a key metaphor that helped inventors create internet protocol and transmission control protocol was ___________, in that tcp/ip enable information to _________.

Answers

Answer 1

A key metaphor that helped inventors create internet protocol and transmission control protocol was "digital packet switching", in that TCP/IP enabled information to be broken down into smaller packets and transmitted over a network using standardized protocols.

This metaphor drew inspiration from the way in which packets of information are passed between nodes in a postal system, where letters are broken down into smaller packets, each with its own address, and are sent through different routes to reach their destination. In a similar way, TCP/IP divides data into small packets that can be sent through different routes, and reassembles them at the destination. TCP/IP enables information to be transmitted efficiently and reliably over long distances, even across multiple networks with different types of hardware and software. The packet-switching approach also enables multiple devices to share the same network resources, without requiring dedicated communication lines for each pair of devices. Overall, the packet-switching metaphor played a crucial role in the development of TCP/IP, and has become a fundamental concept in modern computer networking.

Learn more about software here-

https://brainly.com/question/985406

#SPJ11


Related Questions

**Random answers to get points will be reported.**

Identify the error in the following block of code.

for x in range(2, 6):
print(x)

The first line is missing quotes.
The first line has a spelling error.
The second line has a spelling error.
The second line needs to be indented four spaces.

Answers

Answer

I think its: The first line is missing quotes

Explanation:

Answer:

B

Explanation:

"(2, 6)" the space in between those numbers create a bad income I tried it and it was the problem so hence its B

an array's size declarator must be a ________ with a value greater than ________. number, one number, zero constant integer expression, zero variable, -1 none of these

Answers

An array's size declarator must be a constant integer expression with a value greater than zero.

In C and many other programming languages, an array is a collection of elements of the same type that are stored sequentially in memory. When declaring an array, its size needs to be specified. The size declarator determines the number of elements that can be stored in the array. It must be a constant integer expression, which means it can only consist of numerical values and operations that can be evaluated at compile-time. The value of the size must be greater than zero since arrays in most languages are zero-indexed, meaning the first element is accessed using the index 0. Thus, the size needs to be a positive value to allocate memory for at least one element.

Learn more about programming languages here:

https://brainly.com/question/23959041

#SPJ11

We have a star network. It consists of one central node and 9 peripheral nodes. That is, a hub that is connected to 9 nodes. What is the density of this network?

Answers

From the star network that consists of one central node, 9 peripheral nodes. The density of this network is 25%.

A node may be anything from a person to a device to some hyperlinked text information. Bridges between nodes are formally referred to as connections.

A network density is a measure of the proportion of dyadic connections or direct ties inside a social network. It depicts the part of the potential connections within a network that are actual connections. The network density can be estimated by using the formula:

\(\mathbf{Network \ density = \dfrac{Actual \ connection}{Potential \ connection}}\)

The potential connection in a network system can be calculated by using the formula;

\(\mathbf{= \dfrac{n\times (n -1)}{2}}\)

where;

n is the node = 9actual connections = 9

\(\mathbf{= \dfrac{9\times (9 -1)}{2}}\)

\(\mathbf{= \dfrac{9\times (8)}{2}}\)

\(\mathbf{= \dfrac{72}{2}}\)

= 36

Now, the network density can be estimated as:

\(\mathbf{Network \ density = \dfrac{Actual \ connection}{Potential \ connection}}\)

\(\mathbf{Network \ density = \dfrac{9}{36}}\)

\(\mathbf{Network \ density = \dfrac{1}{4}}\)

Network density = 0.25

Network density = 25%

Therefore, we can conclude that the density of this network is 25%.

