Suppose now there are 80 pairs of flows, with ten flows between the first and ninth rack, ten flows between the second and tenth rack, and so on. Further suppose that all links in the network are 10 Gbps, except for the links between hosts and TOR switches, which are 1 Gbps.

Required:
a. Each flow has the same data rate; determine the maximum rate of a flow.
b. For the same traffic pattern, determine the maximum rate of a flow for the highly interconnected topology.
c. Now suppose there is a similar traffic pattern, but involving 20 hosts on each rack and 160 pairs of flows. Determine the maximum flow rates for the two topologies.

Answers

Answer 1

Answer:

Explanation:

Given that:

The no of flow pairs = 80

Each link's capacity = 10 Gbps

Link capacity amongst TOR switches and hosts = 1 Gbps

Because each connection is distributed among all flows, each flow crossing the same link distributes the link's capacity with the other flows. The connection capacity needed by each flow in the network is determined by the highest flow rate.

Maximum rate flow = [tex]\dfrac{link's \ capacity}{no \ of \ flow \ pairs}[/tex]

[tex]= \dfrac{10 \ Gbps}{80}[/tex]

Since 1 Gbps = 1000 Mbps

[tex]= \dfrac{10000}{80}[/tex]

= 125 Mbps

Hence, maximum rate flow = 125 Mbps

b.

Each switch at Tier-1 is connected to each and every switch at Tier-2 in the highly integrated structural topology. As a result, there are n-disjoint routes between tier-2 and tier-1 switches.

Number of paths between tier-1 and tier-2 is 4, thus, there exist four paths from tier-1 switch to tier 2.

The capacity whereby all data routes convey is determined by the maximum rate of flow.  

number of available paths = 4  

Each link's capacity = 10 Gbps

Maximum flow rate = 4 × 10 Gbps

Maximum flow rate = 40 Gbps

c.

Because each connection is distributed between all flows, each flow crossing a similar link distributes the link's capacity with other flows.

number of flow pairs = 160

Each link's capacity = 10 Gbps

maximum rate of flow = 10000 Mbps / 160

= 62.5 Mbps

For 160 flow pairs, maximum flow rate = 62.5 Mbps

Each switch in Tier-1 communicates with each switch in Tier-2 in the highly linked topology network. As a result, n-disjoint routes between tier-2 and tier-1 switches are possible. As there exist 20 hosts engaged in the network around each host, the number of routes from either a tier-1 switch or tier-2 switches is 20.

here;

no of paths = 20

each link's capacity = 10 Gbps

Maximum flow rate = 20 × 10  

= 200 Gbps

As such, with 160 pairs of flow, maximum flow rate = 200 Gbps


Related Questions

How is an API different from a web application?

Answers

Answer:

Web services (web application) are an API type to be accessed via a network connection. While APIs are application interfaces, this means standardized communication between one application and another application.

Explanation:

Web service is used for communication with REST, SOAP, and XML-RPC.

        While API for all communication styles is used.

The APIs are all web services. Whereas web services are not APIs.The Web application has no lightweight design, needs a SOAP agreement for sending or receiving system information. While the architecture is lightweight, API is useful for gadgets with limited transmission capacities like smartphones.The web application supports the HTTP protocol only. Whereas the API HTTP/s protocol supports: URL Request / Answer Header etc.The web application is not open source, but any customer who contains XML can devour it. While API  is open-source and has a .net framework.

Define a class Person that represents a person. People have a name, an age, and a phone number. Since people always have a name and an age, your class should have a constructor that has those as parameters.

Answers

Answer:

public class Person {

   String name;

   int age;

   String phoneNumber;

   public Person(String name, int age, String phoneNumber){

          this.name = name;

          this.age = age;

          this.phoneNumber = phoneNumber;

   }

}

Explanation:

The code above is written in Java.

The following should be noted;

(i) To define a class, we begin with the keywords:

public class

This is then followed by the name of the class. In this case, the name is Person. Therefore, we have.

public class Person

(ii) The content of the class definition is contained within the block specified by the curly bracket.

