Describe what happens at every step of our network model, when a node of one network...

Answers

Answer 1

Answer:

Each node on the network has an addres which is called the ip address of which data is sent as IP packets. when the client sends its TCP connection request, the network layer puts the request in a number of packets and transmits each of them to the server.


Related Questions

solve the average of 4 numbers and display fail if grade is below 60​

Answers

Need a better discription of the question to finalize an answer.

My iPhone XR screen is popping out. Is it because I dropped it?

Answers

Answer:

Yes that is most likely why your screen is popping out.

Explanation:

Most likely

or Java,
program to perform this computa
3.
Isaac Newton devised a clever method to casily approximate the square root of a number without having
to use a calculator that has the square root function. Describe this method with illustration​

Answers

Answer:

The illustration in Java is as follows:

import java.util.*;

import java.lang.Math.*;

class Main{

public static void main (String[] args){

 Scanner input = new Scanner(System.in);

 double num, root, temp;

 num = input.nextDouble();

 temp = num;

 while (true){

  root = 0.5 * ( (num / temp)+temp);

  if (Math.abs(root - temp) < 0.00001){

   break;   }

  temp = root;  }

 System.out.println("Root: "+root);

}}

Explanation:

This declares all necessary variables

 double num, root, temp;

This gets input for num (i.e the number whose square root is to be calculated)

 num = input.nextDouble();

This saves the input number to temp

 temp = num;

This loop is repeated until it is exited from within the loop

 while (true){

Calculate temporary square root

  root = 0.5 * ( (num / temp)+temp);

The loop is exited, if the absolute difference between the root and temp is less than 0.00001

  if (Math.abs(root - temp) < 0.00001){

   break;   }

Save the calculated root to temp

  temp = root;  }

This prints the calculated root

 System.out.println("Root: "+root);

1. Briefly explain the various types of models used in software Engineering with benefits and limitations for each

Answers

Answer:

The Software Model represents the process abstractly. The different activities involved in developing software products are present in each phase of the software model. The order for each stage to be executed is also specified.

Explanation:

Waterfall model:-

Benefits

Implementing the waterfall model is very easy and convenient.

It is very useful for implementing small systems.

Limitations

If some of the changes are made at certain phases, it may create confusion.

First, the requirement analysis is performed, and sometimes not all requirements can be expressly indicated in the beginning.

Spiral model:-

Benefits

The working model of the system can be quickly designed through the construction of the prototype.

The project can be refined by the developer and the user during the development phase.

Limitations

If customer communication is not good or proper, the result is total project failure or project failure which could lead to project comission.

3. It is used to measure the resistance on ohms and voltage that flow in circuit both AC and DC current. A. Gadget C. Electrical tape B. Voltage D. Multi-tester VOM​

Answers

Answer:

the answer is D. Multi -tester VOM

It is used to measure the resistance on ohms and voltage that flow in the circuit both AC and DC current is D. Multi-tester VOM​.

What does an ammeter degree?

Ammeter, tool for measuring both direct or alternating electric powered modern, in amperes. An ammeter can degree an extensive variety of modern values due to the fact at excessive values most effective a small part of the modern is directed thru the meter mechanism; a shunt in parallel with the meter consists of the main portion. ammeter.

A multimeter or a multitester additionally referred to as a volt/ohm meter or VOM, is a digital measuring tool that mixes numerous size capabilities in a single unit. A traditional multimeter can also additionally encompass capabilities consisting of the capacity to degree voltage, modern and resistance.

Reda more about the Voltage:

https://brainly.com/question/24858512

#SPJ2

A technician is able to connect to a web however, the technician receives the error, when alternating to access a different web Page cannot be displayed. Which command line tools would be BEST to identify the root cause of the connection problem?

Answers

Answer:

nslookup

Explanation:

Nslookup command is considered as one of the most popular command-line software for a Domain Name System probing. It is a network administration command-line tool that is available for the operating systems of many computer. It is mainly used for troubleshooting the DNS problems.

