a pc a is downloading a file from pc b. the tcp window is 800 bytes. the server is sending the file using 100-byte segments. how many segments will the pc b send before it requires an acknowledgment from the pc a?

Answers

Answer 1

To determine the number of segments PC B will send before requiring an acknowledgment from PC A, we need to calculate how many segments can fit within the TCP window size.

Given:

TCP window size: 800 bytes

Segment size: 100 bytes

To find the number of segments, we divide the TCP window size by the segment size:

Number of segments = TCP window size / Segment size

Number of segments = 800 bytes / 100 bytes

Number of segments = 8 segmentsTherefore, PC B will send 8 segments before it requires an acknowledgment from PC A.

To know more about TCP click the link below:

brainly.com/question/17156951

#SPJ11


Related Questions

What are the symptoms of memory errors? How do you troubleshoot memory problems?

Answers

Ensure that your machine has the appropriate memory component. You can check up the part number on the website of the manufacturer. Verify that the RAM is setup properly. Install the module again. Module switching

What does troubleshooting entail by memory failure?

One of three things is typically to blame when you experience memory issues: Incorrect Configuration: Either the correct component is not in your machine, or the configuration guidelines were not followed. Improper Installation: The socket may be faulty, dirty, or the memory may not be properly set in it.

What causes issues with computer memory?

The most frequent reason for memory issues is a weak, malfunctioning, or overloaded power supply. Overheating of the system is the second most likely reason.

To know more about memory errors visit:-

https://brainly.com/question/14661353

#SPJ4

A table has been created in Word, to make it more visually appealing you want to change colors of the cells in the rows/columns. Which option would you choose to do this? : Insert Table, Table Properties/Table Tools, Table Layout, Table Convert

Answers

Select Fill by clicking the arrow next to it under Table Styles on the Tables menu. Simply select Fill Effects from the Fill menu. The desired color can then be selected by clicking the Solid tab. Simply select the Gradient tab.

How can I make Word's columns and rows shaded?

When adding shade to a table, first choose the desired cells. Click the Shading menu on the Table Tools Design tab (in OneNote, this is the Table Tools Layout tab).

How may the options for table styles be used to make a table more appealing?

To an existing table, apply a table style. Choose any cell from the table. Pick Design. Pick the table style you want to use from the gallery of table styles. Note: Click Design to get rid of a table style.

To know more about table style visit :-

https://brainly.com/question/18257861

#SPJ1

Any packet-switching network can handle multimedia data.

True or False

Answers

It is true that any packet-switching network can handle multimedia data.

What is packet-switching network?

Packet switching network or commonly called as PSN is the transfer of small amount of data to the various networks. These data “packets” allow for faster and more efficient in data transfer. Sometimes, when a user send a data across a network, it is transferred not in one piece, but in the smaller amount of data packets. For example: the university web server sending their colleague student a webpage over the internet or their student  sending an email to the university.

Learn more about packet-switching network here

https://brainly.com/question/16100876

#SPJ4

Given an ifstream object named input1, associate it with a file named winterdata.txt by opening the file for reading.
answer choices
input1. open ("winterdata.txt");
input1.close ("winterdata.txt");

Answers

Answer:

input1. open ("winterdata.txt");

Explanation:

You need to customize how Windows Update checks for and installs updates on the ITAdmin desktop system in your organization.

Answers

When updating Windows, instal updates for other Microsoft products, Allow quality updates to be delayed by 30 days, and allow the installation of feature updates to be delayed by 60 days. Windows can be set up to automatically download manufacturer software and unique device icons.

In Windows 10, how do I configure Windows Update?

To keep your computer operating efficiently and securely, Windows 10 lets you choose when and how to get the most recent updates. Select Check for Windows updates to manage your settings and view the updates that are available.

What will the operating system's newly installed devices automatically configure?

A device driver must be installed in order to use a hardware component that has been installed on Windows 10 by the operating system. following configuration.

