if you configure internal virtual networks on a hyper-v server, which type of virtual machine communication will be allowed?

Answers

Answer 1

Internal Networking

The internal virtual network is isolated from the physical network and is only accessible to the virtual machines on the Hyper-V server. This allows you to create a separate network environment for your virtual machines, which can be useful for testing and development purposes or for creating isolated environments for certain applications or services.

The internal virtual network is only available for communication between virtual machines on the same Hyper-V server. Suppose you want to allow communication between virtual machines on different Hyper-V servers or between virtual machines and physical computers on the same network. In that case, you will need to use a different type of virtual networks, such as an external virtual network or a private virtual network.

read more about this at https://brainly.com/question/29241591

#SPJ4


Related Questions

Marissa is designing a web page that features lessons on how to build cabinets. how can she make the page most engaging for the user?

A. by adding warm colors to make the content more fun to view.

B. by adding a short video demonstrating how to build cabinets.

C. by adding a variety of font types to make the text look appealing.

D. by adding a slideshow that displays pictures of built cabinets.​

Answers

I am pretty sure it’s B because that’s the only answer that really correlates to teaching people how to build cabinets

education leads to higher wages lower unemployment.* True or false

Answers

Answer:

True

Explanation:

I would say True but I don't really know a Explanation. but if they have education then they must know more so they get paid more.

TRUE / FALSE. how the database results are read into memory is determined by: group of answer choices the program. the operating system. none of the above. the database driver.

Answers

Answer:

The database driver.

Explanation:

"


3. Pirmin's Bike Shop is behind on a custom bike project and needs to crash the project. a. Draw the network diagram.

Answers

The network diagram is drawn for Pirmin's Bike Shop.

To create a network diagram, you would typically follow these steps:

1. Identify the project activities: Make a list of all the activities involved in the custom bike project. Each activity should be specific and represent a distinct task.

2. Determine activity dependencies: Identify the dependencies between activities. Some activities may need to be completed before others can start (predecessor-successor relationships).

3. Determine activity durations: Estimate or gather information on the time required to complete each activity. This can be in terms of days, weeks, or any other suitable unit of time.

4. Organize activities and dependencies: Arrange the activities in the order in which they need to be completed based on their dependencies. This will help create a logical flow for the project.

5. Create a network diagram: Use a network diagramming tool or software, such as Microsoft Project or a Gantt chart, to plot the activities as nodes (boxes) and connect them with arrows to represent the dependencies.

6. Add duration and other information: Include the estimated duration of each activity within the corresponding node. You can also add other relevant information, such as activity codes or responsible team members.

7. Review and refine: Double-check the accuracy of the network diagram, ensuring that all activities and dependencies are correctly represented. Make any necessary adjustments or refinements as needed.

By following these steps, you should be able to create a network diagram for Pirmin's Bike Shop's custom bike project, depicting the sequence of activities and their interdependencies.

Learn more about Microsoft Project here:

https://brainly.com/question/2704239

#SPJ11

"3. Pirmin's Bike Shop is behind on a custom bike project and needs to crash the project. a. Draw the

Manipulating 2D Array ​

Manipulating 2D Array

Answers

A good example  of an implementation of the updateValue method based on the instructions is given below:

scss

public static void updateValue(int[][] array, int row, int col, int value) {

   if (row == 0) {

       if (col == array[row].length - 1) {

           array[row][col] = array.length;

       } else if (col == array[row].length - 2) {

           array[row][col] = array[0][0];

       }

   } else if (row == 1) {

       if (col == array[row].length - 1) {

           int sum = 0;

           for (int i = 0; i < array.length; i++) {

               sum += array[i].length;

           }

           array[row][col] = sum;

       }

   } else if (row == 2) {

       if (col == array[row].length - 1) {

           array[row][col] = array[0][0] + array[array.length - 1][array[array.length - 1].length - 1];

       }

   }

}

What is the array about?