Thus, in the context, the technician receives the error "Web page cannot be displayed" when he alternates to access different web page, the nslookup command is the best command tool to find the root cause of the connection problem.

In this chapter, you learned that although a double and a decimal both hold floating-point numbers, a double can hold a larger value. Write a C# program named DoubleDecimalTest that declares and displays two variables—a double and a decimal. Experiment by assigning the same constant value to each variable so that the assignment to the double is legal but the assignment to the decimal is not.

Answers

Answer:

The DoubleDecimalTest class is as follows:

using System;

class DoubleDecimalTest {

 static void Main() {

     double doubleNum = 173737388856632566321737373676D;  

    decimal decimalNum = 173737388856632566321737373676M;

   Console.WriteLine(doubleNum);

   Console.WriteLine(decimalNum);  } }

Explanation:

Required

Program to test double and decimal variables in C#

This declares and initializes double variable doubleNum

     double doubleNum = 173737388856632566321737373676D;

This declares and initializes double variable decimalNum (using the same value as doubleNum)

     decimal decimalNum = 173737388856632566321737373676M;

This prints doubleNum

   Console.WriteLine(doubleNum);

This prints decimalNum

   Console.WriteLine(decimalNum);

Unless the decimal variable is commented out or the value is reduced to a reasonable range, the program will not compile without error.

Write a method that prints on the screen a message stating whether 2 circles touch each other, do not touch each other or intersect. The method accepts the coordinates of the center of the first circle and its radius, and the coordinates of the center of the second circle and its radius.

The header of the method is as follows:

public static void checkIntersection(double x1, double y1, double r1, double x2, double y2, double r2)


Hint:

Distance between centers C1 and C2 is calculated as follows:
d = Math.sqrt((x1 - x2)2 + (y1 - y2)2).

There are three conditions that arise:

1. If d == r1 + r2
Circles touch each other.
2. If d > r1 + r2
Circles do not touch each other.
3. If d < r1 + r2
Circles intersect.

Answers

Answer:

The method is as follows:

public static void checkIntersection(double x1, double y1, double r1, double x2, double y2, double r2){

    double d = Math.sqrt(Math.pow((x1 - x2),2) + Math.pow((y1 - y2),2));

    if(d == r1 + r2){

        System.out.print("The circles touch each other");     }

    else if(d > r1 + r2){

        System.out.print("The circles do not touch each other");     }

    else{

        System.out.print("The circles intersect");     }

}

Explanation:

This defines the method

public static void checkIntersection(double x1, double y1, double r1, double x2, double y2, double r2){

This calculate the distance

    double d = Math.sqrt(Math.pow((x1 - x2),2) + Math.pow((y1 - y2),2));

If the distance equals the sum of both radii, then the circles touch one another

    if(d == r1 + r2){

        System.out.print("The circles touch each other");     }

If the distance is greater than the sum of both radii, then the circles do not touch one another

   else if(d > r1 + r2){

        System.out.print("The circles do not touch each other");     }

If the distance is less than the sum of both radii, then the circles intersect

   else{

        System.out.print("The circles intersect");     }

}

Write the algorithm for finding the perimeter of a rectangle using English like form step by step

Answers

L+L+W+W= Permiter
Or Lenght+Lenght+Width+Width= Perimeter
That’s all just add all the 4 sides

HELP ITS A TESTTT!!!Which symbol shows auto correct is in use?

A-a white light bulb
B-A green plus sign
C-A flashing red circle
D-A yellow lightning bolt

Answers

After careful consideration the answer to this problem looks to be D

Answer:

D

Explanation:

Describe how data is transmitted using half-duplex serial data transmission.

Answers

Answer:

In half duplex mode, the signal is sent in both directions, but one at a time. In full duplex mode, the signal is sent in both directions at the same time. In simplex mode, only one device can transmit the signal. In half duplex mode, both devices can transmit the signal, but one at a time.

