The Internet Control Message Protocol (ICMP) works at Layer 3 to deliver connection-oriented packets.

Answers

Answer 1

False: Connection-oriented packets are delivered at Layer 3 by the Internet Control Message Protocol (ICMP).

What is Internet Control Message Protocol (ICMP)?The primary purpose of ICMP is for error reporting. When two devices connect over the Internet, the ICMP generates errors to share with the sending device in the event that any of the data did not get to its intended destination. For example, if a packet of data is too large for a router, the router will drop the packet and send an ICMP message back to the original source for the data.A secondary use of ICMP protocol is to perform network diagnostics; the commonly used terminal utilities traceroute and ping both operate using ICMP. The traceroute utility is used to display the routing path between two Internet devices. The routing path is the actual physical path of connected routers that a request must pass through before it reaches its destination. The journey between one router and another is known as a ‘hop,’ and a traceroute also reports the time required for each hop along the way. This can be useful for determining sources of network delay.

To learn more about router refer to:

https://brainly.com/question/28180161

#SPJ4


Related Questions

C# is strongly typed language means that every data value doesn't need to have an associated data type.

true
or
false​

Answers

C# is strongly typed language means that every data value doesn't need to have an associated data type is false​

What does a strongly typed language means?

A language that enforces strong typing demands that every object have a type. For an operation to be permitted on an object in the highly typed language, it must first be checked at runtime. There is no way to go around the type system. If we attempt to apply an operation on an object that does not support that operation in a strongly typed language, an error will be raised.

A language is said to be statically typed if type checking is done at compile time rather than run time.

Therefore, According to the description of strongly typed, we are concerned that checks are performed at run-time in strongly typed while C does not. The strongly typed implementation of C is thus avoided.

Learn more about strongly typed language from

https://brainly.com/question/29692224
#SPJ1

Identify different steps of starting a business.​

Answers

Answer: hope your buissness goes well if your starting one/ hope this helps

Explanation:

Conduct market research. Market research will tell you if there's an opportunity to turn your idea into a successful business. ...

Write your business plan. ...

Fund your business. ...

Pick your business location. ...

Choose a business structure. ...

Choose your business name. ...

Register your business. ...

Get federal and state tax IDs.

________ allow(s) a commercial software package or cloud-based software to be modified to meet an organization's unique requirements without destroying the integrity of the software.

Answers

Customization features allow(s) a commercial software package or cloud-based software to be modified to meet an organization's unique requirements without destroying the integrity of the software.

What is Customization System?

As the name suggests, they are those developed or adapted to meet the specific needs of the company. In this sense, they differ from the so-called “off-the-shelf software”, which are those that are ready to be installed.

By customizing the benefits, you give the decision-making power to him, changing the focus from the product to the customer. With this, it is possible to choose what is in fact relevant to him at that moment.

See more about Customization features at brainly.com/question/29594386

#SPJ1

Question 10 of 25
Which three statements describe impacts of computers on the world around
you?
A. Computers control traffic lights and public transportation
systems.
B. Computers are used to order meals from paper menus in
restaurants.
C. Computers allow people to take classes and complete
assignments remotely.
D. Computers are used to track and keep records for health care and
education.

Answers

Answer:

A. Computers control traffic lights and public transportation systems.

C. Computers allow people to take classes and complete assignments remotely.

D. Computers are used to track and keep records for health care and education.

Explanation:

Computers have had a significant impact on many aspects of modern life, including transportation, education, and healthcare. They are used to control traffic lights and public transportation systems, which helps to improve efficiency and safety. They are also used to facilitate distance learning and to keep track of important records in the healthcare and education sectors.

Instructions: Assume that there is a Vole program stored in memory at address 0x00, as illustrated in the table below. Trace the execution of the program step-by-step, and write down the contents of

the program counter (PC);
the instruction register (IR); and
the memory cell at address 0x02
at the end of each fetch phase of the machine cycle until the machine halts.