To use this method to update the values as specified, you would call it like this:

updateValue(array, 0, array[0].length - 1, array.length);

updateValue(array, 1, array[1].length - 1, 6);

updateValue(array, 2, array[2].length - 1, array[0][0] + array[array.length - 1][array[array.length - 1].length - 1]);

Therefore, Note that you would need to replace array with the actual name of your 2D array variable in your code. Also, the hardcoded row values here are just examples based on the assumption that the original 2D array is the one described in the prompt. You would need to adjust the row values to match the specific arrays you are working with in your own code.

Learn more about 2D array from

https://brainly.com/question/26104158

#SPJ1

See transcribed text below



The last element in each array in a 2D array is incorrect. It's your job to fix each array so that the value 0 Is changed to the correct value.

In the first array, the final value should be the length of the 2D array.

In the second array, the final value should be the sum of lengths of the rows (this is also the total number of elements in array!).

In the third array, the final value should be the sum of the first and last values in the 2D array.

Create a method called

updateValue(int[][] array, int row, int col, int value) that sets

the [row][column] to the correct value. Then, call the updateValue method three times once for each value change that you are supposed to make. When inputting values to updatevalue, you will have to hard code the row value, but the column value and the new value should be set so that it will work even if the rows in array are modified.

For example, if we wanted to set the value of the second to last index in the first array to the first element in the 2D array, we would write:

updateValue(array, 0, array[0].length -2, array[0][0])

Both tunnel and transport modes can be accommodated by the encapsulating security payload encryption format.
True
False

Answers

Both tunnel and transport modes can be accommodated by the encapsulating security payload encryption format.

The statement is true.

The Encapsulating Security Payload (ESP) is indeed a protocol within the IPsec suite that offers data confidentiality, integrity, and authentication. ESP is flexible and can operate in both tunnel and transport modes, accommodating different network configurations. In tunnel mode, ESP encrypts the entire IP packet, including the original IP header, ensuring end-to-end security between the tunnel endpoints. On the other hand, in transport mode, ESP encrypts only the payload (upper-layer protocol data), while leaving the IP header unencrypted. This allows for selective encryption of specific data while maintaining the original IP header information. Overall, ESP provides a versatile solution for securing IP communications in both tunnel and transport modes.

Know more about Encapsulating Security Payload: https://brainly.com/question/24214475

#SPJ11

in order to remove a slide from a presentation you should

Answers

Answer:

Right Click on the slide and press delete or the undo button if adding a slide was the last thing you did.

Explanation:

Have a splendiferous day!

Hope this helps!

What is the greatest magnitude negative number one can represent in

an 8-bit 2's complement code? Write your result in binary and

decimal.

Answers

In 2's complement notation, the range of numbers that can be represented with an n-bit system is from -2ⁿ⁻¹ to 2ⁿ⁻¹ - 1. In an 8-bit system.

This means that the maximum magnitude of a positive number that can be represented is 2⁷ = 128 and the minimum magnitude of a negative number that can be represented is -2⁷ = -128. This leaves one bit for representing the sign of the number.

The greatest magnitude negative number that can be represented in an 8-bit 2's complement code would have a binary representation of 10000000. To find the decimal equivalent, we can calculate the value of the bits using their corresponding powers of 2 and add them together:1 * -128 + 0 * 64 + 0 * 32 + 0 * 16 + 0 * 8 + 0 * 4 + 0 * 2 + 0 * 1= -128Therefore, the greatest magnitude negative number that can be represented in an 8-bit 2's complement code is -128, with a binary representation of 10000000.

To know more about range visit:

https://brainly.com/question/29204101

#SPJ11

Implement the frame replacement algorithm for virtual memory
For this task, you need to perform the simulation of page replacement algorithms. Create a Java program which allows the user to specify:
the total of frames currently exist in memory (F),
the total of page requests (N) to be processed,
the list or sequence of N page requests involved,
For example, if N is 10, user must input a list of 10 values (ranging between 0 to TP-1) as the request sequence.
Optionally you may also get additional input,
the total of pages (TP)
This input is optional for your program/work. It only be used to verify that each of the page number given in the request list is valid or invalid. Valid page number should be within the range 0, .. , TP-1. Page number outside the range is invalid.
Then use the input data to calculate the number of page faults produced by each of the following page replacement algorithms:
First-in-first-out (FIFO) – the candidate that is the first one that entered a frame
Least-recently-used (LRU) –the candidate that is the least referred / demanded
Optimal – the candidate is based on future reference where the page will be the least immediately referred / demanded.