The compound known as butylated hydroxytoluene, abbreviated as BHT, contains carbon, hydrogen, and oxygen. A 1.501 g sample of BHT was combusted in an oxygen rich environment to produce 4.497 g of CO2(g) and 1.473 g of H2O(g). Insert subscripts below to appropriately display the empirical formula of BHT.

Answers

Answer:

C15H24O

Explanation:

n(C) = 4.497 g/44g/mol = 0.1022

Mass of C = 0.1022 × 12 = 1.226 g

n(H) = 1.473g/18 g/mol = 0.0823 ×2 moles = 0.165 moles

Mass of H = 0.0823 × 2 ×1 = 0.165g

Mass of O= 1.501 -(1.226 + 0.165)

Mass of O= 0.11 g

Number of moles of O = 0.11g/16g/mol = 0.0069 moles

Dividing through by the lowest ratio;

0.1022/0.0069, 0.165/0.0069, 0.0069/0.0069

15, 24, 1

Hence the formula is;

C15H24O

Answer

The formula is C1SH240

Fill in the necessary blanks to list the name of each trip that does not start in New Hampshire (NH) Use the Colonial Adventure Tour Database listing found on the Canvas webpage under Databases or in the text.
SELECT TripName
FROM______
WHERE Trip____ ____NH:

Answers

Answer:

SELECT TripName

FROM AllTrips

WHERE Trip NOT LIKE ‘NH%'

Explanation:

Required

Fill in the blanks

The table name is not stated; so, I assumed the table name to be AllTrips.

The explanation is as follows:

This select the records in the TripName column

SELECT TripName

This specifies the table where the record is being selected

FROM AllTrips

This states the fetch condition

WHERE Trip NOT LIKE ‘NH%'

Note that:

The wild card 'NH%' means, record that begins with NHNot means opposite

So, the clause NOT LIKE 'NH%' will return records that do not begin with NH

What would be the result of the flooding c++ cide assuming all necessary directive
Cout <<12345
Cout< cout < Cout<< number <

Answers

Answer:

See explanation

Explanation:

The code segment is not properly formatted; However, I will give a general explanation and a worked example.

In c++, setprecision are used to control the number of digits that appears after the decimal points of floating point values.

setprecision(0) means; no decimal point at all while setprecision(1) means 1 digit after the decimal point

While fixed is used to print floating point number in fixed notation.

Having said that:

Assume the code segment is as follows:

number = 12.345;

cout<<fixed;

cout<<setprecision(0);

cout<<number <<endl;

The output will be 12 because setprecision(0) implies no decimal at all; So the number will be rounded up immediately after the decimal point

name any two objectives of a business​

Answers

Explanation:

Growth – Another important objective of business is to achieve growth. The growth should be in terms of increase in profit, revenue, capacity, number of employees and employee prosperity, etc.

Stability – Stability means continuity of business. An enterprise or business should achieve stability in terms of customer satisfaction, creditworthiness, employee satisfaction etc. A stable organization can easily handle changing dynamics of markets.

1.               Which of the following is smallest?

a)     desktop System Unit

b)     notebooks System Unit

c)     PDA System Unit

d)     tablet PC’s​

Answers

Answer:

c)     PDA System Unit

Explanation:

.... ...

Trust me mark me as brainliest trust me

Answer:

The smallest is PDA System Unit - c

The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be adapted to work with any implementation that does not run in fixed time.
A. mathematical.
B. timing.
C. chosen ciphertext.
D. brute-force.

Answers

Answer:

chosen ciphertext

Explanation:

Chosen ciphertext attack is a scenario in which the attacker has the ability to choose ciphertexts C i and to view their corresponding decryptions – plaintexts P i . It is essentially the same scenario as a chosen plaintext attack but applied to a decryption function, instead of the encryption function.

Cyber attack usually associated with obtaining decryption keys that do not run in fixed time is called the chosen ciphertext attack.

Theae kind of attack is usually performed through gathering of decryption codes or key which are associated to certain cipher texts

The attacker would then use the gathered patterns and information to obtain the decryption key to the selected or chosen ciphertext.