Memory Address Contents
0x00 0x22
0x01 0x11
0x02 0x32
0x03 0x02
0x04 0xC0
0x05 0x00

Answers

It is a language with codes. Using a total of 16 bits, which are also represented by hexadecimal numerals, the instructions are encoded. Thus, option C is correct.

What is the Vole program stored in memory at address?

The operation field of the register and the op-code make up a vole machine's instructions. The operation field has the final 12 bits, and the first 4 bits are known as the op-code.

The program counter is the register that holds the address of the subsequent instruction. The program counter (therefore the word counter) typically increments by one after each instruction is executed to hold the address of the subsequent instruction.

Therefore,  0×02 0×32 the memory cell at address 0×02 at the conclusion of each fetch phase of the machine cycle until the machine halts. The instruction register (IR).

Learn more about Vole here:

https://brainly.com/question/28197647

#SPJ1

Why is it important to judge relevance of facts prior to performing scientific experiments?

Answers

It is important to judge the relevance of facts prior to performing scientific experiments because this helps to ensure that the experiments are well-designed and focused on answering specific research questions. By considering the relevance of the facts, researchers can identify the most important variables to measure and control in the experiment. This helps to reduce the risk of collecting unnecessary or irrelevant data, which can waste time and resources.

Additionally, judging the relevance of facts can help researchers to identify any potential biases or limitations in their experiments. This can help them to design experiments that are more objective and accurate, and to interpret their results more carefully.

Overall, judging the relevance of facts is an important part of the scientific process because it helps researchers to focus their efforts on answering important research questions and to design and conduct experiments that are more likely to produce meaningful and reliable results.

How can an Excel table be added to a Word document? Check all that apply

Answers

by using the Insert Object dialog box
by linking an Excel table to a Word document
by drawing the Excel table in the Word document
by using the Convert Text to Table option in Word
by inserting Quick Tables into the Word document


The answers will be A & B.

Max is a cybersecurity professional. His job responsibilities include creating a risk management plan and employing additional safety practices. What
position does Max hold in his organization?

A chief information security officer
B. information assurance manager
C. penetration tester
D. network security engineer

Answers

Since Max is a cybersecurity professional. The position that Max hold in his organization is option D. network security engineer.

Who is responsible for risk management?

The President (Chair) and those in charge of the various business areas make up the Management Group, which is in charge of implementing risk management, keeping an eye on operational hazards, and taking risk-related action.

The following hardware and software systems are installed, configured, and maintained by a network security specialist in order to assure network security: deploys, evaluates, and maintains security tools like email encryption, firewalls, and VPNs.

Therefore, the network security engineer defends computer systems against online dangers such viruses, malware, and hacking attempts. The IT expert should be able to recognize current problems and create defenses against potential dangers. Systems' hardware and software must be tested and configured.

Learn more about network security engineer from

https://brainly.com/question/28558870
#SPJ1

Answer: information assurance manager

Explanation:

will edit if I'm wrong

write a docstring for this function

Answers

Answer:

def word_wrap(message, length=79):

   """

   Wrap a message to a specified line length.

   Args:

       message (str): The message to be wrapped.

       length (int): The maximum line length. Default value is 79.

   Returns:

       str: The wrapped message.

   """

   lines = message.split('\n')

   output = []

   for line in lines:

       words = line.split(" ")

       if len(words) > 0:

           output_line = words[0]

           for word in words[1:]:

               if len(output_line + f' {word} ') > length:

                   output.append(output_line)

                   output_line = f"{word}"

               else:

                   output_line = f"{output_line} {word}"

           output.append(output_line)

   return '\n'.join(output)

The ___ utility allows you to create a copy of your entire hard drive on an external hard drive.
A. Backup and Restore
B. Scan Disk
C. Disk Copy
D. System Image

Answers

D. System Image is the answer

There is a group of n children standing in a queue, where their ages are listed in the array A[ ]. The children are standing randomly in the queue. Most probably, their ages in the array A[ ] are randomly listed too. For each child, you are required to search for the next older child in the queue and to print the difference of their ages. Print all the outputs in an array Out[ ].