Learn more about network density here:

https://brainly.com/question/24787926?referrer=searchResults

For questions 1-3, consider the following code:
x = int (input ("Enter a number: "))
if x 1 = 7:
print("A")
if x >= 10:
print("B")
if x < 10:
print("C")
if x % 2 == 0:
print("D")

For questions 1-3, consider the following code:x = int (input ("Enter a number: "))if x 1 = 7:print("A")if

Answers

Answer:

A

Explanation:

what is SQL injection and its types?​

Answers

SQL injection is a code injection technique that might destroy your database. SQL injections typically fall under three categories: In-band SQLi (Classic), Inferential SQLi (Blind) and Out-of-band SQLi.

What is SQL injection?

SQL injection, also referred to as SQLI, is a popular attack method that makes use of malicious SQL code to access information that wasn't meant to be displayed by backend databases. This data could include anything from user lists to private customer information to sensitive company data.

A business could experience wide-ranging effects from SQL injection. A successful attack may result in the unauthorized viewing of user lists, the deletion of entire tables, and, in some circumstances, the attacker obtaining administrative rights to a database, all of which are extremely harmful to a business.

The loss of customer confidence must be taken into account when estimating the potential cost of an SQLi should contact information like phone numbers, addresses, and credit card.

To know more about SQL here

brainly.com/question/25694408

#SPJ5

Answer:

Explanation:

SQL injection is a common web security vulnerability that occurs when an attacker manipulates input data within a web application's SQL query to execute unintended SQL commands.
This can lead to unauthorized access, data breaches, and even the potential for complete compromise of a database.

There are several types of SQL injection attacks.

The first type is called "Classic SQL Injection," where the attacker injects malicious SQL statements through user input fields.

The second type is "Blind SQL Injection," which involves exploiting vulnerabilities without receiving direct feedback from the application. "Time-Based Blind SQL Injection" is a variation of this attack where the attacker utilizes delays in SQL queries to infer information.

Lastly, "Union-Based SQL Injection" involves exploiting the UNION SQL operator to combine the results of multiple queries.


These types of attacks highlight the importance of input validation, parameterized queries, and secure coding practices to mitigate the risk of SQL injection vulnerabilities.


hope it helps! :)


2.
Python was created​

Answers

Python was created by Guido van Rossum

The python was in fact created by Guido Van Rossun

How has music changed with the use of technology?


Musicians can now share their music on the World Wide Web.

Music can easily be created and edited with different applications.

Developers can include music in the background of their websites.

all of the above

please help

Answers

Answer: All of the above

Explanation:

Music like most other things, has been changed by its interaction with technology. Music for instance can now be shared on the internet to people far away from each other with services like Apple music and Tidal benefitting from this.

Different applications have also been created that can help make music from being able to create instrumentals to changing the voices of singers.

Developers are now even able to include their music in their website background as way to market their product, proof of another way music has changed due to technology.

Answer:

all of the above

Explanation:

How do you add an element to the center section of the Header in Excel?

Answers

If you desire the row and column headers continually seen when you scroll via your worksheet, you can lock the pinnacle row and/or first column. Tap View &gt; Freeze Panes, and then tap the alternative you need.

How do I preserve certain rows visible in Excel while scrolling?

Freeze panes to lock particular rows or columns

columns that you favor to keep seen when you scroll. 2 On the View tab, in the Window group, click on the arrow below Freeze Panes. time, click on Freeze Panes.

How to preserve the pinnacle rows visible while scrolling via the rest of the worksheet?

To freeze the pinnacle row or first column:

From the View tab, Windows Group, click the Freeze Panes drop down arrow.

Select either Freeze Top Row or Freeze First Column.

Excel inserts a thin line to show you where the frozen pane begins.

Learn more about Header in Excel here;

https://brainly.com/question/24080002

#SPJ4

Write a C program to declare two integers and one float variables then initialize them to 10, 15, and 12.6. It then prints these values on the screen

Answers

Answer:

pretty simple, notice, I used '1f' so the float would print only 1 significant number after. Sure you can modify it to make it more readable and not just numbers on the screen, it's up to you

Explanation:

#include <stdio.h>

int main()

{

   int n1 = 10;

   int n2 = 15;

   float f1 = 12.6;

   

   printf("%d %d %.1f", n1, n2, f1);

   

   return 0;

}

you want to configure your computer so that a password is required before the operating system will load. what should you do?