To know more about Windows visit :-

https://brainly.com/question/13502522

#SPJ4

Which of the following is a term that describes "a widely agreed upon set of rules that standardize
communication between machines"?
Router
E-commerce
Network
Protocol

Answers

Answer:

Protocol General

Explanation:

A widely agreed upon set of rules that standardize communication between machines.

so beautiful picture

Joey wants to buy a $4,000 vehicle with 10 percent down for three years at 12 percent interest. What will his monthly payment be?.

Answers

Joey's monthly payment will be approximately $131.87. For further explanation you can see below.

To calculate Joey's monthly payment, we can use the formula for an amortized loan. An amortized loan is a loan that is repaid in regular, fixed payments that include both principal and interest.

The formula for the monthly payment (M) on an amortized loan is:

M = P [ i(1 + i)^n ] / [ (1 + i)^n – 1]

Where:

P is the principal amount of the loan (the $4,000 purchase price of the vehicle)

i is the monthly interest rate (12% annual interest rate / 12 months per year)

n is the number of payments (3 years x 12 months per year)

First, we need to calculate the down payment, which is 10% of the purchase price.

10% of 4,000 = 400

So, the loan amount will be

4000 - 400 = 3600

Now we will convert the interest rate from annual to monthly.

12% / 12 = 1% or 0.01

Now we have all the values we need to calculate the monthly payment:

M = 3600 [ 0.01(1 + 0.01)^36 ] / [ (1 + 0.01)^36 – 1]

M ≈ 131.87

Therefore, Joey's monthly payment will be approximately $131.87.

Learn more about amortized loan, here https://brainly.com/question/29423025

#SPJ4

In the MakeCode micro:bit reaction speed test program, what will the function
you create in the first step eventually contain?
A. Complete instructions for the user

OB. The entire reaction speed test

C. Users' survey responses

D. The total running time of the program

Answers

B guvfhvfhbg hhcgucfhvc

which hardware components are controlled by the hypervisor?

Answers

The hypervisor controls and manages the hardware resources of the physical host machine, such as CPU, memory, storage, and network interfaces. It allocates these resources to each VM as needed, and ensures that each VM is isolated from the others, so that one VM cannot affect the performance or stability of another.

A hypervisor, also known as a virtual machine manager, is software that creates and manages virtual machines (VMs). These VMs are essentially software-based versions of physical computers that can run their own operating systems and applications.

The hypervisor also provides a virtualized version of the hardware interface to each VM, so that the VM's operating system and applications can interact with the hardware resources as if they were running on a physical machine. This allows multiple VMs to run on a single physical host, increasing the utilization of hardware resources and enabling more efficient use of IT infrastructure.

Learn more about hardware, here https://brainly.com/question/15232088

#SPJ4

Which is the most time efficient algorithm?

Answers

Independent of the size of n, algorithms with constant time complexity run in a constant amount of time. Since their run-time is constant independent of the input data, they are the fastest algorithms currently in use.

What algorithm is the most effective?

Quicksort. One of the most popular sorting algorithms is quicksort since it is also one of the most effective. The pivot number should be chosen first. With smaller numbers to its left and larger numbers to its right, this number will split the data.

Which time complexity is the most effective?

When an algorithm must sequentially read all of its inputs, linear time is the best feasible time complexity.

To know more about efficient algorithm visit:-

https://brainly.com/question/30051816

#SPJ4

A set of instructions or actions in order meaning that each action follows a previous action.


A programming structure that repeats a sequence of instructions as long as a specific condition is true.


This involves a choice (IF-THEN-ELSE).

1.
Sequence

2.
Selection

3.
Iteration (looping)

Answers

Answer:3. Iteration (looping)

Explanation:

this code is not working like i expect — how do i fix it?

resultWorkerErr := make(chan error)
defer close(resultWorkerErr)
go func() {
defer cancel()
resultWorkerErr <- b.resultWorker(ctx)
}()

err := b.worker(ctx)
cancel()
if err == nil {
return <-resultWorkerErr
}
return multierror.Append(err, <-resultWorkerErr)

Answers

Answer:

Try to work at it a lil more and make sure to use test beds. Check the code for any typos and try to correct them. what is your code for?