Answers

Answer:

solution for b)

A = [11, 10, 7, 13, 14, 12, 9, 15, 8]

Out = []

for i in range(len(A)):

   if i == len(A) - 1:

       if A[i] < A[0]:

           Out.append(A[0] - A[i])

       else:

           Out.append(-1)

   else:

       if A[i] < A[i + 1]:

           Out.append(A[i + 1] - A[i])

       else:

           Out.append(-1)

print(Out)

to select a command using the keyboard, you can press the letter or number displayed in a keytip, which may cause additional keytips related to the selected command to appear.

Answers

True, to select a command using the keyboard, you can press the letter or number displayed in a keytip, which may cause additional keytips related to the selected command to appear.

What is command statement?

One form of statement that tells someone what to do is a command. Additional sentence types include inquiries, exclamations, and declarations. Usually, but not always, command phrases begin with an imperative (bossy) verb because they demand that the subject take an action.

Because command phrases order someone to do action, they typically—though not always—begin with an imperative (fussy) verb. Examples: The teacher yelled, "Stop talking! The crowd yelled, "Catch the ball!"

A statement that provides the reader a directive, a request, or a command is considered imperative.

Read more about command statement:

https://brainly.com/question/10941789

#SPJ4

You have cut the range A1:A5, and want to paste it to C1:C5. Which of the following statements is true?
a.Before you paste it, you need to select C1:C5.
b.Before you paste it, you only need to select cell C1.
c.After you paste it, the information is deleted from the Clipboard.
d.After you paste it, the information is deleted from the original location.

Answers

The answer is Options a & d,

Before you paste it, you need to select C1:C5.After you paste it, the information is deleted from the original location.

The question described the process of Copy only the formatting of the cell range A1:A5 and paste it to the cell range C1:C5.

What is Range in Excel?

The range ("A1:A5") can pick many cells at once. The cells from A1 through A5 will be selected by the word "select." Things to Keep in Mind All of the RANGE property-related methods are also available in VBA.

A cell or group of cells is all that a range is. In VBA, the word range is frequently used to choose a specific cell or group of cells. Everything in VBA refers to cells and ranges, just like it does when working with Excel. Comprehending the fundamentals of range in VBA is crucial for understanding the VBA.Move cells by using Cut and PasteSelect a cell or a cell range.Select Home > Cut Cut or press Ctrl + X.Select a cell where you want to move the data.Select Home > Paste Paste or press Ctrl + V.

To know more about Range in Excel refer to :

https://brainly.com/question/28144037

#SPJ4

Fill in the countdownFrom method, so it prints a line with each number starting with the first number down to the second number. For example, calling countdownFrom(5, 2) will print: 5 4 3 2 You may assume that the second parameter will be no larger than the first number. Make sure your run method calls countdownFrom(10, 5)!

Answers

Answer:

def countdownFrom(first, second):

   for i in range(first, second - 1, -1):

       print(i)

countdownFrom(10, 5)

Explanation:

since you didnt mention what program to use, im assuming you are using python

A(n) Summary function calculates summary statistics including AVERAGE, COUNT, and SUM, using criteria specified in a range.A. TrueB. False

Answers

true, A Summary function calculates summary statistics including AVERAGE, COUNT, and SUM, using criteria specified in a range.

What do the Excel summary functions do?

You can add up your values, count them all together or only the numeric ones, average them, identify the biggest or smallest value within a group of them, multiply them to get their product, or calculate their standard deviation or variance. Subtotals and summaries use the Sum function by default.

In Excel, where is the summary function?

To change a cell in the Value field, perform a right-click. Simply select Summarize Values By from the pop-up option. Select the Summary Function you want to utilize by clicking on it.

What three purposes does summarizing serve?

Summaries serve the following three purposes:

(1) They make an article's content clear, assisting readers in determining whether or not they want to read it;

(2) they assist readers in organizing their ideas around what will come next; and

(3) they assist readers in remembering key elements of the piece.

Learn more about excel functions here:

brainly.com/question/10307135

#SPJ4

which of the following is not a computer application

Answers

The technological feature which is not a computer application is: c. Apple OSX.

What is an application software?