Answers

To configure your computer to require a password before the operating system loads, you need to enable the BIOS/UEFI password. Here are the steps:

Restart your computer and enter the BIOS/UEFI setup utility by pressing the appropriate key during the boot process (e.g., F2 or Del).Navigate to the Security tab.Look for an option to set a BIOS/UEFI password and enable it.Set a strong password and confirm it.Save the changes and exit the BIOS/UEFI setup utility.Restart the computer and the system will prompt you to enter the BIOS/UEFI password before the operating system loads.

Note that if you forget your BIOS/UEFI password, you may need to reset the CMOS (Complementary Metal-Oxide Semiconductor) settings to remove the password. The process for resetting the CMOS settings varies depending on the computer model and manufacturer, so refer to the computer's manual or contact the manufacturer's support for instructions.

To know more about BIOS/UEFI password, visit:

brainly.com/question/14748456

#SPJ11

Help please this is my last assignment of the year

Help please this is my last assignment of the year

Answers

Answer:

the answer is in the website that are there

raphael is working with a table in access. he needs to see all the records for customers in chattanooga so he can check the zip codes in that city. which database tool will show only these records in the table?

Answers

The 'filter' is the Access database tool that will show only the specified records in the table.

The 'filter' tool of the Access database is a valuable tool that allows obtaining only the desired data. The 'filter' tool provides you with the data that you want to retrieve from the access databases. You can use the 'filter' tool to fetch and display specific records in a datasheet, form, or report.

Based on the scenario given in the question where Raphael is working with a table in the Access database and wants to fetch the records of customers in Chattanooga in order to check zip codes in that city. Raphael will use the 'filter' tool of the Access database. The 'filter' tool will provide him with all the records of customers in Chattanooga.

You can learn more about Access Databases at

https://brainly.com/question/9745438

#SPJ4

Which among the following best describes encapsulation? (a) It is a way of combining various data members into a single unit (b) It is a way of combining various member functions into a single unit (c) It is a way of combining various data members and member functions into a single unit which can operate on any data (d) It is a way of combining various data members and member functions that operate on those data members into a single unitRead more on Sarthaks.com - https://www.sarthaks.com/2413143/which-among-the-following-best-describes-encapsulation

Answers

Among the options provided, the best description of encapsulation is: (c) It is a way of combining various data members and member functions into a single unit which can operate on any data.

Encapsulation is a fundamental principle in object-oriented programming where data (variables) and functions (methods) that operate on that data are combined together into a single unit, known as a class or object. This unit encapsulates the data and provides methods to interact with and manipulate that data. The encapsulated data can be accessed and modified only through the defined methods, ensuring data integrity and control over its usage. Encapsulation allows for the abstraction and hiding of the internal workings of an object, providing a clean interface for other parts of the program to interact with it.

know more about encapsulation here: brainly.com/question/4329661

#SPJ11

Help! I don’t know what this is.

Help! I dont know what this is.

Answers

Answer:

Best: Option 4

Worst: Option 1

Explanation:

The co-worker might be oblivious to the detrimental effect of his actions on work atmosphere. Talking to him and telling him to stop is the first step to improve this.

Option 2 is not as effective, as the co-worker would not know the reason and might just talk behind people's backs to other people, thus no actual progress would be made, except less communication overall.

Option 3 is likely to antagonize people, with the engineers being unhappy about your co-worker, and the co-worker being mad at you for telling on him. This option is the most likely to end up with someone leaving the job.

Option 1 is just expanding the circle of bad behavior, hence probably the worst possible.

Write HTML code for inserting an image "cricket.jpeg" in size 500 width and 400 height.

Answers

Answer:

<img src="cricket.jpeg" style="width: 500px; height:400px">

A video conferencing application isn't working due to a Domain Name System (DNS) port error. Which record requires modification to fix the issue?