The example of the code that can be working in the given condition is in explanation part.

What is programming?

Computer programming is the process of writing code that instructs a computer, application, or software program on how to perform specific actions.

Here's an example:

var wg sync.WaitGroup

wg.Add(2)

var workerErr, resultWorkerErr error

go func() {

   defer wg.Done()

   resultWorkerErr = b.resultWorker(ctx)

}()

go func() {

   defer wg.Done()

   workerErr = b.worker(ctx)

}()

wg.Wait()

if workerErr != nil {

   return multierror.Append(workerErr, resultWorkerErr)

}

return resultWorkerErr

Thus, this code starts two goroutines to run b.resultWorker(ctx) and b.worker(ctx) concurrently

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ2

Task Summary Actions you were required to perform: Reconfigure the DHCP server with 192.168.0.5 as the default gateway Verify that the Support workstation can communicate with the Internet Verify that the Office2 workstation can communicate

Answers

Verify the computer's internet and local network connections as Using a Cat5e Ethernet cable, join the PC to the cable modem.

How can two computers on different networks connect with one another?

Step 1: Use an Ethernet wire to connect two computers. Step 2: Open the Network and Sharing Center by selecting Start > Control Panel > Network and Internet. Step 3: In the upper-left corner of the window, select the option Change Advanced Sharing Settings. Turn on file sharing in step four.

How do I communicate with two different devices?

Bluetooth Sockets can be used to connect to them via Bluetooth. The documentation on the Android developer website is pretty decent. You can also utilize standard sockets if you'd prefer (and both devices are connected to the internet).

To know more about local network visit:-
https://brainly.com/question/15227700

#SPJ4

Hash Map implementations group key hashes into "buckets". In what situation would there be multiple key hashes in one bucket?
a. When multiple value objects reference the exact same object in memory.
b. When there has been a hash collision.
c. When the Hash Map is optimized for look-up by concurrent threads.
d. When the same key has been inserted more than once.

Answers

A situation where there would be multiple key hashes in one bucket is where there has been a hash collision. The correct answer is b.

A Hash Map uses a hash function to map keys to indices in an array, called "buckets", where the corresponding values can be found. When multiple keys have the same hash value, they are said to have experienced a "hash collision". These keys are then mapped to the same index, or "bucket" in the array, resulting in multiple key-value pairs being stored in the same bucket. This can occur due to the nature of the hash function or due to the number of keys used in the Hash Map being larger than the number of buckets. Collision resolution techniques are used to handle these cases.

To learn more about Hash Map visit: https://brainly.com/question/29967490

#SPJ4

how do you know if you are being audited by the irs

Answers

It is to be noted that if you are being audited by the IRS, you will get a letter in the mail notifying you of the audit.

What is the IRS?

The Internal Revenue Service (IRS) is the United States federal agency in charge of tax collection and the enforcement of tax laws. They are significant because they guarantee that residents and corporations pay their fair amount of taxes, which finance different government programs and services. Without the IRS, the government would struggle to pay itself and provide essential services to its citizens.

In relation to the question, the letter to indicate that you are being audited will include details on the tax year or years being audited as well as the specific concerns being investigated. It will also tell you how to book an appointment with an IRS auditor. In addition, the IRS may contact you by phone or in-person to schedule an audit.

Learn more about the IRS:
https://brainly.com/question/8949559
#SPJ1

Which information does a traditional stateful firewall maintain? Select all that apply.
Packet route
Network port
MAC address
Source and destination IP address
Data content

Answers

A stateful firewall monitors all incoming and outgoing traffic and assesses it in comparison to a set of predetermined rules. The flow of traffic is stopped if it violates the regulations.

What data does a conventional stateful firewall keep?

A stateful firewall is one that keeps track of every aspect of active network connections. In order to get access to a network, stateful firewalls constantly examine the entire context of traffic and data packets as opposed to discrete traffic and data packets in isolation.