In Computer technology, an application software can be defined as a type of software program which is designed and developed to enable end users perform a variety of tasks on a computer system.

This ultimately implies that, an application software avails end users an opportunity to accomplish tasks such as create text documents through the use of Microsoft Word.

Furthermore, Apple OSX is an example of a system software (operating system) while the other examples of an application software include the following:

Internet ExplorerPaintWindows Media PlayerNotepad

Read more on software here: brainly.com/question/25703767

#SPJ1

Complete Question:

Which of the following is not a computer application?

a. Internet Explorer

b. Paint

c. Apple OSX

d. Microsoft Word

mary is interested in moving into a career as a penetration manager. which of the following it certifications should she pursue? CEH, CISM, CISSP

Answers

Pursuit of a CEH certificate you can find employment in one of the IT industries that is expanding the quickest with this qualification.

What does penetration serve to accomplish?Penetration testing's primary goal is to assess how likely it is that systems or end users will be compromised and to assess any potential effects that might result from such an incident on the resources or operations that are at stake.Typically, testers that are ethical hackers will conduct pen tests. These IT professionals are ethical hackers that assist businesses in locating potential entry points into their infrastructure by using hacking techniques.   Pursuit of a CEH certificate You can find employment in one of the IT industries that is expanding the quickest with this qualification.    

To learn more about Penetration testing's refer to:

https://brainly.com/question/26555003

#SPJ4

A potential customer would like to try Microsoft 365 Business Premium for a few days, just to test it. Is that possible?

Answers

If a customer like to try Microsoft 365 Business Premium for a few days, just to test it. It is possible, the person can go for a free trial subscription.

What is Microsoft 365 Business Premium?

Microsoft 365 Business Basic will replace Office 365 Business Essentials. Microsoft 365 Business Standard will replace Office 365 Business Premium.

Keep current with the latest versions of Word, Excel, PowerPoint, and other programs. Use Outlook, Exchange, and Microsoft Teams to communicate with customers and coworkers. Manage your files from anywhere with 1 TB of OneDrive cloud storage per user.

Therefore, it is possible Microsoft 365 Business Premium for a few days by taking a free trial subscription.

To learn more about Microsoft 365 Business Premium, refer to the link:

https://brainly.com/question/29732272

#SPJ1

create a view named to10paidinvoices that returns three columns for each vendors

Answers

Using the knowledge of computational language in JAVA it is possible to write a code that create a view named to10paidinvoices that returns three columns for each vendors.

Writting tge code:

CREATE OR REPLACE VIEW customer_addresses AS

   SELECT

   c.customer_id,

  email_address,

   last_name,

   first_name,

   ba.line1 AS bill_line1,

   ba.line2 AS bill_line2,

   ba.city AS bill_city,

   ba.state AS bill_state,

   ba.zip_code AS bill_zip,

   sa.line1 AS ship_line1,

   sa.line2 AS ship_line2,

   sa.city AS ship_city,

   sa.state AS ship_state,

   sa.zip_code AS ship_zip

FROM

   customers c

       JOIN

   addresses ba ON c.customer_id = ba.customer_id

       AND c.billing_address_id = ba.address_id

       JOIN

   addresses sa ON c.customer_id = sa.customer_id

       AND c.shipping_address_id = sa.address_id;

/*

2

Write a SELECT statement that returns these columns from the customer_addresses

view that you created in exercise 1: customer_id, last_name, first_name, bill_line1.*/

SELECT

   customer_id, last_name, first_name, bill_line1

FROM

   customer_addresses;

See more about JAVA at brainly.com/question/18502436

#SPJ1

Which of the following activities are considered passive in regards to the functioning of an intrusion detection system? (Select two.)- Listening to network traffic- Transmitting FIN or RES packets to an external host- Monitoring the audit trails on a server- Disconnection a port being used by a zombie

Answers

A: Listening to network traffic and C: Monitoring the audit trails on a server are considered passive activities in regard to the functioning of an Intrusion Detection System.