Answers

Answer:

Service record (SRV)

Explanation:

Service records (SRV record) are data records stipulating specifications of the DNS such as the port numbers, servers, hostname, priority and weight, and IP addresses of defined or cataloged services servers.

The SRV record is the source of information and the search site about the

location of particular services as such an application i need of such services will look for a related SRV record

A configured SRV is the source of the ports and personal settings for a new email client, without which the parameters set in the email client will be incorrect.

True or False? Jerry's company is beginning a new project, and he has been assigned to find a telecommunications tool that will improve operational efficiency. He lists the tasks that he wants the tool to be able to do. Then he does some research to find out what is available. The only thing remaining for Jerry to consider is where he can get the best deal on the technology.

Answers

Answer:

True

Explanation:

Answer:

It's false it took the assessment

Question 1 of 10 Which type of information systems personnel are involved in organizing information so that users can access it easily when it is needed? O A. Computer systems administrators O B. Systems analysts O C. Network support personnel O D. Database support personnel ​

Answers

Option D is correct. If we want multiple users to access data, we will organise that data in Database we can then be accessed whenever needed.

The information system personnel who organize the information for the user access are database support personnel. Thus, option D is correct.

What is the role of information systems personnel?

The information systems personnel are the professionals that perform the task of managing the hardware and the software to be test, built, repaired, and maintained for the access from multiple location.

The organization of the information over the database enables the easy access from multiple location.  Thus, the database support personnel are responsible for managing the easy access and organization of information. Thus, option D is correct.

Learn more about information system, here:

https://brainly.com/question/13081794

#SPJ2

PLEASE I NEED HELP!!!!! ASAP! Carly was given a writing assignment. In three to five sentences, give her some advice to help her plan and organize her writing.

Answers

Explanation:

She should take care of grammar for this she should have a dictionary,a plan on how to solve the assignment i.e ,which question she should write first and Which one at the last.

Write a for loop to print the numbers from 20 to 30, inclusive (this means it should include both the 20 and 30). The output should all be written out on the same line. Expected Output 20 21 22 23 24 25 26 27 28 29 30

Answers

Answer:

for b in range(20,31):

   print(b, end=" ")

Explanation:

Hint: Variable does not matter. Meaning the b that I put in does not matter. You can put in any other letter you want. Hope it helps!

A loop to print the numbers from 20 to 30, inclusive for b in range(20,31)    : print(b, end=" ").

What is loop?

Loop is defined as a computer program or script that continuously executes the same commands or processing the same data until told to stop.  A loop is used in computer programming to perform a set of instructions or a block of code repeatedly without having to start from scratch each time. The code block is executed in accordance with a particular situation. Loops are the control structures in a program.

Variables are data values that can change depending on the user's response to a query, such as their age. During the running of a program, variables could change. A variable is a piece of memory. It has a name that's connected to that place. The memory location is where data is stored. Variable is irrelevant. In other words, it doesn't matter what b I enter. Any additional letter can be entered.

Thus, a loop to print the numbers from 20 to 30, inclusive for b in range(20,31)    : print(b, end=" ").

To learn more about loop, refer to the link below:

https://brainly.com/question/14390367

#SPJ3

When an organization has the resources and a system must be built from scratch, an organization would most likely choose what type of software origination/development

Answers

The practice of assigning responsibility for some of an organization's computer systems to all of them must be constructed from scratch even when the company has the resources to do so.

Which four sorts of systems are there?

Systems engineering generally recognizes four distinct types in engineered system context: product system, service system, enterprise system, and system of systems.

What are the top five system types?

Information systems, financial systems, ecological systems, computer systems, and educational systems are all things that everyone is connected with. I can also add a number of other things that are repeatedly referred to as systems by experts in a certain field to the this list.