Answers

To implement the frame replacement algorithm for virtual memory, you can create a Java program that allows the user to specify the total number of frames in memory (F), the total number of page requests (N), and the sequence of page requests.

Optionally, you can also ask for the total number of pages (TP) to validate the page numbers in the request list. Using this input data, you can calculate the number of page faults for each of the three page replacement algorithms: First-in-first-out (FIFO), Least-recently-used (LRU), and Optimal.

To implement the frame replacement algorithm, you can start by taking input from the user for the total number of frames (F), the total number of page requests (N), and the sequence of page requests. Optionally, you can also ask for the total number of pages (TP) to validate the page numbers in the request list.

Next, you can implement the FIFO algorithm by maintaining a queue to track the order in which the pages are loaded into the frames. Whenever a page fault occurs, i.e., a requested page is not present in any frame, you can remove the page at the front of the queue and load the new page at the rear.

For the LRU algorithm, you can use a data structure, such as a linked list or a priority queue, to keep track of the most recently used pages. Whenever a page fault occurs, you can remove the least recently used page from the data structure and load the new page.

For the Optimal algorithm, you need to predict the future references of the pages. This can be done by analyzing the remaining page requests in the sequence. Whenever a page fault occurs, you can replace the page that will be referenced farthest in the future.

After processing all the page requests, you can calculate and display the number of page faults for each algorithm. The page fault occurs when a requested page is not present in any of the frames and needs to be loaded from the disk into memory.

By implementing these steps, you can simulate the frame replacement algorithm for virtual memory using the FIFO, LRU, and Optimal page replacement algorithms in your Java program.

To learn more about virtual memory click here:

brainly.com/question/30756270

#SPJ11

What icon indicated video mode?
Av
Tv
The video camera icon

Answers

The video camera icon indicated video mode.

The video camera icon is a universally recognized symbol that indicates video mode on electronic devices such as cameras, smartphones, and video recorders. This icon usually appears on the interface of the device, usually on the screen or as a button that you can press, when you are in video mode, and it allows you to record videos.

AV and TV icons are related to audio-video and television, but they are not used specifically to indicate video mode. AV icon can be used for different purposes such as indicating the audio-video input/output of a device or indicating an audio-video format. The TV icon is used to indicate the television mode, which typically refers to the display mode of a device.

Write any four causes of cyber crime

Answers

A Lack of Empathy
The Victim Deserves It
Self-loathing
It Becomes an Addiction

printf give the name of the label associated with the format string that will be passed to printf (make sure you include the whole label name but not the colon):

Answers

The name of the label associated with the format string that will be passed to printf is usually referred to as the format specifier.

The format specifier is a string that contains special characters that are interpreted by printf to format and print the corresponding argument. These special characters are preceded by a percent sign (%) and are often referred to as conversion specifiers.

For example, the format specifier "%d" is used to print an integer argument, while "%s" is used to print a string argument. The label name in this case would be the format specifier itself, including the percent sign.

It's important to note that the format specifier must be compatible with the type of argument being passed, otherwise the behavior of printf will be undefined. Additionally, the format string may contain other characters that are not conversion specifiers, such as spaces, tabs, and newlines, which will be printed as-is.

In summary, the label associated with the format string passed to printf is the format specifier, which contains special characters that format and print the corresponding argument. It is important to use the correct format specifier for each argument to avoid undefined behavior.

Learn more about printf  here:

https://brainly.com/question/13486181

#SPJ11

under acquisition in the all traffic > referrals report, for users that came from the source " " which referral path had the most sessions?

Answers

In the all traffic > referrals report, under the Acquisition tab of  Analytics, you can get information about the traffic sources that direct users to your website.