(iii) The class contains instance variables name, age and phoneNumber which are properties specified by the Person class.

The name and phoneNumber are of type String. The age is of type int. We therefore have;

String name;

int age;

String phoneNumber;

(iv) A constructor which initializes the instance variables is also added. The constructor takes in three parameters which are used to respectively initialize the instance variables name, age and phoneNumber.

We therefore have;

public Person(String name, int age, String phoneNumber){

          this.name = name;

          this.age = age;

          this.phoneNumber = phoneNumber;

   }

(v) Notice also that a constructor has the same name as the name of the class. In this case, the constructor's name is Person.

Answer:

The class and constructor in C++ is as follows:

class Person {

 public:

   string name;     int age;     int phone;

   Person (string x, int y) {  

     name = x;       age = y;  

   }

};

Explanation:

This defines the class

class Person {

The specifies the access specifier

 public:

This declares the attributes; name, age and phone number

   string name;      int age;      int phone;

This defines the constructor for the name and age

   Person (string x, int y) {  

This gets the name and age into the constructor

     name = x;       age = y;  

   }

};

which feature of organisations to manage needs to know about to build and use information system successfully

Answers

The correct answer to this open question is the following.

The feature of organizations to manage needs to know about to build and use information system successful is the following.

Managers of successful organizations should know that companies have hierarchies and different structures in which these companies are organized.

Every company use systems and procedures that could be specialized to the degree the company requires. For that system to function, they have to be perfectly interconnected to all the areas of the company. The goal: to maximize efficiency and accomplish the goals.

Systems and procedures should take into consideration the culture and diversity of the workplace. There are interest groups in every organization that have special characteristics and requirements that have to be taken into consideration to create a much better system.

Good managers must be aware of these elements, and the different roles, goals, management styles, tasks, incentives, and departmental structure of the company so the system can better serve the purpose of the entire organization.

Prime numbers can be generated by an algorithm known as the Sieve of Eratosthenes. The algorithm for this procedure is presented here. Write a program called primes.js that implements this algorithm. Have the program find and display all the prime numbers up to n = 150.
Sieve of Eratosthenes Algorithm
To Display All Prime Numbers Between 1 and n
Step 1: We need to start with all the numbers representing the range of numbers that are possible candidate primes. So, create an array of consecutive integers from 2 to n: (2,3,4,..n). I wouldn't hand-code this. I would use a loop to populate the array.
Step 2: At each step we select the smallest number and remove all it's multiples. So we'll start with an outer loop that goes from 2 to n. initially, let p equal 2, the first prime number.
Step 3: In an inner loop we need to iterate over all the numbers that are multiples of p, i.e for 2, that's 2,4,6,8 etc. Each time, setting it's value to false in the original array.
Step 4: Find the first number greater than p in the list that is not marked False. If there was no such number, stop. Otherwise, let p now equal this number( which is the next prime), and repeat from step 3.
When the algorithm terminates, all the numbers in the list that are not marked False are prime
Example: Let us take an example when n = 50. So we need to print all print numbers smaller than or equal to 50. We create list of all numbers from 2 to 50.
2 3 4 5 6 7 8 9 10
11 12 13 14 15 16 17 18 19 20
21 22 23 24 25 26 27 28 29 30
31 32 33 34 35 36 37 38 39 40
41 42 43 44 45 46 47 48 49 50

Answers

Answer:

const MAXNR=150;

let candidates = {};

for(let i=2; i<=MAXNR; i++) {

   candidates[i] = true;

}

for(let p=2; p <= MAXNR; p++) {

   if (candidates[p]) {

       process.stdout.write(`${p} `);

       // Now flag all multiples of p as false

       i=2;

       while(p*i <= MAXNR) {

           candidates[p*i] = false;

           i++;

       }

   }

}

Decision support systems (or DSSs) model information using OLAP, which provides assistance in evaluating and choosing among different courses of action. Which of the following does not represent an example of a DSS in business?

a. An insurance company using a system to gauge risk of providing insurance to drivers who have imperfect driving records
b. A medical doctor entering symptoms into a system to aid in diagnosing and treating patients
c. A manufacturing digital dashboard showing visualizations of inventory and production
d. A dentist entering symptoms into a system to help diagnose and treat patients

Answers

Answer:

C

Explanation:

Decision Support Systems (DSSs) model information using OLAP, helps in providing assistance to evaluate and choose among different course of action.