To know more about system visit:

https://brainly.com/question/14253652

#SPJ4

Given the network IP address, 185.99.0.0 will be divided into multiple subnets. How many bits will be necessary to address 98 subnets? b- What is the subnet mask? What is the maximum number of hosts on each subnet? d- Write the dotted-decimal IP address of subnet 75 and host 250?

Answers

a) Explanation:To address 98 subnets, we can use 7 bits for subnetting since 2^7 = 128 subnets which is more than 98.b) Subnet Mask:We need 7 bits for the subnet, and the other bits can be used for hosts. Therefore, the subnet mask will be 255.255.255.128.Maximum number of hosts on each subnet:With 9 bits available for hosts, the number of hosts we can get is 2^9 - 2 = 510.

Two is subtracted because the first and last IP address is reserved. Thus, the maximum number of hosts on each subnet will be 510.d) Detailed explanation:Subnet 75:Since we need 7 bits for subnetting, this subnet will fall in the fourth octet. The first 7 bits of the fourth octet will be the subnet ID. The next 1 bit will be used for host addressing. Since the subnet ID is 75, the last 9 bits of the IP address will be 0.

Therefore, the subnet IP address of subnet 75 will be 185.99.75.0. Host 250: The maximum number of hosts on each subnet is 510, which means that we will need 9 bits for host addressing. Since the subnet ID is 75, the first 24 bits of the IP address will remain the same. The last 9 bits will be used for host addressing. Therefore, the IP address of host 250 will be 185.99.75.250.

To know more about network ip visit:

brainly.com/question/33327895

#SPJ11

Explain why modern computers consist of multiple abstract levels and describe the main functions of each level

Answers

Modern computers must be quick, effective, and safe, which is why the system was introduced with several abstract layers. Abstract classes can always be used in multilevel inheritance.

Are two abstract methods allowed in a class?

A class can only extend one abstract class in Java, but it can implement numerous interfaces (fully abstract classes). Java has a purpose for having this rule.

Can we use many abstract methods?

The abstract keyword is used to make a class abstract. It may have 0 or more non-abstract and abstract methods. We must implement the abstract class's methods and extend it. It is not instantiable.

To know more about Abstract classes visit :-

https://brainly.com/question/13072603

#SPJ4

consider two consecutive rest api calls from a client to a server. which answer best desribes the fact that rest is stateless?

Answers

The client must make one REST API call and two REST API calls, each containing all relevant data.

On a Layer 3 switch, when setting up routed ports The physical interfaces provide what purpose?

The physical interfaces on Layer 3 switches behave as Layer 2 interfaces, just as they have done in the past. In other words, Ethernet frames are received by physical interfaces.

The OSPF reference bandwidth value is configured using this Cisco IOS command?

This details are not shown by the show ip ospf interface short command. The OSPF reference bandwidth value is configured using this Cisco IOS command? Make changes to the OSPF reference bandwidth using the Cisco IOS auto-cost reference-bandwidth speed command.

To know more about API visit :-

https://brainly.com/question/29442781

#SPJ4

Which one is not considered part of the cinematography team?

cinematographer
sound recorder
director of photography
camera operator

Answers

sound recorder

Explanation:

i hope it works

Sound recorder since it lists in the non living things and is a machine used

assume all nodes in a network are fully loaded, i.e., they all always have traffic to send. if you solely want to maximize throughput, would you choose to use tdma or csma? why?

Answers

If the goal is to maximize throughput, it would be better to choose TDMA (Time Division Multiple Access) over CSMA (Carrier Sense Multiple Access).

The reason is that in TDMA, each node is given a specific time slot to transmit their data, so there is no collision between different nodes trying to send data at the same time.

This eliminates the overhead of retransmission and contention resolution, allowing for more efficient use of the available bandwidth and thus higher throughput. On the other hand, in CSMA, nodes contend for the channel by sensing if it is free before transmitting, which can lead to collisions and wasted bandwidth when multiple nodes try to send data simultaneously.