What are the stateful firewalling's two primary characteristics?

Stateful firewalls have a high degree of proficiency in identifying unauthorized attempts or fake messages. The robust memory keeps important network connection characteristics. For proper communication, these firewalls only require a few ports to be open.

To know more about firewall visits :-

https://brainly.com/question/13098598

#SPJ4

location-based sync has two categories: abstract and relative.

Answers

The correct answer is Relative location. A place's relative position describes how it relates to other locations. For instance, the distance between Washington, D.C.'s Empire State Building and America's White House is 227 miles or 365 kilometres.

ReWire is a software technology developed by Propellerhead Software that enables two standalone audio apps to collaborate. This technology enables the programme to route numerous audio channels internally into the Pro Tools mixer. MTC (MIDI Time Code) is a timing sync that conveys to MIDI slave devices the precise time in hours, minutes, seconds, and frames at any given instant on the MIDI master device through a sequence of MIDI messages. a specific kind of MIDI message that is stored in a MIDI sequencer or synchronizer that instructs a connected device how many 16th notes have passed since the song's start.

To learn more about Relative location click the link below:

brainly.com/question/29099421

#SPJ4

file plans must be updated annually or more frequently if necessary.

Answers

True. File plans, also known as records retention schedules, are documents that outline how long different types of records should be kept and when they should be disposed of.

These plans must be reviewed and updated on a regular basis to ensure that they are current and aligned with the organization's needs and legal requirements. The frequency of updates may vary depending on the type of organization, but annual updates are a common practice. Additionally, if there are significant changes to laws, regulations, or the organization's operations that would affect the retention schedule, the plan should be updated more frequently.

The missing part in the question is shown below.

File plans must be updated annually or more frequently if necessary. True/False.

Learn more about file plans, here https://brainly.com/question/4339331

#SPJ4

How to Find an IP Address in Command Prompt

Answers

First, click on your Start Menu and type cmd in the search box and press enter. A black and white window will open where you will type ipconfig /all and press enter. There is a space between the command ipconfig and the switch of /all. Your IP address will be the IPv4 address.

Definition of IP Addresses

Internet Protocol address (or abbreviated IP address) is a numeric label assigned to each device connected to a computer network that uses Internet Protocol for communication. An IP address has two main functions: host or network interface identification and location addressing.

Internet Protocol version 4 (IPv4) defines an IP address as a 32-bit number. However, due to the growth of the Internet and the depletion of available IPv4 addresses, a new version of IP (IPv6), using 128 bits for IP addresses, was standardized in 1998. IPv6 deployments have been ongoing since the mid-2000s.

IP addresses are written and displayed in human-readable notation, such as 172.16.254.1 in IPv4, and 2001:db8:0:1234:0:567:8:1 in IPv6. The address routing prefix size is specified in CIDR notation by suffixing the address with a significant number of bits, eg, 192.168.1.15/24, which is equivalent to the historically used subnet mask 255.255.255.0.

The IP address space is managed globally by the Internet Assigned Numbers Authority (IANA), and by five regional Internet registrars (RIR) who are responsible in designated areas for assignment to local Internet registries, such as Internet service providers, and other end users. IPv4 addresses were distributed by IANA to RIRs in blocks of approximately 16.8 million addresses each, but have exhausted at IANA's level since 2011. Only one of the RIRs still has a supply for local assignments in Africa. Some IPv4 addresses are reserved for private networks and are not globally unique.

Learn more about IP address at https://brainly.com/question/16011753.

#SPJ4

What order does a computer work in?
*
A) Output, Processing, Storage, Input
B) Processing, Output, Storage, Input
C) Input, Storage, Processing, Output
D) Output, Input, Storage, Processing

Answers

Answer:

C

Explanation:

Input, Storage, Processing, Output

HTTP is a stateless protocol, which defines ____________

A. client opens a program on user computer
B. server runs a code and saves it on its drive
C. information is formatted before floating it over the network
D. URL is sent back to the client

Answers

Since HTTP is a stateless protocol, each time a client requests a webpage from a web server, a new connection must be established with the web server.

