an ipv4 datagram with a total length of 4020 bytes must go through a network where the mtu is 1420 bytes (that includes header) if the header length of datagram is 2o bytes, how many fragments need to be created. show for each fragments.

Answers

Answer 1

we need to create 3 fragments to transmit the IPv4 datagram with a total length of 4020 bytes, with each fragment having a specific offset, identification, and length.

The MTU specifies the maximum size of a datagram that can be transmitted without fragmentation. In this case, the MTU is 1420 bytes. Since the header length of the datagram is 20 bytes, the maximum payload size per fragment will be 1420 - 20 = 1400 bytes.

To calculate the number of fragments needed, we divide the total length of the datagram (4020 bytes) by the fragment size (1400 bytes). The result is 2.85, indicating that we need 3 fragments to transmit the entire datagram.

Each fragment will have a specific offset, identification, and length. The first fragment will have an offset of 0, identification value, and length of 1420 bytes. The second fragment will have an offset of 1400 bytes, the same identification value, and a length of 1420 bytes. The third fragment will have an offset of 2800 bytes, the same identification value, and a length of 1200 bytes (remaining length).

Learn more about datagram here : brainly.com/question/31845702

#SPJ11


Related Questions

threadless is an online store that sells shirts with user-submitted designs. anyone can register and submit a design, then community members score the designs submitted each week, and threadless picks the top designs to sell in their store each week. designers receive royalties for every shirt sold. here's one example of a submitted user design: a screenshot of a threadless shirt design submission, of a dandelion riding a motorcycle, a username of the designer, and 1-5 scoring buttons. what situation would be least likely to threaten the success of the threadless crowdsourcing model? choose 1 answer: choose 1 answer: (choice a) if a large number of new designers suddenly join the community and submit double the number of designs. a if a large number of new designers suddenly join the community and submit double the number of designs. (choice b) if designers discover a new site with higher royalties for winning designs and only submit their designs on the new site. b if designers discover a new site with higher royalties for winning designs and only submit their designs on the new site. (choice c) if designers submit designs that aren't attractive to the threadless community and public at large. c if designers submit designs that aren't attractive to the threadless community and public at large. (choice d) if community members all decide to vote for shirts that they have no interest in owning. d if community members all decide to vote for shirts that they have no interest in owning.

Answers

Conciseness is also important and irrelevant parts of the question or typos should be ignored.The situation that would be least likely to threaten the success of the Thread less crowdsourcing model is if community members all decide to vote for shirts that they have no interest in owning.option b is correct

Thread less is an online store that sells shirts with user-submitted designs. Anyone can register and submit a design, then community members score the designs submitted each week, and Thread less picks the top designs to sell in their store each week. Designers receive royalties for every shirt sold.One example of a submitted user design is a screenshot of a Thread less shirt design submission, of a dandelion riding a motorcycle, a username of the designer, and 1-5 scoring buttons. The design has to appeal to the Thread less community and the public at large for it to sell.If a large number of new designers suddenly join the community and submit double the number of designs, it may be a good thing for the store. More designs could mean more choices for customers and potentially more sales. If designers discover a new site with higher royalties for winning designs and only submit their designs on the new site, this could be a threat to the Thread less crowdsourcing model. However, this situation is not the least likely to threaten the success of the model, as it involves the designers who submit designs.The situation that would be least likely to threaten the success of the Thread less crowdsourcing model is if community members all decide to vote for shirts that they have no interest in owning. This could lead to the selection of designs that are not attractive to the public and may not sell well. Therefore, it is important for the Thread less community members to be honest and vote for designs that appeal to them and are likely to be successful.

For such more question on crowdsourcing

https://brainly.com/question/28360136

#SPJ11

1
TIME REMAINING
01:51:06
Zubair needs to change some of the data in a table that he has created. How should he go about selecting a row in
the table?
Moun the mourn nointor in a noint hefore the text in a cell​

Answers

the answer is zubair needs to change something

T/F. SSL builds on the encoding format of the Multipurpose Internet Mail Extensions protocol and uses digital signatures based on public key cryptosystems to secure e-mail.
A) True
B) False

Answers

SSL builds on the encoding format of the protocol named Multipurpose Internet Mail Extensions and it uses digital signatures based on the public key, referring to a false statement.