In summary, if the main objective is to maximize throughput, TDMA would be a better choice over CSMA since it can eliminate the overhead of contention resolution and collisions, resulting in more efficient use of the available bandwidth.

You can learn more about TDMA (Time Division Multiple Access) at

https://brainly.com/question/31376343

#SPJ11

The Body Mass Index - BMI is a parameter used to measure the health status of an individual. Various BMI values depicts how healthy or otherwise a person is. Mathematically WEIGHT BMI = WEIGHT/(HEIGHT X HEIGHT) raw the flow chart and write a C++ software for a solution that can a) Collect the following values of an individual: 1. Name 2. Weight 3. Height b) Compute the BMI of that individual c) Make the following decisions if: 1. BMI < 18.5 is under weight 2. BMI >=18.5 but <25 considerably healthy 3. BMI >=25 but <30 overweight 4. BMI >= 30 but <40 Obesity 3 5. BMI >= 40 Morbid Obesity d) Display and explain the results of the individual b) Write brief notes outlining the syntaxes and sample code for the following control structures i. If... Else ii. Nested if iii. Switch iv. For loop v. While loop

Answers

1. Collect the necessary values of an individual: name, weight, and height. 2. Compute the BMI using the formula BMI = weight / (height * height). 3. Use if-else statements to make decisions based on the calculated BMI. For example, if the BMI is less than 18.5, the person is underweight. 4. Display the results of the individual, indicating their BMI category and explaining its meaning.

For the control structures in C++:

1. If... Else: This structure allows you to execute different code blocks based on a condition. If the condition is true, the code within the if block is executed; otherwise, the code within the else block is executed.

2. Nested if: This structure involves having an if statement inside another if statement. It allows for more complex conditions and multiple decision points.

3. Switch: The switch statement provides a way to select one of many code blocks to be executed based on the value of a variable or an expression.

4. For loop: This loop is used to execute a block of code repeatedly for a fixed number of times. It consists of an initialization, a condition, an increment or decrement statement, and the code block to be executed.

5. While loop: This loop is used to execute a block of code repeatedly as long as a specified condition is true. The condition is checked before each iteration, and if it evaluates to true, the code block is executed.

By implementing these control structures in your program, you can control the flow and make decisions based on the BMI value. It allows for categorizing the individual's health status and displaying the results accordingly.


To learn more about if-else statements click here: brainly.com/question/32241479

#SPJ11

computer cannot do anything without instructions true or false

Answers

Answer: True

Explanation:A computer (specifically the CPU, or central processing unit, within the computer system) needs instructions in order to do even the simplest things. Without instructions, it can't do anything. Just to boot your computer requires executing many many instructions.

Hope it helps✌✌

In windows 10, where would you save the template so it is available in the available templates list in backstage view?.

Answers

Answer:

got to \Username\Documents\CustomOfficeTemplates

Explanation:

CALCULATE THE MECHANICAL ADVANTAGE (MA).

DATA: F= 135 kg; b= 4*a; L=15 m

Answers

The mechanical advantage (MA) of the lever system in this scenario can be calculated by dividing the length of the longer arm by the length of the shorter arm, resulting in an MA of 4.

To calculate the mechanical advantage (MA) of the lever system, we need to compare the lengths of the two arms. Let's denote the length of the shorter arm as 'a' and the length of the longer arm as 'b'.

Given that the longer arm is four times the length of the shorter arm, we can express it as b = 4a

The mechanical advantage of a lever system is calculated by dividing the length of the longer arm by the length of the shorter arm: MA = b / a.

Now, substituting the value of b in terms of a, we have: MA = (4a) / a.

Simplifying further, we get: MA = 4.

Therefore, the mechanical advantage of this lever system is 4. This means that for every unit of effort applied to the shorter arm, the lever system can lift a load that is four times heavier on the longer arm.

