describe in words why longer rtt’s on a high capacity network link, (over 1000 mbps), will hinder a reliable data transfer protocol

Answers

Answer 1

Longer RTTs on a high capacity network link hinder a reliable data transfer protocol by increasing the time it takes for acknowledgements to be received, causing unnecessary retransmissions and congestion in the network, leading to increased packet loss and reduced reliability.

Explanation:

A longer Round Trip Time (RTT) on a high capacity network link, such as over 1000 Mbps, will hinder a reliable data transfer protocol because it increases the amount of time it takes for the sender to receive an acknowledgement from the receiver. When a sender sends a packet to a receiver, it expects to receive an acknowledgement (ACK) from the receiver within a certain timeframe.

If the RTT is longer, it means that the ACK will take longer to arrive at the sender. This can cause the sender to assume that the packet was lost and retransmit it, even though the original packet was actually received by the receiver. This can lead to unnecessary retransmissions, which can slow down the data transfer and consume more bandwidth.

Furthermore, longer RTT can cause congestion in the network, as the sender may continue to send packets before receiving the ACK, leading to an overflow of data in the network buffer. This can cause packets to be dropped, further slowing down the data transfer and increasing the chances of packet loss.

In summary, longer RTTs on a high capacity network link can hinder a reliable data transfer protocol by causing unnecessary retransmissions, congestion in the network, and increased packet loss, all of which can slow down the data transfer and reduce overall reliability.

Know more about the data transfer protocol click here:

https://brainly.com/question/30695356

#SPJ11


Related Questions

when you reply to an email message, attachments are returned to the sender along with your response. T/F

Answers

It is a true statement that when you reply to an email message, attachments are returned to the sender along with your response.

Why is the statement on attachment a true statement?

In general, when you reply to an email message, any attachments that were included in the original message will remain attached and be sent back to the sender along with your response. However, it is important to note that this behavior can vary depending on the email client or application being used.

In some cases, email clients may allow users to choose whether or not to include attachments when replying to a message. This option may be presented as a checkbox or toggle switch that the user can select before sending their response. Alternatively, some email clients may automatically exclude attachments from replies by default, in order to reduce the size of messages and prevent unnecessary duplication of files.

Read more about Email attachments

brainly.com/question/28348657

#SPJ1

In a record, each separate piece of data, such as a last name, a first name, or an address, is called a _____________.

Answers

In a record, each separate piece of data, such as a last name, a first name, or an address, is called a field.

What each record in a database is called?

A row, record, or tuple refers to a single entry in a table. A set of connected data is represented by a tuple in a table.

What is database?

A database in computing is a structured collection of data that is electronically accessible and stored.

Large databases are housed on computer clusters or cloud storage, whilst small databases can be stored on a file system.

Data modeling, effective data representation and storage, query languages, security and privacy of sensitive data, and distributed computing issues, such as supporting concurrent access and fault tolerance, are all part of the design of databases.

What is DBMS?

Essentially, a database management system (or DBMS) is just a computerized data-keeping system. Users of the system are provided with the ability to carry out a variety of actions on such a system for either managing the database structure itself or manipulating the data in the database. Data structures or types are used to classify database management systems (DBMSs).

Learn more about database click on this:

https://brainly.com/question/518894

#SPJ4

starting a computer loads system software to provide what?

Answers

Operating system
Booting
Cold Boot
Warm Boot
BIOS

You are connected to your network's Cisco router, and need to verify the route table. What command should you enter?
a.show ip route
b.route print
c.route -a
d.show route-table

Answers

The command to verify the route table on a Cisco router is "show ip route."

In order to verify the route table on a Cisco router, you should enter the command "show ip route." This command provides information about the current routing table of the router, displaying the routing entries, including the destination network, next-hop address, administrative distance, and metric. By examining the route table, you can determine how traffic will be routed within the network and identify any potential issues or inconsistencies.

The "show ip route" command is specific to Cisco routers and is widely used in troubleshooting and network management tasks. It allows network administrators to have visibility into the routing decisions made by the router and helps them understand the paths that packets will take when traversing the network.

By analyzing the route table, administrators can verify the presence of expected routes, identify any missing or incorrect routes, and troubleshoot connectivity or routing problems. This command is a fundamental tool for network administrators working with Cisco routers to gain insights into the network's routing infrastructure.

learn more about "show ip route." here:

https://brainly.com/question/32098872

#SPJ11

Games only recently became a part of human life—in about 1100 CE.