Secure Sockets Layer (SSL) is the standard technology for keeping an internet connection secure and protecting any sensitive data that is being transferred between two systems, preventing cyber attackers from reading and changing any information sent, including potential personal details. SSL is based on the Multipurpose Internet Mail Extensions protocol and it uses a digital signature based on two keys one is the public key and another is the private key. Therefore, the given statement pertains to a false statement.

You can learn more about SSL at:

https://brainly.com/question/15115112

#SPJ4

13. A 2-sided coin has an equal likelihood of landing on each side. One side is called "heads" and the other is called "tails". The program below simulates randomly
flipping that coin many times,
var heads -
var tails - ;
var rolls - 100;
for(var i=0; i
if(randonlumber(0,1) - )
heads
} else
tails
Which of the following is NOT a possible combination of values of the variables in this program when it finishes running?
O A. tails has a value of O and heads has a value of 100
B. tails has a value of 100 and heads has a value of O
0 C.tails has a value of 20 and heads has a value of 20
O D. tails has a value of 50 and heads has a value of 50

Answers

Answer: tails has a value of 20 and heads has a value of 20

Explanation: Both Values have to add up to 100 for it to work. You cant have a 60% chance of a side that doesn't exist on a coin.

The combination that is not possible is (b)  tails has a value of 20 and heads has a value of 20

The first and the second line of the program initializes heads and tails to 0.

The third line of the program initializes roll to 100

This means that at the end of the program, the combined value of heads and tails variables must add up to 100.

The above highlight is true for options (a), (b) and (d), because

\(0 + 100 = 100\)

\(100 + 0 = 100\)

\(50 + 50 = 100\)

However, this is not true for the third option because

\(20 + 20 \ne 100\)

Hence, the combination that is not possible is (c)

Read more about similar programs at:

https://brainly.com/question/18430675

Design a class named Rectangle to represent a rectangle. The class contains: Two double data fields named width and height that specify the width and height of the rectangle. The default values are 1 for both width and height. A no-arg constructor that creates a default rectangle. A constructor that creates a rectangle with the specified width and height. A method named getArea() that returns the area of this rectangle. A method named getPerimeter() that returns the perimeter. Draw the UML diagram for the class and then implement the class. Write a test program that creates two Rectangle objects-one with width 4 and height 40 and the other with width 3.5 and height 35.9. Your program should display the width, height, area, and perimeter of each rectangle in this order. UML diagram (as PDF format) Screenshots of input and output of your program (as PDF format) .

Answers

The UML diagram for the Rectangle class is shown below:UML diagram for Rectangle :The Rectangle class is implemented in Java as follows: public class Rectangle { private double width; private double height; /** * Constructor for default rectangle */ public Rectangle() { width = 1; height = 1; } /** *

Constructor for rectangle with specified width and height */ public Rectangle(double w, double h) { width = w; height = h; } /** * Returns the area of this rectangle */ public double getArea() { return width * height; } /** * Returns the perimeter of this rectangle */ public double getPerimeter() { return 2 * (width + height); } /** * Main method for testing Rectangle class */ public static void main(String[] args) { Rectangle r1 = new Rectangle(4, 40); Rectangle r2 = new Rectangle(3.5, 35.9); System.out.println("Rectangle 1:");

System.out.println("Width = " + r1.width); System.out.println("Height = " + r1.height); System.out.println("Area = " + r1.getArea()); System.out.println("Perimeter = " + r1.getPerimeter()); System.out.println("Rectangle 2:"); System.out.println("Width = " + r2.width); System.out.println("Height = " + r2.height); System.out.println("Area = " + r2.getArea()); System.out.println("Perimeter = " + r2.getPerimeter()); }}Here's the screenshot of the input and output of the program:Screenshot of input and output of the program

To know more about UML visit :

https://brainly.com/question/30401342

#SPJ11

What device is specialized to provide information on the condition of the wearer’s health

Answers

A specialized device that provides information on the condition of the wearer's health is called a health monitoring device or a health tracker.