For more such question on system

https://brainly.com/question/12947584

#SPJ8

The complete question may be like:

A lever system is used to lift a load with a weight of 135 kg. The lever consists of two arms, with the length of one arm being four times the length of the other arm. The distance between the fulcrum and the shorter arm is 15 meters.
What is the mechanical advantage (MA) of this lever system?

In this scenario, the mechanical advantage of the lever system can be calculated by comparing the lengths of the two arms. The longer arm (b) is four times the length of the shorter arm (a), and the distance between the fulcrum and the shorter arm is given as 15 meters. By applying the appropriate formula for lever systems, the mechanical advantage (MA) can be determined.


Other Questions
QS 9-15 Disposal of PPE LO6 Huang Furniture Company showed the following adjusted account balances on September 30, 2017: $ 56.000 39,000 109,000 96.000 48,000 33,000 26,000 21,000 Equipment Accumulated depreciation, equipment Machinery Accumulated depreciation, machinery Delivery truck.. Accumulated depreciation, delivery truck. Furniture Accumulated depreciation, furniture Click here for a description of List: QS 9-15. Prepare the entries to record the following on October 1, 2017: a. Equipment was sold for cash of $17,000. b. Machinery was sold for cash of $27,000. c. Delivery truck was sold for cash of $11,000. Furniture was given to a charity. d. QS 9-16 Exchanging PPE LO6 Dean Carpet Stores owned an automobile with a $15,000 cost that had $13,500 accumulated depreciation as of December 31, 2017. Its fair value on this date was $3,000. On the same day, Dean exchanged this auto for a computer with a fair value of $5,800. Dean was required to pay an additional $2,750 cash. Prepare the entry to record this transaction for Dean Distributive Property.12(6-1/2 x)? Find the local maximum and minimum values and saddle points of the functionf(x,y)=x33x+3xy2f(x,y)=x33x+3xy2. Awnser for me quickly pleaseee the lymphocytes that monitor blood and tissue fluids are which type of cell? a company's management has given a list of requirements to the network technician for a lan connection using cat6 cabling in an older building. the technician has to keep the environmental factors in mind during the network installation. which of these should the network technician consider while deciding whether or not to use plenum-rated cables? which is the prime factorization of 48?A. 2x2x2x2x3B. 2x2x2x6C. 4x 12D. 3x16 " When the apple falls,does the apple also attract the earth? What is the length of side AB of the triangle? (1 point) a 3 b 5 c Square root of 6 d Square root of 13 True or False? Club drugs are a new class of illicit drugs used to enhance one's experience at nightclubs and raves; such drugs include LSD, MDMA, GHB, and Ketamine (Special K). Which best describes the mapping process?limiting ideas to one or two categoriesincluding ideas related to a different topicbuilding ideas out from the main topicfinding an interesting approach to the topic in what ways does article 2 of the uniform commercial code (ucc) differ from contract rules under the common law? choose 3 answers. an investor buys three shares of xyz at the beginning of 2018, buys another two shares at the beginning of 2019, sells one share at the beginning of 2020, and sells all four remaining shares at the beginning of 2021. required: a. what are the arithmetic and geometric average time-weighted rates of return for the investor? The way you view the financial world is shaped most profoundly by: your feelings about the world economy. your teachers. your financial knowledge, financial risk-taking, and feelings of control over your situation. the news media and reports of GDP. When stock prices began to fall in the United States, how did Americans react? PLEASE HELP AS SOON AS EVER I NOYL HAVE 5 MINS WILL GIVE BRAINLY! Examples of relative dating include: _________a. Telling the rough age in years b. Determining the radioactive decay rates of a burned object c. A seldom-used means of determining the age of an archaeological material d. Determining whether an object is older, younger, or the same age as another e. Assigning a specific calendar date help me plzzzzzzzzzzzzzzzzz In a polynomial equation, the sum of the multiplicities of the roots always add up to.. the degree of the polynomial. the leading coefficient of the polynomial. the constant coefficient of the polynomial the sum of the coefficients of the polynomial. Help me please.