An Intrusion Detection System (IDS) refers to a system that monitors network traffic for suspicious activities and issues alert when such activities are discovered. An intrusion Detection System is a software application that scans a network or server for harmful activities or policy breaches. Any malicious venture or violation activity is reported either to an administrator or collected centrally using a SIEM or security information and event management system. A SIEM  integrates outputs from various sources and uses alarm filtering mechanisms to differentiate malicious activities from false alarms.

You can learn more about Intrusion Detection System at

https://brainly.com/question/28962475

#SPJ4

LAB: Instrument information (derived classes) Given main() and the Instrument class, define a derived class, StringInstrument, for string instruments. Ex. If the input is: Drums Zildjian 2015 2500 Guitar Gibson 2002 1200 6 the output is: Instrument Information: Name: Drums Manufacturer: Zildjian Year built: 2015 Cost: 2500 Instrument Information: Name: Guitar Manufacturer: Gibson Instrument Information: Name: Drums Manufacturer: Zildjian Year built: 2015 Cost: 2500 Instrument Information: Name: Guitar Manufacturer: Gibson Year built: 2002 Cost: 1200 Number of strings: 6 Number of frets: 19 file: 8.10.1: LAB: Instrument information (derived classes) is marked as read only Current file: Instrument.java - 8.10.1: LAB: Instrument information (derived classes)

Answers

class StringInstrument extends Instrument {

  private  int numStrings, numFrets;

  public int getNumOfStrings() {

  return numStrings; }

   public void setNumOfStrings(int numStrings) {

   this.numStrings = numStrings;  }

  public int getNumOfFrets() {

  return numFrets; }

 public void setNumOfFrets(int numFrets)

  this.numFrets = numFrets; } }

What sort of instruments are strings?

The violin is the smallest member of the string family, followed by the viola, cello, and the largest member of the family, the double bass, also known as the contrabass.

What materials are used in stringed instruments?

Any musical instrument that makes sound through the vibrating of stretched strings, whether they are made of silk, animal gut, metal, or synthetic materials like plastic or nylon, is referred to as a stringed instrument.

To know more about string visit:-

https://brainly.com/question/4087119

#SPJ1

14. The Hazard Communication Standard (HCS) is also known as the "right to know" law. A. O True B. O False​

Answers

Answer:

A. True

Explanation:

The Hazard Communication Standard (HCS) is also known as the "right to know" law. This law was enacted in the United States in 1986 and requires employers to provide employees with information about hazardous chemicals that are used in the workplace. The HCS is based on the principle that workers have a "right to know" about the hazards of chemicals that they may be exposed to at work.

From the options given below, choose the lead that provides the most direct transverse plane view of the interventricular septum of the heart.
a. lead V1
b. lead V3
c. lead V5
d. lead V7

Answers

The interventricular septum of the heart can be seen most clearly in the transverse plane through lead V1.

Which leads track the electrical activity of the heart's frontal plane?

The strength of the electrical signal is measured in certain directions inside the frontal plane by the standard and augmented limb leads. The unipolar chest leads measure the potential difference between the chest's surface and an unrelated composite electrode.

Which precordial lead offers a transverse view of the anterior wall of the left ventricle?

Groups of the precordial chest leads can be used to see various parts of the heart. The anterior leads, also known as leads V1, V2, V3, and V4, collectively provide a clear view of the anterior region of the heart. Together, leads V5 and V6 scan the left ventricle's lateral wall.

To know more about transverse visit:-

https://brainly.com/question/13618693

#SPJ4

suppose we have a 32bit virtula address, 4gb physical memory, 16kb pages, and a 32kb l1 cahce with 32b cache lines

Answers

Think of a device having a 32-bit logical address range. A page table may contain up to 1 million entries (232/212) if the system's page size is 4 KB (212).

A 32-bit system: What is it?

Computer systems containing a processor, memory, and other significant system components that operate on data in 32-bit units are referred to as 32-bit computing in computer architecture. 32-bit computers are more effective at handling massive calculations and processing more data per clock cycle than computers with lesser bit widths.

Describe a 32-bit example.

