylinder has a height of 4.5 cm and a diameter of 1.5 cm. What is the surface area of the cylinder in square centimeters? Use 3.14 for pi.21.231.87.924.7 A man of mass 75kg stands on a weighing machine in a lift. Determine the reading of the weighing machine when the lift is moving: 1. Upwards with an acceleration of 2m/s 2. Downwards with a constant velocity of 1.5m/s 3. Downwards with an acceleration of 2.5m/s Which of the following is the best way to help build your self-esteem?OA. Adapt.B. Be critical.C. Speak clearlyD. Know your abilities. The phone company offers to long-distance plans the first charges a flat value of five dollars per month plus $.99 each minute used and the second charge is $10 a month plus $.79 for each minute used if X represents the number of minutes use each month which system each of equations represent the amount of money why are you spin which is the right relationship of calories and physical activity according to the dietary guidelines for americans? A EATING FEWER CALORIES BALANCED MORE ACTIVITY.... What will be assigned to the variable s_string after the following code executes? special = '1357 Country Ln.' s_string = special[ :4] Group of answer choices WILL GIVE BRAINLY PLEASE HELP!!!! A quadratic equation of the form 0=ax2+bx+c has a discriminant value of -16. How many real number solutions does the equation have?A) -1 B) 0C) 1D) 2 Data pertaining to the current position of Forte Company are as follows:Cash $412,500Marketable securities 187,500Accounts and notes receivable (net) 300,000Inventories 700,000Prepaid expenses 50,000Accounts payable 200,000Notes payable (short-term) 250,000Accrued expenses 300,000Required:Compute: a. The working capital. b. The current ratio. c. The quick ratio. Find the area of the following shape.