For option A, an insurance company using DSS to evaluate risk of providing insurance to drivers who doesn't have perfect records and option B and D medical doctor entering symptoms into a system to aid in diagnosing and treating patients and dentist entering symptoms into a system to help diagnose and treat patients respectively

Create a file named A10.java. Place all your code in this file. Create a publicstatic ArrayList of integers named intList.
Define a public static method addNumber(int i) that adds ito your list.
Exercise 2
Create a publicstatic HashMap of integers,integers namedintMap.
Define a public static method addPair(int i,int j) that adds i,jto your HashMap (make ithe key and j the value).

Answers

Explanation:

The file named as A10.java has been attached to this response. It contains the source code for the exercises. The source code contains comments explaining important parts of the code.

A few things to note;

i. To add an item to an arraylist, the add() method is used. For example to add an integer 7 to the arraylist named intList, simply write;

intList.add(7);

ii. To add an item to a hashmap, the put() method is used. The put method receives two parameters which are the key and value respectively. The key is a form of identifier used to store or retrieve a particular value in a hashmap. To store an integer 8 with a key of 5 in a hashmap named intMap, for example, simply write;

intMap.put(5,8);

In which type of class methods is it typically necessary to filter bad arguments (either directly or indirectly with the help of validators) in order to protect private data of your class

Answers

Answer: hello your question is incomplete attached below is the complete question

answer :

A set() method (non-constructor mutator). ( B )

Explanation:

The type of class methods that is necessary to filter bad arguments to protect private data of your class using validators is :

A set() method (non-constructor mutator)

How do u create a blank line between two lines in a document

Answers

Answer: Press enter at the end of the line.

Explanation:

If you press enter at the end of the line or sentence, it will start a new space underneath your line or sentence.

Given 4 floating-point numbers. Use a string formatting expression with conversion specifiers to output their product and their average as integers (rounded), then as floating-point numbers. Output each rounded integer using the following: print('{:.0f}'.format(your_value)) Output each floating-point value with three digits after the decimal point, which can be achieved as follows: print('{:.3f}'.format(your_value))

Answers

Answer:

The program is as follows:

prod = 1

isum = 0

for i in range(4):

   num = float(input())

   prod*=num

   isum+=num

avg = isum/4

print('{:.0f}'.format(prod))

print('{:.3f}'.format(avg))  

Explanation:

This initializes the product to 1

prod = 1

..... and sum to 0

isum = 0

The following iteration is repeated 4 times

for i in range(4):

Get input for each number

   num = float(input())

Calculate the product

   prod*=num

Add up the numbers

   isum+=num

This calculates the average

avg = isum/4

Print the products

print('{:.0f}'.format(prod))

Print the average

print('{:.3f}'.format(avg))  

Identify the hardware components in your own computer. If you don't have a computer, use a friend's, or one at work or in an NVCC lab. The following list shows the components you should identify and how to find the information on a Windows computer. Describe model computer: type (laptop, desktop, notebook, tablet, etc.) Indicate your manufacturer (HP, Apple: iPad, MacBook Air, etc., Lenovo, Dell, etc.) of the computer. Input devices (include internal and external devices) - they usually have a model name and number somewhere on the device. Output devices (include internal and external devices) - they usually have a model name and number somewhere on the device. Storage devices (include internal and external devices, and how much data each can hold) - Open Windows Explorer and right click on a drive name to open its properties. Amount of RAM - Open System Properties in the Windows Control Panel. Type and speed of CPU - Open System Properties in the Windows Control Panel. Ports (number and type) - Look for jacks into which a connector can be plugged on the front, back and sides of the machine. Compare the jacks to pictures in your textbook.