In this report, the referral source is the website or platform that links to your website, and the referral path is the specific page or URL of the referring website that led users to your website.When a user clicks on a link from the referring website, the user is directed to a specific page on your website. In Analytics, this information is recorded as a session. If the same user clicks on the same link again, it will be recorded as another session.The referral path with the most sessions can vary depending on the specific referral source. To find the referral path with the most sessions for a specific referral source, follow these

steps:

1. Go to the All Traffic > Referrals report.

2. Find the referral source you are interested in and click on it. This will take you to a page with more detailed information about the referral source.

3. Look for the Referral Path column. This column shows the specific page or URL on the referring website that led users to your website.

4. Sort the Referral Path column by clicking on the column header. This will sort the data by the number of sessions for each referral path.

5. Look for the referral path with the most sessions. This is the referral path that had the most users clicking on the link to your website from the specific referring website.

If you want to know which referral source had the most sessions overall, you can look at the Sessions column in the All Traffic > Referrals report. This column shows the total number of sessions that came from each referral source, regardless of the specific referral path.

Learn more about website :

https://brainly.com/question/32113821

#SPJ11

When you perform a search, a general search engine searches the entire Internet.
A. True
B. False

Answers

Answer:

a

Explanation:

general search is a

advanced search is b

What standard tcp port is reserved by iana for the openvpn service to operate on?

Answers

Answer:

1194 is the OpenVPN port reserved by the IANA

Explanation:

which invention replaced vacuum tubes in computers?

Answers

Answer:

Transistors

Explanation:

This is a bit confusing to me. Could someone please help me! I have to use CSS to Design a Web Page. I will mark Brainliest!

Answers

Answer:

CSS is easy

Explanation:

CSS is like the color or your sylte for a webpage.

Which audio media can be directly sent to the subscribers through an RSS feed?
A.
online streaming
B.
podcast
C.
cloud file
D.
live playback
E.
broadcast

Answers

I believe it’s c sorry if I’m incorrect though

Answer:

The correct answer should be B. podcast

Explanation:

there is a website called RSS feed that is podcasts

The best time to vet a location is:


Question 1 options:


during post-production.



during production.



at the same time of day as the filming.



first thing in the morning.


Question 2 (2 points)

Which of these is most useful on a windy day?


Question 2 options:


boom



microphone windshield



tripod



extra camera


Question 3 (2 points)

Which of these statements is accurate?


Question 3 options:


No one on a set is responsible for someone else's safety.



Directors have an ethical obligation to protect everyone on the set.



Safety issues are best addressed in post-production.



Filming indoors eliminates safety issues.


Question 4 (2 points)

If equipment will be stored longer than a week:


Question 4 options:


remove the lens caps.



find a professional storage facility.



remove the batteries.



use cases designed especially for long-term storage.


Question 5 (2 points)

An equipment check:


Question 5 options:


is essential during production.



should only be done in pre-production.



should only be done in post-production.



should be done during pre- and post-production.

Answers

Answer:

1. at the same time of day as the filming.

2. microphone windshield.

3. Directors have an ethical obligation to protect everyone on the set.

4. remove the batteries.

5. should be done during pre- and post-production.

Explanation:

I just took the test

an application is described as a set of computer instructions that controls allocation of computer hardware and provides the capability of communicating with your computer. group of answer choices true false

Answers

Yes, an application is defined as a set of computer instructions that manages how computer hardware is allocated and gives you the capacity to communicate with your computer.

What kind of software is responsible for managing the computer's resource allocation?

Operating system (OS) Operating system (OS), program that controls how resources are distributed among different applications on a computer. The CPU, RAM, file storage, input/output (I/O) devices, and network connections are examples of common resources.

Is a piece of software an instruction set?

To control computers and carry out particular activities, software is a collection of instructions, data, or programs. Hardware, which describes a computer's external components, is the opposite of software.

To know more about operating system visit:-

https://brainly.com/question/29032385

#SPJ4

Type the correct answer in the box. Use numerals instead of words. If necessary, use / for the fraction bar.
Which number represents the "on* state of a computer?
_ represents the "on" state of a computer.

Answers

Binary values are used to denote the 'ON' and 'OFF' state of a computer. The 'ON' state is denoted by the binary value '1'

The 'ON' state of a computer represents the mode when the computer system is running and can be used to perform computing operations.