Hence, chosen ciphertext attempts the use of modular exponentiation.

Learn more : https://brainly.com/question/14826269

52. Which of the following numbering system is used by the computer to display numbers? A. Binary B. Octal C. Decimal D. Hexadecimal​

Answers

Answer:

Computers use Zeroes and ones and this system is called

A. BINARY SYSTEM

hope it helps

have a nice day

A.Binary B. octal is the correct answer

Regarding the role played by the “victim” in deadlock resolution, give an example of such a deadlock in real life and explain your answers to these questions.

a. Describe how you might choose the victim to be removed and the consequences, both positive and negative, of that removal.

b. Describe the fate of the victim and the chances of eventually completing its processing.

c. Describe the actions required, if any, to complete the victim’s tasks. ​

Answers

Answer:

Here the answer is given as follows,

Explanation:  

The real-life situation of a deadlock resolution where a role is played by the victim is given as follows:  

Example: An example of such a situation are often a one-way lane where the flow of traffic is merely in a method. Thus, on just one occasion, the flow of traffic can enter one direction only. Each entrance/exit gate is often considered a resource. during this case, if two cars are coming from both the entrances and that they are often considered as two tasks, then one among the cars must copy or we will say hand over its resource in order that the opposite car gets the prospect to first cross the lane or we will say the opposite task gets executed.  

 a)  Victim: The steps which describe how a victim is chosen are given as follows :  

   The task which is terminated so as to interrupt things of deadlock is taken into account because of the victim.

There are often a variety of job pools that will be under a deadlock situation and therefore the victim is usually a low-priority task in order that the performance isn't affected that much and termination of this task doesn't cause any effect on the opposite jobs.

the main positive effect of selecting and terminating a victim is that things of deadlock are resolved and every one of the tasks can execute now.

The negative effect is that the task that's chosen because the victim is terminated and is executed at the previous. This whole process for choosing a victim then terminating it then restarting it again may consume some longer also.

b)  An easy deadlock priority is often set. this suggests that the victim’s task or the task is often terminated so as to interrupt the deadlock and other jobs can finish executing. After this, the task which is terminated are often later restarted and every one of the tasks can then execute without a deadlock.

 c) When employment gets terminated, the knowledge associated with it's stored. Are often This is often done in order that the work can be restarted again and therefore the information in it's not lost. Since the progress of the victim is stopped. Thus, the sole thanks to complete the victim’s task would be to start out it again. But before restarting the task, this must be considered that the victim’s task doesn't cause any deadlock within the system.  

electronic age,what format/equipment people use to communicate with each other?​

Answers

Answer:

They share or broadcast information by making a letter or information in a papyrus material. in industrial age they use Telegraph or typewriter to communicate each other.

In electronic age, people use electronic medium for communication, like emails and messegers.

which of the following is an example of how science can solve social problems?
It can reduce the frequency of severe weather conditions.
It can control the time and day when cyclones happen.
It can identify the sources of polluted water.
It can stop excessive rain from occurring.

Answers

Answer:

It can identify the sources of polluted water.

Explanation:

Science can be defined as a branch of intellectual and practical study which systematically observe a body of fact in relation to the structure and behavior of non-living and living organisms (animals, plants and humans) in the natural world through experiments.

A scientific method can be defined as a research method that typically involves the use of experimental and mathematical techniques which comprises of a series of steps such as systematic observation, measurement, and analysis to formulate, test and modify a hypothesis.

An example of how science can solve social problems is that it can identify the sources of polluted water through research, conducting an experiment or simulation of the pollution by using a computer software application.

In conclusion, science is a field of knowledge that typically involves the process of applying, creating and managing practical or scientific knowledge to solve problems and improve human life.

Answer:

It can identify the sources of polluted water.