Answers

Solution :

A friend of mine have an old version of computer PC having the following components :

Input devices

Model name of the keyboard -- PUNTA , model number -- P-KB515

Model name of the mouse -- PUNTA, model number -- P-KB515

Output devices

Speaker : COMPAQ

Monitor : ACER,  Model Number  --- EB192Q

Storage : 500 MB capacity hard disk

RAM : 2 GB

Processor : Intel Pentium dual E1260 at the rate 1.80 GHz

It is provided with audio jacks

An array A[0..n - 2] contains `n-1` integers from 1 to `n` in increasing order. (Thus one integer in this range is missing.) Design an algorithm in $\Theta(\log n)$ to find the missing integer. Your algorithm should be given in **pseudo code**. For example, the array `A` could be `{1, 2, 3, 4, 6, 7, 8, 9, 10}` in which `5` is missing.

Answers

Answer:

I do not understand anything

You are the owner of a small business. In the last year, you have started to hire employees and you now have 5 employees. Each has his or her own personal computer and you have hired a consultant to establish a local area network for your business. You realize that you should draw up a user access agreement and a code of conduct for your employees. Which of the three documents listed below should you create first?

a. The user access agreement
b. The code of conduct
c. The professional association code of ethics

Answers

Answer:

a. The user access agreement

Explanation:

The first document that should be created would be the user access agreement. This is a document that holds all of the policies and guidelines that the employees of a company need to follow when using the companies equipment, software, or network. This includes behavior on the internet such as browsing specific sites, illegal activity, or personal hobbies during work hours, as well as offline such as using company hardware for personal gain. This is a document that is absolutely required for every company in order to protect the company from the consequences of certain employee activity.

Write a c++ program to find;
(I). the perimeter of rectangle.
(ii). the circumference of a circle.

Note:
(1). all the programs must allow the user to make his input .
(2).both programs must have both comment using the single line comment or the multiple line comment to give description to both programs.​

Answers

Answer:

Perimeter:

{ \tt{perimeter = 2(l + w)}}

Circumference:

{ \tt{circumference = 2\pi \: r}}

Just input the codes in the notepad

Suppose users share a 3 Mbps link. Also suppose each user requires 150 kbps when transmitting, but each user transmits only 10 percent of the time. (See the discussion of packet switching versus circuit switching in Section 1.3.)
a. When circuit switching is used, how many users can be supported?
b. For the remainder of this problem, suppose packet switching is used. Find the probability that a given user is transmitting.
c. Suppose there are 120 users. Find the probability that at any given time, exactly n users are transmitting simultaneously. (Hint: Use the binomial distribution.)
d. Find the probability that there are 21 or more users transmitting simultaneously.

Answers

Answer:

a) 20 users

b) 0.1  or 1/10

c) P ( X = n )   =   [tex]^{120}C_{n} ( 0.10 )^n (0.9)^{120-n}[/tex]

d) 0.008

Explanation:

Given data:

Link shared by users = 3 Mbps

each user requires ; 150 kbps

percentage transmitted by each user = 10%

a) Determine the number of users can be supported

number of users = 3 Mbps / 150 kbps = 3000 / 150 = 20 users

b) P( user is transmitting )

given that percentage transmitted by each user = 10%

since packet switching is used ; P ( user is transmitting ) = 10% = 0.1

c) P ( n users are transmitting simultaneously )

let the number of users ( i.e. N ) = 120

number transmitting = n

P ( user is transmitting ) = 0.10

using Binomial distribution

P ( X = n ) = [tex]^{N}[/tex]Cₙ ( P )ⁿ ( 1 - P )^[tex]^{N-n}[/tex]

                = [tex]^{120}C_{n} ( 0.10 )^n (0.9)^{120-n}[/tex]

d) P( X ≥ 21 transmitting simultaneously )

P ( X = n ) = [tex]^{120}C_{n} ( 0.10 )^n (0.9)^{120-n}[/tex]

Therefore ; P( X ≥ 21 ) = 1 - P( X ≤ 20 )

                                   = 1 - BINOMDIST(20,120,0.1,1)  ( excel function )

∴ P( X ≥ 21 ) = 1 - 0.992059 ≈ 0.008

A good CRM should Integrate marketing, sales, and customer support activities measuring and evaluating the process of knowledge acquisition and sharing.