Why is HTTP a stateless protocol?

HTTP is said to as a stateless protocol since each request is handled separately from those that came before it. As a result, when a transaction is finished, the browser and server's connection is also severed.

What is the HTTP protocol's mode of operation?

The HTTP protocol can be used to retrieve resources such as HTML documents. It is a client-server protocol, which implies that the recipient, who is typically the Web browser, initiates all requests for data transmission over the Internet.

To know more about HTTP visit:-

https://brainly.com/question/13152961

#SPJ1

5.16 LAB: Array Palindrome

Answers

Palindrome Array Write a program that reads a list of integers from the input and determines whether the list is a palindrome (values are identical from first to last and last to first).

  The entry begins with an integer indicating the length of the list that follows. Assume that the list will always contain fewer than 20 integers. Returns "yes" if the list is a palindrome and "no" otherwise. The output ends with a new line.Given an array, the task is to determine whether an array is a palindrome or not.

Examples:

Input: arr[] = {3, 6, 0, 6, 3}

Output: Palindrome

Input: arr[] = {1, 2, 3, 4, 5}

Output: Not Palindrome

To learn more about Palindrome Array click below:

https://brainly.com/question/18152587

#SPJ4

using keyboard shortcuts, how can users save a document?

Answers

Users can save a document by pressing the Ctrl + S keyboard shortcut.

To save a document using a keyboard shortcut, first make sure the document you want to save is the active window. Then, press the Ctrl key and the S key at the same time.

This will open a dialog box prompting you to name the file and select a folder to save it in. Once you’ve selected a folder, click the “Save” button in the bottom right corner.

Your document will be saved in the folder you specified. The Ctrl + S keyboard shortcut is a useful way to quickly save your work without having to go through the “File” menu.

For more questions like Keyboard click the link below:

https://brainly.com/question/29385379

#SPJ4

A main reason careers in information technology are growing faster than average is the government has provided funding to boost educational programs. It has a large customer base of people, businesses, and organizations. Large corporations have turned to computers to handle their business. The internet has become available to all communities around the world equally.

Answers

A main reason careers in information technology are growing faster than average is that large corporations have turned to computers to handle their business. As technology continues to evolve, businesses of all sizes are turning to computers and software to manage their operations, process data, and make decisions.

This has led to an increased demand for skilled professionals in the field of information technology, including programmers, developers, network administrators, and cybersecurity experts. Additionally, many organizations are also investing in digital transformation initiatives, which further drives the need for IT professionals to help design, build, and maintain the systems and infrastructure necessary to support these changes. This increased demand for IT professionals in the business sector is one of the main reasons why careers in information technology are growing faster than average.

Learn more about technology, here https://brainly.com/question/30198395

#SPJ4

Answer:

C

Explanation:

5. What does it mean to "Reflect" on your solution to a problem.
*
A) To explain what the problem is.
B) To attempt to solve the problem with your plan.
C) To ask if your solution worked or not.
D) To research possible solutions and make a plan.

Answers

To "Reflect" on your solution to research possible solutions and make a plan. (Option D)

What is research?

"Creative and methodical activity performed to improve the reservoir of knowledge" is what research is. It entails gathering, organizing, and analyzing information to get a better knowledge of a subject, with a special focus on mitigating sources of bias and inaccuracy.

The act of describing a problem, discovering the origin of the problem, finding, prioritizing, and selecting alternatives for a solution, and executing a solution is known as problem-solving.

Learn more about problem-solving;
https://brainly.com/question/3418829
#SPJ1

How to fix "files required to play gta online could not be downloaded"?

Answers

This error message typically appears when there is a problem with the files required to play Grand Theft Auto (GTA) Online on a computer or gaming console. Here are a few troubleshooting steps that may help fix the problem

Check your internet connection.Restart the game.Clear the cache.Check for updates.Check for server status.Reinstall the game.