A.
True
B.
False

Answers

Answer:

B. False

Explanation:

Games have been around for a long time. The earliest games were played in ancient Egypt.

114. Flatten Binary Tree to Linked ListGiven a binary tree, flatten it to a linked list in-place.For example, given the following tree: 1 / \ 2 5 / \ \3 4 6look like: 1 -> 2 -> 3 -> 4 -> 5 -> 6

Answers

To flatten a binary tree to a linked list in-place, we can use a recursive approach.

We start by flattening the left and right subtrees of the current node, and then we move the flattened right subtree to the right of the flattened left subtree. Finally, we set the left child of the current node to null and the right child to the flattened subtree.

Here's an implementation in Python:

```
class Solution:
   def flatten(self, root: TreeNode) -> None:
       """
       Do not return anything, modify root in-place instead.
       """
       if not root:
           return
       
       self.flatten(root.left)
       self.flatten(root.right)
       
       if root.left:
           right_subtree = root.right
           root.right = root.left
           root.left = None
           
           # Find the end of the flattened left subtree
           end = root.right
           while end.right:
               end = end.right
               
           # Append the flattened right subtree
           end.right = right_subtree
```

In the example given, the binary tree would be flattened to the linked list: 1 -> 2 -> 3 -> 4 -> 5 -> 6.

To know more about linked list visit:

https://brainly.com/question/28938650

#SPJ11

HELP!' Prompt
In a table, what is a field?

Answers

Answer:

Fields are the components that provide structure for a table. In fact, you can't have a table without fields. ... Fields in a table store the same category of data in the same data type. For example, if you have a NAME field in a table of customers, the entries for this field are all customer names and are stored as text.

Answer:

Fields are the components that provide structure for a table. In fact, you can't have a table without fields. ... Fields in a table store the same category of data in the same data type. For example, if you have a NAME field in a table of customers, the entries for this field are all customer names and are stored as text.

Explanation:

According to the video, what are common tasks performed by Tour Guides? Check all that apply.

leading trips
maintaining equipment
shepherding tourists and luggage
socializing
purchasing tickets for flights
selling equipment
setting up meals
teaching first aid

Answers

Common tasks of the tour guide.

As per the question, the video shows us the tour guide n the ways he handles the tasks. The tour guide can be seen using making techniques such as providing tips, giving information, socializing with people, and setting up meals and other arrangements.

Thus the answer is leading trips, maintaining equipment, shepherding the tourists and luggage, and socializing, setting up meals.

Thus the duty of the tour guide its provide the latest information and provide the cratered services to the clients. The services like hotel, travel and maintains of the equipment's is essential for them. Thus the option 1, 2, 3,4 and 7 are correct.

Learn more about the according to the video.

brainly.com/question/19175630.

Answer: 1 2 3 4 7

Explanation:

what the other guy said

When training a new provider in air medical​ operations, which of the following statements would be​ appropriate?
A.
​"Fixed-wing aircraft are only used by critical care transport​ teams."
B.
​"Only patients under 90 kg can be transported in a​ helicopter."
C.
​"Never approach an aircraft from the​ rear."
D.
​"It is your responsibility to determine safe flying conditions after receiving a​ call."

Answers

When training a new provider in air medical​ operations, "Never approach an aircraft from the​ rear." The correct option is C.

This sentence emphasises a crucial safety precaution when working near aircraft. The whirling propellers or jet blast make it risky to approach an aircraft from behind.

People must approach and position themselves around planes from the front or the sides so they may keep a clear view of the aircraft and stay clear of any dangers.

Thus, the answer is C. ​"Never approach an aircraft from the​ rear."

For more details regarding safety precautions, visit:

https://brainly.com/question/29618233

#SPJ4

Help me with this coding question that involves "For Loop"

Help me with this coding question that involves "For Loop"

Answers

Answer:

FIXED_COST = 1.24

FREE_MINUTES = 3

COST_PER_MINUTE = 0.76

print( "----------------- Chow Mobile -----------------" )

total = 0

nrCalls = int(input('\nNumber of long distance phone calls made: '))

for i in range(nrCalls):

 minutes = int(input('\nNumber of minutes for call #{}: '.format(i+1)))

 cost = FIXED_COST

 if minutes > FREE_MINUTES:

   cost += (minutes - FREE_MINUTES)*COST_PER_MINUTE

 total += cost

 print('\nCost for call #{}: ${:,.2f}'.format(i+1, cost))

 print('Total cost of all calls: ${:,.2f}'.format(total))

print( "-------------- THANK YOU --------------" )

Explanation:

I have improved the display of currency to always use 2 digits. All constants are defined at the top, so that you don't have "magic numbers" inside your code. This makes the purpose of the numbers also more clear.