Answers

The correct answer to this open question is the following.

Unfortunately, you forgot to include a question. Here, we just have a statement.

What is your question? What do you want to know?

If this is a true or false question, the answer is "true."

It is true that a good CRM should integrate marketing, sales, and customer support activities measuring and evaluating the process of knowledge acquisition and sharing.

The reason is that effective investment in Customer Relationship Management (CRM) should be able to operate efficientñy with these management aspects in order to increase the productivity and efficiency of the company.

A good CRM has to facilitate the operations of a company, improving time management and people's activities that can produce better results accomplishing the companies goals and fulfilling the key performing indicators (KPI)

the combination of hardware and software assembly accomplish some specific task as how...?​

Answers

Answer:

A computing system can be referred to as a combination of hardware and software forms created to intentionally interact in specific ways such that the combination of both is able to achieve certain tasks.

Explanation:

Whilst a hardware refers to all the visible parts of the computing system such as the Visual Display Monitor or Screen, Keypads or Keyboards, Mouse and other input devices such as the camera, storage devices etc, the Software refers to intangible part - the logical instructions (machine language) which instructions the hardware on what or what not to do.

Cheers

Have you ever been presented to someone else's home page of a given website?​

Answers

Answer: No, is this the question?

Explanation: Have a stupendous day! <3

Phân tích những xu hướng mới của Digital Marketing nổi bật 2020-2023

Answers

Answer:FSfgvdfftb

Explanation:

c srfv fergvrgfcg

A company manufactures televisions. The average weight of the televisions is 5 pounds with a standard deviation of 0.1 pound. Assuming that the weights are normally distributed, what is the weight that represents the 75th percentile?​

Answers

Answer:

5.0674

Explanation:

Given that :

Mean, μ = 5 pounds

Standard deviation, σ = 0.1

Given that weight are normally distributed ;

From the Z table, the Zscore or value for 75th percentile weight is :

P(Z < z) = 0.75

z = 0.674

Using the relation :

Zscore = (x - μ) / σ

x = weight

0.674 = (x - 5) / 0.1

0.674 * 0.1 = x - 5

0.0674 = x - 5

0.0674 + 5 = x - 5 + 5

5.0674 = x

The weight which corresponds to the 75th percentile is 5.0674

Thành phần bên trong nào thực hiện các tính toán và các phép toán logic?
a. Bộ vi xử lý
b. ROM_BIOS
c.Các chip RAM
d. Bo mạch chủ

Answers

Answer:

A

Explanation:

Viết chương trình kiểm tra số nguyên dương N có phải là số nguyên tố không?

Answers

Could you say that in English please? I can try helping

6.23 LAB: Convert to binary - functions Instructor note: This is a lab from a previous chapter that now requires the use of a function. If you weren't able to solve it before, think of this as a new opportunity. Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binary. For an integer x, the algorithm is: As long as x is greater than 0 Output x % 2 (remainder is either 0 or 1) x = x // 2 Note: The above algorithm outputs the 0's and 1's in reverse order. You will need to write a second function to reverse the string. Ex: If the input is: 6 the output is: 110 Your program must define and call the following two functions. The function integer_to_reverse_binary() should return a string of 1's and 0's representing the integer in binary (in reverse). The function reverse_string() should return a string representing the input string in reverse. def integer_to_reverse_binary(integer_value) def reverse_string(input_string)

Answers

Answer:

The program in Python is as follows:

import math

def integer_to_reverse_binary(integer_value):

   remainder = ""

   while integer_value>=1:

       remainder+=str(integer_value % 2)

       integer_value=math.floor(integer_value/2)

   reverse_string(remainder)

def reverse_string(input_string):

   binaryOutput=""

   for i in range(len(input_string)-1,-1,-1):

       binaryOutput = binaryOutput + input_string[i]

   print(binaryOutput)

integer_value = int(input("Enter a Number : "))

integer_to_reverse_binary(integer_value)

Explanation:

This imports the math module

import math

This defines the integer_to_reverse_binary function

def integer_to_reverse_binary(integer_value):

This initializes the remainder to an empty string

   remainder = ""

This loop is repeated while the integer input is greater than or equal to 1

   while integer_value>=1:

This calculates the remainder after the integer value is divided by 2

       remainder+=str(integer_value % 2)

This gets the floor division of the integer input by 2

       integer_value=math.floor(integer_value/2)

This passes the remainder to the reverse_string function

   reverse_string(remainder)

The reverse_string function begins here

def reverse_string(input_string):

This initializes the binaryOutput to an empty string

   binaryOutput=""

This iterates through the input string i.e. the string of the remainders

   for i in range(len(input_string)-1,-1,-1):

This reverses the input string

       binaryOutput = binaryOutput + input_string[i]

This prints the binary output

   print(binaryOutput)

The main begins here

This gets input for integer_value

integer_value = int(input("Enter a Number : "))

This passes the integer value to the integer_to_reverse_binary function

integer_to_reverse_binary(integer_value)

job evaluation for technical consultant​

Answers

There is no question. Why is this telling me incorrect
There is no question

interpret the following SQL create table persons (person I'd int, last name varchar (255) first name varchar (255) address varchar (255) city varchar (255)​

Answers

Answer:

Kindly check explanation

Explanation:

The SQL statement above could be interpreted as follows :

create table command is used to create a table named 'persons' with five columns which are labeled :

person I'd : whose data type is an integer

last name column with a variable character data type with maximum length of 255

first name column with a variable character data type with maximum length of 255

address column with a variable character data type with maximum length of 255

city column with a variable character data type with maximum length of 255

The VARCHAR data type is ideal since we expect the column values to be of variable length.

Determine the following information about each value in a list of positive integers.
a. Is the value a multiple of 7, 11, or 13?
b. Is the sum of the digits odd or even?
c. Is the value a prime number?

You should write a function named test7_11_13 with an integer input parameter and three type int output parameters (aka pointers) that send back the answers to these three questions. If the integer is evenly divisible by 7, 11 or 13, its respective output parameter should be set to 1, otherwise zero. Some sample input data might be:

104 3773 13 121 77 30751

Answers

Answer and Explanation:

Using Javascript:

test7_11_13(num){

If(num%7===0||num%11===0||num%13===0){

Console.log("yes it is a multiple of 7,11 or 13");

}

else{

Console.log("It is not a multiple of any of the numbers");

}

function(num){

var makeString= num.toString();

var splitString= makeString.split("");

var makeNumber= splitString.map(Number());

var New_number= makeNumber.reduce(function(a, b) {

return a+b};,0)

}

If(New_number%2===0){

Console.log("it's an even number");

}

else{

Console.log("it's an odd number")

}

If(num%2===0||num%3===0||num%5===0||num%7===0||num%11===0){

console.log("it's not a prime number");

}

else{

console.log("it's a prime number");

}

}

From the above we have used javascript if..else statements to test the conditions for each question and output the answer to the console using console.log(). In the last part for prime number, you could also choose to use else if statements(if,else if, else if) to test the value of the num parameter and output if it's a prime number.

is a collection of information stored under a single name ​

Answers

[tex]\boxed{ File }[/tex] is a collection of information stored under a single name.

[tex]\bold{ \green{ \star{ \orange{Mystique35}}}}⋆[/tex]

Answer:

Explanation:A collection of information that is stored on a computer under a single name, for example a text document, a picture, or a program. The association between a file and the program that created the file. Displays the contents of the current folder or library.