The binary values '0' and '1' are used to designate the ON and OFF state.

When the computer is ON, it is designated by the binary value 1 ; while the OFF state is designated by the binary value 0.

Therefore, the number which signifies the ON state of a computer is 1.

Learn more :https://brainly.com/question/4722254

x.800 architecture was developed as an international standard and focuses on security in the context of networks and communications.
a trure
b false

Answers

The statement about the x.800 architecture is false

Why is this so?

It is important to note that the X.800 standard does not focus solely on network and communication security.

Instead, it provides a general framework for security that can be applied to a wide range of systems and applications.

The X.800 standard defines security concepts and principles, and it provides guidance on security management, security services, and security mechanisms.

Hence, the statement is false.

Read more about network here:

https://brainly.com/question/8118353

#SPJ1

How could I compare only the 1st letter of strings in the "names" list with the input?

How could I compare only the 1st letter of strings in the "names" list with the input?

Answers

So let's say we have the list:

list1 = ["Apple", "Banana", "Cherry"]

If we print this with indexes:
print(list1[0])

It'll show:
Apple

Now, we can add another index like:
print(list1[0][0])

And that'll show
A

What technology standard is commonly used today for hard drives to interface with the motherboard in a system? pasago po salamat ^_^

Answers

Answer:

Serial Advanced Technology Attachment (SATA).

Explanation:

The hardware component of a computer can be defined as the physical parts or peripherals that enables it to work properly. Thus, the hardware components of a computer are the physical parts that can be seen and touched. Some examples of hardware components are monitor, speaker, central processing unit, motherboard, hard-drive, joystick, mouse, keyboard, etc.

Digital storage of data refers to the process which typically involves saving computer files or documents on magnetic storage devices usually having flash memory. Some examples of digital storage devices are hard drives, memory stick or cards, optical discs, cloud storage, etc. A reliable storage such as a hard-disk drive ensures that computer files or documents are easily accessible and could be retrieved in the event of a loss.

Serial ATA (SATA) is a technological standard which is commonly used today for hard drives to interface with the motherboard in a computer system. Thus, it's simply a bus interface on computer systems that is typically used for connecting mass storage devices to host bus adapters such as motherboards.

Generally, SATA comprises of two ports and these are the power and data connector.

Which test environment simulates the hardware and software configurations at the client side. ?

An(blank)

test environment at the project site simulates the hardware and software configurations at the client side.

Answers

Answer: The correct answer to fill in the blank is "Acceptance".

The Acceptance test environment is typically set up at the client's site or in a simulated client environment and is used to test the software in conditions that are similar to those that the end-users will encounter. This environment simulates the hardware and software configurations that are specific to the client's environment and helps to ensure that the software will function as expected in the client's environment.

Acceptance testing is typically one of the final stages of testing before the software is deployed to production, and it helps to ensure that the software meets the client's requirements and is ready for use. Testing in the Acceptance environment provides the opportunity to identify and fix any issues that may arise in the client's environment before the software is deployed, which helps to minimize disruptions and ensure a smooth deployment process.

Explanation:

Write a code in python that guesses a hardcoded answer and keeps on asking the user until the user gets the answer correct. The cmputer should be telling the user if the number they are guessing is too low or too high.

Answers

import random

#You can change the range.

answer = random.randint(1,1000)

counter = 0

while(True):

   guess = int(input("Make a guess: "))

   message = "Too high!" if guess>answer else "Too low!" if guess<answer else "You won!"

   print(message)

   if(message=="You won!"):

       print("It took",counter,"times.")

       break

   else:

       counter+=1

Write a code in python that guesses a hardcoded answer and keeps on asking the user until the user gets

What is the primary method by which robots (crawlers, spiders) discover new web pages?

Answers

The primary method by which robots (crawlers, spiders) discover new web page is that Robots do follow the path created by websites linking to each other.

What are web page?

A web page (or webpage) is known to be a kind of an hypertext document that is known to be seen or found on the World Wide Web.

Note that the Web pages are said to be often delivered by the use of a  web server to the person who is using the system and it is one that is often shown or displayed in a web browser.