WHO KNOWS HOW TO TAKE A SCREENSHOT ON A HP PAVILION COMPUTER, PLS HELP!!!!!

Answers

Answer:

Me

Press the Windows key and Print Screen at the same time to capture the entire screen. Your screen will dim for a moment to indicate a successful snapshot. Open an image editing program (Microsoft Paint, GIMP, Photoshop, and PaintShop Pro will all work). Open a new image and press CTRL + V to paste the screenshot.

Explanation:

You need press this button for take a capture

WHO KNOWS HOW TO TAKE A SCREENSHOT ON A HP PAVILION COMPUTER, PLS HELP!!!!!

Answer:

Use the keys win + shift + s

If that doesnt work than I don't know what will

The PRODUCT table contains this column: PRICE NUMBER(7,2)
Evaluate this statement:
SELECT NVL(10 / price, '0')
FROM PRODUCT;
What would happen if the PRICE column contains null values?
A. A value of 0 would be displayed. (*)
B. The statement would fail because values cannot be divided by 0.
C. The statement would fail because values cannot be divided by null.
D. A value of 10 would be displayed.

Answers

SQL queries are used to return results from a database table or multiple tables.

If the PRICE column contains null values, then (b) the statement would fail because values cannot be divided by 0.

The query is given as: SELECT NVL(10 / price, '0')  FROM PRODUCT

From the query, the query is to first divide 10 by the value of the PRICE column.

If the PRICE column contains 0, then it means that price = 0

A division by 0 is not possible.

So, the query would fail

Hence, the true statement is (b)

Read more about SQL queries at:

https://brainly.com/question/15049854

using a systematic troubleshooting approach, a help desk technician suspects a problem at layer 3 of the osi model. in gathering information, which two questions are associated with layer 3? (choose two.)

Answers

When using a systematic troubleshooting approach and suspecting a problem at layer 3 of the OSI model, By answering these questions, the technician can gather more information about the problem and determine whether it is likely to be related to layer 3 of the OSI model.

The following two questions may be associated with gathering information about the problem:

Are the IP addresses and subnet masks correctly configured?       Layer 3 of the OSI model, the network layer, is responsible for addressing and routing data packets. If the IP addresses or subnet masks are incorrectly configured, it can cause problems with communication between devices.

Are there any connectivity issues between devices on the same network or different networks?                                                             The network layer is also responsible for establishing and maintaining connections between devices on the same network or different networks. If there are connectivity issues, it could indicate a problem at this layer.

To know more about OSI model, visit: https://brainly.com/question/22709418

#SPJ4

Which are two fundamental building blocks for creating websites?
OOOO
HTML
XML
CSS
DOCX
AAC

Answers

Hey the main coding languages for building websites are html. html is for the formatting . when CSS the other one is used for the style. we use CSS for style sheets and much more.  

if you think about it like a house html is the foundations and the walls and css is the paint.

Hope this helps.

Exercise #3: Write a program that finds all students who score the highest and lowest average marks of the first two homework in CS (I). Your program should read the data from a file called " "

Answers

To find students with the highest and lowest average marks in the first two CS (I) homework, read data from a file, calculate averages, and print the corresponding student names using the provided Python code.

To write a program that finds all students who score the highest and lowest average marks of the first two homework in CS (I),

Read data from the file.First of all, the program should read data from a file. The file name is " ". Calculate the average of the first two homework for each student. Then the program should calculate the average of the first two homework for each student, and store it in a dictionary with the student's name as the key.Find the highest and lowest averages.After that, the program should find the highest and lowest averages and the corresponding student names.Print the names of the students who have the highest and lowest average marks.Finally, the program should print the names of the students who have the highest and lowest average marks.