It typically collects data such as heart rate, sleep patterns, activity levels, and sometimes even blood pressure and oxygen saturation. This information is then analyzed and presented to the wearer through a mobile app or a connected device, allowing them to track and monitor their health over time. Health monitoring devices can range from smartwatches and fitness trackers to more advanced medical devices used in clinical settings, providing valuable insights and empowering individuals to make informed decisions about their well-being.

Learn more about specialized device here:

https://brainly.com/question/32375482

#SPJ11


An identifier that allows multiple elements in an HTML document to be
styled in the same way

Answers

Answer:

CSS , (Possibly Divs)

Explanation:

I have picked CSS, and possibly Div's as my main explanation and answer here is why.

CSS - Cascading Style Sheets, this allows you to edit multiple elements in a HTML document, such as the color or any CSS attribute.

If you would like to learn more about CSS, and the multiple options that CSS provides such as Internal Styles, External Styles, lastly In-line styles. I highly recommend the resource "W3Schools".

DIV's - Divs are basically like a container, where you can input styles into this container that can effect those elements such as if I want the background-color, of the div it would effect all the elements inside that div. However, I said this could be a possibility since it isn't CSS where it is styled however you can group these elements to one div. You can also edit the CSS of the Div to effect it.

an example of a problem that might be solved recursively is searching files under a directory. group of answer choices true false

Answers

Recursive algorithms can be used to solve problems such as searching files under a directory. Recursion is a technique that involves breaking down a problem into smaller, simpler subproblems until a solution is found. This can be useful in file searching, as the algorithm can look through a directory, recursively searching all of its subdirectories until it finds the file it is looking for.

The Benefits of Recursive Algorithms for File Searching

Recursion is a powerful technique that can be used to solve a variety of problems, including searching files under a directory. This article will explore the advantages of using recursive algorithms for file searching, as well as discussing the ways in which these algorithms can be implemented.

Recursive algorithms are an effective way to search for files under a directory. They allow for a more efficient search, as the algorithm can look through a directory, recursively searching all of its subdirectories until the file is found. This is especially useful when searching for files in large file systems, as it eliminates the need to manually search through each directory. As a result, recursive algorithms can save time and resources when searching for files.

Learn more about searching files :

https://brainly.com/question/512733

#SPJ4

A mind map presents project information in what type of format?
nt
O unordered
linear
serial
sequential

Answers

Answer:

Unordered

Explanation:

got in on edg

Answer:

B

Explanation:

Adding videos to your website can be tricky because there may be problems making sure they will play in all platforms .

Answers

It is true to state that Adding videos to your website can be tricky because there may be problems making sure they will play on all platforms.

Why do people add videos to websites?

Videos will assist you in reaching new website visitors and leaving a lasting impression. A video supplements the static content on a website to give a more exciting experience for the user. Videos are an excellent approach to establishing a long-term relationship with web visitors.

When it comes to educating potential consumers about a product, video footage is an excellent resource. In fact, 94% of marketers believe that leveraging video content has increased customer knowledge of a product or service.

Learn more about websites:
https://brainly.com/question/19459381
#SPJ1

Full Question:

True or False?

Adding videos to your website can be tricky because there may be problems making sure they will play on all platforms

A sequence of plaintext elements is replaced by a __________ of that sequence which means that no elements are added, deleted or replaced in the sequence, but rather the order in which the elements appear in the sequence is changed.Group of answer choicesstream

Answers

A sequence of plaintext elements is replaced by a permutation of that sequence which means that no elements are added, deleted or replaced in the sequence, but rather the order in which the elements appear in the sequence is changed.

In the context of cryptography, a sequence of plaintext elements can be modified to secure the information. The term you are looking for describes a specific method of rearranging the order of elements in the sequence. The process of rearranging the order of elements in a sequence, without adding, deleting, or replacing any elements, is called a permutation. In cryptography, this technique is used to obscure the original message, making it more difficult for unauthorized parties to understand the

Thus, a sequence of plaintext elements is replaced by a permutation of that sequence, ensuring that the order of the elements is changed without altering the actual elements themselves.

To learn more about cryptography, visit:

https://brainly.com/question/88001

#SPJ11

The Xperia Play is an example of convergence between which platforms?