OS/2 and Windows NT are two excellent examples of the first 32-bit operating systems. 32-bit Windows versions are sometimes referred to as WOW32. Currently, 64-bit operating systems are replacing 32-bit operating systems.

To know more about 32-bit system visit;

https://brainly.com/question/14564853

#SPJ4

python sets are a powerful tool in programming, and are made even more useful and dynamic with many methods. match these correctly

Answers

Python sets are a powerful tool in programming, and are made even more useful and dynamic with many methods. This statement is true because Python serve you with many library.

What is Python Programming?

Python is a computer programming language commonly used to build websites and software, automate tasks, and perform data analysis. Python is a general-purpose language. H. It can be used to create a wide variety of programs and is not specific to any particular problem. Python has a simple syntax similar to English. Python has a syntax that allows developers to write programs in fewer lines than other programming languages.

Learn more about Python: https://brainly.com/question/26497128

#SPJ4

A flowchart is a way to visually represent an algorithm. The flowchart below is used by an application to set the Boolean variable available to true under certain conditions. The flowchart uses the Boolean variable weekday and the integer variable miles.
BlockExplanationOvalThe start or end of the algorithmDiamondA conditional or decision step, where execution proceeds to the side labeled true if the condition is true and to the side labeled false otherwiseRectangleOne or more processing steps, such as a statement that assigns a value to a variable
Which of the following statements is equivalent to the algorithm in the flowchart?Selected Answer: [None Given]Answers:
weekday ad miles < 20

Answers

The statement that is equivalent to the algorithm in the flowchart is weekday ad miles < 20

What is an algorithm diagram?

An algorithm is graphically depicted in a flowchart. It is frequently used by programmers as a technique for planning programs to address issues. It employs interconnected symbols to represent the movement of information and processing. "Flowcharting" is the process of creating a flowchart for an algorithm.

Note that there are Two distinct techniques, algorithms and flowcharts, are useful for developing new programs, particularly in computer programming. A flowchart illustrates the steps of a program while an algorithm provides a step-by-step examination of the process.

Learn more about algorithm from

https://brainly.com/question/24953880
#SPJ1

write a pseudocode statement that multiple the variable subtotal by 0.15 and assign the result to the variable totalfee

Answers

Answer:

Set totalFee = subtotal * 0.15

Explanation:

There are various ongoing competitions or complexities facing logistics and transportation companies in managing its supply chain operations either domestically or internationally, from the point of shippers until the point of consumption. These complexities have become a barrier and less competitive force among the other competitors in leveraging the profit margin and to be consistent in the market. Elaborate FIVE (5) competitions or complexities and meantime, propose solutions to overcome those competitions or complexities.​

Answers

Complex network of suppliers, manufacturers, and customers: Logistics and transportation companies often have to manage a complex network of suppliers, manufacturers, and customers, which can be challenging to coordinate and optimize. One solution to this complexity is to implement a supply chain management software that can help track and manage the flow of goods and information throughout the supply chain.

Limited capacity and resources: Logistics and transportation companies may face limited capacity and resources, which can impact their ability to meet demand and deliver goods on time. One solution is to implement just-in-time inventory management, which allows companies to only stock the necessary inventory needed to meet demand and reduce waste.

Volatility in demand and supply: Demand and supply can be volatile, which can make it difficult for logistics and transportation companies to forecast and plan effectively. One solution is to implement demand planning and forecasting tools, which can help companies predict and plan for changes in demand.

High transportation costs: Transportation costs can be a major factor in the logistics and transportation industry, and they can be difficult to manage and control. One solution is to implement a transportation management system (TMS), which can help companies optimize routes and reduce transportation costs.

Regulatory compliance: Logistics and transportation companies must adhere to a range of regulations, including safety regulations, environmental regulations, and trade regulations. One solution is to invest in compliance management software, which can help companies ensure compliance with all relevant regulations.

In C++, When addressing variables in memory, addresses for some data-types (such as int, float and double) must be a multiple of 2, 4 or 8.
TRUE OR FALSE

Answers

True, in C++ you may use the & operator to get the memory address of a variable, as in: cout I endl; The output of that cout is the memory address of the first byte of the newly created variable i.