Below is the Python code that can be used to find the students who score the highest and lowest average marks of the first two homework in CS (I):

```python#open the filefile = open('filename', 'r')#initialize a dictionary to store the average of first two homework marks for each studentdata = {}#iterate through each line of the filefor line in file:#split the line into a list of valuesvalues = line.strip().split()#get the student's name and the first two homework marksname = values[0]marks = [int(x) for x in values[1:3]]#calculate the average of the first two homework marksaverage = sum(marks)/len(marks)#store the average in the dictionarydata[name] = average#find the highest and lowest averageshighest = max(data.values())lowest = min(data.values())#find the students with the highest and lowest averageshighest_students = [name for name, average in data.items() if average == highest]lowest_students = [name for name, average in data.items() if average == lowest]#print the names of the studentsprint('Students with highest average:', ', '.join(highest_students))print('Students with lowest average:', ', '.join(lowest_students))```

Note: Replace the 'filename' with the actual name of the file that contains the data.

Learn more about Python code: brainly.com/question/26497128

#SPJ11

Who ever answers it first and correct I will mark you brainliest. :)

Who ever answers it first and correct I will mark you brainliest. :)

Answers

Answer:

It is underlying message that a poem conveys

Explanation:

I hope this really helps you

How many bits would be needed to count all of the students in class today there is 20 students

Answers

Answer:

5

Explanation:

1. The _________ refers to the arrangement of pattern of elements like images, text, and movies on a web page. I NEED HELP ASAP

Answers

The Document format refers to the arrangement of a pattern of elements like images, text, and movies on a web page.

What is documents format?

Simple HTML files are frequently used to define web documents. This page is an example of a web document that frequently consists of multiple files and may be accessed using a URL (uniform resource locator).

Most of the time, style sheets, background images, other graphics, Java programmes, and other items are included in the HTML file itself.

What is html?

Knowing how HTML works will help you much in the fields of design, marketing, and a number of other professions.  HTML is a fundamental component of any development course, therefore having a working grasp of it is necessary for those of you who want to pursue careers as professional Web developers.

To know more about html visit:

https://brainly.com/question/17959015

#SPJ1

true or false the gm electrical power management system has 3 modes of operation.'

Answers

The gm electrical power management system has 3 modes of operation is true.

What is the electrical power management system?

The GM Electrical Power Management System (EPMS) does have 3 modes of operation. These modes are:

   Battery Saver Mode: In this mode, the EPMS reduces the electrical load on the battery in order to prolong its life. This is done by disabling certain electrical features that are not essential for driving, such as the heated seats or power windows.

   Generator Mode: In this mode, the EPMS runs the generator to charge the battery and provide power to the vehicle's electrical systems. This is the default mode of operation when the engine is running.

   Regenerative Braking Mode: In this mode, the EPMS captures the kinetic energy from braking and converts it into electrical energy, which is then used to charge the battery. This helps to improve fuel efficiency and reduce emissions. This mode is typically only used in hybrid or electric vehicles.

Read more about electrical power here:

https://brainly.com/question/29395271

#SPJ1

1. (a) A computer enthusiast has a collection of 35 computers, on each of which he has installed at least one of Windows, Linux and Android operating systems. If 16 have Windows, 18 have Android, 12 have Linux, 6 have Windows and Android, 4 have Android and Linux and 3 have Windows and Linux, how many have Windows but neither of the other two operating systems? (5 marks)

Answers

The number of computers that have Windows but neither of the other two operating systems is 3.

Computers are available in the collection of a computer enthusiast. On each of these computers, one or more of the Windows, Linux, and Android operating systems have been installed. In total, there are 35 computers in the collection.There are 16 Windows computers in the collection. There are 18 Android computers in the collection. There are 12 Linux computers in the collection. There are 6 computers in the collection that run both Windows and Android. There are 4 computers in the collection that run both Android and Linux. Finally, there are 3 computers in the collection that run both Windows and Linux. We need to determine how many computers in the collection run Windows but neither of the other two operating systems. The Windows-only computers comprise those computers that are only running Windows and those computers that are running both Windows and another operating system, but not Linux or Android. Only 3 computers are running Windows and Linux, so there are no computers running Windows and neither Linux nor Android. Therefore, the number of computers that run Windows but neither of the other two operating systems is 3.

Learn more about Windows here:

https://brainly.com/question/33363536

#SPJ11

Which student is doing the best based on a number-grading system?

Julia, who scored a 5 on her coursework.