Explanation:

Which of followings are true or false?

a. Swapping two adjacent elements that are out of place removes only one inversion.
b. Any algorithm that sorts by exchanging adjacent elements requires O(n log n)
c. Shellsort with a proper distance function is faster than mergesort for a very large input (like sorting 1 billion numbers).
d. The average-case performance of quick sort is O(NlogN), but the best-case performance of quick sort is O(N) for a pre-sorted input.
e. The number of leaves in a decision tree for sorting n numbers by comparisons must be 2n.
f. The height of a decision tree for sorting gives the minimum number of comparisons in the best case.
g. Any decision tree that can sort n elements must have height Big-Omega (n log n).
h. Bucket-sort can be modeled by a decision tree.

Answers

Answer:

Explanation:

a. Swapping two adjacent elements that are out of place removes only one inversion.

Answer: True

b. Any algorithm that sorts by exchanging adjacent elements requires O(n log n)

Answer: False

c. Shellsort with a proper distance function is faster than mergesort for a very large input (like sorting 1 billion numbers).

Answer: True

d. The average-case performance of quick sort is O(NlogN), but the best-case performance of quick sort is O(N) for a pre-sorted input.

Answer: True

e. The number of leaves in a decision tree for sorting n numbers by comparisons must be 2n.

Answer: False

f. The height of a decision tree for sorting gives the minimum number of comparisons in the best case.

Answer: True

g. Any decision tree that can sort n elements must have height Big-Omega (n log n).

h. Bucket-sort can be modeled by a decision tree.

Answer: True

Write a c++ program to find;
(I). the perimeter of rectangle.
(ii). the circumference of a circle.

Note:
(1). all the programs must allow the user to make his input .
(2).both programs must have both comment using the single line comment or the multiple line comment to give description to both programs.​

Answers

Answer:

Perimeter:

{ \tt{perimeter = 2(l + w)}}

Circumference:

{ \tt{circumference = 2\pi \: r}}

Just input the codes in the notepad

Write a function addingAllTheWeirdStuff which adds the sum of all the odd numbers in array2 to each element under 10 in array1. Similarly, addingAllTheWeirdStuff should also add the sum of all the even numbers in array2 to those elements over 10 in array1.

Answers

Answer:

The function is as follows:

def addingAllTheWeirdStuff(array1,array2):

   sumOdd = 0

   for i in array2:

       if i % 2 == 1:

           sumOdd+=i

   for i in array1:

       if i < 10:

           sumOdd+=i

   print("Sum:",sumOdd)

   

   sumEven = 0

   for i in array1:

       if i % 2 == 0:

           sumEven+=i

   for i in array2:

       if i > 10:

           sumEven+=i

   print("Sum:",sumEven)

Explanation:

This declares the function

def addingAllTheWeirdStuff(array1,array2):

This initializes the sum of odd numbers in array 2 to 0

   sumOdd = 0

This iterates through array 2

   for i in array2:

This adds up all odd numbers in it

       if i % 2 == 1:

           sumOdd+=i

This iterates through array 1

   for i in array1:

This adds up all elements less than 10 to sumOdd

       if i < 10:

           sumOdd+=i

This prints the calculated sum

   print("Sum:",sumOdd)

   

This initializes the sum of even numbers in array 1 to 0

   sumEven = 0

This iterates through array 1

   for i in array1:

This adds up all even numbers in it

       if i % 2 == 0:

           sumEven+=i

This iterates through array 2

   for i in array2:

This adds up all elements greater than 10 to sumEven

       if i > 10:

           sumEven+=i

This prints the calculated sum

   print("Sum:",sumEven)

You are a high school student learning about computers and how to build them. As a class project, you have built a new computer. You power on your computer and begin to configure the system. After a short while, you notice smoke coming from the PC, and shortly after that, the computer stops working. After removing the computer case, you see that the CPU and surrounding areas are burnt and very hot. You realize that the costly mistake you made was not using a heat sink. When rebuilding your computer, which cooling systems would MOST efficiently remove heat from the CPU?

Answers

Answer:

You can use thermal paste, active heat sink, liquid pipes, and even a fan. These are just some that I've heard.

Explanation:

All of these are cooling and will stop the Central Processing Unit from overheating.