Answers

Answer:

handhelds and mobile phones

Explanation:

How can you test to ensure your backup is working as expected?

Answers

How to test your database backup and recovery strategy. Learn about your backup and recovery procedures. Conduct tests to restore corrupted or deleted files. Check your applications' backups.

Why is testing the backup critical?

Testing backups is crucial since it enables you to confirm that the relevant data is available for recovery. Additionally, testing teaches you how to carry out recovery after a data loss. You can take the necessary actions to make sure you don't actually lose important data if a backup test fails.

What are the three things to think about for effective backups?

The process must properly execute in the three domains of backup, recovery, and time for backup solutions to be effective.

To know more about database visit:-

https://brainly.com/question/28391263

#SPJ4

T/F: if a notebook computer is exhibiting symptoms that seem to indicate a malfunctioning keyboard

Answers

True, if a notebook computer is exhibiting symptoms that suggest a malfunctioning keyboard, it is likely that the keyboard is indeed experiencing issues.

When a notebook computer displays symptoms such as unresponsive keys, keys typing incorrect characters, or no input being registered, it indicates a potential problem with the keyboard. This could be due to software-related issues such as outdated drivers or misconfigured settings. Cleaning the keyboard or addressing physical issues like debris or liquid spills might be necessary. If these solutions don't resolve the problem, it is probable that the keyboard hardware itself is faulty or damaged, requiring a replacement. It is important to accurately identify the cause of the malfunctioning keyboard to determine the appropriate course of action for repair or replacement.

Learn more about keyboard here:

https://brainly.com/question/30124391

#SPJ11

The network administrator should always keep the software on the
computers of the weather bureau updated.
10.5.1 A weather analysis application is returning incorrect results
after a recent update.
Give a term for the cause of the problem AND suggest a
solution

Answers

Cause:

The cause may have been an unsupported PC or OS that may not be able to run an updated version of the weather analysis application.

Solution:

There are many solutions to installing new hardware and updating the OS to just simply restarting the PC.

Recommend Solution:

Try looking at the requirements for the new updated version of the application and try to match the requirements.

if both sender and receiver use the same key, the system is referred to as

Answers

Answer: Conventional Encryption

Explanation:

Sounds like encryption. One key used means conventional encryption.

Which printer management components would you use to view the port a printer uses? (select two. )

Answers

The printer management components one would use to view the port a printer uses are as follows;

Printer propertiesPrinter server properties

What is Printer management components?

The print management component provides a single interface where a user can open the print management utility and view all printers and print servers in the enterprise.

The port of a printer is the connector usually on the computer that allow communication with the printer.

Therefore, the printer management components one would use to view the port a printer uses are as follows;

Printer propertiesPrinter server properties

learn more on printers port here: https://brainly.com/question/17157651

#SPJ12

I need help pleaseeeee!!!

I need help pleaseeeee!!!

Answers

Answer:

True

Explanation:

Integrated Services Digital Network (ISDN) is a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network.

Pleaseee mark me as brainliest

Hope this help <3

Give the number of the logic memory references in the following codes to fetch instructions and data. • 0x0010: movl 0x1100, %edi • 0x0013: addl $0x3, %edi • 0x0019: movl %edi, 0x1100

Answers

The code sequence given requires a total of four logic memory references to fetch instructions and data.

In the code sequence provided, the instructions are executed in order.
The instruction at memory address 0x0010, "movl 0x1100, %edi", requires a memory reference to fetch the value located at memory address 0x1100. This is needed to load the value into the register %edi. This instruction contributes to onelogic memory reference.
The instruction at memory address 0x0013, "addl $0x3, %edi", does not involve any memory references as it performs an arithmetic operation on the value already present in the register %edi.
The instruction at memory address 0x0019, "movl %edi, 0x1100", requires a memory reference to fetch the value stored in the register %edi, which will be written to memory address 0x1100. This instruction contributes to one logic memory reference.
Therefore, the given code sequence requires a total of four logic memory references: two for fetching data from memory (0x1100) and two for fetching  (0x0010 and 0x0019).