Samuel, who scored a 1 on his coursework.
Mariana, who scored a 3 on her coursework.
Benjamin, who scored a 4 on his coursework.

Answers

Answer:

A

Explanation:

the highest number in a number grading system is the highest grade

Answer:

A

Explanation: correct edge 2020

find the optimal parenthesization of a matrix- chain product whose sequence of dimensions is 〈5, 10, 3, 12, 5, 50, 6〉 using the matrix chain multiplication algorithm in the book.

Answers

The optimal parenthesization of the matrix chain product with dimensions 〈5, 10, 3, 12, 5, 50, 6〉 is: ((M1 M2) (((M3 M4) M5) (M6 M7)))

This parenthesization minimizes the number of scalar multiplications required to compute the matrix chain product?

The matrix chain multiplication algorithm, based on dynamic programming, is used to determine the optimal parenthesization of a matrix chain product. It calculates the minimum number of scalar multiplications required to multiply the matrices in different ways and identifies the most efficient way to perform the multiplication.

To find the optimal parenthesization, the algorithm constructs a table where each entry represents the minimum number of scalar multiplications needed to compute the matrix product within a specific range. By considering all possible split points, the algorithm iteratively fills the table, allowing the determination of the optimal parenthesization.

In this case, the sequence of dimensions 〈5, 10, 3, 12, 5, 50, 6〉 corresponds to seven matrices (M1, M2, M3, M4, M5, M6, M7). The optimal parenthesization (((M1 M2) ((M3 M4) M5)) (M6 M7)) results in the minimum number of scalar multiplications required for the matrix chain product.

Learn more about optimal parenthesization

brainly.com/question/28146414

#SPJ11

Get-wmiobject : access is denied. (exception from hresult: 0x80070005 (e_accessdenied))

Answers

Get-WmiObject: Access is Denied error message usually appears when a user does not have permission to access the specific resource that is being targeted by the cmdlet.

The cause of this error can be a wrong syntax, incorrect access rights, or other PowerShell problems, but it is most commonly due to insufficient user rights.Get-WmiObject is a cmdlet that is used to retrieve information from Windows Management Instrumentation (WMI). WMI is a Microsoft management protocol that gives administrators access to various operating system components and configuration settings.

The Access Denied error is most commonly caused by the cmdlet being run by an account with insufficient permissions. This means that the account running the cmdlet does not have the appropriate security rights to access the target resource.

To resolve this issue, try the following steps:Run the cmdlet as an administrator account.Make sure the account you are using to run the cmdlet has the correct permissions to access the target resource.If the cmdlet is being run remotely, make sure that the remote computer is set up for remote management and has the necessary firewall rules in place.Check the WMI security settings on the target computer.

To know more about message visit:

https://brainly.com/question/28267760

#SPJ11

apply the 3i design thinking model to develop strategies for apple to regain market share caused by these disruptions. identify the nature of problems that the continued supply chain disruptions in your discussion of the recommended strategies have caused.

Answers

Some potential strategies that Apple can consider in the ideation stage include diversifying its supplier base, implementing advanced technologies such as AI and machine learning.

What are some potential strategies that Apple can consider in the ideation stage of the 3i design ?

The 3i design thinking model is a useful framework for developing strategies that can help Apple regain market share caused by supply chain disruptions. The model consists of three stages: inspiration, ideation, and implementation.

Inspiration: In this stage, Apple needs to gather information and insights on the nature of the problems caused by the supply chain disruptions. These disruptions may have resulted in delays in product delivery, increased costs, reduced quality, and decreased customer satisfaction.

Apple can conduct market research, analyze customer feedback, and collaborate with suppliers to gain a better understanding of the issues.

Ideation: In this stage, Apple can generate ideas and potential solutions to the problems identified in the inspiration stage. Some potential strategies that Apple can consider include:

Diversifying its supplier base to reduce dependence on a single supplier or region.
Implementing advanced technologies such as artificial intelligence and machine learning to optimize supply chain operations.
Developing contingency plans to prepare for future disruptions.
Increasing transparency in the supply chain to improve communication and collaboration with suppliers.

Implementation: In this stage, Apple needs to execute the chosen strategies to regain market share. It should focus on implementing the strategies in a timely and efficient manner, while also monitoring and evaluating the outcomes. This will help Apple to identify areas of improvement and make adjustments accordingly.

In conclusion, the continued supply chain disruptions have caused several problems for Apple, including delays, increased costs, reduced quality, and decreased customer satisfaction. However, by applying the 3i design thinking model, Apple can develop effective strategies to address these issues and regain its market share.

Learn more about potential strategies

brainly.com/question/29759403