Note that a website is made up of many web pages connected together under what we see as common domain name and as such, The primary method by which robots (crawlers, spiders) discover new web page is that Robots do follow the path created by websites linking to each other.

Learn more about robots from

https://brainly.com/question/13515748

#SPJ1

Using MATLAB, write a Newton's algorithm to solve f(x) = 0. Hence your algorithm should have the message:
(1) Please input your function f(x)
(2) Please input your starting point x = a
After solving, your algorithm should give the message:
"Your solution is = "
If your algorithm does not converge (no solution) write the message:
"No solution, please input another starting point".
Test your algorithm using a simple function f(x) that you know the answer

Answers

The following MATLAB algorithm implements Newton's method to solve the equation f(x) = 0. It prompts the user to input the function f(x) and the starting point x = a. After convergence, it displays the solution. If the algorithm does not converge, it displays a message indicating no solution.

% Newton's method algorithm

disp("Please input your function f(x):");

syms x

f = input('');

disp("Please input your starting point x = a:");

a = input('');

% Initialize variables

tolerance = 1e-6; % Convergence tolerance

maxIterations = 100; % Maximum number of iterations

% Evaluate the derivative of f(x)

df = diff(f, x);

% Newton's method iteration

for i = 1:maxIterations

   % Evaluate function and derivative at current point

   fx = subs(f, x, a);

   dfx = subs(df, x, a);    

   % Check for convergence

   if abs(fx) < tolerance

       disp("Your solution is = " + num2str(a));

       return;

   end    

   % Update the estimate using Newton's method

   a = a - fx/dfx;

end

% No convergence, solution not found

disp("No solution, please input another starting point.");

To test the algorithm, you need to provide a function f(x) for which you know the solution. For example, let's solve the equation x^2 - 4 = 0.

When prompted for the function, you should input: x^2 - 4

And when prompted for the starting point, you can input any value, such as 1. The algorithm will converge and display the solution, which should be 2.

Please note that the provided algorithm assumes the input function is valid and converges within the maximum number of iterations. Additional error handling and convergence checks can be implemented to enhance the algorithm's robustness.

Learn more about MATLAB here:

https://brainly.com/question/30763780

#SPJ11

The while loop is this type of loop. A) post-test B) pre-test C) infinite Di limited E) None of these.

Answers

The while loop is a type of pre-test loop.

It's important to note that the pre-test loop executes zero or more iterations based on the condition being true or false. If the condition is false initially, the loop may never execute. In contrast, post-test loops execute the code at least once before testing the condition, and infinite loops execute indefinitely until a break or other condition is met. Therefore, the long answer is that while loops are pre-test loops that allow for conditional execution of code.

A while loop is a pre-test loop because it checks the condition before executing the loop's statements. If the condition is true, the loop will continue running; if it is false, the loop will stop. This type of loop is ideal when you need to perform an operation as long as a specific condition is met.

To know more about loop visit:-

https://brainly.com/question/30494342

#SPJ11

The physical equipment
The programs used to run the network
Part of the network that allows communication with other networks
Routes data where it is meant to go

Answers

Answer: hardware, software, gateway, router

Explanation:

Got it right on e2020

Other Questions
Fully factories thus expression4h + 12 g a 4 kg ball is thrown straight up in the air. what is the net force acting on the ball when it reaches its maximum height? what is the ball's acceleration at this point? Bella is learning to type. She typed a letter to her teacher but misspelled 8 words. If she misspelled 25% of the words she typed. how many words did she type in her letter I'm taking a test I need this ASAP Florida has about 66 tornadoes each year, which is approximately 5.7% of all tornadoes in the United States annually. Estimate how many tornadoes occur in the United States each year fill in the blank question. the splitting or diverging of a population into two or more is known as cladogenesis. How does the author develop a theme around appearances?The author develops the theme that appearances are important factors of power with A spaceship of mass mm circles a planet of mass M in an orbit of radius R. How much energy is required to transfer the spaceship to a circular orbit of radius 3R? Which statement best defines a universal law?A.It operates only under specific conditions.B.It is in effect at all times.C.It changes over time.D.It is in effect some of the time. Find the LCM of x2 + x,x2-1,x2-x Read the passage. Then, select the synonym of the word in bold. "What can I get you?" I asked the customer at the counter. He gave me his order and then told me all sorts of superfluous information about himself: how he couldn't find a parking spot near the coffee shop, how he was running late for work, and how he was taking a much-needed vacation next week. While he shared these unnecessary details, a line of annoyed customers gathered behind him. Submit calculate the edge length, in cm, of the theoretically smallest possible square of area sun is 5778 k The Weeks' family goes out to eat and the total bill was $72.48. If they want to leave an 18% tip, how much extra money should they leave the waitress? The 2011 broadway play ""war horse"" takes place during which conflict?. The popular fictional film character ___________, was entirely created using motion capture. a. gollum c. yoda b. darth vadar d. frodo please select the best answer from the choices provided a b c d an investor considers investing $10,000 in the stock market. he believes that the probability is 0.30 that the economy will improve, 0.40 that it will stay the same, and 0.30 that it will deteriorate. further, if the economy improves, he expects his investment to grow to $15,000, but it can also go down to $8,000 if the economy deteriorates. if the economy stays the same, his investment will stay at $10,000. a. what is the expected value of his investment? b. what should the investor do if he is risk neutral? c. is the decision clear-cut if he is risk averse? Although Leonardo da Vinci is most famous for his paintings, he was also a prolific drawer, What is one of his best-known drawings?A.Vitruvian ManB.The Last SupperC.Mona LisaD.Pieta Explain why the deindustrialization of India and China after1800 is consistent with trade based on comparative advantage. Can someone please help me with these? homework due tomorrow1.) Fill in the correct form of the possessive adjective.(mon, ma, mes, ton, ta, tes, son, sa, ses, notre, votre, nos, vos, leur, leurs)1. _____ (My) parents sont gnreux.2. Je fais_________(my) devoirs3. Catherine va au cinma avec ______ (her) amies.4. Nous allons voir ______(our) grands-parents.5. Jaime ______(my) nouvelle maison.6. Tu aimes _______(your) cours luniversit?7. Nous adorons ________(our) petit chien.8. Mes cousins partent en vacances avec ______(their) parents.2.) Quelle est votre profession? State the professions based on the discriptions. a. Elle soigne les malades lhpital: Il est___________________b. Elle travaille avec les ordinateurs: Elle est ________________________________c. Il enseigne luniversit: Il est _______________________________________e. Il prpare les dclarations dimpts: Il est _________________________________f. Il suit des cours(takes courses) luniversit: Il est ___________________________g. Elle crit des articles pour les journaux: _____________________________________3.) Vocabulaire Match each definition in column A with a family member term in column B. A B1. la fille de ma sur ou de mon frre a. ma tante2. Le fils de ma sur ou de mon frre b. ma grand-mre3. La mre de ma mre c. ma nice4. Le mari de de ma grand-mre d. mon cousin5. Le fils de mon oncle ou de ma tante e. mon grand-pre6. La femme de mon oncle f. mon neveu Birthday collision attack implementationImplement the given algorithm in C/C++ or Python to search for collisions in a toy example of a cryptographic hash function with n-but output where n are the first n bits of the SHA-1 message digest. Specifically, write the program which searches for collisions in the first 4,8,12,16... bits of the SHA-1 digest. Work with the hex representation of the digest. Search for a pair of SHA-1 digests with the first 1,2,3... symbols (in hex) being the same. Stop at the number of bits which takes a long time (over 15 mins).For each output length, count the timing which the birthday attack takes.Algorithm for finding collisions in constant space input: H: M->{0,1)n Output: Distinct x, x, st. H(x)-H(x) for i = 1, 2, , N do: x = H(x) x = H(H(x)) if x = x break x=x, x=x0 for j 1 to i do: if H(x) -H(x) return x,x and halt else x- H(x), x - H(x). What volume of Br2 gas (at STP) is created when 100.0 g of chromium (III) bromide decomposes according to the reaction?2CrBr3-> 2CrBr2 + Br2