What operator can be used to determine a data type or variable's memory capacity in bytes?

The size that a data type represents can be determined by using the sizeof operator. For instance: sizeof(int); When used with a type name, the sizeof operator returns the total amount of memory that an object of that type can use, including any internal or tail padding.

Which of the following operators allocates memory for an object?

The new command returns a reference to the object after dynamically allocating memory for it. This reference points to the location in memory of the object that new allocated.

To know more about variable visit:-

https://brainly.com/question/17344045

#SPJ4

Write a code for Karol with proper indentation and style.

Answers

The code for Karol with proper indentation and style will be:

function start(){

for (var i = 0; i < 4; i++) {

move();

run();

}

function run(){

if (noBallsPresent()) {

for (var i = 0; i < 8; i++) {

putBall();

move();

}

turnLeft();

}

}

}

What is a program?

A computer program is a set of instructions written in a programming language that a computer can execute. Software includes computer programs as well as documentation and other intangible components.

It should be noted that the start function can be defined as a Coroutine, which allows it to pause its execution (yield). In this case, the code for Karol was given above.

Learn more about program on:

https://brainly.com/question/26642771

#SPJ1

Other Questions
Why does mainland europe have a wider variety of plant life than the british isles?. What did Roger Sherman have to do with the Great Compromise? I need a detailed explanation, please! ~Describe each transformation in words.11.) _____________________. PLEASE HELP ASAP ITS URGENT!!!!!!!!!!!!!!!!!! Let A={9,8,3,0,5} and B={8,4,7,5,0}. Select from the following choices the one that represents the intersection of A and B? The Joint Commission uses the word "medication" to mean:a. Any agent to treat a patientb. Any agent to diagnose a patientc. Over-the-counter preparationsd. Herbal remediesg. All of the above Factorise 64(x-9x+18)=4x 2Write an equation in slope-intercept form that models the situation. In order to go bowling,you must pay a one-time fee of $10 for rental shoes, and then pay $3 per game. Let yrepresent the total cost of bowling after playing x games. * (5 Points)y=-3x+10y=3x+10y=10x-3y=10x+3y=-10x+3 please help:show that two quadrilaterals are congruent the 2013 supreme court case shelby county v. holden invalidated the key accomplishments of the voting rights act of 1965, which led to a cascade of new state laws intended to limit the right to vote for poor people of all races. true or false? Which positive even integer, when added to the following2 consecutive odd integers, creates a sum of 40? A party who seeks to appease an opponent may be willing to place the opponent's interests above his or her own, sacrificing to maintain the relationship.We refer to this conflict-handling intention as:A) collaborating.B) avoiding.C) compromising.D) competing.E) accommodating. if on an average a teflon polymer has 100,000 monomer units and each monomer of teflon has the formula c2f4, what is the molar mass of the polymer? "Can he explain a little of what happened after the shot was fired?"Liaqat's answer caused the translator to raise his voice slightly at him. Iqbal's mother broke in briefly, and she, too, raised her voice at Liaqat. It was as if he had not given the answer they wanted to hear."He was crying and he was confused," said the translator.I knew it could not have been all that Liaqat had said, but we had no way of probing further.Free the Children,Craig KielburgerWhich statement best describes the authors interpretation of events? why do some people object to banning discrimination based on appearance? how does rhode address these objections your employer is arrested for fraud and you lose your job after you worked diligently putting in lots of extra hours. is the meaning of? Question 1 (2 points)". As if he were related to one of those intricate machines that register earthquakesten thousand miles away. "(p. 2)SimpleComplexUninterestingBroken In 3 paragraphs write about being a 17 year indigenous 500 years ago, explain your cultural identity including limitations placed on being indigenous, explain which of those limitations that continue to exist then explain the possibilities, then explain what are the characteristics you want to retain and how you can strengthen your identity. In order for someone to be diagnosed with intellectual disability, problems with intelligence and general level of performance must be evidentbefore the age of 18 what was the most significant reason for the success of mao and the communists in the chinese civil war?\