#SPJ11

The protection of data provided to organizations or stored on personal computers is a high priority.
a. True
b. False

Answers

Answer:

true

Explanation:

pls brainliest me pls

Describe each of the four methodologies and give an example of software that you might development using each of the methods. For one, explain why you chose that method and what would be in each area of the methodology.

Agile development methodology
DevOps deployment methodology
Waterfall development method
Rapid application development

Answers

Agile Development Methodology: Agile development is a iterative and incremental approach to software development that emphasizes flexibility and collaboration between the development team and stakeholders. Agile methodologies prioritize customer satisfaction, working software, and continuous improvement. An example of software that might be developed using agile methodology is a mobile application, where requirements and priorities can change frequently and the development team needs to adapt and deliver new features quickly. Agile methodologies are well suited for projects that have rapidly changing requirements or are highly dependent on external factors.

DevOps Deployment Methodology: DevOps is a set of practices that combines software development and IT operations to improve the speed, quality and reliability of software deployments. DevOps focuses on automation, continuous integration and continuous deployment. An example of software that might be developed using DevOps methodology is an e-commerce platform, where it's important to have a reliable, fast, and secure deployment process, and that is also easily scalable.

Waterfall Development Methodology: The Waterfall methodology is a linear sequential approach to software development where progress is seen as flowing steadily downwards through the phases of requirements gathering, design, implementation, testing and maintenance. An example of software that might be developed using Waterfall methodology is a large enterprise software system that has well-defined requirements and a long development timeline. This methodology is well suited for projects where requirements are well understood and unlikely to change, and the development process can be divided into distinct phases.

Rapid Application Development (RAD): Rapid Application Development (RAD) is a methodology that emphasizes rapid prototyping and rapid delivery of working software. RAD methodologies prioritize rapid iteration and delivery of working software. An example of software that might be developed using RAD methodology is a startup's MVP (Minimum Viable Product), where the goal is to quickly develop a basic version of the product to test with customers and gather feedback. This methodology is well suited for projects where time-to-market is a critical factor and requirements are not fully understood.

What are the methodology  about?

Each methodology has its own advantages and disadvantages, and choosing the right methodology depends on the nature of the project, the goals of the development team, and the available resources.

Therefore, Agile methodologies, for example, prioritize flexibility and continuous improvement, while Waterfall methodologies prioritize predictability and a linear development process. DevOps methodologies prioritize automation, speed, and reliability while RAD methodologies prioritize rapid delivery and customer feedback.

Learn more about Agile development  from

https://brainly.com/question/23661838

#SPJ1

What is an open port? Why is it important to limit the number of open ports to those that are absolutely essential?

Answers

An open port refers to a specific communication endpoint on a computer or network device that allows data to be sent and received.

Ports are numbered and assigned specific functions, such as Port 80 for HTTP or Port 443 for HTTPS.

It is important to limit the number of open ports to those that are absolutely essential for a few reasons. First, having open ports increases the attack surface of a system. Each open port is a potential entry point for unauthorized access or malicious activities. By reducing the number of open ports, the potential attack surface is minimized, making it more difficult for attackers to find vulnerabilities.

Second, open ports can be a potential avenue for malware or malicious code to enter a system. By limiting open ports to only those that are necessary, the risk of malware infiltration is decreased.

Third, open ports can impact network performance. When there are too many open ports, network resources can become overloaded, leading to slower performance and potential disruptions. By restricting open ports to those that are needed, network resources can be utilized more efficiently.

In conclusion, it is important to limit the number of open ports to those that are absolutely essential to minimize the attack surface, reduce the risk of malware infiltration, and optimize network performance. By doing so, organizations can enhance the security and efficiency of their systems.

To learn more about port :

https://brainly.com/question/13025617

#SPJ11

Pre-Test
Active
2
3
6
7
8
9
In order for a fictionalized story to be based on real events, the author should include
O characters with strong feelings
O historical matenal
O a narrator
O dialogue​

Answers

Some of the options in this question are not correct; here is the correct and complete question:

In order for a fictionalized story to be based on real events, the author should include

A. Characters with strong feelings

B. Historical material

C. A narrator

D. Dialogue​