Identify the possible error in each line. • For each line assume that the lines above it are part of the same code and have been fixed by the time you get to the line you are currently examining. . Yes there are some lines with No Errors - NONE is not a red herring. a) int intA = 10; NONE b) int& iptrA = *intA; SYNTAX int *arrA = (int) malloc("iptrA); SEMANTIC for(int i = 0; i < intA; d) i++) NONE e) arrA[ I ]=i; NONE f) for(int i = 1; i < intA; i++) [Select] { cout >>"index ::" g) >> >> "="; Select] 4 cout << *(arrA + i) h) << endl; [Select] } while((floatA % i) intA) != 0) Select] { j) if(arrA[ (int)floatA] % 2 == 0); [Select] cout << "EVEN!" << endl; floatA = floatA + 1; }

Answers

Twenty letters long okay

Which one of these statements about digital signatures is true? A digital signature:
a. Is used to add a personal touch to e-mail messages.
b. Automatically encrypts the contents of an e-mail.
c. Is a scanned image of your real signature.
d. Is used to verify the identity of the sender of a message.​

Answers

Answer:

A. Is used to add a personal touch to e-mail messages.

Explanation:

A digital signature—a type of electronic signature—is a mathematical algorithm routinely used to validate the authenticity and integrity of a message (e.g., an email, a credit card transaction, or a digital document). ... Digital signatures are significantly more secure than other forms of electronic signatures.

Trình bày phép biến đổi tịnh tiến và quay quanh trục tọa độ? Hãy xác định ma trận chuyển đổi của các phép biến đổi sau :
H = trans(3,7,2). Rot(x,30).Rot(z,45)

Answers

Answer:B

Explanation: she she

Can you help me in this question

Answers

Answer:

I think the third one (or the one with monkeys).

Explanation:

2+2 does not equal 5, so the if then statement is void because both parts are wrong.

1+1 does not equal 3 even if 2+3 =5, so it is not the second answer.

3+1 does not equal 3, but monkeys do fly and it is an or option, so when one of them is correct in an or, it is correct.

Other Questions
what is the place value of the 3 in the numeral : 247.3 35/48*100 fraction into percentage. How many alleles are in the gene pool? Enter your answer and show all the steps that you use to solve this problem in the space provided.Solve,4x + 6 < -6 Which topic is best suited for a formal discussion?the contents of a new textbookthe weekend plans of your friendsthe best places to shop online for new shoesthe best cookbooks for learning to make Thai food Leading up to the french and indian war the british were This year, Sigma Inc. generated $639,000 income from its routine business operations. In addition, the corporation sold the following assets, all of which were held for more than 12 months: Initial Basis Acc. Depr Sale PriceMarketable securities $144,000 0 $64,000Production equipment 93,000 $76,000 30,000 Business realty: Land 165,000 0 180,000Building 200,000 58,300 210,000Required:a. Compute Sigmas taxable income assuming that it used the straight-line method to calculate depreciation on the building and has no nonrecaptured.b. Recompute taxable income assuming that Sigma sold the securities for $150,000 rather than $64,000. Having a strong perceptual set may result in which of the following? A. Accurate interpretation of sensory informationB. Biased perception based on assumptionsC. A reliance on bottom-up processingD. Careful attention to all sensory stimuliE. Formations of perceptions that conflict with the perceptual set Evaluate expressions- if A=4 and B=9 what is the value of the following expression 20/a+7bA.28B.33C.68D.108 To find the quotient of multiply 3 by AYUDA PORFAVOR. Cuntas regiones hay en la zona andina del Per? A) 5 regiones andinas. B) 3 regiones andinas C) 8 regiones andinas. D) 6 regiones andinas. Find the measure of "theta". Round all answers to the nearest tenth. how can I solve this question ? wick method should I use ? Here are the first three terms of a different sequence.139Write down two numbers that could be the 4th term and the 5th term of this sequence.Give the rule you have used to get your numbers.please helpp Is this question biased or unbiased?"Why is drinking fruit juice good for you?" discrib an occasion when someone you know abused his or her authority Answer the following questions. who was the speaker sold into the chimney sweeping business by Ortega Company manufactures computer hard drives. The market for hard drives is very competitive. The current market price for a computer hard drive is $54. Ortega would like a profit of $14 per drive. What target cost Ortega should set to accomplish this objective I NEED HELP ASAP PLESSEEEWhat is the relation between the variables in the equationY/x^2= 10?a. x varies directly with the square of yb. y squared varies inversely with xC. y varies directly with x squaredy varies inversely with x squaredd. 7. You have 1.5x1024 atoms of iron. How many moles do you have?