Hope this helps :)

When rebuilding your computer, the cooling systems which would most efficiently remove heat from the Central processing unit (CPU) are: cooling fan and thermal compounds.

A computer refers to an intelligent electronic device that is designed and developed to receive raw data as an input and then processes these data into an information (output) that is usable by an end user.

Basically, the main part of a computer are broadly divided into the following;

Input devices (peripherals). Output devices (peripherals). Motherboard. Memory and storage device.Central processing unit (CPU).

A cooling device can be defined as a device that is designed and developed to efficiently remove or dissipate heat from the inside of a computer. The cooing system used in a computer are grouped into two

(2) main categories and these are:

I. Active cooling device: an example is a cooling fan.

II. Passive cooling device: an example is a heat sink.

In conclusion, the cooling systems which would most efficiently remove heat from the Central processing unit (CPU) are cooling fan and thermal compounds.

Read more: https://brainly.com/question/10983152

Reverse Word Order: Write a program that reverses the order of the words in a given sentence. This program requires reversing the order of the words wherein the first and last words are swapped, followed by swapping the second word with the second to last word, followed by swapping the third word and the third to last words, and so on.

Answers

Answer:

function reverseArray(arr) {

   if (arr.length > 1) {

      arr = [arr[arr.length-1], ...reverseArray(arr.slice(1, -1)), arr[0]]

   }

   return arr;

}

function reverseSentence(sentence) {

   let words = reverseArray( sentence.split(" ") );

   return words.join(" ");

}

console.log( reverseSentence("The quick brown fox jumps over the lazy dog's back") );

console.log( reverseSentence("one two three") );

console.log( reverseSentence("one two") );

console.log( reverseSentence("Single") );

Explanation:

This is a solution in javascript leveraging several powerful constructs in that language, such as the spread operator.

An attribute is a(n)?

Answers

Answer:

hjqnajiwjahhwhaiwnaoai

Answer:

Which I am not sure of as to what I want to watch a few years back in May but it is not part of Malvolio's that is not a big thing for the world of

as an IT manager write a memo to the student explaining the requirements of an ideal computer room


Answers

The correct answer to this open question is the following.

Memorandum.

To: IT class.

From: Professor Smith.

Date:

Dear students,

The purpose of this memorandum is to let you all know the requirements of an ideal computer room.

1.- The compute room should be a decent, large, space, ready to accommodate the number of students that are going to participate in class.

2.- The proper temperature levels. All the hardware can't stand too much heat. We need ventilators and the right temperature for safety purposes.

3.- The organization of the PCs on every desk must be precise in order to have enough room for everybody's participation and interaction.

4.- Have a proper fire suppression system in place. The risk of fire when working with electronics is considerable.

5.- Access control. The equipment is expensive and must be just for qualified students. Have the proper control-access system to keep the place safe.

Thank you for your attention.

With your cooperation, the computer room should be a place to learn and have fun learning new things.

Your IaaS cloud company has announced that there will be a brief outage for regularly scheduled maintenance over the weekend to apply a critical hotfix to vital infrastructure. What are the systems they may be applying patches to

Answers

Answer: Load Balancer

Hypervisor

Router

Explanation:

The systems that they may be applying the patches to include load balancer, hypervisor and router.

The load balancer will help in the distribution of a set of tasks over the resources, in order to boost efficiency with regards to processing.

A hypervisor is used for the creation and the running of virtual machines. The router helps in the connection of the computers and the other devices to the Internet.