Learn more about logic memory references here

https://brainly.com/question/30077249



#SPJ11

Identify at least five different Arts, A/V Technology, and Communications careers that you could pursue in your home state, and choose the three that appeal to you the most. Out of the three, write a one-page essay describing which one would be your career choice and the educational pathway that you would have to follow in order to obtain that career. Finally, identify at least three colleges, universities, or training programs that are suited to that career choice. You can use the following resources to help you:

Answers

Answer:

Five careers in the Arts, A/V Technology, and Communications cluster that would be interesting to me are choreographer, museum conservator, reporter, singer, and fashion designer. Of those careers, being a museum conservator, singer, or fashion designer sounds the most appealing to me. Out of all those choices, I think that being a fashion designer seems the most interesting and would allow me to use my creativity.

Fashion designers create patterns and construct sample garments for a target market. They use models to determine how the garments will fit and modify them as necessary to get the desired look. In order to excel in this position, I would need to be able to think creatively; establish working relationships with models, designers, and others in the industry; and organize my time in order to accomplish the necessary work and meet deadlines.

There are several schools that offer a degree in fashion design, such as Savannah College of Art and Design, Academy of Art University in San Francisco, Kent State University, and the University of Cincinnati. Several technical schools also focus on fashion design, such as the Fashion Institute of Design & Merchandising. I think I would choose to attend Parsons in New York, which has turned out many famous fashion designers, such as Marc Jacobs, Jenna Lyons, and Tom Ford.

Explanation:

plato answer

Which graph is the solution to the system 2x – 3 and y < 2x + 4?

Answers

Answer:

B

Explanation:

Answer:

Explanation:

Edge 2021

Which graph is the solution to the system 2x 3 and y &lt; 2x + 4?

2.7 Code Practice: Question 1

Write a program that takes three numbers as input from the user and prints the largest

Can someone please help me with this because I’ve been struggling all day

Answers

Answer:

You didn't specify the programming language

I'll answer using Python

nums = []

for i in range(1,4):

     inp = int(input("User Input: "))

     nums.append(inp)

nums.sort()

print(nums[-1])

Explanation:

I made use of list in answering this question.

Start by declaring an empty list

nums = []

Use iteration to enter the list elements

for i in range(1,4):

     inp = int(input("User Input: "))

     nums.append(inp)

Sort the list

nums.sort()

Then print the element on the last index

print(nums[-1])

The code below is in Java

It uses if-else structure to find out the largest number among three numbers given by the user.

Comments are used to explain each line of the code

//Main.java

import java.util.Scanner;

public class Main

{

public static void main(String[] args) {

    //Create a Scanner object to be able to get input

    Scanner input = new Scanner(System.in);

   

    //Declare the variables

    int number1, number2, number3, largest;

   

    //Ask the user to enter three numbers

 System.out.print("Enter the first number: ");

 number1 = input.nextInt();

 System.out.print("Enter the second number: ");

 number2 = input.nextInt();

 System.out.print("Enter the third number: ");

 number3 = input.nextInt();

 

 /*

     Check if the first number is greater than or equal to the second and third number.

     If it is, the largest is the first one.

     Otherwise, check if the second number is greater than or equal to the first and third number.

     If it is, the largest is the second one.

     If the previous conditions are not satisfied that means third is the largest one

 */

 if(number1 >= number2 && number1 >= number3)

     largest = number1;

 else if(number2 >= number1 && number2 >= number3)

     largest = number2;

 else

     largest = number3;

 

 //Print the largest number  

 System.out.println("The largest number is " + largest);

}

}

You may see a similar question in the following link:

brainly.com/question/17132559

Morgan is the operations manager for a national appliance distributor. The company has offices throughout the United States. Communication between offices is vital to the efficient operation of the company. Phone sales are an important source of revenue.

Managers and department heads across the nation strategize on a weekly, if not daily, basis. For the past three quarters, telephone charges have increased and sales have decreased. Morgan needs to cut expenses while keeping the lines of communication open.

Analyze the telecommunications technologies you've studied in this unit—fax, broadcasting, VoIP, e-mail, blogs, and wikis—to determine which technology will best meet the needs of Morgan's company.