Make sure your device is connected to the internet and that you have a stable connection. Close the game and restart it to see if that fixes the issue. Clear the cache on your console or computer to make sure that the game is using the most recent files. Make sure that you have the latest update for the game installed. Check the official Rockstar Games Social Club website to see if the servers are down for maintenance or experiencing technical issues. If none of the above steps work, try uninstalling and reinstalling the game. This will delete all the game files, but will also ensure that the game is running the latest version and that all files are present.

Learn more about fix problem, here https://brainly.com/question/20371101

#SPJ4

how should you label removable media used in a scif?

Answers

Answer: With the maximum classification, date of creation, point of contact, and Change Management (CM) Control Number.

When labeling removable media used in a Sensitive Compartmented Information Facility (SCIF), The guideline that should be followed is  Classification, Unique Identifier.

The label on the removable media should typically include the following information:

1) Classification: Indicate the appropriate security classification level of the information stored on the media, such as "Top Secret," "Secret," or "Confidential." This helps identify the sensitivity of the data and ensures proper handling.

2) Unique Identifier: Assign a unique identifier or label to the media, such as a serial number or barcode, for tracking and accountability purposes. This allows for easy identification and management of the removable media within the SCIF.

Therefore, When labeling removable media used in a Sensitive Compartmented Information Facility (SCIF), The guideline that should be followed is  Classification, Unique Identifier.

To know more about the SCIF:

https://brainly.com/question/30160551

#SPJ4

Answer each of the following questions using the Colonial Adventure Tours data shown in Figures 1-4 through 1-8 in Chapter 1. No computer work is required.

Using the types of entities found in the Colonial Adventure Tours database (trips, guides, customers, and reservations), create an example of a table that is in first normal form but not in second normal form, and an example of a table that is in second normal form but not in third normal form. In each case, justify your answers and show how to convert to the higher forms.

Answers

Normalization is a method that helps us design relational database tables with redundant or duplicate values.

First normal form 1NF. Each attribute must have a unique name, unique value, and rows cannot be duplicated. There are no repeat groups. Second normal form 2NF. It satisfies first normal form and all non-key attributes are fully functional depending on their primary key. Third normal form 3NF. It satisfies second normal form and all non-key attributes are independent of each other or have no transitive functional dependency on the non main attribute. Create an example table in first normal form, with no repeating groups reservation ID trip date trip name start location.

To learn more about relational database tables  please click below link.

https://brainly.com/question/1160209

#SPJ4

cumulative algorithm can only be used with primitive data types: T/F

Answers

The given statement is true because a cumulative algorithm can only be used with primitive data types.

A cumulative algorithm is an algorithm that incrementally accumulates a larger value by repeatedly adding, multiplying,  dividing, etc, and storing the result into a variable over and over again. The key aspect of a cumulative algorithm is a loop, and a variable declared outside the loop, the value of which is modified inside the loop. A cumulative algorithm is only used with primitive data types - which are predefined data types specifing the type and size of values of variables.

You can learn more about cumulative algorithm at

https://brainly.com/question/30089039

#SPJ4

After selecting _, you would then choose _ to find a place to save the document on the computer.

The "_" could be anything, such as file or download, but file and download are not the answers.

Answers

After selecting file, you would then choose save as to find a place to save the document on the computer.

What is a command?

A command in computing is a request for a computer program to carry out a certain task.

It could be sent using a command-line interface, such a shell, as input to a network service as part of a network protocol, as an event in a graphical user interface brought on by the user choosing an item from a menu, or as a command sent to a computer over a network.

If you want to create a new document, change the filename, file format, or save the file in a different location on your computer, you must save the current document first.

Use the Ctrl+Shift+S keyboard shortcut. On the menu bar, select File > Save As.

Thus, this way, one can save the file in any particular location.