Given 4 floating-point numbers. Use a string formatting expression with conversion specifiers to output their product and their average as integers (rounded), then as floating-point numbers. Output each rounded integer using the following: print('{:.0f}'.format(your_value)) Output each floating-point value with three digits after the decimal point, which can be achieved as follows: print('{:.3f}'.format(your_value))

Answers

Answer:

The program is as follows:

prod = 1

isum = 0

for i in range(4):

   num = float(input())

   prod*=num

   isum+=num

avg = isum/4

print('{:.0f}'.format(prod))

print('{:.3f}'.format(avg))  

Explanation:

This initializes the product to 1

prod = 1

..... and sum to 0

isum = 0

The following iteration is repeated 4 times

for i in range(4):

Get input for each number

   num = float(input())

Calculate the product

   prod*=num

Add up the numbers

   isum+=num

This calculates the average

avg = isum/4

Print the products

print('{:.0f}'.format(prod))

Print the average

print('{:.3f}'.format(avg))  

Other Questions
You are the Cultural Coordinator of APC Public School Vandora. Your school has decided to organize a carnival to be held in the school grounds. You have been asked to write a notice about this carnival inviting the students and teachers to participate in it. Write a notice more than 50 words to be put up on the notice board with all the relevant details help me please only if you really know Which expression are greater than 1/2? Choose all the apply (a+b)(a-b)=? y l hng ng thc no? Find Length of x line OR What is the best way to avoid E. coli?1) Reheat foods properly2) Cook meat to safe temperatures3) Thaw me appropriately4) Chill raw meat until it is ready to cook If Greg is hosting a BBQ and he needs 50 corn on the cobs. A package of 5 costs $3.25. How much money does he need to get the 50 corn on the cobs? Select and read a primary and secondary text about the September 11, 2001, attacks. You may use video and print for your source, then create a presentation that meets the following requirements.Present the key ideas in the primary accountWhat ideas seemed critical?Did the presentation of material make an impact on you? (Think: word choice, expressions, details provided.)Discuss the authors analysis and conclusionsPresent the key ideas in the secondary accountWhat ideas seemed critical?Did the presentation of material make an impact on you? (Think: word choice, expressions, details provided.)Discuss the authors analysis and conclusions.AnalysisWhat was unique about what the primary source taught you?What was unique about what the secondary source taught you?Discuss the strengths and weaknesses of each sourceWere details missing from one or both sources?Did both sources provide the same or a more complete picture of the event?(you choose your own primary and secondary sources) Nepal has to have a clear-cut human development policy. Explain A unique aspect of the ancient Ethiopian civilization was the fact that a. it remained animist in religion until the twentieth century. b. it adopted the form of Christianity practiced in Egypt. c. it was the only Muslim society in the area. d. its assimilation by Kush was brought about through the development of trade ties. e. it became a Muslim nation because of the Syrians. Which relationship is always true for the angles x,y and z of triangle ABC While alive, an organism absorbs (radioactive) carbon 14 at such a rate that the proportion of carbon 14 in the organism remains at a known constant level. When it dies, it no longer absorbs carbon 14, so its proportion of carbon 14 begins to decrease. The half-life of carbon 14 is 5,600 years. A human skeleton is discovered whose level of carbon 14 is 15% that of a living human. To the nearest 100 years, how long ago did the person die Select the correct answer.As society has changed, what have most households become?O A.dual incomeB. single incomeOC.controlled by womenD.compromised of extended family caretakers At Dubai English School, 549 students use buses to go to school. If this number is 75% of the total school enrollment, then how many students are enrolled in total? If the first and last terms of a trinomial are perfect squares, the trinomial is a perfect squaretrinomial.TrueO False O O OFrom what you have read so far, which of the following describe a "deeper message" of The Awakening?Check the two best choices.Creole families spend the summer on an island.Edna interacts with her husband and other men in different ways.Women should question their identities and roles in society.Differences in the way women treat their children reveal character traits.It's difficult to go against society's expectations.DO NEVIntro Which is the Value if this expression when m = 3 and n = -5 A box with a square base and open top must have a volume of 256000 c m 3 . We wish to find the dimensions of the box that minimize the amount of material used. First, find a formula for the surface area of the box in terms of only x , the length of one side of the square base. In an oxidation-reduction reaction, the substance oxidized always ________. a. takes on oxygen atoms b. gives up hydrogen atoms c. gains electrons d. loses electrons e. becomes a charged species Neil is buying steak for a cookout on Saturday. Steak is on sale for $9.62 per pound. If he buys 7.5 pounds of steak, how much money does he spend?