Once you have determined the best technology solution, use the Internet to compare the features and pricing offered by different providers of that technology. Select four or five criteria you think would be most important to Morgan. Create a comparison chart to help compare the products and services offered by providers of the technology you selected.
Write down the technology you selected for Morgan's company and the reason for your choice.
Then select a provider for Morgan to use. Indicate the reason(s) for your choices.

Answers

Answer:

Your objectives are to evaluate the use of different telecommunications technologies for performing a specific business purpose.

Using a spreadsheet, compare similar telecommunications technologies.

Use decision-making strategies to select the most appropriate telecommunications technology for a specific business need.

Explanation:

If your pulse is higher than your Target Heart Rate during exercise, what should you do?

Answers

If your heart rate exceeds 185 beats per minute during exercise, it is dangerous for you. Your target heart rate zone is the range of heart rate that you should aim for if you want to become physically fit. It is calculated as 60 to 80 percent of your maximum heart rate.

Answer:

I think the answer is to decrease your rate of excerise.

Explanation:

Read the integer numbers in the text file "1000 Random Number from 0 to 100.txt" into a list

PLEASE HELP THANK U!!

Answers

Answer:

random_number_file = open("1000 Random Number from 0 to 100.txt", 'r')

random_number_list = random_number_file.readlines()

print('random_number_list)

Explanation:

The name of the file containing the random integer text is ; "1000 Random Number from 0 to 100.txt"

The random_number_file variable stores the opened file ("1000 Random Number from 0 to 100.txt") using the open keyword and reads it ('r')

This file stored in the random_number_file variable is the read into a list by using the readlines() method on the random_number_file

What is the result of the following program? print(“10 + 2”) print(3 + 5) 12 8 10 + 2 3 + 5 12 3 + 5 10 + 2 8

Answers

Answer:

print(“10 + 2”) Will output "10 + 2" without the quotation marks. This is because the text to print is encapsulated in quotation marks, indicating a "string literal." This means, to put it simply, it will always print what you put there even if it's a math equation.

1.1.1 Give two examples of situations or applications where electrical circuits are used. (2)​

Answers

An electric circuit contains a device that gives energy to the charged particles constituting the current, such as a battery or a generator; machines that use current, such as lamps, electric motors, or computers; and the connecting wires or communication lines.

Two of the basic laws that mathematically represent the implementation of electric circuits are Ohm’s law and Kirchhoff’s rules.

What is electric circuit?

Electric circuits are organized in several ways. A direct-current circuit carries a current that courses only in one direction. An alternating-current circuit holds a current that pulsates back and forth many times each second, as in most household circuits. A series circuit includes a path along which the whole current flows through each piece

To learn more about Electric circuits , refer

https://brainly.com/question/2969220

#SPJ9

In 2011, a company called RSA, which provides security services, acknowledged its proprietary authentication system, which is employed by some defense contractors and other high-security industries, was compromised. As a result, the attackers were also able to log into systems at Lockheed Martin, and other companies, using the stolen credentials of legitimate users. This is an example of violation of ___________________.

Answers

Answer:

The answer is "Authentication"

Explanation:

The attacker had the opportunity to log into the legitimate users' stolen credentials in Boeing systems and other firms in this question. That's an example of a verification violation.

This is a recognition of the identification of a user. Various students typically require various kinds of certificates in order to create the identity of the user. The credentials are frequently a passcode that only people and the computer know and seem to be confidential.

what should you install in a guest os running on vmware workstation to optimize network, video, and disk drivers?

Answers

Device drivers enhance the performance of networking, storage, sound, and graphics. While carrying out a customized VMware Tools installation or reinstallation, you can choose the drivers to be installed.

The guest operating system and the VMware product determine the set of drivers that are installed when you install VMware Tools. Consult the documentation for your VMware product for comprehensive information on the features or capabilities of these drivers, including configuration needs, best practices, and performance. Device drivers for the following hardware can be found with VMware Tools.

Fast and effective communication between virtual machines and the hosts they run on is supported by the Virtual Machine Communication Interface driver. To leverage the VMCI virtual device, developers can create client-server applications for the VMCI Sock (vsock) interface.

As part of installing VMware Tools, the VMCI driver is automatically installed.