For more details regarding command, visit:

https://brainly.com/question/14548568

#SPJ1

Other Questions
research in which people record information in personal diaries on their attitudes, behaviors, or purchasing habits is called a ________. what is the resistance of a lamp that is connected to 120- volt circuit and draws 1.5 A of current 19. A restaurant wants to study how well its salads sell. The circlegraph shows the sales of salads during the past few days. If 5 ofthe salads sold were Caesar salads, how many total salads didthe restaurant sell?Salads Sold56%20%24%CaesarGardenCobb blackhawk corporation contracted to sell greeneye corporation some materials that greeneye needed to fulfill a contract it had with a third party. Knowing that Greeneye was in desperate need of the materials, Blackhawk called Greeneye the day before delivery was due and threatened to withhold delivery unless Greeneye agreed to pay a higher price. Greeneye could not get the materials elsewhere and would suffer a huge financial loss without them, so it agreed to pay the higher price. Greeneye later asserts that its promise to pay the higher price is unenforceable because it was the product of duress. Which of the following statements is true of this situation?Blackhawk only exercised superior bargaining powers and therefore is not at fault.Under modern contract law, Blackhawk's threat to cause Greeneye economic harm could be considered duress and the contract may be considered voidable.Blackhawk's threat could not be considered duress because they had a legal right to seek a higher price for its goods.Under modern contract law, Blackhawk's threat to cause Greeneye economic harm may be unintentional tort, but not duress. Find the y-intercept and gradient of the following equation of line3x-2y=8 Define the linear transformation T: Rn Rm by T(v) = Av. Find the dimensions of Rn and Rm. A = 0 5 1 4 1 2 1 1 1 3 0 0 dimension of Rn dimension of Rm A laboratory within Bayer is considering the five indivisible investment proposals below to further upgrade their diagnostic capabilities to ensure continued leadership and state-of-the-art performance. The laboratory uses a 10-year planning horizon, has a MARR of 10%, and a capital limit of $1,000,000. For the original opportunity statement: a. Which alternatives should be selected to form the optimum portfolio for the lab? b. What is the present worth for the optimum investment portfolio? c. What is the IRR for the portfolio? Suzie Jones felt her heart pounding and the sweat dripping from her forehead as she ran the last mile through her neighborhood. She had left home at noon and had run around the high school track for what seemed like hours. She felt tired when she started, but found it pleasurable to drive her body to a point of exhaustion, believing that she could run forever on that warm spring afternoon. As a child, she had hated exercising, but now she found it helped clear her head and get her thoughts into perspective. Suzie felt light-headed as she rounded the corner for home. "Funny," she thought. "Where's Mom's car?" She saw a note taped to the garage door. David's had an accident, come to the hospital ASAP. "This time next year l'll be able to drive," muttered Suzie as she started to run the mile to the hospital. Suzie entered the Emergency Room and saw her mother sitting with her brother Dave's baseball coach. "What happened?" asked Suzie. Mrs. Jones looked at the coach and he answered: "A freak accident. Dave rolled his ankle as he was rounding first base. He hit the ground and we all thought that his leg was broken, but the x-rays proved us wrong. It's just a badly sprained ankle." Question 2 of 10Which statement is the most likely conclusion you can draw from the cause-and-effect relationship shown in the diagram?CauseMore factories are builtin cities after theIndustrial Revolution.EffectThe population ofcities grows. Read the poem "Jerusalem" by William Blake, and then answer the questions that follow. Jerusalem And did those feet in ancient time Walk upon Englands mountain green? And was the holy Lamb of God On Englands pleasant pastures seen? And did the Countenance Divine Shine forth upon our clouded hills? And was Jerusalem builded here Among these dark Satanic mills? Bring me my bow of burning gold! Bring me my arrows of desire! Bring me my spear! O clouds, unfold! Bring me my chariot fire. I will not cease from mental fight, Nor shall my sword sleep in my hand Til we have built Jerusalem In Englands green and pleasant land. In the fourth stanza, what course of action does he propose? We need a logic circuit that gives an output X that is high only if a given hexadecimal digit is even (including 0) and less