The correct answer is B. Historical material

Explanation:

Stories, novels, and poems are said to be based on real events if these include or are inspired by real people, settings, or historical events. This includes using any historical material and adapting it to create a story. For example, the play "The Tragedy of Julius Caesar" written by Shakespeare is a play based on real events as it includes real characters such as Julius Caesar and some of the events in it are based on historical events.

According to this, the element that is necessary to make a story to be based on real events is historical material. Also, others such as a narrator, dialogue, or characters with strong feelings can be found in most stories including those that are completely fictionalized.

tier 1 isps connect together and exchange data at ___________.

Answers

Tier 1 ISPs, which are large-scale internet service providers, connect together and exchange data at Internet Exchange Points (IXPs). IXPs are physical locations where multiple ISPs come together to interconnect their networks and exchange internet traffic.

These exchange points act as a central hub for routing internet traffic between different networks, allowing ISPs to directly exchange data with each other. By connecting at IXPs, Tier 1 ISPs can achieve efficient and cost-effective routing of data, improving the overall performance and reliability of the internet.

This collaboration and data exchange at IXPs contribute to the global connectivity and functioning of the internet infrastructure.

Learn more about internet here:

brainly.com/question/28347559

#SPJ11

Joe always misspells the word calendar. He types the word as calender but the correct spelling appears on the document. Which feature of the word processor corrects this word?

Answers

Answer:

Auto correct feature

Explanation:

It corrects word written wrongly automatically

Other Questions
Organizing and interpreting sensory information is a process of: Daniel is completing a home project. He needs 13 pieces of wood, each 1 a 1/2 feet long, to complete the project.How much wood does Daniel need to complete his home project?(A). 8 and 2/3 ft(B). 11 and 1/2 ft(C). 14 and 1/2 ft(D). 19 and 1/2 ft is the Square root of 18 divided by 3 a rational or irrational number? explain using full sentences two resistors are connected in series with 9.0 volt battery. resistor a has twice the resistance of resistor b. what is the voltage drop across each resistors? I need 7-25 and 7-26 please and thank you (Related to Checkpoint 9.4) (Bond valuation) A bond that matures in 16 years has a $1.000 par value. The annual coupon inknest rate is 12 percent and the markets required yield to maturity on a comparablerink bond is 15 percent. What would be the value of this bond if it paid interest annually? What would be the value of this bond if it paid interest 5ernianfually? a. The vatue of this bond it it paid interest annually would be s (Round to the nearest cent) b. The value of this bond if it paid interest seniannualy would be : (Round to the nearest cent.) What do intentional torts, negligence, and strict liability have in common?O A. They involve injury to a person or property.B. They demonstrate a breach of duty.C. They show that a product is flawed.D. They show that the defendant was at fault. compared to more developed countries, less developed countries have a higher percentage of workers in which sector of the economy?answers Was Brutus a patriot or a traitor? the initial step in bounded rationality decision-making is to a. identify the problem. b. select an alternative. c. generate alternatives. d. evaluate the decision. If a new firm enters the car market, what do we observe in the market for cars? a) The equilibrium price decreases and the equilibrium quantity increases Ob) The equilibrium price increases and the equilibrium quantity decreases Od Both the equilibrium price and the equilibrium quantity decrease O d) Both the equilibrium price and the equilibrium quantity increase Find the equation of the sphere if one of its diameters has endpoints (7,3,8) and (9,7,15) which has been normaized so that the coeffcient of x is 1. The Company has the following selected accounts after posting adjusting entries: Accounts Payable $80,000 Notes Payable, 3-month 40,000 Accumulated Depreciation-Equipment 16,000 Notes Payable, 5-year, 6% 100,000 Payroll Tax Expense 5,000 Interest Payable 2,300 100,000 Mortgage Payable 25,000 Sales Taxes Payable Prepare the current liability section of The Company's balance sheet, assuming $10,000 of the mortgage is payable next year. given an ofstream object named output, associate it with a file named yearsummary.txt by opening the file for appending. a client with syndrome of inappropriate secretion of antidiuretic hormone (siadh) is admitted to the intensive care unit with a serum sodium level of 112 meq/l (112 mmol/l). which protocol prescription should the nurse implement first? The function f(x)=80(1.5)x models a bacteria population after x hours. how does the average rate of change between hour 4 and hour 8 compare to the average rate of change between hour 0 and hour 4? Ronnie buys 2 pairs of shoes for $50. Write an equation relating the total cost y to the number of pairs of shies x Judy is looking to buy a textbook. The book normally costs $75.82, but it is on sale for 35% belowthe regular cost. How much will the book cost before taxes if Judy is to buy it while it is on sale?Round to the nearest cent. Which statement describes a property of magnets? plz help In which sentence does the authorpropose a reason for journalwriting?Diary of an Ordinary Kid