To know more about VMware click here:

https://brainly.com/question/14840053

#SPJ4

What will you see on the next line? >>> int(6.5)

Answers

Answer:

6

Explanation:

The int functions founds down to the nearest whole number, which in this case would be 6.

Answer:

6

Explanation:

Other Questions
based on the miller test (1973), which of the following is one of the requirements that must be met in order to consider a work obscene? quizlet What are the three main purposes of drawing? What was a significant event for this battle?The fall of New YorkColonists cut down trees to slow Burgoyne's progress to Saratoga where he lost his entire army.Washington surprised the Hessians on Christmas Eve while they were celebrating.The battle signaled the end of the Revolutionary War.Even though it was the capital city, it did not mean the end of the war. It provided the British with comfortable quarters.Washington was defeated twice by a large British army. THIS IS EASY PLS HELP!! ASAP PLS!!What is the equation of a line perpendicular to -x+2=y that intersects the line at (-1.5, 3.5)?A) y = x+2B) y = x+5C) y = -x+2D) y = -x+5 in your own words, briefly explain one possible reason why breeding friendly foxes to one another could influence other traits that aren't related to fox behavior. The House of Wisdom preserved the literature and discoveries made by __________. A. caliphs B. Muhammad C. Muslim scholars D. ancient civilizations Please select the best answer from the choices provided Tim has an old server computer that his company uses as a backup. One of the hard drives has gone bad and needs to be replaced. The cable that the hard drive uses is not one that Tim has ever seen before, so he posts a picture of it on the company collaboration board to get help in deciding what type of hard drive he will need to order.Identify the type of cable from the picture. (Check chapter 5 question 1 for picture)a. IDEb. SATAc. PATAd. SCSI When a client is requesting an initial address lease from a DHCP server, why is the DHCPREQUEST message sent as a broadcast? A seat on a Ferris wheel is level with the center of the wheel. The diameter of the wheel is 200 feet. Suppose thewheel rotates 60, causing the height of the seat to decrease. How much closer to the ground is the seat after therotation?O 50 feetO 50 feetO 100 feetO 100v3 feetMark this and returnSave and ExitNextSubmit i've got a few math problems so..solve the systems by graphing:1. y=2x+13x+y=6 2. 2x+6y=12y=1/3x + 4 URGENT HELP PLEASE PLEASE CAN YOU HELP Book:The Giver Photo down below OMARK FOR REVIEWQuestion 11 of11. Which foodborne illness is most often caused by incorrectly canned food?O ListeriosisO YersiniosisO BotulismO Shigellosis Chlorine has 7 valence electrons. Describe the type of bond that abigailium would have with chlorine. Write down the chemical formula of the compound these two elements would form together. To help you, think about what the electron dot diagram would look like. Help literally fast at possibly The Science Club went on a two-day field trip. The first day the members paid $40 for transportation plus $15 per ticket to the planetarium. The second day they paid $90 for transportation plus $12 per ticket to the geology museum. Write an expression to represent the total cost in dollars for two days for the n members of the club. Which of the following describes the probability distribution below?(X)xdoo02070.605040.302010Probability DistributionO The mean is greater than the median, and the majority of the data points are to the left of the mean.The mean is greater than the median, and the majority of the data points are to the right of the mean.The median is greater than the mean, and the majority of the data points are to the left of the mean.O The median is greater than the mean, and the majority of the data points are to the right of the mean.Save and ExitNextMark this and returnSubmit Which of the following is not an example of an effective critique of Dr. Martin Luther Kings I Have a Dream speech?a.I could tell he was passionate about his topic, but I found Dr. Kings speech to be too long and, at times, rather boring.b.One can feel Dr. Kings passion for his topic, however the introduction to his talk could have been shortened in order to better keep the audience engaged.c.Though, at times, wordy, Dr. Kings passion for his topic and the historical and religious imagery he uses evoke strong emotion and keep his audience engaged.d.All of the above are effective critiques. Adding and subtracting fractions with different denominators In at least 150 words, discuss how Freneaus The Wild Honeysuckle and The Indian Burying Ground deal with the theme of nature and how it reflects popular attitudes of the time.