than 7, The inputs to the logic circuit are the bits 8, B4, B2, and B1 of the binary equivalent for the hexadecimal digit. (The MSB is B8, and the LSB is B1.) Construct a truth table and the Karnaugh map; then, write the minimized SOP expression for X. most early women's prisons employed ________, which was different from the ________ of men's prison Select the correct answer.Read these excerpts from "President Obama's Farewell Address" and W. E. B. Du Bois's The Souls of Black Folk.President Obama's Farewell AddressSo if we're going to be serious about race going forward, we need to uphold laws against discrimination in hiring, and in housing, and in education, and in the criminal justice system.... That is what our Constitution and our highest ideals require.For blacks and other minority groups, it means tying our own very real struggles for justice to the challenges that a lot of people in this country face not only the refugee, or the immigrant, or the rural poor, or the transgender American, but also the middle-aged white guy who, from the outside, may seem like he's got advantages, but has seen his world upended by economic and cultural and technological change. We have to pay attention, and listen.W. E. B. Du Bois's The Souls of Black FolkThis group of men honor Mr. Washington for his attitude of conciliation toward the white South; they accept the "Atlanta Compromise" in its broadest interpretation; they recognize, with him, many signs of promise, many men of high purpose and fair judgment, in this section; they know that no easy task has been laid upon a region already tottering under heavy burdens. But, nevertheless, they insist that the way to truth and right lies in straightforward honesty, not in indiscriminate flattery; in praising those of the South who do well and criticising uncompromisingly those who do ill; in taking advantage of the opportunities at hand and urging their fellows to do the same, but at the same time in remembering that only a firm adherence to their higher ideals and aspirations will ever keep those ideals within the realm of possibility. They do not expect that the free right to vote, to enjoy civic rights, and to be educated, will come in a moment; they do not expect to see the bias and prejudices of years disappear at the blast of a trumpet; but they are absolutely certain that the way for a people to gain their reasonable rights is not by voluntarily throwing them away and insisting that they do not want them; that the way for a people to gain respect is not by continually belittling and ridiculing themselves; that, on the contrary, Negroes must insist continually, in season and out of season, that voting is necessary to modern manhood, that color discrimination is barbarism, and that black boys need education as well as white boys.How do President Obama and W. E. B. Du Bois address the concept of discrimination similarly? A. Both men put their faith in the government to safeguard citizens' rights. B. Both men call for immediate change in current practices. C. Both men express the need for rights and freedoms to be upheld. D. Both men express gratitude for the improvement of American ideals. how much fragmentation would you expect to occur using paging. Let A = {x.y)ER^2: x^2-1 how many conservative justices are on the supreme court diesel engines are usually more efficient than gasoline engines thanks to higher compression engine, however, they generate more nitrogen oxides (nox) and soot emissions than gasoline engine. (True or False) An Oil Change Express station has been recruiting a mechanic to perform express oil changes. Two candidates have applied for the mechanic position. Oliver Oilman just graduated with his certification in Auto Mechanics and expects a $29 per hour salary. His average service time for an oil change is 16 minutes. Chandler Changer is a veteran mechanic who is requesting $45 per hour. However, given his experience, on average he is able to complete an oil change is 11 minutes. Factoring in goodwill, the cost for customer waiting is $33 per hour (this includes both time spent waiting for service to begin and the time for the actual oil change). Customer's arrive for oil changes at an average rate of 2.75 per hour.a.What is the average waiting time customers would spend in the system under each applicant?b.Which applicant should be hired? (Use cost analysis.) any form of collusion among brokers or real estate boards in the fixing of commission rates is illegal and is called determine a basis for the set spanned by the vectors v1 = [1 2 3] , v2 = [3 6 9] , v3 = [1 3 5] , v4 = [5 11 17] , v5 = [2 7 12] , v6 = [2 0 0]A. {V2, V3, V6}B. {V1, V2, V6}C. {V1, V3, V6}D. {V3, V4, V5}E. {V1, V3, V5}